commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
posix-timers: Sanitize overrun handling
The posix timer overrun handling is broken because the forwarding functions
can return a huge number of overruns which does not fit in an int. As a
consequence timer_getoverrun(2) and siginfo::si_overrun can turn into
random number generators.
The k_clock::timer_forward() callbacks return a 64 bit value now. Make
k_itimer::ti_overrun[_last] 64bit as well, so the kernel internal
accounting is correct. 3Remove the temporary (int) casts.
Add a helper function which clamps the overrun value returned to user space
via timer_getoverrun(2) or siginfo::si_overrun limited to a positive value
between 0 and INT_MAX. INT_MAX is an indicator for user space that the
overrun value has been clamped.
Reported-by: Team OWL337 <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Acked-by: John Stultz <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: Michael Kerrisk <[email protected]>
Link: https://lkml.kernel.org/r/[email protected] | 78c9c4dfbf8c04883941445a195276bb4bb92c76 | linux | bigvul | 1 | null | null | null |
Merge tag 'trace-v4.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace
Pull tracing fixes from Steven Rostedt:
"This contains a few fixes and a clean up.
- a bad merge caused an "endif" to go in the wrong place in
scripts/Makefile.build
- softirq tracing fix for tracing that corrupts lockdep and causes a
false splat
- histogram documentation typo fixes
- fix a bad memory reference when passing in no filter to the filter
code
- simplify code by using the swap macro instead of open coding the
swap"
* tag 'trace-v4.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace:
tracing: Fix SKIP_STACK_VALIDATION=1 build due to bad merge with -mrecord-mcount
tracing: Fix some errors in histogram documentation
tracing: Use swap macro in update_max_tr
softirq: Reorder trace_softirqs_on to prevent lockdep splat
tracing: Check for no filter when processing event filters | 81f9c4e4177d31ced6f52a89bb70e93bfb77ca03 | linux | bigvul | 1 | null | null | null |
Issue #1689: create unique temporary file with g_file_open_tmp().
Not sure this is really solving the issue reported, which is that
`g_get_tmp_dir()` uses environment variables (yet as g_file_open_tmp()
uses g_get_tmp_dir()…). But at least g_file_open_tmp() should create
unique temporary files, which prevents overriding existing files (which
is most likely the only real attack possible here, or at least the only
one I can think of unless some weird vulnerabilities exist in glib). | c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f | gimp | bigvul | 1 | null | null | null |
Check length of memcmp | 8fd069f6dedb064339f1091069ac96f3f8bdb552 | civetweb | bigvul | 1 | null | null | null |
virt: vbox: Only copy_from_user the request-header once
In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from
the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the
'version', 'size_in', and 'size_out' fields of 'hdr' are verified.
Before this commit, after the checks a buffer for the entire request would
be allocated and then all data including the verified header would be
copied from the userspace 'arg' pointer again.
Given that the 'arg' pointer resides in userspace, a malicious userspace
process can race to change the data pointed to by 'arg' between the two
copies. By doing so, the user can bypass the verifications on the ioctl
argument.
This commit fixes this by using the already checked copy of the header
to fill the header part of the allocated buffer and only copying the
remainder of the data from userspace.
Signed-off-by: Wenwen Wang <[email protected]>
Reviewed-by: Hans de Goede <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]> | bd23a7269834dc7c1f93e83535d16ebc44b75eba | linux | bigvul | 1 | null | null | null |
ExecHelperMain: fix privilege lowering code | 4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8 | passenger | bigvul | 1 | null | null | null |
-fixed an issue where the stack could crash if a TCP based sender sends a Content-Length that is less that the actual SIP body transmitted
in order to trigger this condition the SIP message body must arrive in a separate read request, either from the start or part way through the body
and there must be data following the body in the same read. | 2cb291191c93c7c4e371e22cb89805a5b31d6608 | resiprocate | bigvul | 1 | null | null | null |
Remove internal Samba shre mounting code, this had some privilege escalation issues, and is not well tested | afc4f8315d3e96574925fb530a7004cc9e6ce3d3 | cantata | bigvul | 1 | null | null | null |
avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile
These 2 fields are not always the same, it is simpler to always use the same field
for detecting studio profile
Fixes: null pointer dereference
Fixes: ffmpeg_crash_3.avi
Found-by: Thuan Pham <[email protected]>, Marcel Böhme, Andrew Santosa and Alexandru RazvanCaciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <[email protected]> | b3332a182f8ba33a34542e4a0370f38b914ccf7d | ffmpeg | bigvul | 1 | null | null | null |
avcodec/mpeg4videodec: Clear bits_per_raw_sample if it has originated from a previous instance
Fixes: assertion failure
Fixes: ffmpeg_crash_5.avi
Found-by: Thuan Pham <[email protected]>, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <[email protected]> | 2fc108f60f98cd00813418a8754a46476b404a3c | ffmpeg | bigvul | 1 | null | null | null |
avcodec/mpeg4videoenc: Use 64 bit for times in mpeg4_encode_gop_header()
Fixes truncation
Fixes Assertion n <= 31 && value < (1U << n) failed at libavcodec/put_bits.h:169
Fixes: ffmpeg_crash_2.avi
Found-by: Thuan Pham <[email protected]>, Marcel Böhme, Andrew Santosa and Alexandru RazvanCaciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <[email protected]> | e1182fac1afba92a4975917823a5f644bee7e6e8 | ffmpeg | bigvul | 1 | null | null | null |
Abort in XGROUP if the key is not a stream | c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | redis | bigvul | 1 | null | null | null |
Change ECDSA signing to use blinding. | 9b9568d500f31f964af26ba8d01e542e1f27e5ca | wolfssl | bigvul | 1 | null | null | null |
Address DSA/ECDSA side channel | 48fc8df51d99f9d8ba251219367b3d629cc848e3 | botan | bigvul | 1 | null | null | null |
Security: fix redis-cli buffer overflow.
Thanks to Fakhri Zulkifli for reporting it.
The fix switched to dynamic allocation, copying the final prompt in the
static buffer only at the end. | 9fdcc15962f9ff4baebe6fdd947816f43f730d50 | redis | bigvul | 1 | null | null | null |
Fix #10294 - crash in r2_hoobr__6502_op | bbb4af56003c1afdad67af0c4339267ca38b1017 | radare2 | bigvul | 1 | null | null | null |
Fix #10296 - Heap out of bounds read in java_switch_op() | 224e6bc13fa353dd3b7f7a2334588f1c4229e58d | radare2 | bigvul | 1 | null | null | null |
Fix #10293 - Use-after-free in r_anal_bb_free() | 90b71c017a7fa9732fe45fd21b245ee051b1f548 | radare2 | bigvul | 1 | null | null | null |
`mrb_class_real()` did not work for `BasicObject`; fix #4037 | faa4eaf6803bd11669bc324b4c34e7162286bfa3 | mruby | bigvul | 1 | null | null | null |
Extend stack when pushing arguments that does not fit in; fix #4038 | 778500563a9f7ceba996937dc886bd8cde29b42b | mruby | bigvul | 1 | null | null | null |
Allow `Object#clone` to copy frozen status only; fix #4036
Copying all flags from the original object may overwrite the clone's
flags e.g. the embedded flag. | 55edae0226409de25e59922807cb09acb45731a2 | mruby | bigvul | 1 | null | null | null |
socket: close race condition between sock_close() and sockfs_setattr()
fchownat() doesn't even hold refcnt of fd until it figures out
fd is really needed (otherwise is ignored) and releases it after
it resolves the path. This means sock_close() could race with
sockfs_setattr(), which leads to a NULL pointer dereference
since typically we set sock->sk to NULL in ->release().
As pointed out by Al, this is unique to sockfs. So we can fix this
in socket layer by acquiring inode_lock in sock_close() and
checking against NULL in sockfs_setattr().
sock_release() is called in many places, only the sock_close()
path matters here. And fortunately, this should not affect normal
sock_close() as it is only called when the last fd refcnt is gone.
It only affects sock_close() with a parallel sockfs_setattr() in
progress, which is not common.
Fixes: 86741ec25462 ("net: core: Add a UID field to struct sock.")
Reported-by: shankarapailoor <[email protected]>
Cc: Tetsuo Handa <[email protected]>
Cc: Lorenzo Colitti <[email protected]>
Cc: Al Viro <[email protected]>
Signed-off-by: Cong Wang <[email protected]>
Signed-off-by: David S. Miller <[email protected]> | 6d8c50dcb029872b298eea68cc6209c866fd3e14 | linux | bigvul | 1 | null | null | null |
Should not call `initialize_copy` for `TT_ICLASS`; fix #4027
Since `TT_ICLASS` is a internal object that should never be revealed
to Ruby world. | b64ce17852b180dfeea81cf458660be41a78974d | mruby | bigvul | 1 | null | null | null |
Fix bug if using an undefined member of an object for for..in (fix #1437) | bf4416ab9129ee3afd56739ea4e3cd0da5484b6b | espruino | bigvul | 1 | null | null | null |
Fix stack overflow if interpreting a file full of '{' (fix #1448) | 51380baf17241728b6d48cdb84140b931e3e3cc5 | espruino | bigvul | 1 | null | null | null |
fix jsvGetString regression | ce1924193862d58cb43d3d4d9dada710a8361b89 | espruino | bigvul | 1 | null | null | null |
Fix strncat/cpy bounding issues (fix #1425) | 0a7619875bf79877907205f6bee08465b89ff10b | espruino | bigvul | 1 | null | null | null |
Fix stack overflow if void void void... is repeated many times (fix #1434) | c36d30529118aa049797db43f111ddad468aad29 | espruino | bigvul | 1 | null | null | null |
remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426) | bed844f109b6c222816740555068de2e101e8018 | espruino | bigvul | 1 | null | null | null |
Add height check for Graphics.createArrayBuffer(...vertical_byte:true) (fix #1421) | 8a44b04b584b3d3ab1cb68fed410f7ecb165e50e | espruino | bigvul | 1 | null | null | null |
Add sanity check for debug trace print statement (fix #1420) | b6d362f6a1f2de0b3e7604848116efb509196bf4 | espruino | bigvul | 1 | null | null | null |
Fix stack size detection on Linux (fix #1427) | a0d7f432abee692402c00e8b615ff5982dde9780 | espruino | bigvul | 1 | null | null | null |
compat: fix 4-byte infoleak via uninitialized struct field
Commit 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to
native counterparts") removed the memset() in compat_get_timex(). Since
then, the compat adjtimex syscall can invoke do_adjtimex() with an
uninitialized ->tai.
If do_adjtimex() doesn't write to ->tai (e.g. because the arguments are
invalid), compat_put_timex() then copies the uninitialized ->tai field
to userspace.
Fix it by adding the memset() back.
Fixes: 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to native counterparts")
Signed-off-by: Jann Horn <[email protected]>
Acked-by: Kees Cook <[email protected]>
Acked-by: Al Viro <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]> | 0a0b98734479aa5b3c671d5190e86273372cab95 | linux | bigvul | 1 | null | null | null |
sr: pass down correctly sized SCSI sense buffer
We're casting the CDROM layer request_sense to the SCSI sense
buffer, but the former is 64 bytes and the latter is 96 bytes.
As we generally allocate these on the stack, we end up blowing
up the stack.
Fix this by wrapping the scsi_execute() call with a properly
sized sense buffer, and copying back the bits for the CDROM
layer.
Cc: [email protected]
Reported-by: Piotr Gabriel Kosinski <[email protected]>
Reported-by: Daniel Shapira <[email protected]>
Tested-by: Kees Cook <[email protected]>
Fixes: 82ed4db499b8 ("block: split scsi_request out of struct request")
Signed-off-by: Jens Axboe <[email protected]> | f7068114d45ec55996b9040e98111afa56e010fe | linux | bigvul | 1 | null | null | null |
Fix #9903 - oobread in RAnal.sh | 77c47cf873dd55b396da60baa2ca83bbd39e4add | radare2 | bigvul | 1 | null | null | null |
Fix #9943 - Invalid free on RAnal.avr | 9d348bcc2c4bbd3805e7eec97b594be9febbdf9a | radare2 | bigvul | 1 | null | null | null |
Fix #10091 - crash in AVR analysis | d04c78773f6959bcb427453f8e5b9824d5ba9eff | radare2 | bigvul | 1 | null | null | null |
Fix #9902 - Fix oobread in RBin.string_scan_range | 3fcf41ed96ffa25b38029449520c8d0a198745f3 | radare2 | bigvul | 1 | null | null | null |
Fix #9970 - heap oobread in mach0 parser (#10026) | 60208765887f5f008b3b9a883f3addc8bdb9c134 | radare2 | bigvul | 1 | null | null | null |
Fix crash in pe | 4e1cf0d3e6f6fe2552a269def0af1cd2403e266c | radare2 | bigvul | 1 | null | null | null |
Fix #9969 - Stack overflow in wasm disassembler | bd276ef2fd8ac3401e65be7c126a43175ccfbcd7 | radare2 | bigvul | 1 | null | null | null |
Fix invalid free in RAnal.avr | 25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4 | radare2 | bigvul | 1 | null | null | null |
Fix #9904 - crash in r2_hoobr_r_read_le32 (over 9000 entrypoints) and read_le oobread (#9923) | 1f37c04f2a762500222dda2459e6a04646feeedf | radare2 | bigvul | 1 | null | null | null |
Fix crash in anal.avr | 041e53cab7ca33481ae45ecd65ad596976d78e68 | radare2 | bigvul | 1 | null | null | null |
jpeg: Fix another possible buffer overrun
Found via the clang libfuzzer | ee58aff6918b8bbc3be29b9e3089485ea46ff956 | pdfgen | bigvul | 1 | null | null | null |
coresight: fix kernel panic caused by invalid CPU
Commit d52c9750f150 ("coresight: reset "enable_sink" flag when need be")
caused a kernel panic because of the using of an invalid value: after
'for_each_cpu(cpu, mask)', value of local variable 'cpu' become invalid,
causes following 'cpu_to_node' access invalid memory area.
This patch brings the deleted 'cpu = cpumask_first(mask)' back.
Panic log:
$ perf record -e cs_etm// ls
Unable to handle kernel paging request at virtual address fffe801804af4f10
pgd = ffff8017ce031600
[fffe801804af4f10] *pgd=0000000000000000, *pud=0000000000000000
Internal error: Oops: 96000004 [#1] SMP
Modules linked in:
CPU: 33 PID: 1619 Comm: perf Not tainted 4.7.1+ #16
Hardware name: Huawei Taishan 2280 /CH05TEVBA, BIOS 1.10 11/24/2016
task: ffff8017cb0c8400 ti: ffff8017cb154000 task.ti: ffff8017cb154000
PC is at tmc_alloc_etf_buffer+0x60/0xd4
LR is at tmc_alloc_etf_buffer+0x44/0xd4
pc : [<ffff000008633df8>] lr : [<ffff000008633ddc>] pstate: 60000145
sp : ffff8017cb157b40
x29: ffff8017cb157b40 x28: 0000000000000000
...skip...
7a60: ffff000008c64dc8 0000000000000006 0000000000000253 ffffffffffffffff
7a80: 0000000000000000 0000000000000000 ffff0000080872cc 0000000000000001
[<ffff000008633df8>] tmc_alloc_etf_buffer+0x60/0xd4
[<ffff000008632b9c>] etm_setup_aux+0x1dc/0x1e8
[<ffff00000816eed4>] rb_alloc_aux+0x2b0/0x338
[<ffff00000816a5e4>] perf_mmap+0x414/0x568
[<ffff0000081ab694>] mmap_region+0x324/0x544
[<ffff0000081abbe8>] do_mmap+0x334/0x3e0
[<ffff000008191150>] vm_mmap_pgoff+0xa4/0xc8
[<ffff0000081a9a30>] SyS_mmap_pgoff+0xb0/0x22c
[<ffff0000080872e4>] sys_mmap+0x18/0x28
[<ffff0000080843f0>] el0_svc_naked+0x24/0x28
Code: 912040a5 d0001c00 f873d821 911c6000 (b8656822)
---[ end trace 98933da8f92b0c9a ]---
Signed-off-by: Wang Nan <[email protected]>
Cc: Xia Kaixu <[email protected]>
Cc: Li Zefan <[email protected]>
Cc: Mathieu Poirier <[email protected]>
Cc: [email protected]
Cc: [email protected]
Fixes: d52c9750f150 ("coresight: reset "enable_sink" flag when need be")
Signed-off-by: Mathieu Poirier <[email protected]>
Cc: stable <[email protected]> # 4.10
Signed-off-by: Greg Kroah-Hartman <[email protected]> | f09444639099584bc4784dfcd85ada67c6f33e0f | linux | bigvul | 1 | null | null | null |
Security: fix Lua struct package offset handling.
After the first fix to the struct package I found another similar
problem, which is fixed by this patch. It could be reproduced easily by
running the following script:
return struct.unpack('f', "xxxxxxxxxxxxx",-3)
The above will access bytes before the 'data' pointer. | e89086e09a38cc6713bcd4b9c29abf92cf393936 | redis | bigvul | 1 | null | null | null |
Security: more cmsgpack fixes by @soloestoy.
@soloestoy sent me this additional fixes, after searching for similar
problems to the one reported in mp_pack(). I'm committing the changes
because it was not possible during to make a public PR to protect Redis
users and give Redis providers some time to patch their systems. | 5ccb6f7a791bf3490357b00a898885759d98bab0 | redis | bigvul | 1 | null | null | null |
cdrom: information leak in cdrom_ioctl_media_changed()
This cast is wrong. "cdi->capacity" is an int and "arg" is an unsigned
long. The way the check is written now, if one of the high 32 bits is
set then we could read outside the info->slots[] array.
This bug is pretty old and it predates git.
Reviewed-by: Christoph Hellwig <[email protected]>
Cc: [email protected]
Signed-off-by: Dan Carpenter <[email protected]>
Signed-off-by: Jens Axboe <[email protected]> | 9de4ee40547fd315d4a0ed1dd15a2fa3559ad707 | linux | bigvul | 1 | null | null | null |
mirror: prepend ./ to rm and chmod arguments to avoid URL recognition (fix #452) | a27e07d90a4608ceaf928b1babb27d4d803e1992 | lftp | bigvul | 1 | null | null | null |
delta: fix out-of-bounds read of delta
When computing the offset and length of the delta base, we repeatedly
increment the `delta` pointer without checking whether we have advanced
past its end already, which can thus result in an out-of-bounds read.
Fix this by repeatedly checking whether we have reached the end. Add a
test which would cause Valgrind to produce an error.
Reported-by: Riccardo Schirone <[email protected]>
Test-provided-by: Riccardo Schirone <[email protected]> | 9844d38bed10e9ff17174434b3421b227ae710f3 | libgit2 | bigvul | 1 | null | null | null |
delta: fix overflow when computing limit
When checking whether a delta base offset and length fit into the base
we have in memory already, we can trigger an overflow which breaks the
check. This would subsequently result in us reading memory from out of
bounds of the base.
The issue is easily fixed by checking for overflow when adding `off` and
`len`, thus guaranteeting that we are never indexing beyond `base_len`.
This corresponds to the git patch 8960844a7 (check patch_delta bounds
more carefully, 2006-04-07), which adds these overflow checks.
Reported-by: Riccardo Schirone <[email protected]> | c1577110467b701dcbcf9439ac225ea851b47d22 | libgit2 | bigvul | 1 | null | null | null |
Merge remote-tracking branch 'private/wip-mon-snap-caps' | 975528f632f73fbffa3f1fee304e3bbe3296cffc | ceph | bigvul | 1 | null | null | null |
fix "pixel overrun"
fixes #3 | cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e | ngiflib | bigvul | 1 | null | null | null |
check GIF image position and dimensions
fixes #1 | b588a2249c7abbfc52173e32ee11d6facef82f89 | ngiflib | bigvul | 1 | null | null | null |
mm/mempolicy: fix use after free when calling get_mempolicy
I hit a use after free issue when executing trinity and repoduced it
with KASAN enabled. The related call trace is as follows.
BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766
Read of size 2 by task syz-executor1/798
INFO: Allocated in mpol_new.part.2+0x74/0x160 age=3 cpu=1 pid=799
__slab_alloc+0x768/0x970
kmem_cache_alloc+0x2e7/0x450
mpol_new.part.2+0x74/0x160
mpol_new+0x66/0x80
SyS_mbind+0x267/0x9f0
system_call_fastpath+0x16/0x1b
INFO: Freed in __mpol_put+0x2b/0x40 age=4 cpu=1 pid=799
__slab_free+0x495/0x8e0
kmem_cache_free+0x2f3/0x4c0
__mpol_put+0x2b/0x40
SyS_mbind+0x383/0x9f0
system_call_fastpath+0x16/0x1b
INFO: Slab 0xffffea0009cb8dc0 objects=23 used=8 fp=0xffff8801f582de40 flags=0x200000000004080
INFO: Object 0xffff8801f582d760 @offset=5984 fp=0xffff8801f582d600
Bytes b4 ffff8801f582d750: ae 01 ff ff 00 00 00 00 5a 5a 5a 5a 5a 5a 5a 5a ........ZZZZZZZZ
Object ffff8801f582d760: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
Object ffff8801f582d770: 6b 6b 6b 6b 6b 6b 6b a5 kkkkkkk.
Redzone ffff8801f582d778: bb bb bb bb bb bb bb bb ........
Padding ffff8801f582d8b8: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ
Memory state around the buggy address:
ffff8801f582d600: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff8801f582d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff8801f582d700: fc fc fc fc fc fc fc fc fc fc fc fc fb fb fb fc
!shared memory policy is not protected against parallel removal by other
thread which is normally protected by the mmap_sem. do_get_mempolicy,
however, drops the lock midway while we can still access it later.
Early premature up_read is a historical artifact from times when
put_user was called in this path see https://lwn.net/Articles/124754/
but that is gone since 8bccd85ffbaf ("[PATCH] Implement sys_* do_*
layering in the memory policy layer."). but when we have the the
current mempolicy ref count model. The issue was introduced
accordingly.
Fix the issue by removing the premature release.
Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: zhong jiang <[email protected]>
Acked-by: Michal Hocko <[email protected]>
Cc: Minchan Kim <[email protected]>
Cc: Vlastimil Babka <[email protected]>
Cc: David Rientjes <[email protected]>
Cc: Mel Gorman <[email protected]>
Cc: <[email protected]> [2.6+]
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]> | 73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | linux | bigvul | 1 | null | null | null |
issue #33, sanitize size of unknown chunks before malloc() | 6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d | wavpack | bigvul | 1 | null | null | null |
issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64 | 26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | wavpack | bigvul | 1 | null | null | null |
X3F property table list fix | f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c | libraw | bigvul | 1 | null | null | null |
X3F parser possible buffer overrun | 895529fc2f2eb8bc633edd6b04b5b237eb4db564 | libraw | bigvul | 1 | null | null | null |
Avoid reading past the end of buffer (Rui Reis) | a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | file | bigvul | 1 | null | null | null |
Fix `use after free in File#initilialize_copy`; fix #4001
The bug and the fix were reported by https://hackerone.com/pnoltof | b51b21fc63c9805862322551387d9036f2b63433 | mruby | bigvul | 1 | null | null | null |
Check length of env stack before accessing upvar; fix #3995 | 1905091634a6a2925c911484434448e568330626 | mruby | bigvul | 1 | null | null | null |
kernel/signal.c: avoid undefined behaviour in kill_something_info
When running kill(72057458746458112, 0) in userspace I hit the following
issue.
UBSAN: Undefined behaviour in kernel/signal.c:1462:11
negation of -2147483648 cannot be represented in type 'int':
CPU: 226 PID: 9849 Comm: test Tainted: G B ---- ------- 3.10.0-327.53.58.70.x86_64_ubsan+ #116
Hardware name: Huawei Technologies Co., Ltd. RH8100 V3/BC61PBIA, BIOS BLHSV028 11/11/2014
Call Trace:
dump_stack+0x19/0x1b
ubsan_epilogue+0xd/0x50
__ubsan_handle_negate_overflow+0x109/0x14e
SYSC_kill+0x43e/0x4d0
SyS_kill+0xe/0x10
system_call_fastpath+0x16/0x1b
Add code to avoid the UBSAN detection.
[[email protected]: tweak comment]
Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: zhongjiang <[email protected]>
Cc: Oleg Nesterov <[email protected]>
Cc: Michal Hocko <[email protected]>
Cc: Vlastimil Babka <[email protected]>
Cc: Xishi Qiu <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]> | 4ea77014af0d6205b05503d1c7aac6eace11d473 | linux | bigvul | 1 | null | null | null |
kernel/exit.c: avoid undefined behaviour when calling wait4()
wait4(-2147483648, 0x20, 0, 0xdd0000) triggers:
UBSAN: Undefined behaviour in kernel/exit.c:1651:9
The related calltrace is as follows:
negation of -2147483648 cannot be represented in type 'int':
CPU: 9 PID: 16482 Comm: zj Tainted: G B ---- ------- 3.10.0-327.53.58.71.x86_64+ #66
Hardware name: Huawei Technologies Co., Ltd. Tecal RH2285 /BC11BTSA , BIOS CTSAV036 04/27/2011
Call Trace:
dump_stack+0x19/0x1b
ubsan_epilogue+0xd/0x50
__ubsan_handle_negate_overflow+0x109/0x14e
SyS_wait4+0x1cb/0x1e0
system_call_fastpath+0x16/0x1b
Exclude the overflow to avoid the UBSAN warning.
Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: zhongjiang <[email protected]>
Cc: Oleg Nesterov <[email protected]>
Cc: David Rientjes <[email protected]>
Cc: Aneesh Kumar K.V <[email protected]>
Cc: Kirill A. Shutemov <[email protected]>
Cc: Xishi Qiu <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]> | dd83c161fbcc5d8be637ab159c0de015cbff5ba4 | linux | bigvul | 1 | null | null | null |
clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe()
platform_get_resource() may return NULL, add proper check to
avoid potential NULL dereferencing.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, e1, e2;
@@
res = platform_get_resource(pdev, t, n);
+ if (!res)
+ return -EINVAL;
... when != res == NULL
e = devm_ioremap(e1, res->start, e2);
Fixes: 4f16f7ff3bc0 ("clk: hisilicon: Add support for Hi3660 stub clocks")
Signed-off-by: Wei Yongjun <[email protected]>
Signed-off-by: Stephen Boyd <[email protected]> | 9903e41ae1f5d50c93f268ca3304d4d7c64b9311 | linux | bigvul | 1 | null | null | null |
scsi: libsas: defer ata device eh commands to libata
When ata device doing EH, some commands still attached with tasks are
not passed to libata when abort failed or recover failed, so libata did
not handle these commands. After these commands done, sas task is freed,
but ata qc is not freed. This will cause ata qc leak and trigger a
warning like below:
WARNING: CPU: 0 PID: 28512 at drivers/ata/libata-eh.c:4037
ata_eh_finish+0xb4/0xcc
CPU: 0 PID: 28512 Comm: kworker/u32:2 Tainted: G W OE 4.14.0#1
......
Call trace:
[<ffff0000088b7bd0>] ata_eh_finish+0xb4/0xcc
[<ffff0000088b8420>] ata_do_eh+0xc4/0xd8
[<ffff0000088b8478>] ata_std_error_handler+0x44/0x8c
[<ffff0000088b8068>] ata_scsi_port_error_handler+0x480/0x694
[<ffff000008875fc4>] async_sas_ata_eh+0x4c/0x80
[<ffff0000080f6be8>] async_run_entry_fn+0x4c/0x170
[<ffff0000080ebd70>] process_one_work+0x144/0x390
[<ffff0000080ec100>] worker_thread+0x144/0x418
[<ffff0000080f2c98>] kthread+0x10c/0x138
[<ffff0000080855dc>] ret_from_fork+0x10/0x18
If ata qc leaked too many, ata tag allocation will fail and io blocked
for ever.
As suggested by Dan Williams, defer ata device commands to libata and
merge sas_eh_finish_cmd() with sas_eh_defer_cmd(). libata will handle
ata qcs correctly after this.
Signed-off-by: Jason Yan <[email protected]>
CC: Xiaofei Tan <[email protected]>
CC: John Garry <[email protected]>
CC: Dan Williams <[email protected]>
Reviewed-by: Dan Williams <[email protected]>
Signed-off-by: Martin K. Petersen <[email protected]> | 318aaf34f1179b39fa9c30fa0f3288b645beee39 | linux | bigvul | 1 | null | null | null |
[Fix] Possible out-of-bounds read when computing length of some IT files with pattern loops (OpenMPT: formats that are converted to IT, libopenmpt: IT/ITP/MO3), caught with afl-fuzz.
git-svn-id: https://source.openmpt.org/svn/openmpt/trunk/OpenMPT@10027 56274372-70c3-4bfc-bfc3-4c3a0b034d27 | 492022c7297ede682161d9c0ec2de15526424e76 | openmpt | bigvul | 1 | null | null | null |
Add bounds check before length read | 740b218386083dc708ce98ccc94a63a95cd5629e | mbedtls | bigvul | 1 | null | null | null |
Add bounds check before signature length read | a1098f81c252b317ad34ea978aea2bc47760b215 | mbedtls | bigvul | 1 | null | null | null |
Limit depth of nesting in direct objects (fixes #202)
This fixes CVE-2018-9918. | b4d6cf6836ce025ba1811b7bbec52680c7204223 | qpdf | bigvul | 1 | null | null | null |
Fix potential double-free() in Interactive Service (CVE-2018-9336)
Malformed input data on the service pipe towards the OpenVPN interactive
service (normally used by the OpenVPN GUI to request openvpn instances
from the service) can result in a double free() in the error handling code.
This usually only leads to a process crash (DoS by an unprivileged local
account) but since it could possibly lead to memory corruption if
happening while multiple other threads are active at the same time,
CVE-2018-9336 has been assigned to acknowledge this risk.
Fix by ensuring that sud->directory is set to NULL in GetStartUpData()
for all error cases (thus not being free()ed in FreeStartupData()).
Rewrite control flow to use explicit error label for error exit.
Discovered and reported by Jacob Baines <[email protected]>.
CVE: 2018-9336
Signed-off-by: Gert Doering <[email protected]>
Acked-by: Selva Nair <[email protected]>
Message-Id: <[email protected]>
URL: https://www.mail-archive.com/search?l=mid&[email protected]
Signed-off-by: Gert Doering <[email protected]> | 1394192b210cb3c6624a7419bcf3ff966742e79b | openvpn | bigvul | 1 | null | null | null |
util: make sure to close the authfile before returning success
fixes #136 | 0f6ceabab0a8849b47f67d727aa526c2656089ba | yubico-pam | bigvul | 1 | null | null | null |
Call strlen() if name length provided is 0, like OpenSSL does.
Issue notice by Christian Heimes <[email protected]>
ok deraadt@ jsing@ | 0654414afcce51a16d35d05060190a3ec4618d42 | openbsd | bigvul | 1 | null | null | null |
x86/entry/64: Don't use IST entry for #BP stack
There's nothing IST-worthy about #BP/int3. We don't allow kprobes
in the small handful of places in the kernel that run at CPL0 with
an invalid stack, and 32-bit kernels have used normal interrupt
gates for #BP forever.
Furthermore, we don't allow kprobes in places that have usergs while
in kernel mode, so "paranoid" is also unnecessary.
Signed-off-by: Andy Lutomirski <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
Signed-off-by: Thomas Gleixner <[email protected]>
Cc: [email protected] | d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | linux | bigvul | 1 | null | null | null |
tmx: allocate space to store ending 0 for branch value
- reported by Alfred Farrugia and Sandro Gauci | e1d8008a09d9390ebaf698abe8909e10dfec4097 | kamailio | bigvul | 1 | null | null | null |
Fixed CVE-2018-8789
Thanks to Eyal Itkin from Check Point Software Technologies. | 2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6 | freerdp | bigvul | 1 | null | null | null |
Fixed CVE-2018-8788
Thanks to Eyal Itkin from Check Point Software Technologies. | d1112c279bd1a327e8e4d0b5f371458bf2579659 | freerdp | bigvul | 1 | null | null | null |
Fixed CVE-2018-8787
Thanks to Eyal Itkin from Check Point Software Technologies. | 09b9d4f1994a674c4ec85b4947aa656eda1aed8a | freerdp | bigvul | 1 | null | null | null |
Fixed CVE-2018-8786
Thanks to Eyal Itkin from Check Point Software Technologies. | 445a5a42c500ceb80f8fa7f2c11f3682538033f3 | freerdp | bigvul | 1 | null | null | null |
Fixed CVE-2018-8785
Thanks to Eyal Itkin from Check Point Software Technologies. | 602f4a2e14b41703b5f431de3154cd46a5750a2d | freerdp | bigvul | 1 | null | null | null |
Fixed CVE-2018-8784
Thanks to Eyal Itkin from Check Point Software Technologies. | 17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | freerdp | bigvul | 1 | null | null | null |
Applied updates and addition boundary checks for corrupted data | 444ca3ce7853538c577e0ec3f6146d2d65780734 | libevt | bigvul | 1 | null | null | null |
index: convert `read_entry` to return entry size via an out-param
The function `read_entry` does not conform to our usual coding style of
returning stuff via the out parameter and to use the return value for
reporting errors. Due to most of our code conforming to that pattern, it
has become quite natural for us to actually return `-1` in case there is
any error, which has also slipped in with commit 5625d86b9 (index:
support index v4, 2016-05-17). As the function returns an `size_t` only,
though, the return value is wrapped around, causing the caller of
`read_tree` to continue with an invalid index entry. Ultimately, this
can lead to a double-free.
Improve code and fix the bug by converting the function to return the
index entry size via an out parameter and only using the return value to
indicate errors.
Reported-by: Krishna Ram Prakash R <[email protected]>
Reported-by: Vivek Parikh <[email protected]> | 58a6fe94cb851f71214dbefac3f9bffee437d6fe | libgit2 | bigvul | 1 | null | null | null |
index: fix out-of-bounds read with invalid index entry prefix length
The index format in version 4 has prefix-compressed entries, where every
index entry can compress its path by using a path prefix of the previous
entry. Since implmenting support for this index format version in commit
5625d86b9 (index: support index v4, 2016-05-17), though, we do not
correctly verify that the prefix length that we want to reuse is
actually smaller or equal to the amount of characters than the length of
the previous index entry's path. This can lead to a an integer underflow
and subsequently to an out-of-bounds read.
Fix this by verifying that the prefix is actually smaller than the
previous entry's path length.
Reported-by: Krishna Ram Prakash R <[email protected]>
Reported-by: Vivek Parikh <[email protected]> | 3207ddb0103543da8ad2139ec6539f590f9900c1 | libgit2 | bigvul | 1 | null | null | null |
mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()
'hwname' is malloced in hwsim_new_radio_nl() and should be freed
before leaving from the error handling cases, otherwise it will cause
memory leak.
Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length")
Signed-off-by: Wei Yongjun <[email protected]>
Reviewed-by: Ben Hutchings <[email protected]>
Signed-off-by: Johannes Berg <[email protected]> | 0ddcff49b672239dda94d70d0fcf50317a9f4b51 | linux | bigvul | 1 | null | null | null |
Sanity check size passed to malloc...
Add sanity check before calling malloc in af_get_page() function to
avoid undefined behavior (e.g., seg fault) when dealing with a corrupt
AFF image with an invalid pagesize.
Issue found by Luis Rocha ([email protected]). | 435a2ca802358a3debb6d164d2c33049131df81c | afflibv3 | bigvul | 1 | null | null | null |
net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()
platform_get_resource() may fail and return NULL, so we should
better check it's return value to avoid a NULL pointer dereference
a bit later in the code.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, e1, e2;
@@
res = platform_get_resource(pdev, t, n);
+ if (!res)
+ return -EINVAL;
... when != res == NULL
e = devm_ioremap(e1, res->start, e2);
Signed-off-by: Wei Yongjun <[email protected]>
Signed-off-by: David S. Miller <[email protected]> | 297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 | linux | bigvul | 1 | null | null | null |
Deprecate and make ineffective gr_face_dumbRendering | db132b4731a9b4c9534144ba3a18e65b390e9ff6 | graphite | bigvul | 1 | null | null | null |
fix a crash with delayed load
If a delayed load failed, it could leave the pipeline only half-set up.
Sebsequent threads could then segv.
Set a load-has-failed flag and test before generate.
See https://github.com/jcupitt/libvips/issues/893 | 20d840e6da15c1574b3ed998bc92f91d1e36c2a5 | libvips | bigvul | 1 | null | null | null |
scsi: libsas: fix memory leak in sas_smp_get_phy_events()
We've got a memory leak with the following producer:
while true;
do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null;
done
The buffer req is allocated and not freed after we return. Fix it.
Fixes: 2908d778ab3e ("[SCSI] aic94xx: new driver")
Signed-off-by: Jason Yan <[email protected]>
CC: John Garry <[email protected]>
CC: chenqilin <[email protected]>
CC: chenxiang <[email protected]>
Reviewed-by: Christoph Hellwig <[email protected]>
Reviewed-by: Hannes Reinecke <[email protected]>
Signed-off-by: Martin K. Petersen <[email protected]> | 4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 | linux | bigvul | 1 | null | null | null |
fix some exploitable overflows (#994, #997) | 90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | gpac | bigvul | 1 | null | null | null |
bash-completion: (umount) use findmnt, escape a space in paths
# mount /dev/sdc1 /mnt/test/foo\ bar
# umount <tab>
has to return "/mnt/test/foo\ bar".
Changes:
* don't use mount | awk output, we have findmnt
* force compgen use \n as entries separator
Addresses: https://github.com/karelzak/util-linux/issues/539
Signed-off-by: Karel Zak <[email protected]> | 75f03badd7ed9f1dd951863d75e756883d3acc55 | util-linux | bigvul | 1 | null | null | null |
opj_mj2_extract: Check provided output prefix for length
This uses snprintf() with correct buffer length instead of sprintf(). This
prevents a buffer overflow when providing a long output prefix. Furthermore
the program exits with an error when the provided output prefix is too long.
Fixes #1088. | 6d8c0c06ee32dc03ba80acd48334e98728e56cf5 | openjpeg | bigvul | 1 | null | null | null |
Fix bug #75981: prevent reading beyond buffer start | 523f230c831d7b33353203fa34aee4e92ac12bba | php-src | bigvul | 1 | null | null | null |
rds: Fix NULL pointer dereference in __rds_rdma_map
This is a fix for syzkaller719569, where memory registration was
attempted without any underlying transport being loaded.
Analysis of the case reveals that it is the setsockopt() RDS_GET_MR
(2) and RDS_GET_MR_FOR_DEST (7) that are vulnerable.
Here is an example stack trace when the bug is hit:
BUG: unable to handle kernel NULL pointer dereference at 00000000000000c0
IP: __rds_rdma_map+0x36/0x440 [rds]
PGD 2f93d03067 P4D 2f93d03067 PUD 2f93d02067 PMD 0
Oops: 0000 [#1] SMP
Modules linked in: bridge stp llc tun rpcsec_gss_krb5 nfsv4
dns_resolver nfs fscache rds binfmt_misc sb_edac intel_powerclamp
coretemp kvm_intel kvm irqbypass crct10dif_pclmul c rc32_pclmul
ghash_clmulni_intel pcbc aesni_intel crypto_simd glue_helper cryptd
iTCO_wdt mei_me sg iTCO_vendor_support ipmi_si mei ipmi_devintf nfsd
shpchp pcspkr i2c_i801 ioatd ma ipmi_msghandler wmi lpc_ich mfd_core
auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2
mgag200 i2c_algo_bit drm_kms_helper ixgbe syscopyarea ahci sysfillrect
sysimgblt libahci mdio fb_sys_fops ttm ptp libata sd_mod mlx4_core drm
crc32c_intel pps_core megaraid_sas i2c_core dca dm_mirror
dm_region_hash dm_log dm_mod
CPU: 48 PID: 45787 Comm: repro_set2 Not tainted 4.14.2-3.el7uek.x86_64 #2
Hardware name: Oracle Corporation ORACLE SERVER X5-2L/ASM,MOBO TRAY,2U, BIOS 31110000 03/03/2017
task: ffff882f9190db00 task.stack: ffffc9002b994000
RIP: 0010:__rds_rdma_map+0x36/0x440 [rds]
RSP: 0018:ffffc9002b997df0 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff882fa2182580 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffc9002b997e40 RDI: ffff882fa2182580
RBP: ffffc9002b997e30 R08: 0000000000000000 R09: 0000000000000002
R10: ffff885fb29e3838 R11: 0000000000000000 R12: ffff882fa2182580
R13: ffff882fa2182580 R14: 0000000000000002 R15: 0000000020000ffc
FS: 00007fbffa20b700(0000) GS:ffff882fbfb80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c0 CR3: 0000002f98a66006 CR4: 00000000001606e0
Call Trace:
rds_get_mr+0x56/0x80 [rds]
rds_setsockopt+0x172/0x340 [rds]
? __fget_light+0x25/0x60
? __fdget+0x13/0x20
SyS_setsockopt+0x80/0xe0
do_syscall_64+0x67/0x1b0
entry_SYSCALL64_slow_path+0x25/0x25
RIP: 0033:0x7fbff9b117f9
RSP: 002b:00007fbffa20aed8 EFLAGS: 00000293 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00000000000c84a4 RCX: 00007fbff9b117f9
RDX: 0000000000000002 RSI: 0000400000000114 RDI: 000000000000109b
RBP: 00007fbffa20af10 R08: 0000000000000020 R09: 00007fbff9dd7860
R10: 0000000020000ffc R11: 0000000000000293 R12: 0000000000000000
R13: 00007fbffa20b9c0 R14: 00007fbffa20b700 R15: 0000000000000021
Code: 41 56 41 55 49 89 fd 41 54 53 48 83 ec 18 8b 87 f0 02 00 00 48
89 55 d0 48 89 4d c8 85 c0 0f 84 2d 03 00 00 48 8b 87 00 03 00 00 <48>
83 b8 c0 00 00 00 00 0f 84 25 03 00 0 0 48 8b 06 48 8b 56 08
The fix is to check the existence of an underlying transport in
__rds_rdma_map().
Signed-off-by: Håkon Bugge <[email protected]>
Reported-by: syzbot <[email protected]>
Acked-by: Santosh Shilimkar <[email protected]>
Signed-off-by: David S. Miller <[email protected]> | f3069c6d33f6ae63a1668737bc78aaaa51bff7ca | linux | bigvul | 1 | null | null | null |
New Pre Source | 45ef78e037f578b15fc58938a3a3251655e71d6f#diff-d52750c7ba4e594410438569d8e2963aL24 | unixodbc | bigvul | 1 | null | null | null |
blkcg: fix double free of new_blkg in blkcg_init_queue
If blkg_create fails, new_blkg passed as an argument will
be freed by blkg_create, so there is no need to free it again.
Signed-off-by: Hou Tao <[email protected]>
Signed-off-by: Jens Axboe <[email protected]> | 9b54d816e00425c3a517514e0d677bb3cec49258 | linux | bigvul | 1 | null | null | null |
issue #28, fix buffer overflows and bad allocs on corrupt CAF files | 8e3fe45a7bac31d9a3b558ae0079e2d92a04799e | wavpack | bigvul | 1 | null | null | null |
issue #28, do not overwrite heap on corrupt DSDIFF file | 36a24c7881427d2e1e4dc1cef58f19eee0d13aec | wavpack | bigvul | 1 | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.