commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
posix-timers: Sanitize overrun handling The posix timer overrun handling is broken because the forwarding functions can return a huge number of overruns which does not fit in an int. As a consequence timer_getoverrun(2) and siginfo::si_overrun can turn into random number generators. The k_clock::timer_forward() callbacks return a 64 bit value now. Make k_itimer::ti_overrun[_last] 64bit as well, so the kernel internal accounting is correct. 3Remove the temporary (int) casts. Add a helper function which clamps the overrun value returned to user space via timer_getoverrun(2) or siginfo::si_overrun limited to a positive value between 0 and INT_MAX. INT_MAX is an indicator for user space that the overrun value has been clamped. Reported-by: Team OWL337 <[email protected]> Signed-off-by: Thomas Gleixner <[email protected]> Acked-by: John Stultz <[email protected]> Cc: Peter Zijlstra <[email protected]> Cc: Michael Kerrisk <[email protected]> Link: https://lkml.kernel.org/r/[email protected]
78c9c4dfbf8c04883941445a195276bb4bb92c76
linux
bigvul
1
null
null
null
Merge tag 'trace-v4.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace Pull tracing fixes from Steven Rostedt: "This contains a few fixes and a clean up. - a bad merge caused an "endif" to go in the wrong place in scripts/Makefile.build - softirq tracing fix for tracing that corrupts lockdep and causes a false splat - histogram documentation typo fixes - fix a bad memory reference when passing in no filter to the filter code - simplify code by using the swap macro instead of open coding the swap" * tag 'trace-v4.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace: tracing: Fix SKIP_STACK_VALIDATION=1 build due to bad merge with -mrecord-mcount tracing: Fix some errors in histogram documentation tracing: Use swap macro in update_max_tr softirq: Reorder trace_softirqs_on to prevent lockdep splat tracing: Check for no filter when processing event filters
81f9c4e4177d31ced6f52a89bb70e93bfb77ca03
linux
bigvul
1
null
null
null
Issue #1689: create unique temporary file with g_file_open_tmp(). Not sure this is really solving the issue reported, which is that `g_get_tmp_dir()` uses environment variables (yet as g_file_open_tmp() uses g_get_tmp_dir()…). But at least g_file_open_tmp() should create unique temporary files, which prevents overriding existing files (which is most likely the only real attack possible here, or at least the only one I can think of unless some weird vulnerabilities exist in glib).
c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f
gimp
bigvul
1
null
null
null
Check length of memcmp
8fd069f6dedb064339f1091069ac96f3f8bdb552
civetweb
bigvul
1
null
null
null
virt: vbox: Only copy_from_user the request-header once In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the 'version', 'size_in', and 'size_out' fields of 'hdr' are verified. Before this commit, after the checks a buffer for the entire request would be allocated and then all data including the verified header would be copied from the userspace 'arg' pointer again. Given that the 'arg' pointer resides in userspace, a malicious userspace process can race to change the data pointed to by 'arg' between the two copies. By doing so, the user can bypass the verifications on the ioctl argument. This commit fixes this by using the already checked copy of the header to fill the header part of the allocated buffer and only copying the remainder of the data from userspace. Signed-off-by: Wenwen Wang <[email protected]> Reviewed-by: Hans de Goede <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]>
bd23a7269834dc7c1f93e83535d16ebc44b75eba
linux
bigvul
1
null
null
null
ExecHelperMain: fix privilege lowering code
4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8
passenger
bigvul
1
null
null
null
-fixed an issue where the stack could crash if a TCP based sender sends a Content-Length that is less that the actual SIP body transmitted in order to trigger this condition the SIP message body must arrive in a separate read request, either from the start or part way through the body and there must be data following the body in the same read.
2cb291191c93c7c4e371e22cb89805a5b31d6608
resiprocate
bigvul
1
null
null
null
Remove internal Samba shre mounting code, this had some privilege escalation issues, and is not well tested
afc4f8315d3e96574925fb530a7004cc9e6ce3d3
cantata
bigvul
1
null
null
null
avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile These 2 fields are not always the same, it is simpler to always use the same field for detecting studio profile Fixes: null pointer dereference Fixes: ffmpeg_crash_3.avi Found-by: Thuan Pham <[email protected]>, Marcel Böhme, Andrew Santosa and Alexandru RazvanCaciulescu with AFLSmart Signed-off-by: Michael Niedermayer <[email protected]>
b3332a182f8ba33a34542e4a0370f38b914ccf7d
ffmpeg
bigvul
1
null
null
null
avcodec/mpeg4videodec: Clear bits_per_raw_sample if it has originated from a previous instance Fixes: assertion failure Fixes: ffmpeg_crash_5.avi Found-by: Thuan Pham <[email protected]>, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Signed-off-by: Michael Niedermayer <[email protected]>
2fc108f60f98cd00813418a8754a46476b404a3c
ffmpeg
bigvul
1
null
null
null
avcodec/mpeg4videoenc: Use 64 bit for times in mpeg4_encode_gop_header() Fixes truncation Fixes Assertion n <= 31 && value < (1U << n) failed at libavcodec/put_bits.h:169 Fixes: ffmpeg_crash_2.avi Found-by: Thuan Pham <[email protected]>, Marcel Böhme, Andrew Santosa and Alexandru RazvanCaciulescu with AFLSmart Signed-off-by: Michael Niedermayer <[email protected]>
e1182fac1afba92a4975917823a5f644bee7e6e8
ffmpeg
bigvul
1
null
null
null
Abort in XGROUP if the key is not a stream
c04082cf138f1f51cedf05ee9ad36fb6763cafc6
redis
bigvul
1
null
null
null
Change ECDSA signing to use blinding.
9b9568d500f31f964af26ba8d01e542e1f27e5ca
wolfssl
bigvul
1
null
null
null
Address DSA/ECDSA side channel
48fc8df51d99f9d8ba251219367b3d629cc848e3
botan
bigvul
1
null
null
null
Security: fix redis-cli buffer overflow. Thanks to Fakhri Zulkifli for reporting it. The fix switched to dynamic allocation, copying the final prompt in the static buffer only at the end.
9fdcc15962f9ff4baebe6fdd947816f43f730d50
redis
bigvul
1
null
null
null
Fix #10294 - crash in r2_hoobr__6502_op
bbb4af56003c1afdad67af0c4339267ca38b1017
radare2
bigvul
1
null
null
null
Fix #10296 - Heap out of bounds read in java_switch_op()
224e6bc13fa353dd3b7f7a2334588f1c4229e58d
radare2
bigvul
1
null
null
null
Fix #10293 - Use-after-free in r_anal_bb_free()
90b71c017a7fa9732fe45fd21b245ee051b1f548
radare2
bigvul
1
null
null
null
`mrb_class_real()` did not work for `BasicObject`; fix #4037
faa4eaf6803bd11669bc324b4c34e7162286bfa3
mruby
bigvul
1
null
null
null
Extend stack when pushing arguments that does not fit in; fix #4038
778500563a9f7ceba996937dc886bd8cde29b42b
mruby
bigvul
1
null
null
null
Allow `Object#clone` to copy frozen status only; fix #4036 Copying all flags from the original object may overwrite the clone's flags e.g. the embedded flag.
55edae0226409de25e59922807cb09acb45731a2
mruby
bigvul
1
null
null
null
socket: close race condition between sock_close() and sockfs_setattr() fchownat() doesn't even hold refcnt of fd until it figures out fd is really needed (otherwise is ignored) and releases it after it resolves the path. This means sock_close() could race with sockfs_setattr(), which leads to a NULL pointer dereference since typically we set sock->sk to NULL in ->release(). As pointed out by Al, this is unique to sockfs. So we can fix this in socket layer by acquiring inode_lock in sock_close() and checking against NULL in sockfs_setattr(). sock_release() is called in many places, only the sock_close() path matters here. And fortunately, this should not affect normal sock_close() as it is only called when the last fd refcnt is gone. It only affects sock_close() with a parallel sockfs_setattr() in progress, which is not common. Fixes: 86741ec25462 ("net: core: Add a UID field to struct sock.") Reported-by: shankarapailoor <[email protected]> Cc: Tetsuo Handa <[email protected]> Cc: Lorenzo Colitti <[email protected]> Cc: Al Viro <[email protected]> Signed-off-by: Cong Wang <[email protected]> Signed-off-by: David S. Miller <[email protected]>
6d8c50dcb029872b298eea68cc6209c866fd3e14
linux
bigvul
1
null
null
null
Should not call `initialize_copy` for `TT_ICLASS`; fix #4027 Since `TT_ICLASS` is a internal object that should never be revealed to Ruby world.
b64ce17852b180dfeea81cf458660be41a78974d
mruby
bigvul
1
null
null
null
Fix bug if using an undefined member of an object for for..in (fix #1437)
bf4416ab9129ee3afd56739ea4e3cd0da5484b6b
espruino
bigvul
1
null
null
null
Fix stack overflow if interpreting a file full of '{' (fix #1448)
51380baf17241728b6d48cdb84140b931e3e3cc5
espruino
bigvul
1
null
null
null
fix jsvGetString regression
ce1924193862d58cb43d3d4d9dada710a8361b89
espruino
bigvul
1
null
null
null
Fix strncat/cpy bounding issues (fix #1425)
0a7619875bf79877907205f6bee08465b89ff10b
espruino
bigvul
1
null
null
null
Fix stack overflow if void void void... is repeated many times (fix #1434)
c36d30529118aa049797db43f111ddad468aad29
espruino
bigvul
1
null
null
null
remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426)
bed844f109b6c222816740555068de2e101e8018
espruino
bigvul
1
null
null
null
Add height check for Graphics.createArrayBuffer(...vertical_byte:true) (fix #1421)
8a44b04b584b3d3ab1cb68fed410f7ecb165e50e
espruino
bigvul
1
null
null
null
Add sanity check for debug trace print statement (fix #1420)
b6d362f6a1f2de0b3e7604848116efb509196bf4
espruino
bigvul
1
null
null
null
Fix stack size detection on Linux (fix #1427)
a0d7f432abee692402c00e8b615ff5982dde9780
espruino
bigvul
1
null
null
null
compat: fix 4-byte infoleak via uninitialized struct field Commit 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to native counterparts") removed the memset() in compat_get_timex(). Since then, the compat adjtimex syscall can invoke do_adjtimex() with an uninitialized ->tai. If do_adjtimex() doesn't write to ->tai (e.g. because the arguments are invalid), compat_put_timex() then copies the uninitialized ->tai field to userspace. Fix it by adding the memset() back. Fixes: 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to native counterparts") Signed-off-by: Jann Horn <[email protected]> Acked-by: Kees Cook <[email protected]> Acked-by: Al Viro <[email protected]> Signed-off-by: Linus Torvalds <[email protected]>
0a0b98734479aa5b3c671d5190e86273372cab95
linux
bigvul
1
null
null
null
sr: pass down correctly sized SCSI sense buffer We're casting the CDROM layer request_sense to the SCSI sense buffer, but the former is 64 bytes and the latter is 96 bytes. As we generally allocate these on the stack, we end up blowing up the stack. Fix this by wrapping the scsi_execute() call with a properly sized sense buffer, and copying back the bits for the CDROM layer. Cc: [email protected] Reported-by: Piotr Gabriel Kosinski <[email protected]> Reported-by: Daniel Shapira <[email protected]> Tested-by: Kees Cook <[email protected]> Fixes: 82ed4db499b8 ("block: split scsi_request out of struct request") Signed-off-by: Jens Axboe <[email protected]>
f7068114d45ec55996b9040e98111afa56e010fe
linux
bigvul
1
null
null
null
Fix #9903 - oobread in RAnal.sh
77c47cf873dd55b396da60baa2ca83bbd39e4add
radare2
bigvul
1
null
null
null
Fix #9943 - Invalid free on RAnal.avr
9d348bcc2c4bbd3805e7eec97b594be9febbdf9a
radare2
bigvul
1
null
null
null
Fix #10091 - crash in AVR analysis
d04c78773f6959bcb427453f8e5b9824d5ba9eff
radare2
bigvul
1
null
null
null
Fix #9902 - Fix oobread in RBin.string_scan_range
3fcf41ed96ffa25b38029449520c8d0a198745f3
radare2
bigvul
1
null
null
null
Fix #9970 - heap oobread in mach0 parser (#10026)
60208765887f5f008b3b9a883f3addc8bdb9c134
radare2
bigvul
1
null
null
null
Fix crash in pe
4e1cf0d3e6f6fe2552a269def0af1cd2403e266c
radare2
bigvul
1
null
null
null
Fix #9969 - Stack overflow in wasm disassembler
bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
radare2
bigvul
1
null
null
null
Fix invalid free in RAnal.avr
25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4
radare2
bigvul
1
null
null
null
Fix #9904 - crash in r2_hoobr_r_read_le32 (over 9000 entrypoints) and read_le oobread (#9923)
1f37c04f2a762500222dda2459e6a04646feeedf
radare2
bigvul
1
null
null
null
Fix crash in anal.avr
041e53cab7ca33481ae45ecd65ad596976d78e68
radare2
bigvul
1
null
null
null
jpeg: Fix another possible buffer overrun Found via the clang libfuzzer
ee58aff6918b8bbc3be29b9e3089485ea46ff956
pdfgen
bigvul
1
null
null
null
coresight: fix kernel panic caused by invalid CPU Commit d52c9750f150 ("coresight: reset "enable_sink" flag when need be") caused a kernel panic because of the using of an invalid value: after 'for_each_cpu(cpu, mask)', value of local variable 'cpu' become invalid, causes following 'cpu_to_node' access invalid memory area. This patch brings the deleted 'cpu = cpumask_first(mask)' back. Panic log: $ perf record -e cs_etm// ls Unable to handle kernel paging request at virtual address fffe801804af4f10 pgd = ffff8017ce031600 [fffe801804af4f10] *pgd=0000000000000000, *pud=0000000000000000 Internal error: Oops: 96000004 [#1] SMP Modules linked in: CPU: 33 PID: 1619 Comm: perf Not tainted 4.7.1+ #16 Hardware name: Huawei Taishan 2280 /CH05TEVBA, BIOS 1.10 11/24/2016 task: ffff8017cb0c8400 ti: ffff8017cb154000 task.ti: ffff8017cb154000 PC is at tmc_alloc_etf_buffer+0x60/0xd4 LR is at tmc_alloc_etf_buffer+0x44/0xd4 pc : [<ffff000008633df8>] lr : [<ffff000008633ddc>] pstate: 60000145 sp : ffff8017cb157b40 x29: ffff8017cb157b40 x28: 0000000000000000 ...skip... 7a60: ffff000008c64dc8 0000000000000006 0000000000000253 ffffffffffffffff 7a80: 0000000000000000 0000000000000000 ffff0000080872cc 0000000000000001 [<ffff000008633df8>] tmc_alloc_etf_buffer+0x60/0xd4 [<ffff000008632b9c>] etm_setup_aux+0x1dc/0x1e8 [<ffff00000816eed4>] rb_alloc_aux+0x2b0/0x338 [<ffff00000816a5e4>] perf_mmap+0x414/0x568 [<ffff0000081ab694>] mmap_region+0x324/0x544 [<ffff0000081abbe8>] do_mmap+0x334/0x3e0 [<ffff000008191150>] vm_mmap_pgoff+0xa4/0xc8 [<ffff0000081a9a30>] SyS_mmap_pgoff+0xb0/0x22c [<ffff0000080872e4>] sys_mmap+0x18/0x28 [<ffff0000080843f0>] el0_svc_naked+0x24/0x28 Code: 912040a5 d0001c00 f873d821 911c6000 (b8656822) ---[ end trace 98933da8f92b0c9a ]--- Signed-off-by: Wang Nan <[email protected]> Cc: Xia Kaixu <[email protected]> Cc: Li Zefan <[email protected]> Cc: Mathieu Poirier <[email protected]> Cc: [email protected] Cc: [email protected] Fixes: d52c9750f150 ("coresight: reset "enable_sink" flag when need be") Signed-off-by: Mathieu Poirier <[email protected]> Cc: stable <[email protected]> # 4.10 Signed-off-by: Greg Kroah-Hartman <[email protected]>
f09444639099584bc4784dfcd85ada67c6f33e0f
linux
bigvul
1
null
null
null
Security: fix Lua struct package offset handling. After the first fix to the struct package I found another similar problem, which is fixed by this patch. It could be reproduced easily by running the following script: return struct.unpack('f', "xxxxxxxxxxxxx",-3) The above will access bytes before the 'data' pointer.
e89086e09a38cc6713bcd4b9c29abf92cf393936
redis
bigvul
1
null
null
null
Security: more cmsgpack fixes by @soloestoy. @soloestoy sent me this additional fixes, after searching for similar problems to the one reported in mp_pack(). I'm committing the changes because it was not possible during to make a public PR to protect Redis users and give Redis providers some time to patch their systems.
5ccb6f7a791bf3490357b00a898885759d98bab0
redis
bigvul
1
null
null
null
cdrom: information leak in cdrom_ioctl_media_changed() This cast is wrong. "cdi->capacity" is an int and "arg" is an unsigned long. The way the check is written now, if one of the high 32 bits is set then we could read outside the info->slots[] array. This bug is pretty old and it predates git. Reviewed-by: Christoph Hellwig <[email protected]> Cc: [email protected] Signed-off-by: Dan Carpenter <[email protected]> Signed-off-by: Jens Axboe <[email protected]>
9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
linux
bigvul
1
null
null
null
mirror: prepend ./ to rm and chmod arguments to avoid URL recognition (fix #452)
a27e07d90a4608ceaf928b1babb27d4d803e1992
lftp
bigvul
1
null
null
null
delta: fix out-of-bounds read of delta When computing the offset and length of the delta base, we repeatedly increment the `delta` pointer without checking whether we have advanced past its end already, which can thus result in an out-of-bounds read. Fix this by repeatedly checking whether we have reached the end. Add a test which would cause Valgrind to produce an error. Reported-by: Riccardo Schirone <[email protected]> Test-provided-by: Riccardo Schirone <[email protected]>
9844d38bed10e9ff17174434b3421b227ae710f3
libgit2
bigvul
1
null
null
null
delta: fix overflow when computing limit When checking whether a delta base offset and length fit into the base we have in memory already, we can trigger an overflow which breaks the check. This would subsequently result in us reading memory from out of bounds of the base. The issue is easily fixed by checking for overflow when adding `off` and `len`, thus guaranteeting that we are never indexing beyond `base_len`. This corresponds to the git patch 8960844a7 (check patch_delta bounds more carefully, 2006-04-07), which adds these overflow checks. Reported-by: Riccardo Schirone <[email protected]>
c1577110467b701dcbcf9439ac225ea851b47d22
libgit2
bigvul
1
null
null
null
Merge remote-tracking branch 'private/wip-mon-snap-caps'
975528f632f73fbffa3f1fee304e3bbe3296cffc
ceph
bigvul
1
null
null
null
fix "pixel overrun" fixes #3
cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e
ngiflib
bigvul
1
null
null
null
check GIF image position and dimensions fixes #1
b588a2249c7abbfc52173e32ee11d6facef82f89
ngiflib
bigvul
1
null
null
null
mm/mempolicy: fix use after free when calling get_mempolicy I hit a use after free issue when executing trinity and repoduced it with KASAN enabled. The related call trace is as follows. BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766 Read of size 2 by task syz-executor1/798 INFO: Allocated in mpol_new.part.2+0x74/0x160 age=3 cpu=1 pid=799 __slab_alloc+0x768/0x970 kmem_cache_alloc+0x2e7/0x450 mpol_new.part.2+0x74/0x160 mpol_new+0x66/0x80 SyS_mbind+0x267/0x9f0 system_call_fastpath+0x16/0x1b INFO: Freed in __mpol_put+0x2b/0x40 age=4 cpu=1 pid=799 __slab_free+0x495/0x8e0 kmem_cache_free+0x2f3/0x4c0 __mpol_put+0x2b/0x40 SyS_mbind+0x383/0x9f0 system_call_fastpath+0x16/0x1b INFO: Slab 0xffffea0009cb8dc0 objects=23 used=8 fp=0xffff8801f582de40 flags=0x200000000004080 INFO: Object 0xffff8801f582d760 @offset=5984 fp=0xffff8801f582d600 Bytes b4 ffff8801f582d750: ae 01 ff ff 00 00 00 00 5a 5a 5a 5a 5a 5a 5a 5a ........ZZZZZZZZ Object ffff8801f582d760: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801f582d770: 6b 6b 6b 6b 6b 6b 6b a5 kkkkkkk. Redzone ffff8801f582d778: bb bb bb bb bb bb bb bb ........ Padding ffff8801f582d8b8: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ Memory state around the buggy address: ffff8801f582d600: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc ffff8801f582d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff8801f582d700: fc fc fc fc fc fc fc fc fc fc fc fc fb fb fb fc !shared memory policy is not protected against parallel removal by other thread which is normally protected by the mmap_sem. do_get_mempolicy, however, drops the lock midway while we can still access it later. Early premature up_read is a historical artifact from times when put_user was called in this path see https://lwn.net/Articles/124754/ but that is gone since 8bccd85ffbaf ("[PATCH] Implement sys_* do_* layering in the memory policy layer."). but when we have the the current mempolicy ref count model. The issue was introduced accordingly. Fix the issue by removing the premature release. Link: http://lkml.kernel.org/r/[email protected] Signed-off-by: zhong jiang <[email protected]> Acked-by: Michal Hocko <[email protected]> Cc: Minchan Kim <[email protected]> Cc: Vlastimil Babka <[email protected]> Cc: David Rientjes <[email protected]> Cc: Mel Gorman <[email protected]> Cc: <[email protected]> [2.6+] Signed-off-by: Andrew Morton <[email protected]> Signed-off-by: Linus Torvalds <[email protected]>
73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
linux
bigvul
1
null
null
null
issue #33, sanitize size of unknown chunks before malloc()
6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
wavpack
bigvul
1
null
null
null
issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64
26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
wavpack
bigvul
1
null
null
null
X3F property table list fix
f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c
libraw
bigvul
1
null
null
null
X3F parser possible buffer overrun
895529fc2f2eb8bc633edd6b04b5b237eb4db564
libraw
bigvul
1
null
null
null
Avoid reading past the end of buffer (Rui Reis)
a642587a9c9e2dd7feacdf513c3643ce26ad3c22
file
bigvul
1
null
null
null
Fix `use after free in File#initilialize_copy`; fix #4001 The bug and the fix were reported by https://hackerone.com/pnoltof
b51b21fc63c9805862322551387d9036f2b63433
mruby
bigvul
1
null
null
null
Check length of env stack before accessing upvar; fix #3995
1905091634a6a2925c911484434448e568330626
mruby
bigvul
1
null
null
null
kernel/signal.c: avoid undefined behaviour in kill_something_info When running kill(72057458746458112, 0) in userspace I hit the following issue. UBSAN: Undefined behaviour in kernel/signal.c:1462:11 negation of -2147483648 cannot be represented in type 'int': CPU: 226 PID: 9849 Comm: test Tainted: G B ---- ------- 3.10.0-327.53.58.70.x86_64_ubsan+ #116 Hardware name: Huawei Technologies Co., Ltd. RH8100 V3/BC61PBIA, BIOS BLHSV028 11/11/2014 Call Trace: dump_stack+0x19/0x1b ubsan_epilogue+0xd/0x50 __ubsan_handle_negate_overflow+0x109/0x14e SYSC_kill+0x43e/0x4d0 SyS_kill+0xe/0x10 system_call_fastpath+0x16/0x1b Add code to avoid the UBSAN detection. [[email protected]: tweak comment] Link: http://lkml.kernel.org/r/[email protected] Signed-off-by: zhongjiang <[email protected]> Cc: Oleg Nesterov <[email protected]> Cc: Michal Hocko <[email protected]> Cc: Vlastimil Babka <[email protected]> Cc: Xishi Qiu <[email protected]> Signed-off-by: Andrew Morton <[email protected]> Signed-off-by: Linus Torvalds <[email protected]>
4ea77014af0d6205b05503d1c7aac6eace11d473
linux
bigvul
1
null
null
null
kernel/exit.c: avoid undefined behaviour when calling wait4() wait4(-2147483648, 0x20, 0, 0xdd0000) triggers: UBSAN: Undefined behaviour in kernel/exit.c:1651:9 The related calltrace is as follows: negation of -2147483648 cannot be represented in type 'int': CPU: 9 PID: 16482 Comm: zj Tainted: G B ---- ------- 3.10.0-327.53.58.71.x86_64+ #66 Hardware name: Huawei Technologies Co., Ltd. Tecal RH2285 /BC11BTSA , BIOS CTSAV036 04/27/2011 Call Trace: dump_stack+0x19/0x1b ubsan_epilogue+0xd/0x50 __ubsan_handle_negate_overflow+0x109/0x14e SyS_wait4+0x1cb/0x1e0 system_call_fastpath+0x16/0x1b Exclude the overflow to avoid the UBSAN warning. Link: http://lkml.kernel.org/r/[email protected] Signed-off-by: zhongjiang <[email protected]> Cc: Oleg Nesterov <[email protected]> Cc: David Rientjes <[email protected]> Cc: Aneesh Kumar K.V <[email protected]> Cc: Kirill A. Shutemov <[email protected]> Cc: Xishi Qiu <[email protected]> Signed-off-by: Andrew Morton <[email protected]> Signed-off-by: Linus Torvalds <[email protected]>
dd83c161fbcc5d8be637ab159c0de015cbff5ba4
linux
bigvul
1
null
null
null
clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe() platform_get_resource() may return NULL, add proper check to avoid potential NULL dereferencing. This is detected by Coccinelle semantic patch. @@ expression pdev, res, n, t, e, e1, e2; @@ res = platform_get_resource(pdev, t, n); + if (!res) + return -EINVAL; ... when != res == NULL e = devm_ioremap(e1, res->start, e2); Fixes: 4f16f7ff3bc0 ("clk: hisilicon: Add support for Hi3660 stub clocks") Signed-off-by: Wei Yongjun <[email protected]> Signed-off-by: Stephen Boyd <[email protected]>
9903e41ae1f5d50c93f268ca3304d4d7c64b9311
linux
bigvul
1
null
null
null
scsi: libsas: defer ata device eh commands to libata When ata device doing EH, some commands still attached with tasks are not passed to libata when abort failed or recover failed, so libata did not handle these commands. After these commands done, sas task is freed, but ata qc is not freed. This will cause ata qc leak and trigger a warning like below: WARNING: CPU: 0 PID: 28512 at drivers/ata/libata-eh.c:4037 ata_eh_finish+0xb4/0xcc CPU: 0 PID: 28512 Comm: kworker/u32:2 Tainted: G W OE 4.14.0#1 ...... Call trace: [<ffff0000088b7bd0>] ata_eh_finish+0xb4/0xcc [<ffff0000088b8420>] ata_do_eh+0xc4/0xd8 [<ffff0000088b8478>] ata_std_error_handler+0x44/0x8c [<ffff0000088b8068>] ata_scsi_port_error_handler+0x480/0x694 [<ffff000008875fc4>] async_sas_ata_eh+0x4c/0x80 [<ffff0000080f6be8>] async_run_entry_fn+0x4c/0x170 [<ffff0000080ebd70>] process_one_work+0x144/0x390 [<ffff0000080ec100>] worker_thread+0x144/0x418 [<ffff0000080f2c98>] kthread+0x10c/0x138 [<ffff0000080855dc>] ret_from_fork+0x10/0x18 If ata qc leaked too many, ata tag allocation will fail and io blocked for ever. As suggested by Dan Williams, defer ata device commands to libata and merge sas_eh_finish_cmd() with sas_eh_defer_cmd(). libata will handle ata qcs correctly after this. Signed-off-by: Jason Yan <[email protected]> CC: Xiaofei Tan <[email protected]> CC: John Garry <[email protected]> CC: Dan Williams <[email protected]> Reviewed-by: Dan Williams <[email protected]> Signed-off-by: Martin K. Petersen <[email protected]>
318aaf34f1179b39fa9c30fa0f3288b645beee39
linux
bigvul
1
null
null
null
[Fix] Possible out-of-bounds read when computing length of some IT files with pattern loops (OpenMPT: formats that are converted to IT, libopenmpt: IT/ITP/MO3), caught with afl-fuzz. git-svn-id: https://source.openmpt.org/svn/openmpt/trunk/OpenMPT@10027 56274372-70c3-4bfc-bfc3-4c3a0b034d27
492022c7297ede682161d9c0ec2de15526424e76
openmpt
bigvul
1
null
null
null
Add bounds check before length read
740b218386083dc708ce98ccc94a63a95cd5629e
mbedtls
bigvul
1
null
null
null
Add bounds check before signature length read
a1098f81c252b317ad34ea978aea2bc47760b215
mbedtls
bigvul
1
null
null
null
Limit depth of nesting in direct objects (fixes #202) This fixes CVE-2018-9918.
b4d6cf6836ce025ba1811b7bbec52680c7204223
qpdf
bigvul
1
null
null
null
Fix potential double-free() in Interactive Service (CVE-2018-9336) Malformed input data on the service pipe towards the OpenVPN interactive service (normally used by the OpenVPN GUI to request openvpn instances from the service) can result in a double free() in the error handling code. This usually only leads to a process crash (DoS by an unprivileged local account) but since it could possibly lead to memory corruption if happening while multiple other threads are active at the same time, CVE-2018-9336 has been assigned to acknowledge this risk. Fix by ensuring that sud->directory is set to NULL in GetStartUpData() for all error cases (thus not being free()ed in FreeStartupData()). Rewrite control flow to use explicit error label for error exit. Discovered and reported by Jacob Baines <[email protected]>. CVE: 2018-9336 Signed-off-by: Gert Doering <[email protected]> Acked-by: Selva Nair <[email protected]> Message-Id: <[email protected]> URL: https://www.mail-archive.com/search?l=mid&[email protected] Signed-off-by: Gert Doering <[email protected]>
1394192b210cb3c6624a7419bcf3ff966742e79b
openvpn
bigvul
1
null
null
null
util: make sure to close the authfile before returning success fixes #136
0f6ceabab0a8849b47f67d727aa526c2656089ba
yubico-pam
bigvul
1
null
null
null
Call strlen() if name length provided is 0, like OpenSSL does. Issue notice by Christian Heimes <[email protected]> ok deraadt@ jsing@
0654414afcce51a16d35d05060190a3ec4618d42
openbsd
bigvul
1
null
null
null
x86/entry/64: Don't use IST entry for #BP stack There's nothing IST-worthy about #BP/int3. We don't allow kprobes in the small handful of places in the kernel that run at CPL0 with an invalid stack, and 32-bit kernels have used normal interrupt gates for #BP forever. Furthermore, we don't allow kprobes in places that have usergs while in kernel mode, so "paranoid" is also unnecessary. Signed-off-by: Andy Lutomirski <[email protected]> Signed-off-by: Linus Torvalds <[email protected]> Signed-off-by: Thomas Gleixner <[email protected]> Cc: [email protected]
d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
linux
bigvul
1
null
null
null
tmx: allocate space to store ending 0 for branch value - reported by Alfred Farrugia and Sandro Gauci
e1d8008a09d9390ebaf698abe8909e10dfec4097
kamailio
bigvul
1
null
null
null
Fixed CVE-2018-8789 Thanks to Eyal Itkin from Check Point Software Technologies.
2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6
freerdp
bigvul
1
null
null
null
Fixed CVE-2018-8788 Thanks to Eyal Itkin from Check Point Software Technologies.
d1112c279bd1a327e8e4d0b5f371458bf2579659
freerdp
bigvul
1
null
null
null
Fixed CVE-2018-8787 Thanks to Eyal Itkin from Check Point Software Technologies.
09b9d4f1994a674c4ec85b4947aa656eda1aed8a
freerdp
bigvul
1
null
null
null
Fixed CVE-2018-8786 Thanks to Eyal Itkin from Check Point Software Technologies.
445a5a42c500ceb80f8fa7f2c11f3682538033f3
freerdp
bigvul
1
null
null
null
Fixed CVE-2018-8785 Thanks to Eyal Itkin from Check Point Software Technologies.
602f4a2e14b41703b5f431de3154cd46a5750a2d
freerdp
bigvul
1
null
null
null
Fixed CVE-2018-8784 Thanks to Eyal Itkin from Check Point Software Technologies.
17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7
freerdp
bigvul
1
null
null
null
Applied updates and addition boundary checks for corrupted data
444ca3ce7853538c577e0ec3f6146d2d65780734
libevt
bigvul
1
null
null
null
index: convert `read_entry` to return entry size via an out-param The function `read_entry` does not conform to our usual coding style of returning stuff via the out parameter and to use the return value for reporting errors. Due to most of our code conforming to that pattern, it has become quite natural for us to actually return `-1` in case there is any error, which has also slipped in with commit 5625d86b9 (index: support index v4, 2016-05-17). As the function returns an `size_t` only, though, the return value is wrapped around, causing the caller of `read_tree` to continue with an invalid index entry. Ultimately, this can lead to a double-free. Improve code and fix the bug by converting the function to return the index entry size via an out parameter and only using the return value to indicate errors. Reported-by: Krishna Ram Prakash R <[email protected]> Reported-by: Vivek Parikh <[email protected]>
58a6fe94cb851f71214dbefac3f9bffee437d6fe
libgit2
bigvul
1
null
null
null
index: fix out-of-bounds read with invalid index entry prefix length The index format in version 4 has prefix-compressed entries, where every index entry can compress its path by using a path prefix of the previous entry. Since implmenting support for this index format version in commit 5625d86b9 (index: support index v4, 2016-05-17), though, we do not correctly verify that the prefix length that we want to reuse is actually smaller or equal to the amount of characters than the length of the previous index entry's path. This can lead to a an integer underflow and subsequently to an out-of-bounds read. Fix this by verifying that the prefix is actually smaller than the previous entry's path length. Reported-by: Krishna Ram Prakash R <[email protected]> Reported-by: Vivek Parikh <[email protected]>
3207ddb0103543da8ad2139ec6539f590f9900c1
libgit2
bigvul
1
null
null
null
mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl() 'hwname' is malloced in hwsim_new_radio_nl() and should be freed before leaving from the error handling cases, otherwise it will cause memory leak. Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length") Signed-off-by: Wei Yongjun <[email protected]> Reviewed-by: Ben Hutchings <[email protected]> Signed-off-by: Johannes Berg <[email protected]>
0ddcff49b672239dda94d70d0fcf50317a9f4b51
linux
bigvul
1
null
null
null
Sanity check size passed to malloc... Add sanity check before calling malloc in af_get_page() function to avoid undefined behavior (e.g., seg fault) when dealing with a corrupt AFF image with an invalid pagesize. Issue found by Luis Rocha ([email protected]).
435a2ca802358a3debb6d164d2c33049131df81c
afflibv3
bigvul
1
null
null
null
net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe() platform_get_resource() may fail and return NULL, so we should better check it's return value to avoid a NULL pointer dereference a bit later in the code. This is detected by Coccinelle semantic patch. @@ expression pdev, res, n, t, e, e1, e2; @@ res = platform_get_resource(pdev, t, n); + if (!res) + return -EINVAL; ... when != res == NULL e = devm_ioremap(e1, res->start, e2); Signed-off-by: Wei Yongjun <[email protected]> Signed-off-by: David S. Miller <[email protected]>
297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
linux
bigvul
1
null
null
null
Deprecate and make ineffective gr_face_dumbRendering
db132b4731a9b4c9534144ba3a18e65b390e9ff6
graphite
bigvul
1
null
null
null
fix a crash with delayed load If a delayed load failed, it could leave the pipeline only half-set up. Sebsequent threads could then segv. Set a load-has-failed flag and test before generate. See https://github.com/jcupitt/libvips/issues/893
20d840e6da15c1574b3ed998bc92f91d1e36c2a5
libvips
bigvul
1
null
null
null
scsi: libsas: fix memory leak in sas_smp_get_phy_events() We've got a memory leak with the following producer: while true; do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null; done The buffer req is allocated and not freed after we return. Fix it. Fixes: 2908d778ab3e ("[SCSI] aic94xx: new driver") Signed-off-by: Jason Yan <[email protected]> CC: John Garry <[email protected]> CC: chenqilin <[email protected]> CC: chenxiang <[email protected]> Reviewed-by: Christoph Hellwig <[email protected]> Reviewed-by: Hannes Reinecke <[email protected]> Signed-off-by: Martin K. Petersen <[email protected]>
4a491b1ab11ca0556d2fda1ff1301e862a2d44c4
linux
bigvul
1
null
null
null
fix some exploitable overflows (#994, #997)
90dc7f853d31b0a4e9441cba97feccf36d8b69a4
gpac
bigvul
1
null
null
null
bash-completion: (umount) use findmnt, escape a space in paths # mount /dev/sdc1 /mnt/test/foo\ bar # umount <tab> has to return "/mnt/test/foo\ bar". Changes: * don't use mount | awk output, we have findmnt * force compgen use \n as entries separator Addresses: https://github.com/karelzak/util-linux/issues/539 Signed-off-by: Karel Zak <[email protected]>
75f03badd7ed9f1dd951863d75e756883d3acc55
util-linux
bigvul
1
null
null
null
opj_mj2_extract: Check provided output prefix for length This uses snprintf() with correct buffer length instead of sprintf(). This prevents a buffer overflow when providing a long output prefix. Furthermore the program exits with an error when the provided output prefix is too long. Fixes #1088.
6d8c0c06ee32dc03ba80acd48334e98728e56cf5
openjpeg
bigvul
1
null
null
null
Fix bug #75981: prevent reading beyond buffer start
523f230c831d7b33353203fa34aee4e92ac12bba
php-src
bigvul
1
null
null
null
rds: Fix NULL pointer dereference in __rds_rdma_map This is a fix for syzkaller719569, where memory registration was attempted without any underlying transport being loaded. Analysis of the case reveals that it is the setsockopt() RDS_GET_MR (2) and RDS_GET_MR_FOR_DEST (7) that are vulnerable. Here is an example stack trace when the bug is hit: BUG: unable to handle kernel NULL pointer dereference at 00000000000000c0 IP: __rds_rdma_map+0x36/0x440 [rds] PGD 2f93d03067 P4D 2f93d03067 PUD 2f93d02067 PMD 0 Oops: 0000 [#1] SMP Modules linked in: bridge stp llc tun rpcsec_gss_krb5 nfsv4 dns_resolver nfs fscache rds binfmt_misc sb_edac intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul c rc32_pclmul ghash_clmulni_intel pcbc aesni_intel crypto_simd glue_helper cryptd iTCO_wdt mei_me sg iTCO_vendor_support ipmi_si mei ipmi_devintf nfsd shpchp pcspkr i2c_i801 ioatd ma ipmi_msghandler wmi lpc_ich mfd_core auth_rpcgss nfs_acl lockd grace sunrpc ip_tables ext4 mbcache jbd2 mgag200 i2c_algo_bit drm_kms_helper ixgbe syscopyarea ahci sysfillrect sysimgblt libahci mdio fb_sys_fops ttm ptp libata sd_mod mlx4_core drm crc32c_intel pps_core megaraid_sas i2c_core dca dm_mirror dm_region_hash dm_log dm_mod CPU: 48 PID: 45787 Comm: repro_set2 Not tainted 4.14.2-3.el7uek.x86_64 #2 Hardware name: Oracle Corporation ORACLE SERVER X5-2L/ASM,MOBO TRAY,2U, BIOS 31110000 03/03/2017 task: ffff882f9190db00 task.stack: ffffc9002b994000 RIP: 0010:__rds_rdma_map+0x36/0x440 [rds] RSP: 0018:ffffc9002b997df0 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff882fa2182580 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffc9002b997e40 RDI: ffff882fa2182580 RBP: ffffc9002b997e30 R08: 0000000000000000 R09: 0000000000000002 R10: ffff885fb29e3838 R11: 0000000000000000 R12: ffff882fa2182580 R13: ffff882fa2182580 R14: 0000000000000002 R15: 0000000020000ffc FS: 00007fbffa20b700(0000) GS:ffff882fbfb80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000c0 CR3: 0000002f98a66006 CR4: 00000000001606e0 Call Trace: rds_get_mr+0x56/0x80 [rds] rds_setsockopt+0x172/0x340 [rds] ? __fget_light+0x25/0x60 ? __fdget+0x13/0x20 SyS_setsockopt+0x80/0xe0 do_syscall_64+0x67/0x1b0 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x7fbff9b117f9 RSP: 002b:00007fbffa20aed8 EFLAGS: 00000293 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00000000000c84a4 RCX: 00007fbff9b117f9 RDX: 0000000000000002 RSI: 0000400000000114 RDI: 000000000000109b RBP: 00007fbffa20af10 R08: 0000000000000020 R09: 00007fbff9dd7860 R10: 0000000020000ffc R11: 0000000000000293 R12: 0000000000000000 R13: 00007fbffa20b9c0 R14: 00007fbffa20b700 R15: 0000000000000021 Code: 41 56 41 55 49 89 fd 41 54 53 48 83 ec 18 8b 87 f0 02 00 00 48 89 55 d0 48 89 4d c8 85 c0 0f 84 2d 03 00 00 48 8b 87 00 03 00 00 <48> 83 b8 c0 00 00 00 00 0f 84 25 03 00 0 0 48 8b 06 48 8b 56 08 The fix is to check the existence of an underlying transport in __rds_rdma_map(). Signed-off-by: Håkon Bugge <[email protected]> Reported-by: syzbot <[email protected]> Acked-by: Santosh Shilimkar <[email protected]> Signed-off-by: David S. Miller <[email protected]>
f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
linux
bigvul
1
null
null
null
New Pre Source
45ef78e037f578b15fc58938a3a3251655e71d6f#diff-d52750c7ba4e594410438569d8e2963aL24
unixodbc
bigvul
1
null
null
null
blkcg: fix double free of new_blkg in blkcg_init_queue If blkg_create fails, new_blkg passed as an argument will be freed by blkg_create, so there is no need to free it again. Signed-off-by: Hou Tao <[email protected]> Signed-off-by: Jens Axboe <[email protected]>
9b54d816e00425c3a517514e0d677bb3cec49258
linux
bigvul
1
null
null
null
issue #28, fix buffer overflows and bad allocs on corrupt CAF files
8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
wavpack
bigvul
1
null
null
null
issue #28, do not overwrite heap on corrupt DSDIFF file
36a24c7881427d2e1e4dc1cef58f19eee0d13aec
wavpack
bigvul
1
null
null
null