commit_msg stringlengths 1 24.2k | commit_hash stringlengths 2 84 ⌀ | project stringlengths 2 40 | source stringclasses 4
values | labels int64 0 1 | repo_url stringlengths 26 70 ⌀ | commit_url stringlengths 74 118 ⌀ | commit_date stringlengths 25 25 ⌀ |
|---|---|---|---|---|---|---|---|
l2tp: fix info leak in l2tp_ip6_recvmsg()
The L2TP code for IPv6 fails to initialize the l2tp_conn_id member of
struct sockaddr_l2tpip6 and therefore leaks four bytes kernel stack
in l2tp_ip6_recvmsg() in case msg_name is set.
Initialize l2tp_conn_id with 0 to avoid the info leak.
Signed-off-by: Mathias Krause <mini... | b860d3cc62877fad02863e2a08efff69a19382d2 | linux | bigvul | 1 | null | null | null |
iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
The current code does not fill the msg_name member in case it is set.
It also does not set the msg_namelen member to 0 and therefore makes
net/socket.c leak the local, uninitialized sockaddr_storage variable
to userland -- 128 bytes of kernel stack memory.
F... | a5598bd9c087dc0efc250a5221e5d0e6f584ee88 | linux | bigvul | 1 | null | null | null |
irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
The current code does not fill the msg_name member in case it is set.
It also does not set the msg_namelen member to 0 and therefore makes
net/socket.c leak the local, uninitialized sockaddr_storage variable
to userland -- 128 bytes of kernel stack memory.
... | 5ae94c0d2f0bed41d6718be743985d61b7f5c47d | linux | bigvul | 1 | null | null | null |
caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
The current code does not fill the msg_name member in case it is set.
It also does not set the msg_namelen member to 0 and therefore makes
net/socket.c leak the local, uninitialized sockaddr_storage variable
to userland -- 128 bytes of kernel stack memory.
... | 2d6fbfe733f35c6b355c216644e08e149c61b271 | linux | bigvul | 1 | null | null | null |
Bluetooth: SCO - Fix missing msg_namelen update in sco_sock_recvmsg()
If the socket is in state BT_CONNECT2 and BT_SK_DEFER_SETUP is set in
the flags, sco_sock_recvmsg() returns early with 0 without updating the
possibly set msg_namelen member. This, in turn, leads to a 128 byte
kernel stack leak in net/socket.c.
Fix... | c8c499175f7d295ef867335bceb9a76a2c3cdc38 | linux | bigvul | 1 | null | null | null |
Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg()
If RFCOMM_DEFER_SETUP is set in the flags, rfcomm_sock_recvmsg() returns
early with 0 without updating the possibly set msg_namelen member. This,
in turn, leads to a 128 byte kernel stack leak in net/socket.c.
Fix this by updating msg_namelen... | e11e0455c0d7d3d62276a0c55d9dfbc16779d691 | linux | bigvul | 1 | null | null | null |
Bluetooth: fix possible info leak in bt_sock_recvmsg()
In case the socket is already shutting down, bt_sock_recvmsg() returns
with 0 without updating msg_namelen leading to net/socket.c leaking the
local, uninitialized sockaddr_storage variable to userland -- 128 bytes
of kernel stack memory.
Fix this by moving the m... | 4683f42fde3977bdb4e8a09622788cc8b5313778 | linux | bigvul | 1 | null | null | null |
ax25: fix info leak via msg_name in ax25_recvmsg()
When msg_namelen is non-zero the sockaddr info gets filled out, as
requested, but the code fails to initialize the padding bytes of struct
sockaddr_ax25 inserted by the compiler for alignment. Additionally the
msg_namelen value is updated to sizeof(struct full_sockadd... | ef3313e84acbf349caecae942ab3ab731471f1a1 | linux | bigvul | 1 | null | null | null |
atm: update msg_namelen in vcc_recvmsg()
The current code does not fill the msg_name member in case it is set.
It also does not set the msg_namelen member to 0 and therefore makes
net/socket.c leak the local, uninitialized sockaddr_storage variable
to userland -- 128 bytes of kernel stack memory.
Fix that by simply s... | 9b3e617f3df53822345a8573b6d358f6b9e5ed87 | linux | bigvul | 1 | null | null | null |
crypto: algif - suppress sending source address information in recvmsg
The current code does not set the msg_namelen member to 0 and therefore
makes net/socket.c leak the local sockaddr_storage variable to userland
-- 128 bytes of kernel stack memory. Fix that.
Cc: <stable@vger.kernel.org> # 2.6.38
Signed-off-by: Mat... | 72a763d805a48ac8c0bf48fdb510e84c12de51fe | linux | bigvul | 1 | null | null | null |
perf/ftrace: Fix paranoid level for enabling function tracer
The current default perf paranoid level is "1" which has
"perf_paranoid_kernel()" return false, and giving any operations that
use it, access to normal users. Unfortunately, this includes function
tracing and normal users should not be allowed to enable func... | 12ae030d54ef250706da5642fc7697cc60ad0df7 | linux | bigvul | 1 | null | null | null |
exec/ptrace: fix get_dumpable() incorrect tests
The get_dumpable() return value is not boolean. Most users of the
function actually want to be testing for non-SUID_DUMP_USER(1) rather than
SUID_DUMP_DISABLE(0). The SUID_DUMP_ROOT(2) is also considered a
protected state. Almost all places did this correctly, excepti... | d049f74f2dbe71354d43d393ac3a188947811348 | linux | bigvul | 1 | null | null | null |
iscsi-target: fix heap buffer overflow on error
If a key was larger than 64 bytes, as checked by iscsi_check_key(), the
error response packet, generated by iscsi_add_notunderstood_response(),
would still attempt to copy the entire key into the packet, overflowing
the structure on the heap.
Remote preauthentication ke... | cea4dcfdad926a27a18e188720efe0f2c9403456 | linux | bigvul | 1 | null | null | null |
Fixed: chuck null pointer when unknown CT is sent and over in-memory limit | 0840b13612a0b7ef1ce7441cf811dcfc6b463fba | modsecurity | bigvul | 1 | null | null | null |
bridge: fix mdb info leaks
The bridging code discloses heap and stack bytes via the RTM_GETMDB
netlink interface and via the notify messages send to group RTNLGRP_MDB
afer a successful add/del.
Fix both cases by initializing all unset members/padding bytes with
memset(0).
Cc: Stephen Hemminger <stephen@networkplumbe... | c085c49920b2f900ba716b4ca1c1a55ece9872cc | linux | bigvul | 1 | null | null | null |
rtnl: fix info leak on RTM_GETLINK request for VF devices
Initialize the mac address buffer with 0 as the driver specific function
will probably not fill the whole buffer. In fact, all in-kernel drivers
fill only ETH_ALEN of the MAX_ADDR_LEN bytes, i.e. 6 of the 32 possible
bytes. Therefore we currently leak 26 bytes ... | 84d73cd3fb142bf1298a8c13fd4ca50fd2432372 | linux | bigvul | 1 | null | null | null |
dcbnl: fix various netlink info leaks
The dcb netlink interface leaks stack memory in various places:
* perm_addr[] buffer is only filled at max with 12 of the 32 bytes but
copied completely,
* no in-kernel driver fills all fields of an IEEE 802.1Qaz subcommand,
so we're leaking up to 58 bytes for ieee_ets structs... | 29cd8ae0e1a39e239a3a7b67da1986add1199fc0 | linux | bigvul | 1 | null | null | null |
vm: convert fb_mmap to vm_iomap_memory() helper
This is my example conversion of a few existing mmap users. The
fb_mmap() case is a good example because it is a bit more complicated
than some: fb_mmap() mmaps one of two different memory areas depending
on the page offset of the mmap (but happily there is never any mi... | fc9bbca8f650e5f738af8806317c0a041a48ae4a | linux | bigvul | 1 | null | null | null |
crypto: user - fix info leaks in report API
Three errors resulting in kernel memory disclosure:
1/ The structures used for the netlink based crypto algorithm report API
are located on the stack. As snprintf() does not fill the remainder of
the buffer with null bytes, those stack bytes will be disclosed to users
of th... | 9a5467bf7b6e9e02ec9c3da4e23747c05faeaac6 | linux | bigvul | 1 | null | null | null |
af_key: initialize satype in key_notify_policy_flush()
This field was left uninitialized. Some user daemons perform check against this
field.
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com> | 85dfb745ee40232876663ae206cba35f24ab2a40 | linux | bigvul | 1 | null | null | null |
af_key: fix info leaks in notify messages
key_notify_sa_flush() and key_notify_policy_flush() miss to initialize
the sadb_msg_reserved member of the broadcasted message and thereby
leak 2 bytes of heap memory to listeners. Fix that.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: Steffen Klassert <steffen.... | a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887 | linux | bigvul | 1 | null | null | null |
ipv6: ip6_sk_dst_check() must not assume ipv6 dst
It's possible to use AF_INET6 sockets and to connect to an IPv4
destination. After this, socket dst cache is a pointer to a rtable,
not rt6_info.
ip6_sk_dst_check() should check the socket dst cache is IPv6, or else
various corruptions/crashes can happen.
Dave Jones ... | a963a37d384d71ad43b3e9e79d68d42fbe0901f3 | linux | bigvul | 1 | null | null | null |
Change build files to generate version 3.2.0 | 4654f330317c9948bb61d138eb24d49690ca4637 | zrtpcpp | bigvul | 1 | null | null | null |
Fix a security issue in radius_get_vendor_attr().
The underlying rad_get_vendor_attr() function assumed that it would always be
given valid VSA data. Indeed, the buffer length wasn't even passed in; the
assumption was that the length field within the VSA structure would be valid.
This could result in denial of servic... | 13c149b051f82b709e8d7cc32111e84b49d57234 | php-radius | bigvul | 1 | null | null | null |
sctp: Use correct sideffect command in duplicate cookie handling
When SCTP is done processing a duplicate cookie chunk, it tries
to delete a newly created association. For that, it has to set
the right association for the side-effect processing to work.
However, when it uses the SCTP_CMD_NEW_ASOC command, that perfor... | f2815633504b442ca0b0605c16bf3d88a3a0fcea | linux | bigvul | 1 | null | null | null |
Curl_urldecode: no peeking beyond end of input buffer
Security problem: CVE-2013-2174
If a program would give a string like "%FF" to curl_easy_unescape() but
ask for it to decode only the first byte, it would still parse and
decode the full hex sequence. The function then not only read beyond the
allowed buffer but i... | 192c4f788d48f82c03e9cef40013f34370e90737 | curl | bigvul | 1 | null | null | null |
perf/x86: Fix offcore_rsp valid mask for SNB/IVB
The valid mask for both offcore_response_0 and
offcore_response_1 was wrong for SNB/SNB-EP,
IVB/IVB-EP. It was possible to write to
reserved bit and cause a GP fault crashing
the kernel.
This patch fixes the problem by correctly marking the
reserved bits in the valid m... | f1923820c447e986a9da0fc6bf60c1dccdf0408e | linux | bigvul | 1 | null | null | null |
kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
This fixes a kernel memory contents leak via the tkill and tgkill syscalls
for compat processes.
This is visible in the siginfo_t->_sifields._rt.si_sigval.sival_ptr field
when handling signals delivered from tkill.
The place of the infoleak:
int ... | b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f | linux | bigvul | 1 | null | null | null |
xen/blkback: Check device permissions before allowing OP_DISCARD
We need to make sure that the device is not RO or that
the request is not past the number of sectors we want to
issue the DISCARD operation for.
This fixes CVE-2013-2140.
Cc: stable@vger.kernel.org
Acked-by: Jan Beulich <JBeulich@suse.com>
Acked-by: Ia... | 604c499cbbcc3d5fe5fb8d53306aa0fae1990109 | linux | bigvul | 1 | null | null | null |
net: Fix oops from tcp_collapse() when using splice()
tcp_read_sock() can have a eat skbs without immediately advancing copied_seq.
This can cause a panic in tcp_collapse() if it is called as a result
of the recv_actor dropping the socket lock.
A userspace program that splices data from a socket to either another
soc... | baff42ab1494528907bf4d5870359e31711746ae | linux | bigvul | 1 | null | null | null |
fixed wrong data_maximum calcluation; prevent out-of-buffer in exp_bef | 2f912f5b33582961b1cdbd9fd828589f8b78f21d | libraw | bigvul | 1 | null | null | null |
prevent double-free() on broken full-color images error handling | 19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6 | libraw | bigvul | 1 | null | null | null |
perf: Treat attr.config as u64 in perf_swevent_init()
Trinity discovered that we fail to check all 64 bits of
attr.config passed by user space, resulting to out-of-bounds
access of the perf_swevent_enabled array in
sw_perf_event_destroy().
Introduced in commit b0a873ebb ("perf: Register PMU
implementations").
Signed... | 8176cced706b5e5d15887584150764894e94e02f | linux | bigvul | 1 | null | null | null |
Use constant time memcmp when comparing HMACs in openvpn_decrypt.
Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
Signed-off-by: Gert Doering <gert@greenie.muc.de> | 11d21349a4e7e38a025849479b36ace7c2eec2ee | openvpn | bigvul | 1 | null | null | null |
usb: chipidea: Allow disabling streaming not only in udc mode
When running a scp transfer using a USB/Ethernet adapter the following crash
happens:
$ scp test.tar.gz fabio@192.168.1.100:/home/fabio
fabio@192.168.1.100's password:
test.tar.gz 0% 0 0.0KB/s --:-- ETA
-------... | 929473ea05db455ad88cdc081f2adc556b8dc48f | linux | bigvul | 1 | null | null | null |
pdf: bb #7053 | 24ff855c82d3f5c62bc5788a5776cefbffce2971 | clamav-devel | bigvul | 1 | null | null | null |
libclamav: bb #7055 | 270e368b99e93aa5447d46c797c92c3f9f39f375 | clamav-devel | bigvul | 1 | null | null | null |
veth: Dont kfree_skb() after dev_forward_skb()
In case of congestion, netif_rx() frees the skb, so we must assume
dev_forward_skb() also consume skb.
Bug introduced by commit 445409602c092
(veth: move loopback logic to common location)
We must change dev_forward_skb() to always consume skb, and veth to not
double fr... | 6ec82562ffc6f297d0de36d65776cff8e5704867 | linux | bigvul | 1 | null | null | null |
ext4: avoid hang when mounting non-journal filesystems with orphan list
When trying to mount a file system which does not contain a journal,
but which does have a orphan list containing an inode which needs to
be truncated, the mount call with hang forever in
ext4_orphan_cleanup() because ext4_orphan_del() will return... | 0e9a9a1ad619e7e987815d20262d36a2f95717ca | linux | bigvul | 1 | null | null | null |
net: fix incorrect credentials passing
Commit 257b5358b32f ("scm: Capture the full credentials of the scm
sender") changed the credentials passing code to pass in the effective
uid/gid instead of the real uid/gid.
Obviously this doesn't matter most of the time (since normally they are
the same), but it results in dif... | 83f1b4ba917db5dc5a061a44b3403ddb6e783494 | linux | bigvul | 1 | null | null | null |
userns: Don't let unprivileged users trick privileged users into setting the id_map
When we require privilege for setting /proc/<pid>/uid_map or
/proc/<pid>/gid_map no longer allow an unprivileged user to
open the file and pass it to a privileged program to write
to the file.
Instead when privilege is required requir... | 6708075f104c3c9b04b23336bb0366ca30c3931b | linux | bigvul | 1 | null | null | null |
scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids.
Don't allow spoofing pids over unix domain sockets in the corner
cases where a user has created a user namespace but has not yet
created a pid namespace.
Cc: stable@vger.kernel.org
Reported-by: Andy Lutomirski <luto@amacapital.net>
Signed-off-by: "Eric ... | 92f28d973cce45ef5823209aab3138eb45d8b349 | linux | bigvul | 1 | null | null | null |
vfs: Carefully propogate mounts across user namespaces
As a matter of policy MNT_READONLY should not be changable if the
original mounter had more privileges than creator of the mount
namespace.
Add the flag CL_UNPRIVILEGED to note when we are copying a mount from
a mount namespace that requires more privileges to a ... | 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9 | linux | bigvul | 1 | null | null | null |
userns: Don't allow creation if the user is chrooted
Guarantee that the policy of which files may be access that is
established by setting the root directory will not be violated
by user namespaces by verifying that the root directory points
to the root of the mount namespace at the time of user namespace
creation.
... | 3151527ee007b73a0ebd296010f1c0454a919c7d | linux | bigvul | 1 | null | null | null |
cookie: fix tailmatching to prevent cross-domain leakage
Cookies set for 'example.com' could accidentaly also be sent by libcurl
to the 'bexample.com' (ie with a prefix to the first domain name).
This is a security vulnerabilty, CVE-2013-1944.
Bug: http://curl.haxx.se/docs/adv_20130412.html | 2eb8dcf26cb37f09cffe26909a646e702dbcab66 | curl | bigvul | 1 | null | null | null |
KVM: Validate userspace_addr of memslot when registered
This way, we can avoid checking the user space address many times when
we read the guest memory.
Although we can do the same for write if we check which slots are
writable, we do not care write now: reading the guest memory happens
more often than writing.
[avi... | fa3d315a4ce2c0891cdde262562e710d95fba19e | linux | bigvul | 1 | null | null | null |
tg3: fix length overflow in VPD firmware parsing
Commit 184b89044fb6e2a74611dafa69b1dce0d98612c6 ("tg3: Use VPD fw version
when present") introduced VPD parsing that contained a potential length
overflow.
Limit the hardware's reported firmware string length (max 255 bytes) to
stay inside the driver's firmware string ... | 715230a44310a8cf66fbfb5a46f9a62a9b2de424 | linux | bigvul | 1 | null | null | null |
fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check
The compat ioctl for VIDEO_SET_SPU_PALETTE was missing an error check
while converting ioctl arguments. This could lead to leaking kernel
stack contents into userspace.
Patch extracted from existing fix in grsecurity.
Signed-off-by: Kees Cook <keescook@ch... | 12176503366885edd542389eed3aaf94be163fdb | linux | bigvul | 1 | null | null | null |
Added SecXmlExternalEntity | d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe | modsecurity | bigvul | 1 | null | null | null |
USB: cdc-wdm: fix buffer overflow
The buffer for responses must not overflow.
If this would happen, set a flag, drop the data and return
an error after user space has read all remaining data.
Signed-off-by: Oliver Neukum <oliver@neukum.org>
CC: stable@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundati... | c0f5ecee4e741667b2493c742b60b6218d40b3aa | linux | bigvul | 1 | null | null | null |
userns: Don't allow CLONE_NEWUSER | CLONE_FS
Don't allowing sharing the root directory with processes in a
different user namespace. There doesn't seem to be any point, and to
allow it would require the overhead of putting a user namespace
reference in fs_struct (for permission checks) and incrementing that
reference... | e66eded8309ebf679d3d3c1f5820d1f2ca332c71 | linux | bigvul | 1 | null | null | null |
ext3: Fix format string issues
ext3_msg() takes the printk prefix as the second parameter and the
format string as the third parameter. Two callers of ext3_msg omit the
prefix and pass the format string as the second parameter and the first
parameter to the format string as the third parameter. In both cases
this stri... | 8d0c2d10dd72c5292eda7a06231056a4c972e4cc | linux | bigvul | 1 | null | null | null |
net/sctp: Validate parameter size for SCTP_GET_ASSOC_STATS
Building sctp may fail with:
In function ‘copy_from_user’,
inlined from ‘sctp_getsockopt_assoc_stats’ at
net/sctp/socket.c:5656:20:
arch/x86/include/asm/uaccess_32.h:211:26: error: call to
‘copy_from_user_overflow’ declared with attribute error: c... | 726bc6b092da4c093eb74d13c07184b18c1af0f1 | linux | bigvul | 1 | null | null | null |
dccp: check ccid before dereferencing
ccid_hc_rx_getsockopt() and ccid_hc_tx_getsockopt() might be called with
a NULL ccid pointer leading to a NULL pointer dereference. This could
lead to a privilege escalation if the attacker is able to map page 0 and
prepare it with a fake ccid_ops pointer.
Signed-off-by: Mathias ... | 276bdb82dedb290511467a5a4fdbe9f0b52dce6f | linux | bigvul | 1 | null | null | null |
xfrm_user: return error pointer instead of NULL
When dump_one_state() returns an error, e.g. because of a too small
buffer to dump the whole xfrm state, xfrm_state_netlink() returns NULL
instead of an error pointer. But its callers expect an error pointer
and therefore continue to operate on a NULL skbuff.
This could... | 864745d291b5ba80ea0bd0edcbe67273de368836 | linux | bigvul | 1 | null | null | null |
xfs: fix _xfs_buf_find oops on blocks beyond the filesystem end
When _xfs_buf_find is passed an out of range address, it will fail
to find a relevant struct xfs_perag and oops with a null
dereference. This can happen when trying to walk a filesystem with a
metadata inode that has a partially corrupted extent map (i.e.... | eb178619f930fa2ba2348de332a1ff1c66a31424 | linux | bigvul | 1 | null | null | null |
KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798)
If the guest specifies a IOAPIC_REG_SELECT with an invalid value and follows
that with a read of the IOAPIC_REG_WINDOW KVM does not properly validate
that request. ioapic_read_indirect contains an
ASSERT(redir_index < IOAPIC_NUM_PINS), but the... | a2c118bfab8bc6b8bb213abfc35201e441693d55 | linux | bigvul | 1 | null | null | null |
KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797)
There is a potential use after free issue with the handling of
MSR_KVM_SYSTEM_TIME. If the guest specifies a GPA in a movable or removable
memory such as frame buffers then KVM might continue to write to that
address even after it... | 0b79459b482e85cb7426aa7da683a9f2c97aeae1 | linux | bigvul | 1 | null | null | null |
KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796)
If the guest sets the GPA of the time_page so that the request to update the
time straddles a page then KVM will write onto an incorrect page. The
write is done byusing kmap atomic to get a pointer to the page for the time
structure ... | c300aa64ddf57d9c5d9c898a64b36877345dd4a9 | linux | bigvul | 1 | null | null | null |
keys: fix race with concurrent install_user_keyrings()
This fixes CVE-2013-1792.
There is a race in install_user_keyrings() that can cause a NULL pointer
dereference when called concurrently for the same user if the uid and
uid-session keyrings are not yet created. It might be possible for an
unprivileged user to tr... | 0da9dfdd2cd9889201bc6f6f43580c99165cd087 | linux | bigvul | 1 | null | null | null |
USB: io_ti: Fix NULL dereference in chase_port()
The tty is NULL when the port is hanging up.
chase_port() needs to check for this.
This patch is intended for stable series.
The behavior was observed and tested in Linux 3.2 and 3.7.1.
Johan Hovold submitted a more elaborate patch for the mainline kernel.
[ 56.277... | 1ee0a224bc9aad1de496c795f96bc6ba2c394811 | linux | bigvul | 1 | null | null | null |
NLS: improve UTF8 -> UTF16 string conversion routine
The utf8s_to_utf16s conversion routine needs to be improved. Unlike
its utf16s_to_utf8s sibling, it doesn't accept arguments specifying
the maximum length of the output buffer or the endianness of its
16-bit output.
This patch (as1501) adds the two missing argumen... | 0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd | linux | bigvul | 1 | null | null | null |
printk: fix buffer overflow when calling log_prefix function from call_console_drivers
This patch corrects a buffer overflow in kernels from 3.0 to 3.4 when calling
log_prefix() function from call_console_drivers().
This bug existed in previous releases but has been revealed with commit
162a7e7500f9664636e649ba59defe... | ce0030c00f95cf9110d9cdcd41e901e1fb814417 | linux | bigvul | 1 | null | null | null |
tmpfs: fix use-after-free of mempolicy object
The tmpfs remount logic preserves filesystem mempolicy if the mpol=M
option is not specified in the remount request. A new policy can be
specified if mpol=M is given.
Before this patch remounting an mpol bound tmpfs without specifying
mpol= mount option in the remount re... | 5f00110f7273f9ff04ac69a5f85bb535a4fd0987 | linux | bigvul | 1 | null | null | null |
sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
Userland can send a netlink message requesting SOCK_DIAG_BY_FAMILY
with a family greater or equal then AF_MAX -- the array size of
sock_diag_handlers[]. The current code does not test for this
condition therefore is vulnerable to an out-of-bound access openin... | 6e601a53566d84e1ffd25e7b6fe0b6894ffd79c0 | linux | bigvul | 1 | null | null | null |
cumulated data checks patch | 11909cc59e712e09b508dda729b99aeaac2b29ad | libraw | bigvul | 1 | null | null | null |
Drop packets forwarded via TCP if they are too big (CVE-2013-1428).
Normally all requests sent via the meta connections are checked so that they
cannot be larger than the input buffer. However, when packets are forwarded via
meta connections, they are copied into a packet buffer without checking whether
it fits into i... | 17a33dfd95b1a29e90db76414eb9622df9632320 | tinc | bigvul | 1 | null | null | null |
KDC null deref due to referrals [CVE-2013-1417]
An authenticated remote client can cause a KDC to crash by making a
valid TGS-REQ to a KDC serving a realm with a single-component name.
The process_tgs_req() function dereferences a null pointer because an
unusual failure condition causes a helper function to return suc... | 4c023ba43c16396f0d199e2df1cfa59b88b62acc | krb5 | bigvul | 1 | null | null | null |
KDC TGS-REQ null deref [CVE-2013-1416]
By sending an unusual but valid TGS-REQ, an authenticated remote
attacker can cause the KDC process to crash by dereferencing a null
pointer.
prep_reprocess_req() can cause a null pointer dereference when
processing a service principal name. Code in this function can
inappropri... | 8ee70ec63931d1e38567905387ab9b1d45734d81 | krb5 | bigvul | 1 | null | null | null |
PKINIT null pointer deref [CVE-2013-1415]
Don't dereference a null pointer when cleaning up.
The KDC plugin for PKINIT can dereference a null pointer when a
malformed packet causes processing to terminate early, leading to
a crash of the KDC process. An attacker would need to have a valid
PKINIT certificate or have ... | f249555301940c6df3a2cdda13b56b5674eebc2e | krb5 | bigvul | 1 | null | null | null |
signal: always clear sa_restorer on execve
When the new signal handlers are set up, the location of sa_restorer is
not cleared, leaking a parent process's address space location to
children. This allows for a potential bypass of the parent's ASLR by
examining the sa_restorer value returned when calling sigaction().
... | 2ca39528c01a933f6689cd6505ce65bd6d68a530 | linux | bigvul | 1 | null | null | null |
ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL
putreg() assumes that the tracee is not running and pt_regs_access() can
safely play with its stack. However a killed tracee can return from
ptrace_stop() to the low-level asm code and do RESTORE_REST, this means
that debugger can actually read/mod... | 9899d11f654474d2d54ea52ceaa2a1f4db3abd68 | linux | bigvul | 1 | null | null | null |
Bluetooth: Fix incorrect strncpy() in hidp_setup_hid()
The length parameter should be sizeof(req->name) - 1 because there is no
guarantee that string provided by userspace will contain the trailing
'\0'.
Can be easily reproduced by manually setting req->name to 128 non-zero
bytes prior to ioctl(HIDPCONNADD) and check... | 0a9ab9bdb3e891762553f667066190c1d22ad62b | linux | bigvul | 1 | null | null | null |
evm: checking if removexattr is not a NULL
The following lines of code produce a kernel oops.
fd = socket(PF_FILE, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
fchmod(fd, 0666);
[ 139.922364] BUG: unable to handle kernel NULL pointer dereference at (null)
[ 139.924982] IP: [< (null)>] (null)
[ 139.924982] *pd... | a67adb997419fb53540d4a4f79c6471c60bc69b6 | linux | bigvul | 1 | null | null | null |
vhost: fix length for cross region descriptor
If a single descriptor crosses a region, the
second chunk length should be decremented
by size translated so far, instead it includes
the full descriptor length.
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Acked-by: Jason Wang <jasowang@redhat.com>
Signed-off-by: D... | bd97120fc3d1a11f3124c7c9ba1d91f51829eb85 | linux | bigvul | 1 | null | null | null |
cipso: don't follow a NULL pointer when setsockopt() is called
As reported by Alan Cox, and verified by Lin Ming, when a user
attempts to add a CIPSO option to a socket using the CIPSO_V4_TAG_LOCAL
tag the kernel dies a terrible death when it attempts to follow a NULL
pointer (the skb argument to cipso_v4_validate() i... | 89d7ae34cdda4195809a5a987f697a517a2a3177 | linux | bigvul | 1 | null | null | null |
mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP
In many places !pmd_present has been converted to pmd_none. For pmds
that's equivalent and pmd_none is quicker so using pmd_none is better.
However (unless we delete pmd_present) we should provide an accurate
pmd_present too. This will avoid the ri... | 027ef6c87853b0a9df53175063028edb4950d476 | linux | bigvul | 1 | null | null | null |
net: fix infinite loop in __skb_recv_datagram()
Tommi was fuzzing with trinity and reported the following problem :
commit 3f518bf745 (datagram: Add offset argument to __skb_recv_datagram)
missed that a raw socket receive queue can contain skbs with no payload.
We can loop in __skb_recv_datagram() with MSG_PEEK mode... | 77c1090f94d1b0b5186fb13a1b71b47b1343f87f | linux | bigvul | 1 | null | null | null |
High: core: Internal tls api improvements for reuse with future LRMD tls backend. | 564f7cc2a51dcd2f28ab12a13394f31be5aa3c93 | pacemaker | bigvul | 1 | null | null | null |
x86/msr: Add capabilities check
At the moment the MSR driver only relies upon file system
checks. This means that anything as root with any capability set
can write to MSRs. Historically that wasn't very interesting but
on modern processors the MSRs are such that writing to them
provides several ways to execute arbita... | c903f0456bc69176912dee6dd25c6a66ee1aed00 | linux | bigvul | 1 | null | null | null |
x86/xen: don't assume %ds is usable in xen_iret for 32-bit PVOPS.
This fixes CVE-2013-0228 / XSA-42
Drew Jones while working on CVE-2013-0190 found that that unprivileged guest user
in 32bit PV guest can use to crash the > guest with the panic like this:
-------------
general protection fault: 0000 [#1] SMP
last sys... | 13d2b4d11d69a92574a55bfd985cfb0ca77aebdc | linux | bigvul | 1 | null | null | null |
xen/netback: don't leak pages on failure in xen_netbk_tx_check_gop.
Signed-off-by: Matthew Daley <mattjd@gmail.com>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Acked-by: Jan Beulich <JBeulich@suse.com>
Signed-off-by: David S. Miller <davem@davemloft.net> | 7d5145d8eb2b9791533ffe4dc003b129b9696c48 | linux | bigvul | 1 | null | null | null |
xen/netback: shutdown the ring if it contains garbage.
A buggy or malicious frontend should not be able to confuse netback.
If we spot anything which is not as it should be then shutdown the
device and don't try to continue with the ring in a potentially
hostile state. Well behaved and non-hostile frontends will not b... | 48856286b64e4b66ec62b94e504d0b29c1ade664 | linux | bigvul | 1 | null | null | null |
Limit write requests to at most INT_MAX.
This prevents a certain common programming error (passing -1 to write)
from leading to other problems deeper in the library. | 22531545514043e04633e1c015c7540b9de9dbe4 | libarchive | bigvul | 1 | null | null | null |
isofs: avoid info leak on export
For type 1 the parent_offset member in struct isofs_fid gets copied
uninitialized to userland. Fix this by initializing it to 0.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Signed-off-by: Jan Kara <jack@suse.cz> | fe685aabf7c8c9f138e5ea900954d295bf229175 | linux | bigvul | 1 | null | null | null |
udf: avoid info leak on export
For type 0x51 the udf.parent_partref member in struct fid gets copied
uninitialized to userland. Fix this by initializing it to 0.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Signed-off-by: Jan Kara <jack@suse.cz> | 0143fc5e9f6f5aad4764801015bc8d4b4a278200 | linux | bigvul | 1 | null | null | null |
net/tun: fix ioctl() based info leaks
The tun module leaks up to 36 bytes of memory by not fully initializing
a structure located on the stack that gets copied to user memory by the
TUNGETIFF and SIOCGIFHWADDR ioctl()s.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Signed-off-by: David S. Miller <davem@davem... | a117dacde0288f3ec60b6e5bcedae8fa37ee0dfc | linux | bigvul | 1 | null | null | null |
atm: fix info leak in getsockopt(SO_ATMPVC)
The ATM code fails to initialize the two padding bytes of struct
sockaddr_atmpvc inserted for alignment. Add an explicit memset(0)
before filling the structure to avoid the info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Signed-off-by: David S. Miller <dav... | e862f1a9b7df4e8196ebec45ac62295138aa3fc2 | linux | bigvul | 1 | null | null | null |
Bluetooth: RFCOMM - Fix info leak via getsockname()
The RFCOMM code fails to initialize the trailing padding byte of struct
sockaddr_rc added for alignment. It that for leaks one byte kernel stack
via the getsockname() syscall. Add an explicit memset(0) before filling
the structure to avoid the info leak.
Signed-off-... | 9344a972961d1a6d2c04d9008b13617bcb6ec2ef | linux | bigvul | 1 | null | null | null |
Bluetooth: HCI - Fix info leak in getsockopt(HCI_FILTER)
The HCI code fails to initialize the two padding bytes of struct
hci_ufilter before copying it to userland -- that for leaking two
bytes kernel stack. Add an explicit memset(0) before filling the
structure to avoid the info leak.
Signed-off-by: Mathias Krause <... | e15ca9a0ef9a86f0477530b0f44a725d67f889ee | linux | bigvul | 1 | null | null | null |
l2tp: fix info leak via getsockname()
The L2TP code for IPv6 fails to initialize the l2tp_unused member of
struct sockaddr_l2tpip6 and that for leaks two bytes kernel stack via
the getsockname() syscall. Initialize l2tp_unused with 0 to avoid the
info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: J... | 04d4fbca1017c11381e7d82acea21dd741e748bc | linux | bigvul | 1 | null | null | null |
llc: fix info leak via getsockname()
The LLC code wrongly returns 0, i.e. "success", when the socket is
zapped. Together with the uninitialized uaddrlen pointer argument from
sys_getsockname this leads to an arbitrary memory leak of up to 128
bytes kernel stack via the getsockname() syscall.
Return an error instead w... | 3592aaeb80290bda0f2cf0b5456c97bfc638b192 | linux | bigvul | 1 | null | null | null |
dccp: fix info leak via getsockopt(DCCP_SOCKOPT_CCID_TX_INFO)
The CCID3 code fails to initialize the trailing padding bytes of struct
tfrc_tx_info added for alignment on 64 bit architectures. It that for
potentially leaks four bytes kernel stack via the getsockopt() syscall.
Add an explicit memset(0) before filling th... | 7b07f8eb75aa3097cdfd4f6eac3da49db787381d | linux | bigvul | 1 | null | null | null |
ipvs: fix info leak in getsockopt(IP_VS_SO_GET_TIMEOUT)
If at least one of CONFIG_IP_VS_PROTO_TCP or CONFIG_IP_VS_PROTO_UDP is
not set, __ip_vs_get_timeouts() does not fully initialize the structure
that gets copied to userland and that for leaks up to 12 bytes of kernel
stack. Add an explicit memset(0) before passing... | 2d8a041b7bfe1097af21441cb77d6af95f4f4680 | linux | bigvul | 1 | null | null | null |
net: fix info leak in compat dev_ifconf()
The implementation of dev_ifconf() for the compat ioctl interface uses
an intermediate ifc structure allocated in userland for the duration of
the syscall. Though, it fails to initialize the padding bytes inserted
for alignment and that for leaks four bytes of kernel stack. Ad... | 43da5f2e0d0c69ded3d51907d9552310a6b545e8 | linux | bigvul | 1 | null | null | null |
xfrm_user: fix info leak in copy_to_user_auth()
copy_to_user_auth() fails to initialize the remainder of alg_name and
therefore discloses up to 54 bytes of heap memory via netlink to
userland.
Use strncpy() instead of strcpy() to fill the trailing bytes of alg_name
with null bytes.
Signed-off-by: Mathias Krause <min... | 4c87308bdea31a7b4828a51f6156e6f721a1fcc9 | linux | bigvul | 1 | null | null | null |
xfrm_user: fix info leak in copy_to_user_state()
The memory reserved to dump the xfrm state includes the padding bytes of
struct xfrm_usersa_info added by the compiler for alignment (7 for
amd64, 3 for i386). Add an explicit memset(0) before filling the buffer
to avoid the info leak.
Signed-off-by: Mathias Krause <mi... | f778a636713a435d3a922c60b1622a91136560c1 | linux | bigvul | 1 | null | null | null |
xfrm_user: ensure user supplied esn replay window is valid
The current code fails to ensure that the netlink message actually
contains as many bytes as the header indicates. If a user creates a new
state or updates an existing one but does not supply the bytes for the
whole ESN replay window, the kernel copies random ... | ecd7918745234e423dd87fcc0c077da557909720 | linux | bigvul | 1 | null | null | null |
Btrfs: fix hash overflow handling
The handling for directory crc hash overflows was fairly obscure,
split_leaf returns EOVERFLOW when we try to extend the item and that is
supposed to bubble up to userland. For a while it did so, but along the
way we added better handling of errors and forced the FS readonly if we
hi... | 9c52057c698fb96f8f07e7a4bcf4801a092bda89 | linux | bigvul | 1 | null | null | null |
exec: do not leave bprm->interp on stack
If a series of scripts are executed, each triggering module loading via
unprintable bytes in the script header, kernel stack contents can leak
into the command line.
Normally execution of binfmt_script and binfmt_misc happens recursively.
However, when modules are enabled, and... | b66c5984017533316fd1951770302649baf1aa33 | linux | bigvul | 1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.