idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2,563 | tcpdump | 4601c685e7fd19c3724d5e499c69b8d3ec49933e | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/4601c685e7fd19c3724d5e499c69b8d3ec49933e | CVE-2017-13019: Clean up PGM option processing.
Add #defines for option lengths or the lengths of the fixed-length part
of the option. Sometimes those #defines differ from what was there
before; what was there before was wrong, probably because the option
lengths given in RFC 3208 were sometimes wrong - some lengths ... | 1 | pgm_print(netdissect_options *ndo,
register const u_char *bp, register u_int length,
register const u_char *bp2)
{
register const struct pgm_header *pgm;
register const struct ip *ip;
register char ch;
uint16_t sport, dport;
u_int nla_afnum;
char nla_buf[INET6_ADDRSTRLEN];
register const stru... | 197,306,675,310,624,960,000,000,000,000,000,000,000 | print-pgm.c | 172,166,990,047,650,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13019 | The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13019 |
2,564 | tcpdump | 26a6799b9ca80508c05cac7a9a3bef922991520b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/26a6799b9ca80508c05cac7a9a3bef922991520b | CVE-2017-13018/PGM: Add a missing bounds check.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | pgm_print(netdissect_options *ndo,
register const u_char *bp, register u_int length,
register const u_char *bp2)
{
register const struct pgm_header *pgm;
register const struct ip *ip;
register char ch;
uint16_t sport, dport;
u_int nla_afnum;
char nla_buf[INET6_ADDRSTRLEN];
register const stru... | 252,571,658,770,575,170,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13018 | The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13018 |
2,565 | tcpdump | 11b426ee05eb62ed103218526f1fa616851c43ce | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/11b426ee05eb62ed103218526f1fa616851c43ce | CVE-2017-13017/DHCPv6: Add a missing option length check.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | dhcp6opt_print(netdissect_options *ndo,
const u_char *cp, const u_char *ep)
{
const struct dhcp6opt *dh6o;
const u_char *tp;
size_t i;
uint16_t opttype;
size_t optlen;
uint8_t auth_proto;
u_int authinfolen, authrealmlen;
int remain_len; /* Length of remaining options */
int label_len; /* Labe... | 33,155,060,227,659,363,000,000,000,000,000,000,000 | print-dhcp6.c | 290,574,228,139,358,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13017 | The DHCPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-dhcp6.c:dhcp6opt_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13017 |
2,566 | tcpdump | c177cb3800a9a68d79b2812f0ffcb9479abd6eb8 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c177cb3800a9a68d79b2812f0ffcb9479abd6eb8 | CVE-2017-13016/ES-IS: Fix printing of addresses in RD PDUs.
Always print the SNPA, and flag it as such; only print it as a MAC
address if it's 6 bytes long.
Identify the NET as such.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add tests using the capture files supplied by the repor... | 1 | esis_print(netdissect_options *ndo,
const uint8_t *pptr, u_int length)
{
const uint8_t *optr;
u_int li,esis_pdu_type,source_address_length, source_address_number;
const struct esis_header_t *esis_header;
if (!ndo->ndo_eflag)
ND_PRINT((ndo, "ES-IS"));
if (length <= 2) {
ND_PRINT((ndo, ndo->ndo_qfla... | 218,871,800,300,892,970,000,000,000,000,000,000,000 | print-isoclns.c | 84,623,992,754,612,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13016 | The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13016 |
2,567 | tcpdump | 985122081165753c7442bd7824c473eb9ff56308 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/985122081165753c7442bd7824c473eb9ff56308 | CVE-2017-13015/EAP: Add more bounds checks.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | eap_print(netdissect_options *ndo,
register const u_char *cp,
u_int length)
{
const struct eap_frame_t *eap;
const u_char *tptr;
u_int tlen, type, subtype;
int count=0, len;
tptr = cp;
tlen = length;
eap = (const struct eap_frame_t *)cp;
ND_TCHECK(*eap);
/* in n... | 331,600,373,994,432,900,000,000,000,000,000,000,000 | print-eap.c | 158,241,263,588,201,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13015 | The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13015 |
2,568 | tcpdump | cc356512f512e7fa423b3674db4bb31dbe40ffec | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/cc356512f512e7fa423b3674db4bb31dbe40ffec | CVE-2017-13014/White Board: Do more bounds checks.
This fixes a buffer over-read discovered by Yannick Formaggio.
Add a test using the capture file supplied by the reporter(s).
While we're at it, print a truncation error if the packets are
truncated, rather than just, in effect, ignoring the result of the
routines t... | 1 | wb_prep(netdissect_options *ndo,
const struct pkt_prep *prep, u_int len)
{
int n;
const struct pgstate *ps;
const u_char *ep = ndo->ndo_snapend;
ND_PRINT((ndo, " wb-prep:"));
if (len < sizeof(*prep)) {
return (-1);
}
n = EXTRACT_32BITS(&prep->pp_n);
ps = (const struct pgstate *)(prep + 1);
wh... | 235,316,159,481,129,770,000,000,000,000,000,000,000 | print-wb.c | 99,433,165,740,537,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13014 | The White Board protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-wb.c:wb_prep(), several functions. | https://nvd.nist.gov/vuln/detail/CVE-2017-13014 |
2,572 | tcpdump | 8509ef02eceb2bbb479cea10fe4a7ec6395f1a8b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/8509ef02eceb2bbb479cea10fe4a7ec6395f1a8b | CVE-2017-13012/ICMP: Add a missing bounds check.
Check before fetching the length from the included packet's IPv4 header.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an i... | 1 | icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2,
int fragmented)
{
char *cp;
const struct icmp *dp;
const struct icmp_ext_t *ext_dp;
const struct ip *ip;
const char *str, *fmt;
const struct ip *oip;
const struct udphdr *ouh;
const uint8_t *obj_tptr;
... | 278,682,006,888,697,420,000,000,000,000,000,000,000 | print-icmp.c | 198,282,554,091,103,430,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13012 | The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13012 |
2,573 | tcpdump | 9f0730bee3eb65d07b49fd468bc2f269173352fe | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/9f0730bee3eb65d07b49fd468bc2f269173352fe | CVE-2017-13011/Properly check for buffer overflow in bittok2str_internal().
Also, make the buffer bigger.
This fixes a buffer overflow discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't be rejected as an invalid capture. | 1 | bittok2str_internal(register const struct tok *lp, register const char *fmt,
register u_int v, const char *sep)
{
static char buf[256]; /* our stringbuffer */
int buflen=0;
register u_int rotbit; /* this is the bit we rotate through all bitpositions */
register u_int tokval;
... | 5,329,624,229,776,096,000,000,000,000,000,000,000 | util-print.c | 159,998,677,330,794,870,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-13011 | Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13011 |
2,575 | tcpdump | 877b66b398518d9501513e0860c9f3a8acc70892 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/877b66b398518d9501513e0860c9f3a8acc70892 | CVE-2017-13010/BEEP: Do bounds checking when comparing strings.
This fixes a buffer over-read discovered by Brian 'geeknik' Carpenter.
Add a test using the capture file supplied by the reporter(s). | 1 | l_strnstart(const char *tstr1, u_int tl1, const char *str2, u_int l2)
{
if (tl1 > l2)
return 0;
return (strncmp(tstr1, str2, tl1) == 0 ? 1 : 0);
}
| 179,436,561,114,024,040,000,000,000,000,000,000,000 | print-beep.c | 226,808,505,814,341,870,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13010 | The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13010 |
2,576 | tcpdump | db8c799f6dfc68765c9451fcbfca06e662f5bd5f | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/db8c799f6dfc68765c9451fcbfca06e662f5bd5f | CVE-2017-13009/IPv6 mobility: Add a bounds check.
This fixes a buffer over-read discovered by Brian 'geeknik' Carpenter.
Add a test using the capture file supplied by the reporter(s).
While we're at it:
Add a comment giving the RFC for IPv6 mobility headers.
Clean up some bounds checks to make it clearer what they... | 1 | mobility_print(netdissect_options *ndo,
const u_char *bp, const u_char *bp2 _U_)
{
const struct ip6_mobility *mh;
const u_char *ep;
unsigned mhlen, hlen;
uint8_t type;
mh = (const struct ip6_mobility *)bp;
/* 'ep' points to the end of available data. */
ep = ndo->ndo_snapend;
if (!ND_TTEST(mh-... | 234,313,348,879,631,130,000,000,000,000,000,000,000 | print-mobility.c | 226,475,948,374,881,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13009 | The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13009 |
2,577 | tcpdump | ca336198e8bebccc18502de27672fdbd6eb34856 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/ca336198e8bebccc18502de27672fdbd6eb34856 | CVE-2017-13007/PKTAP: Pass a properly updated struct pcap_pkthdr to the sub-dissector.
The sub-dissector expects that the length and captured length will
reflect the actual remaining data in the packet, not the raw amount
including the PKTAP header; pass an updated header, just as we do for
PPI.
This fixes a buffer o... | 1 | pktap_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
uint32_t dlt, hdrlen, rectype;
u_int caplen = h->caplen;
u_int length = h->len;
if_printer printer;
const pktap_header_t *hdr;
if (caplen < sizeof(pktap_header_t) || length < sizeof(pktap_header_t)) {
N... | 200,408,431,775,823,500,000,000,000,000,000,000,000 | print-pktap.c | 242,050,816,181,732,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13007 | The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13007 |
2,591 | tcpdump | b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd | CVE-2017-13005/NFS: Add two bounds checks before fetching data
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s). | 1 | xid_map_enter(netdissect_options *ndo,
const struct sunrpc_msg *rp, const u_char *bp)
{
const struct ip *ip = NULL;
const struct ip6_hdr *ip6 = NULL;
struct xid_map_entry *xmep;
if (!ND_TTEST(rp->rm_call.cb_vers))
return (0);
switch (IP_V((const struct ip *)bp)) {
case 4:
ip = (const struct ip ... | 55,998,268,801,158,500,000,000,000,000,000,000,000 | print-nfs.c | 325,597,668,871,085,650,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13005 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13005 |
2,592 | tcpdump | a25211918f2e790c67d859d20ccf8dbb81da1598 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/a25211918f2e790c67d859d20ccf8dbb81da1598 | CVE-2017-13003/Clean up the LMP dissector.
Do a lot more bounds and length checks.
Add a EXTRACT_8BITS() macro, for completeness, and so as not to confuse
people into thinking that, to fetch a 1-byte value from a packet, they
need to use EXTRACT_16BITS() to fetch a 2-byte value and then use
shifting and masking to ex... | 1 | lmp_print(netdissect_options *ndo,
register const u_char *pptr, register u_int len)
{
const struct lmp_common_header *lmp_com_header;
const struct lmp_object_header *lmp_obj_header;
const u_char *tptr,*obj_tptr;
int tlen,lmp_obj_len,lmp_obj_ctype,obj_tlen;
int hexdump;
int offse... | 207,905,445,019,781,550,000,000,000,000,000,000,000 | print-lmp.c | 285,803,191,062,121,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13003 | The LMP parser in tcpdump before 4.9.2 has a buffer over-read in print-lmp.c:lmp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13003 |
2,593 | tcpdump | cbddb98484ea8ec1deece351abd56e063d775b38 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38 | CVE-2017-13002/AODV: Add some missing bounds checks.
In aodv_extension() do a bounds check on the extension header before we
look at it.
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s).
While we're at it, add the RFC number, and check the v... | 1 | aodv_extension(netdissect_options *ndo,
const struct aodv_ext *ep, u_int length)
{
const struct aodv_hello *ah;
switch (ep->type) {
case AODV_EXT_HELLO:
ah = (const struct aodv_hello *)(const void *)ep;
ND_TCHECK(*ah);
if (length < sizeof(struct aodv_hello))
goto trunc;
ND_PRINT(... | 90,330,714,944,185,620,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13002 | The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13002 |
2,594 | tcpdump | 7a923447fd49a069a0fd3b6c3547438ab5ee2123 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/7a923447fd49a069a0fd3b6c3547438ab5ee2123 | CVE-2017-13001/NFS: Don't copy more data than is in the file handle.
Also, put the buffer on the stack; no reason to make it static. (65
bytes isn't a lot.)
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s). | 1 | nfs_printfh(netdissect_options *ndo,
register const uint32_t *dp, const u_int len)
{
my_fsid fsid;
uint32_t ino;
const char *sfsname = NULL;
char *spacep;
if (ndo->ndo_uflag) {
u_int i;
char const *sep = "";
ND_PRINT((ndo, " fh["));
for (i=0; i<len; i++) {
ND_PRINT((ndo, "%s%x", sep, dp[i]... | 339,616,538,929,006,480,000,000,000,000,000,000,000 | print-nfs.c | 100,575,108,855,301,120,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13001 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13001 |
2,595 | tcpdump | 8512734883227c11568bb35da1d48b9f8466f43f | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f | CVE-2017-13000/IEEE 802.15.4: Fix bug introduced two fixes prior.
We've already advanced the pointer past the PAN ID, if present; it now
points to the address, so don't add 2 to it.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the captur... | 1 | ieee802_15_4_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
u_int caplen = h->caplen;
u_int hdrlen;
uint16_t fc;
uint8_t seq;
uint16_t panid = 0;
if (caplen < 3) {
ND_PRINT((ndo, "[|802.15.4]"));
return caplen;
}
hdrlen = 3;
fc = EXTRACT_LE_16BITS(... | 226,608,746,932,513,560,000,000,000,000,000,000,000 | print-802_15_4.c | 288,503,972,323,871,480,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13000 | The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13000 |
2,596 | tcpdump | 979dcefd7b259e9e233f77fe1c5312793bfd948f | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/979dcefd7b259e9e233f77fe1c5312793bfd948f | CVE-2017-12998/IS-IS: Check for 2 bytes if we're going to fetch 2 bytes.
Probably a copy-and-pasteo.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 1 | isis_print_extd_ip_reach(netdissect_options *ndo,
const uint8_t *tptr, const char *ident, uint16_t afi)
{
char ident_buffer[20];
uint8_t prefix[sizeof(struct in6_addr)]; /* shared copy buffer for IPv4 and IPv6 prefixes */
u_int metric, status_byte, bit_length, byte_length, sublen, p... | 265,874,135,992,817,670,000,000,000,000,000,000,000 | print-isoclns.c | 89,784,539,627,020,220,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12998 | The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12998 |
2,597 | tcpdump | 6fca58f5f9c96749a575f52e20598ad43f5bdf30 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/6fca58f5f9c96749a575f52e20598ad43f5bdf30 | CVE-2017-12996/PIMv2: Make sure PIM TLVs have the right length.
We do bounds checks based on the TLV length, so if the TLV's length is
too short, and we don't check for that, we could end up fetching data
past the end of the TLV - including past the length of the captured data
in the packet.
This fixes a buffer over-... | 1 | pimv2_print(netdissect_options *ndo,
register const u_char *bp, register u_int len, const u_char *bp2)
{
register const u_char *ep;
register const struct pim *pim = (const struct pim *)bp;
int advance;
enum checksum_status cksum_status;
ep = (const u_char *)ndo->ndo_snapend;
if (bp >= ep)
return;
... | 185,739,536,581,136,030,000,000,000,000,000,000,000 | print-pim.c | 29,615,296,717,801,916,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12996 | The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12996 |
2,598 | tcpdump | 3a76fd7c95fced2c2f8c8148a9055c3a542eff29 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29 | CVE-2017-12995/Check for DNS compression pointers that don't point backwards.
This is what BIND 9.11.0-P2 does; it not only detects pointers that
loop, as "point backwards" means "point before anything we've processed
so far, including what we're processing right now", so the pointer can't
point to itself (as that's w... | 1 | ns_nprint(netdissect_options *ndo,
register const u_char *cp, register const u_char *bp)
{
register u_int i, l;
register const u_char *rp = NULL;
register int compress = 0;
int chars_processed;
int elt;
int data_size = ndo->ndo_snapend - bp;
if ((l = labellen(ndo, cp)) == (u_int)-1)
return(NU... | 307,707,688,388,100,500,000,000,000,000,000,000,000 | print-domain.c | 48,636,011,061,912,920,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-12995 | The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12995 |
2,599 | tcpdump | ffde45acf3348f8353fb4064a1b21683ee6b5ddf | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf | CVE-2017-12994/BGP: Move a test inside a loop.
The loop can be executed more than once (that's kinda the whole point of
a loop), so the check has to be made each time through the loop, not
just once before the loop is executed.
Do some additional length checks while we're at it.
This fixes a buffer over-read discove... | 1 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
char b... | 110,718,534,424,942,980,000,000,000,000,000,000,000 | print-bgp.c | 81,233,617,923,263,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12994 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12994 |
2,605 | tcpdump | b534e304568585707c4a92422aeca25cf908ff02 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/b534e304568585707c4a92422aeca25cf908ff02 | CVE-2017-12993/Juniper: Add more bounds checks.
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add tests using the capture files supplied by the reporter(s). | 1 | juniper_parse_header(netdissect_options *ndo,
const u_char *p, const struct pcap_pkthdr *h, struct juniper_l2info_t *l2info)
{
const struct juniper_cookie_table_t *lp = juniper_cookie_table;
u_int idx, jnx_ext_len, jnx_header_len = 0;
uint8_t tlv_type,tlv_len;
uint32_t control_word;... | 83,772,776,983,518,260,000,000,000,000,000,000,000 | print-juniper.c | 242,693,750,230,223,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12993 | The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c, several functions. | https://nvd.nist.gov/vuln/detail/CVE-2017-12993 |
2,608 | tcpdump | e942fb84fbe3a73a98a00d2a279425872b5fb9d2 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e942fb84fbe3a73a98a00d2a279425872b5fb9d2 | CVE-2017-12992/RIPng: Clean up bounds checking.
Do bounds checking as we access items.
Scan the list of netinfo6 entries based on the supplied packet length,
without taking the captured length into account; let the aforementioned
bounds checking handle that.
This fixes a buffer over-read discovered by Kamil Frankowi... | 1 | ripng_print(netdissect_options *ndo, const u_char *dat, unsigned int length)
{
register const struct rip6 *rp = (const struct rip6 *)dat;
register const struct netinfo6 *ni;
register u_int amt;
register u_int i;
int j;
int trunc;
if (ndo->ndo_snapend < dat)
return;
amt = ndo->ndo_snapend - dat;
i = min(le... | 219,968,970,773,034,400,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-12992 | The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12992 |
2,609 | tcpdump | 50a44b6b8e4f7c127440dbd4239cf571945cc1e7 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/50a44b6b8e4f7c127440dbd4239cf571945cc1e7 | CVE-2017-12991/BGP: Add missing bounds check.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 1 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
char b... | 175,580,301,168,905,900,000,000,000,000,000,000,000 | print-bgp.c | 297,244,120,048,752,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12991 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12991 |
2,613 | tcpdump | db24063b01cba8e9d4d88b7d8ac70c9000c104e4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4 | CVE-2017-12989/RESP: Make sure resp_get_length() advances the pointer for invalid lengths.
Make sure that it always sends *endp before returning and that, for
invalid lengths where we don't like a character in the length string,
what it sets *endp to is past the character in question, so we don't
run the risk of infin... | 1 | resp_get_length(netdissect_options *ndo, register const u_char *bp, int len, const u_char **endp)
{
int result;
u_char c;
int saw_digit;
int neg;
int too_large;
if (len == 0)
goto trunc;
ND_TCHECK(*bp);
too_large = 0;
neg = 0;
if (*bp == '-') {
neg = 1;
b... | 167,321,145,110,708,070,000,000,000,000,000,000,000 | print-resp.c | 272,971,736,668,673,780,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-12989 | The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12989 |
2,614 | tcpdump | 8934a7d6307267d301182f19ed162563717e29e3 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/8934a7d6307267d301182f19ed162563717e29e3 | CVE-2017-12988/TELNET: Add a missing bounds check.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 1 | telnet_parse(netdissect_options *ndo, const u_char *sp, u_int length, int print)
{
int i, x;
u_int c;
const u_char *osp, *p;
#define FETCH(c, sp, length) \
do { \
if (length < 1) \
goto pktend; \
ND_TCHECK(*sp); \
c = *sp++; \
length--; \
} while (0)
osp = sp;
FETCH(c, sp, length);
if (c != IAC)
... | 107,867,064,229,076,670,000,000,000,000,000,000,000 | print-telnet.c | 184,247,914,215,497,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12988 | The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12988 |
2,615 | openjpeg | baf0c1ad4572daa89caa3b12985bdd93530f0dd7 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7 | bmp_read_info_header(): reject bmp files with biBitCount == 0 (#983) | 1 | static OPJ_BOOL bmp_read_info_header(FILE* IN, OPJ_BITMAPINFOHEADER* header)
{
memset(header, 0, sizeof(*header));
/* INFO HEADER */
/* ------------- */
header->biSize = (OPJ_UINT32)getc(IN);
header->biSize |= (OPJ_UINT32)getc(IN) << 8;
header->biSize |= (OPJ_UINT32)getc(IN) << 16;
header->... | 165,457,040,852,911,900,000,000,000,000,000,000,000 | convertbmp.c | 197,193,176,428,127,820,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-12982 | The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_m... | https://nvd.nist.gov/vuln/detail/CVE-2017-12982 |
2,619 | tcpdump | de981e6070d168b58ec1bb0713ded77ed4ad87f4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/de981e6070d168b58ec1bb0713ded77ed4ad87f4 | CVE-2017-12901/EIGRP: Do more length checks.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 1 | eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len)
{
const struct eigrp_common_header *eigrp_com_header;
const struct eigrp_tlv_header *eigrp_tlv_header;
const u_char *tptr,*tlv_tptr;
u_int tlen,eigrp_tlv_len,eigrp_tlv_type,tlv_tlen, byte_length, bit_length;
uint8_... | 34,544,532,256,323,543,000,000,000,000,000,000,000 | print-eigrp.c | 168,041,154,571,529,710,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12901 | The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12901 |
2,620 | tcpdump | 19d25dd8781620cd41bf178a5e2e27fc1cf242d0 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/19d25dd8781620cd41bf178a5e2e27fc1cf242d0 | CVE-2017-12898/NFS: Fix bounds checking.
Fix the bounds checking for the NFSv3 WRITE procedure to check whether the
length of the opaque data being written is present in the captured data,
not just whether the byte count is present in the captured data.
furthest forward in the packet, not the item before it. (This al... | 1 | interp_reply(netdissect_options *ndo,
const struct sunrpc_msg *rp, uint32_t proc, uint32_t vers, int length)
{
register const uint32_t *dp;
register int v3;
int er;
v3 = (vers == NFS_VER3);
if (!v3 && proc < NFS_NPROCS)
proc = nfsv3_procid[proc];
ND_PRINT((ndo, " %s", tok2str(nfsproc_str, "proc-... | 51,599,841,573,578,110,000,000,000,000,000,000,000 | print-nfs.c | 16,060,131,602,798,477,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12898 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:interp_reply(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12898 |
2,629 | tcpdump | 1dcd10aceabbc03bf571ea32b892c522cbe923de | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/1dcd10aceabbc03bf571ea32b892c522cbe923de | CVE-2017-12897/ISO CLNS: Use ND_TTEST() for the bounds checks in isoclns_print().
This fixes a buffer over-read discovered by Kamil Frankowicz.
Don't pass the remaining caplen - that's too hard to get right, and we
were getting it wrong in at least one case; just use ND_TTEST().
Add a test using the capture file sup... | 1 | isoclns_print(netdissect_options *ndo,
const uint8_t *p, u_int length, u_int caplen)
{
if (caplen <= 1) { /* enough bytes on the wire ? */
ND_PRINT((ndo, "|OSI"));
return;
}
if (ndo->ndo_eflag)
ND_PRINT((ndo, "OSI NLPID %s (0x%02x): ", tok2str(nlpid_values, "Unknown", *p), *p));
switch (*p... | 100,921,063,137,195,820,000,000,000,000,000,000,000 | print-isoclns.c | 145,104,362,232,404,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12897 | The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12897 |
2,639 | tcpdump | 2b62d1dda41590db29368ec7ba5f4faf3464765a | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/2b62d1dda41590db29368ec7ba5f4faf3464765a | CVE-2017-12895/ICMP: Check the availability of data before checksumming it.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add tests using the capture files supplied by the reporter(s). | 1 | icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2,
int fragmented)
{
char *cp;
const struct icmp *dp;
const struct icmp_ext_t *ext_dp;
const struct ip *ip;
const char *str, *fmt;
const struct ip *oip;
const struct udphdr *ouh;
const uint8_t *obj_tptr;
... | 177,467,826,620,986,760,000,000,000,000,000,000,000 | print-icmp.c | 162,892,417,934,913,890,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12895 | The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12895 |
2,642 | tcpdump | 730fc35968c5433b9e2a829779057f4f9495dc51 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51 | CVE-2017-12894/In lookup_bytestring(), take the length of the byte string into account.
Otherwise, if, in our search of the hash table, we come across a byte
string that's shorter than the string we're looking for, we'll search
past the end of the string in the hash table.
This fixes a buffer over-read discovered by ... | 1 | lookup_bytestring(netdissect_options *ndo, register const u_char *bs,
const unsigned int nlen)
{
struct enamemem *tp;
register u_int i, j, k;
if (nlen >= 6) {
k = (bs[0] << 8) | bs[1];
j = (bs[2] << 8) | bs[3];
i = (bs[4] << 8) | bs[5];
} else if (nlen >= 4) {
k = (bs[0] << 8) | bs[1];
j = (bs[... | 266,681,780,576,494,960,000,000,000,000,000,000,000 | addrtoname.c | 317,193,900,967,712,260,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12894 | Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12894 |
2,643 | tcpdump | 6f5ba2b651cd9d4b7fa8ee5c4f94460645877c45 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/6f5ba2b651cd9d4b7fa8ee5c4f94460645877c45 | CVE-2017-12893/SMB/CIFS: Add a bounds check in name_len().
After we advance the pointer by the length value in the buffer, make
sure it points to something in the captured data.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture fi... | 1 | name_len(netdissect_options *ndo,
const unsigned char *s, const unsigned char *maxbuf)
{
const unsigned char *s0 = s;
unsigned char c;
if (s >= maxbuf)
return(-1); /* name goes past the end of the buffer */
ND_TCHECK2(*s, 1);
c = *s;
if ((c & 0xC0) == 0xC0)
return(2);
while (*s) ... | 215,949,633,633,690,600,000,000,000,000,000,000,000 | smbutil.c | 199,318,378,380,938,750,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12893 | The SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12893 |
2,644 | ImageMagick | 04178de2247e353fc095846784b9a10fefdbf890 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/04178de2247e353fc095846784b9a10fefdbf890 | https://github.com/ImageMagick/ImageMagick/issues/662 | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 8,018,273,083,591,260,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-12877 | Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12877 |
2,646 | ImageMagick | 3d5ac8c20846871f1eb3068b65f93da7cd33bfd0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3d5ac8c20846871f1eb3068b65f93da7cd33bfd0 | None | 1 | static MagickBooleanType WriteCALSImage(const ImageInfo *image_info,
Image *image)
{
char
header[MaxTextExtent];
Image
*group4_image;
ImageInfo
*write_info;
MagickBooleanType
status;
register ssize_t
i;
size_t
density,
length,
orient_x,
orient_y;
ssize_t
cou... | 223,208,806,303,774,400,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12669 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12669 |
2,648 | ImageMagick | 560e6e512961008938aa1d1b9aab06347b1c8f9b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/560e6e512961008938aa1d1b9aab06347b1c8f9b | None | 1 | static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
MagickOffsetType
offset,
*page_table,
scene;
MemoryInfo
*pixel_info;
PCXInfo
pcx_info;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
regi... | 185,312,616,346,228,350,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12668 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12668 |
2,649 | ImageMagick | 8985ed08f01d465ee65ab5a106186b3868b6f601 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8985ed08f01d465ee65ab5a106186b3868b6f601 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 208,847,878,789,259,360,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12667 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12667 |
2,650 | ImageMagick | 859084b4fd966ac007965c3d85caabccd8aee9b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/859084b4fd966ac007965c3d85caabccd8aee9b4 | None | 1 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPICTOp 0x98
#define PictVer... | 16,589,949,673,789,804,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12665 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12665 |
2,652 | ImageMagick | db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f | None | 1 | static MagickBooleanType WritePALMImage(const ImageInfo *image_info,
Image *image)
{
ExceptionInfo
*exception;
MagickBooleanType
status;
MagickOffsetType
currentOffset,
offset,
scene;
MagickSizeType
cc;
PixelPacket
transpix;
QuantizeInfo
*quantize_info;
register Ind... | 326,733,059,304,932,100,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12664 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12664 |
2,654 | ImageMagick | 6233ef75bb973745ab1092b59aea8fe316f09074 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6233ef75bb973745ab1092b59aea8fe316f09074 | None | 1 | static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
depth,
packet_size;
ssize_t
y;... | 48,387,372,742,263,020,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12663 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12663 |
2,655 | ImageMagick | 73a2bad43d157acfe360595feee739b4cc4406cb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73a2bad43d157acfe360595feee739b4cc4406cb | None | 1 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
DisableMSCWarning(4310)
static const char
XMPProfile[]=
{
"<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n"
"<x:xmpmeta xmlns:x=\"adobe:ns... | 295,540,819,852,515,800,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12662 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12662 |
2,656 | ImageMagick | 9eedb5660f1704cde8e8cd784c5c2a09dd2fd60f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9eedb5660f1704cde8e8cd784c5c2a09dd2fd60f | None | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 300,007,481,126,911,370,000,000,000,000,000,000,000 | None | null | [
"CWE-770"
] | CVE-2017-12643 | ImageMagick 7.0.6-1 has a memory exhaustion vulnerability in ReadOneJNGImage in coders\png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12643 |
2,658 | ImageMagick | 3320955045e5a2a22c13a04fa9422bb809e75eda | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3320955045e5a2a22c13a04fa9422bb809e75eda | None | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 230,970,568,755,587,880,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12641 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12641 |
2,659 | ImageMagick | 78d4c5db50fbab0b4beb69c46c6167f2c6513dec | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/78d4c5db50fbab0b4beb69c46c6167f2c6513dec | None | 1 | static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
page_geometry[MaxTextExtent];
Image
*image;
MagickBooleanType
logging;
volatile int
first_mng_object,
object_id,
term_chunk_found,
skip_to_iend;
volatile ssize_t
... | 22,632,770,722,273,930,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-12640 | ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12640 |
2,662 | ImageMagick | e793eb203e5e0f91f5037aed6585e81b1e27395b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b | https://github.com/ImageMagick/ImageMagick/issues/636 | 1 | static MagickBooleanType ProcessMSLScript(const ImageInfo *image_info,
Image **image,ExceptionInfo *exception)
{
char
message[MagickPathExtent];
Image
*msl_image;
int
status;
ssize_t
n;
MSLInfo
msl_info;
xmlSAXHandler
sax_modules;
xmlSAXHandlerPtr
sax_handler;
/*
... | 112,895,750,210,052,900,000,000,000,000,000,000,000 | msl.c | 158,414,803,465,023,320,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12427 | The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function. | https://nvd.nist.gov/vuln/detail/CVE-2017-12427 |
2,663 | linux | ea6789980fdaa610d7eb63602c746bf6ec70cd2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b | assoc_array: Fix a buggy node-splitting case
This fixes CVE-2017-12193.
Fix a case in the assoc_array implementation in which a new leaf is
added that needs to go into a node that happens to be full, where the
existing leaves in that node cluster together at that level to the
exclusion of new leaf.
What needs to hap... | 1 | static bool assoc_array_insert_into_terminal_node(struct assoc_array_edit *edit,
const struct assoc_array_ops *ops,
const void *index_key,
struct assoc_array_walk_result *result)
{
struct assoc_array_shortcut *shortcut, *new_s0;
struct assoc_array_node *node, *new_n0, *new_n1, *side;
struct a... | 253,577,312,062,185,030,000,000,000,000,000,000,000 | assoc_array.c | 298,293,148,560,020,940,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-12193 | The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link c... | https://nvd.nist.gov/vuln/detail/CVE-2017-12193 |
2,664 | linux | 37863c43b2c6464f252862bf2e9768264e961678 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/37863c43b2c6464f252862bf2e9768264e961678 | KEYS: prevent KEYCTL_READ on negative key
Because keyctl_read_key() looks up the key with no permissions
requested, it may find a negatively instantiated key. If the key is
also possessed, we went ahead and called ->read() on the key. But the
key payload will actually contain the ->reject_error rather than the
norma... | 1 | long keyctl_read_key(key_serial_t keyid, char __user *buffer, size_t buflen)
{
struct key *key;
key_ref_t key_ref;
long ret;
/* find the key first */
key_ref = lookup_user_key(keyid, 0, 0);
if (IS_ERR(key_ref)) {
ret = -ENOKEY;
goto error;
}
key = key_ref_to_ptr(key_ref);
/* see if we can read it di... | 217,498,043,437,743,400,000,000,000,000,000,000,000 | keyctl.c | 204,715,776,427,842,440,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-12192 | The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial of service (OOPS and system crash) via a crafted KEYCTL_READ operatio... | https://nvd.nist.gov/vuln/detail/CVE-2017-12192 |
2,665 | linux | 95d78c28b5a85bacbc29b8dba7c04babb9b0d467 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/95d78c28b5a85bacbc29b8dba7c04babb9b0d467 | fix unbalanced page refcounting in bio_map_user_iov
bio_map_user_iov and bio_unmap_user do unbalanced pages refcounting if
IO vector has small consecutive buffers belonging to the same page.
bio_add_pc_page merges them into one, but the page reference is never
dropped.
Cc: stable@vger.kernel.org
Signed-off-by: Vitaly... | 1 | struct bio *bio_map_user_iov(struct request_queue *q,
const struct iov_iter *iter,
gfp_t gfp_mask)
{
int j;
int nr_pages = 0;
struct page **pages;
struct bio *bio;
int cur_page = 0;
int ret, offset;
struct iov_iter i;
struct iovec iov;
iov_for_each(iov, i, *iter) {
unsigned long uaddr = (uns... | 55,680,421,256,663,070,000,000,000,000,000,000,000 | bio.c | 206,551,357,025,644,700,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12190 | The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory l... | https://nvd.nist.gov/vuln/detail/CVE-2017-12190 |
2,666 | linux | 51aa68e7d57e3217192d88ce90fd5b8ef29ec94f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f | kvm: nVMX: Don't allow L2 to access the hardware CR8
If L1 does not specify the "use TPR shadow" VM-execution control in
vmcs12, then L0 must specify the "CR8-load exiting" and "CR8-store
exiting" VM-execution controls in vmcs02. Failure to do so will give
the L2 VM unrestricted read/write access to the hardware CR8.
... | 1 | static int prepare_vmcs02(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12,
bool from_vmentry, u32 *entry_failure_code)
{
struct vcpu_vmx *vmx = to_vmx(vcpu);
u32 exec_control, vmcs12_exec_ctrl;
vmcs_write16(GUEST_ES_SELECTOR, vmcs12->guest_es_selector);
vmcs_write16(GUEST_CS_SELECTOR, vmcs12->guest_cs_selector);... | 315,707,918,919,549,060,000,000,000,000,000,000,000 | vmx.c | 128,365,054,033,147,450,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2017-12154 | The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardwar... | https://nvd.nist.gov/vuln/detail/CVE-2017-12154 |
2,676 | FFmpeg | ffcc82219cef0928bed2d558b19ef6ea35634130 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ffcc82219cef0928bed2d558b19ef6ea35634130 | avformat/rtmppkt: Convert ff_amf_get_field_value() to bytestream2
Fixes: out of array accesses
Found-by: JunDong Xie of Ant-financial Light-Year Security Lab
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | int ff_amf_get_field_value(const uint8_t *data, const uint8_t *data_end,
const uint8_t *name, uint8_t *dst, int dst_size)
{
int namelen = strlen(name);
int len;
while (*data != AMF_DATA_TYPE_OBJECT && data < data_end) {
len = ff_amf_tag_size(data, data_end);
... | 65,922,353,615,166,360,000,000,000,000,000,000,000 | rtmppkt.c | 39,451,849,705,085,110,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-11665 | The ff_amf_get_field_value function in libavformat/rtmppkt.c in FFmpeg 3.3.2 allows remote RTMP servers to cause a denial of service (Segmentation Violation and application crash) via a crafted stream. | https://nvd.nist.gov/vuln/detail/CVE-2017-11665 |
2,682 | wildmidi | 660b513d99bced8783a4a5984ac2f742c74ebbdd | https://github.com/Mindwerks/wildmidi | https://github.com/Mindwerks/wildmidi/commit/660b513d99bced8783a4a5984ac2f742c74ebbdd | None | 1 | uint32_t _WM_SetupMidiEvent(struct _mdi *mdi, uint8_t * event_data, uint8_t running_event) {
/*
Only add standard MIDI and Sysex events in here.
Non-standard events need to be handled by calling function
to avoid compatibility issues.
TODO:
Add value limit checks
*/
uint32_t re... | 312,895,510,042,769,500,000,000,000,000,000,000,000 | internal_midi.c | 50,268,150,752,711,670,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-11661 | The _WM_SetupMidiEvent function in internal_midi.c:2318 in WildMIDI 0.4.2 can cause a denial of service (invalid memory read and application crash) via a crafted mid file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11661 |
2,683 | ImageMagick | a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78 | None | 1 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MaxTextExtent],
text[MaxTextExtent];
Image
*image;
IndexPacket
*indexes;
long
x_offset,
y_offset;
MagickBooleanType
status;
MagickPixelPacket
pixel;
QuantumAny
range... | 255,352,715,063,295,070,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-11523 | The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered. | https://nvd.nist.gov/vuln/detail/CVE-2017-11523 |
2,684 | ImageMagick | 816ecab6c532ae086ff4186b3eaf4aa7092d536f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/816ecab6c532ae086ff4186b3eaf4aa7092d536f | https://github.com/ImageMagick/ImageMagick/issues/58 | 1 | static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,
const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception)
{
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[32],
zlib_vers[32];
Image
*image;
ImageInfo
*image_info;
char
s[2];
const ch... | 46,130,426,879,440,080,000,000,000,000,000,000,000 | png.c | 85,174,790,945,754,270,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-11522 | The WriteOnePNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11522 |
2,685 | linux | 3b2d69114fefa474fca542e51119036dceb4aa6f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f | ACPICA: Namespace: fix operand cache leak
ACPICA commit a23325b2e583556eae88ed3f764e457786bf4df6
I found some ACPI operand cache leaks in ACPI early abort cases.
Boot log of ACPI operand cache leak is as follows:
>[ 0.174332] ACPI: Added _OSI(Module Device)
>[ 0.175504] ACPI: Added _OSI(Processor Device)
>[ ... | 1 | void acpi_ns_terminate(void)
{
acpi_status status;
ACPI_FUNCTION_TRACE(ns_terminate);
#ifdef ACPI_EXEC_APP
{
union acpi_operand_object *prev;
union acpi_operand_object *next;
/* Delete any module-level code blocks */
next = acpi_gbl_module_code_list;
while (next) {
prev = next;
next = next-... | 280,039,072,811,556,760,000,000,000,000,000,000,000 | nsutils.c | 109,243,291,210,227,210,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2017-11472 | The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craft... | https://nvd.nist.gov/vuln/detail/CVE-2017-11472 |
2,708 | ImageMagick | b007dd3a048097d8f58949297f5b434612e1e1a3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b007dd3a048097d8f58949297f5b434612e1e1a3 | None | 1 | ModuleExport size_t RegisterMPCImage(void)
{
MagickInfo
*entry;
entry=SetMagickInfo("CACHE");
entry->description=ConstantString("Magick Persistent Cache image format");
entry->module=ConstantString("MPC");
entry->stealth=MagickTrue;
(void) RegisterMagickInfo(entry);
entry=SetMagickInfo("MPC");
... | 214,653,499,182,550,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-11449 | coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin. | https://nvd.nist.gov/vuln/detail/CVE-2017-11449 |
2,709 | ImageMagick | 1737ac82b335e53376382c07b9a500d73dd2aa11 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1737ac82b335e53376382c07b9a500d73dd2aa11 | None | 1 | static Image *ReadJPEGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
value[MaxTextExtent];
const char
*option;
ErrorManager
error_manager;
Image
*image;
IndexPacket
index;
JSAMPLE
*volatile jpeg_pixels;
JSAMPROW
scanline[1];
MagickBooleanType
... | 139,760,603,405,269,560,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-11448 | The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11448 |
2,710 | ImageMagick | 8c10b9247509c0484b55330458846115131ec2ae | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8c10b9247509c0484b55330458846115131ec2ae | None | 1 | static Image *ReadSCREENSHOTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
assert(image_info->signature == MagickSignature);
if (image_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",
image_info->filename);
assert(exception != (E... | 220,742,260,935,559,080,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-11447 | The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-11447 |
2,716 | yara | 4a342f01e5439b9bb901aff1c6c23c536baeeb3f | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/4a342f01e5439b9bb901aff1c6c23c536baeeb3f | Fix heap overflow (reported by Jurriaan Bremer)
When setting a new array item with yr_object_array_set_item() the array size is doubled if the index for the new item is larger than the already allocated ones. No further checks were made to ensure that the index fits into the array after doubling its capacity. If the a... | 1 | int yr_object_array_set_item(
YR_OBJECT* object,
YR_OBJECT* item,
int index)
{
YR_OBJECT_ARRAY* array;
int i;
int count;
assert(index >= 0);
assert(object->type == OBJECT_TYPE_ARRAY);
array = object_as_array(object);
if (array->items == NULL)
{
count = yr_max(64, (index + 1) * 2);... | 226,909,454,874,264,900,000,000,000,000,000,000,000 | object.c | 256,017,910,395,129,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-11328 | Heap buffer overflow in the yr_object_array_set_item() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11328 |
2,717 | ImageMagick | 8ca35831e91c3db8c6d281d09b605001003bec08 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8ca35831e91c3db8c6d281d09b605001003bec08 | coders/png.c: Stop a memory leak in read_user_chunk_callback() (reference
https://github.com/ImageMagick/ImageMagick/issues/517). | 1 | static Image *ReadOnePNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
/* Read one PNG image */
/* To do: Read the tEXt/Creation Time chunk into the date:create property */
Image
*image;
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[3... | 6,716,675,637,673,233,000,000,000,000,000,000,000 | png.c | 228,033,773,830,255,870,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11310 | The read_user_chunk_callback function in coders\png.c in ImageMagick 7.0.6-1 Q16 2017-06-21 (beta) has memory leak vulnerabilities via crafted PNG files. | https://nvd.nist.gov/vuln/detail/CVE-2017-11310 |
2,718 | linux | f991af3daabaecff34684fd51fac80319d1baad1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 | mqueue: fix a use-after-free in sys_mq_notify()
The retry logic for netlink_attachskb() inside sys_mq_notify()
is nasty and vulnerable:
1) The sock refcnt is already released when retry is needed
2) The fd is controllable by user-space because we already
release the file refcnt
so we when retry but the fd has bee... | 1 | static int do_mq_notify(mqd_t mqdes, const struct sigevent *notification)
{
int ret;
struct fd f;
struct sock *sock;
struct inode *inode;
struct mqueue_inode_info *info;
struct sk_buff *nc;
audit_mq_notify(mqdes, notification);
nc = NULL;
sock = NULL;
if (notification != NULL) {
if (unlikely(notification-... | 64,115,780,527,379,680,000,000,000,000,000,000,000 | mqueue.c | 183,724,114,749,802,100,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-11176 | The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-11176 |
2,721 | gnome-session | b0dc999e0b45355314616321dbb6cb71e729fc9d | https://github.com/GNOME/gnome-session | https://github.com/GNOME/gnome-session/commit/b0dc999e0b45355314616321dbb6cb71e729fc9d | [gsm] Delay the creation of the GsmXSMPClient until it really exists
We used to create the GsmXSMPClient before the XSMP connection is really
accepted. This can lead to some issues, though. An example is:
https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting:
"What is happening is that a new client (probabl... | 1 | accept_ice_connection (GIOChannel *source,
GIOCondition condition,
GsmIceConnectionData *data)
{
IceListenObj listener;
IceConn ice_conn;
IceAcceptStatus status;
GsmClient *client;
GsmXsmpServe... | 115,853,477,812,783,840,000,000,000,000,000,000,000 | gsm-xsmp-server.c | 139,028,771,084,308,010,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-11171 | Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a... | https://nvd.nist.gov/vuln/detail/CVE-2017-11171 |
2,725 | radare2 | c57997e76ec70862174a1b3b3aeb62a6f8570e85 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/c57997e76ec70862174a1b3b3aeb62a6f8570e85 | Fix r2_hbo_grub_memmove ext2 crash | 1 | grub_disk_read (grub_disk_t disk, grub_disk_addr_t sector,
grub_off_t offset, grub_size_t size, void *buf)
{
char *tmp_buf;
unsigned real_offset;
/* First of all, check if the region is within the disk. */
if (grub_disk_adjust_range (disk, §or, &offset, size) != GRUB_ERR_NONE)
{
grub_error_pus... | 303,262,332,284,339,200,000,000,000,000,000,000,000 | disk.c | 311,683,975,526,626,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10929 | The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function i... | https://nvd.nist.gov/vuln/detail/CVE-2017-10929 |
2,726 | linux | 089bc0143f489bd3a4578bdff5f4ca68fb26f341 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/089bc0143f489bd3a4578bdff5f4ca68fb26f341 | xen-blkback: don't leak stack data via response ring
Rather than constructing a local structure instance on the stack, fill
the fields directly on the shared ring, just like other backends do.
Build on the fact that all response structure flavors are actually
identical (the old code did make this assumption too).
Thi... | 1 | static void make_response(struct xen_blkif_ring *ring, u64 id,
unsigned short op, int st)
{
struct blkif_response resp;
unsigned long flags;
union blkif_back_rings *blk_rings;
int notify;
resp.id = id;
resp.operation = op;
resp.status = st;
spin_lock_irqsave(&ring->blk_ring_lock, fl... | 3,010,677,516,050,940,000,000,000,000,000,000,000 | blkback.c | 154,573,801,860,346,860,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-10911 | The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216. | https://nvd.nist.gov/vuln/detail/CVE-2017-10911 |
2,727 | linux | 385aee965b4e4c36551c362a334378d2985b722a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a | drm/virtio: don't leak bo on drm_gem_object_init failure
Reported-by: 李强 <liqiang6-s@360.cn>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Link: http://patchwork.freedesktop.org/patch/msgid/20170406155941.458-1-kraxel@redhat.com | 1 | int virtio_gpu_object_create(struct virtio_gpu_device *vgdev,
unsigned long size, bool kernel, bool pinned,
struct virtio_gpu_object **bo_ptr)
{
struct virtio_gpu_object *bo;
enum ttm_bo_type type;
size_t acc_size;
int ret;
if (kernel)
type = ttm_bo_type_kernel;
else
type = ttm_bo_type_device... | 94,677,181,086,707,980,000,000,000,000,000,000,000 | virtgpu_object.c | 7,738,869,874,472,682,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-10810 | Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures. | https://nvd.nist.gov/vuln/detail/CVE-2017-10810 |
2,730 | sthttpd | c0dc63a49d8605649f1d8e4a96c9b468b0bff660 | https://github.com/blueness/sthttpd | https://github.com/blueness/sthttpd/commit/c0dc63a49d8605649f1d8e4a96c9b468b0bff660 | Fix heap buffer overflow in de_dotdot | 1 | de_dotdot( char* file )
{
char* cp;
char* cp2;
int l;
/* Collapse any multiple / sequences. */
while ( ( cp = strstr( file, "//") ) != (char*) 0 )
{
for ( cp2 = cp + 2; *cp2 == '/'; ++cp2 )
continue;
(void) strcpy( cp + 1, cp2 );
}
/* Remove leading ./ and any /./ sequences. */
... | 45,843,749,197,328,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-10671 | Heap-based Buffer Overflow in the de_dotdot function in libhttpd.c in sthttpd before 2.27.1 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted filename. | https://nvd.nist.gov/vuln/detail/CVE-2017-10671 |
2,731 | linux | 15d3042a937c13f5d9244241c7a9c8416ff6e82a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/15d3042a937c13f5d9244241c7a9c8416ff6e82a | f2fs: sanity check checkpoint segno and blkoff
Make sure segno and blkoff read from raw image are valid.
Cc: stable@vger.kernel.org
Signed-off-by: Jin Qian <jinqian@google.com>
[Jaegeuk Kim: adjust minor coding style]
Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org> | 1 | int sanity_check_ckpt(struct f2fs_sb_info *sbi)
{
unsigned int total, fsmeta;
struct f2fs_super_block *raw_super = F2FS_RAW_SUPER(sbi);
struct f2fs_checkpoint *ckpt = F2FS_CKPT(sbi);
unsigned int ovp_segments, reserved_segments;
total = le32_to_cpu(raw_super->segment_count);
fsmeta = le32_to_cpu(raw_super-... | 300,134,534,374,965,750,000,000,000,000,000,000,000 | super.c | 152,243,762,551,827,040,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2017-10663 | The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-10663 |
2,732 | linux | b9dd46188edc2f0d1f37328637860bb65a771124 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b9dd46188edc2f0d1f37328637860bb65a771124 | f2fs: sanity check segment count
F2FS uses 4 bytes to represent block address. As a result, supported
size of disk is 16 TB and it equals to 16 * 1024 * 1024 / 2 segments.
Signed-off-by: Jin Qian <jinqian@google.com>
Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org> | 1 | static int sanity_check_raw_super(struct f2fs_sb_info *sbi,
struct buffer_head *bh)
{
struct f2fs_super_block *raw_super = (struct f2fs_super_block *)
(bh->b_data + F2FS_SUPER_OFFSET);
struct super_block *sb = sbi->sb;
unsigned int blocksize;
if (F2FS_SUPER_MAGIC != le32_to_cpu(raw_super->magic)) {
f2fs... | 308,343,461,471,708,700,000,000,000,000,000,000,000 | super.c | 300,133,004,536,822,700,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2017-10662 | The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not validate the segment count, which allows local users to gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-10662 |
2,735 | FFmpeg | 1e42736b95065c69a7481d0cf55247024f54b660 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/1e42736b95065c69a7481d0cf55247024f54b660 | avcodec/cdxl: Check format for BGR24
Fixes: out of array access
Fixes: 1427/clusterfuzz-testcase-minimized-5020737339392000
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int cdxl_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *pkt)
{
CDXLVideoContext *c = avctx->priv_data;
AVFrame * const p = data;
int ret, w, h, encoding, aligned_width, buf_size = pkt->size;
const uint8_t *buf = pkt->data;
if (buf_size ... | 272,076,656,890,640,220,000,000,000,000,000,000,000 | cdxl.c | 286,646,798,604,789,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9996 | The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not exclude the CHUNKY format, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possi... | https://nvd.nist.gov/vuln/detail/CVE-2017-9996 |
2,736 | FFmpeg | 7ac5067146613997bb38442cb022d7f41321a706 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7ac5067146613997bb38442cb022d7f41321a706 | avcodec/scpr: Check y in first line loop in decompress_i()
Fixes: out of array access
Fixes: 1478/clusterfuzz-testcase-minimized-5285486908145664
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decompress_i(AVCodecContext *avctx, uint32_t *dst, int linesize)
{
SCPRContext *s = avctx->priv_data;
GetByteContext *gb = &s->gb;
int cx = 0, cx1 = 0, k = 0, clr = 0;
int run, r, g, b, off, y = 0, x = 0, z, ret;
unsigned backstep = linesize - avctx->width;
const int cxshift = s->cxsh... | 183,761,881,120,239,970,000,000,000,000,000,000,000 | scpr.c | 289,050,571,695,209,180,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9995 | libavcodec/scpr.c in FFmpeg 3.3 before 3.3.1 does not properly validate height and width data, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9995 |
2,738 | FFmpeg | 6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | avcodec/webp: Always set pix_fmt
Fixes: out of array access
Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632
Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Reviewed-by: "Ronald S. Bultje" <rsbult... | 1 | static int vp8_lossy_decode_frame(AVCodecContext *avctx, AVFrame *p,
int *got_frame, uint8_t *data_start,
unsigned int data_size)
{
WebPContext *s = avctx->priv_data;
AVPacket pkt;
int ret;
if (!s->initialized) {
ff_vp8_decod... | 92,038,738,073,539,860,000,000,000,000,000,000,000 | webp.c | 318,309,543,806,629,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9994 | libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2017-9994 |
2,739 | FFmpeg | a5d849b149ca67ced2d271dc84db0bc95a548abb | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a5d849b149ca67ced2d271dc84db0bc95a548abb | avformat/avidec: Limit formats in gab2 to srt and ass/ssa
This prevents part of one exploit leading to an information leak
Found-by: Emil Lerner and Pavel Cheremushkin
Reported-by: Thierry Foucu <tfoucu@google.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int read_gab2_sub(AVFormatContext *s, AVStream *st, AVPacket *pkt)
{
if (pkt->size >= 7 &&
pkt->size < INT_MAX - AVPROBE_PADDING_SIZE &&
!strcmp(pkt->data, "GAB2") && AV_RL16(pkt->data + 5) == 2) {
uint8_t desc[256];
int score = AVPROBE_SCORE_EXTENSION, ret;
AVISt... | 57,648,922,262,249,090,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-9993 | FFmpeg before 2.8.12, 3.0.x and 3.1.x before 3.1.9, 3.2.x before 3.2.6, and 3.3.x before 3.3.2 does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data. | https://nvd.nist.gov/vuln/detail/CVE-2017-9993 |
2,740 | FFmpeg | f52fbf4f3ed02a7d872d8a102006f29b4421f360 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/f52fbf4f3ed02a7d872d8a102006f29b4421f360 | avcodec/dfa: Fix off by 1 error
Fixes out of array access
Fixes: 1345/clusterfuzz-testcase-minimized-6062963045695488
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_dds1(GetByteContext *gb, uint8_t *frame, int width, int height)
{
const uint8_t *frame_start = frame;
const uint8_t *frame_end = frame + width * height;
int mask = 0x10000, bitbuf = 0;
int i, v, offset, count, segments;
segments = bytestream2_get_le16(gb);
while (segments--)... | 311,517,746,864,273,740,000,000,000,000,000,000,000 | dfa.c | 52,043,501,485,622,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9992 | Heap-based buffer overflow in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9992 |
2,741 | FFmpeg | 441026fcb13ac23aa10edc312bdacb6445a0ad06 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/441026fcb13ac23aa10edc312bdacb6445a0ad06 | avcodec/xwddec: Check bpp more completely
Fixes out of array access
Fixes: 1399/clusterfuzz-testcase-minimized-4866094172995584
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int xwd_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *avpkt)
{
AVFrame *p = data;
const uint8_t *buf = avpkt->data;
int i, ret, buf_size = avpkt->size;
uint32_t version, header_size, vclass, ncolors;
uint32_t xoffset, be, bpp, lsize, rsi... | 154,378,037,284,752,480,000,000,000,000,000,000,000 | xwddec.c | 294,025,484,135,912,770,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9991 | Heap-based buffer overflow in the xwd_decode_frame function in libavcodec/xwddec.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9991 |
2,742 | FFmpeg | cb243972b121b1ae6b60a78ff55a0506c69f3879 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/cb243972b121b1ae6b60a78ff55a0506c69f3879 | avcodec/xpmdec: Fix multiple pointer/memory issues
Most of these were found through code review in response to
fixing 1466/clusterfuzz-testcase-minimized-5961584419536896
There is thus no testcase for most of this.
The initial issue was Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/maste... | 1 | static uint32_t color_string_to_rgba(const char *p, int len)
{
uint32_t ret = 0xFF000000;
const ColorEntry *entry;
char color_name[100];
if (*p == '#') {
p++;
len--;
if (len == 3) {
ret |= (hex_char_to_number(p[2]) << 4) |
(hex_char_to_numbe... | 238,040,376,254,480,200,000,000,000,000,000,000,000 | xpmdec.c | 78,083,234,821,023,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9990 | Stack-based buffer overflow in the color_string_to_rgba function in libavcodec/xpmdec.c in FFmpeg 3.3 before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9990 |
2,745 | linux | 20e2b791796bd68816fa115f12be5320de2b8021 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021 | ALSA: msnd: Optimize / harden DSP and MIDI loops
The ISA msnd drivers have loops fetching the ring-buffer head, tail
and size values inside the loops. Such codes are inefficient and
fragile.
This patch optimizes it, and also adds the sanity check to avoid the
endless loops.
Bugzilla: https://bugzilla.kernel.org/sho... | 1 | void snd_msndmidi_input_read(void *mpuv)
{
unsigned long flags;
struct snd_msndmidi *mpu = mpuv;
void *pwMIDQData = mpu->dev->mappedbase + MIDQ_DATA_BUFF;
spin_lock_irqsave(&mpu->input_lock, flags);
while (readw(mpu->dev->MIDQ + JQS_wTail) !=
readw(mpu->dev->MIDQ + JQS_wHead)) {
u16 wTmp, val;
va... | 241,508,483,468,154,000,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9984 | The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9984 |
2,746 | linux | 20e2b791796bd68816fa115f12be5320de2b8021 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021 | ALSA: msnd: Optimize / harden DSP and MIDI loops
The ISA msnd drivers have loops fetching the ring-buffer head, tail
and size values inside the loops. Such codes are inefficient and
fragile.
This patch optimizes it, and also adds the sanity check to avoid the
endless loops.
Bugzilla: https://bugzilla.kernel.org/sho... | 1 | static irqreturn_t snd_msnd_interrupt(int irq, void *dev_id)
{
struct snd_msnd *chip = dev_id;
void *pwDSPQData = chip->mappedbase + DSPQ_DATA_BUFF;
/* Send ack to DSP */
/* inb(chip->io + HP_RXL); */
/* Evaluate queued DSP messages */
while (readw(chip->DSPQ + JQS_wTail) != readw(chip->DSPQ + JQS_wHead... | 157,005,536,200,453,300,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9984 | The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9984 |
2,752 | radare2 | 65000a7fd9eea62359e6d6714f17b94a99a82edd | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/65000a7fd9eea62359e6d6714f17b94a99a82edd | Fix #7723 - crash in ext2 GRUB code because of variable size array in stack | 1 | grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
{
struct grub_ext2_data *data = node->data;
struct grub_ext2_inode *inode = &node->inode;
int blknr = -1;
unsigned int blksz = EXT2_BLOCK_SIZE (data);
int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data);
if (grub_le_to_cpu32(inode->flags... | 210,811,521,877,163,650,000,000,000,000,000,000,000 | ext2.c | 53,758,202,141,423,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9763 | The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array. | https://nvd.nist.gov/vuln/detail/CVE-2017-9763 |
2,757 | linux | 07678eca2cf9c9a18584e546c2b2a0d0c9a3150c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c | drm/vmwgfx: Make sure backup_handle is always valid
When vmw_gb_surface_define_ioctl() is called with an existing buffer,
we end up returning an uninitialized variable in the backup_handle.
The fix is to first initialize backup_handle to 0 just to be sure, and
second, when a user-provided buffer is found, we will use... | 1 | int vmw_gb_surface_define_ioctl(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct vmw_private *dev_priv = vmw_priv(dev);
struct vmw_user_surface *user_srf;
struct vmw_surface *srf;
struct vmw_resource *res;
struct vmw_resource *tmp;
union drm_vmw_gb_surface_create_arg *arg =
(union... | 174,250,850,425,960,800,000,000,000,000,000,000,000 | vmwgfx_surface.c | 245,292,923,373,553,170,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9605 | The vmw_gb_surface_define_ioctl function (accessible via DRM_IOCTL_VMW_GB_SURFACE_CREATE) in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.11.4 defines a backup_handle variable but does not give it an initial value. If one attempts to create a GB surface, with a previously allocated DMA buffer t... | https://nvd.nist.gov/vuln/detail/CVE-2017-9605 |
2,758 | mruby | 5c114c91d4ff31859fcd84cf8bf349b737b90d99 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99 | Clear unused stack region that may refer freed objects; fix #3596 | 1 | mark_context_stack(mrb_state *mrb, struct mrb_context *c)
{
size_t i;
size_t e;
if (c->stack == NULL) return;
e = c->stack - c->stbase;
if (c->ci) e += c->ci->nregs;
if (c->stbase + e > c->stend) e = c->stend - c->stbase;
for (i=0; i<e; i++) {
mrb_value v = c->stbase[i];
if (!mrb_immedi... | 125,574,988,804,055,740,000,000,000,000,000,000,000 | gc.c | 192,625,814,561,719,470,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-9527 | The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9527 |
2,759 | radare2 | f85bc674b2a2256a364fe796351bc1971e106005 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f85bc674b2a2256a364fe796351bc1971e106005 | Fix #7698 - UAF in r_config_set when loading a dex | 1 | R_API RConfigNode* r_config_set(RConfig *cfg, const char *name, const char *value) {
RConfigNode *node = NULL;
char *ov = NULL;
ut64 oi;
if (!cfg || STRNULL (name)) {
return NULL;
}
node = r_config_node_get (cfg, name);
if (node) {
if (node->flags & CN_RO) {
eprintf ("(error: '%s' config key is read only)... | 266,006,440,521,677,500,000,000,000,000,000,000,000 | config.c | 257,283,705,418,955,800,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-9520 | The r_config_set function in libr/config/config.c in radare2 1.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9520 |
2,760 | ImageMagick | 01843366d6a7b96e22ad7bb67f3df7d9fd4d5d74 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/01843366d6a7b96e22ad7bb67f3df7d9fd4d5d74 | None | 1 | MagickExport Image *CloneImage(const Image *image,const size_t columns,
const size_t rows,const MagickBooleanType detach,ExceptionInfo *exception)
{
double
scale;
Image
*clone_image;
size_t
length;
/*
Clone the image.
*/
assert(image != (const Image *) NULL);
assert(image->signature =... | 30,295,949,585,114,532,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2017-9501 | In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9501 |
2,761 | ImageMagick | 7fd419441bc7103398e313558171d342c6315f44 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7fd419441bc7103398e313558171d342c6315f44 | Added check for incorrect number of meta channels report in #492. | 1 | static Image *ReadMPCImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
cache_filename[MagickPathExtent],
id[MagickPathExtent],
keyword[MagickPathExtent],
*options;
const unsigned char
*p;
GeometryInfo
geometry_info;
Image
*image;
int
c;
LinkedListInfo
... | 109,762,771,306,384,910,000,000,000,000,000,000,000 | mpc.c | 33,984,905,082,564,350,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2017-9499 | In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function SetPixelChannelAttributes, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9499 |
2,765 | jerryscript | 03a8c630f015f63268639d3ed3bf82cff6fa77d8 | https://github.com/zherczeg/jerryscript | https://github.com/zherczeg/jerryscript/commit/03a8c630f015f63268639d3ed3bf82cff6fa77d8 | None | 1 | lexer_process_char_literal (parser_context_t *context_p, /**< context */
const uint8_t *char_p, /**< characters */
size_t length, /**< length of string */
uint8_t literal_type, /**< final literal type */
bool... | 197,513,151,461,081,370,000,000,000,000,000,000,000 | js-lexer.c | 126,318,166,963,366,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9250 | The lexer_process_char_literal function in jerry-core/parser/js/js-lexer.c in JerryScript 1.0 does not skip memory allocation for empty strings, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via malformed JavaScript source code, related to the jmem_heap_free... | https://nvd.nist.gov/vuln/detail/CVE-2017-9250 |
2,766 | linux | 232cd35d0804cc241eb887bb8d4d9b3b9881c64a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/232cd35d0804cc241eb887bb8d4d9b3b9881c64a | ipv6: fix out of bound writes in __ip6_append_data()
Andrey Konovalov and idaifish@gmail.com reported crashes caused by
one skb shared_info being overwritten from __ip6_append_data()
Andrey program lead to following state :
copy -4200 datalen 2000 fraglen 2040
maxfraglen 2040 alloclen 2048 transhdrlen 0 offset 0 fra... | 1 | static int __ip6_append_data(struct sock *sk,
struct flowi6 *fl6,
struct sk_buff_head *queue,
struct inet_cork *cork,
struct inet6_cork *v6_cork,
struct page_frag *pfrag,
int getfrag(void *from, char *to, int offset,
int len, int odd, struct sk_buff *skb),
v... | 120,470,980,408,117,320,000,000,000,000,000,000,000 | ip6_output.c | 289,318,388,227,575,940,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-9242 | The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9242 |
2,767 | oniguruma | b690371bbf97794b4a1d3f295d4fb9a8b05d402d | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d | fix #59 : access to invalid address by reg->dmax value | 1 | forward_search_range(regex_t* reg, const UChar* str, const UChar* end, UChar* s,
UChar* range, UChar** low, UChar** high, UChar** low_prev)
{
UChar *p, *pprev = (UChar* )NULL;
#ifdef ONIG_DEBUG_SEARCH
fprintf(stderr, "forward_search_range: str: %d, end: %d, s: %d, range: %d\n",
(int )str, (int )end, (int... | 107,914,413,019,882,700,000,000,000,000,000,000,000 | regexec.c | 288,161,812,901,203,540,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9229 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normall... | https://nvd.nist.gov/vuln/detail/CVE-2017-9229 |
2,768 | oniguruma | 9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814 | fix #58 : access to invalid address by reg->dmin value | 1 | forward_search_range(regex_t* reg, const UChar* str, const UChar* end, UChar* s,
UChar* range, UChar** low, UChar** high, UChar** low_prev)
{
UChar *p, *pprev = (UChar* )NULL;
#ifdef ONIG_DEBUG_SEARCH
fprintf(stderr, "forward_search_range: str: %d, end: %d, s: %d, range: %d\n",
(int )str, (int )end, (int... | 291,227,733,650,060,420,000,000,000,000,000,000,000 | regexec.c | 1,961,275,105,264,870,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9227 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as... | https://nvd.nist.gov/vuln/detail/CVE-2017-9227 |
2,769 | oniguruma | 166a6c3999bf06b4de0ab4ce6b088a468cc4029f | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/166a6c3999bf06b4de0ab4ce6b088a468cc4029f | fix #56 : return invalid result for codepoint 0xFFFFFFFF | 1 | unicode_unfold_key(OnigCodePoint code)
{
static const struct ByUnfoldKey wordlist[] =
{
{0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},
{0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0}, {0xffffffff, -1, 0},
... | 128,717,731,226,755,270,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-9225 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A... | https://nvd.nist.gov/vuln/detail/CVE-2017-9225 |
2,770 | oniguruma | 690313a061f7a4fa614ec5cc8368b4f2284e059b | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b | fix #57 : DATA_ENSURE() check must be before data access | 1 | match_at(regex_t* reg, const UChar* str, const UChar* end,
#ifdef USE_MATCH_RANGE_MUST_BE_INSIDE_OF_SPECIFIED_RANGE
const UChar* right_range,
#endif
const UChar* sstart, UChar* sprev, OnigMatchArg* msa)
{
static UChar FinishCode[] = { OP_FINISH };
int i, n, num_mem, best_len, pop_level;
LengthType tlen, tlen... | 332,565,493,828,376,550,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9224 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9224 |
2,771 | systemd | a924f43f30f9c4acaf70618dd2a055f8b0f166be | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be | resolved: bugfix of null pointer p->question dereferencing (#6020)
See https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1621396 | 1 | int dns_packet_is_reply_for(DnsPacket *p, const DnsResourceKey *key) {
int r;
assert(p);
assert(key);
/* Checks if the specified packet is a reply for the specified
* key and the specified key is the only one in the question
* section. */
if (DNS_PACKET_QR(p)... | 149,971,713,116,709,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9217 | systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section. | https://nvd.nist.gov/vuln/detail/CVE-2017-9217 |
2,772 | linux | 9933e113c2e87a9f46a40fde8dafbf801dca1ab9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9933e113c2e87a9f46a40fde8dafbf801dca1ab9 | crypto: skcipher - Add missing API setkey checks
The API setkey checks for key sizes and alignment went AWOL during the
skcipher conversion. This patch restores them.
Cc: <stable@vger.kernel.org>
Fixes: 4e6c3df4d729 ("crypto: skcipher - Add low-level skcipher...")
Reported-by: Baozeng <sploving1@gmail.com>
Signed-of... | 1 | static int crypto_skcipher_init_tfm(struct crypto_tfm *tfm)
{
struct crypto_skcipher *skcipher = __crypto_skcipher_cast(tfm);
struct skcipher_alg *alg = crypto_skcipher_alg(skcipher);
if (tfm->__crt_alg->cra_type == &crypto_blkcipher_type)
return crypto_init_skcipher_ops_blkcipher(tfm);
if (tfm->__crt_alg->cra_... | 61,488,329,509,381,175,000,000,000,000,000,000,000 | skcipher.c | 125,395,647,683,953,660,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9211 | The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2017-9211 |
2,777 | imageworsener | dc49c807926b96e503bd7c0dec35119eecd6c6fe | https://github.com/jsummers/imageworsener | https://github.com/jsummers/imageworsener/commit/dc49c807926b96e503bd7c0dec35119eecd6c6fe | Double-check that the input image's density is valid
Fixes a bug that could result in division by zero, at least for a JPEG
source image.
Fixes issues #19, #20 | 1 | IW_IMPL(int) iw_get_input_density(struct iw_context *ctx,
double *px, double *py, int *pcode)
{
*px = 1.0;
*py = 1.0;
*pcode = ctx->img1.density_code;
if(ctx->img1.density_code!=IW_DENSITY_UNKNOWN) {
*px = ctx->img1.density_x;
*py = ctx->img1.density_y;
return 1;
}
return 0;
}
| 145,137,936,264,817,800,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-9201 | imagew-cmd.c:850:46 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted image, related to imagew-api.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9201 |
2,778 | linux | 0d0e57697f162da4aa218b5feafe614fb666db07 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07 | bpf: don't let ldimm64 leak map addresses on unprivileged
The patch fixes two things at once:
1) It checks the env->allow_ptr_leaks and only prints the map address to
the log if we have the privileges to do so, otherwise it just dumps 0
as we would when kptr_restrict is enabled on %pK. Given the latter is
of... | 1 | static int do_check(struct bpf_verifier_env *env)
{
struct bpf_verifier_state *state = &env->cur_state;
struct bpf_insn *insns = env->prog->insnsi;
struct bpf_reg_state *regs = state->regs;
int insn_cnt = env->prog->len;
int insn_idx, prev_insn_idx = 0;
int insn_processed = 0;
bool do_print_state = false;
init... | 267,242,719,816,233,600,000,000,000,000,000,000,000 | verifier.c | 294,082,422,712,252,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9150 | The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9150 |
2,779 | linux | 0d0e57697f162da4aa218b5feafe614fb666db07 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07 | bpf: don't let ldimm64 leak map addresses on unprivileged
The patch fixes two things at once:
1) It checks the env->allow_ptr_leaks and only prints the map address to
the log if we have the privileges to do so, otherwise it just dumps 0
as we would when kptr_restrict is enabled on %pK. Given the latter is
of... | 1 | static void print_bpf_insn(struct bpf_insn *insn)
{
u8 class = BPF_CLASS(insn->code);
if (class == BPF_ALU || class == BPF_ALU64) {
if (BPF_SRC(insn->code) == BPF_X)
verbose("(%02x) %sr%d %s %sr%d\n",
insn->code, class == BPF_ALU ? "(u32) " : "",
insn->dst_reg,
bpf_alu_string[BPF_OP(insn->code) >... | 308,871,137,822,813,300,000,000,000,000,000,000,000 | verifier.c | 294,082,422,712,252,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9150 | The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls. | https://nvd.nist.gov/vuln/detail/CVE-2017-9150 |
2,780 | ImageMagick | 7fdf9ea808caa3c81a0eb42656e5fafc59084198 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7fdf9ea808caa3c81a0eb42656e5fafc59084198 | None | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
IndexPacket
index;
int
op... | 253,340,010,299,841,030,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9144 | In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9144 |
2,781 | ImageMagick | 7b8c1df65b25d6671f113e2306982eded44ce3b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b8c1df65b25d6671f113e2306982eded44ce3b4 | None | 1 | static Image *ReadARTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
const unsigned char
*pixels;
Image
*image;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
MagickBooleanType
status;
size_t
length;
ssize_t
count,
y;
/*
Open image file.
*... | 223,781,554,613,943,000,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-9143 | In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9143 |
2,782 | ImageMagick | 72f5c8632bff2daf3c95005f9b4cf2982786b52a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/72f5c8632bff2daf3c95005f9b4cf2982786b52a | None | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 237,712,577,469,856,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9142 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9142 |
2,783 | ImageMagick | f5910e91b0778e03ded45b9022be8eb8f77942cd | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f5910e91b0778e03ded45b9022be8eb8f77942cd | None | 1 | static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status,
cubemap = MagickFalse,
volume = MagickFalse,
matte;
CompressionType
compression;
DDSInfo
dds_info;
DDSDecoder
*decoder;
size_t
n,
num_images... | 98,055,214,651,978,080,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-9141 | In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-9141 |
2,784 | ImageMagick | 1c358ffe0049f768dd49a8a889c1cbf99ac9849b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1c358ffe0049f768dd49a8a889c1cbf99ac9849b | Reset memory for RLE decoder (patch provided by scarybeasts) | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 286,992,895,385,432,100,000,000,000,000,000,000,000 | rle.c | 133,078,342,380,417,530,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9098 | ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multipl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9098 |
2,785 | linux | 83eaddab4378db256d00d295bda6ca997cd13a52 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83eaddab4378db256d00d295bda6ca997cd13a52 | ipv6/dccp: do not inherit ipv6_mc_list from parent
Like commit 657831ffc38e ("dccp/tcp: do not inherit mc_list from parent")
we should clear ipv6_mc_list etc. for IPv6 sockets too.
Cc: Eric Dumazet <edumazet@google.com>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
S... | 1 | static struct sock *dccp_v6_request_recv_sock(const struct sock *sk,
struct sk_buff *skb,
struct request_sock *req,
struct dst_entry *dst,
struct request_sock *req_unhash,
bool *own_req)
{
struct inet_request_sock *ireq = inet_rsk(req);
struct ipv6_pinfo *newnp;
... | 280,222,012,026,830,700,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9077 | The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9077 |
2,786 | linux | 83eaddab4378db256d00d295bda6ca997cd13a52 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83eaddab4378db256d00d295bda6ca997cd13a52 | ipv6/dccp: do not inherit ipv6_mc_list from parent
Like commit 657831ffc38e ("dccp/tcp: do not inherit mc_list from parent")
we should clear ipv6_mc_list etc. for IPv6 sockets too.
Cc: Eric Dumazet <edumazet@google.com>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
S... | 1 | static struct sock *tcp_v6_syn_recv_sock(const struct sock *sk, struct sk_buff *skb,
struct request_sock *req,
struct dst_entry *dst,
struct request_sock *req_unhash,
bool *own_req)
{
struct inet_request_sock *ireq;
struct ipv6_pinfo *newnp;
const struct ipv6_pinfo *np = inet6_sk(sk);
struct... | 161,845,565,954,695,880,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9077 | The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9077 |
2,787 | linux | fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8 | sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
SCTP needs fixes similar to 83eaddab4378 ("ipv6/dccp: do not inherit
ipv6_mc_list from parent"), otherwise bad things can happen.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Tested-by: Andrey Konovalov <a... | 1 | static struct sock *sctp_v6_create_accept_sk(struct sock *sk,
struct sctp_association *asoc,
bool kern)
{
struct sock *newsk;
struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
struct sctp6_sock *newsctp6sk;
struct ipv6_txoptions *opt;
newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_pro... | 192,876,189,377,108,080,000,000,000,000,000,000,000 | None | null | [
"CWE-241"
] | CVE-2017-9075 | The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | https://nvd.nist.gov/vuln/detail/CVE-2017-9075 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.