commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Use post-increment only in inffast.c. An old inffast.c optimization turns out to not be optimal anymore with modern compilers, and furthermore was not compliant with the C standard, for which decrementing a pointer before its allocated memory is undefined. Per the recommendation of a security audit of the zlib code by Trail of Bits and TrustInSoft, in support of the Mozilla Foundation, this "optimization" was removed, in order to avoid the possibility of undefined behavior.
9aaec95e82117c1cb0f9624264c3618fc380cecb
zlib
bigvul
1
null
null
null
Remove offset pointer optimization in inftrees.c. inftrees.c was subtracting an offset from a pointer to an array, in order to provide a pointer that allowed indexing starting at the offset. This is not compliant with the C standard, for which the behavior of a pointer decremented before its allocated memory is undefined. Per the recommendation of a security audit of the zlib code by Trail of Bits and TrustInSoft, in support of the Mozilla Foundation, this tiny optimization was removed, in order to avoid the possibility of undefined behavior.
6a043145ca6e9c55184013841a67b2fef87e44c0
zlib
bigvul
1
null
null
null
ring-buffer: Prevent overflow of size in ring_buffer_resize() If the size passed to ring_buffer_resize() is greater than MAX_LONG - BUF_PAGE_SIZE then the DIV_ROUND_UP() will return zero. Here's the details: # echo 18014398509481980 > /sys/kernel/debug/tracing/buffer_size_kb tracing_entries_write() processes this and converts kb to bytes. 18014398509481980 << 10 = 18446744073709547520 and this is passed to ring_buffer_resize() as unsigned long size. size = DIV_ROUND_UP(size, BUF_PAGE_SIZE); Where DIV_ROUND_UP(a, b) is (a + b - 1)/b BUF_PAGE_SIZE is 4080 and here 18446744073709547520 + 4080 - 1 = 18446744073709551599 where 18446744073709551599 is still smaller than 2^64 2^64 - 18446744073709551599 = 17 But now 18446744073709551599 / 4080 = 4521260802379792 and size = size * 4080 = 18446744073709551360 This is checked to make sure its still greater than 2 * 4080, which it is. Then we convert to the number of buffer pages needed. nr_page = DIV_ROUND_UP(size, BUF_PAGE_SIZE) but this time size is 18446744073709551360 and 2^64 - (18446744073709551360 + 4080 - 1) = -3823 Thus it overflows and the resulting number is less than 4080, which makes 3823 / 4080 = 0 an nr_pages is set to this. As we already checked against the minimum that nr_pages may be, this causes the logic to fail as well, and we crash the kernel. There's no reason to have the two DIV_ROUND_UP() (that's just result of historical code changes), clean up the code and fix this bug. Cc: [email protected] # 3.5+ Fixes: 83f40318dab00 ("ring-buffer: Make removal of ring buffer pages atomic") Signed-off-by: Steven Rostedt <[email protected]>
59643d1535eb220668692a5359de22545af579f6
linux
bigvul
1
null
null
null
Fixed an array overflow problem in the JPC decoder.
1abc2e5a401a4bf1d5ca4df91358ce5df111f495
jasper
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/298
b61d35eaccc0a7ddeff8a1c3abfcd0a43ccf210b
imagemagick
bigvul
1
null
null
null
The generation of the configuration file jas_config.h has been completely reworked in order to avoid pollution of the global namespace. Some problematic types like uchar, ulong, and friends have been replaced with names with a jas_ prefix. An option max_samples has been added to the BMP and JPEG decoders to restrict the maximum size of image that they can decode. This change was made as a (possibly temporary) fix to address security concerns. A max_samples command-line option has also been added to imginfo. Whether an image component (for jas_image_t) is stored in memory or on disk is now based on the component size (rather than the image size). Some debug log message were added. Some new integer overflow checks were added. Some new safe integer add/multiply functions were added. More pre-C99 cruft was removed. JasPer has numerous "hacks" to handle pre-C99 compilers. JasPer now assumes C99 support. So, this pre-C99 cruft is unnecessary and can be removed. The regression jasper-doublefree-mem_close.jpg has been re-enabled. Theoretically, it should work more predictably now.
d42b2388f7f8e0332c846675133acea151fc557a
jasper
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/301
ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99
imagemagick
bigvul
1
null
null
null
Fix uninitialised values for <i> and <dd> Bug-Debian: https://github.com/tats/w3m/issues/16
33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd
w3m
bigvul
1
null
null
null
added some checks to snap handling
ff254722a2683867fcb3e67569ffd36226c4bc62
teeworlds
bigvul
1
null
null
null
Added some missing sanity checks on the data in a SIZ marker segment.
f7038068550fba0e41e1d0c355787f1dcd5bf330
jasper
bigvul
1
null
null
null
Changed the JPC bitstream code to more gracefully handle a request for a larger sized integer than what can be handled (i.e., return with an error instead of failing an assert).
1e84674d95353c64e5c4c0e7232ae86fd6ea813b
jasper
bigvul
1
null
null
null
Ensure that not all tiles lie outside the image area.
ba2b9d000660313af7b692542afbd374c5685865
jasper
bigvul
1
null
null
null
The component domains must be the same for the ICT/RCT in the JPC codec. This was previously enforced with an assertion. Now, it is handled in a more graceful manner.
dee11ec440d7908d1daf69f40a3324b27cf213ba
jasper
bigvul
1
null
null
null
Fixed a few bugs in the RAS encoder and decoder where errors were tested with assertions instead of being gracefully handled.
411a4068f8c464e883358bf403a3e25158863823
jasper
bigvul
1
null
null
null
Fixed another integer overflow problem.
d91198abd00fc435a397fe6bad906a4c1748e9cf
jasper
bigvul
1
null
null
null
Fix #340: System frozen gdImageCreate() doesn't check for oversized images and as such is prone to DoS vulnerabilities. We fix that by applying the same overflow check that is already in place for gdImageCreateTrueColor(). CVE-2016-9317
1846f48e5fcdde996e7c27a4bbac5d0aef183e4b
libgd
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/296
3cbfb163cff9e5b8cdeace8312e9bfee810ed02b
imagemagick
bigvul
1
null
null
null
Made some changes to the I/O stream library for memory streams. There were a number of potential problems due to the possibility of integer overflow. Changed some integral types to the larger types size_t or ssize_t. For example, the function mem_resize now takes the buffer size parameter as a size_t. Added a new function jas_stream_memopen2, which takes a buffer size specified as a size_t instead of an int. This can be used in jas_image_cmpt_create to avoid potential overflow problems. Added a new function jas_deprecated to warn about reliance on deprecated library behavior.
634ce8e8a5accc0fa05dd2c20d42b4749d4b2735
jasper
bigvul
1
null
null
null
Fix BER decoder integer overflow
987ad747db6d0d7e36f840398f3cf02e2fbfd90f
botan
bigvul
1
null
null
null
Fixed a bug that resulted in the destruction of JP2 box data that had never been constructed in the first place.
e24bdc716c3327b067c551bc6cfb97fd2370358d
jasper
bigvul
1
null
null
null
Fixed a problem with a null pointer dereference in the BMP decoder.
5d66894d2313e3f3469f19066e149e08ff076698
jasper
bigvul
1
null
null
null
Add a one-word sentinel value of 0x0 at the end of each buf_t chunk This helps protect against bugs where any part of a buf_t's memory is passed to a function that expects a NUL-terminated input. It also closes TROVE-2016-10-001 (aka bug 20384).
3cea86eb2fbb65949673eb4ba8ebb695c87a57ce
tor
bigvul
1
null
null
null
The memory stream interface allows for a buffer size of zero. The case of a zero-sized buffer was not handled correctly, as it could lead to a double free. This problem has now been fixed (hopefully). One might ask whether a zero-sized buffer should be allowed at all, but this is a question for another day.
44a524e367597af58d6265ae2014468b334d0309
jasper
bigvul
1
null
null
null
Added range check on XRsiz and YRsiz fields of SIZ marker segment.
d8c2604cd438c41ec72aff52c16ebd8183068020
jasper
bigvul
1
null
null
null
Fixed a sanitizer failure in the BMP codec. Also, added a --debug-level command line option to the imginfo command for debugging purposes.
8f62b4761711d036fd8964df256b938c809b7fca
jasper
bigvul
1
null
null
null
Issue 761: Heap overflow reading corrupted 7Zip files The sample file that demonstrated this had multiple 'EmptyStream' attributes. The first one ended up being used to calculate certain statistics, then was overwritten by the second which was incompatible with those statistics. The fix here is to reject any header with multiple EmptyStream attributes. While here, also reject headers with multiple EmptyFile, AntiFile, Name, or Attributes markers.
7f17c791dcfd8c0416e2cd2485b19410e47ef126
libarchive
bigvul
1
null
null
null
Issue 747 (and others?): Avoid OOB read when parsing multiple long lines The mtree bidder needs to look several lines ahead in the input. It does this by extending the read-ahead and parsing subsequent lines from the same growing buffer. A bookkeeping error when extending the read-ahead would sometimes lead it to significantly over-count the size of the line being read.
eec077f52bfa2d3f7103b4b74d52572ba8a15aca
libarchive
bigvul
1
null
null
null
Issue #767: Buffer overflow printing a filename The safe_fprintf function attempts to ensure clean output for an arbitrary sequence of bytes by doing a trial conversion of the multibyte characters to wide characters -- if the resulting wide character is printable then we pass through the corresponding bytes unaltered, otherwise, we convert them to C-style ASCII escapes. The stack trace in Issue #767 suggest that the 20-byte buffer was getting overflowed trying to format a non-printable multibyte character. This should only happen if there is a valid multibyte character of more than 5 bytes that was unprintable. (Each byte would get expanded to a four-charcter octal-style escape of the form "\123" resulting in >20 characters for the >5 byte multibyte character.) I've not been able to reproduce this, but have expanded the conversion buffer to 128 bytes on the belief that no multibyte character set has a single character of more than 32 bytes.
e37b620fe8f14535d737e89a4dcabaed4517bf1a
libarchive
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/268
6e48aa92ff4e6e95424300ecd52a9ea453c19c60
imagemagick
bigvul
1
null
null
null
m4vdec: Check for non-startcode 00 00 00 sequences in probe This makes the m4v detection less trigger-happy. Bug-Id: 949 Signed-off-by: Diego Biurrun <[email protected]>
e5b019725f53b79159931d3a7317107cbbfd0860
libav
bigvul
1
null
null
null
Avoid potentially dangerous signed to unsigned conversion We make sure to never pass a negative `rlen` as size to memcpy(). See also <https://bugs.php.net/bug.php?id=73280>. Patch provided by Emmanuel Law.
53110871935244816bbb9d131da0bccff734bfe9
libgd
bigvul
1
null
null
null
attach: do not send procfd to attached process So far, we opened a file descriptor refering to proc on the host inside the host namespace and handed that fd to the attached process in attach_child_main(). This was done to ensure that LSM labels were correctly setup. However, by exploiting a potential kernel bug, ptrace could be used to prevent the file descriptor from being closed which in turn could be used by an unprivileged container to gain access to the host namespace. Aside from this needing an upstream kernel fix, we should make sure that we don't pass the fd for proc itself to the attached process. However, we cannot completely prevent this, as the attached process needs to be able to change its apparmor profile by writing to /proc/self/attr/exec or /proc/self/attr/current. To minimize the attack surface, we only send the fd for /proc/self/attr/exec or /proc/self/attr/current to the attached process. To do this we introduce a little more IPC between the child and parent: * IPC mechanism: (X is receiver) * initial process intermediate attached * X <--- send pid of * attached proc, * then exit * send 0 ------------------------------------> X * [do initialization] * X <------------------------------------ send 1 * [add to cgroup, ...] * send 2 ------------------------------------> X * [set LXC_ATTACH_NO_NEW_PRIVS] * X <------------------------------------ send 3 * [open LSM label fd] * send 4 ------------------------------------> X * [set LSM label] * close socket close socket * run program The attached child tells the parent when it is ready to have its LSM labels set up. The parent then opens an approriate fd for the child PID to /proc/<pid>/attr/exec or /proc/<pid>/attr/current and sends it via SCM_RIGHTS to the child. The child can then set its LSM laben. Both sides then close the socket fds and the child execs the requested process. Signed-off-by: Christian Brauner <[email protected]>
81f466d05f2a89cb4f122ef7f593ff3f279b165c
lxc
bigvul
1
null
null
null
IB/rxe: Fix mem_check_range integer overflow Update the range check to avoid integer-overflow in edge case. Resolves CVE 2016-8636. Signed-off-by: Eyal Itkin <[email protected]> Signed-off-by: Dan Carpenter <[email protected]> Reviewed-by: Leon Romanovsky <[email protected]> Signed-off-by: Doug Ledford <[email protected]>
647bf3d8a8e5777319da92af672289b2a6c4dc66
linux
bigvul
1
null
null
null
shaper: fix reallocation Update the variable that tracks the allocated size. This potentially improves performance and avoid some side effects, which lead to undefined behavior in some cases. Fixes fuzzer test case id:000051,sig:11,sync:fuzzer3,src:004221.
aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
libass
bigvul
1
null
null
null
Fix blur coefficient calculation buffer overflow Found by fuzzer test case id:000082,sig:11,src:002579,op:havoc,rep:8. Correctness should be checked, but this fixes the overflow for good.
08e754612019ed84d1db0d1fc4f5798248decd75
libass
bigvul
1
null
null
null
Fix line wrapping mode 0/3 bugs This fixes two separate bugs: a) Don't move a linebreak into the first symbol. This results in a empty line at the front, which does not help to equalize line lengths at all. b) When moving a linebreak into a symbol that already is a break, the number of lines must be decremented. Otherwise, uninitialized memory is possibly used for later layout operations. Found by fuzzer test case id:000085,sig:11,src:003377+003350,op:splice,rep:8.
b72b283b936a600c730e00875d7d067bded3fc26
libass
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/281
d63a3c5729df59f183e9e110d5d8385d17caaad0
imagemagick
bigvul
1
null
null
null
Verify UpdateTempDir isn't maliciously modified Don't just delete the stored updates temporary directory on launch, but validate the registry key to ensure it is in an expected location and follows WinSparkle's naming convention. This is to prevent malicious users from modifying this registry key and forcing the host app to delete arbitrary directories (a user being able to delete the key would be able to delete the directory themselves, so it's not a serious issue, but it nevertheless is bad behavior and shouldn't be possible).
bb454857348245a7397f9e4fbb3a902f4ac25913
winsparkle
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/280
a7bb158b7bedd1449a34432feb3a67c8f1873bfa
imagemagick
bigvul
1
null
null
null
cipher: don't set dummy encryption key in Cipher#initialize Remove the encryption key initialization from Cipher#initialize. This is effectively a revert of r32723 ("Avoid possible SEGV from AES encryption/decryption", 2011-07-28). r32723, which added the key initialization, was a workaround for Ruby Bug #2768. For some certain ciphers, calling EVP_CipherUpdate() before setting an encryption key caused segfault. It was not a problem until OpenSSL implemented GCM mode - the encryption key could be overridden by repeated calls of EVP_CipherInit_ex(). But, it is not the case for AES-GCM ciphers. Setting a key, an IV, a key, in this order causes the IV to be reset to an all-zero IV. The problem of Bug #2768 persists on the current versions of OpenSSL. So, make Cipher#update raise an exception if a key is not yet set by the user. Since encrypting or decrypting without key does not make any sense, this should not break existing applications. Users can still call Cipher#key= and Cipher#iv= multiple times with their own responsibility. Reference: https://bugs.ruby-lang.org/issues/2768 Reference: https://bugs.ruby-lang.org/issues/8221 Reference: https://github.com/ruby/openssl/issues/49
8108e0a6db133f3375608303fdd2083eb5115062
openssl
bigvul
1
null
null
null
Fix: remote: cl#5269 - Notify other clients of a new connection only if the handshake has completed (bsc#967388)
5ec24a2642bd0854b884d1a9b51d12371373b410
pacemaker
bigvul
1
null
null
null
sandbox: create a new session for sandboxed processes It helps to prevent sandboxed processes to inject arbitrary commands into the parent. Signed-off-by: Petr Lautrbach <[email protected]>
acca96a135a4d2a028ba9b636886af99c0915379
selinux
bigvul
1
null
null
null
Fix abort when writing to rgf format The rgf format (LEGO MINDSTORMS EV3 images) caused a software abort because exception == NULL. When WriteRGFImage is called from WriteImage, it is only passed two parameters, not three. So, removed the extra parameter and use image->exception instead as in other coders.
a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7
imagemagick
bigvul
1
null
null
null
http://www.imagemagick.org/discourse-server/viewtopic.php?f=2&t=28946
4e81ce8b07219c69a9aeccb0f7f7b927ca6db74c
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/148
53c1dcd34bed85181b901bfce1a2322f85a59472
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/143
424d40ebfcde48bb872eba75179d3d73704fdf1f
imagemagick
bigvul
1
null
null
null
Fixed SEGV reported in https://github.com/ImageMagick/ImageMagick/issues/130
478cce544fdf1de882d78381768458f397964453
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/126
430403b0029b37decf216d57f810899cab2317dd
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/120
bef1e4f637d8f665bc133a9c6d30df08d983bc3a
imagemagick
bigvul
1
null
null
null
Added check for out of bounds read (https://github.com/ImageMagick/ImageMagick/issues/108).
4f2c04ea6673863b87ac7f186cbb0d911f74085c
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/105
c4e63ad30bc42da691f2b5f82a24516dd6b4dc70
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/104
a2e1064f288a353bc5fef7f79ccb7683759e775c
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/99
ca0c886abd6d3ef335eb74150cd23b89ebd17135
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/122
a251039393f423c7858e63cab6aa98d17b8b7a41
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/issues/102
b6ae2f9e0ab13343c0281732d479757a8e8979c7
imagemagick
bigvul
1
null
null
null
Fixed head buffer overflow reported in: https://github.com/ImageMagick/ImageMagick/issues/98
5f16640725b1225e6337c62526e6577f0f88edb8
imagemagick
bigvul
1
null
null
null
Added extra check to fix https://github.com/ImageMagick/ImageMagick/issues/93
4b1b9c0522628887195bad3a6723f7000b0c9a58
imagemagick
bigvul
1
null
null
null
Moved check for https://github.com/ImageMagick/ImageMagick/issues/92.
30eec879c8b446b0ea9a3bb0da1a441cc8482bc4
imagemagick
bigvul
1
null
null
null
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537213
14e606db148d6ebcaae20f1e1d6d71903ca4a556
imagemagick
bigvul
1
null
null
null
Fixed check for the number of pixels that will be allocated.
2ad6d33493750a28a5a655d319a8e0b16c392de1
imagemagick
bigvul
1
null
null
null
Added missing call to ConstrainColormapIndex.
e14fd0a2801f73bdc123baf4fbab97dec55919eb
imagemagick
bigvul
1
null
null
null
Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key
61cdd1255d5b9c8453be71aacbbf682796ac77d4
php-src
bigvul
1
null
null
null
Fix to prevent SASL security vulnerability
f50a84bad996d438e7b31b9e74c32a41e43f8be5
nefarious2
bigvul
1
null
null
null
Fix AUTHENTICATE bug
f473e355e1dc422c4f019dbf86bc50ba1a34a766
unrealircd
bigvul
1
null
null
null
Prevent buffer overflow in BMP & SGI coders (bug report from pwchen&rayzhong of tencent)
7afcf9f71043df15508e46f079387bd4689a738d
imagemagick
bigvul
1
null
null
null
Fix double-free in gdImageWebPtr() The issue is that gdImageWebpCtx() (which is called by gdImageWebpPtr() and the other WebP output functions to do the real work) does not return whether it succeeded or failed, so this is not checked in gdImageWebpPtr() and the function wrongly assumes everything is okay, which is not, in this case, because there is a size limitation for WebP, namely that the width and height must by less than 16383. We can't change the signature of gdImageWebpCtx() for API compatibility reasons, so we introduce the static helper _gdImageWebpCtx() which returns success respective failure, so gdImageWebpPtr() and gdImageWebpPtrEx() can check the return value. We leave it solely to libwebp for now to report warnings regarding the failing write. This issue had been reported by Ibrahim El-Sayed to [email protected]. CVE-2016-6912
a49feeae76d41959d85ee733925a4cf40bac61b2
libgd
bigvul
1
null
null
null
Fix invalid read in gdImageCreateFromTiffPtr() tiff_invalid_read.tiff is corrupt, and causes an invalid read in gdImageCreateFromTiffPtr(), but not in gdImageCreateFromTiff(). The culprit is dynamicGetbuf(), which doesn't check for out-of-bound reads. In this case, dynamicGetbuf() is called with a negative dp->pos, but also positive buffer overflows have to be handled, in which case 0 has to be returned (cf. commit 75e29a9). Fixing dynamicGetbuf() exhibits that the corrupt TIFF would still create the image, because the return value of TIFFReadRGBAImage() is not checked. We do that, and let createFromTiffRgba() fail if TIFFReadRGBAImage() fails. This issue had been reported by Ibrahim El-Sayed to [email protected]. CVE-2016-6911
4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae
libgd
bigvul
1
null
null
null
Fix OOB reads of the TGA decompression buffer It is possible to craft TGA files which will overflow the decompression buffer, but not the image's bitmap. Therefore we augment the check for the bitmap's overflow with a check for the buffer's overflow. This issue had been reported by Ibrahim El-Sayed to [email protected]. CVE-2016-6906
fb0e0cce0b9f25389ab56604c3547351617e1415
libgd
bigvul
1
null
null
null
Fix infinite recursion in wddx Summary: It wasn't checking for infinite recursion due to references or self-referential objects. As it turns out closures always return themselves when converted to an array. Raising a warning and returning is how PHP-src deals with this problem, nothing special is done for closures. Reviewed By: alexmalyshev Differential Revision: D3465655 fbshipit-source-id: a42bc34d30cf4825faf33596139c0c05f8e4f5f1
1888810e77b446a79a7674784d5f139fcfa605e2
hhvm
bigvul
1
null
null
null
Fix recursion checks in array_*_recursive Summary: array_merge_recursive and array_replace_recursive do recursion checks, but use the fact that normal arrays can't contain cycles except through references to avoid most of the checking. Unfortunately the $GLOBALS array is special, and /can/ contain cycles without references, and ProxyArrays could potentially do the same (via an as-yet unimplemented extension). Reviewed By: mxw Differential Revision: D3622612 fbshipit-source-id: ed90b747096a05919a80c4793e2a2b7c57584d56
05e706d98f748f609b19d8697e490eaab5007d69
hhvm
bigvul
1
null
null
null
Fix self recursion in compact Summary: There were no checks at all. Reviewed By: alexmalyshev Differential Revision: D3623763 fbshipit-source-id: 9d708deca05bbd121503e8f323b4f295fde8e835
e264f04ae825a5d97758130cf8eec99862517e7e
hhvm
bigvul
1
null
null
null
Fix integer overflow in StringUtil::implode Reviewed By: ricklavoie Differential Revision: D3623922 fbshipit-source-id: 136d124a850c07cc6c63535afc11d36499d576fc
2c9a8fcc73a151608634d3e712973d192027c271
hhvm
bigvul
1
null
null
null
Fix buffer overrun due to integer overflow in bcmath Summary: scale gets passed around as an int inside the library. Reviewed By: mxw Differential Revision: D3624520 fbshipit-source-id: d39927413cec24fda2e475a296ad5d9019ccef0a
c00fc9d3003eb06226b58b6a48555f1456ee2475
hhvm
bigvul
1
null
null
null
Use req::strndup in php_mb_parse_encoding_list to prevent oob memory write. Summary: Fix out of bounds write access in mb_detect_encoding. Using strndup in php_mb_parse_encoding_list will cause strings with embedded nulls to be unexpectedly shortened. The expected length of the string is tracked in value_length but since strndup may copy fewer characters when there are mbedded null this can lead to oob writes into tmpstr. I've found a couple other places in this file that use strndup and replaced them with req::strndup as well. The use of strndup in mb_send_mail also seemed to be a leak. This replaces uses of strndup with req::strndup which can handle embedded nulls properly. It looks like I also accidentally fixed t11337047 at the same time. Adding it to the list of tasks. Reviewed By: paulbiss Differential Revision: D3360065 fbshipit-source-id: 99776cf9105e3789883380bf30240009eec52cec
365abe807cab2d60dc9ec307292a06181f77a9c2
hhvm
bigvul
1
null
null
null
Prevent buffer overflow in BMP coder (bug report from pwchen of tencent).
4cc6ec8a4197d4c008577127736bf7985d632323
imagemagick
bigvul
1
null
null
null
7483 SMB flush on pipe triggers NULL pointer dereference in module smbsrv Reviewed by: Gordon Ross <[email protected]> Reviewed by: Matt Barden <[email protected]> Reviewed by: Evan Layton <[email protected]> Reviewed by: Dan McDonald <[email protected]> Approved by: Gordon Ross <[email protected]>
6d1c73b5858fefc6161c7d686345f0dc887ea799
illumos-gate
bigvul
1
null
null
null
7488 bcopy and bzero should mind signed bits Reviewed by: Jerry Jelinek <[email protected]> Reviewed by: Patrick Mooney <[email protected]> Approved by: Richard Lowe <[email protected]>
5aaab1a49679c26dbcb6fb6dc25799950d70cc71
illumos-gate
bigvul
1
null
null
null
Add ZRTP Commit packet hvi check on DHPart2 packet reception
bbb1e6e2f467ee4bd7b9a8c800e4f07343d7d99b
bzrtp
bigvul
1
null
null
null
Don't allow unhandled POSTs to write to the filesystem by default If there's no registered handler for a POST request, the default behaviour is to write it to the filesystem. Several million deployed devices appear to have this behaviour, making it possible to (at least) store arbitrary data on them. Add a configure option that enables this behaviour, and change the default to just drop POSTs that aren't directly handled.
be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
pupnp-code
bigvul
1
null
null
null
rsa_verify_hash: fix possible bleichenbacher signature attack
5eb9743410ce4657e9d54fef26a2ee31a1b5dd0
libtomcrypt
bigvul
1
null
null
null
fix bug #71719 (Buffer overflow in HTTP url parsing functions) The parser's offset was not reset when we softfail in scheme parsing and continue to parse a path. Thanks to hlt99 at blinkenshell dot org for the report.
3724cd76a28be1d6049b5537232e97ac
ext-http
bigvul
1
null
null
null
Fix integer overflow in rwpng.h (CVE-2016-5735) Reported by Choi Jaeseung Found with Sparrow (http://ropas.snu.ac.kr/sparrow)
b7c217680cda02dddced245d237ebe8c383be285
pngquant
bigvul
1
null
null
null
Fix division by zero Fix uclouvain/openjpeg#733
8f9cc62b3f9a1da9712329ddcedb9750d585505c
openjpeg
bigvul
1
null
null
null
Fix Heap Buffer Overflow in function color_cmyk_to_rgb Fix uclouvain/openjpeg#774
162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
openjpeg
bigvul
1
null
null
null
acpi: Disable APEI error injection if securelevel is set ACPI provides an error injection mechanism, EINJ, for debugging and testing the ACPI Platform Error Interface (APEI) and other RAS features. If supported by the firmware, ACPI specification 5.0 and later provide for a way to specify a physical memory address to which to inject the error. Injecting errors through EINJ can produce errors which to the platform are indistinguishable from real hardware errors. This can have undesirable side-effects, such as causing the platform to mark hardware as needing replacement. While it does not provide a method to load unauthenticated privileged code, the effect of these errors may persist across reboots and affect trust in the underlying hardware, so disable error injection through EINJ if securelevel is set. Signed-off-by: Linn Crosetto <[email protected]>
d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
linux
bigvul
1
null
null
null
Fix Out-Of-Bounds Read in sycc42x_to_rgb function (#745) 42x Images with an odd x0/y0 lead to subsampled component starting at the 2nd column/line. That is offset = comp->dx * comp->x0 - image->x0 = 1 Fix #726
15f081c89650dccee4aa4ae66f614c3fdb268767
openjpeg
bigvul
1
null
null
null
minissdpd.c: Initialize pointers to NULL (fix)
140ee8d2204b383279f854802b27bdb41c1d5d1a
miniupnp
bigvul
1
null
null
null
minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero
b238cade9a173c6f751a34acf8ccff838a62aa47
miniupnp
bigvul
1
null
null
null
Fix integer underflow vulnerability in L3 decode. Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header decoding routines were vulnerable to an integer underflow, if the 32-bit header length was less than the base level 3 header length. This could lead to an exploitable heap corruption condition. Thanks go to Marcin Noga and Regina Wilson of Cisco TALOS for reporting this vulnerability.
6fcdb8f1f538b9d63e63a5fa199c5514a15d4564
lhasa
bigvul
1
null
null
null
zebra: stack overrun in IPv6 RA receive code (CVE-2016-1245) The IPv6 RA code also receives ICMPv6 RS and RA messages. Unfortunately, by bad coding practice, the buffer size specified on receiving such messages mixed up 2 constants that in fact have different values. The code itself has: #define RTADV_MSG_SIZE 4096 While BUFSIZ is system-dependent, in my case (x86_64 glibc): /usr/include/_G_config.h:#define _G_BUFSIZ 8192 /usr/include/libio.h:#define _IO_BUFSIZ _G_BUFSIZ /usr/include/stdio.h:# define BUFSIZ _IO_BUFSIZ FreeBSD, OpenBSD, NetBSD and Illumos are not affected, since all of them have BUFSIZ == 1024. As the latter is passed to the kernel on recvmsg(), it's possible to overwrite 4kB of stack -- with ICMPv6 packets that can be globally sent to any of the system's addresses (using fragmentation to get to 8k). (The socket has filters installed limiting this to RS and RA packets, but does not have a filter for source address or TTL.) Issue discovered by trying to test other stuff, which randomly caused the stack to be smaller than 8kB in that code location, which then causes the kernel to report EFAULT (Bad address). Signed-off-by: David Lamparter <[email protected]> Reviewed-by: Donald Sharp <[email protected]>
cfb1fae25f8c092e0d17073eaf7bd428ce1cd546
quagga
bigvul
1
null
null
null
Do not use "/bin/sh" to run external commands. Picocom no longer uses /bin/sh to run external commands for file-transfer operations. Parsing the command line and spliting it into arguments is now performed internally by picocom, using quoting rules very similar to those of the Unix shell. Hopefully, this makes it impossible to inject shell-commands when supplying filenames or extra arguments to the send- and receive-file commands.
1ebc60b20fbe9a02436d5cbbf8951714e749ddb1
picocom
bigvul
1
null
null
null
perf: Tighten (and fix) the grouping condition The fix from 9fc81d87420d ("perf: Fix events installation during moving group") was incomplete in that it failed to recognise that creating a group with events for different CPUs is semantically broken -- they cannot be co-scheduled. Furthermore, it leads to real breakage where, when we create an event for CPU Y and then migrate it to form a group on CPU X, the code gets confused where the counter is programmed -- triggered in practice as well by me via the perf fuzzer. Fix this by tightening the rules for creating groups. Only allow grouping of counters that can be co-scheduled in the same context. This means for the same task and/or the same cpu. Fixes: 9fc81d87420d ("perf: Fix events installation during moving group") Signed-off-by: Peter Zijlstra (Intel) <[email protected]> Cc: Arnaldo Carvalho de Melo <[email protected]> Cc: Jiri Olsa <[email protected]> Cc: Linus Torvalds <[email protected]> Link: http://lkml.kernel.org/r/[email protected] Signed-off-by: Ingo Molnar <[email protected]>
c3c87e770458aa004bd7ed3f29945ff436fd6511
linux
bigvul
1
null
null
null
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26857
b8f17d08b7418204bf8a05a5c24e87b2fc395b75
imagemagick
bigvul
1
null
null
null
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26848
bd96074b254c6607a0f7731e59f923ad19d5a46d
imagemagick
bigvul
1
null
null
null
Fixed infinite loop and added checks for the sscanf result.
97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6
imagemagick
bigvul
1
null
null
null
https://github.com/ImageMagick/ImageMagick/pull/34
5b4bebaa91849c592a8448bc353ab25a54ff8c44
imagemagick
bigvul
1
null
null
null
Fixed out of bounds error in SpliceImage.
7b1cf5784b5bcd85aa9293ecf56769f68c037231
imagemagick
bigvul
1
null
null
null
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362
4f68e9661518463fca523c9726bb5d940a2aa6d8
imagemagick
bigvul
1
null
null
null
A DWARF related section marked SHT_NOBITS (elf section type) is an error in the elf object. Now detected. dwarf_elf_access.c
11750a2838e52953013e3114ef27b3c7b1780697
libdwarf
bigvul
1
null
null
null
Check sector and cluster size before use. Otherwise malformed FS can cause heap corruption.
2e86ae5f81da11f11673d0546efb525af02b7786
exfat
bigvul
1
null
null
null