idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
497,981 | media_tree | fa52bd506f274b7619955917abfde355e3d19ffe | http://git.linuxtv.org/cgit.cgi/media_tree | http://git.linuxtv.org/cgit.cgi/media_tree.git/commit/?id=fa52bd506f274b7619955917abfde355e3d19ffe | [media] usbvision: fix crash on detecting device with invalid configuration
The usbvision driver crashes when a specially crafted usb device with invalid
number of interfaces or endpoints is detected. This fix adds checks that the
device has proper configuration expected by the driver.
Reported-by: Ralf Spenneberg <r... | 0 | static int usbvision_probe(struct usb_interface *intf,
const struct usb_device_id *devid)
{
struct usb_device *dev = usb_get_dev(interface_to_usbdev(intf));
struct usb_interface *uif;
__u8 ifnum = intf->altsetting->desc.bInterfaceNumber;
const struct usb_host_interface *interface;
struct usb_usbvision *usbvi... | 203,101,550,480,497,700,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-7833 | The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor. | https://nvd.nist.gov/vuln/detail/CVE-2015-7833 |
215,958 | media_tree | eca2d34b9d2ce70165a50510659838e28ca22742 | http://git.linuxtv.org/cgit.cgi/media_tree | https://git.linuxtv.org/media_tree.git/commit/?id=eca2d34b9d2ce70165a50510659838e28ca22742 | [media] mb86a20s: apply mask to val after checking for read failure
Appling the mask 0x0f to the immediate return of the call to
mb86a20s_readreg will always result in a positive value, meaning that the
check of ret < 0 will never work. Instead, check for a -ve return value
first, and then mask val with 0x0f.
Kudos ... | 1 | static int mb86a20s_read_status(struct dvb_frontend *fe, enum fe_status *status)
{
struct mb86a20s_state *state = fe->demodulator_priv;
int val;
*status = 0;
val = mb86a20s_readreg(state, 0x0a) & 0xf;
if (val < 0)
return val;
if (val >= 2)
*status |= FE_HAS_SIGNAL;
if (val >= 4)
*status |= FE_HAS_CARRI... | 38,764,065,843,598,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5400 | Memory leak in the airspy_probe function in drivers/media/usb/airspy/airspy.c in the airspy USB driver in the Linux kernel before 4.7 allows local users to cause a denial of service (memory consumption) via a crafted USB device that emulates many VFL_TYPE_SDR or VFL_TYPE_SUBDEV devices and performs many connect and dis... | https://nvd.nist.gov/vuln/detail/CVE-2016-5400 |
498,314 | media_tree | eca2d34b9d2ce70165a50510659838e28ca22742 | http://git.linuxtv.org/cgit.cgi/media_tree | https://git.linuxtv.org/media_tree.git/commit/?id=eca2d34b9d2ce70165a50510659838e28ca22742 | [media] mb86a20s: apply mask to val after checking for read failure
Appling the mask 0x0f to the immediate return of the call to
mb86a20s_readreg will always result in a positive value, meaning that the
check of ret < 0 will never work. Instead, check for a -ve return value
first, and then mask val with 0x0f.
Kudos ... | 0 | static int mb86a20s_read_status(struct dvb_frontend *fe, enum fe_status *status)
{
struct mb86a20s_state *state = fe->demodulator_priv;
int val;
*status = 0;
val = mb86a20s_readreg(state, 0x0a);
if (val < 0)
return val;
val &= 0xf;
if (val >= 2)
*status |= FE_HAS_SIGNAL;
if (val >= 4)
*status |= FE_HA... | 86,561,553,709,108,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5400 | Memory leak in the airspy_probe function in drivers/media/usb/airspy/airspy.c in the airspy USB driver in the Linux kernel before 4.7 allows local users to cause a denial of service (memory consumption) via a crafted USB device that emulates many VFL_TYPE_SDR or VFL_TYPE_SUBDEV devices and performs many connect and dis... | https://nvd.nist.gov/vuln/detail/CVE-2016-5400 |
215,961 | libidn | 11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4 | http://git.savannah.gnu.org/cgit/libidn | http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4 | Fix memory leak in last fix. | 1 | idna_to_ascii_4i (const uint32_t * in, size_t inlen, char *out, int flags)
{
size_t len, outlen;
uint32_t *src; /* XXX don't need to copy data? */
int rc;
/*
* ToASCII consists of the following steps:
*
* 1. If all code points in the sequence are in the ASCII range (0..7F)
* then skip to step 3.
... | 127,857,680,571,525,350,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6261 | The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input. | https://nvd.nist.gov/vuln/detail/CVE-2016-6261 |
498,371 | libidn | 11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4 | http://git.savannah.gnu.org/cgit/libidn | http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4 | Fix memory leak in last fix. | 0 | idna_to_ascii_4i (const uint32_t * in, size_t inlen, char *out, int flags)
{
size_t len, outlen;
uint32_t *src; /* XXX don't need to copy data? */
int rc;
/*
* ToASCII consists of the following steps:
*
* 1. If all code points in the sequence are in the ASCII range (0..7F)
* then skip to step 3.
... | 32,588,989,786,821,510,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6261 | The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input. | https://nvd.nist.gov/vuln/detail/CVE-2016-6261 |
215,962 | libidn | 5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 | http://git.savannah.gnu.org/cgit/libidn | http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 | Really fix bug when reading \00 inputs. | 1 | main (int argc, char *argv[])
{
struct gengetopt_args_info args_info;
char *line = NULL;
size_t linelen = 0;
char *p, *r;
uint32_t *q;
unsigned cmdn = 0;
int rc;
setlocale (LC_ALL, "");
set_program_name (argv[0]);
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
if (cmdline_parser (a... | 178,628,511,189,092,180,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6262 | idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948. | https://nvd.nist.gov/vuln/detail/CVE-2016-6262 |
498,373 | libidn | 5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 | http://git.savannah.gnu.org/cgit/libidn | http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 | Really fix bug when reading \00 inputs. | 0 | main (int argc, char *argv[])
{
struct gengetopt_args_info args_info;
char *line = NULL;
size_t linelen = 0;
char *p, *r;
uint32_t *q;
unsigned cmdn = 0;
int rc;
setlocale (LC_ALL, "");
set_program_name (argv[0]);
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
if (cmdline_parser (a... | 324,056,797,188,847,150,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6262 | idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948. | https://nvd.nist.gov/vuln/detail/CVE-2016-6262 |
215,974 | icoutils | 4fbe9222fd79ee31b7ec031b0be070a9a400d1d3 | http://git.savannah.gnu.org/cgit/icoutils | http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=4fbe9222fd79ee31b7ec031b0be070a9a400d1d3 | wrestool: Make check_offset more stringent | 1 | check_offset(char *memory, int total_size, char *name, void *offset, int size)
{
ptrdiff_t need_size = (char *) offset - memory + size;
/*debug("check_offset: size=%x vs %x offset=%x size=%x\n",
need_size, total_size, (char *) offset - memory, size);*/
if (need_size < 0 || need_size > total_size) {
warn(_("%s:... | 28,940,339,251,010,950,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-5208 | Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-5208 |
498,399 | icoutils | 4fbe9222fd79ee31b7ec031b0be070a9a400d1d3 | http://git.savannah.gnu.org/cgit/icoutils | http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=4fbe9222fd79ee31b7ec031b0be070a9a400d1d3 | wrestool: Make check_offset more stringent | 0 | check_offset(char *memory, int total_size, char *name, void *offset, int size)
{
char* memory_end = memory + total_size;
char* block = (char*)offset;
char* block_end = offset + size;
/*debug("check_offset: size=%x vs %x offset=%x size=%x\n",
need_size, total_size, (char *) offset - memory, size);*/
if (((memor... | 318,921,570,884,963,100,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-5208 | Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-5208 |
215,975 | icoutils | 1a108713ac26215c7568353f6e02e727e6d4b24a | http://git.savannah.gnu.org/cgit/icoutils | http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a | wrestool: Fix an index, additional check | 1 | extract_group_icon_cursor_resource(WinLibrary *fi, WinResource *wr, char *lang,
int *ressize, bool is_icon)
{
Win32CursorIconDir *icondir;
Win32CursorIconFileDir *fileicondir;
char *memory;
int c, size, offset, skipped;
/* get resource data and size */
icondir = (Win32CursorIco... | 21,072,850,875,345,257,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-5333 | Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5333 |
498,401 | icoutils | 1a108713ac26215c7568353f6e02e727e6d4b24a | http://git.savannah.gnu.org/cgit/icoutils | http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a | wrestool: Fix an index, additional check | 0 | extract_group_icon_cursor_resource(WinLibrary *fi, WinResource *wr, char *lang,
int *ressize, bool is_icon)
{
Win32CursorIconDir *icondir;
Win32CursorIconFileDir *fileicondir;
char *memory;
int c, size, offset, skipped;
/* get resource data and size */
icondir = (Win32CursorIco... | 324,867,664,418,490,200,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-5333 | Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file. | https://nvd.nist.gov/vuln/detail/CVE-2017-5333 |
215,980 | wget | 4d729e322fae359a1aefaafec1144764a54e8ad4 | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4 | Fix CRLF injection in Wget host part
* src/url.c (url_parse): Reject control characters in host part of URL
Reported-by: Orange Tsai | 1 | url_parse (const char *url, int *error, struct iri *iri, bool percent_encode)
{
struct url *u;
const char *p;
bool path_modified, host_modified;
enum url_scheme scheme;
const char *seps;
const char *uname_b, *uname_e;
const char *host_b, *host_e;
const char *path_b, *path_e;
const char... | 227,774,665,447,914,740,000,000,000,000,000,000,000 | None | null | [
"CWE-93"
] | CVE-2017-6508 | CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL. | https://nvd.nist.gov/vuln/detail/CVE-2017-6508 |
498,444 | wget | 4d729e322fae359a1aefaafec1144764a54e8ad4 | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4 | Fix CRLF injection in Wget host part
* src/url.c (url_parse): Reject control characters in host part of URL
Reported-by: Orange Tsai | 0 | url_parse (const char *url, int *error, struct iri *iri, bool percent_encode)
{
struct url *u;
const char *p;
bool path_modified, host_modified;
enum url_scheme scheme;
const char *seps;
const char *uname_b, *uname_e;
const char *host_b, *host_e;
const char *path_b, *path_e;
const char... | 86,756,306,669,998,620,000,000,000,000,000,000,000 | None | null | [
"CWE-93"
] | CVE-2017-6508 | CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL. | https://nvd.nist.gov/vuln/detail/CVE-2017-6508 |
215,981 | libcroco | 898e3a8c8c0314d2e6b106809a8e3e93cf9d4394 | https://git.gnome.org/browse/libcroco | https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394 | input: check end of input before reading a byte
When reading bytes we weren't check that the index wasn't
out of bound and this could produce an invalid read which
could deal to a security bug. | 1 | cr_input_read_byte (CRInput * a_this, guchar * a_byte)
{
g_return_val_if_fail (a_this && PRIVATE (a_this)
&& a_byte, CR_BAD_PARAM_ERROR);
g_return_val_if_fail (PRIVATE (a_this)->next_byte_index <=
PRIVATE (a_this)->nb_bytes, CR_BAD_PARAM_ERROR... | 230,441,619,604,958,360,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-7960 | The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7960 |
498,469 | libcroco | 898e3a8c8c0314d2e6b106809a8e3e93cf9d4394 | https://git.gnome.org/browse/libcroco | https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394 | input: check end of input before reading a byte
When reading bytes we weren't check that the index wasn't
out of bound and this could produce an invalid read which
could deal to a security bug. | 0 | cr_input_read_byte (CRInput * a_this, guchar * a_byte)
{
gulong nb_bytes_left = 0;
g_return_val_if_fail (a_this && PRIVATE (a_this)
&& a_byte, CR_BAD_PARAM_ERROR);
g_return_val_if_fail (PRIVATE (a_this)->next_byte_index <=
PRIVATE (a_... | 135,681,970,525,518,550,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-7960 | The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7960 |
215,984 | libcroco | 9ad72875e9f08e4c519ef63d44cdbd94aa9504f7 | https://git.gnome.org/browse/libcroco | https://git.gnome.org/browse/libcroco/commit/?id=9ad72875e9f08e4c519ef63d44cdbd94aa9504f7 | tknzr: support only max long rgb values
This fixes a possible out of bound when reading rgbs which
are longer than the support MAXLONG | 1 | cr_tknzr_parse_rgb (CRTknzr * a_this, CRRgb ** a_rgb)
{
enum CRStatus status = CR_OK;
CRInputPos init_pos;
CRNum *num = NULL;
guchar next_bytes[3] = { 0 }, cur_byte = 0;
glong red = 0,
green = 0,
blue = 0,
i = 0;
gboolean is... | 110,601,798,526,890,110,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-7961 | The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE... | https://nvd.nist.gov/vuln/detail/CVE-2017-7961 |
498,484 | libcroco | 9ad72875e9f08e4c519ef63d44cdbd94aa9504f7 | https://git.gnome.org/browse/libcroco | https://git.gnome.org/browse/libcroco/commit/?id=9ad72875e9f08e4c519ef63d44cdbd94aa9504f7 | tknzr: support only max long rgb values
This fixes a possible out of bound when reading rgbs which
are longer than the support MAXLONG | 0 | cr_tknzr_parse_rgb (CRTknzr * a_this, CRRgb ** a_rgb)
{
enum CRStatus status = CR_OK;
CRInputPos init_pos;
CRNum *num = NULL;
guchar next_bytes[3] = { 0 }, cur_byte = 0;
glong red = 0,
green = 0,
blue = 0,
i = 0;
gboolean is... | 335,684,837,034,094,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-7961 | The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE... | https://nvd.nist.gov/vuln/detail/CVE-2017-7961 |
215,987 | wget | d892291fb8ace4c3b734ea5125770989c215df3f | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f | Fix stack overflow in HTTP protocol handling (CVE-2017-13089)
* src/http.c (skip_short_body): Return error on negative chunk size
Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint
Reported-by: Juhani Eronen from Finnish National Cyber Security Centre | 1 | skip_short_body (int fd, wgint contlen, bool chunked)
{
enum {
SKIP_SIZE = 512, /* size of the download buffer */
SKIP_THRESHOLD = 4096 /* the largest size we read */
};
wgint remaining_chunk_size = 0;
char dlbuf[SKIP_SIZE + 1];
dlbuf[SKIP_SIZE] = '\0'; /* so DEBUGP can sa... | 23,440,613,735,665,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13089 | The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the... | https://nvd.nist.gov/vuln/detail/CVE-2017-13089 |
498,544 | wget | d892291fb8ace4c3b734ea5125770989c215df3f | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f | Fix stack overflow in HTTP protocol handling (CVE-2017-13089)
* src/http.c (skip_short_body): Return error on negative chunk size
Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint
Reported-by: Juhani Eronen from Finnish National Cyber Security Centre | 0 | skip_short_body (int fd, wgint contlen, bool chunked)
{
enum {
SKIP_SIZE = 512, /* size of the download buffer */
SKIP_THRESHOLD = 4096 /* the largest size we read */
};
wgint remaining_chunk_size = 0;
char dlbuf[SKIP_SIZE + 1];
dlbuf[SKIP_SIZE] = '\0'; /* so DEBUGP can sa... | 79,848,865,014,604,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13089 | The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the... | https://nvd.nist.gov/vuln/detail/CVE-2017-13089 |
215,988 | wget | ba6b44f6745b14dce414761a8e4b35d31b176bba | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | Fix heap overflow in HTTP protocol handling (CVE-2017-13090)
* src/retr.c (fd_read_body): Stop processing on negative chunk size
Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint
Reported-by: Juhani Eronen from Finnish National Cyber Security Centre | 1 | fd_read_body (const char *downloaded_filename, int fd, FILE *out, wgint toread, wgint startpos,
wgint *qtyread, wgint *qtywritten, double *elapsed, int flags,
FILE *out2)
{
int ret = 0;
#undef max
#define max(a,b) ((a) > (b) ? (a) : (b))
int dlbufsize = max (BUFSIZ, 8 * 1024);
char *d... | 16,084,758,394,362,845,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
498,567 | wget | ba6b44f6745b14dce414761a8e4b35d31b176bba | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba | Fix heap overflow in HTTP protocol handling (CVE-2017-13090)
* src/retr.c (fd_read_body): Stop processing on negative chunk size
Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint
Reported-by: Juhani Eronen from Finnish National Cyber Security Centre | 0 | fd_read_body (const char *downloaded_filename, int fd, FILE *out, wgint toread, wgint startpos,
wgint *qtyread, wgint *qtywritten, double *elapsed, int flags,
FILE *out2)
{
int ret = 0;
#undef max
#define max(a,b) ((a) > (b) ? (a) : (b))
int dlbufsize = max (BUFSIZ, 8 * 1024);
char *d... | 69,563,111,407,593,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-13090 | The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ... | https://nvd.nist.gov/vuln/detail/CVE-2017-13090 |
215,991 | gcab | bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b | https://git.gnome.org/browse/gcab | https://git.gnome.org/browse/gcab/commit/?id=bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b | Do not crash when ncbytes is larger than the buffer size
This fixes CVE-2018-5345 | 1 | cdata_read (cdata_t *cd, guint8 res_data, gint comptype,
GDataInputStream *in, GCancellable *cancellable, GError **error)
{
gboolean success = FALSE;
int ret, zret = Z_OK;
gint compression = comptype & GCAB_COMPRESSION_MASK;
guint8 *buf = compression == GCAB_COMPRESSION_NONE ? cd->out : cd-... | 296,636,607,922,968,030,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5345 | A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file. | https://nvd.nist.gov/vuln/detail/CVE-2018-5345 |
498,616 | gcab | bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b | https://git.gnome.org/browse/gcab | https://git.gnome.org/browse/gcab/commit/?id=bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b | Do not crash when ncbytes is larger than the buffer size
This fixes CVE-2018-5345 | 0 | cdata_read (cdata_t *cd, guint8 res_data, gint comptype,
GDataInputStream *in, GCancellable *cancellable, GError **error)
{
gboolean success = FALSE;
int ret, zret = Z_OK;
gint compression = comptype & GCAB_COMPRESSION_MASK;
gsize buf_sz;
guint8 *buf = NULL;
guint32 datacsum;
gu... | 248,861,159,412,543,400,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-5345 | A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file. | https://nvd.nist.gov/vuln/detail/CVE-2018-5345 |
215,993 | GIMP | 8ea316667c8a3296bce2832b3986b58d0fdfc077 | https://git.gnome.org/browse/GIMP | https://git.gnome.org/browse/GIMP/commit/?id=8ea316667c8a3296bce2832b3986b58d0fdfc077 | plug-ins: TGA 16-bit RGB (without alpha bit) is also valid.
According to some spec on the web, 16-bit RGB is also valid. In this
case, the last bit is simply ignored (at least that's how it is
implemented right now). | 1 | load_image (const gchar *filename,
GError **error)
{
FILE *fp;
tga_info info;
guchar header[18];
guchar footer[26];
guchar extension[495];
long offset;
gint32 image_ID = -1;
gimp_progress_init_printf (_("Opening '%s'"),
gimp_filename_... | 317,352,887,365,701,430,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-17786 | In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image. | https://nvd.nist.gov/vuln/detail/CVE-2017-17786 |
498,630 | GIMP | 8ea316667c8a3296bce2832b3986b58d0fdfc077 | https://git.gnome.org/browse/GIMP | https://git.gnome.org/browse/GIMP/commit/?id=8ea316667c8a3296bce2832b3986b58d0fdfc077 | plug-ins: TGA 16-bit RGB (without alpha bit) is also valid.
According to some spec on the web, 16-bit RGB is also valid. In this
case, the last bit is simply ignored (at least that's how it is
implemented right now). | 0 | load_image (const gchar *filename,
GError **error)
{
FILE *fp;
tga_info info;
guchar header[18];
guchar footer[26];
guchar extension[495];
long offset;
gint32 image_ID = -1;
gimp_progress_init_printf (_("Opening '%s'"),
gimp_filename_... | 214,640,182,902,851,070,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-17786 | In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image. | https://nvd.nist.gov/vuln/detail/CVE-2017-17786 |
215,999 | GIMP | edb251a7ef1602d20a5afcbf23f24afb163de63b | https://git.gnome.org/browse/GIMP | https://git.gnome.org/browse/GIMP/commit/?id=edb251a7ef1602d20a5afcbf23f24afb163de63b | Bug 739133 - (CVE-2017-17785) Heap overflow while parsing FLI files.
It is possible to trigger a heap overflow while parsing FLI files. The
RLE decoder is vulnerable to out of boundary writes due to lack of
boundary checks.
The variable "framebuf" points to a memory area which was allocated
with fli_header->width * f... | 1 | void fli_read_brun(FILE *f, s_fli_header *fli_header, unsigned char *framebuf)
{
unsigned short yc;
unsigned char *pos;
for (yc=0; yc < fli_header->height; yc++) {
unsigned short xc, pc, pcnt;
pc=fli_read_char(f);
xc=0;
pos=framebuf+(fli_header->width * yc);
for (pcnt=pc; pcnt>0; pcnt--) {
unsigned shor... | 244,414,468,968,368,240,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-17785 | In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-17785 |
498,654 | GIMP | edb251a7ef1602d20a5afcbf23f24afb163de63b | https://git.gnome.org/browse/GIMP | https://git.gnome.org/browse/GIMP/commit/?id=edb251a7ef1602d20a5afcbf23f24afb163de63b | Bug 739133 - (CVE-2017-17785) Heap overflow while parsing FLI files.
It is possible to trigger a heap overflow while parsing FLI files. The
RLE decoder is vulnerable to out of boundary writes due to lack of
boundary checks.
The variable "framebuf" points to a memory area which was allocated
with fli_header->width * f... | 0 | void fli_read_brun(FILE *f, s_fli_header *fli_header, unsigned char *framebuf)
{
unsigned short yc;
unsigned char *pos;
for (yc=0; yc < fli_header->height; yc++) {
unsigned short pc, pcnt;
size_t n, xc;
pc=fli_read_char(f);
xc=0;
pos=framebuf+(fli_header->width * yc);
n=(size_t)fli_header->width * (fli_h... | 267,539,709,967,857,700,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-17785 | In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-17785 |
216,003 | libcdio | dec2f876c2d7162da213429bce1a7140cdbdd734 | https://git.savannah.gnu.org/cgit/libcdio | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=dec2f876c2d7162da213429bce1a7140cdbdd734 | Removed wrong line | 1 | get_cdtext_generic (void *p_user_data)
{
generic_img_private_t *p_env = p_user_data;
uint8_t *p_cdtext_data = NULL;
size_t len;
if (!p_env) return NULL;
if (p_env->b_cdtext_error) return NULL;
if (NULL == p_env->cdtext) {
p_cdtext_data = read_cdtext_generic (p_env);
if (NULL != p_cdtext_data) {... | 148,641,529,179,930,130,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
498,695 | libcdio | dec2f876c2d7162da213429bce1a7140cdbdd734 | https://git.savannah.gnu.org/cgit/libcdio | https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=dec2f876c2d7162da213429bce1a7140cdbdd734 | Removed wrong line | 0 | get_cdtext_generic (void *p_user_data)
{
generic_img_private_t *p_env = p_user_data;
uint8_t *p_cdtext_data = NULL;
size_t len;
if (!p_env) return NULL;
if (p_env->b_cdtext_error) return NULL;
if (NULL == p_env->cdtext) {
p_cdtext_data = read_cdtext_generic (p_env);
if (NULL != p_cdtext_data) {... | 25,645,811,427,049,850,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18201 | An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18201 |
216,005 | wget | 1fc9c95ec144499e69dc8ec76dbe07799d7d82cd | http://git.savannah.gnu.org/cgit/wget | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd | Fix cookie injection (CVE-2018-0494)
* src/http.c (resp_new): Replace \r\n by space in continuation lines
Fixes #53763
"Malicious website can write arbitrary cookie entries to cookie jar"
HTTP header parsing left the \r\n from continuation line intact.
The Set-Cookie code didn't check and could be tricked to write
... | 1 | resp_new (const char *head)
{
const char *hdr;
int count, size;
struct response *resp = xnew0 (struct response);
resp->data = head;
if (*head == '\0')
{
/* Empty head means that we're dealing with a headerless
(HTTP/0.9) response. In that case, don't set HEADERS at
all. */
... | 29,046,241,833,154,510,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-0494 | GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line. | https://nvd.nist.gov/vuln/detail/CVE-2018-0494 |
498,714 | wget | 1fc9c95ec144499e69dc8ec76dbe07799d7d82cd | http://git.savannah.gnu.org/cgit/wget | https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd | Fix cookie injection (CVE-2018-0494)
* src/http.c (resp_new): Replace \r\n by space in continuation lines
Fixes #53763
"Malicious website can write arbitrary cookie entries to cookie jar"
HTTP header parsing left the \r\n from continuation line intact.
The Set-Cookie code didn't check and could be tricked to write
... | 0 | resp_new (char *head)
{
char *hdr;
int count, size;
struct response *resp = xnew0 (struct response);
resp->data = head;
if (*head == '\0')
{
/* Empty head means that we're dealing with a headerless
(HTTP/0.9) response. In that case, don't set HEADERS at
all. */
return res... | 216,399,764,691,244,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-0494 | GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line. | https://nvd.nist.gov/vuln/detail/CVE-2018-0494 |
216,008 | busybox | 45fa3f18adf57ef9d743038743d9c90573aeeb91 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91 | wget: implement TLS verification with ENABLE_FEATURE_WGET_OPENSSL
When ENABLE_FEATURE_WGET_OPENSSL is enabled, correctly implement TLS
verification by default. And only ignore verification errors, if
--no-check-certificate was passed.
Also note, that previously OPENSSL implementation did not implement
TLS verificatio... | 1 | static int spawn_https_helper_openssl(const char *host, unsigned port)
{
char *allocated = NULL;
char *servername;
int sp[2];
int pid;
IF_FEATURE_WGET_HTTPS(volatile int child_failed = 0;)
if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0)
/* Kernel can have AF_UNIX support disabled */
bb_simple_perror_msg_an... | 197,280,812,858,767,360,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2018-1000500 | Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file". | https://nvd.nist.gov/vuln/detail/CVE-2018-1000500 |
498,739 | busybox | 45fa3f18adf57ef9d743038743d9c90573aeeb91 | http://git.busybox.net/busybox | https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91 | wget: implement TLS verification with ENABLE_FEATURE_WGET_OPENSSL
When ENABLE_FEATURE_WGET_OPENSSL is enabled, correctly implement TLS
verification by default. And only ignore verification errors, if
--no-check-certificate was passed.
Also note, that previously OPENSSL implementation did not implement
TLS verificatio... | 0 | static int spawn_https_helper_openssl(const char *host, unsigned port)
{
char *allocated = NULL;
char *servername;
int sp[2];
int pid;
IF_FEATURE_WGET_HTTPS(volatile int child_failed = 0;)
if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0)
/* Kernel can have AF_UNIX support disabled */
bb_simple_perror_msg_an... | 95,434,382,055,770,890,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2018-1000500 | Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file". | https://nvd.nist.gov/vuln/detail/CVE-2018-1000500 |
216,019 | wget | 3cdfb594cf75f11cdbb9702ac5e856c332ccacfa | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=3cdfb594cf75f11cdbb9702ac5e856c332ccacfa | Don't save user/pw with --xattr
Also the Referer info is reduced to scheme+host+port.
* src/ftp.c (getftp): Change params of set_file_metadata()
* src/http.c (gethttp): Change params of set_file_metadata()
* src/xattr.c (set_file_metadata): Remove user/password from origin URL,
reduce Referer value to scheme/host/p... | 1 | set_file_metadata (const char *origin_url, const char *referrer_url, FILE *fp)
{
/* Save metadata about where the file came from (requested, final URLs) to
* user POSIX Extended Attributes of retrieved file.
*
* For more details about the user namespace see
* [http://freedesktop.org/wiki/CommonExtendedAtt... | 94,528,294,453,995,030,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-20483 | set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated ... | https://nvd.nist.gov/vuln/detail/CVE-2018-20483 |
498,864 | wget | 3cdfb594cf75f11cdbb9702ac5e856c332ccacfa | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=3cdfb594cf75f11cdbb9702ac5e856c332ccacfa | Don't save user/pw with --xattr
Also the Referer info is reduced to scheme+host+port.
* src/ftp.c (getftp): Change params of set_file_metadata()
* src/http.c (gethttp): Change params of set_file_metadata()
* src/xattr.c (set_file_metadata): Remove user/password from origin URL,
reduce Referer value to scheme/host/p... | 0 | set_file_metadata (const struct url *origin_url, const struct url *referrer_url, FILE *fp)
{
/* Save metadata about where the file came from (requested, final URLs) to
* user POSIX Extended Attributes of retrieved file.
*
* For more details about the user namespace see
* [http://freedesktop.org/wiki/Commo... | 1,896,027,882,338,314,700,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-20483 | set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated ... | https://nvd.nist.gov/vuln/detail/CVE-2018-20483 |
216,026 | gpsd | 7646cbd04055a50b157312ba6b376e88bd398c19 | http://git.savannah.gnu.org/cgit/gpsd | https://git.savannah.gnu.org/cgit/gpsd.git/commit/json.c?id=7646cbd04055a50b157312ba6b376e88bd398c19 | Add bounds check in in_escape state of JSON parser. | 1 | static int json_internal_read_object(const char *cp,
const struct json_attr_t *attrs,
const struct json_array_t *parent,
int offset,
const char **end)
{
enum
{ init, await_attr, in_attr, await_value, in_val_string,
in_escape, in_val_token, post_val, post_array
} state = ... | 250,554,275,764,320,300,000,000,000,000,000,000,000 | None | null | [
"CWE-121"
] | CVE-2018-17937 | gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs. | https://nvd.nist.gov/vuln/detail/CVE-2018-17937 |
498,913 | gpsd | 7646cbd04055a50b157312ba6b376e88bd398c19 | http://git.savannah.gnu.org/cgit/gpsd | https://git.savannah.gnu.org/cgit/gpsd.git/commit/json.c?id=7646cbd04055a50b157312ba6b376e88bd398c19 | Add bounds check in in_escape state of JSON parser. | 0 | static int json_internal_read_object(const char *cp,
const struct json_attr_t *attrs,
const struct json_array_t *parent,
int offset,
const char **end)
{
enum
{ init, await_attr, in_attr, await_value, in_val_string,
in_escape, in_val_token, post_val, post_array
} state = ... | 76,937,451,767,874,140,000,000,000,000,000,000,000 | None | null | [
"CWE-121"
] | CVE-2018-17937 | gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs. | https://nvd.nist.gov/vuln/detail/CVE-2018-17937 |
216,029 | wget | 562eacb76a2b64d5dc80a443f0f739bc9ef76c17 | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17 | * src/iri.c (do_conversion): Remove unneeded debug lines | 1 | do_conversion (const char *tocode, const char *fromcode, char const *in_org, size_t inlen, char **out)
{
iconv_t cd;
/* sXXXav : hummm hard to guess... */
size_t len, done, outlen;
int invalid = 0, tooshort = 0;
char *s, *in, *in_save;
cd = iconv_open (tocode, fromcode);
if (cd == (iconv_t)(-1))
{
... | 108,993,015,973,141,400,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-5953 | Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2019-5953 |
498,932 | wget | 562eacb76a2b64d5dc80a443f0f739bc9ef76c17 | http://git.savannah.gnu.org/cgit/wget | http://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17 | * src/iri.c (do_conversion): Remove unneeded debug lines | 0 | do_conversion (const char *tocode, const char *fromcode, char const *in_org, size_t inlen, char **out)
{
iconv_t cd;
/* sXXXav : hummm hard to guess... */
size_t len, done, outlen;
int invalid = 0, tooshort = 0;
char *s, *in, *in_save;
cd = iconv_open (tocode, fromcode);
if (cd == (iconv_t)(-1))
{
... | 206,434,534,494,524,000,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-5953 | Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2019-5953 |
216,037 | media_tree | 0c4df39e504bf925ab666132ac3c98d6cbbe380b | http://git.linuxtv.org/cgit.cgi/media_tree | https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b | media: technisat-usb2: break out of loop at end of buffer
Ensure we do not access the buffer beyond the end if no 0xff byte
is encountered.
Reported-by: syzbot+eaaaf38a95427be88f4b@syzkaller.appspotmail.com
Signed-off-by: Sean Young <sean@mess.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Mauro C... | 1 | static int technisat_usb2_get_ir(struct dvb_usb_device *d)
{
struct technisat_usb2_state *state = d->priv;
u8 *buf = state->buf;
u8 *b;
int ret;
struct ir_raw_event ev;
buf[0] = GET_IR_DATA_VENDOR_REQUEST;
buf[1] = 0x08;
buf[2] = 0x8f;
buf[3] = MINIMUM_IR_BIT_TRANSITION_TICK_COUNT;
buf[4] = MAXIMUM_IR_BIT_TI... | 43,508,758,266,973,030,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-15505 | drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir). | https://nvd.nist.gov/vuln/detail/CVE-2019-15505 |
498,980 | media_tree | 0c4df39e504bf925ab666132ac3c98d6cbbe380b | http://git.linuxtv.org/cgit.cgi/media_tree | https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b | media: technisat-usb2: break out of loop at end of buffer
Ensure we do not access the buffer beyond the end if no 0xff byte
is encountered.
Reported-by: syzbot+eaaaf38a95427be88f4b@syzkaller.appspotmail.com
Signed-off-by: Sean Young <sean@mess.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Mauro C... | 0 | static int technisat_usb2_get_ir(struct dvb_usb_device *d)
{
struct technisat_usb2_state *state = d->priv;
struct ir_raw_event ev;
u8 *buf = state->buf;
int i, ret;
buf[0] = GET_IR_DATA_VENDOR_REQUEST;
buf[1] = 0x08;
buf[2] = 0x8f;
buf[3] = MINIMUM_IR_BIT_TRANSITION_TICK_COUNT;
buf[4] = MAXIMUM_IR_BIT_TIME_TI... | 181,905,604,056,718,740,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-15505 | drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir). | https://nvd.nist.gov/vuln/detail/CVE-2019-15505 |
216,038 | libextractor | d2b032452241708bee68d02aa02092cfbfba951a | https://git.gnunet.org/libextractor | https://git.gnunet.org/libextractor.git/commit/?id=d2b032452241708bee68d02aa02092cfbfba951a | fix #5846 | 1 | EXTRACTOR_dvi_extract_method (struct EXTRACTOR_ExtractContext *ec)
{
unsigned int klen;
uint32_t pos;
uint32_t opos;
unsigned int len;
unsigned int pageCount;
char pages[16];
void *buf;
unsigned char *data;
uint64_t size;
uint64_t off;
ssize_t iret;
if (40 >= (iret = ec->read (ec->cls, &buf, ... | 340,046,622,825,312,520,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-15531 | GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15531 |
498,990 | libextractor | d2b032452241708bee68d02aa02092cfbfba951a | https://git.gnunet.org/libextractor | https://git.gnunet.org/libextractor.git/commit/?id=d2b032452241708bee68d02aa02092cfbfba951a | fix #5846 | 0 | EXTRACTOR_dvi_extract_method (struct EXTRACTOR_ExtractContext *ec)
{
unsigned int klen;
uint32_t pos;
uint32_t opos;
unsigned int len;
unsigned int pageCount;
char pages[16];
void *buf;
unsigned char *data;
uint64_t size;
uint64_t off;
ssize_t iret;
if (40 >= (iret = ec->read (ec->cls, &buf, ... | 114,548,001,031,347,790,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-15531 | GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15531 |
216,039 | libssh | b36272eac1b36982598c10de7af0a501582de07a | http://git.libssh.org/projects/libssh | https://git.libssh.org/projects/libssh.git/commit/?id=b36272eac1b36982598c10de7af0a501582de07a | CVE-2020-1730: Fix a possible segfault when zeroing AES-CTR key
Fixes T213
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> | 1 | static void aes_ctr_cleanup(struct ssh_cipher_struct *cipher){
explicit_bzero(cipher->aes_key, sizeof(*cipher->aes_key));
SAFE_FREE(cipher->aes_key);
} | 6,015,689,460,022,238,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2020-1730 | A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vu... | https://nvd.nist.gov/vuln/detail/CVE-2020-1730 |
498,997 | libssh | b36272eac1b36982598c10de7af0a501582de07a | http://git.libssh.org/projects/libssh | https://git.libssh.org/projects/libssh.git/commit/?id=b36272eac1b36982598c10de7af0a501582de07a | CVE-2020-1730: Fix a possible segfault when zeroing AES-CTR key
Fixes T213
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> | 0 | static void aes_ctr_cleanup(struct ssh_cipher_struct *cipher){
if (cipher != NULL) {
if (cipher->aes_key != NULL) {
explicit_bzero(cipher->aes_key, sizeof(*cipher->aes_key));
}
SAFE_FREE(cipher->aes_key);
}
} | 21,235,183,656,112,916,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2020-1730 | A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vu... | https://nvd.nist.gov/vuln/detail/CVE-2020-1730 |
216,043 | linux-2.6 | 272b62c1f0f6f742046e45b50b6fec98860208a0 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=272b62c1f0f6f742046e45b50b6fec98860208a0 | Treat writes as new when holes span across page boundaries
When a hole spans across page boundaries, the next write forces
a read of the block. This could end up reading existing garbage
data from the disk in ocfs2_map_page_blocks. This leads to
non-zero holes. In order to avoid this, mark the writes as new
when the h... | 1 | static int ocfs2_prepare_page_for_write(struct inode *inode, u64 *p_blkno,
struct ocfs2_write_ctxt *wc,
struct page *page, u32 cpos,
loff_t user_pos, unsigned user_len,
int new)
{
int ret;
unsigned int map_from = 0, map_to = 0;
unsigned int cluster_start, cluster_end;
unsigned int user_data_from... | 313,190,426,386,914,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-0463 | The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by re... | https://nvd.nist.gov/vuln/detail/CVE-2011-0463 |
499,140 | linux-2.6 | 272b62c1f0f6f742046e45b50b6fec98860208a0 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=272b62c1f0f6f742046e45b50b6fec98860208a0 | Treat writes as new when holes span across page boundaries
When a hole spans across page boundaries, the next write forces
a read of the block. This could end up reading existing garbage
data from the disk in ocfs2_map_page_blocks. This leads to
non-zero holes. In order to avoid this, mark the writes as new
when the h... | 0 | static int ocfs2_prepare_page_for_write(struct inode *inode, u64 *p_blkno,
struct ocfs2_write_ctxt *wc,
struct page *page, u32 cpos,
loff_t user_pos, unsigned user_len,
int new)
{
int ret;
unsigned int map_from = 0, map_to = 0;
unsigned int cluster_start, cluster_end;
unsigned int user_data_from... | 23,863,270,394,278,217,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-0463 | The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by re... | https://nvd.nist.gov/vuln/detail/CVE-2011-0463 |
216,065 | tar | d9d4435692150fa8ff68e1b1a473d187cc3fd777 | http://git.savannah.gnu.org/cgit/tar | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 | Fix memory leak in read_header
Bug reported in https://savannah.gnu.org/bugs/?59897
* src/list.c (read_header): Don't return directly from the loop.
Instead set the status and break. Return the status. Free
next_long_name and next_long_link before returning. | 1 | read_header (union block **return_block, struct tar_stat_info *info,
enum read_header_mode mode)
{
union block *header;
union block *header_copy;
char *bp;
union block *data_block;
size_t size, written;
union block *next_long_name = 0;
union block *next_long_link = 0;
size_t next_long_name_blocks ... | 220,202,712,533,898,020,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2021-20193 | A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20193 |
499,528 | tar | d9d4435692150fa8ff68e1b1a473d187cc3fd777 | http://git.savannah.gnu.org/cgit/tar | https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 | Fix memory leak in read_header
Bug reported in https://savannah.gnu.org/bugs/?59897
* src/list.c (read_header): Don't return directly from the loop.
Instead set the status and break. Return the status. Free
next_long_name and next_long_link before returning. | 0 | read_header (union block **return_block, struct tar_stat_info *info,
enum read_header_mode mode)
{
union block *header;
char *bp;
union block *data_block;
size_t size, written;
union block *next_long_name = NULL;
union block *next_long_link = NULL;
size_t next_long_name_blocks = 0;
size_t next_lon... | 317,224,477,689,340,540,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2021-20193 | A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20193 |
216,068 | libmicrohttpd | a110ae6276660bee3caab30e9ff3f12f85cf3241 | https://git.gnunet.org/libmicrohttpd | https://git.gnunet.org/libmicrohttpd.git/commit/?id=a110ae6276660bee3caab30e9ff3f12f85cf3241 | fix buffer overflow and add test | 1 | post_process_urlencoded (struct MHD_PostProcessor *pp,
const char *post_data,
size_t post_data_len)
{
char *kbuf = (char *) &pp[1];
size_t poff;
const char *start_key = NULL;
const char *end_key = NULL;
const char *start_value = NULL;
const char *end_value =... | 190,069,807,145,140,300,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2021-3466 | A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as syste... | https://nvd.nist.gov/vuln/detail/CVE-2021-3466 |
499,530 | libmicrohttpd | a110ae6276660bee3caab30e9ff3f12f85cf3241 | https://git.gnunet.org/libmicrohttpd | https://git.gnunet.org/libmicrohttpd.git/commit/?id=a110ae6276660bee3caab30e9ff3f12f85cf3241 | fix buffer overflow and add test | 0 | post_process_urlencoded (struct MHD_PostProcessor *pp,
const char *post_data,
size_t post_data_len)
{
char *kbuf = (char *) &pp[1];
size_t poff;
const char *start_key = NULL;
const char *end_key = NULL;
const char *start_value = NULL;
const char *end_value =... | 164,230,521,032,418,990,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2021-3466 | A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as syste... | https://nvd.nist.gov/vuln/detail/CVE-2021-3466 |
216,078 | nettle | 971bed6ab4b27014eb23085e8176917e1a096fd5 | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/971bed6ab4b27014eb23085e8176917e1a096fd5 | Use ecc_mod_mul_canonical for point comparison.
* eddsa-verify.c (equal_h): Use ecc_mod_mul_canonical.
(cherry picked from commit 5b7608fde3a6d2ab82bffb35db1e4e330927c906) | 1 | equal_h (const struct ecc_modulo *p,
const mp_limb_t *x1, const mp_limb_t *z1,
const mp_limb_t *x2, const mp_limb_t *z2,
mp_limb_t *scratch)
{
#define t0 scratch
#define t1 (scratch + p->size)
ecc_mod_mul (p, t0, x1, z2, t0);
if (mpn_cmp (t0, p->m, p->size) >= 0)
mpn_sub_n (t0, t0, p->m, p->size);
ecc... | 224,469,605,457,449,740,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
499,609 | nettle | 971bed6ab4b27014eb23085e8176917e1a096fd5 | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/971bed6ab4b27014eb23085e8176917e1a096fd5 | Use ecc_mod_mul_canonical for point comparison.
* eddsa-verify.c (equal_h): Use ecc_mod_mul_canonical.
(cherry picked from commit 5b7608fde3a6d2ab82bffb35db1e4e330927c906) | 0 | equal_h (const struct ecc_modulo *p,
const mp_limb_t *x1, const mp_limb_t *z1,
const mp_limb_t *x2, const mp_limb_t *z2,
mp_limb_t *scratch)
{
#define t0 scratch
#define t1 (scratch + p->size)
ecc_mod_mul_canonical (p, t0, x1, z2, t0);
ecc_mod_mul_canonical (p, t1, x2, z1, t1);
return mpn_cmp (t0, t1, p->... | 137,332,979,815,558,650,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
216,082 | nettle | 51f643eee00e2caa65c8a2f5857f49acdf3ef1ce | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/51f643eee00e2caa65c8a2f5857f49acdf3ef1ce | Ensure ecdsa_sign output is canonically reduced.
* ecc-ecdsa-sign.c (ecc_ecdsa_sign): Ensure s output is reduced to
canonical range.
(cherry picked from commit c24b36160dc5303f7541dd9da1429c4046f27398) | 1 | ecc_ecdsa_sign (const struct ecc_curve *ecc,
const mp_limb_t *zp,
/* Random nonce, must be invertible mod ecc group
order. */
const mp_limb_t *kp,
size_t length, const uint8_t *digest,
mp_limb_t *rp, mp_limb_t *sp,
mp_limb_t *scratch)
{
#define P scratch
#define kinv scratch
#define hp (scr... | 43,599,864,529,457,920,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
499,619 | nettle | 51f643eee00e2caa65c8a2f5857f49acdf3ef1ce | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/51f643eee00e2caa65c8a2f5857f49acdf3ef1ce | Ensure ecdsa_sign output is canonically reduced.
* ecc-ecdsa-sign.c (ecc_ecdsa_sign): Ensure s output is reduced to
canonical range.
(cherry picked from commit c24b36160dc5303f7541dd9da1429c4046f27398) | 0 | ecc_ecdsa_sign (const struct ecc_curve *ecc,
const mp_limb_t *zp,
/* Random nonce, must be invertible mod ecc group
order. */
const mp_limb_t *kp,
size_t length, const uint8_t *digest,
mp_limb_t *rp, mp_limb_t *sp,
mp_limb_t *scratch)
{
#define P scratch
#define kinv scratch
#define hp (scr... | 128,106,232,308,080,240,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
216,083 | nettle | 401c8d53d8a8cf1e79980e62bda3f946f8e07c14 | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/401c8d53d8a8cf1e79980e62bda3f946f8e07c14 | Analogous fix to ecc_gostdsa_verify.
* ecc-gostdsa-verify.c (ecc_gostdsa_verify): Use ecc_mod_mul_canonical
to compute the scalars used for ecc multiplication.
(cherry picked from commit fbaefb64b90cb45b7075a0ed72a92f2a1fbcd2ab) | 1 | ecc_gostdsa_verify (const struct ecc_curve *ecc,
const mp_limb_t *pp, /* Public key */
size_t length, const uint8_t *digest,
const mp_limb_t *rp, const mp_limb_t *sp,
mp_limb_t *scratch)
{
/* Procedure, according to GOST R 34.10. q denotes the group
order.
1. Check 0 < r, s < q.
2. v ... | 147,387,029,767,935,680,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
499,622 | nettle | 401c8d53d8a8cf1e79980e62bda3f946f8e07c14 | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/401c8d53d8a8cf1e79980e62bda3f946f8e07c14 | Analogous fix to ecc_gostdsa_verify.
* ecc-gostdsa-verify.c (ecc_gostdsa_verify): Use ecc_mod_mul_canonical
to compute the scalars used for ecc multiplication.
(cherry picked from commit fbaefb64b90cb45b7075a0ed72a92f2a1fbcd2ab) | 0 | ecc_gostdsa_verify (const struct ecc_curve *ecc,
const mp_limb_t *pp, /* Public key */
size_t length, const uint8_t *digest,
const mp_limb_t *rp, const mp_limb_t *sp,
mp_limb_t *scratch)
{
/* Procedure, according to GOST R 34.10. q denotes the group
order.
1. Check 0 < r, s < q.
2. v ... | 172,427,404,295,328,560,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
216,085 | nettle | 63f222c60b03470c0005aa9bc4296fbf585f68b9 | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/63f222c60b03470c0005aa9bc4296fbf585f68b9 | Fix canonical reduction in gostdsa_vko.
* gostdsa-vko.c (gostdsa_vko): Use ecc_mod_mul_canonical to
compute the scalar used for ecc multiplication.
(cherry picked from commit b30e0ca6d2b41579a5b6a010fc54065d790e8d55) | 1 | gostdsa_vko (const struct ecc_scalar *priv,
const struct ecc_point *pub,
size_t ukm_length, const uint8_t *ukm,
uint8_t *out)
{
const struct ecc_curve *ecc = priv->ecc;
unsigned bsize = (ecc_bit_size (ecc) + 7) / 8;
mp_size_t size = ecc->p.size;
mp_size_t itch = 4*size + ecc->mul_itch;
mp_limb_t *scratc... | 255,361,265,070,159,030,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
499,624 | nettle | 63f222c60b03470c0005aa9bc4296fbf585f68b9 | https://git.lysator.liu.se/nettle/nettle | https://git.lysator.liu.se/nettle/nettle/-/commit/63f222c60b03470c0005aa9bc4296fbf585f68b9 | Fix canonical reduction in gostdsa_vko.
* gostdsa-vko.c (gostdsa_vko): Use ecc_mod_mul_canonical to
compute the scalar used for ecc multiplication.
(cherry picked from commit b30e0ca6d2b41579a5b6a010fc54065d790e8d55) | 0 | gostdsa_vko (const struct ecc_scalar *priv,
const struct ecc_point *pub,
size_t ukm_length, const uint8_t *ukm,
uint8_t *out)
{
const struct ecc_curve *ecc = priv->ecc;
unsigned bsize = (ecc_bit_size (ecc) + 7) / 8;
mp_size_t size = ecc->p.size;
mp_size_t itch = 4*size + ecc->mul_itch;
mp_limb_t *scratc... | 316,681,175,801,786,060,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2021-20305 | A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo... | https://nvd.nist.gov/vuln/detail/CVE-2021-20305 |
216,118 | linux-2.6 | f5fb09fa3392ad43fbcfc2f4580752f383ab5996 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f5fb09fa3392ad43fbcfc2f4580752f383ab5996 | [PATCH] Fix for minix crash
Mounting a (corrupt) minix filesystem with zero s_zmap_blocks
gives a spectacular crash on my 2.6.17.8 system, no doubt
because minix/inode.c does an unconditional
minix_set_bit(0,sbi->s_zmap[0]->b_data);
[akpm@osdl.org: make labels conistent while we're there]
Signed-off-by: Andrew Mort... | 1 | static int minix_fill_super(struct super_block *s, void *data, int silent)
{
struct buffer_head *bh;
struct buffer_head **map;
struct minix_super_block *ms;
int i, block;
struct inode *root_inode;
struct minix_sb_info *sbi;
sbi = kmalloc(sizeof(struct minix_sb_info), GFP_KERNEL);
if (!sbi)
return -ENOMEM;
s... | 147,924,331,550,666,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2006-6058 | The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error. | https://nvd.nist.gov/vuln/detail/CVE-2006-6058 |
499,872 | linux-2.6 | f5fb09fa3392ad43fbcfc2f4580752f383ab5996 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f5fb09fa3392ad43fbcfc2f4580752f383ab5996 | [PATCH] Fix for minix crash
Mounting a (corrupt) minix filesystem with zero s_zmap_blocks
gives a spectacular crash on my 2.6.17.8 system, no doubt
because minix/inode.c does an unconditional
minix_set_bit(0,sbi->s_zmap[0]->b_data);
[akpm@osdl.org: make labels conistent while we're there]
Signed-off-by: Andrew Mort... | 0 | static int minix_fill_super(struct super_block *s, void *data, int silent)
{
struct buffer_head *bh;
struct buffer_head **map;
struct minix_super_block *ms;
int i, block;
struct inode *root_inode;
struct minix_sb_info *sbi;
sbi = kmalloc(sizeof(struct minix_sb_info), GFP_KERNEL);
if (!sbi)
return -ENOMEM;
s... | 245,925,984,699,744,340,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2006-6058 | The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error. | https://nvd.nist.gov/vuln/detail/CVE-2006-6058 |
216,123 | opensips | 54e027adfa486cfcf993828512b2e273aeb163c2 | http://github.com/OpenSIPS/opensips | http://github.com/OpenSIPS/opensips/commit/54e027adfa486cfcf993828512b2e273aeb163c2 | backport from 1.9 (rev #9980)
fixed temporary GRUU bug that lead to infinite loop
Credits to Tolga Tarhan
git-svn-id: svn+ssh://svn.code.sf.net/p/opensips/svn/trunk@9982 689a6050-402a-0410-94f2-e92a70836424 | 1 | int lookup(struct sip_msg* _m, char* _t, char* _f, char* _s)
{
unsigned int flags;
urecord_t* r;
str aor, uri;
ucontact_t* ptr,*it;
int res;
int ret;
str path_dst;
str flags_s;
pv_value_t val;
int_str istr;
str sip_instance = {0,0},call_id = {0,0};
flags = 0;
if (_f && _f[0]!=0) {
if (fixup_get_svalue( ... | 14,899,486,356,936,930,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2013-3722 | A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c. | https://nvd.nist.gov/vuln/detail/CVE-2013-3722 |
499,983 | opensips | 54e027adfa486cfcf993828512b2e273aeb163c2 | http://github.com/OpenSIPS/opensips | http://github.com/OpenSIPS/opensips/commit/54e027adfa486cfcf993828512b2e273aeb163c2 | backport from 1.9 (rev #9980)
fixed temporary GRUU bug that lead to infinite loop
Credits to Tolga Tarhan
git-svn-id: svn+ssh://svn.code.sf.net/p/opensips/svn/trunk@9982 689a6050-402a-0410-94f2-e92a70836424 | 0 | int lookup(struct sip_msg* _m, char* _t, char* _f, char* _s)
{
unsigned int flags;
urecord_t* r;
str aor, uri;
ucontact_t* ptr,*it;
int res;
int ret;
str path_dst;
str flags_s;
pv_value_t val;
int_str istr;
str sip_instance = {0,0},call_id = {0,0};
flags = 0;
if (_f && _f[0]!=0) {
if (fixup_get_svalue( ... | 98,043,063,009,456,290,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2013-3722 | A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c. | https://nvd.nist.gov/vuln/detail/CVE-2013-3722 |
216,271 | openssl | 33f44acbbe83ab718ae15c0d2c6a57e802705a36 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=33f44acbbe83ab718ae15c0d2c6a57e802705a36 | s3/s3_cbc.c: allow for compilations with NO_SHA256|512.
(cherry picked from commit d5371324d978e4096bf99b9d0fe71b2cb65d9dc8) | 1 | void ssl3_cbc_digest_record(
const EVP_MD_CTX *ctx,
unsigned char* md_out,
size_t* md_out_size,
const unsigned char header[13],
const unsigned char *data,
size_t data_plus_mac_size,
size_t data_plus_mac_plus_padding_size,
const unsigned char *mac_secret,
unsigned mac_secret_length,
char is_sslv3)
{
union { ... | 336,130,642,225,679,270,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
500,937 | openssl | 33f44acbbe83ab718ae15c0d2c6a57e802705a36 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=33f44acbbe83ab718ae15c0d2c6a57e802705a36 | s3/s3_cbc.c: allow for compilations with NO_SHA256|512.
(cherry picked from commit d5371324d978e4096bf99b9d0fe71b2cb65d9dc8) | 0 | void ssl3_cbc_digest_record(
const EVP_MD_CTX *ctx,
unsigned char* md_out,
size_t* md_out_size,
const unsigned char header[13],
const unsigned char *data,
size_t data_plus_mac_size,
size_t data_plus_mac_plus_padding_size,
const unsigned char *mac_secret,
unsigned mac_secret_length,
char is_sslv3)
{
union { ... | 247,703,121,096,290,850,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
216,272 | openssl | 32cc2479b473c49ce869e57fded7e9a77b695c0d | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=32cc2479b473c49ce869e57fded7e9a77b695c0d | Fix IV check and padding removal.
Fix the calculation that checks there is enough room in a record
after removing padding and optional explicit IV. (by Steve)
For AEAD remove the correct number of padding bytes (by Andy) | 1 | int tls1_cbc_remove_padding(const SSL* s,
SSL3_RECORD *rec,
unsigned block_size,
unsigned mac_size)
{
unsigned padding_length, good, to_check, i;
const char has_explicit_iv =
s->version >= TLS1_1_VERSION || s->version == DTLS1_VERSION;
const unsigned overhead = 1 /* padding length byte */ +
... | 120,851,383,526,898,310,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
500,940 | openssl | 32cc2479b473c49ce869e57fded7e9a77b695c0d | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=32cc2479b473c49ce869e57fded7e9a77b695c0d | Fix IV check and padding removal.
Fix the calculation that checks there is enough room in a record
after removing padding and optional explicit IV. (by Steve)
For AEAD remove the correct number of padding bytes (by Andy) | 0 | int tls1_cbc_remove_padding(const SSL* s,
SSL3_RECORD *rec,
unsigned block_size,
unsigned mac_size)
{
unsigned padding_length, good, to_check, i;
const unsigned overhead = 1 /* padding length byte */ + mac_size;
/* Check if version requires explicit IV */
if (s->version >= TLS1_1_VERSION || s-... | 235,458,583,385,985,500,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
216,275 | openssl | 746c6f3a533b1eb50b909147b35fa1b0e5c61f59 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=746c6f3a533b1eb50b909147b35fa1b0e5c61f59 | e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line. | 1 | static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
const unsigned char *in, size_t len)
{
EVP_AES_HMAC_SHA1 *key = data(ctx);
unsigned int l;
size_t plen = key->payload_length,
iv = 0, /* explicit IV in TLS 1.1 and later */
sha_off = 0;
#if defined(STITCHED_CALL)
size_t aes... | 331,199,747,980,017,670,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
500,951 | openssl | 746c6f3a533b1eb50b909147b35fa1b0e5c61f59 | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=746c6f3a533b1eb50b909147b35fa1b0e5c61f59 | e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line. | 0 | static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
const unsigned char *in, size_t len)
{
EVP_AES_HMAC_SHA1 *key = data(ctx);
unsigned int l;
size_t plen = key->payload_length,
iv = 0, /* explicit IV in TLS 1.1 and later */
sha_off = 0;
#if defined(STITCHED_CALL)
size_t aes... | 130,070,298,181,177,380,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
216,278 | openssl | 579f3a631ebeef5eb0135977640a835968d3ad6c | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=579f3a631ebeef5eb0135977640a835968d3ad6c | s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal.
(cherry picked from commit f93a41877d8d7a287debb7c63d7b646abaaf269c) | 1 | void ssl3_cbc_copy_mac(unsigned char* out,
const SSL3_RECORD *rec,
unsigned md_size,unsigned orig_len)
{
#if defined(CBC_MAC_ROTATE_IN_PLACE)
unsigned char rotated_mac_buf[EVP_MAX_MD_SIZE*2];
unsigned char *rotated_mac;
#else
unsigned char rotated_mac[EVP_MAX_MD_SIZE];
#endif
/* mac_end is the i... | 263,903,455,626,464,270,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
500,954 | openssl | 579f3a631ebeef5eb0135977640a835968d3ad6c | https://github.com/openssl/openssl | http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=579f3a631ebeef5eb0135977640a835968d3ad6c | s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal.
(cherry picked from commit f93a41877d8d7a287debb7c63d7b646abaaf269c) | 0 | void ssl3_cbc_copy_mac(unsigned char* out,
const SSL3_RECORD *rec,
unsigned md_size,unsigned orig_len)
{
#if defined(CBC_MAC_ROTATE_IN_PLACE)
unsigned char rotated_mac_buf[64+EVP_MAX_MD_SIZE];
unsigned char *rotated_mac;
#else
unsigned char rotated_mac[EVP_MAX_MD_SIZE];
#endif
/* mac_end is the ... | 295,481,800,492,125,030,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
216,321 | openssl | f9b6c0ba4c02497782f801e3c45688f3efaac55c | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f9b6c0ba4c02497782f801e3c45688f3efaac55c | Fix for CVE-2014-0076
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuva... | 1 | static int ec_GF2m_montgomery_point_multiply(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
const EC_POINT *point, BN_CTX *ctx)
{
BIGNUM *x1, *x2, *z1, *z2;
int ret = 0, i;
BN_ULONG mask,word;
if (r == point)
{
ECerr(EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY, EC_R_INVALID_ARGUMENT);
return 0;
}
... | 314,777,153,541,948,460,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2014-0076 | The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. | https://nvd.nist.gov/vuln/detail/CVE-2014-0076 |
501,362 | openssl | f9b6c0ba4c02497782f801e3c45688f3efaac55c | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f9b6c0ba4c02497782f801e3c45688f3efaac55c | Fix for CVE-2014-0076
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
Thanks to Yuval Yarom and Naomi Benger for discovering this
flaw and to Yuva... | 0 | static int ec_GF2m_montgomery_point_multiply(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar,
const EC_POINT *point, BN_CTX *ctx)
{
BIGNUM *x1, *x2, *z1, *z2;
int ret = 0, i;
BN_ULONG mask,word;
if (r == point)
{
ECerr(EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY, EC_R_INVALID_ARGUMENT);
return 0;
}
... | 324,336,876,446,221,280,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2014-0076 | The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. | https://nvd.nist.gov/vuln/detail/CVE-2014-0076 |
216,354 | openssl | 006cd7083f76ed5cb0d9a914857e9231ef1bc317 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=006cd7083f76ed5cb0d9a914857e9231ef1bc317 | Additional CVE-2014-0224 protection.
Return a fatal error if an attempt is made to use a zero length
master secret. | 1 | int ssl3_do_change_cipher_spec(SSL *s)
{
int i;
const char *sender;
int slen;
if (s->state & SSL_ST_ACCEPT)
i=SSL3_CHANGE_CIPHER_SERVER_READ;
else
i=SSL3_CHANGE_CIPHER_CLIENT_READ;
if (s->s3->tmp.key_block == NULL)
{
if (s->session == NULL)
{
/* might happen if dtls1_read_bytes() calls this */
... | 98,411,911,279,321,300,000,000,000,000,000,000,000 | None | null | [
"CWE-326"
] | CVE-2014-0224 | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive ... | https://nvd.nist.gov/vuln/detail/CVE-2014-0224 |
175,178 | openssl | feba02f3919495e1b960c33ba849e10e77d0785d | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d | Fix crash in dtls1_get_record whilst in the listen state where you get two
separate reads performed - one for the header and one for the body of the
handshake record.
CVE-2014-3571
Reviewed-by: Matt Caswell <matt@openssl.org> | 0 | int ssl3_do_change_cipher_spec(SSL *s)
{
int i;
const char *sender;
int slen;
if (s->state & SSL_ST_ACCEPT)
i=SSL3_CHANGE_CIPHER_SERVER_READ;
else
i=SSL3_CHANGE_CIPHER_CLIENT_READ;
if (s->s3->tmp.key_block == NULL)
{
if (s->session == NULL || s->session->master_key_length == 0)
{
/* might happen ... | 301,520,913,552,968,440,000,000,000,000,000,000,000 | None | null | [
"NVD-CWE-Other"
] | CVE-2014-3571 | OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtl... | https://nvd.nist.gov/vuln/detail/CVE-2014-3571 |
216,359 | openssl | 897169fdf06bf75b4d0c503d61abb45656dd90a6 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=897169fdf06bf75b4d0c503d61abb45656dd90a6 | Additional CVE-2014-0224 protection.
Return a fatal error if an attempt is made to use a zero length
master secret. | 1 | int ssl3_do_change_cipher_spec(SSL *s)
{
int i;
const char *sender;
int slen;
if (s->state & SSL_ST_ACCEPT)
i=SSL3_CHANGE_CIPHER_SERVER_READ;
else
i=SSL3_CHANGE_CIPHER_CLIENT_READ;
if (s->s3->tmp.key_block == NULL)
{
if (s->session == NULL)
{
/* might happen if dtls1_read_bytes() calls this */
... | 28,308,454,817,544,945,000,000,000,000,000,000,000 | None | null | [
"CWE-326"
] | CVE-2014-0224 | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive ... | https://nvd.nist.gov/vuln/detail/CVE-2014-0224 |
501,540 | openssl | 897169fdf06bf75b4d0c503d61abb45656dd90a6 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=897169fdf06bf75b4d0c503d61abb45656dd90a6 | Additional CVE-2014-0224 protection.
Return a fatal error if an attempt is made to use a zero length
master secret. | 0 | int ssl3_do_change_cipher_spec(SSL *s)
{
int i;
const char *sender;
int slen;
if (s->state & SSL_ST_ACCEPT)
i=SSL3_CHANGE_CIPHER_SERVER_READ;
else
i=SSL3_CHANGE_CIPHER_CLIENT_READ;
if (s->s3->tmp.key_block == NULL)
{
if (s->session == NULL || s->session->master_key_length == 0)
{
/* might happen ... | 317,254,645,209,288,450,000,000,000,000,000,000,000 | None | null | [
"CWE-326"
] | CVE-2014-0224 | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive ... | https://nvd.nist.gov/vuln/detail/CVE-2014-0224 |
216,452 | openssl | 2ed80d14d7159de7b52c7720128459e8c24a94d5 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2ed80d14d7159de7b52c7720128459e8c24a94d5 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 90e53055939db40cf0fac1ad0c59630280aeee86) | 1 | static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen,
const unsigned char *sess_id, int sesslen,
SSL_SESSION **psess)
{
SSL_SESSION *sess;
unsigned char *sdec;
const unsigned char *p;
int slen, mlen, renew_ticket = 0;
unsigned char tick_hmac[EVP_MAX_MD_SIZE];
HMAC_CTX hctx;
EVP... | 40,711,749,733,511,063,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
502,025 | openssl | 2ed80d14d7159de7b52c7720128459e8c24a94d5 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2ed80d14d7159de7b52c7720128459e8c24a94d5 | Fix for session tickets memory leak.
CVE-2014-3567
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(cherry picked from commit 90e53055939db40cf0fac1ad0c59630280aeee86) | 0 | static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen,
const unsigned char *sess_id, int sesslen,
SSL_SESSION **psess)
{
SSL_SESSION *sess;
unsigned char *sdec;
const unsigned char *p;
int slen, mlen, renew_ticket = 0;
unsigned char tick_hmac[EVP_MAX_MD_SIZE];
HMAC_CTX hctx;
EVP... | 8,541,192,164,585,383,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-3567 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure. | https://nvd.nist.gov/vuln/detail/CVE-2014-3567 |
216,457 | librsvg | 40af93e6eb1c94b90c3b9a0b87e0840e126bb8df | https://github.com/GNOME/librsvg | https://git.gnome.org/browse/librsvg/commit/?id=40af93e6eb1c94b90c3b9a0b87e0840e126bb8df | bgo#738050 - Handle the case where a list of coordinate pairs has an odd number of elements
Lists of points come in coordinate pairs, but we didn't have any checking for that.
It was possible to try to fetch the 'last' coordinate in a list, i.e. the y coordinate
of an x,y pair, that was in fact missing, leading to an ... | 1 | _rsvg_node_poly_build_path (const char *value,
gboolean close_path)
{
double *pointlist;
guint pointlist_len, i;
GString *d;
cairo_path_t *path;
char buf[G_ASCII_DTOSTR_BUF_SIZE];
pointlist = rsvg_css_parse_number_list (value, &pointlist_len);
if (pointlist == NU... | 125,965,033,795,776,590,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7904 | Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-7904 |
502,039 | librsvg | 40af93e6eb1c94b90c3b9a0b87e0840e126bb8df | https://github.com/GNOME/librsvg | https://git.gnome.org/browse/librsvg/commit/?id=40af93e6eb1c94b90c3b9a0b87e0840e126bb8df | bgo#738050 - Handle the case where a list of coordinate pairs has an odd number of elements
Lists of points come in coordinate pairs, but we didn't have any checking for that.
It was possible to try to fetch the 'last' coordinate in a list, i.e. the y coordinate
of an x,y pair, that was in fact missing, leading to an ... | 0 | _rsvg_node_poly_build_path (const char *value,
gboolean close_path)
{
double *pointlist;
guint pointlist_len, i;
GString *d;
cairo_path_t *path;
char buf[G_ASCII_DTOSTR_BUF_SIZE];
pointlist = rsvg_css_parse_number_list (value, &pointlist_len);
if (pointlist == NU... | 154,460,730,062,486,610,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7904 | Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-7904 |
216,469 | openssl | 72f181539118828ca966a0f8d03f6428e2bcf0d6 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/72f181539118828ca966a0f8d03f6428e2bcf0d6 | Only allow ephemeral RSA keys in export ciphersuites.
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.... | 1 | int ssl3_get_key_exchange(SSL *s)
{
#ifndef OPENSSL_NO_RSA
unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2];
#endif
EVP_MD_CTX md_ctx;
unsigned char *param,*p;
int al,j,ok;
long i,param_len,n,alg;
EVP_PKEY *pkey=NULL;
#ifndef OPENSSL_NO_RSA
RSA *rsa=NULL;
#endif
#ifndef OPENSSL_NO_DH
DH *dh=NULL;
#endif
#ifndef OPEN... | 239,894,095,986,458,470,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-0204 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue... | https://nvd.nist.gov/vuln/detail/CVE-2015-0204 |
502,074 | openssl | 72f181539118828ca966a0f8d03f6428e2bcf0d6 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/72f181539118828ca966a0f8d03f6428e2bcf0d6 | Only allow ephemeral RSA keys in export ciphersuites.
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.... | 0 | int ssl3_get_key_exchange(SSL *s)
{
#ifndef OPENSSL_NO_RSA
unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2];
#endif
EVP_MD_CTX md_ctx;
unsigned char *param,*p;
int al,j,ok;
long i,param_len,n,alg;
EVP_PKEY *pkey=NULL;
#ifndef OPENSSL_NO_RSA
RSA *rsa=NULL;
#endif
#ifndef OPENSSL_NO_DH
DH *dh=NULL;
#endif
#ifndef OPEN... | 3,717,788,806,990,836,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-0204 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue... | https://nvd.nist.gov/vuln/detail/CVE-2015-0204 |
216,471 | openssl | 37580f43b5a39f5f4e920d17273fab9713d3a744 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/37580f43b5a39f5f4e920d17273fab9713d3a744 | Only allow ephemeral RSA keys in export ciphersuites.
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.... | 1 | int ssl3_get_key_exchange(SSL *s)
{
#ifndef OPENSSL_NO_RSA
unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2];
#endif
EVP_MD_CTX md_ctx;
unsigned char *param,*p;
int al,j,ok;
long i,param_len,n,alg_k,alg_a;
EVP_PKEY *pkey=NULL;
const EVP_MD *md = NULL;
#ifndef OPENSSL_NO_RSA
RSA *rsa=NULL;
#endif
#ifndef OPENSSL_NO_DH... | 338,742,367,262,154,950,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-0204 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue... | https://nvd.nist.gov/vuln/detail/CVE-2015-0204 |
502,086 | openssl | 37580f43b5a39f5f4e920d17273fab9713d3a744 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/37580f43b5a39f5f4e920d17273fab9713d3a744 | Only allow ephemeral RSA keys in export ciphersuites.
OpenSSL clients would tolerate temporary RSA keys in non-export
ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which
enabled this server side. Remove both options as they are a
protocol violation.
Thanks to Karthikeyan Bhargavan for reporting this issue.... | 0 | int ssl3_get_key_exchange(SSL *s)
{
#ifndef OPENSSL_NO_RSA
unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2];
#endif
EVP_MD_CTX md_ctx;
unsigned char *param,*p;
int al,j,ok;
long i,param_len,n,alg_k,alg_a;
EVP_PKEY *pkey=NULL;
const EVP_MD *md = NULL;
#ifndef OPENSSL_NO_RSA
RSA *rsa=NULL;
#endif
#ifndef OPENSSL_NO_DH... | 308,464,899,959,723,500,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-0204 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue... | https://nvd.nist.gov/vuln/detail/CVE-2015-0204 |
216,511 | openssl | fa57f74a3941db6b2efb2f43c6add914ec83db20 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/fa57f74a3941db6b2efb2f43c6add914ec83db20 | Fix length checks in X509_cmp_time to avoid out-of-bounds reads.
Also tighten X509_cmp_time to reject more than three fractional
seconds in the time; and to reject trailing garbage after the offset.
CVE-2015-1789
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org> | 1 | int X509_cmp_time(ASN1_TIME *ctm, time_t *cmp_time)
{
char *str;
ASN1_TIME atm;
long offset;
char buff1[24], buff2[24], *p;
int i, j;
p = buff1;
i = ctm->length;
str = (char *)ctm->data;
if (ctm->type == V_ASN1_UTCTIME) {
if ((i < 11) || (i > 17))
return 0;
... | 90,751,591,921,006,810,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1789 | The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack aga... | https://nvd.nist.gov/vuln/detail/CVE-2015-1789 |
502,652 | openssl | fa57f74a3941db6b2efb2f43c6add914ec83db20 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/fa57f74a3941db6b2efb2f43c6add914ec83db20 | Fix length checks in X509_cmp_time to avoid out-of-bounds reads.
Also tighten X509_cmp_time to reject more than three fractional
seconds in the time; and to reject trailing garbage after the offset.
CVE-2015-1789
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org> | 0 | int X509_cmp_time(ASN1_TIME *ctm, time_t *cmp_time)
{
char *str;
ASN1_TIME atm;
long offset;
char buff1[24], buff2[24], *p;
int i, j, remaining;
p = buff1;
remaining = ctm->length;
str = (char *)ctm->data;
/*
* Note that the following (historical) code allows much more slack in... | 211,104,468,981,826,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-1789 | The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack aga... | https://nvd.nist.gov/vuln/detail/CVE-2015-1789 |
216,516 | openssl | 708cf593587e2fda67dae9782991ff9fccc781eb | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/708cf593587e2fda67dae9782991ff9fccc781eb | More ssl_session_dup fixes
Fix error handling in ssl_session_dup, as well as incorrect setting up of
the session ticket. Follow on from CVE-2015-1791.
Thanks to LibreSSL project for reporting these issues.
Reviewed-by: Tim Hudson <tjh@openssl.org> | 1 | SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket)
{
SSL_SESSION *dest;
dest = OPENSSL_malloc(sizeof(*src));
if (dest == NULL) {
goto err;
}
memcpy(dest, src, sizeof(*dest));
#ifndef OPENSSL_NO_PSK
if (src->psk_identity_hint) {
dest->psk_identity_hint = BUF_strdup(src->... | 53,711,852,958,386,060,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2015-1791 | Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe... | https://nvd.nist.gov/vuln/detail/CVE-2015-1791 |
502,739 | openssl | 708cf593587e2fda67dae9782991ff9fccc781eb | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/708cf593587e2fda67dae9782991ff9fccc781eb | More ssl_session_dup fixes
Fix error handling in ssl_session_dup, as well as incorrect setting up of
the session ticket. Follow on from CVE-2015-1791.
Thanks to LibreSSL project for reporting these issues.
Reviewed-by: Tim Hudson <tjh@openssl.org> | 0 | SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket)
{
SSL_SESSION *dest;
dest = OPENSSL_malloc(sizeof(*src));
if (dest == NULL) {
goto err;
}
memcpy(dest, src, sizeof(*dest));
/*
* Set the various pointers to NULL so that we can call SSL_SESSION_free in
* the case of a... | 245,399,656,695,249,850,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2015-1791 | Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe... | https://nvd.nist.gov/vuln/detail/CVE-2015-1791 |
216,534 | openssl | cf432b3b1bd7caa22943b41b94ec2472ae497dc6 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=cf432b3b1bd7caa22943b41b94ec2472ae497dc6 | Fix leak with ASN.1 combine.
When parsing a combined structure pass a flag to the decode routine
so on error a pointer to the parent structure is not zeroed as
this will leak any additional components in the parent.
This can leak memory in any application parsing PKCS#7 or CMS structures.
CVE-2015-3195.
Thanks to A... | 1 | int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
const ASN1_ITEM *it,
int tag, int aclass, char opt, ASN1_TLC *ctx)
{
const ASN1_TEMPLATE *tt, *errtt = NULL;
const ASN1_COMPAT_FUNCS *cf;
const ASN1_EXTERN_FUNCS *ef;
const ASN1_AUX *aux... | 263,909,722,983,773,970,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2015-3195 | The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decodin... | https://nvd.nist.gov/vuln/detail/CVE-2015-3195 |
502,828 | openssl | cf432b3b1bd7caa22943b41b94ec2472ae497dc6 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=cf432b3b1bd7caa22943b41b94ec2472ae497dc6 | Fix leak with ASN.1 combine.
When parsing a combined structure pass a flag to the decode routine
so on error a pointer to the parent structure is not zeroed as
this will leak any additional components in the parent.
This can leak memory in any application parsing PKCS#7 or CMS structures.
CVE-2015-3195.
Thanks to A... | 0 | int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
const ASN1_ITEM *it,
int tag, int aclass, char opt, ASN1_TLC *ctx)
{
const ASN1_TEMPLATE *tt, *errtt = NULL;
const ASN1_COMPAT_FUNCS *cf;
const ASN1_EXTERN_FUNCS *ef;
const ASN1_AUX *aux... | 328,836,160,859,697,960,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2015-3195 | The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decodin... | https://nvd.nist.gov/vuln/detail/CVE-2015-3195 |
216,566 | openssl | 4040a7fd104b412bd446338c6c28a62eb7d8e852 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=4040a7fd104b412bd446338c6c28a62eb7d8e852 | Better SSLv2 cipher-suite enforcement
Based on patch by: Nimrod Aviram <nimrod.aviram@gmail.com>
CVE-2015-3197
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org> | 1 | static int get_client_hello(SSL *s)
{
int i, n;
unsigned long len;
unsigned char *p;
STACK_OF(SSL_CIPHER) *cs; /* a stack of SSL_CIPHERS */
STACK_OF(SSL_CIPHER) *cl; /* the ones we want to use */
STACK_OF(SSL_CIPHER) *prio, *allow;
int z;
/*
* This is a bit of a hack to check f... | 38,126,118,214,104,405,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-3197 | ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functi... | https://nvd.nist.gov/vuln/detail/CVE-2015-3197 |
503,113 | openssl | 4040a7fd104b412bd446338c6c28a62eb7d8e852 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=4040a7fd104b412bd446338c6c28a62eb7d8e852 | Better SSLv2 cipher-suite enforcement
Based on patch by: Nimrod Aviram <nimrod.aviram@gmail.com>
CVE-2015-3197
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org> | 0 | static int get_client_hello(SSL *s)
{
int i, n;
unsigned long len;
unsigned char *p;
STACK_OF(SSL_CIPHER) *cs; /* a stack of SSL_CIPHERS */
STACK_OF(SSL_CIPHER) *cl; /* the ones we want to use */
STACK_OF(SSL_CIPHER) *prio, *allow;
int z;
/*
* This is a bit of a hack to check f... | 133,264,326,909,688,220,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-3197 | ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functi... | https://nvd.nist.gov/vuln/detail/CVE-2015-3197 |
216,567 | server | f0d774d48416bb06063184380b684380ca005a41 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 | MDEV-9212 ssl-validate-cert incorrect hostname check
Reimplement ssl_verify_server_cert() using the logic
from https://wiki.openssl.org/index.php/Hostname_validation
The bug was discovered by Alex Gaynor. | 1 | static int ssl_verify_server_cert(Vio *vio, const char* server_hostname, const char **errptr)
{
SSL *ssl;
X509 *server_cert;
char *cp1, *cp2;
char *buf;
DBUG_ENTER("ssl_verify_server_cert");
DBUG_PRINT("enter", ("server_hostname: %s", server_hostname));
if (!(ssl= (SSL*)vio->ssl_arg))
{
*errptr= "N... | 39,185,740,081,848,935,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-2047 | The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Co... | https://nvd.nist.gov/vuln/detail/CVE-2016-2047 |
503,134 | server | f0d774d48416bb06063184380b684380ca005a41 | https://github.com/MariaDB/server | https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41 | MDEV-9212 ssl-validate-cert incorrect hostname check
Reimplement ssl_verify_server_cert() using the logic
from https://wiki.openssl.org/index.php/Hostname_validation
The bug was discovered by Alex Gaynor. | 0 | static int ssl_verify_server_cert(Vio *vio, const char* server_hostname, const char **errptr)
{
SSL *ssl;
X509 *server_cert;
X509_NAME *x509sn;
int cn_pos;
X509_NAME_ENTRY *cn_entry;
ASN1_STRING *cn_asn1;
const char *cn_str;
DBUG_ENTER("ssl_verify_server_cert");
DBUG_PRINT("enter", ("server_hostname: ... | 109,669,441,192,962,960,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2016-2047 | The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Co... | https://nvd.nist.gov/vuln/detail/CVE-2016-2047 |
216,569 | openssl | 56f1acf5ef8a432992497a04792ff4b3b2c6f286 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=56f1acf5ef8a432992497a04792ff4b3b2c6f286 | Disable SSLv2 default build, default negotiation and weak ciphers.
SSLv2 is by default disabled at build-time. Builds that are not
configured with "enable-ssl2" will not support SSLv2. Even if
"enable-ssl2" is used, users who want to negotiate SSLv2 via the
version-flexible SSLv23_method() will need to explicitly ca... | 1 | SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth)
{
SSL_CTX *ret = NULL;
if (meth == NULL) {
SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_NULL_SSL_METHOD_PASSED);
return (NULL);
}
#ifdef OPENSSL_FIPS
if (FIPS_mode() && (meth->version < TLS1_VERSION)) {
SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_ONLY_TLS_ALL... | 168,611,592,344,533,550,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-0800 | The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbach... | https://nvd.nist.gov/vuln/detail/CVE-2016-0800 |
503,195 | openssl | 56f1acf5ef8a432992497a04792ff4b3b2c6f286 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=56f1acf5ef8a432992497a04792ff4b3b2c6f286 | Disable SSLv2 default build, default negotiation and weak ciphers.
SSLv2 is by default disabled at build-time. Builds that are not
configured with "enable-ssl2" will not support SSLv2. Even if
"enable-ssl2" is used, users who want to negotiate SSLv2 via the
version-flexible SSLv23_method() will need to explicitly ca... | 0 | SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth)
{
SSL_CTX *ret = NULL;
if (meth == NULL) {
SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_NULL_SSL_METHOD_PASSED);
return (NULL);
}
#ifdef OPENSSL_FIPS
if (FIPS_mode() && (meth->version < TLS1_VERSION)) {
SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_ONLY_TLS_ALL... | 282,725,754,377,997,300,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-0800 | The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbach... | https://nvd.nist.gov/vuln/detail/CVE-2016-0800 |
216,574 | openssl | 8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87 | crypto/bn/x86_64-mont5.pl: constant-time gather procedure.
At the same time remove miniscule bias in final subtraction.
Performance penalty varies from platform to platform, and even with
key length. For rsa2048 sign it was observed to be 4% for Sandy
Bridge and 7% on Broadwell.
CVE-2016-0702
Reviewed-by: Richard Le... | 1 | int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p,
const BIGNUM *m, BN_CTX *ctx,
BN_MONT_CTX *in_mont)
{
int i, bits, ret = 0, window, wvalue;
int top;
BN_MONT_CTX *mont = NULL;
int numPowers;
unsigned char *powerb... | 257,014,971,242,853,200,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-0702 | The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy B... | https://nvd.nist.gov/vuln/detail/CVE-2016-0702 |
503,357 | openssl | 8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87 | crypto/bn/x86_64-mont5.pl: constant-time gather procedure.
At the same time remove miniscule bias in final subtraction.
Performance penalty varies from platform to platform, and even with
key length. For rsa2048 sign it was observed to be 4% for Sandy
Bridge and 7% on Broadwell.
CVE-2016-0702
Reviewed-by: Richard Le... | 0 | int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p,
const BIGNUM *m, BN_CTX *ctx,
BN_MONT_CTX *in_mont)
{
int i, bits, ret = 0, window, wvalue;
int top;
BN_MONT_CTX *mont = NULL;
int numPowers;
unsigned char *powerb... | 211,104,678,558,070,900,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2016-0702 | The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy B... | https://nvd.nist.gov/vuln/detail/CVE-2016-0702 |
216,577 | openssl | 380f18ed5f140e0ae1b68f3ab8f4f7c395658d9e | https://github.com/openssl/openssl | http://git.openssl.org/?p=openssl.git;a=commitdiff;h=380f18ed5f140e0ae1b68f3ab8f4f7c395658d9e | CVE-2016-0798: avoid memory leak in SRP
The SRP user database lookup method SRP_VBASE_get_by_user had confusing
memory management semantics; the returned pointer was sometimes newly
allocated, and sometimes owned by the callee. The calling code has no
way of distinguishing these two cases.
Specifically, SRP servers t... | 1 | SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username)
{
int i;
SRP_user_pwd *user;
unsigned char digv[SHA_DIGEST_LENGTH];
unsigned char digs[SHA_DIGEST_LENGTH];
EVP_MD_CTX *ctxt = NULL;
if (vb == NULL)
return NULL;
for (i = 0; i < sk_SRP_user_pwd_num(vb->users_pwd); i++... | 315,632,142,932,209,800,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2016-0798 | Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-0798 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.