commit_msg stringlengths 1 24.2k | commit_hash stringlengths 2 84 ⌀ | project stringlengths 2 40 | source stringclasses 4
values | labels int64 0 1 | repo_url stringlengths 26 70 ⌀ | commit_url stringlengths 74 118 ⌀ | commit_date stringlengths 25 25 ⌀ |
|---|---|---|---|---|---|---|---|
Make TASKSTATS require root access
Ok, this isn't optimal, since it means that 'iotop' needs admin
capabilities, and we may have to work on this some more. But at the
same time it is very much not acceptable to let anybody just read
anybody elses IO statistics quite at this level.
Use of the GENL_ADMIN_PERM suggeste... | 1a51410abe7d0ee4b1d112780f46df87d3621043 | linux | bigvul | 1 | null | null | null |
ext4: init timer earlier to avoid a kernel panic in __save_error_info
During mount, when we fail to open journal inode or root inode, the
__save_error_info will mod_timer. But actually s_err_report isn't
initialized yet and the kernel oops. The detailed information can
be found https://bugzilla.kernel.org/show_bug.cgi... | 0449641130f5652b344ef6fa39fa019d7e94660a | linux | bigvul | 1 | null | null | null |
Support all the new variables added | 7e4ab8e1189846041f955e6c83f72bc1624e7a98 | nspluginwrapper | bigvul | 1 | null | null | null |
alpha: fix several security issues
Fix several security issues in Alpha-specific syscalls. Untested, but
mostly trivial.
1. Signedness issue in osf_getdomainname allows copying out-of-bounds
kernel memory to userland.
2. Signedness issue in osf_sysinfo allows copying large amounts of
kernel memory to userland.
3. ... | 21c5977a836e399fc710ff2c5367845ed5c2527f | linux | bigvul | 1 | null | null | null |
ksm: fix NULL pointer dereference in scan_get_next_rmap_item()
Andrea Righi reported a case where an exiting task can race against
ksmd::scan_get_next_rmap_item (http://lkml.org/lkml/2011/6/1/742) easily
triggering a NULL pointer dereference in ksmd.
ksm_scan.mm_slot == &ksm_mm_head with only one registered mm
CPU 1... | 2b472611a32a72f4a118c069c2d62a1a3f087afd | linux | bigvul | 1 | null | null | null |
Fix for buffer overflow in ldm_frag_add not sufficient
As Ben Hutchings discovered [1], the patch for CVE-2011-1017 (buffer
overflow in ldm_frag_add) is not sufficient. The original patch in
commit c340b1d64000 ("fs/partitions/ldm.c: fix oops caused by corrupted
partition table") does not consider that, for subsequen... | cae13fe4cc3f24820ffb990c09110626837e85d4 | linux | bigvul | 1 | null | null | null |
net: ip_expire() must revalidate route
Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
added a bug in IP defragmentation handling, in case timeout is fired.
When a frame is defragmented, we use last skb dst field when building
final skb. Its dst is valid, since we are in rcu read section.
But if ... | 64f3b9e203bd06855072e295557dca1485a2ecba | linux | bigvul | 1 | null | null | null |
Ecryptfs: Add mount option to check uid of device being mounted = expect uid
Close a TOCTOU race for mounts done via ecryptfs-mount-private. The mount
source (device) can be raced when the ownership test is done in userspace.
Provide Ecryptfs a means to force the uid check at mount time.
Signed-off-by: John Johansen... | 764355487ea220fdc2faf128d577d7f679b91f97 | linux | bigvul | 1 | null | null | null |
tunnels: fix netns vs proto registration ordering
Same stuff as in ip_gre patch: receive hook can be called before netns
setup is done, oopsing in net_generic().
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net> | d5aa407f59f5b83d2c50ec88f5bf56d40f1f8978 | linux | bigvul | 1 | null | null | null |
gre: fix netns vs proto registration ordering
GRE protocol receive hook can be called right after protocol addition is done.
If netns stuff is not yet initialized, we're going to oops in
net_generic().
This is remotely oopsable if ip_gre is compiled as module and packet
comes at unfortunate moment of module loading.
... | c2892f02712e9516d72841d5c019ed6916329794 | linux | bigvul | 1 | null | null | null |
ARM: 6891/1: prevent heap corruption in OABI semtimedop
When CONFIG_OABI_COMPAT is set, the wrapper for semtimedop does not
bound the nsops argument. A sufficiently large value will cause an
integer overflow in allocation size, followed by copying too much data
into the allocated buffer. Fix this by restricting nsop... | 0f22072ab50cac7983f9660d33974b45184da4f9 | linux | bigvul | 1 | null | null | null |
inotify: fix double free/corruption of stuct user
On an error path in inotify_init1 a normal user can trigger a double
free of struct user. This is a regression introduced by a2ae4cc9a16e
("inotify: stop kernel memory leak on file creation failure").
We fix this by making sure that if a group exists the user referen... | d0de4dc584ec6aa3b26fffea320a8457827768fc | linux | bigvul | 1 | null | null | null |
sound/oss/opl3: validate voice and channel indexes
User-controllable indexes for voice and channel values may cause reading
and writing beyond the bounds of their respective arrays, leading to
potentially exploitable memory corruption. Validate these indexes.
Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com>
C... | 4d00135a680727f6c3be78f8befaac009030e4df | linux | bigvul | 1 | null | null | null |
sound/oss: remove offset from load_patch callbacks
Was: [PATCH] sound/oss/midi_synth: prevent underflow, use of
uninitialized value, and signedness issue
The offset passed to midi_synth_load_patch() can be essentially
arbitrary. If it's greater than the header length, this will result in
a copy_from_user(dst, src, n... | b769f49463711205d57286e64cf535ed4daf59e9 | linux | bigvul | 1 | null | null | null |
char/tpm: Fix unitialized usage of data buffer
This patch fixes information leakage to the userspace by initializing
the data buffer to zero.
Reported-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Peter Huewe <huewe.external@infineon.com>
Signed-off-by: Marcel Selhorst <m.selhorst@sirrix.com>
[ Also re... | 1309d7afbed112f0e8e90be9af975550caa0076b | linux | bigvul | 1 | null | null | null |
bridge: netfilter: fix information leak
Struct tmp is copied from userspace. It is not checked whether the "name"
field is NULL terminated. This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline. It would be seen... | d846f71195d57b0bbb143382647c2c6638b04c5a | linux | bigvul | 1 | null | null | null |
Bluetooth: bnep: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "device"
field is NULL terminated. This potentially leads to BUG() inside of
alloc_netdev_mqs() and/or information leak by creating a device with a name
made of contents of kernel stack.
Signed-off-by: Vasiliy Kul... | 43629f8f5ea32a998d06d1bb41eefa0e821ff573 | linux | bigvul | 1 | null | null | null |
Bluetooth: sco: fix information leak to userspace
struct sco_conninfo has one padding byte in the end. Local variable
cinfo of type sco_conninfo is copied to userspace with this uninizialized
one byte, leading to old stack contents leak.
Signed-off-by: Vasiliy Kulikov <segoon@openwall.com>
Signed-off-by: Gustavo F. ... | c4c896e1471aec3b004a693c689f60be3b17ac86 | linux | bigvul | 1 | null | null | null |
rds: prevent BUG_ON triggering on congestion map updates
Recently had this bug halt reported to me:
kernel BUG at net/rds/send.c:329!
Oops: Exception in kernel mode, sig: 5 [#1]
SMP NR_CPUS=1024 NUMA pSeries
Modules linked in: rds sunrpc ipv6 dm_mirror dm_region_hash dm_log ibmveth sg
ext4 jbd2 mbcache sd_mod crc_t10... | 6094628bfd94323fc1cea05ec2c6affd98c18f7f | linux | bigvul | 1 | null | null | null |
ACPI: Split out custom_method functionality into an own driver
With /sys/kernel/debug/acpi/custom_method root can write
to arbitrary memory and increase his priveleges, even if
these are restricted.
-> Make this an own debug .config option and warn about the
security issue in the config description.
-> Still keep ac... | 526b4af47f44148c9d665e57723ed9f86634c6e3 | linux | bigvul | 1 | null | null | null |
bridge: Fix mglist corruption that leads to memory corruption
The list mp->mglist is used to indicate whether a multicast group
is active on the bridge interface itself as opposed to one of the
constituent interfaces in the bridge.
Unfortunately the operation that adds the mp->mglist node to the
list neglected to che... | 6b0d6a9b4296fa16a28d10d416db7a770fc03287 | linux | bigvul | 1 | null | null | null |
ima: fix add LSM rule bug
If security_filter_rule_init() doesn't return a rule, then not everything
is as fine as the return code implies.
This bug only occurs when the LSM (eg. SELinux) is disabled at runtime.
Adding an empty LSM rule causes ima_match_rules() to always succeed,
ignoring any remaining rules.
defau... | 867c20265459d30a01b021a9c1e81fb4c5832aa9 | linux | bigvul | 1 | null | null | null |
fuse: verify ioctl retries
Verify that the total length of the iovec returned in FUSE_IOCTL_RETRY
doesn't overflow iov_length().
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
CC: Tejun Heo <tj@kernel.org>
CC: <stable@kernel.org> [2.6.31+] | 7572777eef78ebdee1ecb7c258c0ef94d35bad16 | linux | bigvul | 1 | null | null | null |
orinoco: fix TKIP countermeasure behaviour
Enable the port when disabling countermeasures, and disable it on
enabling countermeasures.
This bug causes the response of the system to certain attacks to be
ineffective.
It also prevents wpa_supplicant from getting scan results, as
wpa_supplicant disables countermeasures... | 0a54917c3fc295cb61f3fb52373c173fd3b69f48 | linux | bigvul | 1 | null | null | null |
inotify: stop kernel memory leak on file creation failure
If inotify_init is unable to allocate a new file for the new inotify
group we leak the new group. This patch drops the reference on the
group on file allocation failure.
Reported-by: Vegard Nossum <vegard.nossum@gmail.com>
cc: stable@kernel.org
Signed-off-by:... | a2ae4cc9a16e211c8a128ba10d22a85431f093ab | linux | bigvul | 1 | null | null | null |
wireless: radiotap: fix parsing buffer overrun
When parsing an invalid radiotap header, the parser can overrun
the buffer that is passed in because it doesn't correctly check
1) the minimum radiotap header size
2) the space for extended bitmaps
The first issue doesn't affect any in-kernel user as they all
check the... | f5563318ff1bde15b10e736e97ffce13be08bc1a | linux | bigvul | 1 | null | null | null |
ipc,shm: fix shm_file deletion races
When IPC_RMID races with other shm operations there's potential for
use-after-free of the shm object's associated file (shm_file).
Here's the race before this patch:
TASK 1 TASK 2
------ ------
shm_rmid()
ipc_lock_object()
... | a399b29dfbaaaf91162b2dc5a5875dd51bbfa2a1 | linux | bigvul | 1 | null | null | null |
avcodec/jpeg2000dec: prevent out of array accesses in pixel addressing
Fixes Ticket2921
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | fe448cd28d674c3eff3072552eae366d0b659ce9 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/parser: reset indexes on realloc failure
Fixes Ticket2982
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | f31011e9abfb2ae75bb32bc44e2c34194c8dc40a | ffmpeg | bigvul | 1 | null | null | null |
avcodec/g2meet: Fix framebuf size
Currently the code can in some cases draw tiles that hang outside the
allocated buffer. This patch increases the buffer size to avoid out
of array accesses. An alternative would be to fail if such tiles are
encountered.
I do not know if any valid files use such hanging tiles.
Fixes T... | e07ac727c1cc9eed39e7f9117c97006f719864bd | ffmpeg | bigvul | 1 | null | null | null |
avfilter/vf_fps: make sure the fifo is not empty before using it
Fixes Ticket2905
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | cdd5df8189ff1537f7abe8defe971f80602cc2d2 | ffmpeg | bigvul | 1 | null | null | null |
ffv1dec: Check bits_per_raw_sample and colorspace for equality in ver 0/1 headers
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | b05cd1ea7e45a836f7f6071a716c38bb30326e0f | ffmpeg | bigvul | 1 | null | null | null |
avcodec/jpeg2000dec: fix context consistency with too large lowres
Fixes out of array accesses
Fixes Ticket2898
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | a1b9004b768bef606ee98d417bceb9392ceb788d | ffmpeg | bigvul | 1 | null | null | null |
jpeg2000: check log2_cblk dimensions
Fixes out of array access
Fixes Ticket2895
Found-by: Piotr Bandurski <ami_stuff@o2.pl>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 9a271a9368eaabf99e6c2046103acb33957e63b7 | ffmpeg | bigvul | 1 | null | null | null |
jpeg2000: fix dereferencing invalid pointers
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 912ce9dd2080c5837285a471d750fa311e09b555 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/jpeg2000dec: Check cdx/y values more carefully
Some invalid values where not handled correctly in the later pixel
format matching code.
Fixes out of array accesses
Fixes Ticket2848
Found-by: Piotr Bandurski <ami_stuff@o2.pl>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 8bb11c3ca77b52e05a9ed1496a65f8a76e6e2d8f | ffmpeg | bigvul | 1 | null | null | null |
avcodec/flashsv: check diff_start/height
Fixes out of array accesses
Fixes Ticket2844
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 880c73cd76109697447fbfbaa8e5ee5683309446 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/pngdsp: fix (un)signed type in end comparission
Fixes out of array accesses
Fixes Ticket2919
Found_by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 86736f59d6a527d8bc807d09b93f971c0fe0bb07 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/g2meet: Fix order of align and pixel size multiplication.
Fixes out of array accesses
Fixes Ticket2922
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 821a5938d100458f4d09d634041b05c860554ce0 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/jpeg2000dec: non zero image offsets are not supported
Fixes out of array accesses
Fixes Ticket3080
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 780669ef7c23c00836a24921fcc6b03be2b8ca4a | ffmpeg | bigvul | 1 | null | null | null |
ffv1dec: check that global parameters dont change in version 0/1
Such changes are not allowed nor supported
Fixes Ticket2906
Found-by: ami_stuff
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 547d690d676064069d44703a1917e0dab7e33445 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/dsputil: fix signedness in sizeof() comparissions
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 454a11a1c9c686c78aa97954306fb63453299760 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/rpza: Perform pointer advance and checks before using the pointers
Fixes out of array accesses
Fixes Ticket2850
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 3819db745da2ac7fb3faacb116788c32f4753f34 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/h264: do not trust last_pic_droppable when marking pictures as done
This simplifies the code and fixes a deadlock
Fixes Ticket2927
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 29ffeef5e73b8f41ff3a3f2242d356759c66f91f | ffmpeg | bigvul | 1 | null | null | null |
Multi-realm KDC null deref [CVE-2013-1418]
If a KDC serves multiple realms, certain requests can cause
setup_server_realm() to dereference a null pointer, crashing the KDC.
CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C
A related but more minor vulnerability requires authentication to
exploit, and is only prese... | c2ccf4197f697c4ff143b8a786acdd875e70a89d | krb5 | bigvul | 1 | null | null | null |
Fix a few incorrectly checked [io_]remap_pfn_range() calls
Nico Golde reports a few straggling uses of [io_]remap_pfn_range() that
really should use the vm_iomap_memory() helper. This trivially converts
two of them to the helper, and comments about why the third one really
needs to continue to use remap_pfn_range(), ... | 7314e613d5ff9f0934f7a0f74ed7973b903315d1 | linux | bigvul | 1 | null | null | null |
ping: prevent NULL pointer dereference on write to msg_name
A plain read() on a socket does set msg->msg_name to NULL. So check for
NULL pointer first.
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | cf970c002d270c36202bd5b9c2804d3097a52da0 | linux | bigvul | 1 | null | null | null |
net: fib: fib6_add: fix potential NULL pointer dereference
When the kernel is compiled with CONFIG_IPV6_SUBTREES, and we return
with an error in fn = fib6_add_1(), then error codes are encoded into
the return pointer e.g. ERR_PTR(-ENOENT). In such an error case, we
write the error code into err and jump to out, hence ... | ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2 | linux | bigvul | 1 | null | null | null |
Make sure that clients can't access buffers belonging to other users
A manipulated, but properly authenticated client was able to retrieve
the backlog of other users on the same core in some cases by providing
an appropriate BufferID to the storage engine. Note that proper
authentication was still required, so exploit... | a1a24da | quassel | bigvul | 1 | null | null | null |
aacraid: missing capable() check in compat ioctl
In commit d496f94d22d1 ('[SCSI] aacraid: fix security weakness') we
added a check on CAP_SYS_RAWIO to the ioctl. The compat ioctls need the
check as well.
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Linus Torvalds <torv... | f856567b930dfcdbc3323261bf77240ccdde01f5 | linux | bigvul | 1 | null | null | null |
qeth: avoid buffer overflow in snmp ioctl
Check user-defined length in snmp ioctl request and allow request
only if it fits into a qeth command buffer.
Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com>
Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com>
Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c... | 6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | linux | bigvul | 1 | null | null | null |
aacraid: prevent invalid pointer dereference
It appears that driver runs into a problem here if fibsize is too small
because we allocate user_srbcmd with fibsize size only but later we
access it until user_srbcmd->sg.count to copy it over to srbcmd.
It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t... | b4789b8e6be3151a955ade74872822f30e8cd914 | linux | bigvul | 1 | null | null | null |
libertas: potential oops in debugfs
If we do a zero size allocation then it will oops. Also we can't be
sure the user passes us a NUL terminated string so I've added a
terminator.
This code can only be triggered by root.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-... | a497e47d4aec37aaf8f13509f3ef3d1f6a717d88 | linux | bigvul | 1 | null | null | null |
KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
A guest can cause a BUG_ON() leading to a host kernel crash.
When the guest writes to the ICR to request an IPI, while in x2apic
mode the following things happen, the destination is read from
ICR2, which is a register that the guest can control.
kvm_irq_... | 17d68b763f09a9ce824ae23eb62c9efc57b69271 | linux | bigvul | 1 | null | null | null |
KVM: x86: Convert vapic synchronization to _cached functions (CVE-2013-6368)
In kvm_lapic_sync_from_vapic and kvm_lapic_sync_to_vapic there is the
potential to corrupt kernel memory if userspace provides an address that
is at the end of a page. This patches concerts those functions to use
kvm_write_guest_cached and k... | fda4e2e85589191b123d31cdc21fd33ee70f50fd | linux | bigvul | 1 | null | null | null |
KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)
Under guest controllable circumstances apic_get_tmcct will execute a
divide by zero and cause a crash. If the guest cpuid support
tsc deadline timers and performs the following sequence of requests
the host will crash.
- Set the mode to periodic
- Set the T... | b963a22e6d1a266a67e9eecc88134713fd54775c | linux | bigvul | 1 | null | null | null |
ARM: 7527/1: uaccess: explicitly check __user pointer when !CPU_USE_DOMAINS
The {get,put}_user macros don't perform range checking on the provided
__user address when !CPU_HAS_DOMAINS.
This patch reworks the out-of-line assembly accessors to check the user
address against a specified limit, returning -EFAULT if is is... | 8404663f81d212918ff85f493649a7991209fa04 | linux | bigvul | 1 | null | null | null |
ARM: KVM: prevent NULL pointer dereferences with KVM VCPU ioctl
Some ARM KVM VCPU ioctls require the vCPU to be properly initialized
with the KVM_ARM_VCPU_INIT ioctl before being used with further
requests. KVM_RUN checks whether this initialization has been
done, but other ioctls do not.
Namely KVM_GET_REG_LIST will ... | e8180dcaa8470ceca21109f143876fdcd9fe050a | linux | bigvul | 1 | null | null | null |
ssl_parse_certificate() now calls x509parse_crt_der() directly | 1922a4e6aade7b1d685af19d4d9339ddb5c02859 | polarssl | bigvul | 1 | null | null | null |
KVM: perform an invalid memslot step for gpa base change
PPC must flush all translations before the new memory slot
is visible.
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Signed-off-by: Avi Kivity <avi@redhat.com> | 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8 | linux | bigvul | 1 | null | null | null |
NFSv4: Check for buffer length in __nfs4_get_acl_uncached
Commit 1f1ea6c "NFSv4: Fix buffer overflow checking in
__nfs4_get_acl_uncached" accidently dropped the checking for too small
result buffer length.
If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
supporting ACLs, the ACL has not been cached and... | 7d3e91a89b7adbc2831334def9e494dd9892f9af | linux | bigvul | 1 | null | null | null |
ipvs: Add boundary check on ioctl arguments
The ipvs code has a nifty system for doing the size of ioctl command
copies; it defines an array with values into which it indexes the cmd
to find the right length.
Unfortunately, the ipvs code forgot to check if the cmd was in the
range that the array provides, allowing fo... | 04bcef2a83f40c6db24222b27a52892cba39dffb | linux | bigvul | 1 | null | null | null |
KVM: Improve create VCPU parameter (CVE-2013-4587)
In multiple functions the vcpu_id is used as an offset into a bitfield. Ag
malicious user could specify a vcpu_id greater than 255 in order to set or
clear bits in kernel memory. This could be used to elevate priveges in the
kernel. This patch verifies that the vcp... | 338c7dbadd2671189cec7faf64c84d01071b3f96 | linux | bigvul | 1 | null | null | null |
ipv6: fix headroom calculation in udp6_ufo_fragment
Commit 1e2bd517c108816220f262d7954b697af03b5f9c ("udp6: Fix udp
fragmentation for tunnel traffic.") changed the calculation if
there is enough space to include a fragment header in the skb from a
skb->mac_header dervived one to skb_headroom. Because we already peeled... | 0e033e04c2678dbbe74a46b23fffb7bb918c288e | linux | bigvul | 1 | null | null | null |
Staging: sb105x: info leak in mp_get_count()
The icount.reserved[] array isn't initialized so it leaks stack
information to userspace.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Li... | a8b33654b1e3b0c74d4a1fed041c9aae50b3c427 | linux | bigvul | 1 | null | null | null |
Staging: bcm: info leak in ioctl
The DevInfo.u32Reserved[] array isn't initialized so it leaks kernel
information to user space.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Linus To... | 8d1e72250c847fa96498ec029891de4dc638a5ba | linux | bigvul | 1 | null | null | null |
staging: wlags49_h2: buffer overflow setting station name
We need to check the length parameter before doing the memcpy(). I've
actually changed it to strlcpy() as well so that it's NUL terminated.
You need CAP_NET_ADMIN to trigger these so it's not the end of the
world.
Reported-by: Nico Golde <nico@ngolde.de>
Rep... | b5e2f339865fb443107e5b10603e53bbc92dc054 | linux | bigvul | 1 | null | null | null |
staging: ozwpan: prevent overflow in oz_cdev_write()
We need to check "count" so we don't overflow the ei->data buffer.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Linus Torvalds <t... | c2c65cd2e14ada6de44cb527e7f1990bede24e15 | linux | bigvul | 1 | null | null | null |
uml: check length in exitcode_proc_write()
We don't cap the size of buffer from the user so we could write past the
end of the array here. Only root can write to this file.
Reported-by: Nico Golde <nico@ngolde.de>
Reported-by: Fabian Yamaguchi <fabs@goesec.de>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
... | 201f99f170df14ba52ea4c52847779042b7a623b | linux | bigvul | 1 | null | null | null |
ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | 6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | linux | bigvul | 1 | null | null | null |
ip_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e9920... | e93b7d748be887cd7639b113ba7d7ef792a7efb9 | linux | bigvul | 1 | null | null | null |
ipv6: udp packets following an UFO enqueued packet need also be handled by UFO
In the following scenario the socket is corked:
If the first UDP packet is larger then the mtu we try to append it to the
write queue via ip6_ufo_append_data. A following packet, which is smaller
than the mtu would be appended to the alread... | 2811ebac2521ceac84f2bdae402455baa6a7fb47 | linux | bigvul | 1 | null | null | null |
net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit
Alan Chester reported an issue with IPv6 on SCTP that IPsec traffic is not
being encrypted, whereas on IPv4 it is. Setting up an AH + ESP transport
does not seem to have the desired effect:
SCTP + IPv4:
22:14:20.809645 IP (tos 0x2,ECT(0), ttl 64, id 0, offse... | 95ee62083cb6453e056562d91f597552021e6ae7 | linux | bigvul | 1 | null | null | null |
net: Check the correct namespace when spoofing pid over SCM_RIGHTS
This is a security bug.
The follow-up will fix nsproxy to discourage this type of issue from
happening again.
Cc: stable@vger.kernel.org
Signed-off-by: Andy Lutomirski <luto@amacapital.net>
Reviewed-by: "Eric W. Biederman" <ebiederm@xmission.com>
Sig... | d661684cf6820331feae71146c35da83d794467e | linux | bigvul | 1 | null | null | null |
dm snapshot: fix data corruption
This patch fixes a particular type of data corruption that has been
encountered when loading a snapshot's metadata from disk.
When we allocate a new chunk in persistent_prepare, we increment
ps->next_free and we make sure that it doesn't point to a metadata area
by further incrementin... | e9c6a182649f4259db704ae15a91ac820e63b0ca | linux | bigvul | 1 | null | null | null |
net: Update the sysctl permissions handler to test effective uid/gid
Modify the code to use current_euid(), and in_egroup_p, as in done
in fs/proc/proc_sysctl.c:test_perm()
Cc: stable@vger.kernel.org
Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Reported-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: "Eric W. ... | 2433c8f094a008895e66f25bd1773cdb01c91d01 | linux | bigvul | 1 | null | null | null |
avutil/mem: Fix flipped condition
Fixes return code and later null pointer dereference
Found-by: Laurent Butti <laurentb@gmail.com>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | c94f9e854228e0ea00e1de8769d8d3f7cab84a55 | ffmpeg | bigvul | 1 | null | null | null |
avcodec/g2meet: fix src pointer checks in kempf_decode_tile()
Fixes Ticket2842
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 2960576378d17d71cc8dccc926352ce568b5eec1 | ffmpeg | bigvul | 1 | null | null | null |
avfilter: fix plane validity checks
Fixes out of array accesses
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | e43a0a232dbf6d3c161823c2e07c52e76227a1bc | ffmpeg | bigvul | 1 | null | null | null |
ARM: 7809/1: perf: fix event validation for software group leaders
It is possible to construct an event group with a software event as a
group leader and then subsequently add a hardware event to the group.
This results in the event group being validated by adding all members
of the group to a fake PMU and attempting ... | c95eb3184ea1a3a2551df57190c81da695e2144b | linux | bigvul | 1 | null | null | null |
cifs: fix off-by-one bug in build_unc_path_to_root
commit 839db3d10a (cifs: fix up handling of prefixpath= option) changed
the code such that the vol->prepath no longer contained a leading
delimiter and then fixed up the places that accessed that field to
account for that change.
One spot in build_unc_path_to_root wa... | 1fc29bacedeabb278080e31bb9c1ecb49f143c3b | linux | bigvul | 1 | null | null | null |
fix possible OOB write in gif2tiff.c | ce6841d9e41d621ba23cf18b190ee6a23b2cc833 | libtiff | bigvul | 1 | null | null | null |
arm64: don't kill the kernel on a bad esr from el0
Rather than completely killing the kernel if we receive an esr value we
can't deal with in the el0 handlers, send the process a SIGILL and log
the esr value in the hope that we can debug it. If we receive a bad esr
from el1, we'll die() as before.
Signed-off-by: Mark... | 9955ac47f4ba1c95ecb6092aeaefb40a22e99268 | linux | bigvul | 1 | null | null | null |
userns: unshare_userns(&cred) should not populate cred on failure
unshare_userns(new_cred) does *new_cred = prepare_creds() before
create_user_ns() which can fail. However, the caller expects that
it doesn't need to take care of new_cred if unshare_userns() fails.
We could change the single caller, sys_unshare(), but... | 6160968cee8b90a5dd95318d716e31d7775c4ef3 | linux | bigvul | 1 | null | null | null |
ipv6: ip6_append_data_mtu did not care about pmtudisc and frag_size
If the socket had an IPV6_MTU value set, ip6_append_data_mtu lost track
of this when appending the second frame on a corked socket. This results
in the following splat:
[37598.993962] ------------[ cut here ]------------
[37598.994008] kernel BUG at ... | 75a493e60ac4bbe2e977e7129d6d8cbb0dd236be | linux | bigvul | 1 | null | null | null |
ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data
We accidentally call down to ip6_push_pending_frames when uncorking
pending AF_INET data on a ipv6 socket. This results in the following
splat (from Dave Jones):
skbuff: skb_under_panic: text:ffffffff816765f6 len:48 put:40 head:ffff8... | 8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1 | linux | bigvul | 1 | null | null | null |
If the server instance directory already exists, it is now removed first in order get correct directory permissions.
If the directory still exists after removal, Phusion Passenger aborts to avoid writing to a directory with unexpected permissions.
Fixes issue #910. | 5483b3292cc2af1c83033eaaadec20dba4dcfd9b | passenger | bigvul | 1 | null | null | null |
bridge: fix some kernel warning in multicast timer
Several people reported the warning: "kernel BUG at kernel/timer.c:729!"
and the stack trace is:
#7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905
#8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge]
#9 [ffff880214d25c80] br_mul... | c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1 | linux | bigvul | 1 | null | null | null |
vhost-net: fix use-after-free in vhost_net_flush
vhost_net_ubuf_put_and_wait has a confusing name:
it will actually also free it's argument.
Thus since commit 1280c27f8e29acf4af2da914e80ec27c3dbd5c01
"vhost-net: flush outstanding DMAs on memory change"
vhost_net_flush tries to use the argument after passing it
to ... | dd7633ecd553a5e304d349aa6f8eb8a0417098c5 | linux | bigvul | 1 | null | null | null |
ipv6: only static routes qualify for equal cost multipathing
Static routes in this case are non-expiring routes which did not get
configured by autoconf or by icmpv6 redirects.
To make sure we actually get an ecmp route while searching for the first
one in this fib6_node's leafs, also make sure it matches the ecmp ro... | 307f2fb95e9b96b3577916e73d92e104f8f26494 | linux | bigvul | 1 | null | null | null |
fix bug #64660 - yyparse can return 2, not only 1 | fb58e69a84f4fde603a630d2c9df2fa3be16d846 | php-src | bigvul | 1 | null | null | null |
cifs: move check for NULL socket into smb_send_rqst
Cai reported this oops:
[90701.616664] BUG: unable to handle kernel NULL pointer dereference at 0000000000000028
[90701.625438] IP: [<ffffffff814a343e>] kernel_setsockopt+0x2e/0x60
[90701.632167] PGD fea319067 PUD 103fda4067 PMD 0
[90701.637255] Oops: 0000 [#1] SMP
... | ea702b80e0bbb2448e201472127288beb82ca2fe | linux | bigvul | 1 | null | null | null |
tracing: Fix possible NULL pointer dereferences
Currently set_ftrace_pid and set_graph_function files use seq_lseek
for their fops. However seq_open() is called only for FMODE_READ in
the fops->open() so that if an user tries to seek one of those file
when she open it for writing, it sees NULL seq_file and then panic... | 6a76f8c0ab19f215af2a3442870eeb5f0e81998d | linux | bigvul | 1 | null | null | null |
VSOCK: Fix missing msg_namelen update in vsock_stream_recvmsg()
The code misses to update the msg_namelen member to 0 and therefore
makes net/socket.c leak the local, uninitialized sockaddr_storage
variable to userland -- 128 bytes of kernel stack memory.
Cc: Andy King <acking@vmware.com>
Cc: Dmitry Torokhov <dtor@vm... | d5e0d0f607a7a029c6563a0470d88255c89a8d11 | linux | bigvul | 1 | null | null | null |
VSOCK: vmci - fix possible info leak in vmci_transport_dgram_dequeue()
In case we received no data on the call to skb_recv_datagram(), i.e.
skb->data is NULL, vmci_transport_dgram_dequeue() will return with 0
without updating msg_namelen leading to net/socket.c leaking the local,
uninitialized sockaddr_storage variabl... | 680d04e0ba7e926233e3b9cee59125ce181f66ba | linux | bigvul | 1 | null | null | null |
tipc: fix info leaks via msg_name in recv_msg/recv_stream
The code in set_orig_addr() does not initialize all of the members of
struct sockaddr_tipc when filling the sockaddr info -- namely the union
is only partly filled. This will make recv_msg() and recv_stream() --
the only users of this function -- leak kernel st... | 60085c3d009b0df252547adb336d1ccca5ce52ec | linux | bigvul | 1 | null | null | null |
rose: fix info leak via msg_name in rose_recvmsg()
The code in rose_recvmsg() does not initialize all of the members of
struct sockaddr_rose/full_sockaddr_rose when filling the sockaddr info.
Nor does it initialize the padding bytes of the structure inserted by
the compiler for alignment. This will lead to leaking uni... | 4a184233f21645cf0b719366210ed445d1024d72 | linux | bigvul | 1 | null | null | null |
NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
The code in llcp_sock_recvmsg() does not initialize all the members of
struct sockaddr_nfc_llcp when filling the sockaddr info. Nor does it
initialize the padding bytes of the structure inserted by the compiler
for alignment.
Also, if the socket is in stat... | d26d6504f23e803824e8ebd14e52d4fc0a0b09cb | linux | bigvul | 1 | null | null | null |
netrom: fix info leak via msg_name in nr_recvmsg()
In case msg_name is set the sockaddr info gets filled out, as
requested, but the code fails to initialize the padding bytes of
struct sockaddr_ax25 inserted by the compiler for alignment. Also
the sax25_ndigis member does not get assigned, leaking four more
bytes.
Bo... | 3ce5efad47b62c57a4f5c54248347085a750ce0e | linux | bigvul | 1 | null | null | null |
llc: Fix missing msg_namelen update in llc_ui_recvmsg()
For stream sockets the code misses to update the msg_namelen member
to 0 and therefore makes net/socket.c leak the local, uninitialized
sockaddr_storage variable to userland -- 128 bytes of kernel stack
memory. The msg_namelen update is also missing for datagram ... | c77a4b9cffb6215a15196ec499490d116dfad181 | linux | bigvul | 1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.