Search is not available for this dataset
Unnamed: 0
int64
3
189k
Access Gained
stringclasses
2 values
Attack Origin
stringclasses
4 values
Authentication Required
stringclasses
3 values
Availability
stringclasses
3 values
CVE ID
stringlengths
13
43
CVE Page
stringlengths
45
48
CWE ID
stringclasses
90 values
Complexity
stringclasses
4 values
Confidentiality
stringclasses
3 values
Integrity
stringclasses
3 values
Known Exploits
float64
Publish Date
stringclasses
911 values
Score
float64
0
10
Summary
stringlengths
60
1.32k
Update Date
stringclasses
671 values
Vulnerability Classification
stringclasses
75 values
add_lines
int64
0
382
codeLink
stringlengths
46
139
commit_id
stringlengths
6
81
commit_message
stringlengths
3
13.3k
del_lines
int64
0
459
file_name
stringlengths
4
100
files_changed
stringlengths
345
13.9M
func_after
stringlengths
14
235k
func_before
stringlengths
14
234k
lang
stringclasses
3 values
lines_after
stringlengths
1
10k
lines_before
stringlengths
2
10.2k
parentID
stringclasses
626 values
patch
stringlengths
101
359k
project
stringclasses
305 values
project_after
stringlengths
6
200
project_before
stringlengths
40
200
vul
int64
0
1
vul_func_with_fix
stringlengths
14
235k
172,251
null
Remote
Not required
null
CVE-2016-3837
https://www.cvedetails.com/cve/CVE-2016-3837/
CWE-200
Medium
Partial
null
null
2016-08-05
4.3
service/jni/com_android_server_wifi_WifiNative.cpp in Wi-Fi in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows attackers to obtain sensitive information via a crafted application that provides a MAC address with too few characters, aka internal bug 28164077.
2016-11-28
+Info
0
https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399
a209ff12ba9617c10550678ff93d01fb72a33399
Deal correctly with short strings The parseMacAddress function anticipates only properly formed MAC addresses (6 hexadecimal octets separated by ":"). This change properly deals with situations where the string is shorter than expected, making sure that the passed in char* reference in parseHexByte never exceeds the ...
0
service/jni/com_android_server_wifi_WifiNative.cpp
{"filename": "service/jni/com_android_server_wifi_WifiNative.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/service/jni/com_android_server_wifi_WifiNative.cpp", "patch": "@@ -697,15 +697,23 @@\n\n }\n \n static byte parseHexByte(const char ...
static jobject android_net_wifi_get_driver_version(JNIEnv *env, jclass cls, jint iface) { JNIHelper helper(env); int buffer_length = 256; char *buffer = (char *)malloc(buffer_length); if (!buffer) return NULL; memset(buffer, 0, buffer_length); wifi_interface_handle handle = getIfaceHandle(helper, cls, iface...
static jobject android_net_wifi_get_driver_version(JNIEnv *env, jclass cls, jint iface) { JNIHelper helper(env); int buffer_length = 256; char *buffer = (char *)malloc(buffer_length); if (!buffer) return NULL; memset(buffer, 0, buffer_length); wifi_interface_handle handle = getIfaceHandle(helper, cls, iface...
C
null
null
null
@@ -697,15 +697,23 @@ } static byte parseHexByte(const char * &str) { + if (str[0] == '\0') { + ALOGE("Passed an empty string"); + return 0; + } byte b = parseHexChar(str[0]); - if (str[1] == ':' || str[1] == '\0') { - str += 2; - return b; + if (str[1] == '\0' || str[1...
Android
https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/
https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399%5E/
0
static jobject android_net_wifi_get_driver_version(JNIEnv *env, jclass cls, jint iface) { //Need to be fixed. The memory should be allocated from lower layer //char *buffer = NULL; JNIHelper helper(env); int buffer_length = 256; char *buffer = (char *)malloc(buffer_length); if (!buffer) return NULL; memset(bu...
141,602
null
Remote
Not required
Partial
CVE-2016-5156
https://www.cvedetails.com/cve/CVE-2016-5156/
CWE-416
Medium
Partial
Partial
null
2016-09-11
6.8
extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have un...
2018-10-30
DoS
0
https://github.com/chromium/chromium/commit/ba011d9f8322c62633a069a59c2c5525e3ff46cc
ba011d9f8322c62633a069a59c2c5525e3ff46cc
Ignore filtered event if an event matcher cannot be added. BUG=625404 Review-Url: https://codereview.chromium.org/2236133002 Cr-Commit-Position: refs/heads/master@{#411472}
0
extensions/renderer/event_bindings.cc
{"sha": "db5fb60f428af90a3ce4ba3edcfee6a77b1a6729", "filename": "extensions/renderer/event_bindings.cc", "status": "modified", "additions": 7, "deletions": 3, "changes": 10, "blob_url": "https://github.com/chromium/chromium/blob/ba011d9f8322c62633a069a59c2c5525e3ff46cc/extensions/renderer/event_bindings.cc", "raw_url":...
EventBindings::~EventBindings() {}
EventBindings::~EventBindings() {}
C
null
null
null
@@ -272,14 +272,18 @@ void EventBindings::AttachFilteredEvent( filter = base::DictionaryValue::From(std::move(filter_value)); } - // Hold onto a weak reference to |filter| so that it can be used after passing - // ownership to |event_filter|. - base::DictionaryValue* filter_weak = filter.get(); int id =...
Chrome
ba011d9f8322c62633a069a59c2c5525e3ff46cc
17a812f225abd54e84dbe4f74c9619d4bdab3cbf
0
EventBindings::~EventBindings() {}
113,164
null
Remote
Not required
Partial
CVE-2012-2895
https://www.cvedetails.com/cve/CVE-2012-2895/
CWE-119
Medium
Partial
Partial
null
2012-09-26
6.8
The PDF functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations.
2017-09-18
DoS Overflow
0
https://github.com/chromium/chromium/commit/3475f5e448ddf5e48888f3d0563245cc46e3c98b
3475f5e448ddf5e48888f3d0563245cc46e3c98b
ash: Add launcher overflow bubble. - Host a LauncherView in bubble to display overflown items; - Mouse wheel and two-finger scroll to scroll the LauncherView in bubble in case overflow bubble is overflown; - Fit bubble when items are added/removed; - Keep launcher bar on screen when the bubble is shown; BUG=128054 TE...
0
ash/launcher/launcher.cc
{"sha": "62ca10dad9e69031c752bf990e997abd4f7e63ec", "filename": "ash/ash.gyp", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/3475f5e448ddf5e48888f3d0563245cc46e3c98b/ash/ash.gyp", "raw_url": "https://github.com/chromium/chromium/raw/3475f5e448...
void set_focus_cycler(internal::FocusCycler* focus_cycler) { focus_cycler_ = focus_cycler; }
void set_focus_cycler(internal::FocusCycler* focus_cycler) { focus_cycler_ = focus_cycler; }
C
null
null
null
@@ -4,6 +4,8 @@ #include "ash/launcher/launcher.h" +#include <algorithm> + #include "ash/focus_cycler.h" #include "ash/launcher/launcher_delegate.h" #include "ash/launcher/launcher_model.h" @@ -33,7 +35,7 @@ const int kBackgroundAlpha = 128; // The contents view of the Widget. This view contains LauncherView a...
Chrome
3475f5e448ddf5e48888f3d0563245cc46e3c98b
d72aa96b40382b63c0501be8d291cc42d1aa696d
0
void set_focus_cycler(internal::FocusCycler* focus_cycler) { focus_cycler_ = focus_cycler; }
118,895
null
Remote
Not required
null
CVE-2013-6626
https://www.cvedetails.com/cve/CVE-2013-6626/
null
Medium
null
Partial
null
2013-11-13
4.3
The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/90fb08ed0146c9beacfd4dde98a20fc45419fff3
90fb08ed0146c9beacfd4dde98a20fc45419fff3
Cancel JavaScript dialogs when an interstitial appears. BUG=295695 TEST=See bug for repro steps. Review URL: https://chromiumcodereview.appspot.com/24360011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@225026 0039d316-1c4b-4281-b951-d872f2087c98
0
content/browser/web_contents/web_contents_impl.cc
{"sha": "56901bcdfb435f9800494117dd64cd875f9a7148", "filename": "chrome/browser/ui/browser_browsertest.cc", "status": "modified", "additions": 48, "deletions": 0, "changes": 48, "blob_url": "https://github.com/chromium/chromium/blob/90fb08ed0146c9beacfd4dde98a20fc45419fff3/chrome/browser/ui/browser_browsertest.cc", "ra...
WebContentsImpl::GetLastCommittedNavigationEntryForRenderManager() { return controller_.GetLastCommittedEntry(); }
WebContentsImpl::GetLastCommittedNavigationEntryForRenderManager() { return controller_.GetLastCommittedEntry(); }
C
null
null
null
@@ -1785,6 +1785,12 @@ void WebContentsImpl::AttachInterstitialPage( InterstitialPageImpl* interstitial_page) { DCHECK(interstitial_page); render_manager_.set_interstitial_page(interstitial_page); + + // Cancel any visible dialogs so that they don't interfere with the + // interstitial. + if (dialog_manag...
Chrome
90fb08ed0146c9beacfd4dde98a20fc45419fff3
4165aa2c5c1f370d1535163e4f05c40af6aa141a
0
WebContentsImpl::GetLastCommittedNavigationEntryForRenderManager() { return controller_.GetLastCommittedEntry(); }
89,316
null
Remote
Not required
Complete
CVE-2019-13106
https://www.cvedetails.com/cve/CVE-2019-13106/
CWE-787
Medium
Partial
Partial
null
2019-08-06
8.3
Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.
2019-10-01
Exec Code Overflow
0
https://github.com/u-boot/u-boot/commits/master
master
Merge branch '2020-01-22-master-imports' - Re-add U8500 platform support - Add bcm968360bg support - Assorted Keymile fixes - Other assorted bugfixes
0
board/keymile/km_arm/km_arm.c
{"sha": "b0634b23bc875a05240d75a402e639fddb5ec928", "filename": "MAINTAINERS", "status": "modified", "additions": 17, "deletions": 0, "changes": 17, "blob_url": "https://github.com/u-boot/u-boot/blob/2c871f9e084b2c03d1961884228a6901387ab8d6/MAINTAINERS", "raw_url": "https://github.com/u-boot/u-boot/raw/2c871f9e084b2c03...
static void set_bootcount_addr(void) { uchar buf[32]; unsigned int bootcountaddr; bootcountaddr = gd->ram_size - BOOTCOUNT_ADDR; sprintf((char *)buf, "0x%x", bootcountaddr); env_set("bootcountaddr", (char *)buf); }
static void set_bootcount_addr(void) { uchar buf[32]; unsigned int bootcountaddr; bootcountaddr = gd->ram_size - BOOTCOUNT_ADDR; sprintf((char *)buf, "0x%x", bootcountaddr); env_set("bootcountaddr", (char *)buf); }
C
null
null
null
@@ -69,11 +69,7 @@ static const u32 kwmpp_config[] = { MPP4_NF_IO6, MPP5_NF_IO7, MPP6_SYSRST_OUTn, -#if defined(KM_PCIE_RESET_MPP7) - MPP7_GPO, -#else MPP7_PEX_RST_OUTn, -#endif #if defined(CONFIG_SYS_I2C_SOFT) MPP8_GPIO, /* SDA */ MPP9_GPIO, /* SCL */
u-boot
master
052170c6a043eec4e73fad80955876cf1ba5e4f2
0
static void set_bootcount_addr(void) { uchar buf[32]; unsigned int bootcountaddr; bootcountaddr = gd->ram_size - BOOTCOUNT_ADDR; sprintf((char *)buf, "0x%x", bootcountaddr); env_set("bootcountaddr", (char *)buf); }
126,863
null
Remote
Not required
Partial
CVE-2012-5148
https://www.cvedetails.com/cve/CVE-2012-5148/
CWE-20
Low
Partial
Partial
null
2013-01-15
7.5
The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names, which has unspecified impact and attack vectors.
2018-10-30
null
0
https://github.com/chromium/chromium/commit/e89cfcb9090e8c98129ae9160c513f504db74599
e89cfcb9090e8c98129ae9160c513f504db74599
Remove TabContents from TabStripModelObserver::TabDetachedAt. BUG=107201 TEST=no visible change Review URL: https://chromiumcodereview.appspot.com/11293205 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@167122 0039d316-1c4b-4281-b951-d872f2087c98
0
chrome/browser/ui/views/frame/browser_view.cc
{"sha": "3494da8b6ee160b5f04f031be3e2cd52af5e3fdf", "filename": "chrome/browser/automation/automation_provider_observers.cc", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/e89cfcb9090e8c98129ae9160c513f504db74599/chrome/browser/automation/auto...
void BrowserView::ShowChromeToMobileBubble() { GetLocationBarView()->ShowChromeToMobileBubble(); }
void BrowserView::ShowChromeToMobileBubble() { GetLocationBarView()->ShowChromeToMobileBubble(); }
C
null
null
null
@@ -1401,7 +1401,7 @@ ToolbarView* BrowserView::GetToolbarView() const { /////////////////////////////////////////////////////////////////////////////// // BrowserView, TabStripModelObserver implementation: -void BrowserView::TabDetachedAt(TabContents* contents, int index) { +void BrowserView::TabDetachedAt(WebCont...
Chrome
e89cfcb9090e8c98129ae9160c513f504db74599
0c71b754680eb40b42ca1ce7a4e6fef7442b5da4
0
void BrowserView::ShowChromeToMobileBubble() { GetLocationBarView()->ShowChromeToMobileBubble(); }
152,065
null
Remote
Not required
Partial
CVE-2017-5019
https://www.cvedetails.com/cve/CVE-2017-5019/
CWE-416
Medium
Partial
Partial
null
2017-02-17
6.8
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
Convert FrameHostMsg_DidAddMessageToConsole to Mojo. Note: Since this required changing the test RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually re-introduced https://crbug.com/666714 locally (the bug the test was added for), and reran the test to confirm that it still covers the bug. Bug: 786836 Ch...
0
content/browser/frame_host/render_frame_host_impl.cc
{"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render...
void RenderFrameHostImpl::RequestAXTreeSnapshot(AXTreeSnapshotCallback callback, ui::AXMode ax_mode) { static int next_id = 1; int callback_id = next_id++; Send(new AccessibilityMsg_SnapshotTree(routing_id_, callback_id, ax_m...
void RenderFrameHostImpl::RequestAXTreeSnapshot(AXTreeSnapshotCallback callback, ui::AXMode ax_mode) { static int next_id = 1; int callback_id = next_id++; Send(new AccessibilityMsg_SnapshotTree(routing_id_, callback_id, ax_m...
C
null
null
null
@@ -1375,8 +1375,6 @@ bool RenderFrameHostImpl::OnMessageReceived(const IPC::Message &msg) { handled = true; IPC_BEGIN_MESSAGE_MAP(RenderFrameHostImpl, msg) - IPC_MESSAGE_HANDLER(FrameHostMsg_DidAddMessageToConsole, - OnDidAddMessageToConsole) IPC_MESSAGE_HANDLER(FrameHostMsg_Deta...
Chrome
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
c246049ec1b28d1af4fe3be886ac5904e1762026
0
void RenderFrameHostImpl::RequestAXTreeSnapshot(AXTreeSnapshotCallback callback, ui::AXMode ax_mode) { static int next_id = 1; int callback_id = next_id++; Send(new AccessibilityMsg_SnapshotTree(routing_id_, callback_id, ax_m...
60,944
null
Remote
Single system
null
CVE-2017-14604
https://www.cvedetails.com/cve/CVE-2017-14604/
CWE-20
Low
null
Partial
null
2017-09-20
4
GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious *sh -c* command. In other words, Nautilus provides no UI indication that a file actual...
2018-01-26
Exec Code
0
https://github.com/GNOME/nautilus/commit/1630f53481f445ada0a455e9979236d31a8d3bb0
1630f53481f445ada0a455e9979236d31a8d3bb0
mime-actions: use file metadata for trusting desktop files Currently we only trust desktop files that have the executable bit set, and don't replace the displayed icon or the displayed name until it's trusted, which prevents for running random programs by a malicious desktop file. However, the executable permission i...
0
src/nautilus-directory-async.c
{"sha": "b02e3de87b10a1d07f6f8bdd3d9ec9febfe7a024", "filename": "src/nautilus-directory-async.c", "status": "modified", "additions": 6, "deletions": 1, "changes": 7, "blob_url": "https://github.com/GNOME/nautilus/blob/1630f53481f445ada0a455e9979236d31a8d3bb0/src/nautilus-directory-async.c", "raw_url": "https://github.c...
mime_list_done (MimeListState *state, gboolean success) { NautilusFile *file; NautilusDirectory *directory; directory = state->directory; g_assert (directory != NULL); file = state->mime_list_file; file->details->mime_list_is_up_to_date = TRUE; g_list_free_full (file...
mime_list_done (MimeListState *state, gboolean success) { NautilusFile *file; NautilusDirectory *directory; directory = state->directory; g_assert (directory != NULL); file = state->mime_list_file; file->details->mime_list_is_up_to_date = TRUE; g_list_free_full (file...
C
null
null
null
@@ -30,6 +30,7 @@ #include "nautilus-global-preferences.h" #include "nautilus-link.h" #include "nautilus-profile.h" +#include "nautilus-metadata.h" #include <eel/eel-glib-extensions.h> #include <gtk/gtk.h> #include <libxml/parser.h> @@ -3580,13 +3581,17 @@ is_link_trusted (NautilusFile *file, { GFile *locat...
nautilus
1630f53481f445ada0a455e9979236d31a8d3bb0
cc6910ff6511a5a2939cf36a49ca81fb62005382
0
mime_list_done (MimeListState *state, gboolean success) { NautilusFile *file; NautilusDirectory *directory; directory = state->directory; g_assert (directory != NULL); file = state->mime_list_file; file->details->mime_list_is_up_to_date = TRUE; g_list_free_full (file...
44,986
null
Remote
Not required
Partial
CVE-2015-0253
https://www.cvedetails.com/cve/CVE-2015-0253/
null
Low
null
null
null
2015-07-20
5
The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INC...
2018-01-04
DoS
0
https://github.com/apache/httpd/commit/6a974059190b8a0c7e499f4ab12fe108127099cb
6a974059190b8a0c7e499f4ab12fe108127099cb
*) SECURITY: CVE-2015-0253 (cve.mitre.org) core: Fix a crash introduced in with ErrorDocument 400 pointing to a local URL-path with the INCLUDES filter active, introduced in 2.4.11. PR 57531. [Yann Ylavic] Submitted By: ylavic Committed By: covener git-svn-id: https://svn.apache.org/repos/asf/ht...
0
server/protocol.c
{"sha": "064446d61118e9c799c51eb7105df54d7040af87", "filename": "CHANGES", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/apache/httpd/blob/6a974059190b8a0c7e499f4ab12fe108127099cb/CHANGES", "raw_url": "https://github.com/apache/httpd/raw/6a974059190b8a0c7e499f4ab12f...
AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r, apr_bucket_brigade *bb) { char *last_field = NULL; apr_size_t last_len = 0; apr_size_t alloc_len = 0; char *field; char *value; apr_size_t len; int fields_read = 0; char *tmp_field; core_server_config *conf = ap_get_core_modul...
AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r, apr_bucket_brigade *bb) { char *last_field = NULL; apr_size_t last_len = 0; apr_size_t alloc_len = 0; char *field; char *value; apr_size_t len; int fields_read = 0; char *tmp_field; core_server_config *conf = ap_get_core_modul...
C
null
null
null
@@ -606,15 +606,15 @@ static int read_request_line(request_rec *r, apr_bucket_brigade *bb) */ if (APR_STATUS_IS_ENOSPC(rv)) { r->status = HTTP_REQUEST_URI_TOO_LARGE; - r->proto_num = HTTP_VERSION(1,0); - r->protocol = apr_pstrdup(r->pool, "HT...
httpd
6a974059190b8a0c7e499f4ab12fe108127099cb
1fd42eb6471263a49b7a452b642163c111ce09f8
0
AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r, apr_bucket_brigade *bb) { char *last_field = NULL; apr_size_t last_len = 0; apr_size_t alloc_len = 0; char *field; char *value; apr_size_t len; int fields_read = 0; char *tmp_field; core_server_config *conf = ap_get_core_modul...
163,791
null
Remote
Not required
null
CVE-2017-15389
https://www.cvedetails.com/cve/CVE-2017-15389/
CWE-20
Medium
null
Partial
null
2018-02-07
4.3
An insufficient watchdog timer in navigation in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
2018-02-22
null
0
https://github.com/chromium/chromium/commit/5788690fb1395dc672ff9b3385dbfb1180ed710a
5788690fb1395dc672ff9b3385dbfb1180ed710a
mac: Make RWHVMac::ClearCompositorFrame clear locks Ensure that the BrowserCompositorMac not hold on to a compositor lock when requested to clear its compositor frame. This lock may be held indefinitely (if the renderer hangs) and so the frame will never be cleared. Bug: 739621 Change-Id: I15d0e82bdf632f3379a48e959f1...
0
content/browser/renderer_host/delegated_frame_host.cc
{"sha": "4355a8cdacb4f8308554dadba4367f2923cabdae", "filename": "content/browser/renderer_host/browser_compositor_view_mac.h", "status": "modified", "additions": 8, "deletions": 1, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/5788690fb1395dc672ff9b3385dbfb1180ed710a/content/browser/renderer_host...
viz::SurfaceId DelegatedFrameHost::SurfaceIdAtPoint( viz::SurfaceHittestDelegate* delegate, const gfx::Point& point, gfx::Point* transformed_point) { viz::SurfaceId surface_id(frame_sink_id_, local_surface_id_); if (!surface_id.is_valid()) return surface_id; viz::SurfaceHittest hittest(delegate, ...
viz::SurfaceId DelegatedFrameHost::SurfaceIdAtPoint( viz::SurfaceHittestDelegate* delegate, const gfx::Point& point, gfx::Point* transformed_point) { viz::SurfaceId surface_id(frame_sink_id_, local_surface_id_); if (!surface_id.is_valid()) return surface_id; viz::SurfaceHittest hittest(delegate, ...
C
null
null
null
@@ -488,6 +488,11 @@ void DelegatedFrameHost::SubmitCompositorFrame( } void DelegatedFrameHost::ClearDelegatedFrame() { + // Ensure that we are able to swap in a new blank frame to replace any old + // content. This will result in a white flash if we switch back to this + // content. + // https://crbug.com/7396...
Chrome
5788690fb1395dc672ff9b3385dbfb1180ed710a
6f0e3b2e552282301575d17cf664d3b1f5888302
0
viz::SurfaceId DelegatedFrameHost::SurfaceIdAtPoint( viz::SurfaceHittestDelegate* delegate, const gfx::Point& point, gfx::Point* transformed_point) { viz::SurfaceId surface_id(frame_sink_id_, local_surface_id_); if (!surface_id.is_valid()) return surface_id; viz::SurfaceHittest hittest(delegate, ...
125,271
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2013-01
null
0
https://github.com/chromium/chromium/commit/70cff275010b33dbab628f837d76364359065b79
70cff275010b33dbab628f837d76364359065b79
Disable compositor thread input handling on windows BUG=160122 Review URL: https://chromiumcodereview.appspot.com/11946019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@177369 0039d316-1c4b-4281-b951-d872f2087c98
0
content/renderer/render_view_impl.cc
{"sha": "fe416ccad596990cf1cb3a4ca7010e2d6cf459cc", "filename": "content/renderer/render_view_impl.cc", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/70cff275010b33dbab628f837d76364359065b79/content/renderer/render_view_impl.cc", "raw_url": "h...
static void MaybeHandleDebugURL(const GURL& url) { if (!url.SchemeIs(chrome::kChromeUIScheme)) return; if (url == GURL(chrome::kChromeUICrashURL)) { CrashIntentionally(); } else if (url == GURL(chrome::kChromeUIKillURL)) { base::KillProcess(base::GetCurrentProcessHandle(), 1, false); } else if (url ...
static void MaybeHandleDebugURL(const GURL& url) { if (!url.SchemeIs(chrome::kChromeUIScheme)) return; if (url == GURL(chrome::kChromeUICrashURL)) { CrashIntentionally(); } else if (url == GURL(chrome::kChromeUIKillURL)) { base::KillProcess(base::GetCurrentProcessHandle(), 1, false); } else if (url ...
C
null
null
null
@@ -2537,11 +2537,13 @@ bool RenderViewImpl::isPointerLocked() { } void RenderViewImpl::didActivateCompositor(int input_handler_identifier) { +#if !defined(OS_WIN) // http://crbug.com/160122 CompositorThread* compositor_thread = RenderThreadImpl::current()->compositor_thread(); if (compositor_thread) ...
Chrome
70cff275010b33dbab628f837d76364359065b79
b8b3337b6cbdf65e922c59ed442b8a48a8a02f04
0
static void MaybeHandleDebugURL(const GURL& url) { if (!url.SchemeIs(chrome::kChromeUIScheme)) return; if (url == GURL(chrome::kChromeUICrashURL)) { CrashIntentionally(); } else if (url == GURL(chrome::kChromeUIKillURL)) { base::KillProcess(base::GetCurrentProcessHandle(), 1, false); } else if (url ...
169,542
null
Remote
Not required
Partial
CVE-2016-1674
https://www.cvedetails.com/cve/CVE-2016-1674/
null
Medium
Partial
Partial
null
2016-06-05
6.8
The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
2018-10-30
Bypass
0
https://github.com/chromium/chromium/commit/14ff9d0cded8ae8032ef027d1f33c6666a695019
14ff9d0cded8ae8032ef027d1f33c6666a695019
[Extensions] Add more bindings access checks BUG=598165 Review URL: https://codereview.chromium.org/1854983002 Cr-Commit-Position: refs/heads/master@{#385282}
0
chrome/renderer/extensions/automation_internal_custom_bindings.cc
{"sha": "090971a64ff04e53e9a3e4933c742515453b7026", "filename": "chrome/renderer/extensions/automation_internal_custom_bindings.cc", "status": "modified", "additions": 3, "deletions": 3, "changes": 6, "blob_url": "https://github.com/chromium/chromium/blob/14ff9d0cded8ae8032ef027d1f33c6666a695019/chrome/renderer/extensi...
void Remove() { if (!removed_) { removed_ = true; content::RenderThread::Get()->RemoveFilter(this); } }
void Remove() { if (!removed_) { removed_ = true; content::RenderThread::Get()->RemoveFilter(this); } }
C
null
null
null
@@ -418,10 +418,10 @@ AutomationInternalCustomBindings::AutomationInternalCustomBindings( // It's safe to use base::Unretained(this) here because these bindings // will only be called on a valid AutomationInternalCustomBindings instance // and none of the functions have any side effects. - #define ROUTE_FUNCT...
Chrome
14ff9d0cded8ae8032ef027d1f33c6666a695019
d81c1ced74e63e4bf50019ffd2d398def71bdae7
0
void Remove() { if (!removed_) { removed_ = true; content::RenderThread::Get()->RemoveFilter(this); } }
4,218
null
Remote
Not required
Complete
CVE-2009-0946
https://www.cvedetails.com/cve/CVE-2009-0946/
CWE-189
Low
Complete
Complete
null
2009-04-16
10
Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
2017-09-28
Exec Code Overflow
0
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5
0545ec1ca36b27cb928128870a83e5f668980bc5
null
0
null
null
cff_index_get_pointers( CFF_Index idx, FT_Byte*** table ) { FT_Error error = CFF_Err_Ok; FT_Memory memory = idx->stream->memory; FT_ULong n, offset, old_offset; FT_Byte** t; *table = 0; if ( idx->offsets == NULL ) { error = cff_index_load_offs...
cff_index_get_pointers( CFF_Index idx, FT_Byte*** table ) { FT_Error error = CFF_Err_Ok; FT_Memory memory = idx->stream->memory; FT_ULong n, offset, old_offset; FT_Byte** t; *table = 0; if ( idx->offsets == NULL ) { error = cff_index_load_offs...
C
null
null
8b819254b9fa1e686eaff8f6b214dfd8eeebe8a0
@@ -842,7 +842,20 @@ goto Exit; for ( j = 1; j < num_glyphs; j++ ) - charset->sids[j] = FT_GET_USHORT(); + { + FT_UShort sid = FT_GET_USHORT(); + + + /* this constant is given in the CFF specification */ + if ( sid < 65000 ) + c...
savannah
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cffload.c?id=0545ec1ca36b27cb928128870a83e5f668980bc5
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cffload.c?id=8b819254b9fa1e686eaff8f6b214dfd8eeebe8a0
0
cff_index_get_pointers( CFF_Index idx, FT_Byte*** table ) { FT_Error error = CFF_Err_Ok; FT_Memory memory = idx->stream->memory; FT_ULong n, offset, old_offset; FT_Byte** t; *table = 0; if ( idx->offsets == NULL ) { error = cff_index_load_offs...
121,694
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2013-06
null
0
https://github.com/chromium/chromium/commit/d57ecffa058b2af3b0678c43dce75f731550bbce
d57ecffa058b2af3b0678c43dce75f731550bbce
drive: Stop calling OnChangeListLoadComplete() if DirectoryFetchInfo is not empty Call LoadAfterLoadDirectory() instead. BUG=333164 TEST=unit_tests Review URL: https://codereview.chromium.org/132503004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@244406 0039d316-1c4b-4281-b951-d872f2087c98
0
chrome/browser/chromeos/drive/change_list_loader.cc
{"sha": "48253ac2471bf89107376eb06824a608d4bf3914", "filename": "chrome/browser/chromeos/drive/change_list_loader.cc", "status": "modified", "additions": 16, "deletions": 12, "changes": 28, "blob_url": "https://github.com/chromium/chromium/blob/d57ecffa058b2af3b0678c43dce75f731550bbce/chrome/browser/chromeos/drive/chan...
virtual ~DeltaFeedFetcher() { }
virtual ~DeltaFeedFetcher() { }
C
null
null
null
@@ -574,26 +574,30 @@ void ChangeListLoader::LoadAfterGetAboutResource( FileError error = GDataToFileError(status); if (error != FILE_ERROR_OK) { - OnChangeListLoadComplete(error); + if (directory_fetch_info.empty() || is_initial_load) + OnChangeListLoadComplete(error); + else + OnDirectoryLo...
Chrome
d57ecffa058b2af3b0678c43dce75f731550bbce
70c908cadedbf286a352085620e6ed33883af539
0
virtual ~DeltaFeedFetcher() { }
138,139
null
Remote
Not required
Partial
CVE-2015-1274
https://www.cvedetails.com/cve/CVE-2015-1274/
CWE-254
Medium
Partial
Partial
null
2015-07-22
6.8
Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous *Always open files of this type* choice, related to download_commands.cc and downloa...
2018-10-30
Exec Code
0
https://github.com/chromium/chromium/commit/d27468a832d5316884bd02f459cbf493697fd7e1
d27468a832d5316884bd02f459cbf493697fd7e1
Switch to equalIgnoringASCIICase throughout modules/accessibility BUG=627682 Review-Url: https://codereview.chromium.org/2793913007 Cr-Commit-Position: refs/heads/master@{#461858}
0
third_party/WebKit/Source/modules/accessibility/AXObject.cpp
{"sha": "b7b9d3ad4a5cdff0f72bf31370c16bddf7da6615", "filename": "third_party/WebKit/Source/modules/accessibility/AXARIAGridCell.cpp", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/d27468a832d5316884bd02f459cbf493697fd7e1/third_party/WebKit/Sou...
String AXObject::computedName() const { AXNameFrom nameFrom; AXObject::AXObjectVector nameObjects; return name(nameFrom, &nameObjects); }
String AXObject::computedName() const { AXNameFrom nameFrom; AXObject::AXObjectVector nameObjects; return name(nameFrom, &nameObjects); }
C
null
null
null
@@ -596,7 +596,7 @@ AXObject* AXObject::leafNodeAncestor() const { const AXObject* AXObject::ariaHiddenRoot() const { for (const AXObject* object = this; object; object = object->parentObject()) { - if (equalIgnoringCase(object->getAttribute(aria_hiddenAttr), "true")) + if (equalIgnoringASCIICase(object->ge...
Chrome
d27468a832d5316884bd02f459cbf493697fd7e1
62dc793dc640ae5fd16d571a0c9199fe0fb740d0
0
String AXObject::computedName() const { AXNameFrom nameFrom; AXObject::AXObjectVector nameObjects; return name(nameFrom, &nameObjects); }
77,369
null
Remote
Not required
Partial
CVE-2018-17205
https://www.cvedetails.com/cve/CVE-2018-17205/
CWE-617
Low
null
null
null
2018-09-19
5
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to r...
2019-10-02
null
0
https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6
0befd1f3745055c32940f5faf9559be6a14395e6
ofproto: Fix OVS crash when reverting old flows in bundle commit During bundle commit flows which are added in bundle are applied to ofproto in-order. In case if a flow cannot be added (e.g. flow action is go-to group id which does not exist), OVS tries to revert back all previous flows which were successfully applied...
0
ofproto/ofproto.c
{"sha": "50df9dc9c099b965378d5be3e78eb49dbb509b81", "filename": "ofproto/ofproto.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/openvswitch/ovs/blob/0befd1f3745055c32940f5faf9559be6a14395e6/ofproto/ofproto.c", "raw_url": "https://github.com/openvswitch/ovs/raw/0b...
ofproto_port_set_stp(struct ofproto *ofproto, ofp_port_t ofp_port, const struct ofproto_port_stp_settings *s) { struct ofport *ofport = ofproto_get_port(ofproto, ofp_port); if (!ofport) { VLOG_WARN("%s: cannot configure STP on nonexistent port %"PRIu32, ofproto->na...
ofproto_port_set_stp(struct ofproto *ofproto, ofp_port_t ofp_port, const struct ofproto_port_stp_settings *s) { struct ofport *ofport = ofproto_get_port(ofproto, ofp_port); if (!ofport) { VLOG_WARN("%s: cannot configure STP on nonexistent port %"PRIu32, ofproto->na...
C
null
null
null
@@ -8465,7 +8465,7 @@ ofproto_rule_insert__(struct ofproto *ofproto, struct rule *rule) const struct rule_actions *actions = rule_get_actions(rule); /* A rule may not be reinserted. */ - ovs_assert(rule->state == RULE_INITIALIZED); + ovs_assert(rule->state != RULE_INSERTED); if (rule->hard_time...
ovs
0befd1f3745055c32940f5faf9559be6a14395e6
f9df636ef91c639cf97c6bd8e5433381ac63859b
0
ofproto_port_set_stp(struct ofproto *ofproto, ofp_port_t ofp_port, const struct ofproto_port_stp_settings *s) { struct ofport *ofport = ofproto_get_port(ofproto, ofp_port); if (!ofport) { VLOG_WARN("%s: cannot configure STP on nonexistent port %"PRIu32, ofproto->na...
86,389
null
Local
Not required
Complete
CVE-2017-15128
https://www.cvedetails.com/cve/CVE-2017-15128/
CWE-119
Low
null
null
null
2018-01-14
4.9
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG).
2019-10-09
DoS Overflow
0
https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
1e3921471354244f70fe268586ff94a97a6dd4df
userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size This oops: kernel BUG at fs/hugetlbfs/inode.c:484! RIP: remove_inode_hugepages+0x3d0/0x410 Call Trace: hugetlbfs_setattr+0xd9/0x130 notify_change+0x292/0x410 do_truncate+0x65/0xa0 do_sys_ftruncate.constprop.3+0x11a/0x18...
0
mm/hugetlb.c
{"sha": "2d2ff5e8bf2bc035eb300ee16dbdaadcdb0279dd", "filename": "mm/hugetlb.c", "status": "modified", "additions": 30, "deletions": 2, "changes": 32, "blob_url": "https://github.com/torvalds/linux/blob/1e3921471354244f70fe268586ff94a97a6dd4df/mm/hugetlb.c", "raw_url": "https://github.com/torvalds/linux/raw/1e3921471354...
void hugetlb_show_meminfo(void) { struct hstate *h; int nid; if (!hugepages_supported()) return; for_each_node_state(nid, N_MEMORY) for_each_hstate(h) pr_info("Node %d hugepages_total=%u hugepages_free=%u hugepages_surp=%u hugepages_size=%lukB\n", nid, h->nr_huge_pages_node[nid], h->free_huge_p...
void hugetlb_show_meminfo(void) { struct hstate *h; int nid; if (!hugepages_supported()) return; for_each_node_state(nid, N_MEMORY) for_each_hstate(h) pr_info("Node %d hugepages_total=%u hugepages_free=%u hugepages_surp=%u hugepages_size=%lukB\n", nid, h->nr_huge_pages_node[nid], h->free_huge_p...
C
null
null
null
@@ -3984,6 +3984,9 @@ int hugetlb_mcopy_atomic_pte(struct mm_struct *dst_mm, unsigned long src_addr, struct page **pagep) { + struct address_space *mapping; + pgoff_t idx; + unsigned long size; int vm_shared = dst_vma->vm_flags & VM_SHARED; struct hstate *h = hstate_vma(dst_vma); pte_t _dst_pte; ...
linux
1e3921471354244f70fe268586ff94a97a6dd4df
5cb0512c02ecd7e6214e912e4c150f4219ac78e0
0
void hugetlb_show_meminfo(void) { struct hstate *h; int nid; if (!hugepages_supported()) return; for_each_node_state(nid, N_MEMORY) for_each_hstate(h) pr_info("Node %d hugepages_total=%u hugepages_free=%u hugepages_surp=%u hugepages_size=%lukB\n", nid, h->nr_huge_pages_node[nid], h->free_huge_p...
149,727
null
Remote
Not required
Partial
CVE-2017-5057
https://www.cvedetails.com/cve/CVE-2017-5057/
CWE-125
Medium
Partial
Partial
null
2017-10-27
6.8
Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/cbc5d5153b18ea387f4769caa01d1339261f6ed6
cbc5d5153b18ea387f4769caa01d1339261f6ed6
gpu: Disallow use of IOSurfaces for half-float format with swiftshader. R=kbr@chromium.org Bug: 998038 Change-Id: Ic31d28938ef205b36657fc7bd297fe8a63d08543 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1798052 Commit-Queue: Kenneth Russell <kbr@chromium.org> Reviewed-by: Kenneth Russell <kbr@...
0
gpu/command_buffer/service/feature_info.cc
{"sha": "aa567968e2ec4c52596d0614e2c6384619394aac", "filename": "gpu/command_buffer/service/feature_info.cc", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/cbc5d5153b18ea387f4769caa01d1339261f6ed6/gpu/command_buffer/service/feature_info.cc", "...
void FeatureInfo::EnableEXTColorBufferFloat() { if (!ext_color_buffer_float_available_) return; AddExtensionString("GL_EXT_color_buffer_float"); validators_.render_buffer_format.AddValue(GL_R16F); validators_.render_buffer_format.AddValue(GL_RG16F); validators_.render_buffer_format.AddValue(GL_RGBA16F); ...
void FeatureInfo::EnableEXTColorBufferFloat() { if (!ext_color_buffer_float_available_) return; AddExtensionString("GL_EXT_color_buffer_float"); validators_.render_buffer_format.AddValue(GL_R16F); validators_.render_buffer_format.AddValue(GL_RG16F); validators_.render_buffer_format.AddValue(GL_RGBA16F); ...
C
null
null
null
@@ -426,6 +426,11 @@ void FeatureInfo::EnableOESTextureHalfFloatLinear() { return; AddExtensionString("GL_OES_texture_half_float_linear"); feature_flags_.enable_texture_half_float_linear = true; + + // TODO(capn) : Re-enable this once we have ANGLE+SwiftShader supporting + // IOSurfaces. + if (workarounds...
Chrome
cbc5d5153b18ea387f4769caa01d1339261f6ed6
1102f12d8e3317d18baae355789e893aba57a325
0
void FeatureInfo::EnableEXTColorBufferFloat() { if (!ext_color_buffer_float_available_) return; AddExtensionString("GL_EXT_color_buffer_float"); validators_.render_buffer_format.AddValue(GL_R16F); validators_.render_buffer_format.AddValue(GL_RG16F); validators_.render_buffer_format.AddValue(GL_RGBA16F); ...
107,183
null
Remote
Not required
Partial
CVE-2011-1292
https://www.cvedetails.com/cve/CVE-2011-1292/
CWE-399
Low
Partial
Partial
null
2011-03-25
7.5
Use-after-free vulnerability in the frame-loader implementation in Google Chrome before 10.0.648.204 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
2017-09-18
DoS
0
https://github.com/chromium/chromium/commit/5f372f899b8709dac700710b5f0f90959dcf9ecb
5f372f899b8709dac700710b5f0f90959dcf9ecb
Add support for autofill server experiments BUG=none TEST=unit_tests --gtest_filter=AutoFillMetricsTest.QualityMetricsWithExperimentId:AutoFillQueryXmlParserTest.ParseExperimentId Review URL: http://codereview.chromium.org/6260027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@73216 0039d316-1c4b-4281-b951-d872...
0
chrome/browser/autofill/autofill_manager.cc
{"sha": "ed73429e0fff008aeaa29bbc608ff7d0ce833d6d", "filename": "chrome/browser/autofill/autofill_manager.cc", "status": "modified", "additions": 26, "deletions": 16, "changes": 42, "blob_url": "https://github.com/chromium/chromium/blob/5f372f899b8709dac700710b5f0f90959dcf9ecb/chrome/browser/autofill/autofill_manager.c...
void AutoFillManager::OnInfoBarClosed(bool should_save) { if (should_save) personal_data_->SaveImportedCreditCard(); }
void AutoFillManager::OnInfoBarClosed(bool should_save) { if (should_save) personal_data_->SaveImportedCreditCard(); }
C
null
null
null
@@ -512,6 +512,7 @@ void AutoFillManager::LogMetricsAboutSubmittedForm( cached_fields[field->FieldSignature()] = field; } + std::string experiment_id = cached_submitted_form->server_experiment_id(); for (size_t i = 0; i < submitted_form->field_count(); ++i) { const AutoFillField* field = submitted_fo...
Chrome
5f372f899b8709dac700710b5f0f90959dcf9ecb
e82abf3ca2ded96bc353e4df47d20380f9d89a78
0
void AutoFillManager::OnInfoBarClosed(bool should_save) { if (should_save) personal_data_->SaveImportedCreditCard(); }
54,432
null
Remote
Not required
Partial
CVE-2016-3078
https://www.cvedetails.com/cve/CVE-2016-3078/
CWE-190
Low
Partial
Partial
null
2016-08-07
7.5
Multiple integer overflows in php_zip.c in the zip extension in PHP before 7.0.6 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted call to (1) getFromIndex or (2) getFromName in the ZipArchive class.
2017-09-06
DoS Overflow
0
https://github.com/php/php-src/commit/3b8d4de300854b3517c7acb239b84f7726c1353c?w=1
3b8d4de300854b3517c7acb239b84f7726c1353c?w=1
Fix bug #71923 - integer overflow in ZipArchive::getFrom*
0
ext/zip/php_zip.c
{"sha": "7c9adf4af780a04b82bdb1facf849d07a60b8576", "filename": "ext/zip/php_zip.c", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/php/php-src/blob/3b8d4de300854b3517c7acb239b84f7726c1353c/ext/zip/php_zip.c", "raw_url": "https://github.com/php/php-src/raw/3b8d4de300...
static zend_object *php_zip_object_new(zend_class_entry *class_type) /* {{{ */ { ze_zip_object *intern; intern = ecalloc(1, sizeof(ze_zip_object) + zend_object_properties_size(class_type)); intern->prop_handler = &zip_prop_handlers; zend_object_std_init(&intern->zo, class_type); object_properties_init(&intern->zo...
static zend_object *php_zip_object_new(zend_class_entry *class_type) /* {{{ */ { ze_zip_object *intern; intern = ecalloc(1, sizeof(ze_zip_object) + zend_object_properties_size(class_type)); intern->prop_handler = &zip_prop_handlers; zend_object_std_init(&intern->zo, class_type); object_properties_init(&intern->zo...
C
null
null
null
@@ -1281,7 +1281,7 @@ static PHP_NAMED_FUNCTION(zif_zip_entry_read) } if (zr_rsrc->zf) { - buffer = zend_string_alloc(len, 0); + buffer = zend_string_safe_alloc(1, len, 0, 0); n = zip_fread(zr_rsrc->zf, ZSTR_VAL(buffer), ZSTR_LEN(buffer)); if (n > 0) { ZSTR_VAL(buffer)[n] = '\0'; @@ -2728,7 +2728,7 @@...
php-src
3b8d4de300854b3517c7acb239b84f7726c1353c?w=1
7133f28df57cef51076d5045b006c5c75c664728
0
static zend_object *php_zip_object_new(zend_class_entry *class_type) /* {{{ */ { ze_zip_object *intern; intern = ecalloc(1, sizeof(ze_zip_object) + zend_object_properties_size(class_type)); intern->prop_handler = &zip_prop_handlers; zend_object_std_init(&intern->zo, class_type); object_properties_init(&intern->zo...
151,915
null
Remote
Not required
Partial
CVE-2017-5019
https://www.cvedetails.com/cve/CVE-2017-5019/
CWE-416
Medium
Partial
Partial
null
2017-02-17
6.8
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
Convert FrameHostMsg_DidAddMessageToConsole to Mojo. Note: Since this required changing the test RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually re-introduced https://crbug.com/666714 locally (the bug the test was added for), and reran the test to confirm that it still covers the bug. Bug: 786836 Ch...
0
content/browser/frame_host/render_frame_host_impl.cc
{"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render...
void RenderFrameHostImpl::CreateWebUsbService( blink::mojom::WebUsbServiceRequest request) { GetContentClient()->browser()->CreateWebUsbService(this, std::move(request)); }
void RenderFrameHostImpl::CreateWebUsbService( blink::mojom::WebUsbServiceRequest request) { GetContentClient()->browser()->CreateWebUsbService(this, std::move(request)); }
C
null
null
null
@@ -1375,8 +1375,6 @@ bool RenderFrameHostImpl::OnMessageReceived(const IPC::Message &msg) { handled = true; IPC_BEGIN_MESSAGE_MAP(RenderFrameHostImpl, msg) - IPC_MESSAGE_HANDLER(FrameHostMsg_DidAddMessageToConsole, - OnDidAddMessageToConsole) IPC_MESSAGE_HANDLER(FrameHostMsg_Deta...
Chrome
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
c246049ec1b28d1af4fe3be886ac5904e1762026
0
void RenderFrameHostImpl::CreateWebUsbService( blink::mojom::WebUsbServiceRequest request) { GetContentClient()->browser()->CreateWebUsbService(this, std::move(request)); }
32,418
null
Local
Not required
null
CVE-2013-1957
https://www.cvedetails.com/cve/CVE-2013-1957/
CWE-264
Medium
Complete
null
null
2013-04-24
4.7
The clone_mnt function in fs/namespace.c in the Linux kernel before 3.8.6 does not properly restrict changes to the MNT_READONLY flag, which allows local users to bypass an intended read-only property of a filesystem by leveraging a separate mount namespace.
2013-04-25
Bypass
0
https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9
132c94e31b8bca8ea921f9f96a57d684fa4ae0a9
vfs: Carefully propogate mounts across user namespaces As a matter of policy MNT_READONLY should not be changable if the original mounter had more privileges than creator of the mount namespace. Add the flag CL_UNPRIVILEGED to note when we are copying a mount from a mount namespace that requires more privileges to a ...
0
fs/namespace.c
{"sha": "968d4c5eae03aa18b1326e09371aa5ada795939e", "filename": "fs/namespace.c", "status": "modified", "additions": 5, "deletions": 1, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9/fs/namespace.c", "raw_url": "https://github.com/torvalds/linux/raw/132c94e31b...
static struct mount *skip_mnt_tree(struct mount *p) { struct list_head *prev = p->mnt_mounts.prev; while (prev != &p->mnt_mounts) { p = list_entry(prev, struct mount, mnt_child); prev = p->mnt_mounts.prev; } return p; }
static struct mount *skip_mnt_tree(struct mount *p) { struct list_head *prev = p->mnt_mounts.prev; while (prev != &p->mnt_mounts) { p = list_entry(prev, struct mount, mnt_child); prev = p->mnt_mounts.prev; } return p; }
C
null
null
null
@@ -798,6 +798,10 @@ static struct mount *clone_mnt(struct mount *old, struct dentry *root, } mnt->mnt.mnt_flags = old->mnt.mnt_flags & ~MNT_WRITE_HOLD; + /* Don't allow unprivileged users to change mount flags */ + if ((flag & CL_UNPRIVILEGED) && (mnt->mnt.mnt_flags & MNT_READONLY)) + mnt->mnt.mnt_flags |= MNT_...
linux
132c94e31b8bca8ea921f9f96a57d684fa4ae0a9
90563b198e4c6674c63672fae1923da467215f45
0
static struct mount *skip_mnt_tree(struct mount *p) { struct list_head *prev = p->mnt_mounts.prev; while (prev != &p->mnt_mounts) { p = list_entry(prev, struct mount, mnt_child); prev = p->mnt_mounts.prev; } return p; }
104,229
null
Remote
Not required
Partial
CVE-2011-2858
https://www.cvedetails.com/cve/CVE-2011-2858/
CWE-119
Low
null
null
null
2011-09-19
5
Google Chrome before 14.0.835.163 does not properly handle triangle arrays, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
2017-09-18
DoS Overflow
0
https://github.com/chromium/chromium/commit/c13e1da62b5f5f0e6fe8c1f769a5a28415415244
c13e1da62b5f5f0e6fe8c1f769a5a28415415244
Revert "Revert 100494 - Fix bug in SimulateAttrib0.""" TEST=none BUG=95625 TBR=apatrick@chromium.org Review URL: http://codereview.chromium.org/7796016 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@100507 0039d316-1c4b-4281-b951-d872f2087c98
0
gpu/command_buffer/service/gles2_cmd_decoder_unittest.cc
{"sha": "10e2a4432c27e5fc6a4a5d1011e8970638198e4d", "filename": "gpu/command_buffer/service/gles2_cmd_decoder.cc", "status": "modified", "additions": 61, "deletions": 24, "changes": 85, "blob_url": "https://github.com/chromium/chromium/blob/c13e1da62b5f5f0e6fe8c1f769a5a28415415244/gpu/command_buffer/service/gles2_cmd_d...
ReadPixelsEmulator(GLsizei width, GLsizei height, GLint bytes_per_pixel, const void* src_pixels, const void* expected_pixels, GLint pack_alignment) : width_(width), height_(height), pack_alignment_(pack_alignment), bytes_per_pixel_(bytes_per_pixe...
ReadPixelsEmulator(GLsizei width, GLsizei height, GLint bytes_per_pixel, const void* src_pixels, const void* expected_pixels, GLint pack_alignment) : width_(width), height_(height), pack_alignment_(pack_alignment), bytes_per_pixel_(bytes_per_pixe...
C
null
null
null
@@ -55,8 +55,17 @@ class GLES2DecoderWithShaderTest : public GLES2DecoderWithShaderTestBase { : GLES2DecoderWithShaderTestBase() { } - void AddExpectationsForSimulatedAttrib0( - GLsizei num_vertices, GLuint buffer_id) { + + void AddExpectationsForSimulatedAttrib0WithError( + GLsizei num_vertices...
Chrome
c13e1da62b5f5f0e6fe8c1f769a5a28415415244
d5ef1b12be4e0492db2af76d7fa18c0994a51e31
0
ReadPixelsEmulator(GLsizei width, GLsizei height, GLint bytes_per_pixel, const void* src_pixels, const void* expected_pixels, GLint pack_alignment) : width_(width), height_(height), pack_alignment_(pack_alignment), bytes_per_pixel_(bytes_per_pixe...
25,796
null
Local
Not required
Complete
CVE-2011-2918
https://www.cvedetails.com/cve/CVE-2011-2918/
CWE-399
Low
null
null
null
2012-05-24
4.9
The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application.
2012-05-29
DoS Overflow
0
https://github.com/torvalds/linux/commit/a8b0ca17b80e92faab46ee7179ba9e99ccb61233
a8b0ca17b80e92faab46ee7179ba9e99ccb61233
perf: Remove the nmi parameter from the swevent and overflow interface The nmi parameter indicated if we could do wakeups from the current context, if not, we would set some state and self-IPI and let the resulting interrupt do the wakeup. For the various event classes: - hardware: nmi=0; PMI is in fact an NMI or ...
0
arch/x86/kernel/cpu/perf_event.c
{"sha": "8e47709160f84962bd6b2744ea6a1a5b9ae49b28", "filename": "arch/alpha/kernel/perf_event.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/a8b0ca17b80e92faab46ee7179ba9e99ccb61233/arch/alpha/kernel/perf_event.c", "raw_url": "https://github.c...
static inline void x86_pmu_read(struct perf_event *event) { x86_perf_event_update(event); }
static inline void x86_pmu_read(struct perf_event *event) { x86_perf_event_update(event); }
C
null
null
null
@@ -1339,7 +1339,7 @@ static int x86_pmu_handle_irq(struct pt_regs *regs) if (!x86_perf_event_set_period(event)) continue; - if (perf_event_overflow(event, 1, &data, regs)) + if (perf_event_overflow(event, &data, regs)) x86_pmu_stop(event, 0); }
linux
a8b0ca17b80e92faab46ee7179ba9e99ccb61233
1880c4ae182afb5650c5678949ecfe7ff66a724e
0
static inline void x86_pmu_read(struct perf_event *event) { x86_perf_event_update(event); }
122,925
null
Remote
Not required
Partial
CVE-2013-0886
https://www.cvedetails.com/cve/CVE-2013-0886/
null
Low
Partial
Partial
null
2013-02-23
7.5
Google Chrome before 25.0.1364.99 on Mac OS X does not properly implement signal handling for Native Client (aka NaCl) code, which has unspecified impact and attack vectors.
2013-04-10
null
0
https://github.com/chromium/chromium/commit/18d67244984a574ba2dd8779faabc0e3e34f4b76
18d67244984a574ba2dd8779faabc0e3e34f4b76
Implement TextureImageTransportSurface using texture mailbox This has a couple of advantages: - allow tearing down and recreating the UI parent context without losing the renderer contexts - do not require a context to be able to generate textures when creating the GLSurfaceHandle - clearer ownership semantics that po...
0
content/browser/renderer_host/render_process_host_impl.cc
{"sha": "0ed9ae5db1a7c0de558f98ad90da03e07b6b640f", "filename": "content/browser/browser_plugin/browser_plugin_guest.cc", "status": "modified", "additions": 0, "deletions": 4, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/18d67244984a574ba2dd8779faabc0e3e34f4b76/content/browser/browser_plugin/bro...
void RenderProcessHostImpl::WidgetRestored() { DCHECK_EQ(backgrounded_, (visible_widgets_ == 0)); visible_widgets_++; SetBackgrounded(false); }
void RenderProcessHostImpl::WidgetRestored() { DCHECK_EQ(backgrounded_, (visible_widgets_ == 0)); visible_widgets_++; SetBackgrounded(false); }
C
null
null
null
@@ -1595,7 +1595,7 @@ void RenderProcessHostImpl::OnCompositorSurfaceBuffersSwappedNoHost( "RenderWidgetHostImpl::OnCompositorSurfaceBuffersSwappedNoHost"); RenderWidgetHostImpl::AcknowledgeBufferPresent(route_id, gpu_process_host_id, - ...
Chrome
18d67244984a574ba2dd8779faabc0e3e34f4b76
64019711f86ff49388846f4459958991afdcf27e
0
void RenderProcessHostImpl::WidgetRestored() { // Verify we were properly backgrounded. DCHECK_EQ(backgrounded_, (visible_widgets_ == 0)); visible_widgets_++; SetBackgrounded(false); }
143,200
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2016-07
null
0
https://github.com/chromium/chromium/commit/8353baf8d1504dbdd4ad7584ff2466de657521cd
8353baf8d1504dbdd4ad7584ff2466de657521cd
Remove WebFrame::canHaveSecureChild To simplify the public API, ServiceWorkerNetworkProvider can do the parent walk itself. Follow-up to https://crrev.com/ad1850962644e19. BUG=607543 Review-Url: https://codereview.chromium.org/2082493002 Cr-Commit-Position: refs/heads/master@{#400896}
0
third_party/WebKit/Source/core/dom/Document.cpp
{"sha": "5c883a0154ddb182d6ad680b5a4c77660f2b373f", "filename": "content/child/service_worker/service_worker_network_provider.cc", "status": "modified", "additions": 15, "deletions": 2, "changes": 17, "blob_url": "https://github.com/chromium/chromium/blob/8353baf8d1504dbdd4ad7584ff2466de657521cd/content/child/service_w...
void Document::hoveredNodeDetached(Element& element) { if (!m_hoverNode) return; m_hoverNode->updateDistribution(); if (element != m_hoverNode && (!m_hoverNode->isTextNode() || element != FlatTreeTraversal::parent(*m_hoverNode))) return; m_hoverNode = FlatTreeTraversal::parent(element)...
void Document::hoveredNodeDetached(Element& element) { if (!m_hoverNode) return; m_hoverNode->updateDistribution(); if (element != m_hoverNode && (!m_hoverNode->isTextNode() || element != FlatTreeTraversal::parent(*m_hoverNode))) return; m_hoverNode = FlatTreeTraversal::parent(element)...
C
null
null
null
@@ -3355,9 +3355,14 @@ bool Document::isSecureContextImpl(const SecureContextCheck privilegeContextChec return true; if (privilegeContextCheck == StandardSecureContextCheck) { - Frame* parent = m_frame ? m_frame->tree().parent() : nullptr; - if (parent && !parent->canHaveSecureChild()) - ...
Chrome
8353baf8d1504dbdd4ad7584ff2466de657521cd
04817566fb446d8315cbc4049266c4859a010a74
0
void Document::hoveredNodeDetached(Element& element) { if (!m_hoverNode) return; m_hoverNode->updateDistribution(); if (element != m_hoverNode && (!m_hoverNode->isTextNode() || element != FlatTreeTraversal::parent(*m_hoverNode))) return; m_hoverNode = FlatTreeTraversal::parent(element)...
34,767
null
Local
Not required
Complete
CVE-2011-3638
https://www.cvedetails.com/cve/CVE-2011-3638/
null
High
null
null
null
2013-03-01
4
fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.
2013-03-04
DoS
0
https://github.com/torvalds/linux/commit/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3
667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3
ext4: reimplement convert and split_unwritten Reimplement ext4_ext_convert_to_initialized() and ext4_split_unwritten_extents() using ext4_split_extent() Signed-off-by: Yongqiang Yang <xiaoqiangnk@gmail.com> Signed-off-by: "Theodore Ts'o" <tytso@mit.edu> Tested-by: Allison Henderson <achender@linux.vnet.ibm.com>
0
fs/ext4/extents.c
{"sha": "e363f21b091bcbac17b84a3bbdee6a6d5d20d65d", "filename": "fs/ext4/extents.c", "status": "modified", "additions": 72, "deletions": 408, "changes": 480, "blob_url": "https://github.com/torvalds/linux/blob/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3/fs/ext4/extents.c", "raw_url": "https://github.com/torvalds/linux/raw...
static inline int ext4_ext_space_root(struct inode *inode, int check) { int size; size = sizeof(EXT4_I(inode)->i_data); size -= sizeof(struct ext4_extent_header); size /= sizeof(struct ext4_extent); if (!check) { #ifdef AGGRESSIVE_TEST if (size > 3) size = 3; #endif } return size; }
static inline int ext4_ext_space_root(struct inode *inode, int check) { int size; size = sizeof(EXT4_I(inode)->i_data); size -= sizeof(struct ext4_extent_header); size /= sizeof(struct ext4_extent); if (!check) { #ifdef AGGRESSIVE_TEST if (size > 3) size = 3; #endif } return size; }
C
null
null
null
@@ -2757,17 +2757,13 @@ static int ext4_ext_convert_to_initialized(handle_t *handle, struct ext4_map_blocks *map, struct ext4_ext_path *path) { - struct ext4_extent *ex, newex, orig_ex; - struct ext4_extent *ex1 = NULL; - struct ext4_extent *ex2 = NULL; - struct ext4_extent *ex3 = NULL; - struct ext4...
linux
667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3
47ea3bb59cf47298b1cbb4d7bef056b3afea0879
0
static inline int ext4_ext_space_root(struct inode *inode, int check) { int size; size = sizeof(EXT4_I(inode)->i_data); size -= sizeof(struct ext4_extent_header); size /= sizeof(struct ext4_extent); if (!check) { #ifdef AGGRESSIVE_TEST if (size > 3) size = 3; #endif } return size; }
56,205
null
Local
Not required
Complete
CVE-2015-8955
https://www.cvedetails.com/cve/CVE-2015-8955/
CWE-264
Medium
Complete
Complete
null
2016-10-10
6.9
arch/arm64/kernel/perf_event.c in the Linux kernel before 4.1 on arm64 platforms allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via vectors involving events that are mishandled during a span of multiple HW PMUs.
2016-11-28
DoS +Priv
0
https://github.com/torvalds/linux/commit/8fff105e13041e49b82f92eef034f363a6b1c071
8fff105e13041e49b82f92eef034f363a6b1c071
arm64: perf: reject groups spanning multiple HW PMUs The perf core implicitly rejects events spanning multiple HW PMUs, as in these cases the event->ctx will differ. However this validation is performed after pmu::event_init() is called in perf_init_event(), and thus pmu::event_init() may be called with a group leader...
0
arch/arm64/kernel/perf_event.c
{"sha": "68a74151fa6cf84002cd3be98a0fc29f67a40b02", "filename": "arch/arm64/kernel/perf_event.c", "status": "modified", "additions": 15, "deletions": 6, "changes": 21, "blob_url": "https://github.com/torvalds/linux/blob/8fff105e13041e49b82f92eef034f363a6b1c071/arch/arm64/kernel/perf_event.c", "raw_url": "https://github...
static inline int armv8pmu_disable_intens(int idx) { u32 counter; if (!armv8pmu_counter_valid(idx)) { pr_err("CPU%u disabling wrong PMNC counter IRQ enable %d\n", smp_processor_id(), idx); return -EINVAL; } counter = ARMV8_IDX_TO_COUNTER(idx); asm volatile("msr pmintenclr_el1, %0" :: "r" (BIT(counter))); ...
static inline int armv8pmu_disable_intens(int idx) { u32 counter; if (!armv8pmu_counter_valid(idx)) { pr_err("CPU%u disabling wrong PMNC counter IRQ enable %d\n", smp_processor_id(), idx); return -EINVAL; } counter = ARMV8_IDX_TO_COUNTER(idx); asm volatile("msr pmintenclr_el1, %0" :: "r" (BIT(counter))); ...
C
null
null
null
@@ -322,22 +322,31 @@ armpmu_add(struct perf_event *event, int flags) } static int -validate_event(struct pmu_hw_events *hw_events, - struct perf_event *event) +validate_event(struct pmu *pmu, struct pmu_hw_events *hw_events, + struct perf_event *event) { - struct arm_pmu *armpmu = to_arm_pmu(event->pmu)...
linux
8fff105e13041e49b82f92eef034f363a6b1c071
4a97abd44329bf7b9c57f020224da5f823c9c9ea
0
static inline int armv8pmu_disable_intens(int idx) { u32 counter; if (!armv8pmu_counter_valid(idx)) { pr_err("CPU%u disabling wrong PMNC counter IRQ enable %d\n", smp_processor_id(), idx); return -EINVAL; } counter = ARMV8_IDX_TO_COUNTER(idx); asm volatile("msr pmintenclr_el1, %0" :: "r" (BIT(counter))); ...
73,852
null
Remote
Not required
Partial
CVE-2016-5735
https://www.cvedetails.com/cve/CVE-2016-5735/
CWE-190
Medium
Partial
Partial
null
2017-05-23
6.8
Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
2017-05-31
Overflow
0
https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285
b7c217680cda02dddced245d237ebe8c383be285
Fix integer overflow in rwpng.h (CVE-2016-5735) Reported by Choi Jaeseung Found with Sparrow (http://ropas.snu.ac.kr/sparrow)
0
rwpng.c
{"sha": "e3f59d11007489f2ad5f9af11d86c1f060f26ca0", "filename": "rwpng.c", "status": "modified", "additions": 6, "deletions": 6, "changes": 12, "blob_url": "https://github.com/kornelski/pngquant/blob/b7c217680cda02dddced245d237ebe8c383be285/rwpng.c", "raw_url": "https://github.com/kornelski/pngquant/raw/b7c217680cda02d...
static void rwpng_free_chunks(struct rwpng_chunk *chunk) { if (!chunk) return; rwpng_free_chunks(chunk->next); free(chunk->data); free(chunk); }
static void rwpng_free_chunks(struct rwpng_chunk *chunk) { if (!chunk) return; rwpng_free_chunks(chunk->next); free(chunk->data); free(chunk); }
C
null
null
null
@@ -244,12 +244,6 @@ static pngquant_error rwpng_read_image24_libpng(FILE *infile, png24_image *mainp png_get_IHDR(png_ptr, info_ptr, &mainprog_ptr->width, &mainprog_ptr->height, &bit_depth, &color_type, NULL, NULL, NULL); - // For overflow safety reject images that won't fit in 32-bit - ...
pngquant
b7c217680cda02dddced245d237ebe8c383be285
350c3a4b0d178daad53fd9fc7213bb94c348dd95
0
static void rwpng_free_chunks(struct rwpng_chunk *chunk) { if (!chunk) return; rwpng_free_chunks(chunk->next); free(chunk->data); free(chunk); }
83,242
null
Local
Not required
Partial
CVE-2018-10124
https://www.cvedetails.com/cve/CVE-2018-10124/
CWE-119
Low
null
null
null
2018-04-16
2.1
The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.
2018-08-24
DoS Overflow
0
https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473
4ea77014af0d6205b05503d1c7aac6eace11d473
kernel/signal.c: avoid undefined behaviour in kill_something_info When running kill(72057458746458112, 0) in userspace I hit the following issue. UBSAN: Undefined behaviour in kernel/signal.c:1462:11 negation of -2147483648 cannot be represented in type 'int': CPU: 226 PID: 9849 Comm: test Tainted: G B ...
0
kernel/signal.c
{"sha": "caed9133ae52733aa96baf74cb4ef3c344832125", "filename": "kernel/signal.c", "status": "modified", "additions": 4, "deletions": 0, "changes": 4, "blob_url": "https://github.com/torvalds/linux/blob/4ea77014af0d6205b05503d1c7aac6eace11d473/kernel/signal.c", "raw_url": "https://github.com/torvalds/linux/raw/4ea77014...
static int sigsuspend(sigset_t *set) { current->saved_sigmask = current->blocked; set_current_blocked(set); while (!signal_pending(current)) { __set_current_state(TASK_INTERRUPTIBLE); schedule(); } set_restore_sigmask(); return -ERESTARTNOHAND; }
static int sigsuspend(sigset_t *set) { current->saved_sigmask = current->blocked; set_current_blocked(set); while (!signal_pending(current)) { __set_current_state(TASK_INTERRUPTIBLE); schedule(); } set_restore_sigmask(); return -ERESTARTNOHAND; }
C
null
null
null
@@ -1402,6 +1402,10 @@ static int kill_something_info(int sig, struct siginfo *info, pid_t pid) return ret; } + /* -INT_MIN is undefined. Exclude this case to avoid a UBSAN warning */ + if (pid == INT_MIN) + return -ESRCH; + read_lock(&tasklist_lock); if (pid != -1) { ret = __kill_pgrp_info(sig, info,
linux
4ea77014af0d6205b05503d1c7aac6eace11d473
67c6777a5d331dda32a4c4a1bf0cac85bdaaaed8
0
static int sigsuspend(sigset_t *set) { current->saved_sigmask = current->blocked; set_current_blocked(set); while (!signal_pending(current)) { __set_current_state(TASK_INTERRUPTIBLE); schedule(); } set_restore_sigmask(); return -ERESTARTNOHAND; }
163,915
null
Remote
Not required
Partial
CVE-2017-15395
https://www.cvedetails.com/cve/CVE-2017-15395/
CWE-416
Medium
null
null
null
2018-02-07
4.3
A use after free in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an ImageCapture NULL pointer dereference.
2018-02-23
null
0
https://github.com/chromium/chromium/commit/84ca1ee18bbc32f3cb035d071e8271e064dfd4d7
84ca1ee18bbc32f3cb035d071e8271e064dfd4d7
Convert MediaTrackConstraints to a ScriptValue IDLDictionaries such as MediaTrackConstraints should not be stored on the heap which would happen when binding one as a parameter to a callback. This change converts the object to a ScriptValue ahead of time. This is fine because the value will be passed to a ScriptPromis...
0
third_party/WebKit/Source/modules/imagecapture/ImageCapture.cpp
{"sha": "cfa6bc543e33e519feeaed6ec885e00d5a49277b", "filename": "third_party/WebKit/LayoutTests/imagecapture/MediaStreamTrack-applyConstraints.html", "status": "modified", "additions": 3, "deletions": 1, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/84ca1ee18bbc32f3cb035d071e8271e064dfd4d7/third_...
ScriptPromise ImageCapture::getPhotoCapabilities(ScriptState* script_state) { ScriptPromiseResolver* resolver = ScriptPromiseResolver::Create(script_state); ScriptPromise promise = resolver->Promise(); if (!service_) { resolver->Reject(DOMException::Create(kNotFoundError, kNoServiceError)); return promis...
ScriptPromise ImageCapture::getPhotoCapabilities(ScriptState* script_state) { ScriptPromiseResolver* resolver = ScriptPromiseResolver::Create(script_state); ScriptPromise promise = resolver->Promise(); if (!service_) { resolver->Reject(DOMException::Create(kNotFoundError, kNoServiceError)); return promis...
C
null
null
null
@@ -541,8 +541,12 @@ void ImageCapture::SetMediaTrackConstraints( MediaTrackConstraints resolver_constraints; resolver_constraints.setAdvanced(constraints_vector); - auto resolver_cb = WTF::Bind(&ImageCapture::ResolveWithMediaTrackConstraints, - WrapPersistent(this), resolver_cons...
Chrome
84ca1ee18bbc32f3cb035d071e8271e064dfd4d7
aba274a9a60f4084e9459113ce2161c258ac71bc
0
ScriptPromise ImageCapture::getPhotoCapabilities(ScriptState* script_state) { ScriptPromiseResolver* resolver = ScriptPromiseResolver::Create(script_state); ScriptPromise promise = resolver->Promise(); if (!service_) { resolver->Reject(DOMException::Create(kNotFoundError, kNoServiceError)); return promis...
146,959
null
Remote
Not required
null
CVE-2017-5118
https://www.cvedetails.com/cve/CVE-2017-5118/
CWE-732
Medium
null
Partial
null
2017-10-27
4.3
Blink in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, failed to correctly propagate CSP restrictions to javascript scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page.
2019-10-02
Bypass
0
https://github.com/chromium/chromium/commit/0ab2412a104d2f235d7b9fe19d30ef605a410832
0ab2412a104d2f235d7b9fe19d30ef605a410832
Inherit CSP when we inherit the security origin This prevents attacks that use main window navigation to get out of the existing csp constraints such as the related bug Bug: 747847 Change-Id: I1e57b50da17f65d38088205b0a3c7c49ef2ae4d8 Reviewed-on: https://chromium-review.googlesource.com/592027 Reviewed-by: Mike West ...
0
third_party/WebKit/Source/core/frame/WebLocalFrameImpl.cpp
{"sha": "21c4fb33ce2d66db750d92a892e3871bd5d9b576", "filename": "third_party/WebKit/LayoutTests/external/wpt/content-security-policy/navigation/javascript-url-navigation-inherits-csp.html", "status": "added", "additions": 16, "deletions": 0, "changes": 16, "blob_url": "https://github.com/chromium/chromium/blob/0ab2412a...
bool WebLocalFrameImpl::DispatchBeforeUnloadEvent(bool is_reload) { if (!GetFrame()) return true; return GetFrame()->Loader().ShouldClose(is_reload); }
bool WebLocalFrameImpl::DispatchBeforeUnloadEvent(bool is_reload) { if (!GetFrame()) return true; return GetFrame()->Loader().ShouldClose(is_reload); }
C
null
null
null
@@ -1818,7 +1818,6 @@ void WebLocalFrameImpl::SetInputEventsScaleForEmulation( void WebLocalFrameImpl::LoadJavaScriptURL(const KURL& url) { DCHECK(GetFrame()); - // This is copied from ScriptController::executeScriptIfJavaScriptURL. // Unfortunately, we cannot just use that method since it is private, and ...
Chrome
0ab2412a104d2f235d7b9fe19d30ef605a410832
fb6b7d43431f6a142d53150d14f441cbf1f3e461
0
bool WebLocalFrameImpl::DispatchBeforeUnloadEvent(bool is_reload) { if (!GetFrame()) return true; return GetFrame()->Loader().ShouldClose(is_reload); }
153,613
null
Remote
Not required
Partial
CVE-2016-5219
https://www.cvedetails.com/cve/CVE-2016-5219/
CWE-416
Medium
Partial
Partial
null
2017-01-19
6.8
A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/a4150b688a754d3d10d2ca385155b1c95d77d6ae
a4150b688a754d3d10d2ca385155b1c95d77d6ae
Add GL_PROGRAM_COMPLETION_QUERY_CHROMIUM This makes the query of GL_COMPLETION_STATUS_KHR to programs much cheaper by minimizing the round-trip to the GPU thread. Bug: 881152, 957001 Change-Id: Iadfa798af29225e752c710ca5c25f50b3dd3101a Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1586630 Com...
0
gpu/command_buffer/client/gles2_implementation.cc
{"sha": "f2c24a308124d59e8d878f4ee2db0bff4e3374a2", "filename": "gpu/GLES2/extensions/CHROMIUM/CHROMIUM_completion_query.txt", "status": "added", "additions": 55, "deletions": 0, "changes": 55, "blob_url": "https://github.com/chromium/chromium/blob/a4150b688a754d3d10d2ca385155b1c95d77d6ae/gpu/GLES2/extensions/CHROMIUM/...
void GLES2Implementation::DeleteRenderbuffersHelper( GLsizei n, const GLuint* renderbuffers) { if (!GetIdHandler(SharedIdNamespaces::kRenderbuffers) ->FreeIds(this, n, renderbuffers, &GLES2Implementation::DeleteRenderbuffersStub)) { SetGLError(GL_INVALID_VALUE, "glDeleteRen...
void GLES2Implementation::DeleteRenderbuffersHelper( GLsizei n, const GLuint* renderbuffers) { if (!GetIdHandler(SharedIdNamespaces::kRenderbuffers) ->FreeIds(this, n, renderbuffers, &GLES2Implementation::DeleteRenderbuffersStub)) { SetGLError(GL_INVALID_VALUE, "glDeleteRen...
C
null
null
null
@@ -6078,6 +6078,7 @@ void GLES2Implementation::BeginQueryEXT(GLenum target, GLuint id) { case GL_LATENCY_QUERY_CHROMIUM: case GL_ASYNC_PIXEL_PACK_COMPLETED_CHROMIUM: case GL_GET_ERROR_QUERY_CHROMIUM: + case GL_PROGRAM_COMPLETION_QUERY_CHROMIUM: break; case GL_READBACK_SHADOW_COPIES_UPDATE...
Chrome
a4150b688a754d3d10d2ca385155b1c95d77d6ae
afa5506de063d1d6fd1a854c825b568337c29bc7
0
void GLES2Implementation::DeleteRenderbuffersHelper( GLsizei n, const GLuint* renderbuffers) { if (!GetIdHandler(SharedIdNamespaces::kRenderbuffers) ->FreeIds(this, n, renderbuffers, &GLES2Implementation::DeleteRenderbuffersStub)) { SetGLError(GL_INVALID_VALUE, "glDeleteRen...
25,173
null
Remote
Not required
Partial
CVE-2011-3188
https://www.cvedetails.com/cve/CVE-2011-3188/
null
Medium
Partial
Partial
null
2012-05-24
6.8
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and ...
2016-08-22
DoS
0
https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
net: Compute protocol sequence numbers and fragment IDs using MD5. Computers have become a lot faster since we compromised on the partial MD4 hash which we use currently for performance reasons. MD5 is a much safer choice, and is inline with both RFC1948 and other ISS generators (OpenBSD, Solaris, etc.) Furthermore,...
0
net/ipv4/route.c
{"sha": "c35a785005b08e132f23447ac31365853b5acd9c", "filename": "drivers/char/random.c", "status": "modified", "additions": 8, "deletions": 341, "changes": 349, "blob_url": "https://github.com/torvalds/linux/blob/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec/drivers/char/random.c", "raw_url": "https://github.com/torvalds/li...
static int rt_garbage_collect(struct dst_ops *ops) { static unsigned long expire = RT_GC_TIMEOUT; static unsigned long last_gc; static int rover; static int equilibrium; struct rtable *rth; struct rtable __rcu **rthp; unsigned long now = jiffies; int goal; int entries = dst_entries_get_fast(&ipv4_dst_ops); /...
static int rt_garbage_collect(struct dst_ops *ops) { static unsigned long expire = RT_GC_TIMEOUT; static unsigned long last_gc; static int rover; static int equilibrium; struct rtable *rth; struct rtable __rcu **rthp; unsigned long now = jiffies; int goal; int entries = dst_entries_get_fast(&ipv4_dst_ops); /...
C
null
null
null
@@ -109,6 +109,7 @@ #include <linux/sysctl.h> #endif #include <net/atmclip.h> +#include <net/secure_seq.h> #define RT_FL_TOS(oldflp4) \ ((u32)(oldflp4->flowi4_tos & (IPTOS_RT_MASK | RTO_ONLINK)))
linux
6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
bc0b96b54a21246e377122d54569eef71cec535f
0
static int rt_garbage_collect(struct dst_ops *ops) { static unsigned long expire = RT_GC_TIMEOUT; static unsigned long last_gc; static int rover; static int equilibrium; struct rtable *rth; struct rtable __rcu **rthp; unsigned long now = jiffies; int goal; int entries = dst_entries_get_fast(&ipv4_dst_ops); /...
10,972
null
Remote
Not required
Partial
CVE-2016-4539
https://www.cvedetails.com/cve/CVE-2016-4539/
CWE-119
Low
Partial
Partial
null
2016-05-21
7.5
The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser l...
2018-10-30
DoS Overflow
0
https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc
dccda88f27a084bcbbb30198ace12b4e7ae961cc
null
0
null
null
PHP_FUNCTION(xml_set_processing_instruction_handler) { xml_parser *parser; zval *pind, **hdl; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rZ", &pind, &hdl) == FAILURE) { return; } ZEND_FETCH_RESOURCE(parser,xml_parser *, &pind, -1, "XML Parser", le_xml_parser); xml_set_handler(&parser->processing...
PHP_FUNCTION(xml_set_processing_instruction_handler) { xml_parser *parser; zval *pind, **hdl; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rZ", &pind, &hdl) == FAILURE) { return; } ZEND_FETCH_RESOURCE(parser,xml_parser *, &pind, -1, "XML Parser", le_xml_parser); xml_set_handler(&parser->processing...
C
null
null
f856734c6789314ce50b19d36d523911ef6c6a79
@@ -283,7 +283,7 @@ xml_encoding xml_encodings[] = { static XML_Memory_Handling_Suite php_xml_mem_hdlrs; /* True globals, no need for thread safety */ -static int le_xml_parser; +static int le_xml_parser; /* }}} */ @@ -343,7 +343,7 @@ PHP_MINIT_FUNCTION(xml) REGISTER_LONG_CONSTANT("XML_OPTION_SKIP_WHI...
php
https://git.php.net/?p=php-src.git;a=blob;f=ext/xml/xml.c;h=5277588813f5a712f2c055a9a20fe2dc1e498e1f;hb=dccda88f27a084bcbbb30198ace12b4e7ae961cc
https://git.php.net/?p=php-src.git;a=blob;f=ext/xml/xml.c;h=84d4253b0fd707e7a47038dca3ea8e675ee0e3f6
0
PHP_FUNCTION(xml_set_processing_instruction_handler) { xml_parser *parser; zval *pind, **hdl; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rZ", &pind, &hdl) == FAILURE) { return; } ZEND_FETCH_RESOURCE(parser,xml_parser *, &pind, -1, "XML Parser", le_xml_parser); xml_set_handler(&parser->processing...
82,977
null
Remote
Not required
Partial
CVE-2018-11363
https://www.cvedetails.com/cve/CVE-2018-11363/
CWE-125
Low
null
null
null
2018-05-22
5
jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read.
2019-10-02
null
0
https://github.com/AndreRenaud/PDFGen/commit/ee58aff6918b8bbc3be29b9e3089485ea46ff956
ee58aff6918b8bbc3be29b9e3089485ea46ff956
jpeg: Fix another possible buffer overrun Found via the clang libfuzzer
0
pdfgen.c
{"sha": "90ce28713cc4d648a92ab59cac2f48286e62dfc2", "filename": "pdfgen.c", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/AndreRenaud/PDFGen/blob/ee58aff6918b8bbc3be29b9e3089485ea46ff956/pdfgen.c", "raw_url": "https://github.com/AndreRenaud/PDFGen/raw/ee58aff6918b8b...
static void flexarray_clear(struct flexarray *flex) { int i; for (i = 0; i < flex->bin_count; i++) free(flex->bins[i]); free(flex->bins); flex->bin_count = 0; flex->item_count = 0; }
static void flexarray_clear(struct flexarray *flex) { int i; for (i = 0; i < flex->bin_count; i++) free(flex->bins[i]); free(flex->bins); flex->bin_count = 0; flex->item_count = 0; }
C
null
null
null
@@ -2036,7 +2036,8 @@ static int jpeg_size(unsigned char* data, unsigned int data_size, return 0; } i+=2; - block_length = data[i] * 256 + data[i+1]; + if (i + 1 < data_size) + block_length = data[i] * 256 + data[i+1...
PDFGen
ee58aff6918b8bbc3be29b9e3089485ea46ff956
5f5909763333c205d9392612cabc9dc55854ecae
0
static void flexarray_clear(struct flexarray *flex) { int i; for (i = 0; i < flex->bin_count; i++) free(flex->bins[i]); free(flex->bins); flex->bin_count = 0; flex->item_count = 0; }
108,588
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2012-12
null
0
https://github.com/chromium/chromium/commit/c975c78878fff68e82333f599882a7f73cb721ea
c975c78878fff68e82333f599882a7f73cb721ea
Initialize renderer color preferences to reasonable defaults. BUG=158422 TEST=as in bug Review URL: https://chromiumcodereview.appspot.com/11365096 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@166146 0039d316-1c4b-4281-b951-d872f2087c98
0
content/shell/shell_gtk.cc
{"sha": "2ee7cc18de4a3260ea6ad55b0de5c59061b8816f", "filename": "content/public/common/renderer_preferences.cc", "status": "modified", "additions": 10, "deletions": 8, "changes": 18, "blob_url": "https://github.com/chromium/chromium/blob/c975c78878fff68e82333f599882a7f73cb721ea/content/public/common/renderer_preference...
void Shell::OnBackButtonClicked(GtkWidget* widget) { GoBackOrForward(-1); }
void Shell::OnBackButtonClicked(GtkWidget* widget) { GoBackOrForward(-1); }
C
null
null
null
@@ -17,7 +17,6 @@ #include "content/public/common/renderer_preferences.h" #include "content/shell/shell_browser_context.h" #include "content/shell/shell_content_browser_client.h" -#include "third_party/skia/include/core/SkColor.h" namespace content { @@ -190,20 +189,6 @@ void Shell::PlatformCreateWindow(int wid...
Chrome
c975c78878fff68e82333f599882a7f73cb721ea
d8b49361b62e00480d9a19521d27b2c5dd607352
0
void Shell::OnBackButtonClicked(GtkWidget* widget) { GoBackOrForward(-1); }
75,654
null
Remote
Not required
Partial
CVE-2018-19840
https://www.cvedetails.com/cve/CVE-2018-19840/
CWE-835
Medium
null
null
null
2018-12-04
4.3
The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.
2019-10-02
null
0
https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51
070ef6f138956d9ea9612e69586152339dbefe51
issue #53: error out on zero sample rate
0
src/pack_utils.c
{"sha": "2a834978a9166cfbd1c7a0ab734ca75ed8d7c66d", "filename": "src/pack_utils.c", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/dbry/WavPack/blob/070ef6f138956d9ea9612e69586152339dbefe51/src/pack_utils.c", "raw_url": "https://github.com/dbry/WavPack/raw/070ef6f138...
static char *write_metadata (WavpackMetadata *wpmd, char *outdata) { unsigned char id = wpmd->id, wordlen [3]; wordlen [0] = (wpmd->byte_length + 1) >> 1; wordlen [1] = (wpmd->byte_length + 1) >> 9; wordlen [2] = (wpmd->byte_length + 1) >> 17; if (wpmd->byte_length & 1) id |= ID_ODD_SIZE; ...
static char *write_metadata (WavpackMetadata *wpmd, char *outdata) { unsigned char id = wpmd->id, wordlen [3]; wordlen [0] = (wpmd->byte_length + 1) >> 1; wordlen [1] = (wpmd->byte_length + 1) >> 9; wordlen [2] = (wpmd->byte_length + 1) >> 17; if (wpmd->byte_length & 1) id |= ID_ODD_SIZE; ...
C
null
null
null
@@ -195,6 +195,11 @@ int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64 int num_chans = config->num_channels; int i; + if (!config->sample_rate) { + strcpy (wpc->error_message, "sample rate cannot be zero!"); + return FALSE; + } + wpc->stream_version = ...
WavPack
070ef6f138956d9ea9612e69586152339dbefe51
e731cea83d52cccb4d3cde4f6503b22ba145de21
0
static char *write_metadata (WavpackMetadata *wpmd, char *outdata) { unsigned char id = wpmd->id, wordlen [3]; wordlen [0] = (wpmd->byte_length + 1) >> 1; wordlen [1] = (wpmd->byte_length + 1) >> 9; wordlen [2] = (wpmd->byte_length + 1) >> 17; if (wpmd->byte_length & 1) id |= ID_ODD_SIZE; ...
54,273
null
Local
Not required
Complete
CVE-2016-3134
https://www.cvedetails.com/cve/CVE-2016-3134/
CWE-119
Low
Complete
Complete
null
2016-04-27
7.2
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
2018-01-04
DoS Overflow +Priv Mem. Corr.
0
https://github.com/torvalds/linux/commit/54d83fc74aa9ec72794373cb47432c5f7fb1a309
54d83fc74aa9ec72794373cb47432c5f7fb1a309
netfilter: x_tables: fix unconditional helper Ben Hawkes says: In the mark_source_chains function (net/ipv4/netfilter/ip_tables.c) it is possible for a user-supplied ipt_entry structure to have a large next_offset field. This field is not bounds checked prior to writing a counter value at the supplied offset. Pr...
0
net/ipv4/netfilter/arp_tables.c
{"sha": "a1bb5e7129a2fe94b09273e283ccf27962db8e7e", "filename": "net/ipv4/netfilter/arp_tables.c", "status": "modified", "additions": 9, "deletions": 9, "changes": 18, "blob_url": "https://github.com/torvalds/linux/blob/54d83fc74aa9ec72794373cb47432c5f7fb1a309/net/ipv4/netfilter/arp_tables.c", "raw_url": "https://githu...
check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) { struct xt_entry_target...
check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) { struct xt_entry_target...
C
null
null
null
@@ -359,11 +359,12 @@ unsigned int arpt_do_table(struct sk_buff *skb, } /* All zeroes == unconditional rule. */ -static inline bool unconditional(const struct arpt_arp *arp) +static inline bool unconditional(const struct arpt_entry *e) { static const struct arpt_arp uncond; - return memcmp(arp, &uncond, sizeof...
linux
54d83fc74aa9ec72794373cb47432c5f7fb1a309
6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91
0
check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) { struct xt_entry_target...
153,131
null
Remote
Not required
Partial
CVE-2016-5216
https://www.cvedetails.com/cve/CVE-2016-5216/
CWE-416
Medium
Partial
Partial
null
2017-01-19
6.8
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/bf6a6765d44b09c64b8c75d749efb84742a250e7
bf6a6765d44b09c64b8c75d749efb84742a250e7
[pdf] Defer page unloading in JS callback. One of the callbacks from PDFium JavaScript into the embedder is to get the current page number. In Chromium, this will trigger a call to CalculateMostVisiblePage that method will determine the visible pages and unload any non-visible pages. But, if the originating JS is on a...
0
pdf/pdfium/pdfium_engine.cc
{"sha": "878ee20a7c325e6ac076a520d5db86af9c4b9ba4", "filename": "pdf/pdfium/pdfium_engine.cc", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/chromium/chromium/blob/bf6a6765d44b09c64b8c75d749efb84742a250e7/pdf/pdfium/pdfium_engine.cc", "raw_url": "https://github.com/...
void Unsupported_Handler(UNSUPPORT_INFO*, int type) { if (!g_engine_for_unsupported) { NOTREACHED(); return; } g_engine_for_unsupported->UnsupportedFeature(type); }
void Unsupported_Handler(UNSUPPORT_INFO*, int type) { if (!g_engine_for_unsupported) { NOTREACHED(); return; } g_engine_for_unsupported->UnsupportedFeature(type); }
C
null
null
null
@@ -2287,7 +2287,13 @@ int PDFiumEngine::GetMostVisiblePage() { if (in_flight_visible_page_) return *in_flight_visible_page_; + // We can call GetMostVisiblePage through a callback from PDFium. We have + // to defer the page deletion otherwise we could potentially delete the page + // that originated the c...
Chrome
bf6a6765d44b09c64b8c75d749efb84742a250e7
d62b0ef3d51e6c96e3bb960c1a4fa395082dccf9
0
void Unsupported_Handler(UNSUPPORT_INFO*, int type) { if (!g_engine_for_unsupported) { NOTREACHED(); return; } g_engine_for_unsupported->UnsupportedFeature(type); }
95,582
null
Remote
Not required
Complete
CVE-2017-6903
https://www.cvedetails.com/cve/CVE-2017-6903/
CWE-269
Medium
Complete
Complete
null
2017-03-14
9.3
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
2019-10-02
null
0
https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998
11a83410153756ae350a82ed41b08d128ff7f998
All: Merge some file writing extension checks
0
MP/code/client/cl_console.c
{"sha": "dad42d9e4db1631e1415473a2d5cb7f24678232d", "filename": "MP/code/client/cl_console.c", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/iortcw/iortcw/blob/11a83410153756ae350a82ed41b08d128ff7f998/MP/code/client/cl_console.c", "raw_url": "https://github.com/iort...
void Con_RunConsole( void ) { if ( Key_GetCatcher( ) & KEYCATCH_CONSOLE ) { con.finalFrac = 0.5; // half screen } else { con.finalFrac = 0; // none visible } if ( con.finalFrac < con.displayFrac ) { con.displayFrac -= con_conspeed->value * cls.realFrametime * 0.001; if ( con.finalFrac >...
void Con_RunConsole( void ) { if ( Key_GetCatcher( ) & KEYCATCH_CONSOLE ) { con.finalFrac = 0.5; // half screen } else { con.finalFrac = 0; // none visible } if ( con.finalFrac < con.displayFrac ) { con.displayFrac -= con_conspeed->value * cls.realFrametime * 0.001; if ( con.finalFrac >...
C
null
null
null
@@ -227,6 +227,12 @@ void Con_Dump_f( void ) { Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) ); COM_DefaultExtension( filename, sizeof( filename ), ".txt" ); + if (!COM_CompareExtension(filename, ".txt")) + { + Com_Printf("Con_Dump_f: Only the \".txt\" extension is supported by this command!\n"); + re...
OpenJK
11a83410153756ae350a82ed41b08d128ff7f998
b248763e4878ef12d5835ece6600be8334f67da1
0
void Con_RunConsole( void ) { // decide on the destination height of the console if ( Key_GetCatcher( ) & KEYCATCH_CONSOLE ) { con.finalFrac = 0.5; // half screen } else { con.finalFrac = 0; // none visible } // scroll towards the destination height if ( con.finalFrac < con.displayFrac ) ...
95,073
null
Local
Not required
null
CVE-2017-1000249
https://www.cvedetails.com/cve/CVE-2017-1000249/
CWE-119
Low
null
Partial
null
2017-09-11
2.1
An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
2017-11-07
Overflow
0
https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d
9611f31313a93aa036389c5f3b15eea53510d4d
Extend build-id reporting to 8-byte IDs that lld can generate (Ed Maste)
0
src/readelf.c
{"sha": "c76a0accf8525280c7d7cf2006c0b5699a5cad23", "filename": "src/readelf.c", "status": "modified", "additions": 18, "deletions": 4, "changes": 22, "blob_url": "https://github.com/file/file/blob/9611f31313a93aa036389c5f3b15eea53510d4d1/src/readelf.c", "raw_url": "https://github.com/file/file/raw/9611f31313a93aa03638...
dophn_exec(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num, size_t size, off_t fsize, int sh_num, int *flags, uint16_t *notecount) { Elf32_Phdr ph32; Elf64_Phdr ph64; const char *linking_style = "statically"; const char *interp = ""; unsigned char nbuf[BUFSIZ]; char ibuf[BUFSIZ]; ss...
dophn_exec(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num, size_t size, off_t fsize, int sh_num, int *flags, uint16_t *notecount) { Elf32_Phdr ph32; Elf64_Phdr ph64; const char *linking_style = "statically"; const char *interp = ""; unsigned char nbuf[BUFSIZ]; char ibuf[BUFSIZ]; ss...
C
null
null
null
@@ -27,7 +27,7 @@ #include "file.h" #ifndef lint -FILE_RCSID("@(#)$File: readelf.c,v 1.126 2015/11/16 16:03:45 christos Exp $") +FILE_RCSID("@(#)$File: readelf.c,v 1.127 2015/11/18 12:29:29 christos Exp $") #endif #ifdef BUILTIN_ELF @@ -509,12 +509,26 @@ do_bid_note(struct magic_set *ms, unsigned char *nbuf, ui...
file
9611f31313a93aa036389c5f3b15eea53510d4d
5b8826616cb699b69f7a1cc7b5c0cbac4b5bed9b
0
dophn_exec(struct magic_set *ms, int clazz, int swap, int fd, off_t off, int num, size_t size, off_t fsize, int sh_num, int *flags, uint16_t *notecount) { Elf32_Phdr ph32; Elf64_Phdr ph64; const char *linking_style = "statically"; const char *interp = ""; unsigned char nbuf[BUFSIZ]; char ibuf[BUFSIZ]; ss...
142,686
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2016-07
null
0
https://github.com/chromium/chromium/commit/be655fd4fb9ab3291a855a939496111674037a2f
be655fd4fb9ab3291a855a939496111674037a2f
Always use FrameNavigationDisabler during DocumentLoader detach. BUG=617495 Review-Url: https://codereview.chromium.org/2079473002 Cr-Commit-Position: refs/heads/master@{#400558}
0
third_party/WebKit/Source/core/loader/FrameLoader.cpp
{"sha": "4f8c4d0a9cb3e3ed7f94be0bad612c82b8b0cdd3", "filename": "third_party/WebKit/Source/core/loader/FrameLoader.cpp", "status": "modified", "additions": 2, "deletions": 5, "changes": 7, "blob_url": "https://github.com/chromium/chromium/blob/be655fd4fb9ab3291a855a939496111674037a2f/third_party/WebKit/Source/core/load...
void FrameLoader::finishedParsing() { if (m_stateMachine.creatingInitialEmptyDocument()) return; m_progressTracker->finishedParsing(); if (client()) { ScriptForbiddenScope forbidScripts; client()->dispatchDidFinishDocumentLoad(); } if (client()) client()->runScript...
void FrameLoader::finishedParsing() { if (m_stateMachine.creatingInitialEmptyDocument()) return; m_progressTracker->finishedParsing(); if (client()) { ScriptForbiddenScope forbidScripts; client()->dispatchDidFinishDocumentLoad(); } if (client()) client()->runScript...
C
null
null
null
@@ -725,6 +725,7 @@ void FrameLoader::detachDocumentLoader(Member<DocumentLoader>& loader) if (!loader) return; + FrameNavigationDisabler navigationDisabler(*m_frame); loader->detachFromFrame(); loader = nullptr; } @@ -1113,7 +1114,6 @@ bool FrameLoader::prepareForCommit() // At this ...
Chrome
be655fd4fb9ab3291a855a939496111674037a2f
23024078fb2e07f6852031e76f08712bcd6303f0
0
void FrameLoader::finishedParsing() { if (m_stateMachine.creatingInitialEmptyDocument()) return; m_progressTracker->finishedParsing(); if (client()) { ScriptForbiddenScope forbidScripts; client()->dispatchDidFinishDocumentLoad(); } if (client()) client()->runScript...
149
null
Remote
Not required
Partial
CVE-2013-6420
https://www.cvedetails.com/cve/CVE-2013-6420/
CWE-119
Low
Partial
Partial
null
2013-12-16
7.5
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi...
2018-10-30
DoS Exec Code Overflow Mem. Corr.
0
https://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415
c1224573c773b6845e83505f717fbf820fc18415
null
0
null
null
static STACK_OF(X509) * php_array_to_X509_sk(zval ** zcerts TSRMLS_DC) /* {{{ */ { HashPosition hpos; zval ** zcertval; STACK_OF(X509) * sk = NULL; X509 * cert; long certresource; sk = sk_X509_new_null(); /* get certs */ if (Z_TYPE_PP(zcerts) == IS_ARRAY) { zend_hash_internal_pointer_reset_ex(HASH_OF(...
static STACK_OF(X509) * php_array_to_X509_sk(zval ** zcerts TSRMLS_DC) /* {{{ */ { HashPosition hpos; zval ** zcertval; STACK_OF(X509) * sk = NULL; X509 * cert; long certresource; sk = sk_X509_new_null(); /* get certs */ if (Z_TYPE_PP(zcerts) == IS_ARRAY) { zend_hash_internal_pointer_reset_ex(HASH_OF(...
C
null
null
32873cd0ddea7df8062213bb025beb6fb070e59d
@@ -644,18 +644,28 @@ static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */ char * thestr; long gmadjust = 0; - if (timestr->length < 13) { - php_error_docref(NULL TSRMLS_CC, E_WARNING, "extension author too lazy to parse %s correctly", timestr->data); + ...
php
https://git.php.net/?p=php-src.git;a=blob;f=ext/openssl/openssl.c;h=0d2d6442df1a25f7125d0f3dc9037188b825917f;hb=0d2d6442df1a25f7125d0f3dc9037188b825917f
https://git.php.net/?p=php-src.git;a=blob;f=ext/openssl/openssl.c;h=e7672e4a34c0169d4f333350e1696004b92bba8b;hb=e7672e4a34c0169d4f333350e1696004b92bba8b
0
static STACK_OF(X509) * php_array_to_X509_sk(zval ** zcerts TSRMLS_DC) /* {{{ */ { HashPosition hpos; zval ** zcertval; STACK_OF(X509) * sk = NULL; X509 * cert; long certresource; sk = sk_X509_new_null(); /* get certs */ if (Z_TYPE_PP(zcerts) == IS_ARRAY) { zend_hash_internal_pointer_reset_ex(HASH_OF(...
136,328
null
Remote
Not required
Complete
CVE-2015-6787
https://www.cvedetails.com/cve/CVE-2015-6787/
null
Low
Complete
Complete
null
2015-12-05
10
Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
2017-09-13
DoS
0
https://github.com/chromium/chromium/commit/f911e11e7f6b5c0d6f5ee694a9871de6619889f7
f911e11e7f6b5c0d6f5ee694a9871de6619889f7
Reland "[CI] Make paint property nodes non-ref-counted" This reverts commit 887383b30842d9d9006e11bb6932660a3cb5b1b7. Reason for revert: Retry in M69. Original change's description: > Revert "[CI] Make paint property nodes non-ref-counted" > > This reverts commit 70fc0b018c9517558b7aa2be00edf2debb449123. > > Reason ...
0
third_party/blink/renderer/core/paint/paint_property_tree_builder.cc
{"sha": "6da131da4ecafb786c67365ccc6cd446111933b4", "filename": "third_party/blink/renderer/core/paint/block_painter.cc", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f911e11e7f6b5c0d6f5ee694a9871de6619889f7/third_party/blink/renderer/core/pa...
void FragmentPaintPropertyTreeBuilder::UpdateForChildren() { #if DCHECK_IS_ON() FindObjectPropertiesNeedingUpdateScope check_needs_update_scope( object_, fragment_data_, full_context_.force_subtree_update); #endif if (properties_) { UpdateInnerBorderRadiusClip(); UpdateOverflowClip(); UpdatePersp...
void FragmentPaintPropertyTreeBuilder::UpdateForChildren() { #if DCHECK_IS_ON() FindObjectPropertiesNeedingUpdateScope check_needs_update_scope( object_, fragment_data_, full_context_.force_subtree_update); #endif if (properties_) { UpdateInnerBorderRadiusClip(); UpdateOverflowClip(); UpdatePersp...
C
null
null
null
@@ -39,13 +39,13 @@ namespace blink { PaintPropertyTreeBuilderFragmentContext:: PaintPropertyTreeBuilderFragmentContext() - : current_effect(EffectPaintPropertyNode::Root()) { + : current_effect(&EffectPaintPropertyNode::Root()) { current.clip = absolute_position.clip = fixed_position.clip = - Cli...
Chrome
f911e11e7f6b5c0d6f5ee694a9871de6619889f7
95f5260501ac2660f29fb98ab5cb351a956c1dab
0
void FragmentPaintPropertyTreeBuilder::UpdateForChildren() { #if DCHECK_IS_ON() FindObjectPropertiesNeedingUpdateScope check_needs_update_scope( object_, fragment_data_, full_context_.force_subtree_update); #endif if (properties_) { UpdateInnerBorderRadiusClip(); UpdateOverflowClip(); UpdatePersp...
130,265
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2014-04
null
0
https://github.com/chromium/chromium/commit/e93dc535728da259ec16d1c3cc393f80b25f64ae
e93dc535728da259ec16d1c3cc393f80b25f64ae
Add a unit test that filenames aren't unintentionally converted to URLs. Also fixes two issues in OSExchangeDataProviderWin: - It used a disjoint set of clipboard formats when handling GetUrl(..., true /* filename conversion */) vs GetFilenames(...), so the actual returned results would vary depending on which one...
0
ui/base/dragdrop/os_exchange_data_provider_win.cc
{"sha": "185ccbd5f0cf017960df480e9f2d5f855f01294b", "filename": "base/win/scoped_hglobal.h", "status": "modified", "additions": 6, "deletions": 6, "changes": 12, "blob_url": "https://github.com/chromium/chromium/blob/e93dc535728da259ec16d1c3cc393f80b25f64ae/base/win/scoped_hglobal.h", "raw_url": "https://github.com/chr...
IDataObject* OSExchangeDataProviderWin::GetIDataObject( const OSExchangeData& data) { return static_cast<const OSExchangeDataProviderWin*>(&data.provider())-> data_object(); }
IDataObject* OSExchangeDataProviderWin::GetIDataObject( const OSExchangeData& data) { return static_cast<const OSExchangeDataProviderWin*>(&data.provider())-> data_object(); }
C
null
null
null
@@ -411,15 +411,12 @@ bool OSExchangeDataProviderWin::GetURLAndTitle( base::string16 url_str; bool success = ClipboardUtil::GetUrl( source_object_, - &url_str, + url, title, policy == OSExchangeData::CONVERT_FILENAMES ? true : false); if (success) { - GURL test_url(url_str); -...
Chrome
e93dc535728da259ec16d1c3cc393f80b25f64ae
4ad0ec9fd3292e1ca9dbf54dee9587dcb49caa70
0
IDataObject* OSExchangeDataProviderWin::GetIDataObject( const OSExchangeData& data) { return static_cast<const OSExchangeDataProviderWin*>(&data.provider())-> data_object(); }
183,124
null
Remote
Not required
null
CVE-2016-5842
https://www.cvedetails.com/cve/CVE-2016-5842/
CWE-125
Low
Partial
null
null
2016-12-13
5
MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read.
2017-06-30
+Info
6
https://github.com/ImageMagick/ImageMagick/commit/d8ab7f046587f2e9f734b687ba7e6e10147c294b
d8ab7f046587f2e9f734b687ba7e6e10147c294b
Improve checking of EXIF profile to prevent integer overflow (bug report from Ibrahim el-sayed)
6
MagickCore/property.c
{"sha": "51d887902b49d1d216ffe8a4ca463a0046babd48", "filename": "MagickCore/profile.c", "status": "modified", "additions": 29, "deletions": 18, "changes": 47, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/d8ab7f046587f2e9f734b687ba7e6e10147c294b/MagickCore/profile.c", "raw_url": "https://github.com/Image...
static inline signed int ReadPropertyMSBLong(const unsigned char **p, size_t *length) { union { unsigned int unsigned_value; signed int signed_value; } quantum; int c; register ssize_t i; unsigned char buffer[4]; unsigned int value; if (*length < 4) ...
static inline signed int ReadPropertyMSBLong(const unsigned char **p, size_t *length) { union { unsigned int unsigned_value; signed int signed_value; } quantum; int c; register ssize_t i; unsigned char buffer[4]; size_t value; if (*length < 4) return...
C
unsigned int value=(unsigned int) buffer[0] << 24; value|=(unsigned int) buffer[1] << 16; value|=(unsigned int) buffer[2] << 8; value|=(unsigned int) buffer[3]; quantum.unsigned_value=value & 0xffffffff;
size_t value=(size_t) (buffer[0] << 24); value|=buffer[1] << 16; value|=buffer[2] << 8; value|=buffer[3]; quantum.unsigned_value=(value & 0xffffffff);
null
@@ -520,7 +520,7 @@ static inline signed int ReadPropertyMSBLong(const unsigned char **p, unsigned char buffer[4]; - size_t + unsigned int value; if (*length < 4) @@ -531,11 +531,11 @@ static inline signed int ReadPropertyMSBLong(const unsigned char **p, (*length)--; buffer[i]=(unsigned ...
ImageMagick
d8ab7f046587f2e9f734b687ba7e6e10147c294b
f0ae4ef12c8f73b05afe55f79e1429717c1deb58
1
static inline signed int ReadPropertyMSBLong(const unsigned char **p, size_t *length) { union { unsigned int unsigned_value; signed int signed_value; } quantum; int c; register ssize_t i; unsigned char buffer[4]; //flaw_line_below: size_t //fix_flaw_line_below: //...
79,590
null
Remote
Not required
Partial
CVE-2018-14357
https://www.cvedetails.com/cve/CVE-2018-14357/
CWE-77
Low
Partial
Partial
null
2018-07-17
7.5
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.
2019-10-02
Exec Code
0
https://github.com/neomutt/neomutt/commit/e52393740334443ae0206cab2d7caef381646725
e52393740334443ae0206cab2d7caef381646725
quote imap strings more carefully Co-authored-by: JerikoOne <jeriko.one@gmx.us>
0
imap/imap.c
{"sha": "0f4445b4532660e17f18a935fdacd4f492438dcf", "filename": "imap/auth_login.c", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/neomutt/neomutt/blob/e52393740334443ae0206cab2d7caef381646725/imap/auth_login.c", "raw_url": "https://github.com/neomutt/neomutt/raw/e5...
int imap_fast_trash(struct Context *ctx, char *dest) { char mbox[LONG_STRING]; char mmbox[LONG_STRING]; char prompt[LONG_STRING]; int rc; struct ImapMbox mx; bool triedcreate = false; struct Buffer *sync_cmd = NULL; int err_continue = MUTT_NO; struct ImapData *idata = ctx->data; if (imap_parse_pat...
int imap_fast_trash(struct Context *ctx, char *dest) { char mbox[LONG_STRING]; char mmbox[LONG_STRING]; char prompt[LONG_STRING]; int rc; struct ImapMbox mx; bool triedcreate = false; struct Buffer *sync_cmd = NULL; int err_continue = MUTT_NO; struct ImapData *idata = ctx->data; if (imap_parse_pat...
C
null
null
null
@@ -464,25 +464,25 @@ static int compile_search(struct Context *ctx, const struct Pattern *pat, struct return -1; } *delim = '\0'; - imap_quote_string(term, sizeof(term), pat->p.str); + imap_quote_string(term, sizeof(term), pat->p.str, false); mutt_buffer_addstr(buf, ...
neomutt
e52393740334443ae0206cab2d7caef381646725
9bfab35522301794483f8f9ed60820bdec9be59e
0
int imap_fast_trash(struct Context *ctx, char *dest) { char mbox[LONG_STRING]; char mmbox[LONG_STRING]; char prompt[LONG_STRING]; int rc; struct ImapMbox mx; bool triedcreate = false; struct Buffer *sync_cmd = NULL; int err_continue = MUTT_NO; struct ImapData *idata = ctx->data; if (imap_parse_pat...
16,240
null
Local
Not required
Partial
CVE-2011-4930
https://www.cvedetails.com/cve/CVE-2011-4930/
CWE-134
Medium
Partial
Partial
null
2014-02-10
4.4
Multiple format string vulnerabilities in Condor 7.2.0 through 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to launch jobs) and possibly execute arbitrary code via format string speci...
2014-02-10
DoS Exec Code
0
https://htcondor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867
5e5571d1a431eb3c61977b6dd6ec90186ef79867
null
0
null
null
GahpClient::~GahpClient() { clear_pending(); if ( normal_proxy != NULL ) { server->UnregisterProxy( normal_proxy->proxy ); } if ( deleg_proxy != NULL ) { server->UnregisterProxy( deleg_proxy->proxy ); } server->RemoveGahpClient(); }
GahpClient::~GahpClient() { clear_pending(); if ( normal_proxy != NULL ) { server->UnregisterProxy( normal_proxy->proxy ); } if ( deleg_proxy != NULL ) { server->UnregisterProxy( deleg_proxy->proxy ); } server->RemoveGahpClient(); }
CPP
null
null
9f2e09401a1a262e1b00ac3bf8cd3f0d79aa876c
@@ -321,10 +321,10 @@ GahpServer::Reaper(Service *,int pid,int status) if ( dead_server ) { sprintf_cat( buf, " unexpectedly" ); - EXCEPT( buf.c_str() ); + EXCEPT( "%s", buf.c_str() ); } else { sprintf_cat( buf, "\n" ); - dprint...
htcondor
https://htcondor-git.cs.wisc.edu/?p=condor.git;a=blob;f=src/condor_gridmanager/gahp-client.cpp;h=8c6c3fd59255c36477bdcb561a2986bdb238f96e;hb=5e5571d1a431eb3c61977b6dd6ec90186ef79867
https://htcondor-git.cs.wisc.edu/?p=condor.git;a=blob;f=src/condor_gridmanager/gahp-client.cpp;h=2e83bb81610fc0412b176e650b8d31f8b657fa6e
0
GahpClient::~GahpClient() { // call clear_pending to remove this object from hash table, // and deallocate any memory associated w/ a pending command. clear_pending(); if ( normal_proxy != NULL ) { server->UnregisterProxy( normal_proxy->proxy ); } if ( deleg_proxy != NULL ) { server->UnregisterProxy( deleg_...
95,870
null
Remote
Not required
Complete
CVE-2017-6903
https://www.cvedetails.com/cve/CVE-2017-6903/
CWE-269
Medium
Complete
Complete
null
2017-03-14
9.3
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
2019-10-02
null
0
https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20
b6ff2bcb1e4e6976d61e316175c6d7c99860fe20
All: Don't load .pk3s as .dlls, and don't load user config files from .pk3s
0
MP/code/sys/sys_main.c
{"sha": "92675c53d7d8d4e2072a5423e471fb48daeec2c6", "filename": "MP/code/client/cl_main.c", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/iortcw/iortcw/blob/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20/MP/code/client/cl_main.c", "raw_url": "https://github.com/iortcw/ior...
int main( int argc, char **argv ) { int i; char commandLine[ MAX_STRING_CHARS ] = { 0 }; #ifndef DEDICATED # if !SDL_VERSION_ATLEAST(MINSDL_MAJOR,MINSDL_MINOR,MINSDL_PATCH) # error A more recent version of SDL is required # endif SDL_version ver; SDL_GetVersion( &ver ); #define MINSDL_VERSION \ XSTRING(MIN...
int main( int argc, char **argv ) { int i; char commandLine[ MAX_STRING_CHARS ] = { 0 }; #ifndef DEDICATED # if !SDL_VERSION_ATLEAST(MINSDL_MAJOR,MINSDL_MINOR,MINSDL_PATCH) # error A more recent version of SDL is required # endif SDL_version ver; SDL_GetVersion( &ver ); #define MINSDL_VERSION \ XSTRING(MIN...
C
null
null
null
@@ -499,6 +499,13 @@ from executable path, then fs_basepath. void *Sys_LoadDll(const char *name, qboolean useSystemLib) { void *dllhandle; + + // Don't load any DLLs that end with the pk3 extension + if (COM_CompareExtension(name, ".pk3")) + { + Com_Printf("Rejecting DLL named \"%s\"", name); + return NULL; + } ...
OpenJK
b6ff2bcb1e4e6976d61e316175c6d7c99860fe20
1efb19a25feace6de9b103fa3fe334fa1901b495
0
int main( int argc, char **argv ) { int i; char commandLine[ MAX_STRING_CHARS ] = { 0 }; #ifndef DEDICATED // SDL version check // Compile time # if !SDL_VERSION_ATLEAST(MINSDL_MAJOR,MINSDL_MINOR,MINSDL_PATCH) # error A more recent version of SDL is required # endif // Run time SDL_version ver; SDL_GetVer...
131,958
null
Remote
Not required
Partial
CVE-2014-1713
https://www.cvedetails.com/cve/CVE-2014-1713/
CWE-399
Low
Partial
Partial
null
2014-03-16
7.5
Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact ...
2017-01-06
DoS
0
https://github.com/chromium/chromium/commit/f85a87ec670ad0fce9d98d90c9a705b72a288154
f85a87ec670ad0fce9d98d90c9a705b72a288154
document.location bindings fix BUG=352374 R=jochen@chromium.org Review URL: https://codereview.chromium.org/196343011 git-svn-id: svn://svn.chromium.org/blink/trunk@169176 bbb929c8-8fbe-4397-9dbb-9b2b20218538
0
third_party/WebKit/Source/bindings/tests/results/V8TestObjectPython.cpp
{"sha": "b82e2fe8129793c21901e96095ad155dd4dbb51e", "filename": "third_party/WebKit/Source/bindings/templates/attributes.cpp", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f85a87ec670ad0fce9d98d90c9a705b72a288154/third_party/WebKit/Source/bin...
static void voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info) { TRACE_EVENT_SET_SAMPLING_STATE("Blink", "DOMMethod"); TestObjectPythonV8Internal::voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethod(info); TRACE_EVENT_SET_SAMPLI...
static void voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info) { TRACE_EVENT_SET_SAMPLING_STATE("Blink", "DOMMethod"); TestObjectPythonV8Internal::voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethod(info); TRACE_EVENT_SET_SAMPLI...
C
null
null
null
@@ -2525,7 +2525,7 @@ static void locationAttributeGetterCallback(v8::Local<v8::String>, const v8::Pro static void locationAttributeSetter(v8::Local<v8::Value> jsValue, const v8::PropertyCallbackInfo<void>& info) { TestObjectPython* proxyImp = V8TestObjectPython::toNative(info.Holder()); - TestNode* imp = WTF...
Chrome
f85a87ec670ad0fce9d98d90c9a705b72a288154
2c217b1d3f3f95e579481976d73e07ab4c77752c
0
static void voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info) { TRACE_EVENT_SET_SAMPLING_STATE("Blink", "DOMMethod"); TestObjectPythonV8Internal::voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethod(info); TRACE_EVENT_SET_SAMPLI...
150,530
null
Remote
Not required
Partial
CVE-2017-5039
https://www.cvedetails.com/cve/CVE-2017-5039/
CWE-416
Medium
Partial
Partial
null
2017-04-24
6.8
A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/69b4b9ef7455753b12c3efe4eec71647e6fb1da1
69b4b9ef7455753b12c3efe4eec71647e6fb1da1
Disable all DRP URL fetches when holdback is enabled Disable secure proxy checker, warmup url fetcher and client config fetch when the client is in DRP (Data Reduction Proxy) holdback. This CL does not disable pingbacks when client is in the holdback, but the pingback code is going away soon. Change-Id: Icbb59d814d1...
0
chrome/browser/data_reduction_proxy/data_reduction_proxy_browsertest.cc
{"sha": "fdc1c6c414773f8641baee34643ae28137cae498", "filename": "chrome/browser/data_reduction_proxy/data_reduction_proxy_browsertest.cc", "status": "modified", "additions": 23, "deletions": 2, "changes": 25, "blob_url": "https://github.com/chromium/chromium/blob/69b4b9ef7455753b12c3efe4eec71647e6fb1da1/chrome/browser/...
void SetResponseHook(ResponseHook response_hook) { base::AutoLock auto_lock(lock_); response_hook_ = response_hook; }
void SetResponseHook(ResponseHook response_hook) { base::AutoLock auto_lock(lock_); response_hook_ = response_hook; }
C
null
null
null
@@ -292,7 +292,12 @@ class DataReductionProxyBrowsertestBase : public InProcessBrowserTest { config_ = config; } - void WaitForConfig() { config_run_loop_->Run(); } + void WaitForConfig() { + // Config is not fetched in the holdback group. So, return early. + if (data_reduction_proxy::params::IsInclud...
Chrome
69b4b9ef7455753b12c3efe4eec71647e6fb1da1
5dae42d82808e0d4fe2001dc7066224da6d771f6
0
void SetResponseHook(ResponseHook response_hook) { base::AutoLock auto_lock(lock_); response_hook_ = response_hook; }
99,892
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2010-03
null
0
https://github.com/chromium/chromium/commit/ea3d1d84be3d6f97bf50e76511c9e26af6895533
ea3d1d84be3d6f97bf50e76511c9e26af6895533
Fix passing pointers between processes. BUG=31880 Review URL: http://codereview.chromium.org/558036 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@37555 0039d316-1c4b-4281-b951-d872f2087c98
0
chrome/renderer/webplugin_delegate_proxy.cc
{"sha": "74de33f85ed2506f6309cec420c932b871c2ebe7", "filename": "chrome/common/plugin_messages.h", "status": "modified", "additions": 9, "deletions": 65, "changes": 74, "blob_url": "https://github.com/chromium/chromium/blob/ea3d1d84be3d6f97bf50e76511c9e26af6895533/chrome/common/plugin_messages.h", "raw_url": "https://g...
static void ReleaseTransportDIB(TransportDIB *dib) { if (dib) { IPC::Message* msg = new ViewHostMsg_FreeTransportDIB(dib->id()); RenderThread::current()->Send(msg); } }
static void ReleaseTransportDIB(TransportDIB *dib) { if (dib) { IPC::Message* msg = new ViewHostMsg_FreeTransportDIB(dib->id()); RenderThread::current()->Send(msg); } }
C
null
null
null
@@ -66,31 +66,24 @@ class ResourceClientProxy : public webkit_glue::WebPluginResourceClient { public: ResourceClientProxy(PluginChannelHost* channel, int instance_id) : channel_(channel), instance_id_(instance_id), resource_id_(0), - notify_needed_(false), notify_data_(0), multibyte_response_expec...
Chrome
ea3d1d84be3d6f97bf50e76511c9e26af6895533
403e46333b43009776a08273501e4ca8c5c06e12
0
static void ReleaseTransportDIB(TransportDIB *dib) { if (dib) { IPC::Message* msg = new ViewHostMsg_FreeTransportDIB(dib->id()); RenderThread::current()->Send(msg); } }
171,449
null
Remote
Not required
Complete
CVE-2016-3881
https://www.cvedetails.com/cve/CVE-2016-3881/
CWE-119
Medium
null
null
null
2016-09-11
7.1
The decoder_peek_si_internal function in vp9/vp9_dx_iface.c in libvpx in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allows remote attackers to cause a denial of service (buffer over-read, and device hang or reboot) via a crafted medi...
2017-08-12
DoS Overflow
0
https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da
4974dcbd0289a2530df2ee2a25b5f92775df80da
DO NOT MERGE | libvpx: cherry-pick aa1c813 from upstream Description from upstream: vp9: Fix potential SEGV in decoder_peek_si_internal decoder_peek_si_internal could potentially read more bytes than what actually exists in the input buffer. We check for the buffer size to be at least 8, but we try to read up to 10 b...
0
libvpx/vp9/vp9_dx_iface.c
{"filename": "libvpx/vp9/vp9_dx_iface.c", "raw_url": "https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da/libvpx/vp9/vp9_dx_iface.c", "patch": "@@ -127,7 +127,7 @@\n\n vpx_decrypt_cb decrypt_cb,\n ...
static vpx_codec_err_t decoder_get_si(vpx_codec_alg_priv_t *ctx, vpx_codec_stream_info_t *si) { const size_t sz = (si->sz >= sizeof(vp9_stream_info_t)) ? sizeof(vp9_stream_info_t) : sizeof(vpx_codec_stream_info_t); memcpy(si, &ctx->si, sz); si->sz = (unsigned int)sz; return VPX_CODEC_OK; }
static vpx_codec_err_t decoder_get_si(vpx_codec_alg_priv_t *ctx, vpx_codec_stream_info_t *si) { const size_t sz = (si->sz >= sizeof(vp9_stream_info_t)) ? sizeof(vp9_stream_info_t) : sizeof(vpx_codec_stream_info_t); memcpy(si, &ctx->si, sz); si->sz = (unsigned int)sz; return VPX_CODEC_OK; }
C
null
null
null
@@ -127,7 +127,7 @@ vpx_decrypt_cb decrypt_cb, void *decrypt_state) { int intra_only_flag = 0; - uint8_t clear_buffer[9]; + uint8_t clear_buffer[10]; if (data + data_sz <= data) return VPX_CODEC_INVALID_PAR...
Android
https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da/
https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da%5E/
0
static vpx_codec_err_t decoder_get_si(vpx_codec_alg_priv_t *ctx, vpx_codec_stream_info_t *si) { const size_t sz = (si->sz >= sizeof(vp9_stream_info_t)) ? sizeof(vp9_stream_info_t) : sizeof(vpx_codec_stream_info_t); memcpy(si, &ctx->si, sz); si->sz = (unsigned int)sz; return VPX_CODEC_OK; }
183,404
null
Remote
Not required
Partial
CVE-2019-11339
https://www.cvedetails.com/cve/CVE-2019-11339/
CWE-125
Medium
Partial
Partial
null
2019-04-18
6.8
The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data.
2019-05-06
DoS
1
https://github.com/FFmpeg/FFmpeg/commit/1f686d023b95219db933394a7704ad9aa5f01cbb
1f686d023b95219db933394a7704ad9aa5f01cbb
avcodec/mpeg4videodec: Clear interlaced_dct for studio profile Fixes: Out of array access Fixes: 13090/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5408668986638336 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Reviewed-by: Kieran Kunhya <kierank...
0
libavcodec/mpeg4videodec.c
{"sha": "ecd028a87c7705295b6f9e61687977437430c50d", "filename": "libavcodec/mpeg4videodec.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/1f686d023b95219db933394a7704ad9aa5f01cbb/libavcodec/mpeg4videodec.c", "raw_url": "https://github.com/FFmpeg...
static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; if (get_bits_left(gb) <= 32) return 0; s->partitioned_frame = 0; s->interlaced_dct = 0; s->decode_mb = mpeg4_decode_studio_mb; decode_smpte_tc(ctx, gb); skip_bits(gb,...
static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; if (get_bits_left(gb) <= 32) return 0; s->partitioned_frame = 0; s->decode_mb = mpeg4_decode_studio_mb; decode_smpte_tc(ctx, gb); skip_bits(gb, 10); /* temporal_reference...
C
s->interlaced_dct = 0;
null
null
@@ -3057,6 +3057,7 @@ static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb) return 0; s->partitioned_frame = 0; + s->interlaced_dct = 0; s->decode_mb = mpeg4_decode_studio_mb; decode_smpte_tc(ctx, gb);
FFmpeg
1f686d023b95219db933394a7704ad9aa5f01cbb
d6fc5dc24aa09e026c6271a7565e63798dfe46f3
1
static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; if (get_bits_left(gb) <= 32) return 0; s->partitioned_frame = 0; //fix_flaw_line_below: // s->interlaced_dct = 0; s->decode_mb = mpeg4_decode_studio_mb; decode_smpte_tc(ctx...
43,191
null
Remote
Not required
Complete
CVE-2015-4001
https://www.cvedetails.com/cve/CVE-2015-4001/
CWE-189
Low
Partial
Partial
null
2015-06-07
9
Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet.
2016-12-27
DoS Exec Code
0
https://github.com/torvalds/linux/commit/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c
b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c
ozwpan: Use unsigned ints to prevent heap overflow Using signed integers, the subtraction between required_size and offset could wind up being negative, resulting in a memcpy into a heap buffer with a negative length, resulting in huge amounts of network-supplied data being copied into the heap, which could potentiall...
0
drivers/staging/ozwpan/ozhcd.c
{"sha": "784b5ecfa8493ba07d8ba90cde1b11b2b6a4b6b7", "filename": "drivers/staging/ozwpan/ozhcd.c", "status": "modified", "additions": 4, "deletions": 4, "changes": 8, "blob_url": "https://github.com/torvalds/linux/blob/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c/drivers/staging/ozwpan/ozhcd.c", "raw_url": "https://github.c...
void oz_hcd_pd_departed(struct oz_port *port) { struct oz_hcd *ozhcd; void *hpd; struct oz_endpoint *ep = NULL; if (port == NULL) { oz_dbg(ON, "%s: port = 0\n", __func__); return; } ozhcd = port->ozhcd; if (ozhcd == NULL) return; /* Check if this is the connection port - if so clear it. */ spin_lock_b...
void oz_hcd_pd_departed(struct oz_port *port) { struct oz_hcd *ozhcd; void *hpd; struct oz_endpoint *ep = NULL; if (port == NULL) { oz_dbg(ON, "%s: port = 0\n", __func__); return; } ozhcd = port->ozhcd; if (ozhcd == NULL) return; /* Check if this is the connection port - if so clear it. */ spin_lock_b...
C
null
null
null
@@ -746,8 +746,8 @@ void oz_hcd_pd_reset(void *hpd, void *hport) /* * Context: softirq */ -void oz_hcd_get_desc_cnf(void *hport, u8 req_id, int status, const u8 *desc, - int length, int offset, int total_size) +void oz_hcd_get_desc_cnf(void *hport, u8 req_id, u8 status, const u8 *desc, + u8 length, u16 offset,...
linux
b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c
d114b9fe78c8d6fc6e70808c2092aa307c36dc8e
0
void oz_hcd_pd_departed(struct oz_port *port) { struct oz_hcd *ozhcd; void *hpd; struct oz_endpoint *ep = NULL; if (port == NULL) { oz_dbg(ON, "%s: port = 0\n", __func__); return; } ozhcd = port->ozhcd; if (ozhcd == NULL) return; /* Check if this is the connection port - if so clear it. */ spin_lock_b...
138,147
null
Remote
Not required
Partial
CVE-2015-1274
https://www.cvedetails.com/cve/CVE-2015-1274/
CWE-254
Medium
Partial
Partial
null
2015-07-22
6.8
Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous *Always open files of this type* choice, related to download_commands.cc and downloa...
2018-10-30
Exec Code
0
https://github.com/chromium/chromium/commit/d27468a832d5316884bd02f459cbf493697fd7e1
d27468a832d5316884bd02f459cbf493697fd7e1
Switch to equalIgnoringASCIICase throughout modules/accessibility BUG=627682 Review-Url: https://codereview.chromium.org/2793913007 Cr-Commit-Position: refs/heads/master@{#461858}
0
third_party/WebKit/Source/modules/accessibility/AXObject.cpp
{"sha": "b7b9d3ad4a5cdff0f72bf31370c16bddf7da6615", "filename": "third_party/WebKit/Source/modules/accessibility/AXARIAGridCell.cpp", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/d27468a832d5316884bd02f459cbf493697fd7e1/third_party/WebKit/Sou...
static Vector<AtomicString>* createRoleNameVector() { Vector<AtomicString>* roleNameVector = new Vector<AtomicString>(NumRoles); for (int i = 0; i < NumRoles; i++) (*roleNameVector)[i] = nullAtom; for (size_t i = 0; i < WTF_ARRAY_LENGTH(roles); ++i) (*roleNameVector)[roles[i].webcoreRole] = AtomicString(...
static Vector<AtomicString>* createRoleNameVector() { Vector<AtomicString>* roleNameVector = new Vector<AtomicString>(NumRoles); for (int i = 0; i < NumRoles; i++) (*roleNameVector)[i] = nullAtom; for (size_t i = 0; i < WTF_ARRAY_LENGTH(roles); ++i) (*roleNameVector)[roles[i].webcoreRole] = AtomicString(...
C
null
null
null
@@ -596,7 +596,7 @@ AXObject* AXObject::leafNodeAncestor() const { const AXObject* AXObject::ariaHiddenRoot() const { for (const AXObject* object = this; object; object = object->parentObject()) { - if (equalIgnoringCase(object->getAttribute(aria_hiddenAttr), "true")) + if (equalIgnoringASCIICase(object->ge...
Chrome
d27468a832d5316884bd02f459cbf493697fd7e1
62dc793dc640ae5fd16d571a0c9199fe0fb740d0
0
static Vector<AtomicString>* createRoleNameVector() { Vector<AtomicString>* roleNameVector = new Vector<AtomicString>(NumRoles); for (int i = 0; i < NumRoles; i++) (*roleNameVector)[i] = nullAtom; for (size_t i = 0; i < WTF_ARRAY_LENGTH(roles); ++i) (*roleNameVector)[roles[i].webcoreRole] = AtomicString(...
186,642
null
Remote
Not required
Partial
CVE-2018-6031
https://www.cvedetails.com/cve/CVE-2018-6031/
CWE-416
Medium
Partial
Partial
null
2018-09-25
6.8
Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
2018-11-20
null
8
https://github.com/chromium/chromium/commit/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2
01c9a7e71ca435651723e8cbcab0b3ad4c5351e2
[pdf] Use a temporary list when unloading pages When traversing the |deferred_page_unloads_| list and handling the unloads it's possible for new pages to get added to the list which will invalidate the iterator. This CL swaps the list with an empty list and does the iteration on the list copy. New items that are unlo...
2
pdf/pdfium/pdfium_engine.cc
{"sha": "7c6b7da1c70f4071d071d2f111be90a01b1233b3", "filename": "pdf/pdfium/pdfium_engine.cc", "status": "modified", "additions": 8, "deletions": 2, "changes": 10, "blob_url": "https://github.com/chromium/chromium/blob/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2/pdf/pdfium/pdfium_engine.cc", "raw_url": "https://github.com...
bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) { DCHECK(!defer_page_unload_); defer_page_unload_ = true; bool rv = false; switch (event.GetType()) { case PP_INPUTEVENT_TYPE_MOUSEDOWN: rv = OnMouseDown(pp::MouseInputEvent(event)); break; case PP_INPUTEVENT_TYPE_MOUSEUP: rv ...
bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) { DCHECK(!defer_page_unload_); defer_page_unload_ = true; bool rv = false; switch (event.GetType()) { case PP_INPUTEVENT_TYPE_MOUSEDOWN: rv = OnMouseDown(pp::MouseInputEvent(event)); break; case PP_INPUTEVENT_TYPE_MOUSEUP: rv ...
C
// Store the pages to unload away because the act of unloading pages can cause // there to be more pages to unload. We leave those extra pages to be unloaded // on the next go around. std::vector<int> pages_to_unload; std::swap(pages_to_unload, deferred_page_unloads_); for (int page_index : pages_to_unload...
for (int page_index : deferred_page_unloads_) deferred_page_unloads_.clear();
null
@@ -1405,9 +1405,15 @@ bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) { DCHECK(defer_page_unload_); defer_page_unload_ = false; - for (int page_index : deferred_page_unloads_) + + // Store the pages to unload away because the act of unloading pages can cause + // there to be more pages to unload...
Chrome
01c9a7e71ca435651723e8cbcab0b3ad4c5351e2
345dab421e9ff30af4f11fc0b55ab02bdd7d1011
1
bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) { DCHECK(!defer_page_unload_); defer_page_unload_ = true; bool rv = false; switch (event.GetType()) { case PP_INPUTEVENT_TYPE_MOUSEDOWN: rv = OnMouseDown(pp::MouseInputEvent(event)); break; case PP_INPUTEVENT_TYPE_MOUSEUP: rv ...
125,584
null
Remote
Not required
Complete
CVE-2013-0840
https://www.cvedetails.com/cve/CVE-2013-0840/
null
Low
Complete
Complete
null
2013-01-24
10
Google Chrome before 24.0.1312.56 does not validate URLs during the opening of new windows, which has unspecified impact and remote attack vectors.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d
7f48b71cb22bb2fc9fcec2013e9eaff55381a43d
Filter more incoming URLs in the CreateWindow path. BUG=170532 Review URL: https://chromiumcodereview.appspot.com/12036002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178728 0039d316-1c4b-4281-b951-d872f2087c98
0
content/browser/renderer_host/render_view_host_impl.cc
{"sha": "a659ea67fa7be30bb38257b1b4003982acdb4deb", "filename": "content/browser/renderer_host/render_message_filter.cc", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d/content/browser/renderer_host/rend...
void RenderViewHostImpl::DidCancelPopupMenu() { Send(new ViewMsg_SelectPopupMenuItem(GetRoutingID(), -1)); }
void RenderViewHostImpl::DidCancelPopupMenu() { Send(new ViewMsg_SelectPopupMenuItem(GetRoutingID(), -1)); }
C
null
null
null
@@ -1056,8 +1056,10 @@ void RenderViewHostImpl::CreateNewWindow( ViewHostMsg_CreateWindow_Params validated_params(params); ChildProcessSecurityPolicyImpl* policy = ChildProcessSecurityPolicyImpl::GetInstance(); - // TODO(cevans): also validate opener_url, opener_security_origin. FilterURL(policy, GetPr...
Chrome
7f48b71cb22bb2fc9fcec2013e9eaff55381a43d
3c8352cdd0c90b22e7130a6949c81192804a65ba
0
void RenderViewHostImpl::DidCancelPopupMenu() { Send(new ViewMsg_SelectPopupMenuItem(GetRoutingID(), -1)); }
187,396
null
Remote
Not required
Complete
CVE-2015-1474
https://www.cvedetails.com/cve/CVE-2015-1474/
CWE-189
Low
Complete
Complete
null
2015-02-15
10
Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of (1) file descriptors or (2) integer values.
2017-09-28
DoS Overflow +Priv Mem. Corr.
16
https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091
38803268570f90e97452cd9a30ac831661829091
Fix for corruption when numFds or numInts is too large. Bug: 18076253 Change-Id: I4c5935440013fc755e1d123049290383f4659fb6 (cherry picked from commit dfd06b89a4b77fc75eb85a3c1c700da3621c0118)
1
libs/ui/GraphicBuffer.cpp
{"filename": "libs/ui/GraphicBuffer.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091/libs/ui/GraphicBuffer.cpp", "patch": "@@ -310,10 +310,19 @@\n\n const size_t numFds = buf[8];\n const size_t numInts = buf[9];\n \n+ const size_t maxNu...
status_t GraphicBuffer::unflatten( void const*& buffer, size_t& size, int const*& fds, size_t& count) { if (size < 8*sizeof(int)) return NO_MEMORY; int const* buf = static_cast<int const*>(buffer); if (buf[0] != 'GBFR') return BAD_TYPE; const size_t numFds = buf[8]; const size_t numInts = buf[9]; ...
status_t GraphicBuffer::unflatten( void const*& buffer, size_t& size, int const*& fds, size_t& count) { if (size < 8*sizeof(int)) return NO_MEMORY; int const* buf = static_cast<int const*>(buffer); if (buf[0] != 'GBFR') return BAD_TYPE; const size_t numFds = buf[8]; const size_t numInts = buf[9]; ...
C
const size_t maxNumber = UINT_MAX / sizeof(int); if (numFds >= maxNumber || numInts >= (maxNumber - 10)) { width = height = stride = format = usage = 0; handle = NULL; ALOGE("unflatten: numFds or numInts is too large: %d, %d", numFds, numInts); return BAD_VALUE; ...
size_t fdCountNeeded = 0;
null
@@ -310,10 +310,19 @@ const size_t numFds = buf[8]; const size_t numInts = buf[9]; + const size_t maxNumber = UINT_MAX / sizeof(int); + if (numFds >= maxNumber || numInts >= (maxNumber - 10)) { + width = height = stride = format = usage = 0; + handle = NULL; + ALOGE("unflatten: ...
Android
https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091/
https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091%5E/
1
status_t GraphicBuffer::unflatten( void const*& buffer, size_t& size, int const*& fds, size_t& count) { if (size < 8*sizeof(int)) return NO_MEMORY; int const* buf = static_cast<int const*>(buffer); if (buf[0] != 'GBFR') return BAD_TYPE; const size_t numFds = buf[8]; const size_t numInts = buf[9]; //...
186,180
null
Remote
Not required
Partial
CVE-2016-1612
https://www.cvedetails.com/cve/CVE-2016-1612/
CWE-20
Medium
Partial
Partial
null
2016-01-25
6.8
The LoadIC::UpdateCaches function in ic/ic.cc in Google V8, as used in Google Chrome before 48.0.2564.82, does not ensure receiver compatibility before performing a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact via crafted JavaScript co...
2016-12-07
DoS
18
https://github.com/chromium/chromium/commit/94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb
94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb
Change ReadWriteLock to Lock+ConditionVariable in TaskService There are non-trivial performance implications of using shared SRWLocking on Windows as more state has to be checked. Since there are only two uses of the ReadWriteLock in Chromium after over 1 year, the decision is to remove it. BUG=758721 Change-Id: I8...
5
media/midi/task_service.cc
{"sha": "fc1cfb7fdfc2e858f713480edb83c6638dddc0a7", "filename": "media/midi/task_service.cc", "status": "modified", "additions": 29, "deletions": 10, "changes": 39, "blob_url": "https://github.com/chromium/chromium/blob/94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb/media/midi/task_service.cc", "raw_url": "https://github.com...
void TaskService::RunTask(InstanceId instance_id, RunnerId runner_id, base::OnceClosure task) { { base::AutoLock tasks_in_flight_auto_lock(tasks_in_flight_lock_); ++tasks_in_flight_; } if (IsInstanceIdStillBound(instance_id)) std::move(task).Ru...
void TaskService::RunTask(InstanceId instance_id, RunnerId runner_id, base::OnceClosure task) { base::subtle::AutoReadLock task_lock(task_lock_); { base::AutoLock lock(lock_); if (instance_id != bound_instance_id_) return; } std::move(task)....
C
base::AutoLock tasks_in_flight_auto_lock(tasks_in_flight_lock_); ++tasks_in_flight_; if (IsInstanceIdStillBound(instance_id)) std::move(task).Run(); { base::AutoLock tasks_in_flight_auto_lock(tasks_in_flight_lock_); --tasks_in_flight_; DCHECK_GE(tasks_in_flight_, 0); if (tasks_in_fligh...
base::subtle::AutoReadLock task_lock(task_lock_); base::AutoLock lock(lock_); if (instance_id != bound_instance_id_) return; std::move(task).Run();
null
@@ -16,7 +16,10 @@ constexpr TaskService::InstanceId kInvalidInstanceId = -1; } // namespace TaskService::TaskService() - : next_instance_id_(0), bound_instance_id_(kInvalidInstanceId) {} + : no_tasks_in_flight_cv_(&tasks_in_flight_lock_), + tasks_in_flight_(0), + next_instance_id_(0), + bound...
Chrome
94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb
06d5588e6c9bfa022f61edefe7563c2c6bea9aa9
1
void TaskService::RunTask(InstanceId instance_id, RunnerId runner_id, base::OnceClosure task) { //flaw_line_below: base::subtle::AutoReadLock task_lock(task_lock_); { //flaw_line_below: base::AutoLock lock(lock_); //flaw_line_below: // If UnbindInstanc...
83,696
null
Remote
Not required
Partial
CVE-2018-8099
https://www.cvedetails.com/cve/CVE-2018-8099/
CWE-415
Medium
null
null
null
2018-03-13
4.3
Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file.
2018-04-13
DoS
0
https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe
58a6fe94cb851f71214dbefac3f9bffee437d6fe
index: convert `read_entry` to return entry size via an out-param The function `read_entry` does not conform to our usual coding style of returning stuff via the out parameter and to use the return value for reporting errors. Due to most of our code conforming to that pattern, it has become quite natural for us to act...
0
src/index.c
{"sha": "3ef892b7f170b1fdad356de32061652d7f97c48a", "filename": "src/index.c", "status": "modified", "additions": 13, "deletions": 9, "changes": 22, "blob_url": "https://github.com/libgit2/libgit2/blob/58a6fe94cb851f71214dbefac3f9bffee437d6fe/src/index.c", "raw_url": "https://github.com/libgit2/libgit2/raw/58a6fe94cb85...
int git_index_reuc_add(git_index *index, const char *path, int ancestor_mode, const git_oid *ancestor_oid, int our_mode, const git_oid *our_oid, int their_mode, const git_oid *their_oid) { git_index_reuc_entry *reuc = NULL; int error = 0; assert(index && path); if ((error = index_entry_reuc_init(&reuc, path, a...
int git_index_reuc_add(git_index *index, const char *path, int ancestor_mode, const git_oid *ancestor_oid, int our_mode, const git_oid *our_oid, int their_mode, const git_oid *their_oid) { git_index_reuc_entry *reuc = NULL; int error = 0; assert(index && path); if ((error = index_entry_reuc_init(&reuc, path, a...
C
null
null
null
@@ -2299,8 +2299,9 @@ static size_t index_entry_size(size_t path_len, size_t varint_len, uint32_t flag } } -static size_t read_entry( +static int read_entry( git_index_entry **out, + size_t *out_size, git_index *index, const void *buffer, size_t buffer_size, @@ -2314,7 +2315,7 @@ static size_t read_entry( ...
libgit2
58a6fe94cb851f71214dbefac3f9bffee437d6fe
d11c4a1a464f10c69d5cc58824e980ea5045d439
0
int git_index_reuc_add(git_index *index, const char *path, int ancestor_mode, const git_oid *ancestor_oid, int our_mode, const git_oid *our_oid, int their_mode, const git_oid *their_oid) { git_index_reuc_entry *reuc = NULL; int error = 0; assert(index && path); if ((error = index_entry_reuc_init(&reuc, path, a...
183,071
null
Local
Not required
null
CVE-2012-6544
https://www.cvedetails.com/cve/CVE-2012-6544/
CWE-200
Medium
Partial
null
null
2013-03-15
1.9
The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.
2019-04-22
+Info
1
https://github.com/torvalds/linux/commit/792039c73cf176c8e39a6e8beef2c94ff46522ed
792039c73cf176c8e39a6e8beef2c94ff46522ed
Bluetooth: L2CAP - Fix info leak via getsockname() The L2CAP code fails to initialize the l2_bdaddr_type member of struct sockaddr_l2 and the padding byte added for alignment. It that for leaks two bytes kernel stack via the getsockname() syscall. Add an explicit memset(0) before filling the structure to avoid the inf...
0
net/bluetooth/l2cap_sock.c
{"sha": "1497edd191a2e04ee3121624db92547059f24369", "filename": "net/bluetooth/l2cap_sock.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/792039c73cf176c8e39a6e8beef2c94ff46522ed/net/bluetooth/l2cap_sock.c", "raw_url": "https://github.com/torva...
static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer) { struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr; struct sock *sk = sock->sk; struct l2cap_chan *chan = l2cap_pi(sk)->chan; BT_DBG("sock %p, sk %p", sock, sk); memset(la, 0, sizeof(struct sockaddr_l2)); addr-...
static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer) { struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr; struct sock *sk = sock->sk; struct l2cap_chan *chan = l2cap_pi(sk)->chan; BT_DBG("sock %p, sk %p", sock, sk); addr->sa_family = AF_BLUETOOTH; *len = sizeof(s...
C
memset(la, 0, sizeof(struct sockaddr_l2));
null
null
@@ -245,6 +245,7 @@ static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *l BT_DBG("sock %p, sk %p", sock, sk); + memset(la, 0, sizeof(struct sockaddr_l2)); addr->sa_family = AF_BLUETOOTH; *len = sizeof(struct sockaddr_l2);
linux
792039c73cf176c8e39a6e8beef2c94ff46522ed
9344a972961d1a6d2c04d9008b13617bcb6ec2ef
1
static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer) { struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr; struct sock *sk = sock->sk; struct l2cap_chan *chan = l2cap_pi(sk)->chan; BT_DBG("sock %p, sk %p", sock, sk); //fix_flaw_line_below: // memset(la, 0, sizeof(stru...
148,486
null
Remote
Not required
null
CVE-2017-5093
https://www.cvedetails.com/cve/CVE-2017-5093/
CWE-20
Medium
null
Partial
null
2017-10-27
4.3
Inappropriate implementation in modal dialog handling in Blink in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to prevent a full screen warning from being displayed via a crafted HTML page.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc
0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc
If JavaScript shows a dialog, cause the page to lose fullscreen. BUG=670135, 550017, 726761, 728276 Review-Url: https://codereview.chromium.org/2906133004 Cr-Commit-Position: refs/heads/master@{#478884}
0
content/browser/web_contents/web_contents_impl.cc
{"sha": "07850f544b6aafceacd85de0a666881fd2ad06b9", "filename": "chrome/browser/printing/print_job_worker.cc", "status": "modified", "additions": 10, "deletions": 4, "changes": 14, "blob_url": "https://github.com/chromium/chromium/blob/0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc/chrome/browser/printing/print_job_worker.cc...
void WebContentsImpl::OnHideValidationMessage(RenderViewHostImpl* source) { if (delegate_) delegate_->HideValidationMessage(this); }
void WebContentsImpl::OnHideValidationMessage(RenderViewHostImpl* source) { if (delegate_) delegate_->HideValidationMessage(this); }
C
null
null
null
@@ -4425,6 +4425,11 @@ void WebContentsImpl::RunJavaScriptDialog(RenderFrameHost* render_frame_host, const GURL& frame_url, JavaScriptDialogType dialog_type, IPC::Message* reply_msg) { + // ...
Chrome
0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc
3adbcbaa43c1d5069da92d154a7382943c5a2881
0
void WebContentsImpl::OnHideValidationMessage(RenderViewHostImpl* source) { // TODO(nick): Should we consider |source| here or pass it to the delegate? if (delegate_) delegate_->HideValidationMessage(this); }
169,406
null
Remote
Not required
Partial
CVE-2018-6121
https://www.cvedetails.com/cve/CVE-2018-6121/
CWE-20
Medium
Partial
Partial
null
2019-06-27
6.8
Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page.
2019-07-01
null
0
https://github.com/chromium/chromium/commit/7614790c80996d32a28218f4d1605b0908e9ddf6
7614790c80996d32a28218f4d1605b0908e9ddf6
Apply ExtensionNavigationThrottle filesystem/blob checks to all frames. BUG=836858 Change-Id: I34333a72501129fd40b5a9aa6378c9f35f1e7fc2 Reviewed-on: https://chromium-review.googlesource.com/1028511 Reviewed-by: Devlin <rdevlin.cronin@chromium.org> Reviewed-by: Alex Moshchuk <alexmos@chromium.org> Reviewed-by: Nick Ca...
0
content/public/test/browser_test_utils.cc
{"sha": "bde2056c656777f3282a8110fbcc9dc46f0d70ff", "filename": "chrome/browser/extensions/process_manager_browsertest.cc", "status": "modified", "additions": 67, "deletions": 0, "changes": 67, "blob_url": "https://github.com/chromium/chromium/blob/7614790c80996d32a28218f4d1605b0908e9ddf6/chrome/browser/extensions/proc...
TitleWatcher::~TitleWatcher() { }
TitleWatcher::~TitleWatcher() { }
C
null
null
null
@@ -626,6 +626,12 @@ bool IsLastCommittedEntryOfPageType(WebContents* web_contents, return last_entry->GetPageType() == page_type; } +void OverrideLastCommittedOrigin(RenderFrameHost* render_frame_host, + const url::Origin& origin) { + static_cast<RenderFrameHostImpl*>(render_fram...
Chrome
7614790c80996d32a28218f4d1605b0908e9ddf6
b9b0b6c2f15330983573371f7c3d10185d5e5617
0
TitleWatcher::~TitleWatcher() { }
155,351
null
Remote
Not required
Partial
CVE-2016-5199
https://www.cvedetails.com/cve/CVE-2016-5199/
CWE-119
Medium
Partial
Partial
null
2017-01-19
6.8
An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
2018-01-04
Overflow
0
https://github.com/chromium/chromium/commit/c995d4fe5e96f4d6d4a88b7867279b08e72d2579
c995d4fe5e96f4d6d4a88b7867279b08e72d2579
Move IsDataSaverEnabledByUser to be a static method and use it This method now officially becomes the source of truth that everything in the code base eventually calls into to determine whether or not DataSaver is enabled. Bug: 934399 Change-Id: Iae837b710ace8cc3101188f79d02cbc2d4f0fd93 Reviewed-on: https://chromium-...
0
chrome/browser/chrome_content_browser_client.cc
{"sha": "2f0c54b8797f5ca2ed76f1d4ad07fd30bca34417", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 3, "deletions": 6, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/c995d4fe5e96f4d6d4a88b7867279b08e72d2579/chrome/browser/chrome_content_browser_cli...
std::string ChromeContentBrowserClient::GetMetricSuffixForURL(const GURL& url) { if (page_load_metrics::IsGoogleSearchResultUrl(url)) return "search"; if (url.host() == "docs.google.com") return "docs"; return std::string(); }
std::string ChromeContentBrowserClient::GetMetricSuffixForURL(const GURL& url) { if (page_load_metrics::IsGoogleSearchResultUrl(url)) return "search"; if (url.host() == "docs.google.com") return "docs"; return std::string(); }
C
null
null
null
@@ -2282,12 +2282,9 @@ const gfx::ImageSkia* ChromeContentBrowserClient::GetDefaultFavicon() { bool ChromeContentBrowserClient::IsDataSaverEnabled( content::BrowserContext* browser_context) { - data_reduction_proxy::DataReductionProxySettings* - data_reduction_proxy_settings = - DataReductionProx...
Chrome
c995d4fe5e96f4d6d4a88b7867279b08e72d2579
62ea490d67eaefcb723d80c650e8adfc9740f4de
0
std::string ChromeContentBrowserClient::GetMetricSuffixForURL(const GURL& url) { // Don't change these returned strings. They are written (in hashed form) into // UMA logs. If you add more strings, you must update histograms.xml and get // histograms review. Only Google domains should be here for privacy purposes...
36,909
null
Local
Not required
Complete
CVE-2014-4014
https://www.cvedetails.com/cve/CVE-2014-4014/
CWE-264
High
Complete
Complete
null
2014-06-23
6.2
The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.
2018-12-18
Bypass
0
https://github.com/torvalds/linux/commit/23adbe12ef7d3d4195e80800ab36b37bee28cd03
23adbe12ef7d3d4195e80800ab36b37bee28cd03
fs,userns: Change inode_capable to capable_wrt_inode_uidgid The kernel has no concept of capabilities with respect to inodes; inodes exist independently of namespaces. For example, inode_capable(inode, CAP_LINUX_IMMUTABLE) would be nonsense. This patch changes inode_capable to check for uid and gid mappings and rena...
0
fs/xfs/xfs_ioctl.c
{"sha": "6530ced19697d49a9189fa289c9112187448fee3", "filename": "fs/attr.c", "status": "modified", "additions": 4, "deletions": 4, "changes": 8, "blob_url": "https://github.com/torvalds/linux/blob/23adbe12ef7d3d4195e80800ab36b37bee28cd03/fs/attr.c", "raw_url": "https://github.com/torvalds/linux/raw/23adbe12ef7d3d4195e8...
xfs_fssetdm_by_handle( struct file *parfilp, void __user *arg) { int error; struct fsdmidata fsd; xfs_fsop_setdm_handlereq_t dmhreq; struct dentry *dentry; if (!capable(CAP_MKNOD)) return -XFS_ERROR(EPERM); if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t))) return -XFS_ERROR(EFAULT...
xfs_fssetdm_by_handle( struct file *parfilp, void __user *arg) { int error; struct fsdmidata fsd; xfs_fsop_setdm_handlereq_t dmhreq; struct dentry *dentry; if (!capable(CAP_MKNOD)) return -XFS_ERROR(EPERM); if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t))) return -XFS_ERROR(EFAULT...
C
null
null
null
@@ -1215,7 +1215,7 @@ xfs_ioctl_setattr( * cleared upon successful return from chown() */ if ((ip->i_d.di_mode & (S_ISUID|S_ISGID)) && - !inode_capable(VFS_I(ip), CAP_FSETID)) + !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID)) ip->i_d.di_mode &= ~(S_ISUID|S_ISGID); /*
linux
23adbe12ef7d3d4195e80800ab36b37bee28cd03
5b174fd6472b1d6b6402b30210a212f3fd770d96
0
xfs_fssetdm_by_handle( struct file *parfilp, void __user *arg) { int error; struct fsdmidata fsd; xfs_fsop_setdm_handlereq_t dmhreq; struct dentry *dentry; if (!capable(CAP_MKNOD)) return -XFS_ERROR(EPERM); if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t))) return -XFS_ERROR(EFAULT...
45,303
null
Local
Not required
Complete
CVE-2014-9710
https://www.cvedetails.com/cve/CVE-2014-9710/
CWE-362
Medium
Complete
Complete
null
2015-05-27
6.9
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race...
2016-12-30
+Priv Bypass
0
https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
Btrfs: make xattr replace operations atomic Replacing a xattr consists of doing a lookup for its existing value, delete the current value from the respective leaf, release the search path and then finally insert the new value. This leaves a time window where readers (getxattr, listxattrs) won't see any value for the x...
0
fs/btrfs/ctree.c
{"sha": "817234168a7fc298c16ec624f82a7952ff60f488", "filename": "fs/btrfs/ctree.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339/fs/btrfs/ctree.c", "raw_url": "https://github.com/torvalds/linux/raw/5f5bc6...
void btrfs_free_path(struct btrfs_path *p) { if (!p) return; btrfs_release_path(p); kmem_cache_free(btrfs_path_cachep, p); }
void btrfs_free_path(struct btrfs_path *p) { if (!p) return; btrfs_release_path(p); kmem_cache_free(btrfs_path_cachep, p); }
C
null
null
null
@@ -2939,7 +2939,7 @@ int btrfs_search_slot(struct btrfs_trans_handle *trans, struct btrfs_root */ if (!p->leave_spinning) btrfs_set_path_blocking(p); - if (ret < 0) + if (ret < 0 && !p->skip_release_on_error) btrfs_release_path(p); return ret; }
linux
5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
c7bc6319c59cc791743cf1b6e98f86be69444495
0
void btrfs_free_path(struct btrfs_path *p) { if (!p) return; btrfs_release_path(p); kmem_cache_free(btrfs_path_cachep, p); }
152,432
null
Remote
Not required
Partial
CVE-2017-5019
https://www.cvedetails.com/cve/CVE-2017-5019/
CWE-416
Medium
Partial
Partial
null
2017-02-17
6.8
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
Convert FrameHostMsg_DidAddMessageToConsole to Mojo. Note: Since this required changing the test RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually re-introduced https://crbug.com/666714 locally (the bug the test was added for), and reran the test to confirm that it still covers the bug. Bug: 786836 Ch...
0
content/renderer/render_frame_impl.cc
{"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render...
void RenderFrameImpl::OnEnableViewSourceMode() { DCHECK(frame_); DCHECK(!frame_->Parent()); frame_->EnableViewSourceMode(true); }
void RenderFrameImpl::OnEnableViewSourceMode() { DCHECK(frame_); DCHECK(!frame_->Parent()); frame_->EnableViewSourceMode(true); }
C
null
null
null
@@ -4545,9 +4545,9 @@ void RenderFrameImpl::DidAddMessageToConsole( } } - Send(new FrameHostMsg_DidAddMessageToConsole( - routing_id_, static_cast<int32_t>(log_severity), message.text.Utf16(), - static_cast<int32_t>(source_line), source_name.Utf16())); + GetFrameHost()->DidAddMessageToConsole(mess...
Chrome
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
c246049ec1b28d1af4fe3be886ac5904e1762026
0
void RenderFrameImpl::OnEnableViewSourceMode() { DCHECK(frame_); DCHECK(!frame_->Parent()); frame_->EnableViewSourceMode(true); }
81,809
null
Remote
Not required
Partial
CVE-2018-12453
https://www.cvedetails.com/cve/CVE-2018-12453/
CWE-704
Low
null
null
null
2018-06-16
5
Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
2018-08-14
null
0
https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6
c04082cf138f1f51cedf05ee9ad36fb6763cafc6
Abort in XGROUP if the key is not a stream
0
src/t_stream.c
{"sha": "c48928018c04d68e68b0191e202144978fe327a4", "filename": "src/t_stream.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/antirez/redis/blob/c04082cf138f1f51cedf05ee9ad36fb6763cafc6/src/t_stream.c", "raw_url": "https://github.com/antirez/redis/raw/c04082cf138f...
int64_t streamTrimByLength(stream *s, size_t maxlen, int approx) { if (s->length <= maxlen) return 0; raxIterator ri; raxStart(&ri,s->rax); raxSeek(&ri,"^",NULL,0); int64_t deleted = 0; while(s->length > maxlen && raxNext(&ri)) { unsigned char *lp = ri.data, *p = lpFirst(lp); i...
int64_t streamTrimByLength(stream *s, size_t maxlen, int approx) { if (s->length <= maxlen) return 0; raxIterator ri; raxStart(&ri,s->rax); raxSeek(&ri,"^",NULL,0); int64_t deleted = 0; while(s->length > maxlen && raxNext(&ri)) { unsigned char *lp = ri.data, *p = lpFirst(lp); i...
C
null
null
null
@@ -1576,7 +1576,7 @@ NULL /* Lookup the key now, this is common for all the subcommands but HELP. */ if (c->argc >= 4) { robj *o = lookupKeyWriteOrReply(c,c->argv[2],shared.nokeyerr); - if (o == NULL) return; + if (o == NULL || checkType(c,o,OBJ_STREAM)) return; s = o->ptr; ...
redis
c04082cf138f1f51cedf05ee9ad36fb6763cafc6
be899b824edd312d4e3a1998c56626d66fae3b61
0
int64_t streamTrimByLength(stream *s, size_t maxlen, int approx) { if (s->length <= maxlen) return 0; raxIterator ri; raxStart(&ri,s->rax); raxSeek(&ri,"^",NULL,0); int64_t deleted = 0; while(s->length > maxlen && raxNext(&ri)) { unsigned char *lp = ri.data, *p = lpFirst(lp); i...
71,700
null
Remote
Not required
Partial
CVE-2016-10066
https://www.cvedetails.com/cve/CVE-2016-10066/
CWE-119
Medium
null
null
null
2017-03-03
4.3
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
2017-03-04
DoS Overflow
0
https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
null
0
coders/sixel.c
{"sha": "ca393265a99b634fb87ee6aefa65985b1eae5cd6", "filename": "ChangeLog", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6/ChangeLog", "raw_url": "https://github.com/ImageMagick/ImageMagick/raw/f6...
static void sixel_node_del(sixel_output_t *const context, sixel_node_t *np) { sixel_node_t *tp; if ((tp = context->node_top) == np) { context->node_top = np->next; } else { while (tp->next != NULL) { if (tp->next == np) { tp->next = np->next; ...
static void sixel_node_del(sixel_output_t *const context, sixel_node_t *np) { sixel_node_t *tp; if ((tp = context->node_top) == np) { context->node_top = np->next; } else { while (tp->next != NULL) { if (tp->next == np) { tp->next = np->next; ...
C
null
null
null
@@ -1027,7 +1027,12 @@ static Image *ReadSIXELImage(const ImageInfo *image_info,ExceptionInfo *exceptio sixel_buffer=(char *) RelinquishMagickMemory(sixel_buffer); image->depth=24; image->storage_class=PseudoClass; - + status=SetImageExtent(image,image->columns,image->rows); + if (status == MagickFalse) + ...
ImageMagick
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
6773cce8ff0bfb32fd568c2a0f74acc34b66ec03
0
static void sixel_node_del(sixel_output_t *const context, sixel_node_t *np) { sixel_node_t *tp; if ((tp = context->node_top) == np) { context->node_top = np->next; } else { while (tp->next != NULL) { if (tp->next == np) { tp->next = np->next; ...
115,483
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2012-02
null
0
https://github.com/chromium/chromium/commit/dc3857aac17be72c96f28d860d875235b3be349a
dc3857aac17be72c96f28d860d875235b3be349a
Unreviewed, rolling out r142736. http://trac.webkit.org/changeset/142736 https://bugs.webkit.org/show_bug.cgi?id=109716 Broke ABI, nightly builds crash on launch (Requested by ap on #webkit). Patch by Sheriff Bot <webkit.review.bot@gmail.com> on 2013-02-13 Source/WebKit2: * Shared/APIClientTraits.cpp: (WebKit): * S...
0
third_party/WebKit/Tools/WebKitTestRunner/InjectedBundle/InjectedBundlePage.cpp
{"sha": "4747a285ac89a42c70faaaabb65a017f86d1d0ad", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 19, "deletions": 0, "changes": 19, "blob_url": "https://github.com/chromium/chromium/blob/dc3857aac17be72c96f28d860d875235b3be349a/third_party/WebKit/Source/WebKit2/ChangeLog...
void InjectedBundlePage::willRunJavaScriptConfirm(WKBundlePageRef page, WKStringRef message, WKBundleFrameRef frame, const void *clientInfo) { return static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->willRunJavaScriptConfirm(message, frame); }
void InjectedBundlePage::willRunJavaScriptConfirm(WKBundlePageRef page, WKStringRef message, WKBundleFrameRef frame, const void *clientInfo) { return static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->willRunJavaScriptConfirm(message, frame); }
C
null
null
null
@@ -319,6 +319,8 @@ InjectedBundlePage::InjectedBundlePage(WKBundlePageRef page) 0, // willDestroyGlobalObjectForDOMWindowExtension didFinishProgress, // didFinishProgress 0, // shouldForceUniversalAccessFromLocalURL + 0, // didReceiveIntentForFrame + 0, // registerIntentService...
Chrome
dc3857aac17be72c96f28d860d875235b3be349a
cd2d7b3da48d2727a9f8f555b0af79169dce0918
0
void InjectedBundlePage::willRunJavaScriptConfirm(WKBundlePageRef page, WKStringRef message, WKBundleFrameRef frame, const void *clientInfo) { return static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->willRunJavaScriptConfirm(message, frame); }
149,947
null
Remote
Not required
null
CVE-2017-5061
https://www.cvedetails.com/cve/CVE-2017-5061/
CWE-362
High
null
Partial
null
2017-10-27
2.6
A race condition in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34
5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34
(Reland) Discard compositor frames from unloaded web content This is a reland of https://codereview.chromium.org/2707243005/ with a small change to fix an uninitialized memory error that fails on MSAN bots. BUG=672847 TBR=danakj@chromium.org, creis@chromium.org CQ_INCLUDE_TRYBOTS=master.tryserver.blink:linux_trusty_b...
0
cc/trees/layer_tree_host_impl.cc
{"sha": "42e97e419e13449a165990f1b0f48beaee13e291", "filename": "cc/ipc/cc_param_traits_macros.h", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34/cc/ipc/cc_param_traits_macros.h", "raw_url": "https://git...
LayerImpl* LayerTreeHostImpl::FindScrollLayerForDeviceViewportPoint( const gfx::PointF& device_viewport_point, InputHandler::ScrollInputType type, LayerImpl* layer_impl, bool* scroll_on_main_thread, uint32_t* main_thread_scrolling_reasons) const { DCHECK(scroll_on_main_thread); DCHECK(main_threa...
LayerImpl* LayerTreeHostImpl::FindScrollLayerForDeviceViewportPoint( const gfx::PointF& device_viewport_point, InputHandler::ScrollInputType type, LayerImpl* layer_impl, bool* scroll_on_main_thread, uint32_t* main_thread_scrolling_reasons) const { DCHECK(scroll_on_main_thread); DCHECK(main_threa...
C
null
null
null
@@ -1581,6 +1581,7 @@ CompositorFrameMetadata LayerTreeHostImpl::MakeCompositorFrameMetadata() const { metadata.bottom_controls_shown_ratio = browser_controls_offset_manager_->BottomControlsShownRatio(); metadata.root_background_color = active_tree_->background_color(); + metadata.content_source_id = acti...
Chrome
5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34
aae574ee52af5df55c8b7175ff096481a5bfb703
0
LayerImpl* LayerTreeHostImpl::FindScrollLayerForDeviceViewportPoint( const gfx::PointF& device_viewport_point, InputHandler::ScrollInputType type, LayerImpl* layer_impl, bool* scroll_on_main_thread, uint32_t* main_thread_scrolling_reasons) const { DCHECK(scroll_on_main_thread); DCHECK(main_threa...
164,821
null
Remote
Not required
Partial
CVE-2019-5822
https://www.cvedetails.com/cve/CVE-2019-5822/
CWE-284
Medium
Partial
Partial
null
2019-06-27
6.8
Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
2019-07-25
Bypass
0
https://github.com/chromium/chromium/commit/2f81d000fdb5331121cba7ff81dfaaec25b520a5
2f81d000fdb5331121cba7ff81dfaaec25b520a5
When turning a download into a navigation, navigate the right frame Code changes from Nate Chapin <japhet@chromium.org> Bug: 926105 Change-Id: I098599394e6ebe7d2fce5af838014297a337d294 Reviewed-on: https://chromium-review.googlesource.com/c/1454962 Reviewed-by: Camille Lamy <clamy@chromium.org> Commit-Queue: Jochen E...
0
chrome/browser/download/download_browsertest.cc
{"sha": "5bff3e24e623e2f22b4fc2db17e54c8911112e3d", "filename": "chrome/browser/download/download_browsertest.cc", "status": "modified", "additions": 61, "deletions": 0, "changes": 61, "blob_url": "https://github.com/chromium/chromium/blob/2f81d000fdb5331121cba7ff81dfaaec25b520a5/chrome/browser/download/download_browse...
content::DownloadTestObserver* DangerousDownloadWaiter( Browser* browser, int num_downloads, content::DownloadTestObserver::DangerousDownloadAction dangerous_download_action) { DownloadManager* download_manager = DownloadManagerForBrowser(browser); return new content::DownloadTestO...
content::DownloadTestObserver* DangerousDownloadWaiter( Browser* browser, int num_downloads, content::DownloadTestObserver::DangerousDownloadAction dangerous_download_action) { DownloadManager* download_manager = DownloadManagerForBrowser(browser); return new content::DownloadTestO...
C
null
null
null
@@ -3563,6 +3563,67 @@ IN_PROC_BROWSER_TEST_F(DownloadTest, FileExistenceCheckOpeningDownloadsPage) { .WaitForEvent(); } +// Checks that the navigation resulting from a cross origin download navigates +// the correct iframe. +IN_PROC_BROWSER_TEST_F(DownloadTest, CrossOriginDownloadNavigatesIframe) { + Embedd...
Chrome
2f81d000fdb5331121cba7ff81dfaaec25b520a5
6aff2928bf6a19ea5069ae38405704c377aff56e
0
content::DownloadTestObserver* DangerousDownloadWaiter( Browser* browser, int num_downloads, content::DownloadTestObserver::DangerousDownloadAction dangerous_download_action) { DownloadManager* download_manager = DownloadManagerForBrowser(browser); return new content::DownloadTestO...
106,429
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2011-05
null
0
https://github.com/chromium/chromium/commit/df831400bcb63db4259b5858281b1727ba972a2a
df831400bcb63db4259b5858281b1727ba972a2a
WebKit2: Support window bounce when panning. https://bugs.webkit.org/show_bug.cgi?id=58065 <rdar://problem/9244367> Reviewed by Adam Roben. Make gestureDidScroll synchronous, as once we scroll, we need to know whether or not we are at the beginning or end of the scrollable document. If we are at eith...
0
third_party/WebKit/Source/WebKit2/UIProcess/WebPageProxy.cpp
{"sha": "394aac509603ac833b379946cb1be38a0bb5418a", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 29, "deletions": 0, "changes": 29, "blob_url": "https://github.com/chromium/chromium/blob/df831400bcb63db4259b5858281b1727ba972a2a/third_party/WebKit/Source/WebKit2/ChangeLog...
WebPageProxy::WebPageProxy(PageClient* pageClient, WebContext* context, WebPageGroup* pageGroup, uint64_t pageID) : m_pageClient(pageClient) , m_context(context) , m_pageGroup(pageGroup) , m_mainFrame(0) , m_userAgent(standardUserAgent()) , m_geolocationPermissionRequestManager(this) , m_est...
WebPageProxy::WebPageProxy(PageClient* pageClient, WebContext* context, WebPageGroup* pageGroup, uint64_t pageID) : m_pageClient(pageClient) , m_context(context) , m_pageGroup(pageGroup) , m_mainFrame(0) , m_userAgent(standardUserAgent()) , m_geolocationPermissionRequestManager(this) , m_est...
C
null
null
null
@@ -670,14 +670,16 @@ String WebPageProxy::getSelectedText() bool WebPageProxy::gestureWillBegin(const IntPoint& point) { - bool canBeginPanning; + bool canBeginPanning = false; process()->sendSync(Messages::WebPage::GestureWillBegin(point), Messages::WebPage::GestureWillBegin::Reply(canBeginPanning), m_...
Chrome
df831400bcb63db4259b5858281b1727ba972a2a
ed03cbf291b69831f85347962d190a391c8b6bdc
0
WebPageProxy::WebPageProxy(PageClient* pageClient, WebContext* context, WebPageGroup* pageGroup, uint64_t pageID) : m_pageClient(pageClient) , m_context(context) , m_pageGroup(pageGroup) , m_mainFrame(0) , m_userAgent(standardUserAgent()) , m_geolocationPermissionRequestManager(this) , m_est...
184,130
null
Remote
Not required
Partial
CVE-2011-1296
https://www.cvedetails.com/cve/CVE-2011-1296/
CWE-20
Low
Partial
Partial
null
2011-03-25
7.5
Google Chrome before 10.0.648.204 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a *stale pointer.*
2017-09-18
DoS
3
https://github.com/chromium/chromium/commit/c90c6ca59378d7e86d1a2f28fe96bada35df1508
c90c6ca59378d7e86d1a2f28fe96bada35df1508
Rename the TabContentWrapper pieces to be "TabHelper"s. (Except for the PasswordManager... for now.) Also, just pre-create them up-front. It saves us effort, as they're all going to be eventually created anyway, so being lazy saves us nothing and creates headaches since the rules about what can be lazy differ from feat...
3
chrome/browser/ui/find_bar/find_bar_controller.cc
{"sha": "adc563b70e1411d23c19c0d0f8d743c57b558b67", "filename": "chrome/browser/automation/automation_provider.cc", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/c90c6ca59378d7e86d1a2f28fe96bada35df1508/chrome/browser/automation/automation_pro...
void FindBarController::UpdateFindBarForCurrentResult() { FindTabHelper* find_tab_helper = tab_contents_->find_tab_helper(); const FindNotificationDetails& find_result = find_tab_helper->find_result(); if (find_result.number_of_matches() > -1) { if (last_reported_matchcount_ > 0 && find_result.numb...
void FindBarController::UpdateFindBarForCurrentResult() { FindManager* find_manager = tab_contents_->GetFindManager(); const FindNotificationDetails& find_result = find_manager->find_result(); if (find_result.number_of_matches() > -1) { if (last_reported_matchcount_ > 0 && find_result.number_of_mat...
C
FindTabHelper* find_tab_helper = tab_contents_->find_tab_helper(); const FindNotificationDetails& find_result = find_tab_helper->find_result(); find_bar_->UpdateUIForFindResult(find_result, find_tab_helper->find_text());
FindManager* find_manager = tab_contents_->GetFindManager(); const FindNotificationDetails& find_result = find_manager->find_result(); find_bar_->UpdateUIForFindResult(find_result, find_manager->find_text());
null
@@ -11,7 +11,7 @@ #include "chrome/browser/tab_contents/navigation_entry.h" #include "chrome/browser/ui/find_bar/find_bar.h" #include "chrome/browser/ui/find_bar/find_bar_state.h" -#include "chrome/browser/ui/find_bar/find_manager.h" +#include "chrome/browser/ui/find_bar/find_tab_helper.h" #include "chrome/browser/...
Chrome
c90c6ca59378d7e86d1a2f28fe96bada35df1508
8d61f1c281dd3490e482c63eba56f4787acf42f1
1
void FindBarController::UpdateFindBarForCurrentResult() { //flaw_line_below: FindManager* find_manager = tab_contents_->GetFindManager(); //flaw_line_below: const FindNotificationDetails& find_result = find_manager->find_result(); //fix_flaw_line_below: // FindTabHelper* find_tab_helper = tab_contents_->find_tab_...
136,605
null
Remote
Not required
Partial
CVE-2015-6761
https://www.cvedetails.com/cve/CVE-2015-6761/
CWE-362
Medium
Partial
Partial
null
2015-10-15
6.8
The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possi...
2018-12-21
DoS Mem. Corr.
0
https://github.com/chromium/chromium/commit/fd506b0ac6c7846ae45b5034044fe85c28ee68ac
fd506b0ac6c7846ae45b5034044fe85c28ee68ac
Fix detach with open()ed document leaving parent loading indefinitely Change-Id: I26c2a054b9f1e5eb076acd677e1223058825f6d6 Bug: 803416 Test: fast/loader/document-open-iframe-then-detach.html Change-Id: I26c2a054b9f1e5eb076acd677e1223058825f6d6 Reviewed-on: https://chromium-review.googlesource.com/887298 Reviewed-by: ...
0
third_party/WebKit/Source/core/loader/DocumentLoader.cpp
{"sha": "ef3dbcd3ba3fe8d1797310ac4ba4a02541c06b4b", "filename": "third_party/WebKit/LayoutTests/fast/loader/document-open-iframe-then-detach-expected.txt", "status": "added", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/fd506b0ac6c7846ae45b5034044fe85c28ee68ac/thi...
void DocumentLoader::DidObserveLoadingBehavior( WebLoadingBehaviorFlag behavior) { if (frame_) { DCHECK_GE(state_, kCommitted); GetLocalFrameClient().DidObserveLoadingBehavior(behavior); } }
void DocumentLoader::DidObserveLoadingBehavior( WebLoadingBehaviorFlag behavior) { if (frame_) { DCHECK_GE(state_, kCommitted); GetLocalFrameClient().DidObserveLoadingBehavior(behavior); } }
C
null
null
null
@@ -773,14 +773,15 @@ void DocumentLoader::AppendRedirect(const KURL& url) { redirect_chain_.push_back(url); } -void DocumentLoader::DetachFromFrame() { - DCHECK(frame_); - - // It never makes sense to have a document loader that is detached from its - // frame have any loads active, so go ahead and kill all t...
Chrome
fd506b0ac6c7846ae45b5034044fe85c28ee68ac
913109149534a732bdb5461d0ba2759f5d2f50f4
0
void DocumentLoader::DidObserveLoadingBehavior( WebLoadingBehaviorFlag behavior) { if (frame_) { DCHECK_GE(state_, kCommitted); GetLocalFrameClient().DidObserveLoadingBehavior(behavior); } }
141,993
null
Remote
Not required
Partial
CVE-2016-5185
https://www.cvedetails.com/cve/CVE-2016-5185/
CWE-416
Medium
Partial
Partial
null
2016-12-17
6.8
Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/f2d26633cbd50735ac2af30436888b71ac0abad3
f2d26633cbd50735ac2af30436888b71ac0abad3
[Autofill] Remove AutofillPopupViewViews and associated feature. Bug: 906135,831603 Change-Id: I3c982f8b3ffb4928c7c878e74e10113999106499 Reviewed-on: https://chromium-review.googlesource.com/c/1387124 Reviewed-by: Robert Kaplow <rkaplow@chromium.org> Reviewed-by: Vasilii Sukhanov <vasilii@chromium.org> Reviewed-by: Fa...
0
components/autofill/core/browser/autofill_external_delegate.cc
{"sha": "2a07c46e078e5a63a8a8bf0934d0a0234d4c456d", "filename": "chrome/browser/about_flags.cc", "status": "modified", "additions": 0, "deletions": 5, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/f2d26633cbd50735ac2af30436888b71ac0abad3/chrome/browser/about_flags.cc", "raw_url": "https://github....
bool AutofillExternalDelegate::RemoveSuggestion(const base::string16& value, int identifier) { if (identifier > 0) return manager_->RemoveAutofillProfileOrCreditCard(identifier); if (identifier == POPUP_ITEM_ID_AUTOCOMPLETE_ENTRY) { manager_->RemoveAutocomple...
bool AutofillExternalDelegate::RemoveSuggestion(const base::string16& value, int identifier) { if (identifier > 0) return manager_->RemoveAutofillProfileOrCreditCard(identifier); if (identifier == POPUP_ITEM_ID_AUTOCOMPLETE_ENTRY) { manager_->RemoveAutocomple...
C
null
null
null
@@ -82,17 +82,6 @@ void AutofillExternalDelegate::OnSuggestionsReturned( // Hide warnings as appropriate. PossiblyRemoveAutofillWarnings(&suggestions); -#if !defined(OS_ANDROID) - // If there are above the fold suggestions at this point, add a separator to - // go between the values and menu items. Skip this ...
Chrome
f2d26633cbd50735ac2af30436888b71ac0abad3
1b9e54bfbe066e986efe150e1596112dbaab6652
0
bool AutofillExternalDelegate::RemoveSuggestion(const base::string16& value, int identifier) { if (identifier > 0) return manager_->RemoveAutofillProfileOrCreditCard(identifier); if (identifier == POPUP_ITEM_ID_AUTOCOMPLETE_ENTRY) { manager_->RemoveAutocomple...
70,240
null
Remote
Not required
Partial
CVE-2016-10269
https://www.cvedetails.com/cve/CVE-2016-10269/
CWE-125
Medium
Partial
Partial
null
2017-03-24
6.8
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to *READ of size 512* and libtiff/tif_unix.c:340:2.
2018-03-21
DoS
0
https://github.com/vadz/libtiff/commit/1044b43637fa7f70fb19b93593777b78bd20da86
1044b43637fa7f70fb19b93593777b78bd20da86
* libtiff/tif_pixarlog.c, libtiff/tif_luv.c: fix heap-based buffer overflow on generation of PixarLog / LUV compressed files, with ColorMap, TransferFunction attached and nasty plays with bitspersample. The fix for LUV has not been tested, but suffers from the same kind of issue of PixarLog. Reported by Agostino Sarubb...
0
libtiff/tif_luv.c
{"sha": "93c01f80edf83e0a0d25b8f587a481492f322a80", "filename": "ChangeLog", "status": "modified", "additions": 10, "deletions": 0, "changes": 10, "blob_url": "https://github.com/vadz/libtiff/blob/1044b43637fa7f70fb19b93593777b78bd20da86/ChangeLog", "raw_url": "https://github.com/vadz/libtiff/raw/1044b43637fa7f70fb19b9...
LogLuvDecodeStrip(TIFF* tif, uint8* bp, tmsize_t cc, uint16 s) { tmsize_t rowlen = TIFFScanlineSize(tif); if (rowlen == 0) return 0; assert(cc%rowlen == 0); while (cc && (*tif->tif_decoderow)(tif, bp, rowlen, s)) { bp += rowlen; cc -= rowlen; } return (cc == 0); }
LogLuvDecodeStrip(TIFF* tif, uint8* bp, tmsize_t cc, uint16 s) { tmsize_t rowlen = TIFFScanlineSize(tif); if (rowlen == 0) return 0; assert(cc%rowlen == 0); while (cc && (*tif->tif_decoderow)(tif, bp, rowlen, s)) { bp += rowlen; cc -= rowlen; } return (cc == 0); }
C
null
null
null
@@ -158,6 +158,7 @@ typedef struct logLuvState LogLuvState; struct logLuvState { + int encoder_state; /* 1 if encoder correctly initialized */ int user_datafmt; /* user data format */ int encode_meth; /* encoding method */ int ...
libtiff
1044b43637fa7f70fb19b93593777b78bd20da86
5397a417e61258c69209904e652a1f409ec3b9df
0
LogLuvDecodeStrip(TIFF* tif, uint8* bp, tmsize_t cc, uint16 s) { tmsize_t rowlen = TIFFScanlineSize(tif); if (rowlen == 0) return 0; assert(cc%rowlen == 0); while (cc && (*tif->tif_decoderow)(tif, bp, rowlen, s)) { bp += rowlen; cc -= rowlen; } return (cc == 0); }
168,404
null
Remote
Not required
null
CVE-2018-16080
https://www.cvedetails.com/cve/CVE-2018-16080/
CWE-20
Medium
null
Partial
null
2019-01-09
4.3
A missing check for popup window handling in Fullscreen in Google Chrome on macOS prior to 69.0.3497.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
2019-01-18
null
0
https://github.com/chromium/chromium/commit/c552cd7b8a0862f6b3c8c6a07f98bda3721101eb
c552cd7b8a0862f6b3c8c6a07f98bda3721101eb
Mac: turn popups into new tabs while in fullscreen. It's platform convention to show popups as new tabs while in non-HTML5 fullscreen. (Popups cause tabs to lose HTML5 fullscreen.) This was implemented for Cocoa in a BrowserWindow override, but it makes sense to just stick it into Browser and remove a ton of override...
0
chrome/test/base/test_browser_window.cc
{"sha": "eff931f91d557df3b9e203dd92928ab78333197a", "filename": "chrome/browser/ui/browser.cc", "status": "modified", "additions": 11, "deletions": 0, "changes": 11, "blob_url": "https://github.com/chromium/chromium/blob/c552cd7b8a0862f6b3c8c6a07f98bda3721101eb/chrome/browser/ui/browser.cc", "raw_url": "https://github....
TestBrowserWindow::TestLocationBar::GetPageTransition() const { return ui::PAGE_TRANSITION_LINK; }
TestBrowserWindow::TestLocationBar::GetPageTransition() const { return ui::PAGE_TRANSITION_LINK; }
C
null
null
null
@@ -180,11 +180,6 @@ DownloadShelf* TestBrowserWindow::GetDownloadShelf() { return &download_shelf_; } -WindowOpenDisposition TestBrowserWindow::GetDispositionForPopupBounds( - const gfx::Rect& bounds) { - return WindowOpenDisposition::NEW_POPUP; -} - FindBar* TestBrowserWindow::CreateFindBar() { return N...
Chrome
c552cd7b8a0862f6b3c8c6a07f98bda3721101eb
f2d4f9d463a01cdd194437a3f62f68cab9eadb7f
0
TestBrowserWindow::TestLocationBar::GetPageTransition() const { return ui::PAGE_TRANSITION_LINK; }
17,037
null
Remote
Not required
null
CVE-2016-1586
https://www.cvedetails.com/cve/CVE-2016-1586/
CWE-20
Low
null
Partial
null
2019-04-22
5
A malicious webview could install long-lived unload handlers that re-use an incognito BrowserContext that is queued for destruction in versions of Oxide before 1.18.3.
2019-10-09
null
0
https://git.launchpad.net/oxide/commit/?id=29014da83e5fc358d6bff0f574e9ed45e61a35ac
29014da83e5fc358d6bff0f574e9ed45e61a35ac
null
0
null
null
void OxideQQuickWebViewPrivate::FrameRemoved(QObject* frame) { Q_Q(OxideQQuickWebView); emit q->frameRemoved(qobject_cast<OxideQQuickWebFrame*>(frame)); }
void OxideQQuickWebViewPrivate::FrameRemoved(QObject* frame) { Q_Q(OxideQQuickWebView); emit q->frameRemoved(qobject_cast<OxideQQuickWebFrame*>(frame)); }
CPP
null
null
648e85080604e22bab00b48428b4e80c522cabea
@@ -2042,8 +2042,8 @@ If the application doesn't set this, then WebView will use the application default WebContext (Oxide::defaultWebContext). The application should ensure that the provided WebContext outlives this -WebView. Although WebView will continue to function normally if its provided -WebContext is delete...
launchpad
https://git.launchpad.net/oxide/tree/qt/quick/api/oxideqquickwebview.cc?id=29014da83e5fc358d6bff0f574e9ed45e61a35ac
https://git.launchpad.net/oxide/tree/qt/quick/api/oxideqquickwebview.cc?id=648e85080604e22bab00b48428b4e80c522cabea
0
void OxideQQuickWebViewPrivate::FrameRemoved(QObject* frame) { Q_Q(OxideQQuickWebView); emit q->frameRemoved(qobject_cast<OxideQQuickWebFrame*>(frame)); }
4,072
null
Remote
Not required
Partial
CVE-2013-1790
https://www.cvedetails.com/cve/CVE-2013-1790/
CWE-119
Medium
Partial
Partial
null
2013-04-09
6.8
poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
2014-01-27
Overflow
0
https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91
b1026b5978c385328f2a15a2185c599a563edf91
null
0
null
null
FileStream::~FileStream() { close(); }
FileStream::~FileStream() { close(); }
CPP
null
null
bef2c42f381c74fdb8bbb43babe1a93a0e229fb0
@@ -14,7 +14,7 @@ // under GPL version 2 or later // // Copyright (C) 2005 Jeff Muizelaar <jeff@infidigm.net> -// Copyright (C) 2006-2010, 2012 Albert Astals Cid <aacid@kde.org> +// Copyright (C) 2006-2010, 2012, 2013 Albert Astals Cid <aacid@kde.org> // Copyright (C) 2007 Krzysztof Kowalczyk <kkowalczyk@gmail.com>...
poppler
https://cgit.freedesktop.org/poppler/poppler/tree/poppler/Stream.cc?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91
https://cgit.freedesktop.org/poppler/poppler/tree/poppler/Stream.cc?h=poppler-0.22&id=bef2c42f381c74fdb8bbb43babe1a93a0e229fb0
0
FileStream::~FileStream() { close(); }
102,766
null
Remote
Not required
Partial
CVE-2011-2881
https://www.cvedetails.com/cve/CVE-2011-2881/
CWE-119
Medium
Partial
Partial
null
2011-10-04
6.8
Google Chrome before 14.0.835.202 does not properly handle Google V8 hidden objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
2017-09-18
DoS Overflow Mem. Corr.
0
https://github.com/chromium/chromium/commit/88c4913f11967abfd08a8b22b4423710322ac49b
88c4913f11967abfd08a8b22b4423710322ac49b
[chromium] Fix shutdown race when posting main thread task to CCThreadProxy and enable tests https://bugs.webkit.org/show_bug.cgi?id=70161 Reviewed by David Levin. Source/WebCore: Adds a weak pointer mechanism to cancel main thread tasks posted to CCThreadProxy instances from the compositor thread. Previously there ...
0
third_party/WebKit/Source/WebKit/chromium/tests/CCLayerTreeHostTest.cpp
{"sha": "1d3fae6819d78c4df92427aa27758554fbeda852", "filename": "third_party/WebKit/Source/WebCore/ChangeLog", "status": "modified", "additions": 30, "deletions": 0, "changes": 30, "blob_url": "https://github.com/chromium/chromium/blob/88c4913f11967abfd08a8b22b4423710322ac49b/third_party/WebKit/Source/WebCore/ChangeLog...
virtual void commitComplete() { CCLayerTreeHostImpl::commitComplete(); m_testHooks->commitCompleteOnCCThread(this); }
virtual void commitComplete() { CCLayerTreeHostImpl::commitComplete(); m_testHooks->commitCompleteOnCCThread(this); }
C
null
null
null
@@ -24,13 +24,12 @@ #include "config.h" -#if USE(THREADED_COMPOSITING) - #include "cc/CCLayerTreeHost.h" #include "cc/CCLayerImpl.h" #include "cc/CCLayerTreeHostImpl.h" #include "cc/CCMainThreadTask.h" +#include "cc/CCScopedMainThreadProxy.h" #include "cc/CCThreadTask.h" #include "GraphicsContext3DPrivate....
Chrome
88c4913f11967abfd08a8b22b4423710322ac49b
a12059c05d115350633d6ca4275780eb37a98f68
0
virtual void commitComplete() { CCLayerTreeHostImpl::commitComplete(); m_testHooks->commitCompleteOnCCThread(this); }
36,007
null
Remote
Not required
Complete
CVE-2014-7145
https://www.cvedetails.com/cve/CVE-2014-7145/
CWE-399
Low
null
null
null
2014-09-28
7.8
The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.
2016-08-24
DoS
0
https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
18f39e7be0121317550d03e267e3ebd4dbfbb3ce
[CIFS] Possible null ptr deref in SMB2_tcon As Raphael Geissert pointed out, tcon_error_exit can dereference tcon and there is one path in which tcon can be null. Signed-off-by: Steve French <smfrench@gmail.com> CC: Stable <stable@vger.kernel.org> # v3.7+ Reported-by: Raphael Geissert <geissert@debian.org>
0
fs/cifs/smb2pdu.c
{"sha": "240c627bc0c6619a55423428eec4c7b941365acf", "filename": "fs/cifs/smb2pdu.c", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/torvalds/linux/blob/18f39e7be0121317550d03e267e3ebd4dbfbb3ce/fs/cifs/smb2pdu.c", "raw_url": "https://github.com/torvalds/linux/raw/18f3...
smb2_echo_callback(struct mid_q_entry *mid) { struct TCP_Server_Info *server = mid->callback_data; struct smb2_echo_rsp *smb2 = (struct smb2_echo_rsp *)mid->resp_buf; unsigned int credits_received = 1; if (mid->mid_state == MID_RESPONSE_RECEIVED) credits_received = le16_to_cpu(smb2->hdr.CreditRequest); DeleteM...
smb2_echo_callback(struct mid_q_entry *mid) { struct TCP_Server_Info *server = mid->callback_data; struct smb2_echo_rsp *smb2 = (struct smb2_echo_rsp *)mid->resp_buf; unsigned int credits_received = 1; if (mid->mid_state == MID_RESPONSE_RECEIVED) credits_received = le16_to_cpu(smb2->hdr.CreditRequest); DeleteM...
C
null
null
null
@@ -907,7 +907,8 @@ SMB2_tcon(const unsigned int xid, struct cifs_ses *ses, const char *tree, tcon_error_exit: if (rsp->hdr.Status == STATUS_BAD_NETWORK_NAME) { cifs_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree); - tcon->bad_network_name = true; + if (tcon) + tcon->bad_network_name = true; } goto tcon_exit; }
linux
18f39e7be0121317550d03e267e3ebd4dbfbb3ce
754789a1c046106cfdb067102642f73e0fd35fb3
0
smb2_echo_callback(struct mid_q_entry *mid) { struct TCP_Server_Info *server = mid->callback_data; struct smb2_echo_rsp *smb2 = (struct smb2_echo_rsp *)mid->resp_buf; unsigned int credits_received = 1; if (mid->mid_state == MID_RESPONSE_RECEIVED) credits_received = le16_to_cpu(smb2->hdr.CreditRequest); DeleteM...
132,699
null
Remote
Not required
Partial
CVE-2014-1700
https://www.cvedetails.com/cve/CVE-2014-1700/
CWE-399
Low
Partial
Partial
null
2014-03-16
7.5
Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure.
2017-01-06
DoS
0
https://github.com/chromium/chromium/commit/685c3980d31b5199924086b8c93a1ce751d24733
685c3980d31b5199924086b8c93a1ce751d24733
content: Rename webkit_test_helpers.{cc,h} to blink_test_helpers.{cc,h} Now that webkit/ is gone, we are preparing ourselves for the merge of third_party/WebKit into //blink. BUG=None BUG=content_shell && content_unittests R=avi@chromium.org Review URL: https://codereview.chromium.org/1118183003 Cr-Commit-Position:...
0
content/shell/renderer/layout_test/layout_test_content_renderer_client.cc
{"sha": "5a9805e6009278dfd2a1ad70452673ffee55947e", "filename": "content/DEPS", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/685c3980d31b5199924086b8c93a1ce751d24733/content/DEPS", "raw_url": "https://github.com/chromium/chromium/raw/685c3980...
WebClipboard* LayoutTestContentRendererClient::OverrideWebClipboard() { if (!clipboard_) clipboard_.reset(new MockWebClipboardImpl); return clipboard_.get(); }
WebClipboard* LayoutTestContentRendererClient::OverrideWebClipboard() { if (!clipboard_) clipboard_.reset(new MockWebClipboardImpl); return clipboard_.get(); }
C
null
null
null
@@ -13,7 +13,7 @@ #include "content/public/renderer/render_view.h" #include "content/public/test/layouttest_support.h" #include "content/shell/common/shell_switches.h" -#include "content/shell/common/webkit_test_helpers.h" +#include "content/shell/renderer/layout_test/blink_test_helpers.h" #include "content/shell/r...
Chrome
685c3980d31b5199924086b8c93a1ce751d24733
0fa5b759d2bbd5c074277e2a13e6a765da031af4
0
WebClipboard* LayoutTestContentRendererClient::OverrideWebClipboard() { if (!clipboard_) clipboard_.reset(new MockWebClipboardImpl); return clipboard_.get(); }
103,668
null
Remote
Not required
Partial
CVE-2011-2861
https://www.cvedetails.com/cve/CVE-2011-2861/
CWE-20
Medium
Partial
Partial
null
2011-09-19
6.8
Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce
8262245d384be025f13e2a5b3a03b7e5c98374ce
DevTools: move DevToolsAgent/Client into content. BUG=84078 TEST= Review URL: http://codereview.chromium.org/7461019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@93596 0039d316-1c4b-4281-b951-d872f2087c98
0
content/browser/renderer_host/browser_render_process_host.cc
{"sha": "24059d48a3bcbe447efb7408f77415576f0c36a4", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/8262245d384be025f13e2a5b3a03b7e5c98374ce/chrome/browser/chrome_content_browser_cli...
virtual net::URLRequestContext* GetRequestContext( ResourceType::Type resource_type) { net::URLRequestContextGetter* request_context = request_context_; if (resource_type == ResourceType::MEDIA) request_context = media_request_context_; return request_context->GetURLRequestContext(); }
virtual net::URLRequestContext* GetRequestContext( ResourceType::Type resource_type) { net::URLRequestContextGetter* request_context = request_context_; if (resource_type == ResourceType::MEDIA) request_context = media_request_context_; return request_context->GetURLRequestContext(); }
C
null
null
null
@@ -576,6 +576,7 @@ void BrowserRenderProcessHost::PropagateBrowserCommandLineToRenderer( switches::kPpapiOutOfProcess, switches::kRecordMode, switches::kRegisterPepperPlugins, + switches::kRemoteShellPort, switches::kRendererAssertTest, #if !defined(OFFICIAL_BUILD) switches::kRendererCheck...
Chrome
8262245d384be025f13e2a5b3a03b7e5c98374ce
2469a22063c3539147f55fe899a8dabc12901c01
0
virtual net::URLRequestContext* GetRequestContext( ResourceType::Type resource_type) { net::URLRequestContextGetter* request_context = request_context_; // If the request has resource type of ResourceType::MEDIA, we use a request // context specific to media for handling it because these resources h...
112,813
null
Remote
Not required
null
CVE-2012-2891
https://www.cvedetails.com/cve/CVE-2012-2891/
CWE-200
Low
Partial
null
null
2012-09-26
5
The IPC implementation in Google Chrome before 22.0.1229.79 allows attackers to obtain potentially sensitive information about memory addresses via unspecified vectors.
2017-09-18
+Info
0
https://github.com/chromium/chromium/commit/116d0963cadfbf55ef2ec3d13781987c4d80517a
116d0963cadfbf55ef2ec3d13781987c4d80517a
Print preview: Use an ID instead of memory pointer string in WebUI. BUG=144051 Review URL: https://chromiumcodereview.appspot.com/10870003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@153342 0039d316-1c4b-4281-b951-d872f2087c98
0
chrome/renderer/chrome_mock_render_thread.cc
{"sha": "c03c51998e84b755a01af37f111faec14f227eb0", "filename": "chrome/browser/printing/print_preview_data_service.cc", "status": "modified", "additions": 21, "deletions": 27, "changes": 48, "blob_url": "https://github.com/chromium/chromium/blob/116d0963cadfbf55ef2ec3d13781987c4d80517a/chrome/browser/printing/print_pr...
void ChromeMockRenderThread::OnTempFileForPrintingWritten(int render_view_id, int browser_fd) { close(browser_fd); }
void ChromeMockRenderThread::OnTempFileForPrintingWritten(int render_view_id, int browser_fd) { close(browser_fd); }
C
null
null
null
@@ -4,20 +4,23 @@ #include "chrome/renderer/chrome_mock_render_thread.h" -#include <fcntl.h> +#include <vector> -#include "base/file_util.h" -#include "base/process_util.h" +#include "base/values.h" #include "chrome/common/extensions/extension_messages.h" #include "chrome/common/print_messages.h" -#include "ch...
Chrome
116d0963cadfbf55ef2ec3d13781987c4d80517a
0ccc7e3af6db2fc2ce09ebcd780dace294adeb61
0
void ChromeMockRenderThread::OnTempFileForPrintingWritten(int render_view_id, int browser_fd) { close(browser_fd); }
57,136
null
Remote
Not required
Partial
CVE-2015-8746
https://www.cvedetails.com/cve/CVE-2015-8746/
null
Low
null
null
null
2016-05-02
5
fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic.
2018-01-04
DoS
0
https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da
18e3b739fdc826481c6a1335ce0c5b19b3d415da
NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client ---Steps to Reproduce-- <nfs-server> # cat /etc/exports /nfs/referal *(rw,insecure,no_subtree_check,no_root_squash,crossmnt) /nfs/old *(ro,insecure,subtree_check,root_squash,crossmnt) <nfs-client> # mount -t nfs nfs-server:/nfs/ /mnt/...
0
fs/nfs/nfs4proc.c
{"sha": "43bace809be7dfb5c23c893ff3ae0d22b42efffa", "filename": "fs/nfs/nfs4proc.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/18e3b739fdc826481c6a1335ce0c5b19b3d415da/fs/nfs/nfs4proc.c", "raw_url": "https://github.com/torvalds/linux/raw/18e3...
nfs4_init_nonuniform_client_string(struct nfs_client *clp) { int result; size_t len; char *str; bool retried = false; if (clp->cl_owner_id != NULL) return 0; retry: rcu_read_lock(); len = 10 + strlen(clp->cl_ipaddr) + 1 + strlen(rpc_peeraddr2str(clp->cl_rpcclient, RPC_DISPLAY_ADDR)) + 1 + strlen(rpc_pee...
nfs4_init_nonuniform_client_string(struct nfs_client *clp) { int result; size_t len; char *str; bool retried = false; if (clp->cl_owner_id != NULL) return 0; retry: rcu_read_lock(); len = 10 + strlen(clp->cl_ipaddr) + 1 + strlen(rpc_peeraddr2str(clp->cl_rpcclient, RPC_DISPLAY_ADDR)) + 1 + strlen(rpc_pee...
C
null
null
null
@@ -8661,6 +8661,7 @@ static const struct nfs4_minor_version_ops nfs_v4_2_minor_ops = { .reboot_recovery_ops = &nfs41_reboot_recovery_ops, .nograce_recovery_ops = &nfs41_nograce_recovery_ops, .state_renewal_ops = &nfs41_state_renewal_ops, + .mig_recovery_ops = &nfs41_mig_recovery_ops, }; #endif
linux
18e3b739fdc826481c6a1335ce0c5b19b3d415da
0847ef88c3c9318d85e92fc42369df0e0190e1ab
0
nfs4_init_nonuniform_client_string(struct nfs_client *clp) { int result; size_t len; char *str; bool retried = false; if (clp->cl_owner_id != NULL) return 0; retry: rcu_read_lock(); len = 10 + strlen(clp->cl_ipaddr) + 1 + strlen(rpc_peeraddr2str(clp->cl_rpcclient, RPC_DISPLAY_ADDR)) + 1 + strlen(rpc_pee...
120,523
null
Remote
Not required
Partial
CVE-2013-2884
https://www.cvedetails.com/cve/CVE-2013-2884/
CWE-399
Low
Partial
Partial
null
2013-07-31
7.5
Use-after-free vulnerability in the DOM implementation in Google Chrome before 28.0.1500.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper tracking of which document owns an Attr object.
2017-09-18
DoS
0
https://github.com/chromium/chromium/commit/4ac8bc08e3306f38a5ab3e551aef6ad43753579c
4ac8bc08e3306f38a5ab3e551aef6ad43753579c
Set Attr.ownerDocument in Element#setAttributeNode() Attr objects can move across documents by setAttributeNode(). So It needs to reset ownerDocument through TreeScopeAdoptr::adoptIfNeeded(). BUG=248950 TEST=set-attribute-node-from-iframe.html Review URL: https://chromiumcodereview.appspot.com/17583003 git-svn-id: ...
0
third_party/WebKit/Source/core/dom/Element.cpp
{"sha": "accc3ae56534fa3669de3bbb2543911df0a20ebd", "filename": "third_party/WebKit/LayoutTests/fast/dom/Attr/set-attribute-node-from-iframe-expected.txt", "status": "added", "additions": 12, "deletions": 0, "changes": 12, "blob_url": "https://github.com/chromium/chromium/blob/4ac8bc08e3306f38a5ab3e551aef6ad43753579c/t...
size_t ElementData::getAttrIndex(Attr* attr) const { for (unsigned i = 0; i < length(); ++i) { if (attributeItem(i)->name() == attr->qualifiedName()) return i; } return notFound; }
size_t ElementData::getAttrIndex(Attr* attr) const { for (unsigned i = 0; i < length(); ++i) { if (attributeItem(i)->name() == attr->qualifiedName()) return i; } return notFound; }
C
null
null
null
@@ -1809,6 +1809,7 @@ PassRefPtr<Attr> Element::setAttributeNode(Attr* attrNode, ExceptionCode& ec) setAttributeInternal(index, attrNode->qualifiedName(), attrNode->value(), NotInSynchronizationOfLazyAttribute); attrNode->attachToElement(this); + treeScope()->adoptIfNeeded(attrNode); ensureAttrNodeL...
Chrome
4ac8bc08e3306f38a5ab3e551aef6ad43753579c
a8ece285c70c60709aa8e33a9d4b58bb88401301
0
size_t ElementData::getAttrIndex(Attr* attr) const { // This relies on the fact that Attr's QualifiedName == the Attribute's name. for (unsigned i = 0; i < length(); ++i) { if (attributeItem(i)->name() == attr->qualifiedName()) return i; } return notFound; }
70,588
null
Remote
Not required
Partial
CVE-2016-10197
https://www.cvedetails.com/cve/CVE-2016-10197/
CWE-125
Low
null
null
null
2017-03-15
5
The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.
2018-01-04
DoS
0
https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e
ec65c42052d95d2c23d1d837136d1cf1d9ecef9e
evdns: fix searching empty hostnames From #332: Here follows a bug report by **Guido Vranken** via the _Tor bug bounty program_. Please credit Guido accordingly. ## Bug report The DNS code of Libevent contains this rather obvious OOB read: ```c static char * search_make_new(const struct search_state *co...
0
evdns.c
{"sha": "e9dbc35c60662ccda395d21d95997193840b4b57", "filename": "evdns.c", "status": "modified", "additions": 4, "deletions": 1, "changes": 5, "blob_url": "https://github.com/libevent/libevent/blob/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e/evdns.c", "raw_url": "https://github.com/libevent/libevent/raw/ec65c42052d95d2c23...
evdns_base_resolv_conf_parse(struct evdns_base *base, int flags, const char *const filename) { int res; EVDNS_LOCK(base); res = evdns_base_resolv_conf_parse_impl(base, flags, filename); EVDNS_UNLOCK(base); return res; }
evdns_base_resolv_conf_parse(struct evdns_base *base, int flags, const char *const filename) { int res; EVDNS_LOCK(base); res = evdns_base_resolv_conf_parse_impl(base, flags, filename); EVDNS_UNLOCK(base); return res; }
C
null
null
null
@@ -3175,9 +3175,12 @@ search_set_from_hostname(struct evdns_base *base) { static char * search_make_new(const struct search_state *const state, int n, const char *const base_name) { const size_t base_len = strlen(base_name); - const char need_to_append_dot = base_name[base_len - 1] == '.' ? 0 : 1; + char need_to_a...
libevent
ec65c42052d95d2c23d1d837136d1cf1d9ecef9e
d7348bab602cf4dbdf65b9eeba2fb9ce4646bc0b
0
evdns_base_resolv_conf_parse(struct evdns_base *base, int flags, const char *const filename) { int res; EVDNS_LOCK(base); res = evdns_base_resolv_conf_parse_impl(base, flags, filename); EVDNS_UNLOCK(base); return res; }
67,022
null
Remote
Not required
Partial
CVE-2017-7865
https://www.cvedetails.com/cve/CVE-2017-7865/
CWE-787
Low
Partial
Partial
null
2017-04-14
7.5
FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c.
2017-04-20
Overflow
0
https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb
2080bc33717955a0e4268e738acf8c1eeddbf8cb
avcodec/utils: correct align value for interplay Fixes out of array access Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
libavcodec/utils.c
{"sha": "4ae752ff2ffad74045545b8e4ac3d4c28eec5834", "filename": "libavcodec/utils.c", "status": "modified", "additions": 6, "deletions": 1, "changes": 7, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/2080bc33717955a0e4268e738acf8c1eeddbf8cb/libavcodec/utils.c", "raw_url": "https://github.com/FFmpeg/FFmpeg/raw/2080...
int ff_decode_frame_props(AVCodecContext *avctx, AVFrame *frame) { return ff_init_buffer_info(avctx, frame); }
int ff_decode_frame_props(AVCodecContext *avctx, AVFrame *frame) { return ff_init_buffer_info(avctx, frame); }
C
null
null
null
@@ -376,6 +376,10 @@ void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height, w_align = 4; h_align = 4; } + if (s->codec_id == AV_CODEC_ID_INTERPLAY_VIDEO) { + w_align = 8; + h_align = 8; + } break; case AV_PIX_FMT_PA...
FFmpeg
2080bc33717955a0e4268e738acf8c1eeddbf8cb
0b607228bf7260a13404ef98bf87bafeaeecbfa8
0
int ff_decode_frame_props(AVCodecContext *avctx, AVFrame *frame) { return ff_init_buffer_info(avctx, frame); }
115,993
null
Remote
Not required
Partial
CVE-2011-3104
https://www.cvedetails.com/cve/CVE-2011-3104/
CWE-119
Low
null
null
null
2012-05-24
5
Skia, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
2017-09-18
DoS Overflow
0
https://github.com/chromium/chromium/commit/6b5f83842b5edb5d4bd6684b196b3630c6769731
6b5f83842b5edb5d4bd6684b196b3630c6769731
[i18n-fixlet] Make strings branding specific in extension code. IDS_EXTENSIONS_UNINSTALL IDS_EXTENSIONS_INCOGNITO_WARNING IDS_EXTENSION_INSTALLED_HEADING IDS_EXTENSION_ALERT_ITEM_EXTERNAL And fix a $1 $1 bug. IDS_EXTENSION_INLINE_INSTALL_PROMPT_TITLE BUG=NONE TEST=NONE Review URL: http://codereview.chromium.org/910...
0
chrome/browser/extensions/extension_global_error.cc
{"sha": "17b94b5b0bab3a87c084c439a04d43039f47cd62", "filename": "chrome/app/chromium_strings.grd", "status": "modified", "additions": 24, "deletions": 0, "changes": 24, "blob_url": "https://github.com/chromium/chromium/blob/6b5f83842b5edb5d4bd6684b196b3630c6769731/chrome/app/chromium_strings.grd", "raw_url": "https://g...
void ExtensionGlobalError::BubbleViewAcceptButtonPressed() { if (!accept_callback_.is_null()) { accept_callback_.Run(*this, current_browser_); } }
void ExtensionGlobalError::BubbleViewAcceptButtonPressed() { if (!accept_callback_.is_null()) { accept_callback_.Run(*this, current_browser_); } }
C
null
null
null
@@ -1,4 +1,4 @@ -// Copyright (c) 2011 The Chromium Authors. All rights reserved. +// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. @@ -98,10 +98,8 @@ string16 ExtensionGlobalError::GenerateMessag...
Chrome
6b5f83842b5edb5d4bd6684b196b3630c6769731
2a7d8183360056520958b908ebec80948b83f2d1
0
void ExtensionGlobalError::BubbleViewAcceptButtonPressed() { if (!accept_callback_.is_null()) { accept_callback_.Run(*this, current_browser_); } }
15,200
null
Remote
Not required
null
CVE-2015-3412
https://www.cvedetails.com/cve/CVE-2015-3412/
CWE-254
Low
Partial
null
null
2016-05-16
5
PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filena...
2019-04-22
Bypass
0
https://git.php.net/?p=php-src.git;a=commit;h=4435b9142ff9813845d5c97ab29a5d637bedb257
4435b9142ff9813845d5c97ab29a5d637bedb257
null
0
null
null
static void php_image_filter_gaussian_blur(INTERNAL_FUNCTION_PARAMETERS) { PHP_GD_SINGLE_RES if (gdImageGaussianBlur(im_src) == 1) { RETURN_TRUE; } RETURN_FALSE; }
static void php_image_filter_gaussian_blur(INTERNAL_FUNCTION_PARAMETERS) { PHP_GD_SINGLE_RES if (gdImageGaussianBlur(im_src) == 1) { RETURN_TRUE; } RETURN_FALSE; }
C
null
null
9faaee66fa493372c7340b1ab05f8fd115131a42
@@ -1495,7 +1495,7 @@ PHP_FUNCTION(imageloadfont) gdFontPtr font; php_stream *stream; - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", &file, &file_name) == FAILURE) { + if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "p", &file, &file_name) == FAILURE) { re...
php
https://git.php.net/?p=php-src.git;a=blob;f=ext/gd/gd.c;h=d258c3dbc7862534762d3640688f1b980c031459;hb=4435b9142ff9813845d5c97ab29a5d637bedb257
https://git.php.net/?p=php-src.git;a=blob;f=ext/gd/gd.c;h=e5657f7424ab30c8f3ca7ec73e9201375d1fab39
0
static void php_image_filter_gaussian_blur(INTERNAL_FUNCTION_PARAMETERS) { PHP_GD_SINGLE_RES if (gdImageGaussianBlur(im_src) == 1) { RETURN_TRUE; } RETURN_FALSE; }
64,630
null
Local
Not required
Complete
CVE-2017-9242
https://www.cvedetails.com/cve/CVE-2017-9242/
CWE-20
Low
null
null
null
2017-05-26
4.9
The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
2018-01-04
DoS
0
https://github.com/torvalds/linux/commit/232cd35d0804cc241eb887bb8d4d9b3b9881c64a
232cd35d0804cc241eb887bb8d4d9b3b9881c64a
ipv6: fix out of bound writes in __ip6_append_data() Andrey Konovalov and idaifish@gmail.com reported crashes caused by one skb shared_info being overwritten from __ip6_append_data() Andrey program lead to following state : copy -4200 datalen 2000 fraglen 2040 maxfraglen 2040 alloclen 2048 transhdrlen 0 offset 0 fra...
0
net/ipv6/ip6_output.c
{"sha": "bf8a58a1c32d83a9605844075da5815be23a6bf1", "filename": "net/ipv6/ip6_output.c", "status": "modified", "additions": 8, "deletions": 7, "changes": 15, "blob_url": "https://github.com/torvalds/linux/blob/232cd35d0804cc241eb887bb8d4d9b3b9881c64a/net/ipv6/ip6_output.c", "raw_url": "https://github.com/torvalds/linux...
static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, struct dst_entry **dst, struct flowi6 *fl6) { #ifdef CONFIG_IPV6_OPTIMISTIC_DAD struct neighbour *n; struct rt6_info *rt; #endif int err; int flags = 0; /* The correct way to handle this would be to do * ip6_route_get_saddr, and th...
static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, struct dst_entry **dst, struct flowi6 *fl6) { #ifdef CONFIG_IPV6_OPTIMISTIC_DAD struct neighbour *n; struct rt6_info *rt; #endif int err; int flags = 0; /* The correct way to handle this would be to do * ip6_route_get_saddr, and th...
C
null
null
null
@@ -1466,6 +1466,11 @@ static int __ip6_append_data(struct sock *sk, */ alloclen += sizeof(struct frag_hdr); + copy = datalen - transhdrlen - fraggap; + if (copy < 0) { + err = -EINVAL; + goto error; + } if (transhdrlen) { skb = sock_alloc_send_skb(sk, alloclen + hh_len, @@ -1515,...
linux
232cd35d0804cc241eb887bb8d4d9b3b9881c64a
6d18c732b95c0a9d35e9f978b4438bba15412284
0
static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, struct dst_entry **dst, struct flowi6 *fl6) { #ifdef CONFIG_IPV6_OPTIMISTIC_DAD struct neighbour *n; struct rt6_info *rt; #endif int err; int flags = 0; /* The correct way to handle this would be to do * ip6_route_get_saddr, and th...
30,004
null
Local
Not required
Complete
CVE-2013-4129
https://www.cvedetails.com/cve/CVE-2013-4129/
CWE-20
Medium
null
null
null
2013-07-29
4.7
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne...
2017-08-28
DoS
0
https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
bridge: fix some kernel warning in multicast timer Several people reported the warning: "kernel BUG at kernel/timer.c:729!" and the stack trace is: #7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905 #8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge] #9 [ffff880214d25c80] br_mul...
0
net/bridge/br_multicast.c
{"sha": "0daae3ec2355543bce3600001db5fd32cf6d6ff7", "filename": "net/bridge/br_mdb.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1/net/bridge/br_mdb.c", "raw_url": "https://github.com/torvalds/linux/raw/...
static struct net_bridge_mdb_entry *br_mdb_ip6_get( struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst, __u16 vid) { struct br_ip br_dst; br_dst.u.ip6 = *dst; br_dst.proto = htons(ETH_P_IPV6); br_dst.vid = vid; return br_mdb_ip_get(mdb, &br_dst); }
static struct net_bridge_mdb_entry *br_mdb_ip6_get( struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst, __u16 vid) { struct br_ip br_dst; br_dst.u.ip6 = *dst; br_dst.proto = htons(ETH_P_IPV6); br_dst.vid = vid; return br_mdb_ip_get(mdb, &br_dst); }
C
null
null
null
@@ -270,7 +270,7 @@ static void br_multicast_del_pg(struct net_bridge *br, del_timer(&p->timer); call_rcu_bh(&p->rcu, br_multicast_free_pg); - if (!mp->ports && !mp->mglist && + if (!mp->ports && !mp->mglist && mp->timer_armed && netif_running(br->dev)) mod_timer(&mp->timer, jiffies);
linux
c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1
734d4e159b283a4ae4d007b7e7a91d84398ccb92
0
static struct net_bridge_mdb_entry *br_mdb_ip6_get( struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst, __u16 vid) { struct br_ip br_dst; br_dst.u.ip6 = *dst; br_dst.proto = htons(ETH_P_IPV6); br_dst.vid = vid; return br_mdb_ip_get(mdb, &br_dst); }
50,231
null
Remote
Not required
Partial
CVE-2016-7124
https://www.cvedetails.com/cve/CVE-2016-7124/
CWE-502
Low
Partial
Partial
null
2016-09-11
7.5
ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
2018-01-04
DoS
0
https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
Fix bug #72663 - destroy broken object when unserializing (cherry picked from commit 448c9be157f4147e121f1a2a524536c75c9c6059)
0
ext/standard/var_unserializer.c
{"sha": "e61f939d4dbef881c33b8eb6bfb809a70c479f16", "filename": "ext/standard/tests/strings/bug72663.phpt", "status": "added", "additions": 26, "deletions": 0, "changes": 26, "blob_url": "https://github.com/php/php-src/blob/20ce2fe8e3c211a42fee05a461a5881be9a8790e/ext/standard/tests/strings/bug72663.phpt", "raw_url": "...
static zend_always_inline int process_nested_data(UNSERIALIZE_PARAMETER, HashTable *ht, zend_long elements, int objprops) { while (elements-- > 0) { zval key, *data, d, *old_data; zend_ulong idx; ZVAL_UNDEF(&key); if (!php_var_unserialize_internal(&key, p, max, NULL, classes)) { zval_dtor(&key); return...
static zend_always_inline int process_nested_data(UNSERIALIZE_PARAMETER, HashTable *ht, zend_long elements, int objprops) { while (elements-- > 0) { zval key, *data, d, *old_data; zend_ulong idx; ZVAL_UNDEF(&key); if (!php_var_unserialize_internal(&key, p, max, NULL, classes)) { zval_dtor(&key); return...
C
null
null
null
@@ -1,4 +1,4 @@ -/* Generated by re2c 0.13.5 */ +/* Generated by re2c 0.13.7.5 */ #line 1 "ext/standard/var_unserializer.re" /* +----------------------------------------------------------------------+ @@ -687,7 +687,8 @@ static int php_var_unserialize_internal(UNSERIALIZE_PARAMETER) if (yybm[0+yych] & 128) { ...
php-src
20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
8d7766a948999b990dbd13f96fa845a26d6f8f66
0
static zend_always_inline int process_nested_data(UNSERIALIZE_PARAMETER, HashTable *ht, zend_long elements, int objprops) { while (elements-- > 0) { zval key, *data, d, *old_data; zend_ulong idx; ZVAL_UNDEF(&key); if (!php_var_unserialize_internal(&key, p, max, NULL, classes)) { zval_dtor(&key); return...
176,709
null
Remote
Not required
Complete
CVE-2015-3835
https://www.cvedetails.com/cve/CVE-2015-3835/
CWE-119
Medium
Complete
Complete
null
2015-09-30
9.3
Buffer overflow in the OMXNodeInstance::emptyBuffer function in omx/OMXNodeInstance.cpp in libstagefright in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 20634516.
2015-10-01
Exec Code Overflow
0
https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab
086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab
IOMX: Add buffer range check to emptyBuffer Bug: 20634516 Change-Id: If351dbd573bb4aeb6968bfa33f6d407225bc752c (cherry picked from commit d971df0eb300356b3c995d533289216f43aa60de)
0
media/libstagefright/omx/OMXNodeInstance.cpp
{"filename": "media/libstagefright/omx/OMXNodeInstance.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab/media/libstagefright/omx/OMXNodeInstance.cpp", "patch": "@@ -980,6 +980,12 @@\n\n Mutex::Autolock autoLock(mLock);\n \n OMX_BUFFERHEADERTYPE...
OMX_BUFFERHEADERTYPE *OMXNodeInstance::findBufferHeader(OMX::buffer_id buffer) { return (OMX_BUFFERHEADERTYPE *)buffer; }
OMX_BUFFERHEADERTYPE *OMXNodeInstance::findBufferHeader(OMX::buffer_id buffer) { return (OMX_BUFFERHEADERTYPE *)buffer; }
C
null
null
null
@@ -980,6 +980,12 @@ Mutex::Autolock autoLock(mLock); OMX_BUFFERHEADERTYPE *header = findBufferHeader(buffer); + // rangeLength and rangeOffset must be a subset of the allocated data in the buffer. + // corner case: we permit rangeOffset == end-of-buffer with rangeLength == 0. + if (rangeOffset > ...
Android
https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab/
https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab%5E/
0
OMX_BUFFERHEADERTYPE *OMXNodeInstance::findBufferHeader(OMX::buffer_id buffer) { return (OMX_BUFFERHEADERTYPE *)buffer; }
9,804
null
Remote
Not required
Partial
CVE-2014-6269
https://www.cvedetails.com/cve/CVE-2014-6269/
CWE-189
Low
null
null
null
2014-09-30
5
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
2014-10-02
DoS Overflow
0
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
b4d05093bc89f71377230228007e69a1434c1a0c
null
0
null
null
int http_process_tarpit(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; /* This connection is being tarpitted. The CLIENT side has * already set the connect expiration date to the right * timeout. We just have to check that the client is still * there and that the timeout ...
int http_process_tarpit(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; /* This connection is being tarpitted. The CLIENT side has * already set the connect expiration date to the right * timeout. We just have to check that the client is still * there and that the timeout ...
C
null
null
2c8d700e8af297a813db1eaae5d45b7b07ac72b6
@@ -4886,8 +4886,8 @@ void http_end_txn_clean_session(struct session *s) s->req->cons->conn_retries = 0; /* used for logging too */ s->req->cons->exp = TICK_ETERNITY; s->req->cons->flags &= SI_FL_DONT_WAKE; /* we're in the context of process_session */ - s->req->flags &= ~(CF_SHU...
haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=blob;f=src/proto_http.c;h=4d27b2c89db01df9e7f9f50932cd66267cdbf232;hb=b4d05093bc89f71377230228007e69a1434c1a0c
https://git.haproxy.org/?p=haproxy-1.5.git;a=blob;f=src/proto_http.c;h=a47f0a1e35e4b6d10e4f1672c7a397f0e50a1454
0
int http_process_tarpit(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; /* This connection is being tarpitted. The CLIENT side has * already set the connect expiration date to the right * timeout. We just have to check that the client is still * there and that the timeout ...
161,685
null
Remote
Not required
Partial
CVE-2018-6061
https://www.cvedetails.com/cve/CVE-2018-6061/
CWE-362
High
Partial
Partial
null
2018-11-14
5.1
A race in the handling of SharedArrayBuffers in WebAssembly in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2018-12-19
null
0
https://github.com/chromium/chromium/commit/70340ce072cee8a0bdcddb5f312d32567b2269f6
70340ce072cee8a0bdcddb5f312d32567b2269f6
vaapi vda: Delete owned objects on worker thread in Cleanup() This CL adds a SEQUENCE_CHECKER to Vaapi*Accelerator classes, and posts the destruction of those objects to the appropriate thread on Cleanup(). Also makes {H264,VP8,VP9}Picture RefCountedThreadSafe, see miu@ comment in https://chromium-review.googlesource...
0
media/gpu/vaapi/vaapi_video_decode_accelerator.cc
{"sha": "3841842656ff84683b319eea25079943ddb17857", "filename": "media/gpu/h264_dpb.h", "status": "modified", "additions": 3, "deletions": 2, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/70340ce072cee8a0bdcddb5f312d32567b2269f6/media/gpu/h264_dpb.h", "raw_url": "https://github.com/chromium/chrom...
bool IsFlushRequest() const { return shm_ == nullptr; }
bool IsFlushRequest() const { return shm_ == nullptr; }
C
null
null
null
@@ -171,6 +171,8 @@ class VaapiVideoDecodeAccelerator::VaapiH264Accelerator VaapiWrapper* vaapi_wrapper_; VaapiVideoDecodeAccelerator* vaapi_dec_; + SEQUENCE_CHECKER(sequence_checker_); + DISALLOW_COPY_AND_ASSIGN(VaapiH264Accelerator); }; @@ -218,6 +220,8 @@ class VaapiVideoDecodeAccelerator::VaapiVP8Acc...
Chrome
70340ce072cee8a0bdcddb5f312d32567b2269f6
56e11d791c805e69a79704748a040c2959d88293
0
bool IsFlushRequest() const { return shm_ == nullptr; }
161,418
null
Remote
Not required
Partial
CVE-2018-6111
https://www.cvedetails.com/cve/CVE-2018-6111/
CWE-20
Medium
Partial
Partial
null
2019-01-09
6.8
An object lifetime issue in the developer tools network handler in Google Chrome prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via a crafted HTML page.
2019-01-16
Exec Code
0
https://github.com/chromium/chromium/commit/3c8e4852477d5b1e2da877808c998dc57db9460f
3c8e4852477d5b1e2da877808c998dc57db9460f
DevTools: speculative fix for crash in NetworkHandler::Disable This keeps BrowserContext* and StoragePartition* instead of RenderProcessHost* in an attemp to resolve UAF of RenderProcessHost upon closure of DevTools front-end. Bug: 801117, 783067, 780694 Change-Id: I6c2cca60cc0c29f0949d189cf918769059f80c1b Reviewed-o...
0
content/browser/devtools/protocol/service_worker_handler.cc
{"sha": "cf6e07122f5c16c19622890fd41cfaad4c597247", "filename": "content/browser/devtools/devtools_session.cc", "status": "modified", "additions": 9, "deletions": 7, "changes": 16, "blob_url": "https://github.com/chromium/chromium/blob/3c8e4852477d5b1e2da877808c998dc57db9460f/content/browser/devtools/devtools_session.c...
void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {}
void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {}
C
null
null
null
@@ -49,8 +49,6 @@ void StatusNoOpKeepingRegistration( ServiceWorkerStatusCode status) { } -void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {} - const std::string GetVersionRunningStatusString( EmbeddedWorkerStatus running_status) { switch (running_status) { @@ -158,7 +156,8 @@ void DispatchSync...
Chrome
3c8e4852477d5b1e2da877808c998dc57db9460f
488e9ef26e7e265f627b3db349ad4440b4575e93
0
void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {}