Search is not available for this dataset
Unnamed: 0 int64 3 189k | Access Gained stringclasses 2
values | Attack Origin stringclasses 4
values | Authentication Required stringclasses 3
values | Availability stringclasses 3
values | CVE ID stringlengths 13 43 ⌀ | CVE Page stringlengths 45 48 ⌀ | CWE ID stringclasses 90
values | Complexity stringclasses 4
values | Confidentiality stringclasses 3
values | Integrity stringclasses 3
values | Known Exploits float64 | Publish Date stringclasses 911
values | Score float64 0 10 ⌀ | Summary stringlengths 60 1.32k ⌀ | Update Date stringclasses 671
values | Vulnerability Classification stringclasses 75
values | add_lines int64 0 382 | codeLink stringlengths 46 139 | commit_id stringlengths 6 81 | commit_message stringlengths 3 13.3k ⌀ | del_lines int64 0 459 | file_name stringlengths 4 100 ⌀ | files_changed stringlengths 345 13.9M ⌀ | func_after stringlengths 14 235k | func_before stringlengths 14 234k | lang stringclasses 3
values | lines_after stringlengths 1 10k ⌀ | lines_before stringlengths 2 10.2k ⌀ | parentID stringclasses 626
values | patch stringlengths 101 359k | project stringclasses 305
values | project_after stringlengths 6 200 | project_before stringlengths 40 200 | vul int64 0 1 | vul_func_with_fix stringlengths 14 235k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
172,251 | null | Remote | Not required | null | CVE-2016-3837 | https://www.cvedetails.com/cve/CVE-2016-3837/ | CWE-200 | Medium | Partial | null | null | 2016-08-05 | 4.3 | service/jni/com_android_server_wifi_WifiNative.cpp in Wi-Fi in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows attackers to obtain sensitive information via a crafted application that provides a MAC address with too few characters, aka internal bug 28164077. | 2016-11-28 | +Info | 0 | https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399 | a209ff12ba9617c10550678ff93d01fb72a33399 | Deal correctly with short strings
The parseMacAddress function anticipates only properly formed
MAC addresses (6 hexadecimal octets separated by ":"). This
change properly deals with situations where the string is
shorter than expected, making sure that the passed in char*
reference in parseHexByte never exceeds the ... | 0 | service/jni/com_android_server_wifi_WifiNative.cpp | {"filename": "service/jni/com_android_server_wifi_WifiNative.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/service/jni/com_android_server_wifi_WifiNative.cpp", "patch": "@@ -697,15 +697,23 @@\n\n }\n \n static byte parseHexByte(const char ... | static jobject android_net_wifi_get_driver_version(JNIEnv *env, jclass cls, jint iface) {
JNIHelper helper(env);
int buffer_length = 256;
char *buffer = (char *)malloc(buffer_length);
if (!buffer) return NULL;
memset(buffer, 0, buffer_length);
wifi_interface_handle handle = getIfaceHandle(helper, cls, iface... | static jobject android_net_wifi_get_driver_version(JNIEnv *env, jclass cls, jint iface) {
JNIHelper helper(env);
int buffer_length = 256;
char *buffer = (char *)malloc(buffer_length);
if (!buffer) return NULL;
memset(buffer, 0, buffer_length);
wifi_interface_handle handle = getIfaceHandle(helper, cls, iface... | C | null | null | null | @@ -697,15 +697,23 @@
}
static byte parseHexByte(const char * &str) {
+ if (str[0] == '\0') {
+ ALOGE("Passed an empty string");
+ return 0;
+ }
byte b = parseHexChar(str[0]);
- if (str[1] == ':' || str[1] == '\0') {
- str += 2;
- return b;
+ if (str[1] == '\0' || str[1... | Android | https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/ | https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399%5E/ | 0 | static jobject android_net_wifi_get_driver_version(JNIEnv *env, jclass cls, jint iface) {
//Need to be fixed. The memory should be allocated from lower layer
//char *buffer = NULL;
JNIHelper helper(env);
int buffer_length = 256;
char *buffer = (char *)malloc(buffer_length);
if (!buffer) return NULL;
memset(bu... |
141,602 | null | Remote | Not required | Partial | CVE-2016-5156 | https://www.cvedetails.com/cve/CVE-2016-5156/ | CWE-416 | Medium | Partial | Partial | null | 2016-09-11 | 6.8 | extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have un... | 2018-10-30 | DoS | 0 | https://github.com/chromium/chromium/commit/ba011d9f8322c62633a069a59c2c5525e3ff46cc | ba011d9f8322c62633a069a59c2c5525e3ff46cc | Ignore filtered event if an event matcher cannot be added.
BUG=625404
Review-Url: https://codereview.chromium.org/2236133002
Cr-Commit-Position: refs/heads/master@{#411472} | 0 | extensions/renderer/event_bindings.cc | {"sha": "db5fb60f428af90a3ce4ba3edcfee6a77b1a6729", "filename": "extensions/renderer/event_bindings.cc", "status": "modified", "additions": 7, "deletions": 3, "changes": 10, "blob_url": "https://github.com/chromium/chromium/blob/ba011d9f8322c62633a069a59c2c5525e3ff46cc/extensions/renderer/event_bindings.cc", "raw_url":... | EventBindings::~EventBindings() {}
| EventBindings::~EventBindings() {}
| C | null | null | null | @@ -272,14 +272,18 @@ void EventBindings::AttachFilteredEvent(
filter = base::DictionaryValue::From(std::move(filter_value));
}
- // Hold onto a weak reference to |filter| so that it can be used after passing
- // ownership to |event_filter|.
- base::DictionaryValue* filter_weak = filter.get();
int id =... | Chrome | ba011d9f8322c62633a069a59c2c5525e3ff46cc | 17a812f225abd54e84dbe4f74c9619d4bdab3cbf | 0 | EventBindings::~EventBindings() {}
|
113,164 | null | Remote | Not required | Partial | CVE-2012-2895 | https://www.cvedetails.com/cve/CVE-2012-2895/ | CWE-119 | Medium | Partial | Partial | null | 2012-09-26 | 6.8 | The PDF functionality in Google Chrome before 22.0.1229.79 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger out-of-bounds write operations. | 2017-09-18 | DoS Overflow | 0 | https://github.com/chromium/chromium/commit/3475f5e448ddf5e48888f3d0563245cc46e3c98b | 3475f5e448ddf5e48888f3d0563245cc46e3c98b | ash: Add launcher overflow bubble.
- Host a LauncherView in bubble to display overflown items;
- Mouse wheel and two-finger scroll to scroll the LauncherView in bubble in case overflow bubble is overflown;
- Fit bubble when items are added/removed;
- Keep launcher bar on screen when the bubble is shown;
BUG=128054
TE... | 0 | ash/launcher/launcher.cc | {"sha": "62ca10dad9e69031c752bf990e997abd4f7e63ec", "filename": "ash/ash.gyp", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/3475f5e448ddf5e48888f3d0563245cc46e3c98b/ash/ash.gyp", "raw_url": "https://github.com/chromium/chromium/raw/3475f5e448... | void set_focus_cycler(internal::FocusCycler* focus_cycler) {
focus_cycler_ = focus_cycler;
}
| void set_focus_cycler(internal::FocusCycler* focus_cycler) {
focus_cycler_ = focus_cycler;
}
| C | null | null | null | @@ -4,6 +4,8 @@
#include "ash/launcher/launcher.h"
+#include <algorithm>
+
#include "ash/focus_cycler.h"
#include "ash/launcher/launcher_delegate.h"
#include "ash/launcher/launcher_model.h"
@@ -33,7 +35,7 @@ const int kBackgroundAlpha = 128;
// The contents view of the Widget. This view contains LauncherView a... | Chrome | 3475f5e448ddf5e48888f3d0563245cc46e3c98b | d72aa96b40382b63c0501be8d291cc42d1aa696d | 0 | void set_focus_cycler(internal::FocusCycler* focus_cycler) {
focus_cycler_ = focus_cycler;
}
|
118,895 | null | Remote | Not required | null | CVE-2013-6626 | https://www.cvedetails.com/cve/CVE-2013-6626/ | null | Medium | null | Partial | null | 2013-11-13 | 4.3 | The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/90fb08ed0146c9beacfd4dde98a20fc45419fff3 | 90fb08ed0146c9beacfd4dde98a20fc45419fff3 | Cancel JavaScript dialogs when an interstitial appears.
BUG=295695
TEST=See bug for repro steps.
Review URL: https://chromiumcodereview.appspot.com/24360011
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@225026 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/browser/web_contents/web_contents_impl.cc | {"sha": "56901bcdfb435f9800494117dd64cd875f9a7148", "filename": "chrome/browser/ui/browser_browsertest.cc", "status": "modified", "additions": 48, "deletions": 0, "changes": 48, "blob_url": "https://github.com/chromium/chromium/blob/90fb08ed0146c9beacfd4dde98a20fc45419fff3/chrome/browser/ui/browser_browsertest.cc", "ra... | WebContentsImpl::GetLastCommittedNavigationEntryForRenderManager() {
return controller_.GetLastCommittedEntry();
}
| WebContentsImpl::GetLastCommittedNavigationEntryForRenderManager() {
return controller_.GetLastCommittedEntry();
}
| C | null | null | null | @@ -1785,6 +1785,12 @@ void WebContentsImpl::AttachInterstitialPage(
InterstitialPageImpl* interstitial_page) {
DCHECK(interstitial_page);
render_manager_.set_interstitial_page(interstitial_page);
+
+ // Cancel any visible dialogs so that they don't interfere with the
+ // interstitial.
+ if (dialog_manag... | Chrome | 90fb08ed0146c9beacfd4dde98a20fc45419fff3 | 4165aa2c5c1f370d1535163e4f05c40af6aa141a | 0 | WebContentsImpl::GetLastCommittedNavigationEntryForRenderManager() {
return controller_.GetLastCommittedEntry();
}
|
89,316 | null | Remote | Not required | Complete | CVE-2019-13106 | https://www.cvedetails.com/cve/CVE-2019-13106/ | CWE-787 | Medium | Partial | Partial | null | 2019-08-06 | 8.3 | Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution. | 2019-10-01 | Exec Code Overflow | 0 | https://github.com/u-boot/u-boot/commits/master | master | Merge branch '2020-01-22-master-imports'
- Re-add U8500 platform support
- Add bcm968360bg support
- Assorted Keymile fixes
- Other assorted bugfixes | 0 | board/keymile/km_arm/km_arm.c | {"sha": "b0634b23bc875a05240d75a402e639fddb5ec928", "filename": "MAINTAINERS", "status": "modified", "additions": 17, "deletions": 0, "changes": 17, "blob_url": "https://github.com/u-boot/u-boot/blob/2c871f9e084b2c03d1961884228a6901387ab8d6/MAINTAINERS", "raw_url": "https://github.com/u-boot/u-boot/raw/2c871f9e084b2c03... | static void set_bootcount_addr(void)
{
uchar buf[32];
unsigned int bootcountaddr;
bootcountaddr = gd->ram_size - BOOTCOUNT_ADDR;
sprintf((char *)buf, "0x%x", bootcountaddr);
env_set("bootcountaddr", (char *)buf);
}
| static void set_bootcount_addr(void)
{
uchar buf[32];
unsigned int bootcountaddr;
bootcountaddr = gd->ram_size - BOOTCOUNT_ADDR;
sprintf((char *)buf, "0x%x", bootcountaddr);
env_set("bootcountaddr", (char *)buf);
}
| C | null | null | null | @@ -69,11 +69,7 @@ static const u32 kwmpp_config[] = {
MPP4_NF_IO6,
MPP5_NF_IO7,
MPP6_SYSRST_OUTn,
-#if defined(KM_PCIE_RESET_MPP7)
- MPP7_GPO,
-#else
MPP7_PEX_RST_OUTn,
-#endif
#if defined(CONFIG_SYS_I2C_SOFT)
MPP8_GPIO, /* SDA */
MPP9_GPIO, /* SCL */ | u-boot | master | 052170c6a043eec4e73fad80955876cf1ba5e4f2 | 0 | static void set_bootcount_addr(void)
{
uchar buf[32];
unsigned int bootcountaddr;
bootcountaddr = gd->ram_size - BOOTCOUNT_ADDR;
sprintf((char *)buf, "0x%x", bootcountaddr);
env_set("bootcountaddr", (char *)buf);
}
|
126,863 | null | Remote | Not required | Partial | CVE-2012-5148 | https://www.cvedetails.com/cve/CVE-2012-5148/ | CWE-20 | Low | Partial | Partial | null | 2013-01-15 | 7.5 | The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names, which has unspecified impact and attack vectors. | 2018-10-30 | null | 0 | https://github.com/chromium/chromium/commit/e89cfcb9090e8c98129ae9160c513f504db74599 | e89cfcb9090e8c98129ae9160c513f504db74599 | Remove TabContents from TabStripModelObserver::TabDetachedAt.
BUG=107201
TEST=no visible change
Review URL: https://chromiumcodereview.appspot.com/11293205
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@167122 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | chrome/browser/ui/views/frame/browser_view.cc | {"sha": "3494da8b6ee160b5f04f031be3e2cd52af5e3fdf", "filename": "chrome/browser/automation/automation_provider_observers.cc", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/e89cfcb9090e8c98129ae9160c513f504db74599/chrome/browser/automation/auto... | void BrowserView::ShowChromeToMobileBubble() {
GetLocationBarView()->ShowChromeToMobileBubble();
}
| void BrowserView::ShowChromeToMobileBubble() {
GetLocationBarView()->ShowChromeToMobileBubble();
}
| C | null | null | null | @@ -1401,7 +1401,7 @@ ToolbarView* BrowserView::GetToolbarView() const {
///////////////////////////////////////////////////////////////////////////////
// BrowserView, TabStripModelObserver implementation:
-void BrowserView::TabDetachedAt(TabContents* contents, int index) {
+void BrowserView::TabDetachedAt(WebCont... | Chrome | e89cfcb9090e8c98129ae9160c513f504db74599 | 0c71b754680eb40b42ca1ce7a4e6fef7442b5da4 | 0 | void BrowserView::ShowChromeToMobileBubble() {
GetLocationBarView()->ShowChromeToMobileBubble();
}
|
152,065 | null | Remote | Not required | Partial | CVE-2017-5019 | https://www.cvedetails.com/cve/CVE-2017-5019/ | CWE-416 | Medium | Partial | Partial | null | 2017-02-17 | 6.8 | A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | Convert FrameHostMsg_DidAddMessageToConsole to Mojo.
Note: Since this required changing the test
RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually
re-introduced https://crbug.com/666714 locally (the bug the test was
added for), and reran the test to confirm that it still covers the bug.
Bug: 786836
Ch... | 0 | content/browser/frame_host/render_frame_host_impl.cc | {"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render... | void RenderFrameHostImpl::RequestAXTreeSnapshot(AXTreeSnapshotCallback callback,
ui::AXMode ax_mode) {
static int next_id = 1;
int callback_id = next_id++;
Send(new AccessibilityMsg_SnapshotTree(routing_id_, callback_id,
ax_m... | void RenderFrameHostImpl::RequestAXTreeSnapshot(AXTreeSnapshotCallback callback,
ui::AXMode ax_mode) {
static int next_id = 1;
int callback_id = next_id++;
Send(new AccessibilityMsg_SnapshotTree(routing_id_, callback_id,
ax_m... | C | null | null | null | @@ -1375,8 +1375,6 @@ bool RenderFrameHostImpl::OnMessageReceived(const IPC::Message &msg) {
handled = true;
IPC_BEGIN_MESSAGE_MAP(RenderFrameHostImpl, msg)
- IPC_MESSAGE_HANDLER(FrameHostMsg_DidAddMessageToConsole,
- OnDidAddMessageToConsole)
IPC_MESSAGE_HANDLER(FrameHostMsg_Deta... | Chrome | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | c246049ec1b28d1af4fe3be886ac5904e1762026 | 0 | void RenderFrameHostImpl::RequestAXTreeSnapshot(AXTreeSnapshotCallback callback,
ui::AXMode ax_mode) {
static int next_id = 1;
int callback_id = next_id++;
Send(new AccessibilityMsg_SnapshotTree(routing_id_, callback_id,
ax_m... |
60,944 | null | Remote | Single system | null | CVE-2017-14604 | https://www.cvedetails.com/cve/CVE-2017-14604/ | CWE-20 | Low | null | Partial | null | 2017-09-20 | 4 | GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious *sh -c* command. In other words, Nautilus provides no UI indication that a file actual... | 2018-01-26 | Exec Code | 0 | https://github.com/GNOME/nautilus/commit/1630f53481f445ada0a455e9979236d31a8d3bb0 | 1630f53481f445ada0a455e9979236d31a8d3bb0 | mime-actions: use file metadata for trusting desktop files
Currently we only trust desktop files that have the executable bit
set, and don't replace the displayed icon or the displayed name until
it's trusted, which prevents for running random programs by a malicious
desktop file.
However, the executable permission i... | 0 | src/nautilus-directory-async.c | {"sha": "b02e3de87b10a1d07f6f8bdd3d9ec9febfe7a024", "filename": "src/nautilus-directory-async.c", "status": "modified", "additions": 6, "deletions": 1, "changes": 7, "blob_url": "https://github.com/GNOME/nautilus/blob/1630f53481f445ada0a455e9979236d31a8d3bb0/src/nautilus-directory-async.c", "raw_url": "https://github.c... | mime_list_done (MimeListState *state,
gboolean success)
{
NautilusFile *file;
NautilusDirectory *directory;
directory = state->directory;
g_assert (directory != NULL);
file = state->mime_list_file;
file->details->mime_list_is_up_to_date = TRUE;
g_list_free_full (file... | mime_list_done (MimeListState *state,
gboolean success)
{
NautilusFile *file;
NautilusDirectory *directory;
directory = state->directory;
g_assert (directory != NULL);
file = state->mime_list_file;
file->details->mime_list_is_up_to_date = TRUE;
g_list_free_full (file... | C | null | null | null | @@ -30,6 +30,7 @@
#include "nautilus-global-preferences.h"
#include "nautilus-link.h"
#include "nautilus-profile.h"
+#include "nautilus-metadata.h"
#include <eel/eel-glib-extensions.h>
#include <gtk/gtk.h>
#include <libxml/parser.h>
@@ -3580,13 +3581,17 @@ is_link_trusted (NautilusFile *file,
{
GFile *locat... | nautilus | 1630f53481f445ada0a455e9979236d31a8d3bb0 | cc6910ff6511a5a2939cf36a49ca81fb62005382 | 0 | mime_list_done (MimeListState *state,
gboolean success)
{
NautilusFile *file;
NautilusDirectory *directory;
directory = state->directory;
g_assert (directory != NULL);
file = state->mime_list_file;
file->details->mime_list_is_up_to_date = TRUE;
g_list_free_full (file... |
44,986 | null | Remote | Not required | Partial | CVE-2015-0253 | https://www.cvedetails.com/cve/CVE-2015-0253/ | null | Low | null | null | null | 2015-07-20 | 5 | The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INC... | 2018-01-04 | DoS | 0 | https://github.com/apache/httpd/commit/6a974059190b8a0c7e499f4ab12fe108127099cb | 6a974059190b8a0c7e499f4ab12fe108127099cb | *) SECURITY: CVE-2015-0253 (cve.mitre.org)
core: Fix a crash introduced in with ErrorDocument 400 pointing
to a local URL-path with the INCLUDES filter active, introduced
in 2.4.11. PR 57531. [Yann Ylavic]
Submitted By: ylavic
Committed By: covener
git-svn-id: https://svn.apache.org/repos/asf/ht... | 0 | server/protocol.c | {"sha": "064446d61118e9c799c51eb7105df54d7040af87", "filename": "CHANGES", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/apache/httpd/blob/6a974059190b8a0c7e499f4ab12fe108127099cb/CHANGES", "raw_url": "https://github.com/apache/httpd/raw/6a974059190b8a0c7e499f4ab12f... | AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r, apr_bucket_brigade *bb)
{
char *last_field = NULL;
apr_size_t last_len = 0;
apr_size_t alloc_len = 0;
char *field;
char *value;
apr_size_t len;
int fields_read = 0;
char *tmp_field;
core_server_config *conf = ap_get_core_modul... | AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r, apr_bucket_brigade *bb)
{
char *last_field = NULL;
apr_size_t last_len = 0;
apr_size_t alloc_len = 0;
char *field;
char *value;
apr_size_t len;
int fields_read = 0;
char *tmp_field;
core_server_config *conf = ap_get_core_modul... | C | null | null | null | @@ -606,15 +606,15 @@ static int read_request_line(request_rec *r, apr_bucket_brigade *bb)
*/
if (APR_STATUS_IS_ENOSPC(rv)) {
r->status = HTTP_REQUEST_URI_TOO_LARGE;
- r->proto_num = HTTP_VERSION(1,0);
- r->protocol = apr_pstrdup(r->pool, "HT... | httpd | 6a974059190b8a0c7e499f4ab12fe108127099cb | 1fd42eb6471263a49b7a452b642163c111ce09f8 | 0 | AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r, apr_bucket_brigade *bb)
{
char *last_field = NULL;
apr_size_t last_len = 0;
apr_size_t alloc_len = 0;
char *field;
char *value;
apr_size_t len;
int fields_read = 0;
char *tmp_field;
core_server_config *conf = ap_get_core_modul... |
163,791 | null | Remote | Not required | null | CVE-2017-15389 | https://www.cvedetails.com/cve/CVE-2017-15389/ | CWE-20 | Medium | null | Partial | null | 2018-02-07 | 4.3 | An insufficient watchdog timer in navigation in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | 2018-02-22 | null | 0 | https://github.com/chromium/chromium/commit/5788690fb1395dc672ff9b3385dbfb1180ed710a | 5788690fb1395dc672ff9b3385dbfb1180ed710a | mac: Make RWHVMac::ClearCompositorFrame clear locks
Ensure that the BrowserCompositorMac not hold on to a compositor lock
when requested to clear its compositor frame. This lock may be held
indefinitely (if the renderer hangs) and so the frame will never be
cleared.
Bug: 739621
Change-Id: I15d0e82bdf632f3379a48e959f1... | 0 | content/browser/renderer_host/delegated_frame_host.cc | {"sha": "4355a8cdacb4f8308554dadba4367f2923cabdae", "filename": "content/browser/renderer_host/browser_compositor_view_mac.h", "status": "modified", "additions": 8, "deletions": 1, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/5788690fb1395dc672ff9b3385dbfb1180ed710a/content/browser/renderer_host... | viz::SurfaceId DelegatedFrameHost::SurfaceIdAtPoint(
viz::SurfaceHittestDelegate* delegate,
const gfx::Point& point,
gfx::Point* transformed_point) {
viz::SurfaceId surface_id(frame_sink_id_, local_surface_id_);
if (!surface_id.is_valid())
return surface_id;
viz::SurfaceHittest hittest(delegate,
... | viz::SurfaceId DelegatedFrameHost::SurfaceIdAtPoint(
viz::SurfaceHittestDelegate* delegate,
const gfx::Point& point,
gfx::Point* transformed_point) {
viz::SurfaceId surface_id(frame_sink_id_, local_surface_id_);
if (!surface_id.is_valid())
return surface_id;
viz::SurfaceHittest hittest(delegate,
... | C | null | null | null | @@ -488,6 +488,11 @@ void DelegatedFrameHost::SubmitCompositorFrame(
}
void DelegatedFrameHost::ClearDelegatedFrame() {
+ // Ensure that we are able to swap in a new blank frame to replace any old
+ // content. This will result in a white flash if we switch back to this
+ // content.
+ // https://crbug.com/7396... | Chrome | 5788690fb1395dc672ff9b3385dbfb1180ed710a | 6f0e3b2e552282301575d17cf664d3b1f5888302 | 0 | viz::SurfaceId DelegatedFrameHost::SurfaceIdAtPoint(
viz::SurfaceHittestDelegate* delegate,
const gfx::Point& point,
gfx::Point* transformed_point) {
viz::SurfaceId surface_id(frame_sink_id_, local_surface_id_);
if (!surface_id.is_valid())
return surface_id;
viz::SurfaceHittest hittest(delegate,
... |
125,271 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2013-01 | null | 0 | https://github.com/chromium/chromium/commit/70cff275010b33dbab628f837d76364359065b79 | 70cff275010b33dbab628f837d76364359065b79 | Disable compositor thread input handling on windows
BUG=160122
Review URL: https://chromiumcodereview.appspot.com/11946019
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@177369 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/renderer/render_view_impl.cc | {"sha": "fe416ccad596990cf1cb3a4ca7010e2d6cf459cc", "filename": "content/renderer/render_view_impl.cc", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/70cff275010b33dbab628f837d76364359065b79/content/renderer/render_view_impl.cc", "raw_url": "h... | static void MaybeHandleDebugURL(const GURL& url) {
if (!url.SchemeIs(chrome::kChromeUIScheme))
return;
if (url == GURL(chrome::kChromeUICrashURL)) {
CrashIntentionally();
} else if (url == GURL(chrome::kChromeUIKillURL)) {
base::KillProcess(base::GetCurrentProcessHandle(), 1, false);
} else if (url ... | static void MaybeHandleDebugURL(const GURL& url) {
if (!url.SchemeIs(chrome::kChromeUIScheme))
return;
if (url == GURL(chrome::kChromeUICrashURL)) {
CrashIntentionally();
} else if (url == GURL(chrome::kChromeUIKillURL)) {
base::KillProcess(base::GetCurrentProcessHandle(), 1, false);
} else if (url ... | C | null | null | null | @@ -2537,11 +2537,13 @@ bool RenderViewImpl::isPointerLocked() {
}
void RenderViewImpl::didActivateCompositor(int input_handler_identifier) {
+#if !defined(OS_WIN) // http://crbug.com/160122
CompositorThread* compositor_thread =
RenderThreadImpl::current()->compositor_thread();
if (compositor_thread)
... | Chrome | 70cff275010b33dbab628f837d76364359065b79 | b8b3337b6cbdf65e922c59ed442b8a48a8a02f04 | 0 | static void MaybeHandleDebugURL(const GURL& url) {
if (!url.SchemeIs(chrome::kChromeUIScheme))
return;
if (url == GURL(chrome::kChromeUICrashURL)) {
CrashIntentionally();
} else if (url == GURL(chrome::kChromeUIKillURL)) {
base::KillProcess(base::GetCurrentProcessHandle(), 1, false);
} else if (url ... |
169,542 | null | Remote | Not required | Partial | CVE-2016-1674 | https://www.cvedetails.com/cve/CVE-2016-1674/ | null | Medium | Partial | Partial | null | 2016-06-05 | 6.8 | The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors. | 2018-10-30 | Bypass | 0 | https://github.com/chromium/chromium/commit/14ff9d0cded8ae8032ef027d1f33c6666a695019 | 14ff9d0cded8ae8032ef027d1f33c6666a695019 | [Extensions] Add more bindings access checks
BUG=598165
Review URL: https://codereview.chromium.org/1854983002
Cr-Commit-Position: refs/heads/master@{#385282} | 0 | chrome/renderer/extensions/automation_internal_custom_bindings.cc | {"sha": "090971a64ff04e53e9a3e4933c742515453b7026", "filename": "chrome/renderer/extensions/automation_internal_custom_bindings.cc", "status": "modified", "additions": 3, "deletions": 3, "changes": 6, "blob_url": "https://github.com/chromium/chromium/blob/14ff9d0cded8ae8032ef027d1f33c6666a695019/chrome/renderer/extensi... | void Remove() {
if (!removed_) {
removed_ = true;
content::RenderThread::Get()->RemoveFilter(this);
}
}
| void Remove() {
if (!removed_) {
removed_ = true;
content::RenderThread::Get()->RemoveFilter(this);
}
}
| C | null | null | null | @@ -418,10 +418,10 @@ AutomationInternalCustomBindings::AutomationInternalCustomBindings(
// It's safe to use base::Unretained(this) here because these bindings
// will only be called on a valid AutomationInternalCustomBindings instance
// and none of the functions have any side effects.
- #define ROUTE_FUNCT... | Chrome | 14ff9d0cded8ae8032ef027d1f33c6666a695019 | d81c1ced74e63e4bf50019ffd2d398def71bdae7 | 0 | void Remove() {
if (!removed_) {
removed_ = true;
content::RenderThread::Get()->RemoveFilter(this);
}
}
|
4,218 | null | Remote | Not required | Complete | CVE-2009-0946 | https://www.cvedetails.com/cve/CVE-2009-0946/ | CWE-189 | Low | Complete | Complete | null | 2009-04-16 | 10 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | 2017-09-28 | Exec Code Overflow | 0 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | 0545ec1ca36b27cb928128870a83e5f668980bc5 | null | 0 | null | null | cff_index_get_pointers( CFF_Index idx,
FT_Byte*** table )
{
FT_Error error = CFF_Err_Ok;
FT_Memory memory = idx->stream->memory;
FT_ULong n, offset, old_offset;
FT_Byte** t;
*table = 0;
if ( idx->offsets == NULL )
{
error = cff_index_load_offs... | cff_index_get_pointers( CFF_Index idx,
FT_Byte*** table )
{
FT_Error error = CFF_Err_Ok;
FT_Memory memory = idx->stream->memory;
FT_ULong n, offset, old_offset;
FT_Byte** t;
*table = 0;
if ( idx->offsets == NULL )
{
error = cff_index_load_offs... | C | null | null | 8b819254b9fa1e686eaff8f6b214dfd8eeebe8a0 | @@ -842,7 +842,20 @@
goto Exit;
for ( j = 1; j < num_glyphs; j++ )
- charset->sids[j] = FT_GET_USHORT();
+ {
+ FT_UShort sid = FT_GET_USHORT();
+
+
+ /* this constant is given in the CFF specification */
+ if ( sid < 65000 )
+ c... | savannah | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cffload.c?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cffload.c?id=8b819254b9fa1e686eaff8f6b214dfd8eeebe8a0 | 0 | cff_index_get_pointers( CFF_Index idx,
FT_Byte*** table )
{
FT_Error error = CFF_Err_Ok;
FT_Memory memory = idx->stream->memory;
FT_ULong n, offset, old_offset;
FT_Byte** t;
*table = 0;
if ( idx->offsets == NULL )
{
error = cff_index_load_offs... |
121,694 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2013-06 | null | 0 | https://github.com/chromium/chromium/commit/d57ecffa058b2af3b0678c43dce75f731550bbce | d57ecffa058b2af3b0678c43dce75f731550bbce | drive: Stop calling OnChangeListLoadComplete() if DirectoryFetchInfo is not empty
Call LoadAfterLoadDirectory() instead.
BUG=333164
TEST=unit_tests
Review URL: https://codereview.chromium.org/132503004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@244406 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | chrome/browser/chromeos/drive/change_list_loader.cc | {"sha": "48253ac2471bf89107376eb06824a608d4bf3914", "filename": "chrome/browser/chromeos/drive/change_list_loader.cc", "status": "modified", "additions": 16, "deletions": 12, "changes": 28, "blob_url": "https://github.com/chromium/chromium/blob/d57ecffa058b2af3b0678c43dce75f731550bbce/chrome/browser/chromeos/drive/chan... | virtual ~DeltaFeedFetcher() {
}
| virtual ~DeltaFeedFetcher() {
}
| C | null | null | null | @@ -574,26 +574,30 @@ void ChangeListLoader::LoadAfterGetAboutResource(
FileError error = GDataToFileError(status);
if (error != FILE_ERROR_OK) {
- OnChangeListLoadComplete(error);
+ if (directory_fetch_info.empty() || is_initial_load)
+ OnChangeListLoadComplete(error);
+ else
+ OnDirectoryLo... | Chrome | d57ecffa058b2af3b0678c43dce75f731550bbce | 70c908cadedbf286a352085620e6ed33883af539 | 0 | virtual ~DeltaFeedFetcher() {
}
|
138,139 | null | Remote | Not required | Partial | CVE-2015-1274 | https://www.cvedetails.com/cve/CVE-2015-1274/ | CWE-254 | Medium | Partial | Partial | null | 2015-07-22 | 6.8 | Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous *Always open files of this type* choice, related to download_commands.cc and downloa... | 2018-10-30 | Exec Code | 0 | https://github.com/chromium/chromium/commit/d27468a832d5316884bd02f459cbf493697fd7e1 | d27468a832d5316884bd02f459cbf493697fd7e1 | Switch to equalIgnoringASCIICase throughout modules/accessibility
BUG=627682
Review-Url: https://codereview.chromium.org/2793913007
Cr-Commit-Position: refs/heads/master@{#461858} | 0 | third_party/WebKit/Source/modules/accessibility/AXObject.cpp | {"sha": "b7b9d3ad4a5cdff0f72bf31370c16bddf7da6615", "filename": "third_party/WebKit/Source/modules/accessibility/AXARIAGridCell.cpp", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/d27468a832d5316884bd02f459cbf493697fd7e1/third_party/WebKit/Sou... | String AXObject::computedName() const {
AXNameFrom nameFrom;
AXObject::AXObjectVector nameObjects;
return name(nameFrom, &nameObjects);
}
| String AXObject::computedName() const {
AXNameFrom nameFrom;
AXObject::AXObjectVector nameObjects;
return name(nameFrom, &nameObjects);
}
| C | null | null | null | @@ -596,7 +596,7 @@ AXObject* AXObject::leafNodeAncestor() const {
const AXObject* AXObject::ariaHiddenRoot() const {
for (const AXObject* object = this; object; object = object->parentObject()) {
- if (equalIgnoringCase(object->getAttribute(aria_hiddenAttr), "true"))
+ if (equalIgnoringASCIICase(object->ge... | Chrome | d27468a832d5316884bd02f459cbf493697fd7e1 | 62dc793dc640ae5fd16d571a0c9199fe0fb740d0 | 0 | String AXObject::computedName() const {
AXNameFrom nameFrom;
AXObject::AXObjectVector nameObjects;
return name(nameFrom, &nameObjects);
}
|
77,369 | null | Remote | Not required | Partial | CVE-2018-17205 | https://www.cvedetails.com/cve/CVE-2018-17205/ | CWE-617 | Low | null | null | null | 2018-09-19 | 5 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to r... | 2019-10-02 | null | 0 | https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6 | 0befd1f3745055c32940f5faf9559be6a14395e6 | ofproto: Fix OVS crash when reverting old flows in bundle commit
During bundle commit flows which are added in bundle are applied
to ofproto in-order. In case if a flow cannot be added (e.g. flow
action is go-to group id which does not exist), OVS tries to
revert back all previous flows which were successfully applied... | 0 | ofproto/ofproto.c | {"sha": "50df9dc9c099b965378d5be3e78eb49dbb509b81", "filename": "ofproto/ofproto.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/openvswitch/ovs/blob/0befd1f3745055c32940f5faf9559be6a14395e6/ofproto/ofproto.c", "raw_url": "https://github.com/openvswitch/ovs/raw/0b... | ofproto_port_set_stp(struct ofproto *ofproto, ofp_port_t ofp_port,
const struct ofproto_port_stp_settings *s)
{
struct ofport *ofport = ofproto_get_port(ofproto, ofp_port);
if (!ofport) {
VLOG_WARN("%s: cannot configure STP on nonexistent port %"PRIu32,
ofproto->na... | ofproto_port_set_stp(struct ofproto *ofproto, ofp_port_t ofp_port,
const struct ofproto_port_stp_settings *s)
{
struct ofport *ofport = ofproto_get_port(ofproto, ofp_port);
if (!ofport) {
VLOG_WARN("%s: cannot configure STP on nonexistent port %"PRIu32,
ofproto->na... | C | null | null | null | @@ -8465,7 +8465,7 @@ ofproto_rule_insert__(struct ofproto *ofproto, struct rule *rule)
const struct rule_actions *actions = rule_get_actions(rule);
/* A rule may not be reinserted. */
- ovs_assert(rule->state == RULE_INITIALIZED);
+ ovs_assert(rule->state != RULE_INSERTED);
if (rule->hard_time... | ovs | 0befd1f3745055c32940f5faf9559be6a14395e6 | f9df636ef91c639cf97c6bd8e5433381ac63859b | 0 | ofproto_port_set_stp(struct ofproto *ofproto, ofp_port_t ofp_port,
const struct ofproto_port_stp_settings *s)
{
struct ofport *ofport = ofproto_get_port(ofproto, ofp_port);
if (!ofport) {
VLOG_WARN("%s: cannot configure STP on nonexistent port %"PRIu32,
ofproto->na... |
86,389 | null | Local | Not required | Complete | CVE-2017-15128 | https://www.cvedetails.com/cve/CVE-2017-15128/ | CWE-119 | Low | null | null | null | 2018-01-14 | 4.9 | A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG). | 2019-10-09 | DoS Overflow | 0 | https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df | 1e3921471354244f70fe268586ff94a97a6dd4df | userfaultfd: hugetlbfs: prevent UFFDIO_COPY to fill beyond the end of i_size
This oops:
kernel BUG at fs/hugetlbfs/inode.c:484!
RIP: remove_inode_hugepages+0x3d0/0x410
Call Trace:
hugetlbfs_setattr+0xd9/0x130
notify_change+0x292/0x410
do_truncate+0x65/0xa0
do_sys_ftruncate.constprop.3+0x11a/0x18... | 0 | mm/hugetlb.c | {"sha": "2d2ff5e8bf2bc035eb300ee16dbdaadcdb0279dd", "filename": "mm/hugetlb.c", "status": "modified", "additions": 30, "deletions": 2, "changes": 32, "blob_url": "https://github.com/torvalds/linux/blob/1e3921471354244f70fe268586ff94a97a6dd4df/mm/hugetlb.c", "raw_url": "https://github.com/torvalds/linux/raw/1e3921471354... | void hugetlb_show_meminfo(void)
{
struct hstate *h;
int nid;
if (!hugepages_supported())
return;
for_each_node_state(nid, N_MEMORY)
for_each_hstate(h)
pr_info("Node %d hugepages_total=%u hugepages_free=%u hugepages_surp=%u hugepages_size=%lukB\n",
nid,
h->nr_huge_pages_node[nid],
h->free_huge_p... | void hugetlb_show_meminfo(void)
{
struct hstate *h;
int nid;
if (!hugepages_supported())
return;
for_each_node_state(nid, N_MEMORY)
for_each_hstate(h)
pr_info("Node %d hugepages_total=%u hugepages_free=%u hugepages_surp=%u hugepages_size=%lukB\n",
nid,
h->nr_huge_pages_node[nid],
h->free_huge_p... | C | null | null | null | @@ -3984,6 +3984,9 @@ int hugetlb_mcopy_atomic_pte(struct mm_struct *dst_mm,
unsigned long src_addr,
struct page **pagep)
{
+ struct address_space *mapping;
+ pgoff_t idx;
+ unsigned long size;
int vm_shared = dst_vma->vm_flags & VM_SHARED;
struct hstate *h = hstate_vma(dst_vma);
pte_t _dst_pte;
... | linux | 1e3921471354244f70fe268586ff94a97a6dd4df | 5cb0512c02ecd7e6214e912e4c150f4219ac78e0 | 0 | void hugetlb_show_meminfo(void)
{
struct hstate *h;
int nid;
if (!hugepages_supported())
return;
for_each_node_state(nid, N_MEMORY)
for_each_hstate(h)
pr_info("Node %d hugepages_total=%u hugepages_free=%u hugepages_surp=%u hugepages_size=%lukB\n",
nid,
h->nr_huge_pages_node[nid],
h->free_huge_p... |
149,727 | null | Remote | Not required | Partial | CVE-2017-5057 | https://www.cvedetails.com/cve/CVE-2017-5057/ | CWE-125 | Medium | Partial | Partial | null | 2017-10-27 | 6.8 | Type confusion in PDFium in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/cbc5d5153b18ea387f4769caa01d1339261f6ed6 | cbc5d5153b18ea387f4769caa01d1339261f6ed6 | gpu: Disallow use of IOSurfaces for half-float format with swiftshader.
R=kbr@chromium.org
Bug: 998038
Change-Id: Ic31d28938ef205b36657fc7bd297fe8a63d08543
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1798052
Commit-Queue: Kenneth Russell <kbr@chromium.org>
Reviewed-by: Kenneth Russell <kbr@... | 0 | gpu/command_buffer/service/feature_info.cc | {"sha": "aa567968e2ec4c52596d0614e2c6384619394aac", "filename": "gpu/command_buffer/service/feature_info.cc", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/cbc5d5153b18ea387f4769caa01d1339261f6ed6/gpu/command_buffer/service/feature_info.cc", "... | void FeatureInfo::EnableEXTColorBufferFloat() {
if (!ext_color_buffer_float_available_)
return;
AddExtensionString("GL_EXT_color_buffer_float");
validators_.render_buffer_format.AddValue(GL_R16F);
validators_.render_buffer_format.AddValue(GL_RG16F);
validators_.render_buffer_format.AddValue(GL_RGBA16F);
... | void FeatureInfo::EnableEXTColorBufferFloat() {
if (!ext_color_buffer_float_available_)
return;
AddExtensionString("GL_EXT_color_buffer_float");
validators_.render_buffer_format.AddValue(GL_R16F);
validators_.render_buffer_format.AddValue(GL_RG16F);
validators_.render_buffer_format.AddValue(GL_RGBA16F);
... | C | null | null | null | @@ -426,6 +426,11 @@ void FeatureInfo::EnableOESTextureHalfFloatLinear() {
return;
AddExtensionString("GL_OES_texture_half_float_linear");
feature_flags_.enable_texture_half_float_linear = true;
+
+ // TODO(capn) : Re-enable this once we have ANGLE+SwiftShader supporting
+ // IOSurfaces.
+ if (workarounds... | Chrome | cbc5d5153b18ea387f4769caa01d1339261f6ed6 | 1102f12d8e3317d18baae355789e893aba57a325 | 0 | void FeatureInfo::EnableEXTColorBufferFloat() {
if (!ext_color_buffer_float_available_)
return;
AddExtensionString("GL_EXT_color_buffer_float");
validators_.render_buffer_format.AddValue(GL_R16F);
validators_.render_buffer_format.AddValue(GL_RG16F);
validators_.render_buffer_format.AddValue(GL_RGBA16F);
... |
107,183 | null | Remote | Not required | Partial | CVE-2011-1292 | https://www.cvedetails.com/cve/CVE-2011-1292/ | CWE-399 | Low | Partial | Partial | null | 2011-03-25 | 7.5 | Use-after-free vulnerability in the frame-loader implementation in Google Chrome before 10.0.648.204 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | 2017-09-18 | DoS | 0 | https://github.com/chromium/chromium/commit/5f372f899b8709dac700710b5f0f90959dcf9ecb | 5f372f899b8709dac700710b5f0f90959dcf9ecb | Add support for autofill server experiments
BUG=none
TEST=unit_tests --gtest_filter=AutoFillMetricsTest.QualityMetricsWithExperimentId:AutoFillQueryXmlParserTest.ParseExperimentId
Review URL: http://codereview.chromium.org/6260027
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@73216 0039d316-1c4b-4281-b951-d872... | 0 | chrome/browser/autofill/autofill_manager.cc | {"sha": "ed73429e0fff008aeaa29bbc608ff7d0ce833d6d", "filename": "chrome/browser/autofill/autofill_manager.cc", "status": "modified", "additions": 26, "deletions": 16, "changes": 42, "blob_url": "https://github.com/chromium/chromium/blob/5f372f899b8709dac700710b5f0f90959dcf9ecb/chrome/browser/autofill/autofill_manager.c... | void AutoFillManager::OnInfoBarClosed(bool should_save) {
if (should_save)
personal_data_->SaveImportedCreditCard();
}
| void AutoFillManager::OnInfoBarClosed(bool should_save) {
if (should_save)
personal_data_->SaveImportedCreditCard();
}
| C | null | null | null | @@ -512,6 +512,7 @@ void AutoFillManager::LogMetricsAboutSubmittedForm(
cached_fields[field->FieldSignature()] = field;
}
+ std::string experiment_id = cached_submitted_form->server_experiment_id();
for (size_t i = 0; i < submitted_form->field_count(); ++i) {
const AutoFillField* field = submitted_fo... | Chrome | 5f372f899b8709dac700710b5f0f90959dcf9ecb | e82abf3ca2ded96bc353e4df47d20380f9d89a78 | 0 | void AutoFillManager::OnInfoBarClosed(bool should_save) {
if (should_save)
personal_data_->SaveImportedCreditCard();
}
|
54,432 | null | Remote | Not required | Partial | CVE-2016-3078 | https://www.cvedetails.com/cve/CVE-2016-3078/ | CWE-190 | Low | Partial | Partial | null | 2016-08-07 | 7.5 | Multiple integer overflows in php_zip.c in the zip extension in PHP before 7.0.6 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted call to (1) getFromIndex or (2) getFromName in the ZipArchive class. | 2017-09-06 | DoS Overflow | 0 | https://github.com/php/php-src/commit/3b8d4de300854b3517c7acb239b84f7726c1353c?w=1 | 3b8d4de300854b3517c7acb239b84f7726c1353c?w=1 | Fix bug #71923 - integer overflow in ZipArchive::getFrom* | 0 | ext/zip/php_zip.c | {"sha": "7c9adf4af780a04b82bdb1facf849d07a60b8576", "filename": "ext/zip/php_zip.c", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/php/php-src/blob/3b8d4de300854b3517c7acb239b84f7726c1353c/ext/zip/php_zip.c", "raw_url": "https://github.com/php/php-src/raw/3b8d4de300... | static zend_object *php_zip_object_new(zend_class_entry *class_type) /* {{{ */
{
ze_zip_object *intern;
intern = ecalloc(1, sizeof(ze_zip_object) + zend_object_properties_size(class_type));
intern->prop_handler = &zip_prop_handlers;
zend_object_std_init(&intern->zo, class_type);
object_properties_init(&intern->zo... | static zend_object *php_zip_object_new(zend_class_entry *class_type) /* {{{ */
{
ze_zip_object *intern;
intern = ecalloc(1, sizeof(ze_zip_object) + zend_object_properties_size(class_type));
intern->prop_handler = &zip_prop_handlers;
zend_object_std_init(&intern->zo, class_type);
object_properties_init(&intern->zo... | C | null | null | null | @@ -1281,7 +1281,7 @@ static PHP_NAMED_FUNCTION(zif_zip_entry_read)
}
if (zr_rsrc->zf) {
- buffer = zend_string_alloc(len, 0);
+ buffer = zend_string_safe_alloc(1, len, 0, 0);
n = zip_fread(zr_rsrc->zf, ZSTR_VAL(buffer), ZSTR_LEN(buffer));
if (n > 0) {
ZSTR_VAL(buffer)[n] = '\0';
@@ -2728,7 +2728,7 @@... | php-src | 3b8d4de300854b3517c7acb239b84f7726c1353c?w=1 | 7133f28df57cef51076d5045b006c5c75c664728 | 0 | static zend_object *php_zip_object_new(zend_class_entry *class_type) /* {{{ */
{
ze_zip_object *intern;
intern = ecalloc(1, sizeof(ze_zip_object) + zend_object_properties_size(class_type));
intern->prop_handler = &zip_prop_handlers;
zend_object_std_init(&intern->zo, class_type);
object_properties_init(&intern->zo... |
151,915 | null | Remote | Not required | Partial | CVE-2017-5019 | https://www.cvedetails.com/cve/CVE-2017-5019/ | CWE-416 | Medium | Partial | Partial | null | 2017-02-17 | 6.8 | A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | Convert FrameHostMsg_DidAddMessageToConsole to Mojo.
Note: Since this required changing the test
RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually
re-introduced https://crbug.com/666714 locally (the bug the test was
added for), and reran the test to confirm that it still covers the bug.
Bug: 786836
Ch... | 0 | content/browser/frame_host/render_frame_host_impl.cc | {"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render... | void RenderFrameHostImpl::CreateWebUsbService(
blink::mojom::WebUsbServiceRequest request) {
GetContentClient()->browser()->CreateWebUsbService(this, std::move(request));
}
| void RenderFrameHostImpl::CreateWebUsbService(
blink::mojom::WebUsbServiceRequest request) {
GetContentClient()->browser()->CreateWebUsbService(this, std::move(request));
}
| C | null | null | null | @@ -1375,8 +1375,6 @@ bool RenderFrameHostImpl::OnMessageReceived(const IPC::Message &msg) {
handled = true;
IPC_BEGIN_MESSAGE_MAP(RenderFrameHostImpl, msg)
- IPC_MESSAGE_HANDLER(FrameHostMsg_DidAddMessageToConsole,
- OnDidAddMessageToConsole)
IPC_MESSAGE_HANDLER(FrameHostMsg_Deta... | Chrome | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | c246049ec1b28d1af4fe3be886ac5904e1762026 | 0 | void RenderFrameHostImpl::CreateWebUsbService(
blink::mojom::WebUsbServiceRequest request) {
GetContentClient()->browser()->CreateWebUsbService(this, std::move(request));
}
|
32,418 | null | Local | Not required | null | CVE-2013-1957 | https://www.cvedetails.com/cve/CVE-2013-1957/ | CWE-264 | Medium | Complete | null | null | 2013-04-24 | 4.7 | The clone_mnt function in fs/namespace.c in the Linux kernel before 3.8.6 does not properly restrict changes to the MNT_READONLY flag, which allows local users to bypass an intended read-only property of a filesystem by leveraging a separate mount namespace. | 2013-04-25 | Bypass | 0 | https://github.com/torvalds/linux/commit/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9 | 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9 | vfs: Carefully propogate mounts across user namespaces
As a matter of policy MNT_READONLY should not be changable if the
original mounter had more privileges than creator of the mount
namespace.
Add the flag CL_UNPRIVILEGED to note when we are copying a mount from
a mount namespace that requires more privileges to a ... | 0 | fs/namespace.c | {"sha": "968d4c5eae03aa18b1326e09371aa5ada795939e", "filename": "fs/namespace.c", "status": "modified", "additions": 5, "deletions": 1, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/132c94e31b8bca8ea921f9f96a57d684fa4ae0a9/fs/namespace.c", "raw_url": "https://github.com/torvalds/linux/raw/132c94e31b... | static struct mount *skip_mnt_tree(struct mount *p)
{
struct list_head *prev = p->mnt_mounts.prev;
while (prev != &p->mnt_mounts) {
p = list_entry(prev, struct mount, mnt_child);
prev = p->mnt_mounts.prev;
}
return p;
}
| static struct mount *skip_mnt_tree(struct mount *p)
{
struct list_head *prev = p->mnt_mounts.prev;
while (prev != &p->mnt_mounts) {
p = list_entry(prev, struct mount, mnt_child);
prev = p->mnt_mounts.prev;
}
return p;
}
| C | null | null | null | @@ -798,6 +798,10 @@ static struct mount *clone_mnt(struct mount *old, struct dentry *root,
}
mnt->mnt.mnt_flags = old->mnt.mnt_flags & ~MNT_WRITE_HOLD;
+ /* Don't allow unprivileged users to change mount flags */
+ if ((flag & CL_UNPRIVILEGED) && (mnt->mnt.mnt_flags & MNT_READONLY))
+ mnt->mnt.mnt_flags |= MNT_... | linux | 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9 | 90563b198e4c6674c63672fae1923da467215f45 | 0 | static struct mount *skip_mnt_tree(struct mount *p)
{
struct list_head *prev = p->mnt_mounts.prev;
while (prev != &p->mnt_mounts) {
p = list_entry(prev, struct mount, mnt_child);
prev = p->mnt_mounts.prev;
}
return p;
}
|
104,229 | null | Remote | Not required | Partial | CVE-2011-2858 | https://www.cvedetails.com/cve/CVE-2011-2858/ | CWE-119 | Low | null | null | null | 2011-09-19 | 5 | Google Chrome before 14.0.835.163 does not properly handle triangle arrays, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | 2017-09-18 | DoS Overflow | 0 | https://github.com/chromium/chromium/commit/c13e1da62b5f5f0e6fe8c1f769a5a28415415244 | c13e1da62b5f5f0e6fe8c1f769a5a28415415244 | Revert "Revert 100494 - Fix bug in SimulateAttrib0."""
TEST=none
BUG=95625
TBR=apatrick@chromium.org
Review URL: http://codereview.chromium.org/7796016
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@100507 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | gpu/command_buffer/service/gles2_cmd_decoder_unittest.cc | {"sha": "10e2a4432c27e5fc6a4a5d1011e8970638198e4d", "filename": "gpu/command_buffer/service/gles2_cmd_decoder.cc", "status": "modified", "additions": 61, "deletions": 24, "changes": 85, "blob_url": "https://github.com/chromium/chromium/blob/c13e1da62b5f5f0e6fe8c1f769a5a28415415244/gpu/command_buffer/service/gles2_cmd_d... | ReadPixelsEmulator(GLsizei width, GLsizei height, GLint bytes_per_pixel,
const void* src_pixels, const void* expected_pixels,
GLint pack_alignment)
: width_(width),
height_(height),
pack_alignment_(pack_alignment),
bytes_per_pixel_(bytes_per_pixe... | ReadPixelsEmulator(GLsizei width, GLsizei height, GLint bytes_per_pixel,
const void* src_pixels, const void* expected_pixels,
GLint pack_alignment)
: width_(width),
height_(height),
pack_alignment_(pack_alignment),
bytes_per_pixel_(bytes_per_pixe... | C | null | null | null | @@ -55,8 +55,17 @@ class GLES2DecoderWithShaderTest : public GLES2DecoderWithShaderTestBase {
: GLES2DecoderWithShaderTestBase() {
}
- void AddExpectationsForSimulatedAttrib0(
- GLsizei num_vertices, GLuint buffer_id) {
+
+ void AddExpectationsForSimulatedAttrib0WithError(
+ GLsizei num_vertices... | Chrome | c13e1da62b5f5f0e6fe8c1f769a5a28415415244 | d5ef1b12be4e0492db2af76d7fa18c0994a51e31 | 0 | ReadPixelsEmulator(GLsizei width, GLsizei height, GLint bytes_per_pixel,
const void* src_pixels, const void* expected_pixels,
GLint pack_alignment)
: width_(width),
height_(height),
pack_alignment_(pack_alignment),
bytes_per_pixel_(bytes_per_pixe... |
25,796 | null | Local | Not required | Complete | CVE-2011-2918 | https://www.cvedetails.com/cve/CVE-2011-2918/ | CWE-399 | Low | null | null | null | 2012-05-24 | 4.9 | The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application. | 2012-05-29 | DoS Overflow | 0 | https://github.com/torvalds/linux/commit/a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | perf: Remove the nmi parameter from the swevent and overflow interface
The nmi parameter indicated if we could do wakeups from the current
context, if not, we would set some state and self-IPI and let the
resulting interrupt do the wakeup.
For the various event classes:
- hardware: nmi=0; PMI is in fact an NMI or ... | 0 | arch/x86/kernel/cpu/perf_event.c | {"sha": "8e47709160f84962bd6b2744ea6a1a5b9ae49b28", "filename": "arch/alpha/kernel/perf_event.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/a8b0ca17b80e92faab46ee7179ba9e99ccb61233/arch/alpha/kernel/perf_event.c", "raw_url": "https://github.c... | static inline void x86_pmu_read(struct perf_event *event)
{
x86_perf_event_update(event);
}
| static inline void x86_pmu_read(struct perf_event *event)
{
x86_perf_event_update(event);
}
| C | null | null | null | @@ -1339,7 +1339,7 @@ static int x86_pmu_handle_irq(struct pt_regs *regs)
if (!x86_perf_event_set_period(event))
continue;
- if (perf_event_overflow(event, 1, &data, regs))
+ if (perf_event_overflow(event, &data, regs))
x86_pmu_stop(event, 0);
}
| linux | a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | 1880c4ae182afb5650c5678949ecfe7ff66a724e | 0 | static inline void x86_pmu_read(struct perf_event *event)
{
x86_perf_event_update(event);
}
|
122,925 | null | Remote | Not required | Partial | CVE-2013-0886 | https://www.cvedetails.com/cve/CVE-2013-0886/ | null | Low | Partial | Partial | null | 2013-02-23 | 7.5 | Google Chrome before 25.0.1364.99 on Mac OS X does not properly implement signal handling for Native Client (aka NaCl) code, which has unspecified impact and attack vectors. | 2013-04-10 | null | 0 | https://github.com/chromium/chromium/commit/18d67244984a574ba2dd8779faabc0e3e34f4b76 | 18d67244984a574ba2dd8779faabc0e3e34f4b76 | Implement TextureImageTransportSurface using texture mailbox
This has a couple of advantages:
- allow tearing down and recreating the UI parent context without
losing the renderer contexts
- do not require a context to be able to generate textures when
creating the GLSurfaceHandle
- clearer ownership semantics that po... | 0 | content/browser/renderer_host/render_process_host_impl.cc | {"sha": "0ed9ae5db1a7c0de558f98ad90da03e07b6b640f", "filename": "content/browser/browser_plugin/browser_plugin_guest.cc", "status": "modified", "additions": 0, "deletions": 4, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/18d67244984a574ba2dd8779faabc0e3e34f4b76/content/browser/browser_plugin/bro... | void RenderProcessHostImpl::WidgetRestored() {
DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
visible_widgets_++;
SetBackgrounded(false);
}
| void RenderProcessHostImpl::WidgetRestored() {
DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
visible_widgets_++;
SetBackgrounded(false);
}
| C | null | null | null | @@ -1595,7 +1595,7 @@ void RenderProcessHostImpl::OnCompositorSurfaceBuffersSwappedNoHost(
"RenderWidgetHostImpl::OnCompositorSurfaceBuffersSwappedNoHost");
RenderWidgetHostImpl::AcknowledgeBufferPresent(route_id,
gpu_process_host_id,
- ... | Chrome | 18d67244984a574ba2dd8779faabc0e3e34f4b76 | 64019711f86ff49388846f4459958991afdcf27e | 0 | void RenderProcessHostImpl::WidgetRestored() {
// Verify we were properly backgrounded.
DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
visible_widgets_++;
SetBackgrounded(false);
}
|
143,200 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2016-07 | null | 0 | https://github.com/chromium/chromium/commit/8353baf8d1504dbdd4ad7584ff2466de657521cd | 8353baf8d1504dbdd4ad7584ff2466de657521cd | Remove WebFrame::canHaveSecureChild
To simplify the public API, ServiceWorkerNetworkProvider can do the
parent walk itself.
Follow-up to https://crrev.com/ad1850962644e19.
BUG=607543
Review-Url: https://codereview.chromium.org/2082493002
Cr-Commit-Position: refs/heads/master@{#400896} | 0 | third_party/WebKit/Source/core/dom/Document.cpp | {"sha": "5c883a0154ddb182d6ad680b5a4c77660f2b373f", "filename": "content/child/service_worker/service_worker_network_provider.cc", "status": "modified", "additions": 15, "deletions": 2, "changes": 17, "blob_url": "https://github.com/chromium/chromium/blob/8353baf8d1504dbdd4ad7584ff2466de657521cd/content/child/service_w... | void Document::hoveredNodeDetached(Element& element)
{
if (!m_hoverNode)
return;
m_hoverNode->updateDistribution();
if (element != m_hoverNode && (!m_hoverNode->isTextNode() || element != FlatTreeTraversal::parent(*m_hoverNode)))
return;
m_hoverNode = FlatTreeTraversal::parent(element)... | void Document::hoveredNodeDetached(Element& element)
{
if (!m_hoverNode)
return;
m_hoverNode->updateDistribution();
if (element != m_hoverNode && (!m_hoverNode->isTextNode() || element != FlatTreeTraversal::parent(*m_hoverNode)))
return;
m_hoverNode = FlatTreeTraversal::parent(element)... | C | null | null | null | @@ -3355,9 +3355,14 @@ bool Document::isSecureContextImpl(const SecureContextCheck privilegeContextChec
return true;
if (privilegeContextCheck == StandardSecureContextCheck) {
- Frame* parent = m_frame ? m_frame->tree().parent() : nullptr;
- if (parent && !parent->canHaveSecureChild())
- ... | Chrome | 8353baf8d1504dbdd4ad7584ff2466de657521cd | 04817566fb446d8315cbc4049266c4859a010a74 | 0 | void Document::hoveredNodeDetached(Element& element)
{
if (!m_hoverNode)
return;
m_hoverNode->updateDistribution();
if (element != m_hoverNode && (!m_hoverNode->isTextNode() || element != FlatTreeTraversal::parent(*m_hoverNode)))
return;
m_hoverNode = FlatTreeTraversal::parent(element)... |
34,767 | null | Local | Not required | Complete | CVE-2011-3638 | https://www.cvedetails.com/cve/CVE-2011-3638/ | null | High | null | null | null | 2013-03-01 | 4 | fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations. | 2013-03-04 | DoS | 0 | https://github.com/torvalds/linux/commit/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3 | 667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3 | ext4: reimplement convert and split_unwritten
Reimplement ext4_ext_convert_to_initialized() and
ext4_split_unwritten_extents() using ext4_split_extent()
Signed-off-by: Yongqiang Yang <xiaoqiangnk@gmail.com>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Tested-by: Allison Henderson <achender@linux.vnet.ibm.com> | 0 | fs/ext4/extents.c | {"sha": "e363f21b091bcbac17b84a3bbdee6a6d5d20d65d", "filename": "fs/ext4/extents.c", "status": "modified", "additions": 72, "deletions": 408, "changes": 480, "blob_url": "https://github.com/torvalds/linux/blob/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3/fs/ext4/extents.c", "raw_url": "https://github.com/torvalds/linux/raw... | static inline int ext4_ext_space_root(struct inode *inode, int check)
{
int size;
size = sizeof(EXT4_I(inode)->i_data);
size -= sizeof(struct ext4_extent_header);
size /= sizeof(struct ext4_extent);
if (!check) {
#ifdef AGGRESSIVE_TEST
if (size > 3)
size = 3;
#endif
}
return size;
}
| static inline int ext4_ext_space_root(struct inode *inode, int check)
{
int size;
size = sizeof(EXT4_I(inode)->i_data);
size -= sizeof(struct ext4_extent_header);
size /= sizeof(struct ext4_extent);
if (!check) {
#ifdef AGGRESSIVE_TEST
if (size > 3)
size = 3;
#endif
}
return size;
}
| C | null | null | null | @@ -2757,17 +2757,13 @@ static int ext4_ext_convert_to_initialized(handle_t *handle,
struct ext4_map_blocks *map,
struct ext4_ext_path *path)
{
- struct ext4_extent *ex, newex, orig_ex;
- struct ext4_extent *ex1 = NULL;
- struct ext4_extent *ex2 = NULL;
- struct ext4_extent *ex3 = NULL;
- struct ext4... | linux | 667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3 | 47ea3bb59cf47298b1cbb4d7bef056b3afea0879 | 0 | static inline int ext4_ext_space_root(struct inode *inode, int check)
{
int size;
size = sizeof(EXT4_I(inode)->i_data);
size -= sizeof(struct ext4_extent_header);
size /= sizeof(struct ext4_extent);
if (!check) {
#ifdef AGGRESSIVE_TEST
if (size > 3)
size = 3;
#endif
}
return size;
}
|
56,205 | null | Local | Not required | Complete | CVE-2015-8955 | https://www.cvedetails.com/cve/CVE-2015-8955/ | CWE-264 | Medium | Complete | Complete | null | 2016-10-10 | 6.9 | arch/arm64/kernel/perf_event.c in the Linux kernel before 4.1 on arm64 platforms allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via vectors involving events that are mishandled during a span of multiple HW PMUs. | 2016-11-28 | DoS +Priv | 0 | https://github.com/torvalds/linux/commit/8fff105e13041e49b82f92eef034f363a6b1c071 | 8fff105e13041e49b82f92eef034f363a6b1c071 | arm64: perf: reject groups spanning multiple HW PMUs
The perf core implicitly rejects events spanning multiple HW PMUs, as in
these cases the event->ctx will differ. However this validation is
performed after pmu::event_init() is called in perf_init_event(), and
thus pmu::event_init() may be called with a group leader... | 0 | arch/arm64/kernel/perf_event.c | {"sha": "68a74151fa6cf84002cd3be98a0fc29f67a40b02", "filename": "arch/arm64/kernel/perf_event.c", "status": "modified", "additions": 15, "deletions": 6, "changes": 21, "blob_url": "https://github.com/torvalds/linux/blob/8fff105e13041e49b82f92eef034f363a6b1c071/arch/arm64/kernel/perf_event.c", "raw_url": "https://github... | static inline int armv8pmu_disable_intens(int idx)
{
u32 counter;
if (!armv8pmu_counter_valid(idx)) {
pr_err("CPU%u disabling wrong PMNC counter IRQ enable %d\n",
smp_processor_id(), idx);
return -EINVAL;
}
counter = ARMV8_IDX_TO_COUNTER(idx);
asm volatile("msr pmintenclr_el1, %0" :: "r" (BIT(counter)));
... | static inline int armv8pmu_disable_intens(int idx)
{
u32 counter;
if (!armv8pmu_counter_valid(idx)) {
pr_err("CPU%u disabling wrong PMNC counter IRQ enable %d\n",
smp_processor_id(), idx);
return -EINVAL;
}
counter = ARMV8_IDX_TO_COUNTER(idx);
asm volatile("msr pmintenclr_el1, %0" :: "r" (BIT(counter)));
... | C | null | null | null | @@ -322,22 +322,31 @@ armpmu_add(struct perf_event *event, int flags)
}
static int
-validate_event(struct pmu_hw_events *hw_events,
- struct perf_event *event)
+validate_event(struct pmu *pmu, struct pmu_hw_events *hw_events,
+ struct perf_event *event)
{
- struct arm_pmu *armpmu = to_arm_pmu(event->pmu)... | linux | 8fff105e13041e49b82f92eef034f363a6b1c071 | 4a97abd44329bf7b9c57f020224da5f823c9c9ea | 0 | static inline int armv8pmu_disable_intens(int idx)
{
u32 counter;
if (!armv8pmu_counter_valid(idx)) {
pr_err("CPU%u disabling wrong PMNC counter IRQ enable %d\n",
smp_processor_id(), idx);
return -EINVAL;
}
counter = ARMV8_IDX_TO_COUNTER(idx);
asm volatile("msr pmintenclr_el1, %0" :: "r" (BIT(counter)));
... |
73,852 | null | Remote | Not required | Partial | CVE-2016-5735 | https://www.cvedetails.com/cve/CVE-2016-5735/ | CWE-190 | Medium | Partial | Partial | null | 2017-05-23 | 6.8 | Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow. | 2017-05-31 | Overflow | 0 | https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 | b7c217680cda02dddced245d237ebe8c383be285 | Fix integer overflow in rwpng.h (CVE-2016-5735)
Reported by Choi Jaeseung
Found with Sparrow (http://ropas.snu.ac.kr/sparrow) | 0 | rwpng.c | {"sha": "e3f59d11007489f2ad5f9af11d86c1f060f26ca0", "filename": "rwpng.c", "status": "modified", "additions": 6, "deletions": 6, "changes": 12, "blob_url": "https://github.com/kornelski/pngquant/blob/b7c217680cda02dddced245d237ebe8c383be285/rwpng.c", "raw_url": "https://github.com/kornelski/pngquant/raw/b7c217680cda02d... | static void rwpng_free_chunks(struct rwpng_chunk *chunk) {
if (!chunk) return;
rwpng_free_chunks(chunk->next);
free(chunk->data);
free(chunk);
}
| static void rwpng_free_chunks(struct rwpng_chunk *chunk) {
if (!chunk) return;
rwpng_free_chunks(chunk->next);
free(chunk->data);
free(chunk);
}
| C | null | null | null | @@ -244,12 +244,6 @@ static pngquant_error rwpng_read_image24_libpng(FILE *infile, png24_image *mainp
png_get_IHDR(png_ptr, info_ptr, &mainprog_ptr->width, &mainprog_ptr->height,
&bit_depth, &color_type, NULL, NULL, NULL);
- // For overflow safety reject images that won't fit in 32-bit
- ... | pngquant | b7c217680cda02dddced245d237ebe8c383be285 | 350c3a4b0d178daad53fd9fc7213bb94c348dd95 | 0 | static void rwpng_free_chunks(struct rwpng_chunk *chunk) {
if (!chunk) return;
rwpng_free_chunks(chunk->next);
free(chunk->data);
free(chunk);
}
|
83,242 | null | Local | Not required | Partial | CVE-2018-10124 | https://www.cvedetails.com/cve/CVE-2018-10124/ | CWE-119 | Low | null | null | null | 2018-04-16 | 2.1 | The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument. | 2018-08-24 | DoS Overflow | 0 | https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473 | 4ea77014af0d6205b05503d1c7aac6eace11d473 | kernel/signal.c: avoid undefined behaviour in kill_something_info
When running kill(72057458746458112, 0) in userspace I hit the following
issue.
UBSAN: Undefined behaviour in kernel/signal.c:1462:11
negation of -2147483648 cannot be represented in type 'int':
CPU: 226 PID: 9849 Comm: test Tainted: G B ... | 0 | kernel/signal.c | {"sha": "caed9133ae52733aa96baf74cb4ef3c344832125", "filename": "kernel/signal.c", "status": "modified", "additions": 4, "deletions": 0, "changes": 4, "blob_url": "https://github.com/torvalds/linux/blob/4ea77014af0d6205b05503d1c7aac6eace11d473/kernel/signal.c", "raw_url": "https://github.com/torvalds/linux/raw/4ea77014... | static int sigsuspend(sigset_t *set)
{
current->saved_sigmask = current->blocked;
set_current_blocked(set);
while (!signal_pending(current)) {
__set_current_state(TASK_INTERRUPTIBLE);
schedule();
}
set_restore_sigmask();
return -ERESTARTNOHAND;
}
| static int sigsuspend(sigset_t *set)
{
current->saved_sigmask = current->blocked;
set_current_blocked(set);
while (!signal_pending(current)) {
__set_current_state(TASK_INTERRUPTIBLE);
schedule();
}
set_restore_sigmask();
return -ERESTARTNOHAND;
}
| C | null | null | null | @@ -1402,6 +1402,10 @@ static int kill_something_info(int sig, struct siginfo *info, pid_t pid)
return ret;
}
+ /* -INT_MIN is undefined. Exclude this case to avoid a UBSAN warning */
+ if (pid == INT_MIN)
+ return -ESRCH;
+
read_lock(&tasklist_lock);
if (pid != -1) {
ret = __kill_pgrp_info(sig, info, | linux | 4ea77014af0d6205b05503d1c7aac6eace11d473 | 67c6777a5d331dda32a4c4a1bf0cac85bdaaaed8 | 0 | static int sigsuspend(sigset_t *set)
{
current->saved_sigmask = current->blocked;
set_current_blocked(set);
while (!signal_pending(current)) {
__set_current_state(TASK_INTERRUPTIBLE);
schedule();
}
set_restore_sigmask();
return -ERESTARTNOHAND;
}
|
163,915 | null | Remote | Not required | Partial | CVE-2017-15395 | https://www.cvedetails.com/cve/CVE-2017-15395/ | CWE-416 | Medium | null | null | null | 2018-02-07 | 4.3 | A use after free in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka an ImageCapture NULL pointer dereference. | 2018-02-23 | null | 0 | https://github.com/chromium/chromium/commit/84ca1ee18bbc32f3cb035d071e8271e064dfd4d7 | 84ca1ee18bbc32f3cb035d071e8271e064dfd4d7 | Convert MediaTrackConstraints to a ScriptValue
IDLDictionaries such as MediaTrackConstraints should not be stored on
the heap which would happen when binding one as a parameter to a
callback. This change converts the object to a ScriptValue ahead of
time. This is fine because the value will be passed to a
ScriptPromis... | 0 | third_party/WebKit/Source/modules/imagecapture/ImageCapture.cpp | {"sha": "cfa6bc543e33e519feeaed6ec885e00d5a49277b", "filename": "third_party/WebKit/LayoutTests/imagecapture/MediaStreamTrack-applyConstraints.html", "status": "modified", "additions": 3, "deletions": 1, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/84ca1ee18bbc32f3cb035d071e8271e064dfd4d7/third_... | ScriptPromise ImageCapture::getPhotoCapabilities(ScriptState* script_state) {
ScriptPromiseResolver* resolver = ScriptPromiseResolver::Create(script_state);
ScriptPromise promise = resolver->Promise();
if (!service_) {
resolver->Reject(DOMException::Create(kNotFoundError, kNoServiceError));
return promis... | ScriptPromise ImageCapture::getPhotoCapabilities(ScriptState* script_state) {
ScriptPromiseResolver* resolver = ScriptPromiseResolver::Create(script_state);
ScriptPromise promise = resolver->Promise();
if (!service_) {
resolver->Reject(DOMException::Create(kNotFoundError, kNoServiceError));
return promis... | C | null | null | null | @@ -541,8 +541,12 @@ void ImageCapture::SetMediaTrackConstraints(
MediaTrackConstraints resolver_constraints;
resolver_constraints.setAdvanced(constraints_vector);
- auto resolver_cb = WTF::Bind(&ImageCapture::ResolveWithMediaTrackConstraints,
- WrapPersistent(this), resolver_cons... | Chrome | 84ca1ee18bbc32f3cb035d071e8271e064dfd4d7 | aba274a9a60f4084e9459113ce2161c258ac71bc | 0 | ScriptPromise ImageCapture::getPhotoCapabilities(ScriptState* script_state) {
ScriptPromiseResolver* resolver = ScriptPromiseResolver::Create(script_state);
ScriptPromise promise = resolver->Promise();
if (!service_) {
resolver->Reject(DOMException::Create(kNotFoundError, kNoServiceError));
return promis... |
146,959 | null | Remote | Not required | null | CVE-2017-5118 | https://www.cvedetails.com/cve/CVE-2017-5118/ | CWE-732 | Medium | null | Partial | null | 2017-10-27 | 4.3 | Blink in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, failed to correctly propagate CSP restrictions to javascript scheme pages, which allowed a remote attacker to bypass content security policy via a crafted HTML page. | 2019-10-02 | Bypass | 0 | https://github.com/chromium/chromium/commit/0ab2412a104d2f235d7b9fe19d30ef605a410832 | 0ab2412a104d2f235d7b9fe19d30ef605a410832 | Inherit CSP when we inherit the security origin
This prevents attacks that use main window navigation to get out of the
existing csp constraints such as the related bug
Bug: 747847
Change-Id: I1e57b50da17f65d38088205b0a3c7c49ef2ae4d8
Reviewed-on: https://chromium-review.googlesource.com/592027
Reviewed-by: Mike West ... | 0 | third_party/WebKit/Source/core/frame/WebLocalFrameImpl.cpp | {"sha": "21c4fb33ce2d66db750d92a892e3871bd5d9b576", "filename": "third_party/WebKit/LayoutTests/external/wpt/content-security-policy/navigation/javascript-url-navigation-inherits-csp.html", "status": "added", "additions": 16, "deletions": 0, "changes": 16, "blob_url": "https://github.com/chromium/chromium/blob/0ab2412a... | bool WebLocalFrameImpl::DispatchBeforeUnloadEvent(bool is_reload) {
if (!GetFrame())
return true;
return GetFrame()->Loader().ShouldClose(is_reload);
}
| bool WebLocalFrameImpl::DispatchBeforeUnloadEvent(bool is_reload) {
if (!GetFrame())
return true;
return GetFrame()->Loader().ShouldClose(is_reload);
}
| C | null | null | null | @@ -1818,7 +1818,6 @@ void WebLocalFrameImpl::SetInputEventsScaleForEmulation(
void WebLocalFrameImpl::LoadJavaScriptURL(const KURL& url) {
DCHECK(GetFrame());
-
// This is copied from ScriptController::executeScriptIfJavaScriptURL.
// Unfortunately, we cannot just use that method since it is private, and
... | Chrome | 0ab2412a104d2f235d7b9fe19d30ef605a410832 | fb6b7d43431f6a142d53150d14f441cbf1f3e461 | 0 | bool WebLocalFrameImpl::DispatchBeforeUnloadEvent(bool is_reload) {
if (!GetFrame())
return true;
return GetFrame()->Loader().ShouldClose(is_reload);
}
|
153,613 | null | Remote | Not required | Partial | CVE-2016-5219 | https://www.cvedetails.com/cve/CVE-2016-5219/ | CWE-416 | Medium | Partial | Partial | null | 2017-01-19 | 6.8 | A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/a4150b688a754d3d10d2ca385155b1c95d77d6ae | a4150b688a754d3d10d2ca385155b1c95d77d6ae | Add GL_PROGRAM_COMPLETION_QUERY_CHROMIUM
This makes the query of GL_COMPLETION_STATUS_KHR to programs much
cheaper by minimizing the round-trip to the GPU thread.
Bug: 881152, 957001
Change-Id: Iadfa798af29225e752c710ca5c25f50b3dd3101a
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1586630
Com... | 0 | gpu/command_buffer/client/gles2_implementation.cc | {"sha": "f2c24a308124d59e8d878f4ee2db0bff4e3374a2", "filename": "gpu/GLES2/extensions/CHROMIUM/CHROMIUM_completion_query.txt", "status": "added", "additions": 55, "deletions": 0, "changes": 55, "blob_url": "https://github.com/chromium/chromium/blob/a4150b688a754d3d10d2ca385155b1c95d77d6ae/gpu/GLES2/extensions/CHROMIUM/... | void GLES2Implementation::DeleteRenderbuffersHelper(
GLsizei n,
const GLuint* renderbuffers) {
if (!GetIdHandler(SharedIdNamespaces::kRenderbuffers)
->FreeIds(this, n, renderbuffers,
&GLES2Implementation::DeleteRenderbuffersStub)) {
SetGLError(GL_INVALID_VALUE, "glDeleteRen... | void GLES2Implementation::DeleteRenderbuffersHelper(
GLsizei n,
const GLuint* renderbuffers) {
if (!GetIdHandler(SharedIdNamespaces::kRenderbuffers)
->FreeIds(this, n, renderbuffers,
&GLES2Implementation::DeleteRenderbuffersStub)) {
SetGLError(GL_INVALID_VALUE, "glDeleteRen... | C | null | null | null | @@ -6078,6 +6078,7 @@ void GLES2Implementation::BeginQueryEXT(GLenum target, GLuint id) {
case GL_LATENCY_QUERY_CHROMIUM:
case GL_ASYNC_PIXEL_PACK_COMPLETED_CHROMIUM:
case GL_GET_ERROR_QUERY_CHROMIUM:
+ case GL_PROGRAM_COMPLETION_QUERY_CHROMIUM:
break;
case GL_READBACK_SHADOW_COPIES_UPDATE... | Chrome | a4150b688a754d3d10d2ca385155b1c95d77d6ae | afa5506de063d1d6fd1a854c825b568337c29bc7 | 0 | void GLES2Implementation::DeleteRenderbuffersHelper(
GLsizei n,
const GLuint* renderbuffers) {
if (!GetIdHandler(SharedIdNamespaces::kRenderbuffers)
->FreeIds(this, n, renderbuffers,
&GLES2Implementation::DeleteRenderbuffersStub)) {
SetGLError(GL_INVALID_VALUE, "glDeleteRen... |
25,173 | null | Remote | Not required | Partial | CVE-2011-3188 | https://www.cvedetails.com/cve/CVE-2011-3188/ | null | Medium | Partial | Partial | null | 2012-05-24 | 6.8 | The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and ... | 2016-08-22 | DoS | 0 | https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec | 6e5714eaf77d79ae1c8b47e3e040ff5411b717ec | net: Compute protocol sequence numbers and fragment IDs using MD5.
Computers have become a lot faster since we compromised on the
partial MD4 hash which we use currently for performance reasons.
MD5 is a much safer choice, and is inline with both RFC1948 and
other ISS generators (OpenBSD, Solaris, etc.)
Furthermore,... | 0 | net/ipv4/route.c | {"sha": "c35a785005b08e132f23447ac31365853b5acd9c", "filename": "drivers/char/random.c", "status": "modified", "additions": 8, "deletions": 341, "changes": 349, "blob_url": "https://github.com/torvalds/linux/blob/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec/drivers/char/random.c", "raw_url": "https://github.com/torvalds/li... | static int rt_garbage_collect(struct dst_ops *ops)
{
static unsigned long expire = RT_GC_TIMEOUT;
static unsigned long last_gc;
static int rover;
static int equilibrium;
struct rtable *rth;
struct rtable __rcu **rthp;
unsigned long now = jiffies;
int goal;
int entries = dst_entries_get_fast(&ipv4_dst_ops);
/... | static int rt_garbage_collect(struct dst_ops *ops)
{
static unsigned long expire = RT_GC_TIMEOUT;
static unsigned long last_gc;
static int rover;
static int equilibrium;
struct rtable *rth;
struct rtable __rcu **rthp;
unsigned long now = jiffies;
int goal;
int entries = dst_entries_get_fast(&ipv4_dst_ops);
/... | C | null | null | null | @@ -109,6 +109,7 @@
#include <linux/sysctl.h>
#endif
#include <net/atmclip.h>
+#include <net/secure_seq.h>
#define RT_FL_TOS(oldflp4) \
((u32)(oldflp4->flowi4_tos & (IPTOS_RT_MASK | RTO_ONLINK))) | linux | 6e5714eaf77d79ae1c8b47e3e040ff5411b717ec | bc0b96b54a21246e377122d54569eef71cec535f | 0 | static int rt_garbage_collect(struct dst_ops *ops)
{
static unsigned long expire = RT_GC_TIMEOUT;
static unsigned long last_gc;
static int rover;
static int equilibrium;
struct rtable *rth;
struct rtable __rcu **rthp;
unsigned long now = jiffies;
int goal;
int entries = dst_entries_get_fast(&ipv4_dst_ops);
/... |
10,972 | null | Remote | Not required | Partial | CVE-2016-4539 | https://www.cvedetails.com/cve/CVE-2016-4539/ | CWE-119 | Low | Partial | Partial | null | 2016-05-21 | 7.5 | The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser l... | 2018-10-30 | DoS Overflow | 0 | https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc | dccda88f27a084bcbbb30198ace12b4e7ae961cc | null | 0 | null | null | PHP_FUNCTION(xml_set_processing_instruction_handler)
{
xml_parser *parser;
zval *pind, **hdl;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rZ", &pind, &hdl) == FAILURE) {
return;
}
ZEND_FETCH_RESOURCE(parser,xml_parser *, &pind, -1, "XML Parser", le_xml_parser);
xml_set_handler(&parser->processing... | PHP_FUNCTION(xml_set_processing_instruction_handler)
{
xml_parser *parser;
zval *pind, **hdl;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rZ", &pind, &hdl) == FAILURE) {
return;
}
ZEND_FETCH_RESOURCE(parser,xml_parser *, &pind, -1, "XML Parser", le_xml_parser);
xml_set_handler(&parser->processing... | C | null | null | f856734c6789314ce50b19d36d523911ef6c6a79 | @@ -283,7 +283,7 @@ xml_encoding xml_encodings[] = {
static XML_Memory_Handling_Suite php_xml_mem_hdlrs;
/* True globals, no need for thread safety */
-static int le_xml_parser;
+static int le_xml_parser;
/* }}} */
@@ -343,7 +343,7 @@ PHP_MINIT_FUNCTION(xml)
REGISTER_LONG_CONSTANT("XML_OPTION_SKIP_WHI... | php | https://git.php.net/?p=php-src.git;a=blob;f=ext/xml/xml.c;h=5277588813f5a712f2c055a9a20fe2dc1e498e1f;hb=dccda88f27a084bcbbb30198ace12b4e7ae961cc | https://git.php.net/?p=php-src.git;a=blob;f=ext/xml/xml.c;h=84d4253b0fd707e7a47038dca3ea8e675ee0e3f6 | 0 | PHP_FUNCTION(xml_set_processing_instruction_handler)
{
xml_parser *parser;
zval *pind, **hdl;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rZ", &pind, &hdl) == FAILURE) {
return;
}
ZEND_FETCH_RESOURCE(parser,xml_parser *, &pind, -1, "XML Parser", le_xml_parser);
xml_set_handler(&parser->processing... |
82,977 | null | Remote | Not required | Partial | CVE-2018-11363 | https://www.cvedetails.com/cve/CVE-2018-11363/ | CWE-125 | Low | null | null | null | 2018-05-22 | 5 | jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read. | 2019-10-02 | null | 0 | https://github.com/AndreRenaud/PDFGen/commit/ee58aff6918b8bbc3be29b9e3089485ea46ff956 | ee58aff6918b8bbc3be29b9e3089485ea46ff956 | jpeg: Fix another possible buffer overrun
Found via the clang libfuzzer | 0 | pdfgen.c | {"sha": "90ce28713cc4d648a92ab59cac2f48286e62dfc2", "filename": "pdfgen.c", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/AndreRenaud/PDFGen/blob/ee58aff6918b8bbc3be29b9e3089485ea46ff956/pdfgen.c", "raw_url": "https://github.com/AndreRenaud/PDFGen/raw/ee58aff6918b8b... | static void flexarray_clear(struct flexarray *flex)
{
int i;
for (i = 0; i < flex->bin_count; i++)
free(flex->bins[i]);
free(flex->bins);
flex->bin_count = 0;
flex->item_count = 0;
}
| static void flexarray_clear(struct flexarray *flex)
{
int i;
for (i = 0; i < flex->bin_count; i++)
free(flex->bins[i]);
free(flex->bins);
flex->bin_count = 0;
flex->item_count = 0;
}
| C | null | null | null | @@ -2036,7 +2036,8 @@ static int jpeg_size(unsigned char* data, unsigned int data_size,
return 0;
}
i+=2;
- block_length = data[i] * 256 + data[i+1];
+ if (i + 1 < data_size)
+ block_length = data[i] * 256 + data[i+1... | PDFGen | ee58aff6918b8bbc3be29b9e3089485ea46ff956 | 5f5909763333c205d9392612cabc9dc55854ecae | 0 | static void flexarray_clear(struct flexarray *flex)
{
int i;
for (i = 0; i < flex->bin_count; i++)
free(flex->bins[i]);
free(flex->bins);
flex->bin_count = 0;
flex->item_count = 0;
}
|
108,588 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2012-12 | null | 0 | https://github.com/chromium/chromium/commit/c975c78878fff68e82333f599882a7f73cb721ea | c975c78878fff68e82333f599882a7f73cb721ea | Initialize renderer color preferences to reasonable defaults.
BUG=158422
TEST=as in bug
Review URL: https://chromiumcodereview.appspot.com/11365096
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@166146 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/shell/shell_gtk.cc | {"sha": "2ee7cc18de4a3260ea6ad55b0de5c59061b8816f", "filename": "content/public/common/renderer_preferences.cc", "status": "modified", "additions": 10, "deletions": 8, "changes": 18, "blob_url": "https://github.com/chromium/chromium/blob/c975c78878fff68e82333f599882a7f73cb721ea/content/public/common/renderer_preference... | void Shell::OnBackButtonClicked(GtkWidget* widget) {
GoBackOrForward(-1);
}
| void Shell::OnBackButtonClicked(GtkWidget* widget) {
GoBackOrForward(-1);
}
| C | null | null | null | @@ -17,7 +17,6 @@
#include "content/public/common/renderer_preferences.h"
#include "content/shell/shell_browser_context.h"
#include "content/shell/shell_content_browser_client.h"
-#include "third_party/skia/include/core/SkColor.h"
namespace content {
@@ -190,20 +189,6 @@ void Shell::PlatformCreateWindow(int wid... | Chrome | c975c78878fff68e82333f599882a7f73cb721ea | d8b49361b62e00480d9a19521d27b2c5dd607352 | 0 | void Shell::OnBackButtonClicked(GtkWidget* widget) {
GoBackOrForward(-1);
}
|
75,654 | null | Remote | Not required | Partial | CVE-2018-19840 | https://www.cvedetails.com/cve/CVE-2018-19840/ | CWE-835 | Medium | null | null | null | 2018-12-04 | 4.3 | The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero. | 2019-10-02 | null | 0 | https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51 | 070ef6f138956d9ea9612e69586152339dbefe51 | issue #53: error out on zero sample rate | 0 | src/pack_utils.c | {"sha": "2a834978a9166cfbd1c7a0ab734ca75ed8d7c66d", "filename": "src/pack_utils.c", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/dbry/WavPack/blob/070ef6f138956d9ea9612e69586152339dbefe51/src/pack_utils.c", "raw_url": "https://github.com/dbry/WavPack/raw/070ef6f138... | static char *write_metadata (WavpackMetadata *wpmd, char *outdata)
{
unsigned char id = wpmd->id, wordlen [3];
wordlen [0] = (wpmd->byte_length + 1) >> 1;
wordlen [1] = (wpmd->byte_length + 1) >> 9;
wordlen [2] = (wpmd->byte_length + 1) >> 17;
if (wpmd->byte_length & 1)
id |= ID_ODD_SIZE;
... | static char *write_metadata (WavpackMetadata *wpmd, char *outdata)
{
unsigned char id = wpmd->id, wordlen [3];
wordlen [0] = (wpmd->byte_length + 1) >> 1;
wordlen [1] = (wpmd->byte_length + 1) >> 9;
wordlen [2] = (wpmd->byte_length + 1) >> 17;
if (wpmd->byte_length & 1)
id |= ID_ODD_SIZE;
... | C | null | null | null | @@ -195,6 +195,11 @@ int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64
int num_chans = config->num_channels;
int i;
+ if (!config->sample_rate) {
+ strcpy (wpc->error_message, "sample rate cannot be zero!");
+ return FALSE;
+ }
+
wpc->stream_version = ... | WavPack | 070ef6f138956d9ea9612e69586152339dbefe51 | e731cea83d52cccb4d3cde4f6503b22ba145de21 | 0 | static char *write_metadata (WavpackMetadata *wpmd, char *outdata)
{
unsigned char id = wpmd->id, wordlen [3];
wordlen [0] = (wpmd->byte_length + 1) >> 1;
wordlen [1] = (wpmd->byte_length + 1) >> 9;
wordlen [2] = (wpmd->byte_length + 1) >> 17;
if (wpmd->byte_length & 1)
id |= ID_ODD_SIZE;
... |
54,273 | null | Local | Not required | Complete | CVE-2016-3134 | https://www.cvedetails.com/cve/CVE-2016-3134/ | CWE-119 | Low | Complete | Complete | null | 2016-04-27 | 7.2 | The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call. | 2018-01-04 | DoS Overflow +Priv Mem. Corr. | 0 | https://github.com/torvalds/linux/commit/54d83fc74aa9ec72794373cb47432c5f7fb1a309 | 54d83fc74aa9ec72794373cb47432c5f7fb1a309 | netfilter: x_tables: fix unconditional helper
Ben Hawkes says:
In the mark_source_chains function (net/ipv4/netfilter/ip_tables.c) it
is possible for a user-supplied ipt_entry structure to have a large
next_offset field. This field is not bounds checked prior to writing a
counter value at the supplied offset.
Pr... | 0 | net/ipv4/netfilter/arp_tables.c | {"sha": "a1bb5e7129a2fe94b09273e283ccf27962db8e7e", "filename": "net/ipv4/netfilter/arp_tables.c", "status": "modified", "additions": 9, "deletions": 9, "changes": 18, "blob_url": "https://github.com/torvalds/linux/blob/54d83fc74aa9ec72794373cb47432c5f7fb1a309/net/ipv4/netfilter/arp_tables.c", "raw_url": "https://githu... | check_compat_entry_size_and_hooks(struct compat_arpt_entry *e,
struct xt_table_info *newinfo,
unsigned int *size,
const unsigned char *base,
const unsigned char *limit,
const unsigned int *hook_entries,
const unsigned int *underflows,
const char *name)
{
struct xt_entry_target... | check_compat_entry_size_and_hooks(struct compat_arpt_entry *e,
struct xt_table_info *newinfo,
unsigned int *size,
const unsigned char *base,
const unsigned char *limit,
const unsigned int *hook_entries,
const unsigned int *underflows,
const char *name)
{
struct xt_entry_target... | C | null | null | null | @@ -359,11 +359,12 @@ unsigned int arpt_do_table(struct sk_buff *skb,
}
/* All zeroes == unconditional rule. */
-static inline bool unconditional(const struct arpt_arp *arp)
+static inline bool unconditional(const struct arpt_entry *e)
{
static const struct arpt_arp uncond;
- return memcmp(arp, &uncond, sizeof... | linux | 54d83fc74aa9ec72794373cb47432c5f7fb1a309 | 6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91 | 0 | check_compat_entry_size_and_hooks(struct compat_arpt_entry *e,
struct xt_table_info *newinfo,
unsigned int *size,
const unsigned char *base,
const unsigned char *limit,
const unsigned int *hook_entries,
const unsigned int *underflows,
const char *name)
{
struct xt_entry_target... |
153,131 | null | Remote | Not required | Partial | CVE-2016-5216 | https://www.cvedetails.com/cve/CVE-2016-5216/ | CWE-416 | Medium | Partial | Partial | null | 2017-01-19 | 6.8 | A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/bf6a6765d44b09c64b8c75d749efb84742a250e7 | bf6a6765d44b09c64b8c75d749efb84742a250e7 | [pdf] Defer page unloading in JS callback.
One of the callbacks from PDFium JavaScript into the embedder is to get the
current page number. In Chromium, this will trigger a call to
CalculateMostVisiblePage that method will determine the visible pages and unload
any non-visible pages. But, if the originating JS is on a... | 0 | pdf/pdfium/pdfium_engine.cc | {"sha": "878ee20a7c325e6ac076a520d5db86af9c4b9ba4", "filename": "pdf/pdfium/pdfium_engine.cc", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/chromium/chromium/blob/bf6a6765d44b09c64b8c75d749efb84742a250e7/pdf/pdfium/pdfium_engine.cc", "raw_url": "https://github.com/... | void Unsupported_Handler(UNSUPPORT_INFO*, int type) {
if (!g_engine_for_unsupported) {
NOTREACHED();
return;
}
g_engine_for_unsupported->UnsupportedFeature(type);
}
| void Unsupported_Handler(UNSUPPORT_INFO*, int type) {
if (!g_engine_for_unsupported) {
NOTREACHED();
return;
}
g_engine_for_unsupported->UnsupportedFeature(type);
}
| C | null | null | null | @@ -2287,7 +2287,13 @@ int PDFiumEngine::GetMostVisiblePage() {
if (in_flight_visible_page_)
return *in_flight_visible_page_;
+ // We can call GetMostVisiblePage through a callback from PDFium. We have
+ // to defer the page deletion otherwise we could potentially delete the page
+ // that originated the c... | Chrome | bf6a6765d44b09c64b8c75d749efb84742a250e7 | d62b0ef3d51e6c96e3bb960c1a4fa395082dccf9 | 0 | void Unsupported_Handler(UNSUPPORT_INFO*, int type) {
if (!g_engine_for_unsupported) {
NOTREACHED();
return;
}
g_engine_for_unsupported->UnsupportedFeature(type);
}
|
95,582 | null | Remote | Not required | Complete | CVE-2017-6903 | https://www.cvedetails.com/cve/CVE-2017-6903/ | CWE-269 | Medium | Complete | Complete | null | 2017-03-14 | 9.3 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | 2019-10-02 | null | 0 | https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998 | 11a83410153756ae350a82ed41b08d128ff7f998 | All: Merge some file writing extension checks | 0 | MP/code/client/cl_console.c | {"sha": "dad42d9e4db1631e1415473a2d5cb7f24678232d", "filename": "MP/code/client/cl_console.c", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/iortcw/iortcw/blob/11a83410153756ae350a82ed41b08d128ff7f998/MP/code/client/cl_console.c", "raw_url": "https://github.com/iort... | void Con_RunConsole( void ) {
if ( Key_GetCatcher( ) & KEYCATCH_CONSOLE ) {
con.finalFrac = 0.5; // half screen
} else {
con.finalFrac = 0; // none visible
}
if ( con.finalFrac < con.displayFrac ) {
con.displayFrac -= con_conspeed->value * cls.realFrametime * 0.001;
if ( con.finalFrac >... | void Con_RunConsole( void ) {
if ( Key_GetCatcher( ) & KEYCATCH_CONSOLE ) {
con.finalFrac = 0.5; // half screen
} else {
con.finalFrac = 0; // none visible
}
if ( con.finalFrac < con.displayFrac ) {
con.displayFrac -= con_conspeed->value * cls.realFrametime * 0.001;
if ( con.finalFrac >... | C | null | null | null | @@ -227,6 +227,12 @@ void Con_Dump_f( void ) {
Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) );
COM_DefaultExtension( filename, sizeof( filename ), ".txt" );
+ if (!COM_CompareExtension(filename, ".txt"))
+ {
+ Com_Printf("Con_Dump_f: Only the \".txt\" extension is supported by this command!\n");
+ re... | OpenJK | 11a83410153756ae350a82ed41b08d128ff7f998 | b248763e4878ef12d5835ece6600be8334f67da1 | 0 | void Con_RunConsole( void ) {
// decide on the destination height of the console
if ( Key_GetCatcher( ) & KEYCATCH_CONSOLE ) {
con.finalFrac = 0.5; // half screen
} else {
con.finalFrac = 0; // none visible
}
// scroll towards the destination height
if ( con.finalFrac < con.displayFrac ) ... |
95,073 | null | Local | Not required | null | CVE-2017-1000249 | https://www.cvedetails.com/cve/CVE-2017-1000249/ | CWE-119 | Low | null | Partial | null | 2017-09-11 | 2.1 | An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017). | 2017-11-07 | Overflow | 0 | https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d | 9611f31313a93aa036389c5f3b15eea53510d4d | Extend build-id reporting to 8-byte IDs that lld can generate (Ed Maste) | 0 | src/readelf.c | {"sha": "c76a0accf8525280c7d7cf2006c0b5699a5cad23", "filename": "src/readelf.c", "status": "modified", "additions": 18, "deletions": 4, "changes": 22, "blob_url": "https://github.com/file/file/blob/9611f31313a93aa036389c5f3b15eea53510d4d1/src/readelf.c", "raw_url": "https://github.com/file/file/raw/9611f31313a93aa03638... | dophn_exec(struct magic_set *ms, int clazz, int swap, int fd, off_t off,
int num, size_t size, off_t fsize, int sh_num, int *flags,
uint16_t *notecount)
{
Elf32_Phdr ph32;
Elf64_Phdr ph64;
const char *linking_style = "statically";
const char *interp = "";
unsigned char nbuf[BUFSIZ];
char ibuf[BUFSIZ];
ss... | dophn_exec(struct magic_set *ms, int clazz, int swap, int fd, off_t off,
int num, size_t size, off_t fsize, int sh_num, int *flags,
uint16_t *notecount)
{
Elf32_Phdr ph32;
Elf64_Phdr ph64;
const char *linking_style = "statically";
const char *interp = "";
unsigned char nbuf[BUFSIZ];
char ibuf[BUFSIZ];
ss... | C | null | null | null | @@ -27,7 +27,7 @@
#include "file.h"
#ifndef lint
-FILE_RCSID("@(#)$File: readelf.c,v 1.126 2015/11/16 16:03:45 christos Exp $")
+FILE_RCSID("@(#)$File: readelf.c,v 1.127 2015/11/18 12:29:29 christos Exp $")
#endif
#ifdef BUILTIN_ELF
@@ -509,12 +509,26 @@ do_bid_note(struct magic_set *ms, unsigned char *nbuf, ui... | file | 9611f31313a93aa036389c5f3b15eea53510d4d | 5b8826616cb699b69f7a1cc7b5c0cbac4b5bed9b | 0 | dophn_exec(struct magic_set *ms, int clazz, int swap, int fd, off_t off,
int num, size_t size, off_t fsize, int sh_num, int *flags,
uint16_t *notecount)
{
Elf32_Phdr ph32;
Elf64_Phdr ph64;
const char *linking_style = "statically";
const char *interp = "";
unsigned char nbuf[BUFSIZ];
char ibuf[BUFSIZ];
ss... |
142,686 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2016-07 | null | 0 | https://github.com/chromium/chromium/commit/be655fd4fb9ab3291a855a939496111674037a2f | be655fd4fb9ab3291a855a939496111674037a2f | Always use FrameNavigationDisabler during DocumentLoader detach.
BUG=617495
Review-Url: https://codereview.chromium.org/2079473002
Cr-Commit-Position: refs/heads/master@{#400558} | 0 | third_party/WebKit/Source/core/loader/FrameLoader.cpp | {"sha": "4f8c4d0a9cb3e3ed7f94be0bad612c82b8b0cdd3", "filename": "third_party/WebKit/Source/core/loader/FrameLoader.cpp", "status": "modified", "additions": 2, "deletions": 5, "changes": 7, "blob_url": "https://github.com/chromium/chromium/blob/be655fd4fb9ab3291a855a939496111674037a2f/third_party/WebKit/Source/core/load... | void FrameLoader::finishedParsing()
{
if (m_stateMachine.creatingInitialEmptyDocument())
return;
m_progressTracker->finishedParsing();
if (client()) {
ScriptForbiddenScope forbidScripts;
client()->dispatchDidFinishDocumentLoad();
}
if (client())
client()->runScript... | void FrameLoader::finishedParsing()
{
if (m_stateMachine.creatingInitialEmptyDocument())
return;
m_progressTracker->finishedParsing();
if (client()) {
ScriptForbiddenScope forbidScripts;
client()->dispatchDidFinishDocumentLoad();
}
if (client())
client()->runScript... | C | null | null | null | @@ -725,6 +725,7 @@ void FrameLoader::detachDocumentLoader(Member<DocumentLoader>& loader)
if (!loader)
return;
+ FrameNavigationDisabler navigationDisabler(*m_frame);
loader->detachFromFrame();
loader = nullptr;
}
@@ -1113,7 +1114,6 @@ bool FrameLoader::prepareForCommit()
// At this ... | Chrome | be655fd4fb9ab3291a855a939496111674037a2f | 23024078fb2e07f6852031e76f08712bcd6303f0 | 0 | void FrameLoader::finishedParsing()
{
if (m_stateMachine.creatingInitialEmptyDocument())
return;
m_progressTracker->finishedParsing();
if (client()) {
ScriptForbiddenScope forbidScripts;
client()->dispatchDidFinishDocumentLoad();
}
if (client())
client()->runScript... |
149 | null | Remote | Not required | Partial | CVE-2013-6420 | https://www.cvedetails.com/cve/CVE-2013-6420/ | CWE-119 | Low | Partial | Partial | null | 2013-12-16 | 7.5 | The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi... | 2018-10-30 | DoS Exec Code Overflow Mem. Corr. | 0 | https://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415 | c1224573c773b6845e83505f717fbf820fc18415 | null | 0 | null | null | static STACK_OF(X509) * php_array_to_X509_sk(zval ** zcerts TSRMLS_DC) /* {{{ */
{
HashPosition hpos;
zval ** zcertval;
STACK_OF(X509) * sk = NULL;
X509 * cert;
long certresource;
sk = sk_X509_new_null();
/* get certs */
if (Z_TYPE_PP(zcerts) == IS_ARRAY) {
zend_hash_internal_pointer_reset_ex(HASH_OF(... | static STACK_OF(X509) * php_array_to_X509_sk(zval ** zcerts TSRMLS_DC) /* {{{ */
{
HashPosition hpos;
zval ** zcertval;
STACK_OF(X509) * sk = NULL;
X509 * cert;
long certresource;
sk = sk_X509_new_null();
/* get certs */
if (Z_TYPE_PP(zcerts) == IS_ARRAY) {
zend_hash_internal_pointer_reset_ex(HASH_OF(... | C | null | null | 32873cd0ddea7df8062213bb025beb6fb070e59d | @@ -644,18 +644,28 @@ static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */
char * thestr;
long gmadjust = 0;
- if (timestr->length < 13) {
- php_error_docref(NULL TSRMLS_CC, E_WARNING, "extension author too lazy to parse %s correctly", timestr->data);
+ ... | php | https://git.php.net/?p=php-src.git;a=blob;f=ext/openssl/openssl.c;h=0d2d6442df1a25f7125d0f3dc9037188b825917f;hb=0d2d6442df1a25f7125d0f3dc9037188b825917f | https://git.php.net/?p=php-src.git;a=blob;f=ext/openssl/openssl.c;h=e7672e4a34c0169d4f333350e1696004b92bba8b;hb=e7672e4a34c0169d4f333350e1696004b92bba8b | 0 | static STACK_OF(X509) * php_array_to_X509_sk(zval ** zcerts TSRMLS_DC) /* {{{ */
{
HashPosition hpos;
zval ** zcertval;
STACK_OF(X509) * sk = NULL;
X509 * cert;
long certresource;
sk = sk_X509_new_null();
/* get certs */
if (Z_TYPE_PP(zcerts) == IS_ARRAY) {
zend_hash_internal_pointer_reset_ex(HASH_OF(... |
136,328 | null | Remote | Not required | Complete | CVE-2015-6787 | https://www.cvedetails.com/cve/CVE-2015-6787/ | null | Low | Complete | Complete | null | 2015-12-05 | 10 | Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2017-09-13 | DoS | 0 | https://github.com/chromium/chromium/commit/f911e11e7f6b5c0d6f5ee694a9871de6619889f7 | f911e11e7f6b5c0d6f5ee694a9871de6619889f7 | Reland "[CI] Make paint property nodes non-ref-counted"
This reverts commit 887383b30842d9d9006e11bb6932660a3cb5b1b7.
Reason for revert: Retry in M69.
Original change's description:
> Revert "[CI] Make paint property nodes non-ref-counted"
>
> This reverts commit 70fc0b018c9517558b7aa2be00edf2debb449123.
>
> Reason ... | 0 | third_party/blink/renderer/core/paint/paint_property_tree_builder.cc | {"sha": "6da131da4ecafb786c67365ccc6cd446111933b4", "filename": "third_party/blink/renderer/core/paint/block_painter.cc", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f911e11e7f6b5c0d6f5ee694a9871de6619889f7/third_party/blink/renderer/core/pa... | void FragmentPaintPropertyTreeBuilder::UpdateForChildren() {
#if DCHECK_IS_ON()
FindObjectPropertiesNeedingUpdateScope check_needs_update_scope(
object_, fragment_data_, full_context_.force_subtree_update);
#endif
if (properties_) {
UpdateInnerBorderRadiusClip();
UpdateOverflowClip();
UpdatePersp... | void FragmentPaintPropertyTreeBuilder::UpdateForChildren() {
#if DCHECK_IS_ON()
FindObjectPropertiesNeedingUpdateScope check_needs_update_scope(
object_, fragment_data_, full_context_.force_subtree_update);
#endif
if (properties_) {
UpdateInnerBorderRadiusClip();
UpdateOverflowClip();
UpdatePersp... | C | null | null | null | @@ -39,13 +39,13 @@ namespace blink {
PaintPropertyTreeBuilderFragmentContext::
PaintPropertyTreeBuilderFragmentContext()
- : current_effect(EffectPaintPropertyNode::Root()) {
+ : current_effect(&EffectPaintPropertyNode::Root()) {
current.clip = absolute_position.clip = fixed_position.clip =
- Cli... | Chrome | f911e11e7f6b5c0d6f5ee694a9871de6619889f7 | 95f5260501ac2660f29fb98ab5cb351a956c1dab | 0 | void FragmentPaintPropertyTreeBuilder::UpdateForChildren() {
#if DCHECK_IS_ON()
FindObjectPropertiesNeedingUpdateScope check_needs_update_scope(
object_, fragment_data_, full_context_.force_subtree_update);
#endif
if (properties_) {
UpdateInnerBorderRadiusClip();
UpdateOverflowClip();
UpdatePersp... |
130,265 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2014-04 | null | 0 | https://github.com/chromium/chromium/commit/e93dc535728da259ec16d1c3cc393f80b25f64ae | e93dc535728da259ec16d1c3cc393f80b25f64ae | Add a unit test that filenames aren't unintentionally converted to URLs.
Also fixes two issues in OSExchangeDataProviderWin:
- It used a disjoint set of clipboard formats when handling
GetUrl(..., true /* filename conversion */) vs GetFilenames(...), so the
actual returned results would vary depending on which one... | 0 | ui/base/dragdrop/os_exchange_data_provider_win.cc | {"sha": "185ccbd5f0cf017960df480e9f2d5f855f01294b", "filename": "base/win/scoped_hglobal.h", "status": "modified", "additions": 6, "deletions": 6, "changes": 12, "blob_url": "https://github.com/chromium/chromium/blob/e93dc535728da259ec16d1c3cc393f80b25f64ae/base/win/scoped_hglobal.h", "raw_url": "https://github.com/chr... | IDataObject* OSExchangeDataProviderWin::GetIDataObject(
const OSExchangeData& data) {
return static_cast<const OSExchangeDataProviderWin*>(&data.provider())->
data_object();
}
| IDataObject* OSExchangeDataProviderWin::GetIDataObject(
const OSExchangeData& data) {
return static_cast<const OSExchangeDataProviderWin*>(&data.provider())->
data_object();
}
| C | null | null | null | @@ -411,15 +411,12 @@ bool OSExchangeDataProviderWin::GetURLAndTitle(
base::string16 url_str;
bool success = ClipboardUtil::GetUrl(
source_object_,
- &url_str,
+ url,
title,
policy == OSExchangeData::CONVERT_FILENAMES ? true : false);
if (success) {
- GURL test_url(url_str);
-... | Chrome | e93dc535728da259ec16d1c3cc393f80b25f64ae | 4ad0ec9fd3292e1ca9dbf54dee9587dcb49caa70 | 0 | IDataObject* OSExchangeDataProviderWin::GetIDataObject(
const OSExchangeData& data) {
return static_cast<const OSExchangeDataProviderWin*>(&data.provider())->
data_object();
}
|
183,124 | null | Remote | Not required | null | CVE-2016-5842 | https://www.cvedetails.com/cve/CVE-2016-5842/ | CWE-125 | Low | Partial | null | null | 2016-12-13 | 5 | MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read. | 2017-06-30 | +Info | 6 | https://github.com/ImageMagick/ImageMagick/commit/d8ab7f046587f2e9f734b687ba7e6e10147c294b | d8ab7f046587f2e9f734b687ba7e6e10147c294b | Improve checking of EXIF profile to prevent integer overflow (bug report from Ibrahim el-sayed) | 6 | MagickCore/property.c | {"sha": "51d887902b49d1d216ffe8a4ca463a0046babd48", "filename": "MagickCore/profile.c", "status": "modified", "additions": 29, "deletions": 18, "changes": 47, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/d8ab7f046587f2e9f734b687ba7e6e10147c294b/MagickCore/profile.c", "raw_url": "https://github.com/Image... | static inline signed int ReadPropertyMSBLong(const unsigned char **p,
size_t *length)
{
union
{
unsigned int
unsigned_value;
signed int
signed_value;
} quantum;
int
c;
register ssize_t
i;
unsigned char
buffer[4];
unsigned int
value;
if (*length < 4)
... | static inline signed int ReadPropertyMSBLong(const unsigned char **p,
size_t *length)
{
union
{
unsigned int
unsigned_value;
signed int
signed_value;
} quantum;
int
c;
register ssize_t
i;
unsigned char
buffer[4];
size_t
value;
if (*length < 4)
return... | C | unsigned int
value=(unsigned int) buffer[0] << 24;
value|=(unsigned int) buffer[1] << 16;
value|=(unsigned int) buffer[2] << 8;
value|=(unsigned int) buffer[3];
quantum.unsigned_value=value & 0xffffffff;
| size_t
value=(size_t) (buffer[0] << 24);
value|=buffer[1] << 16;
value|=buffer[2] << 8;
value|=buffer[3];
quantum.unsigned_value=(value & 0xffffffff);
| null | @@ -520,7 +520,7 @@ static inline signed int ReadPropertyMSBLong(const unsigned char **p,
unsigned char
buffer[4];
- size_t
+ unsigned int
value;
if (*length < 4)
@@ -531,11 +531,11 @@ static inline signed int ReadPropertyMSBLong(const unsigned char **p,
(*length)--;
buffer[i]=(unsigned ... | ImageMagick | d8ab7f046587f2e9f734b687ba7e6e10147c294b | f0ae4ef12c8f73b05afe55f79e1429717c1deb58 | 1 | static inline signed int ReadPropertyMSBLong(const unsigned char **p,
size_t *length)
{
union
{
unsigned int
unsigned_value;
signed int
signed_value;
} quantum;
int
c;
register ssize_t
i;
unsigned char
buffer[4];
//flaw_line_below:
size_t
//fix_flaw_line_below:
//... |
79,590 | null | Remote | Not required | Partial | CVE-2018-14357 | https://www.cvedetails.com/cve/CVE-2018-14357/ | CWE-77 | Low | Partial | Partial | null | 2018-07-17 | 7.5 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription. | 2019-10-02 | Exec Code | 0 | https://github.com/neomutt/neomutt/commit/e52393740334443ae0206cab2d7caef381646725 | e52393740334443ae0206cab2d7caef381646725 | quote imap strings more carefully
Co-authored-by: JerikoOne <jeriko.one@gmx.us> | 0 | imap/imap.c | {"sha": "0f4445b4532660e17f18a935fdacd4f492438dcf", "filename": "imap/auth_login.c", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/neomutt/neomutt/blob/e52393740334443ae0206cab2d7caef381646725/imap/auth_login.c", "raw_url": "https://github.com/neomutt/neomutt/raw/e5... | int imap_fast_trash(struct Context *ctx, char *dest)
{
char mbox[LONG_STRING];
char mmbox[LONG_STRING];
char prompt[LONG_STRING];
int rc;
struct ImapMbox mx;
bool triedcreate = false;
struct Buffer *sync_cmd = NULL;
int err_continue = MUTT_NO;
struct ImapData *idata = ctx->data;
if (imap_parse_pat... | int imap_fast_trash(struct Context *ctx, char *dest)
{
char mbox[LONG_STRING];
char mmbox[LONG_STRING];
char prompt[LONG_STRING];
int rc;
struct ImapMbox mx;
bool triedcreate = false;
struct Buffer *sync_cmd = NULL;
int err_continue = MUTT_NO;
struct ImapData *idata = ctx->data;
if (imap_parse_pat... | C | null | null | null | @@ -464,25 +464,25 @@ static int compile_search(struct Context *ctx, const struct Pattern *pat, struct
return -1;
}
*delim = '\0';
- imap_quote_string(term, sizeof(term), pat->p.str);
+ imap_quote_string(term, sizeof(term), pat->p.str, false);
mutt_buffer_addstr(buf, ... | neomutt | e52393740334443ae0206cab2d7caef381646725 | 9bfab35522301794483f8f9ed60820bdec9be59e | 0 | int imap_fast_trash(struct Context *ctx, char *dest)
{
char mbox[LONG_STRING];
char mmbox[LONG_STRING];
char prompt[LONG_STRING];
int rc;
struct ImapMbox mx;
bool triedcreate = false;
struct Buffer *sync_cmd = NULL;
int err_continue = MUTT_NO;
struct ImapData *idata = ctx->data;
if (imap_parse_pat... |
16,240 | null | Local | Not required | Partial | CVE-2011-4930 | https://www.cvedetails.com/cve/CVE-2011-4930/ | CWE-134 | Medium | Partial | Partial | null | 2014-02-10 | 4.4 | Multiple format string vulnerabilities in Condor 7.2.0 through 7.6.4, and possibly certain 7.7.x versions, as used in Red Hat MRG Grid and possibly other products, allow local users to cause a denial of service (condor_schedd daemon and failure to launch jobs) and possibly execute arbitrary code via format string speci... | 2014-02-10 | DoS Exec Code | 0 | https://htcondor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=5e5571d1a431eb3c61977b6dd6ec90186ef79867 | 5e5571d1a431eb3c61977b6dd6ec90186ef79867 | null | 0 | null | null | GahpClient::~GahpClient()
{
clear_pending();
if ( normal_proxy != NULL ) {
server->UnregisterProxy( normal_proxy->proxy );
}
if ( deleg_proxy != NULL ) {
server->UnregisterProxy( deleg_proxy->proxy );
}
server->RemoveGahpClient();
}
| GahpClient::~GahpClient()
{
clear_pending();
if ( normal_proxy != NULL ) {
server->UnregisterProxy( normal_proxy->proxy );
}
if ( deleg_proxy != NULL ) {
server->UnregisterProxy( deleg_proxy->proxy );
}
server->RemoveGahpClient();
}
| CPP | null | null | 9f2e09401a1a262e1b00ac3bf8cd3f0d79aa876c | @@ -321,10 +321,10 @@ GahpServer::Reaper(Service *,int pid,int status)
if ( dead_server ) {
sprintf_cat( buf, " unexpectedly" );
- EXCEPT( buf.c_str() );
+ EXCEPT( "%s", buf.c_str() );
} else {
sprintf_cat( buf, "\n" );
- dprint... | htcondor | https://htcondor-git.cs.wisc.edu/?p=condor.git;a=blob;f=src/condor_gridmanager/gahp-client.cpp;h=8c6c3fd59255c36477bdcb561a2986bdb238f96e;hb=5e5571d1a431eb3c61977b6dd6ec90186ef79867 | https://htcondor-git.cs.wisc.edu/?p=condor.git;a=blob;f=src/condor_gridmanager/gahp-client.cpp;h=2e83bb81610fc0412b176e650b8d31f8b657fa6e | 0 | GahpClient::~GahpClient()
{
// call clear_pending to remove this object from hash table,
// and deallocate any memory associated w/ a pending command.
clear_pending();
if ( normal_proxy != NULL ) {
server->UnregisterProxy( normal_proxy->proxy );
}
if ( deleg_proxy != NULL ) {
server->UnregisterProxy( deleg_... |
95,870 | null | Remote | Not required | Complete | CVE-2017-6903 | https://www.cvedetails.com/cve/CVE-2017-6903/ | CWE-269 | Medium | Complete | Complete | null | 2017-03-14 | 9.3 | In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma... | 2019-10-02 | null | 0 | https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20 | b6ff2bcb1e4e6976d61e316175c6d7c99860fe20 | All: Don't load .pk3s as .dlls, and don't load user config files from .pk3s | 0 | MP/code/sys/sys_main.c | {"sha": "92675c53d7d8d4e2072a5423e471fb48daeec2c6", "filename": "MP/code/client/cl_main.c", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/iortcw/iortcw/blob/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20/MP/code/client/cl_main.c", "raw_url": "https://github.com/iortcw/ior... | int main( int argc, char **argv )
{
int i;
char commandLine[ MAX_STRING_CHARS ] = { 0 };
#ifndef DEDICATED
# if !SDL_VERSION_ATLEAST(MINSDL_MAJOR,MINSDL_MINOR,MINSDL_PATCH)
# error A more recent version of SDL is required
# endif
SDL_version ver;
SDL_GetVersion( &ver );
#define MINSDL_VERSION \
XSTRING(MIN... | int main( int argc, char **argv )
{
int i;
char commandLine[ MAX_STRING_CHARS ] = { 0 };
#ifndef DEDICATED
# if !SDL_VERSION_ATLEAST(MINSDL_MAJOR,MINSDL_MINOR,MINSDL_PATCH)
# error A more recent version of SDL is required
# endif
SDL_version ver;
SDL_GetVersion( &ver );
#define MINSDL_VERSION \
XSTRING(MIN... | C | null | null | null | @@ -499,6 +499,13 @@ from executable path, then fs_basepath.
void *Sys_LoadDll(const char *name, qboolean useSystemLib)
{
void *dllhandle;
+
+ // Don't load any DLLs that end with the pk3 extension
+ if (COM_CompareExtension(name, ".pk3"))
+ {
+ Com_Printf("Rejecting DLL named \"%s\"", name);
+ return NULL;
+ }
... | OpenJK | b6ff2bcb1e4e6976d61e316175c6d7c99860fe20 | 1efb19a25feace6de9b103fa3fe334fa1901b495 | 0 | int main( int argc, char **argv )
{
int i;
char commandLine[ MAX_STRING_CHARS ] = { 0 };
#ifndef DEDICATED
// SDL version check
// Compile time
# if !SDL_VERSION_ATLEAST(MINSDL_MAJOR,MINSDL_MINOR,MINSDL_PATCH)
# error A more recent version of SDL is required
# endif
// Run time
SDL_version ver;
SDL_GetVer... |
131,958 | null | Remote | Not required | Partial | CVE-2014-1713 | https://www.cvedetails.com/cve/CVE-2014-1713/ | CWE-399 | Low | Partial | Partial | null | 2014-03-16 | 7.5 | Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact ... | 2017-01-06 | DoS | 0 | https://github.com/chromium/chromium/commit/f85a87ec670ad0fce9d98d90c9a705b72a288154 | f85a87ec670ad0fce9d98d90c9a705b72a288154 | document.location bindings fix
BUG=352374
R=jochen@chromium.org
Review URL: https://codereview.chromium.org/196343011
git-svn-id: svn://svn.chromium.org/blink/trunk@169176 bbb929c8-8fbe-4397-9dbb-9b2b20218538 | 0 | third_party/WebKit/Source/bindings/tests/results/V8TestObjectPython.cpp | {"sha": "b82e2fe8129793c21901e96095ad155dd4dbb51e", "filename": "third_party/WebKit/Source/bindings/templates/attributes.cpp", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f85a87ec670ad0fce9d98d90c9a705b72a288154/third_party/WebKit/Source/bin... | static void voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info)
{
TRACE_EVENT_SET_SAMPLING_STATE("Blink", "DOMMethod");
TestObjectPythonV8Internal::voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethod(info);
TRACE_EVENT_SET_SAMPLI... | static void voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info)
{
TRACE_EVENT_SET_SAMPLING_STATE("Blink", "DOMMethod");
TestObjectPythonV8Internal::voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethod(info);
TRACE_EVENT_SET_SAMPLI... | C | null | null | null | @@ -2525,7 +2525,7 @@ static void locationAttributeGetterCallback(v8::Local<v8::String>, const v8::Pro
static void locationAttributeSetter(v8::Local<v8::Value> jsValue, const v8::PropertyCallbackInfo<void>& info)
{
TestObjectPython* proxyImp = V8TestObjectPython::toNative(info.Holder());
- TestNode* imp = WTF... | Chrome | f85a87ec670ad0fce9d98d90c9a705b72a288154 | 2c217b1d3f3f95e579481976d73e07ab4c77752c | 0 | static void voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethodCallback(const v8::FunctionCallbackInfo<v8::Value>& info)
{
TRACE_EVENT_SET_SAMPLING_STATE("Blink", "DOMMethod");
TestObjectPythonV8Internal::voidMethodSequenceTestInterfaceWillBeGarbageCollectedArgMethod(info);
TRACE_EVENT_SET_SAMPLI... |
150,530 | null | Remote | Not required | Partial | CVE-2017-5039 | https://www.cvedetails.com/cve/CVE-2017-5039/ | CWE-416 | Medium | Partial | Partial | null | 2017-04-24 | 6.8 | A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/69b4b9ef7455753b12c3efe4eec71647e6fb1da1 | 69b4b9ef7455753b12c3efe4eec71647e6fb1da1 | Disable all DRP URL fetches when holdback is enabled
Disable secure proxy checker, warmup url fetcher
and client config fetch when the client is in DRP
(Data Reduction Proxy) holdback.
This CL does not disable pingbacks when client is in the
holdback, but the pingback code is going away soon.
Change-Id: Icbb59d814d1... | 0 | chrome/browser/data_reduction_proxy/data_reduction_proxy_browsertest.cc | {"sha": "fdc1c6c414773f8641baee34643ae28137cae498", "filename": "chrome/browser/data_reduction_proxy/data_reduction_proxy_browsertest.cc", "status": "modified", "additions": 23, "deletions": 2, "changes": 25, "blob_url": "https://github.com/chromium/chromium/blob/69b4b9ef7455753b12c3efe4eec71647e6fb1da1/chrome/browser/... | void SetResponseHook(ResponseHook response_hook) {
base::AutoLock auto_lock(lock_);
response_hook_ = response_hook;
}
| void SetResponseHook(ResponseHook response_hook) {
base::AutoLock auto_lock(lock_);
response_hook_ = response_hook;
}
| C | null | null | null | @@ -292,7 +292,12 @@ class DataReductionProxyBrowsertestBase : public InProcessBrowserTest {
config_ = config;
}
- void WaitForConfig() { config_run_loop_->Run(); }
+ void WaitForConfig() {
+ // Config is not fetched in the holdback group. So, return early.
+ if (data_reduction_proxy::params::IsInclud... | Chrome | 69b4b9ef7455753b12c3efe4eec71647e6fb1da1 | 5dae42d82808e0d4fe2001dc7066224da6d771f6 | 0 | void SetResponseHook(ResponseHook response_hook) {
base::AutoLock auto_lock(lock_);
response_hook_ = response_hook;
}
|
99,892 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2010-03 | null | 0 | https://github.com/chromium/chromium/commit/ea3d1d84be3d6f97bf50e76511c9e26af6895533 | ea3d1d84be3d6f97bf50e76511c9e26af6895533 | Fix passing pointers between processes.
BUG=31880
Review URL: http://codereview.chromium.org/558036
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@37555 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | chrome/renderer/webplugin_delegate_proxy.cc | {"sha": "74de33f85ed2506f6309cec420c932b871c2ebe7", "filename": "chrome/common/plugin_messages.h", "status": "modified", "additions": 9, "deletions": 65, "changes": 74, "blob_url": "https://github.com/chromium/chromium/blob/ea3d1d84be3d6f97bf50e76511c9e26af6895533/chrome/common/plugin_messages.h", "raw_url": "https://g... | static void ReleaseTransportDIB(TransportDIB *dib) {
if (dib) {
IPC::Message* msg = new ViewHostMsg_FreeTransportDIB(dib->id());
RenderThread::current()->Send(msg);
}
}
| static void ReleaseTransportDIB(TransportDIB *dib) {
if (dib) {
IPC::Message* msg = new ViewHostMsg_FreeTransportDIB(dib->id());
RenderThread::current()->Send(msg);
}
}
| C | null | null | null | @@ -66,31 +66,24 @@ class ResourceClientProxy : public webkit_glue::WebPluginResourceClient {
public:
ResourceClientProxy(PluginChannelHost* channel, int instance_id)
: channel_(channel), instance_id_(instance_id), resource_id_(0),
- notify_needed_(false), notify_data_(0),
multibyte_response_expec... | Chrome | ea3d1d84be3d6f97bf50e76511c9e26af6895533 | 403e46333b43009776a08273501e4ca8c5c06e12 | 0 | static void ReleaseTransportDIB(TransportDIB *dib) {
if (dib) {
IPC::Message* msg = new ViewHostMsg_FreeTransportDIB(dib->id());
RenderThread::current()->Send(msg);
}
}
|
171,449 | null | Remote | Not required | Complete | CVE-2016-3881 | https://www.cvedetails.com/cve/CVE-2016-3881/ | CWE-119 | Medium | null | null | null | 2016-09-11 | 7.1 | The decoder_peek_si_internal function in vp9/vp9_dx_iface.c in libvpx in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allows remote attackers to cause a denial of service (buffer over-read, and device hang or reboot) via a crafted medi... | 2017-08-12 | DoS Overflow | 0 | https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da | 4974dcbd0289a2530df2ee2a25b5f92775df80da | DO NOT MERGE | libvpx: cherry-pick aa1c813 from upstream
Description from upstream:
vp9: Fix potential SEGV in decoder_peek_si_internal
decoder_peek_si_internal could potentially read more bytes than
what actually exists in the input buffer. We check for the buffer
size to be at least 8, but we try to read up to 10 b... | 0 | libvpx/vp9/vp9_dx_iface.c | {"filename": "libvpx/vp9/vp9_dx_iface.c", "raw_url": "https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da/libvpx/vp9/vp9_dx_iface.c", "patch": "@@ -127,7 +127,7 @@\n\n vpx_decrypt_cb decrypt_cb,\n ... | static vpx_codec_err_t decoder_get_si(vpx_codec_alg_priv_t *ctx,
vpx_codec_stream_info_t *si) {
const size_t sz = (si->sz >= sizeof(vp9_stream_info_t))
? sizeof(vp9_stream_info_t)
: sizeof(vpx_codec_stream_info_t);
memcpy(si, &ctx->si, sz);
si->sz = (unsigned int)sz;
return VPX_CODEC_OK;
}
| static vpx_codec_err_t decoder_get_si(vpx_codec_alg_priv_t *ctx,
vpx_codec_stream_info_t *si) {
const size_t sz = (si->sz >= sizeof(vp9_stream_info_t))
? sizeof(vp9_stream_info_t)
: sizeof(vpx_codec_stream_info_t);
memcpy(si, &ctx->si, sz);
si->sz = (unsigned int)sz;
return VPX_CODEC_OK;
}
| C | null | null | null | @@ -127,7 +127,7 @@
vpx_decrypt_cb decrypt_cb,
void *decrypt_state) {
int intra_only_flag = 0;
- uint8_t clear_buffer[9];
+ uint8_t clear_buffer[10];
if (data + data_sz <= data)
return VPX_CODEC_INVALID_PAR... | Android | https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da/ | https://android.googlesource.com/platform/external/libvpx/+/4974dcbd0289a2530df2ee2a25b5f92775df80da%5E/ | 0 | static vpx_codec_err_t decoder_get_si(vpx_codec_alg_priv_t *ctx,
vpx_codec_stream_info_t *si) {
const size_t sz = (si->sz >= sizeof(vp9_stream_info_t))
? sizeof(vp9_stream_info_t)
: sizeof(vpx_codec_stream_info_t);
memcpy(si, &ctx->si, sz);
si->sz = (unsigned int)sz;
return VPX_CODEC_OK;
}
|
183,404 | null | Remote | Not required | Partial | CVE-2019-11339 | https://www.cvedetails.com/cve/CVE-2019-11339/ | CWE-125 | Medium | Partial | Partial | null | 2019-04-18 | 6.8 | The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data. | 2019-05-06 | DoS | 1 | https://github.com/FFmpeg/FFmpeg/commit/1f686d023b95219db933394a7704ad9aa5f01cbb | 1f686d023b95219db933394a7704ad9aa5f01cbb | avcodec/mpeg4videodec: Clear interlaced_dct for studio profile
Fixes: Out of array access
Fixes: 13090/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5408668986638336
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Reviewed-by: Kieran Kunhya <kierank... | 0 | libavcodec/mpeg4videodec.c | {"sha": "ecd028a87c7705295b6f9e61687977437430c50d", "filename": "libavcodec/mpeg4videodec.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/1f686d023b95219db933394a7704ad9aa5f01cbb/libavcodec/mpeg4videodec.c", "raw_url": "https://github.com/FFmpeg... | static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
if (get_bits_left(gb) <= 32)
return 0;
s->partitioned_frame = 0;
s->interlaced_dct = 0;
s->decode_mb = mpeg4_decode_studio_mb;
decode_smpte_tc(ctx, gb);
skip_bits(gb,... | static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
if (get_bits_left(gb) <= 32)
return 0;
s->partitioned_frame = 0;
s->decode_mb = mpeg4_decode_studio_mb;
decode_smpte_tc(ctx, gb);
skip_bits(gb, 10); /* temporal_reference... | C | s->interlaced_dct = 0;
| null | null | @@ -3057,6 +3057,7 @@ static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb)
return 0;
s->partitioned_frame = 0;
+ s->interlaced_dct = 0;
s->decode_mb = mpeg4_decode_studio_mb;
decode_smpte_tc(ctx, gb); | FFmpeg | 1f686d023b95219db933394a7704ad9aa5f01cbb | d6fc5dc24aa09e026c6271a7565e63798dfe46f3 | 1 | static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
if (get_bits_left(gb) <= 32)
return 0;
s->partitioned_frame = 0;
//fix_flaw_line_below:
// s->interlaced_dct = 0;
s->decode_mb = mpeg4_decode_studio_mb;
decode_smpte_tc(ctx... |
43,191 | null | Remote | Not required | Complete | CVE-2015-4001 | https://www.cvedetails.com/cve/CVE-2015-4001/ | CWE-189 | Low | Partial | Partial | null | 2015-06-07 | 9 | Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet. | 2016-12-27 | DoS Exec Code | 0 | https://github.com/torvalds/linux/commit/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c | b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c | ozwpan: Use unsigned ints to prevent heap overflow
Using signed integers, the subtraction between required_size and offset
could wind up being negative, resulting in a memcpy into a heap buffer
with a negative length, resulting in huge amounts of network-supplied
data being copied into the heap, which could potentiall... | 0 | drivers/staging/ozwpan/ozhcd.c | {"sha": "784b5ecfa8493ba07d8ba90cde1b11b2b6a4b6b7", "filename": "drivers/staging/ozwpan/ozhcd.c", "status": "modified", "additions": 4, "deletions": 4, "changes": 8, "blob_url": "https://github.com/torvalds/linux/blob/b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c/drivers/staging/ozwpan/ozhcd.c", "raw_url": "https://github.c... | void oz_hcd_pd_departed(struct oz_port *port)
{
struct oz_hcd *ozhcd;
void *hpd;
struct oz_endpoint *ep = NULL;
if (port == NULL) {
oz_dbg(ON, "%s: port = 0\n", __func__);
return;
}
ozhcd = port->ozhcd;
if (ozhcd == NULL)
return;
/* Check if this is the connection port - if so clear it.
*/
spin_lock_b... | void oz_hcd_pd_departed(struct oz_port *port)
{
struct oz_hcd *ozhcd;
void *hpd;
struct oz_endpoint *ep = NULL;
if (port == NULL) {
oz_dbg(ON, "%s: port = 0\n", __func__);
return;
}
ozhcd = port->ozhcd;
if (ozhcd == NULL)
return;
/* Check if this is the connection port - if so clear it.
*/
spin_lock_b... | C | null | null | null | @@ -746,8 +746,8 @@ void oz_hcd_pd_reset(void *hpd, void *hport)
/*
* Context: softirq
*/
-void oz_hcd_get_desc_cnf(void *hport, u8 req_id, int status, const u8 *desc,
- int length, int offset, int total_size)
+void oz_hcd_get_desc_cnf(void *hport, u8 req_id, u8 status, const u8 *desc,
+ u8 length, u16 offset,... | linux | b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c | d114b9fe78c8d6fc6e70808c2092aa307c36dc8e | 0 | void oz_hcd_pd_departed(struct oz_port *port)
{
struct oz_hcd *ozhcd;
void *hpd;
struct oz_endpoint *ep = NULL;
if (port == NULL) {
oz_dbg(ON, "%s: port = 0\n", __func__);
return;
}
ozhcd = port->ozhcd;
if (ozhcd == NULL)
return;
/* Check if this is the connection port - if so clear it.
*/
spin_lock_b... |
138,147 | null | Remote | Not required | Partial | CVE-2015-1274 | https://www.cvedetails.com/cve/CVE-2015-1274/ | CWE-254 | Medium | Partial | Partial | null | 2015-07-22 | 6.8 | Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous *Always open files of this type* choice, related to download_commands.cc and downloa... | 2018-10-30 | Exec Code | 0 | https://github.com/chromium/chromium/commit/d27468a832d5316884bd02f459cbf493697fd7e1 | d27468a832d5316884bd02f459cbf493697fd7e1 | Switch to equalIgnoringASCIICase throughout modules/accessibility
BUG=627682
Review-Url: https://codereview.chromium.org/2793913007
Cr-Commit-Position: refs/heads/master@{#461858} | 0 | third_party/WebKit/Source/modules/accessibility/AXObject.cpp | {"sha": "b7b9d3ad4a5cdff0f72bf31370c16bddf7da6615", "filename": "third_party/WebKit/Source/modules/accessibility/AXARIAGridCell.cpp", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/d27468a832d5316884bd02f459cbf493697fd7e1/third_party/WebKit/Sou... | static Vector<AtomicString>* createRoleNameVector() {
Vector<AtomicString>* roleNameVector = new Vector<AtomicString>(NumRoles);
for (int i = 0; i < NumRoles; i++)
(*roleNameVector)[i] = nullAtom;
for (size_t i = 0; i < WTF_ARRAY_LENGTH(roles); ++i)
(*roleNameVector)[roles[i].webcoreRole] = AtomicString(... | static Vector<AtomicString>* createRoleNameVector() {
Vector<AtomicString>* roleNameVector = new Vector<AtomicString>(NumRoles);
for (int i = 0; i < NumRoles; i++)
(*roleNameVector)[i] = nullAtom;
for (size_t i = 0; i < WTF_ARRAY_LENGTH(roles); ++i)
(*roleNameVector)[roles[i].webcoreRole] = AtomicString(... | C | null | null | null | @@ -596,7 +596,7 @@ AXObject* AXObject::leafNodeAncestor() const {
const AXObject* AXObject::ariaHiddenRoot() const {
for (const AXObject* object = this; object; object = object->parentObject()) {
- if (equalIgnoringCase(object->getAttribute(aria_hiddenAttr), "true"))
+ if (equalIgnoringASCIICase(object->ge... | Chrome | d27468a832d5316884bd02f459cbf493697fd7e1 | 62dc793dc640ae5fd16d571a0c9199fe0fb740d0 | 0 | static Vector<AtomicString>* createRoleNameVector() {
Vector<AtomicString>* roleNameVector = new Vector<AtomicString>(NumRoles);
for (int i = 0; i < NumRoles; i++)
(*roleNameVector)[i] = nullAtom;
for (size_t i = 0; i < WTF_ARRAY_LENGTH(roles); ++i)
(*roleNameVector)[roles[i].webcoreRole] = AtomicString(... |
186,642 | null | Remote | Not required | Partial | CVE-2018-6031 | https://www.cvedetails.com/cve/CVE-2018-6031/ | CWE-416 | Medium | Partial | Partial | null | 2018-09-25 | 6.8 | Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 2018-11-20 | null | 8 | https://github.com/chromium/chromium/commit/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | 01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | [pdf] Use a temporary list when unloading pages
When traversing the |deferred_page_unloads_| list and handling the
unloads it's possible for new pages to get added to the list which will
invalidate the iterator.
This CL swaps the list with an empty list and does the iteration on the
list copy. New items that are unlo... | 2 | pdf/pdfium/pdfium_engine.cc | {"sha": "7c6b7da1c70f4071d071d2f111be90a01b1233b3", "filename": "pdf/pdfium/pdfium_engine.cc", "status": "modified", "additions": 8, "deletions": 2, "changes": 10, "blob_url": "https://github.com/chromium/chromium/blob/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2/pdf/pdfium/pdfium_engine.cc", "raw_url": "https://github.com... | bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(!defer_page_unload_);
defer_page_unload_ = true;
bool rv = false;
switch (event.GetType()) {
case PP_INPUTEVENT_TYPE_MOUSEDOWN:
rv = OnMouseDown(pp::MouseInputEvent(event));
break;
case PP_INPUTEVENT_TYPE_MOUSEUP:
rv ... | bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(!defer_page_unload_);
defer_page_unload_ = true;
bool rv = false;
switch (event.GetType()) {
case PP_INPUTEVENT_TYPE_MOUSEDOWN:
rv = OnMouseDown(pp::MouseInputEvent(event));
break;
case PP_INPUTEVENT_TYPE_MOUSEUP:
rv ... | C |
// Store the pages to unload away because the act of unloading pages can cause
// there to be more pages to unload. We leave those extra pages to be unloaded
// on the next go around.
std::vector<int> pages_to_unload;
std::swap(pages_to_unload, deferred_page_unloads_);
for (int page_index : pages_to_unload... | for (int page_index : deferred_page_unloads_)
deferred_page_unloads_.clear();
| null | @@ -1405,9 +1405,15 @@ bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(defer_page_unload_);
defer_page_unload_ = false;
- for (int page_index : deferred_page_unloads_)
+
+ // Store the pages to unload away because the act of unloading pages can cause
+ // there to be more pages to unload... | Chrome | 01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | 345dab421e9ff30af4f11fc0b55ab02bdd7d1011 | 1 | bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(!defer_page_unload_);
defer_page_unload_ = true;
bool rv = false;
switch (event.GetType()) {
case PP_INPUTEVENT_TYPE_MOUSEDOWN:
rv = OnMouseDown(pp::MouseInputEvent(event));
break;
case PP_INPUTEVENT_TYPE_MOUSEUP:
rv ... |
125,584 | null | Remote | Not required | Complete | CVE-2013-0840 | https://www.cvedetails.com/cve/CVE-2013-0840/ | null | Low | Complete | Complete | null | 2013-01-24 | 10 | Google Chrome before 24.0.1312.56 does not validate URLs during the opening of new windows, which has unspecified impact and remote attack vectors. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d | 7f48b71cb22bb2fc9fcec2013e9eaff55381a43d | Filter more incoming URLs in the CreateWindow path.
BUG=170532
Review URL: https://chromiumcodereview.appspot.com/12036002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178728 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/browser/renderer_host/render_view_host_impl.cc | {"sha": "a659ea67fa7be30bb38257b1b4003982acdb4deb", "filename": "content/browser/renderer_host/render_message_filter.cc", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d/content/browser/renderer_host/rend... | void RenderViewHostImpl::DidCancelPopupMenu() {
Send(new ViewMsg_SelectPopupMenuItem(GetRoutingID(), -1));
}
| void RenderViewHostImpl::DidCancelPopupMenu() {
Send(new ViewMsg_SelectPopupMenuItem(GetRoutingID(), -1));
}
| C | null | null | null | @@ -1056,8 +1056,10 @@ void RenderViewHostImpl::CreateNewWindow(
ViewHostMsg_CreateWindow_Params validated_params(params);
ChildProcessSecurityPolicyImpl* policy =
ChildProcessSecurityPolicyImpl::GetInstance();
- // TODO(cevans): also validate opener_url, opener_security_origin.
FilterURL(policy, GetPr... | Chrome | 7f48b71cb22bb2fc9fcec2013e9eaff55381a43d | 3c8352cdd0c90b22e7130a6949c81192804a65ba | 0 | void RenderViewHostImpl::DidCancelPopupMenu() {
Send(new ViewMsg_SelectPopupMenuItem(GetRoutingID(), -1));
}
|
187,396 | null | Remote | Not required | Complete | CVE-2015-1474 | https://www.cvedetails.com/cve/CVE-2015-1474/ | CWE-189 | Low | Complete | Complete | null | 2015-02-15 | 10 | Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of (1) file descriptors or (2) integer values. | 2017-09-28 | DoS Overflow +Priv Mem. Corr. | 16 | https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091 | 38803268570f90e97452cd9a30ac831661829091 | Fix for corruption when numFds or numInts is too large.
Bug: 18076253
Change-Id: I4c5935440013fc755e1d123049290383f4659fb6
(cherry picked from commit dfd06b89a4b77fc75eb85a3c1c700da3621c0118)
| 1 | libs/ui/GraphicBuffer.cpp | {"filename": "libs/ui/GraphicBuffer.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091/libs/ui/GraphicBuffer.cpp", "patch": "@@ -310,10 +310,19 @@\n\n const size_t numFds = buf[8];\n const size_t numInts = buf[9];\n \n+ const size_t maxNu... | status_t GraphicBuffer::unflatten(
void const*& buffer, size_t& size, int const*& fds, size_t& count) {
if (size < 8*sizeof(int)) return NO_MEMORY;
int const* buf = static_cast<int const*>(buffer);
if (buf[0] != 'GBFR') return BAD_TYPE;
const size_t numFds = buf[8];
const size_t numInts = buf[9];
... | status_t GraphicBuffer::unflatten(
void const*& buffer, size_t& size, int const*& fds, size_t& count) {
if (size < 8*sizeof(int)) return NO_MEMORY;
int const* buf = static_cast<int const*>(buffer);
if (buf[0] != 'GBFR') return BAD_TYPE;
const size_t numFds = buf[8];
const size_t numInts = buf[9];
... | C | const size_t maxNumber = UINT_MAX / sizeof(int);
if (numFds >= maxNumber || numInts >= (maxNumber - 10)) {
width = height = stride = format = usage = 0;
handle = NULL;
ALOGE("unflatten: numFds or numInts is too large: %d, %d",
numFds, numInts);
return BAD_VALUE;
... | size_t fdCountNeeded = 0;
| null | @@ -310,10 +310,19 @@
const size_t numFds = buf[8];
const size_t numInts = buf[9];
+ const size_t maxNumber = UINT_MAX / sizeof(int);
+ if (numFds >= maxNumber || numInts >= (maxNumber - 10)) {
+ width = height = stride = format = usage = 0;
+ handle = NULL;
+ ALOGE("unflatten: ... | Android | https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091/ | https://android.googlesource.com/platform/frameworks/native/+/38803268570f90e97452cd9a30ac831661829091%5E/ | 1 | status_t GraphicBuffer::unflatten(
void const*& buffer, size_t& size, int const*& fds, size_t& count) {
if (size < 8*sizeof(int)) return NO_MEMORY;
int const* buf = static_cast<int const*>(buffer);
if (buf[0] != 'GBFR') return BAD_TYPE;
const size_t numFds = buf[8];
const size_t numInts = buf[9];
//... |
186,180 | null | Remote | Not required | Partial | CVE-2016-1612 | https://www.cvedetails.com/cve/CVE-2016-1612/ | CWE-20 | Medium | Partial | Partial | null | 2016-01-25 | 6.8 | The LoadIC::UpdateCaches function in ic/ic.cc in Google V8, as used in Google Chrome before 48.0.2564.82, does not ensure receiver compatibility before performing a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact via crafted JavaScript co... | 2016-12-07 | DoS | 18 | https://github.com/chromium/chromium/commit/94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb | 94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb | Change ReadWriteLock to Lock+ConditionVariable in TaskService
There are non-trivial performance implications of using shared
SRWLocking on Windows as more state has to be checked.
Since there are only two uses of the ReadWriteLock in Chromium after
over 1 year, the decision is to remove it.
BUG=758721
Change-Id: I8... | 5 | media/midi/task_service.cc | {"sha": "fc1cfb7fdfc2e858f713480edb83c6638dddc0a7", "filename": "media/midi/task_service.cc", "status": "modified", "additions": 29, "deletions": 10, "changes": 39, "blob_url": "https://github.com/chromium/chromium/blob/94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb/media/midi/task_service.cc", "raw_url": "https://github.com... | void TaskService::RunTask(InstanceId instance_id,
RunnerId runner_id,
base::OnceClosure task) {
{
base::AutoLock tasks_in_flight_auto_lock(tasks_in_flight_lock_);
++tasks_in_flight_;
}
if (IsInstanceIdStillBound(instance_id))
std::move(task).Ru... | void TaskService::RunTask(InstanceId instance_id,
RunnerId runner_id,
base::OnceClosure task) {
base::subtle::AutoReadLock task_lock(task_lock_);
{
base::AutoLock lock(lock_);
if (instance_id != bound_instance_id_)
return;
}
std::move(task).... | C | base::AutoLock tasks_in_flight_auto_lock(tasks_in_flight_lock_);
++tasks_in_flight_;
if (IsInstanceIdStillBound(instance_id))
std::move(task).Run();
{
base::AutoLock tasks_in_flight_auto_lock(tasks_in_flight_lock_);
--tasks_in_flight_;
DCHECK_GE(tasks_in_flight_, 0);
if (tasks_in_fligh... | base::subtle::AutoReadLock task_lock(task_lock_);
base::AutoLock lock(lock_);
if (instance_id != bound_instance_id_)
return;
std::move(task).Run();
| null | @@ -16,7 +16,10 @@ constexpr TaskService::InstanceId kInvalidInstanceId = -1;
} // namespace
TaskService::TaskService()
- : next_instance_id_(0), bound_instance_id_(kInvalidInstanceId) {}
+ : no_tasks_in_flight_cv_(&tasks_in_flight_lock_),
+ tasks_in_flight_(0),
+ next_instance_id_(0),
+ bound... | Chrome | 94fef6e2a56ef5b3ed0dc0fd94e6ad52267067fb | 06d5588e6c9bfa022f61edefe7563c2c6bea9aa9 | 1 | void TaskService::RunTask(InstanceId instance_id,
RunnerId runner_id,
base::OnceClosure task) {
//flaw_line_below:
base::subtle::AutoReadLock task_lock(task_lock_);
{
//flaw_line_below:
base::AutoLock lock(lock_);
//flaw_line_below:
// If UnbindInstanc... |
83,696 | null | Remote | Not required | Partial | CVE-2018-8099 | https://www.cvedetails.com/cve/CVE-2018-8099/ | CWE-415 | Medium | null | null | null | 2018-03-13 | 4.3 | Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file. | 2018-04-13 | DoS | 0 | https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe | 58a6fe94cb851f71214dbefac3f9bffee437d6fe | index: convert `read_entry` to return entry size via an out-param
The function `read_entry` does not conform to our usual coding style of
returning stuff via the out parameter and to use the return value for
reporting errors. Due to most of our code conforming to that pattern, it
has become quite natural for us to act... | 0 | src/index.c | {"sha": "3ef892b7f170b1fdad356de32061652d7f97c48a", "filename": "src/index.c", "status": "modified", "additions": 13, "deletions": 9, "changes": 22, "blob_url": "https://github.com/libgit2/libgit2/blob/58a6fe94cb851f71214dbefac3f9bffee437d6fe/src/index.c", "raw_url": "https://github.com/libgit2/libgit2/raw/58a6fe94cb85... | int git_index_reuc_add(git_index *index, const char *path,
int ancestor_mode, const git_oid *ancestor_oid,
int our_mode, const git_oid *our_oid,
int their_mode, const git_oid *their_oid)
{
git_index_reuc_entry *reuc = NULL;
int error = 0;
assert(index && path);
if ((error = index_entry_reuc_init(&reuc, path, a... | int git_index_reuc_add(git_index *index, const char *path,
int ancestor_mode, const git_oid *ancestor_oid,
int our_mode, const git_oid *our_oid,
int their_mode, const git_oid *their_oid)
{
git_index_reuc_entry *reuc = NULL;
int error = 0;
assert(index && path);
if ((error = index_entry_reuc_init(&reuc, path, a... | C | null | null | null | @@ -2299,8 +2299,9 @@ static size_t index_entry_size(size_t path_len, size_t varint_len, uint32_t flag
}
}
-static size_t read_entry(
+static int read_entry(
git_index_entry **out,
+ size_t *out_size,
git_index *index,
const void *buffer,
size_t buffer_size,
@@ -2314,7 +2315,7 @@ static size_t read_entry(
... | libgit2 | 58a6fe94cb851f71214dbefac3f9bffee437d6fe | d11c4a1a464f10c69d5cc58824e980ea5045d439 | 0 | int git_index_reuc_add(git_index *index, const char *path,
int ancestor_mode, const git_oid *ancestor_oid,
int our_mode, const git_oid *our_oid,
int their_mode, const git_oid *their_oid)
{
git_index_reuc_entry *reuc = NULL;
int error = 0;
assert(index && path);
if ((error = index_entry_reuc_init(&reuc, path, a... |
183,071 | null | Local | Not required | null | CVE-2012-6544 | https://www.cvedetails.com/cve/CVE-2012-6544/ | CWE-200 | Medium | Partial | null | null | 2013-03-15 | 1.9 | The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | 2019-04-22 | +Info | 1 | https://github.com/torvalds/linux/commit/792039c73cf176c8e39a6e8beef2c94ff46522ed | 792039c73cf176c8e39a6e8beef2c94ff46522ed | Bluetooth: L2CAP - Fix info leak via getsockname()
The L2CAP code fails to initialize the l2_bdaddr_type member of struct
sockaddr_l2 and the padding byte added for alignment. It that for leaks
two bytes kernel stack via the getsockname() syscall. Add an explicit
memset(0) before filling the structure to avoid the inf... | 0 | net/bluetooth/l2cap_sock.c | {"sha": "1497edd191a2e04ee3121624db92547059f24369", "filename": "net/bluetooth/l2cap_sock.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/792039c73cf176c8e39a6e8beef2c94ff46522ed/net/bluetooth/l2cap_sock.c", "raw_url": "https://github.com/torva... | static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
{
struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
struct sock *sk = sock->sk;
struct l2cap_chan *chan = l2cap_pi(sk)->chan;
BT_DBG("sock %p, sk %p", sock, sk);
memset(la, 0, sizeof(struct sockaddr_l2));
addr-... | static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
{
struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
struct sock *sk = sock->sk;
struct l2cap_chan *chan = l2cap_pi(sk)->chan;
BT_DBG("sock %p, sk %p", sock, sk);
addr->sa_family = AF_BLUETOOTH;
*len = sizeof(s... | C | memset(la, 0, sizeof(struct sockaddr_l2));
| null | null | @@ -245,6 +245,7 @@ static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *l
BT_DBG("sock %p, sk %p", sock, sk);
+ memset(la, 0, sizeof(struct sockaddr_l2));
addr->sa_family = AF_BLUETOOTH;
*len = sizeof(struct sockaddr_l2);
| linux | 792039c73cf176c8e39a6e8beef2c94ff46522ed | 9344a972961d1a6d2c04d9008b13617bcb6ec2ef | 1 | static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
{
struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
struct sock *sk = sock->sk;
struct l2cap_chan *chan = l2cap_pi(sk)->chan;
BT_DBG("sock %p, sk %p", sock, sk);
//fix_flaw_line_below:
// memset(la, 0, sizeof(stru... |
148,486 | null | Remote | Not required | null | CVE-2017-5093 | https://www.cvedetails.com/cve/CVE-2017-5093/ | CWE-20 | Medium | null | Partial | null | 2017-10-27 | 4.3 | Inappropriate implementation in modal dialog handling in Blink in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to prevent a full screen warning from being displayed via a crafted HTML page. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc | 0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc | If JavaScript shows a dialog, cause the page to lose fullscreen.
BUG=670135, 550017, 726761, 728276
Review-Url: https://codereview.chromium.org/2906133004
Cr-Commit-Position: refs/heads/master@{#478884} | 0 | content/browser/web_contents/web_contents_impl.cc | {"sha": "07850f544b6aafceacd85de0a666881fd2ad06b9", "filename": "chrome/browser/printing/print_job_worker.cc", "status": "modified", "additions": 10, "deletions": 4, "changes": 14, "blob_url": "https://github.com/chromium/chromium/blob/0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc/chrome/browser/printing/print_job_worker.cc... | void WebContentsImpl::OnHideValidationMessage(RenderViewHostImpl* source) {
if (delegate_)
delegate_->HideValidationMessage(this);
}
| void WebContentsImpl::OnHideValidationMessage(RenderViewHostImpl* source) {
if (delegate_)
delegate_->HideValidationMessage(this);
}
| C | null | null | null | @@ -4425,6 +4425,11 @@ void WebContentsImpl::RunJavaScriptDialog(RenderFrameHost* render_frame_host,
const GURL& frame_url,
JavaScriptDialogType dialog_type,
IPC::Message* reply_msg) {
+ // ... | Chrome | 0720b02e4f303ea6b114d4ae9453e3a7ff55f8dc | 3adbcbaa43c1d5069da92d154a7382943c5a2881 | 0 | void WebContentsImpl::OnHideValidationMessage(RenderViewHostImpl* source) {
// TODO(nick): Should we consider |source| here or pass it to the delegate?
if (delegate_)
delegate_->HideValidationMessage(this);
}
|
169,406 | null | Remote | Not required | Partial | CVE-2018-6121 | https://www.cvedetails.com/cve/CVE-2018-6121/ | CWE-20 | Medium | Partial | Partial | null | 2019-06-27 | 6.8 | Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page. | 2019-07-01 | null | 0 | https://github.com/chromium/chromium/commit/7614790c80996d32a28218f4d1605b0908e9ddf6 | 7614790c80996d32a28218f4d1605b0908e9ddf6 | Apply ExtensionNavigationThrottle filesystem/blob checks to all frames.
BUG=836858
Change-Id: I34333a72501129fd40b5a9aa6378c9f35f1e7fc2
Reviewed-on: https://chromium-review.googlesource.com/1028511
Reviewed-by: Devlin <rdevlin.cronin@chromium.org>
Reviewed-by: Alex Moshchuk <alexmos@chromium.org>
Reviewed-by: Nick Ca... | 0 | content/public/test/browser_test_utils.cc | {"sha": "bde2056c656777f3282a8110fbcc9dc46f0d70ff", "filename": "chrome/browser/extensions/process_manager_browsertest.cc", "status": "modified", "additions": 67, "deletions": 0, "changes": 67, "blob_url": "https://github.com/chromium/chromium/blob/7614790c80996d32a28218f4d1605b0908e9ddf6/chrome/browser/extensions/proc... | TitleWatcher::~TitleWatcher() {
}
| TitleWatcher::~TitleWatcher() {
}
| C | null | null | null | @@ -626,6 +626,12 @@ bool IsLastCommittedEntryOfPageType(WebContents* web_contents,
return last_entry->GetPageType() == page_type;
}
+void OverrideLastCommittedOrigin(RenderFrameHost* render_frame_host,
+ const url::Origin& origin) {
+ static_cast<RenderFrameHostImpl*>(render_fram... | Chrome | 7614790c80996d32a28218f4d1605b0908e9ddf6 | b9b0b6c2f15330983573371f7c3d10185d5e5617 | 0 | TitleWatcher::~TitleWatcher() {
}
|
155,351 | null | Remote | Not required | Partial | CVE-2016-5199 | https://www.cvedetails.com/cve/CVE-2016-5199/ | CWE-119 | Medium | Partial | Partial | null | 2017-01-19 | 6.8 | An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file. | 2018-01-04 | Overflow | 0 | https://github.com/chromium/chromium/commit/c995d4fe5e96f4d6d4a88b7867279b08e72d2579 | c995d4fe5e96f4d6d4a88b7867279b08e72d2579 | Move IsDataSaverEnabledByUser to be a static method and use it
This method now officially becomes the source of truth that
everything in the code base eventually calls into to determine whether
or not DataSaver is enabled.
Bug: 934399
Change-Id: Iae837b710ace8cc3101188f79d02cbc2d4f0fd93
Reviewed-on: https://chromium-... | 0 | chrome/browser/chrome_content_browser_client.cc | {"sha": "2f0c54b8797f5ca2ed76f1d4ad07fd30bca34417", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 3, "deletions": 6, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/c995d4fe5e96f4d6d4a88b7867279b08e72d2579/chrome/browser/chrome_content_browser_cli... | std::string ChromeContentBrowserClient::GetMetricSuffixForURL(const GURL& url) {
if (page_load_metrics::IsGoogleSearchResultUrl(url))
return "search";
if (url.host() == "docs.google.com")
return "docs";
return std::string();
}
| std::string ChromeContentBrowserClient::GetMetricSuffixForURL(const GURL& url) {
if (page_load_metrics::IsGoogleSearchResultUrl(url))
return "search";
if (url.host() == "docs.google.com")
return "docs";
return std::string();
}
| C | null | null | null | @@ -2282,12 +2282,9 @@ const gfx::ImageSkia* ChromeContentBrowserClient::GetDefaultFavicon() {
bool ChromeContentBrowserClient::IsDataSaverEnabled(
content::BrowserContext* browser_context) {
- data_reduction_proxy::DataReductionProxySettings*
- data_reduction_proxy_settings =
- DataReductionProx... | Chrome | c995d4fe5e96f4d6d4a88b7867279b08e72d2579 | 62ea490d67eaefcb723d80c650e8adfc9740f4de | 0 | std::string ChromeContentBrowserClient::GetMetricSuffixForURL(const GURL& url) {
// Don't change these returned strings. They are written (in hashed form) into
// UMA logs. If you add more strings, you must update histograms.xml and get
// histograms review. Only Google domains should be here for privacy purposes... |
36,909 | null | Local | Not required | Complete | CVE-2014-4014 | https://www.cvedetails.com/cve/CVE-2014-4014/ | CWE-264 | High | Complete | Complete | null | 2014-06-23 | 6.2 | The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root. | 2018-12-18 | Bypass | 0 | https://github.com/torvalds/linux/commit/23adbe12ef7d3d4195e80800ab36b37bee28cd03 | 23adbe12ef7d3d4195e80800ab36b37bee28cd03 | fs,userns: Change inode_capable to capable_wrt_inode_uidgid
The kernel has no concept of capabilities with respect to inodes; inodes
exist independently of namespaces. For example, inode_capable(inode,
CAP_LINUX_IMMUTABLE) would be nonsense.
This patch changes inode_capable to check for uid and gid mappings and
rena... | 0 | fs/xfs/xfs_ioctl.c | {"sha": "6530ced19697d49a9189fa289c9112187448fee3", "filename": "fs/attr.c", "status": "modified", "additions": 4, "deletions": 4, "changes": 8, "blob_url": "https://github.com/torvalds/linux/blob/23adbe12ef7d3d4195e80800ab36b37bee28cd03/fs/attr.c", "raw_url": "https://github.com/torvalds/linux/raw/23adbe12ef7d3d4195e8... | xfs_fssetdm_by_handle(
struct file *parfilp,
void __user *arg)
{
int error;
struct fsdmidata fsd;
xfs_fsop_setdm_handlereq_t dmhreq;
struct dentry *dentry;
if (!capable(CAP_MKNOD))
return -XFS_ERROR(EPERM);
if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
return -XFS_ERROR(EFAULT... | xfs_fssetdm_by_handle(
struct file *parfilp,
void __user *arg)
{
int error;
struct fsdmidata fsd;
xfs_fsop_setdm_handlereq_t dmhreq;
struct dentry *dentry;
if (!capable(CAP_MKNOD))
return -XFS_ERROR(EPERM);
if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
return -XFS_ERROR(EFAULT... | C | null | null | null | @@ -1215,7 +1215,7 @@ xfs_ioctl_setattr(
* cleared upon successful return from chown()
*/
if ((ip->i_d.di_mode & (S_ISUID|S_ISGID)) &&
- !inode_capable(VFS_I(ip), CAP_FSETID))
+ !capable_wrt_inode_uidgid(VFS_I(ip), CAP_FSETID))
ip->i_d.di_mode &= ~(S_ISUID|S_ISGID);
/* | linux | 23adbe12ef7d3d4195e80800ab36b37bee28cd03 | 5b174fd6472b1d6b6402b30210a212f3fd770d96 | 0 | xfs_fssetdm_by_handle(
struct file *parfilp,
void __user *arg)
{
int error;
struct fsdmidata fsd;
xfs_fsop_setdm_handlereq_t dmhreq;
struct dentry *dentry;
if (!capable(CAP_MKNOD))
return -XFS_ERROR(EPERM);
if (copy_from_user(&dmhreq, arg, sizeof(xfs_fsop_setdm_handlereq_t)))
return -XFS_ERROR(EFAULT... |
45,303 | null | Local | Not required | Complete | CVE-2014-9710 | https://www.cvedetails.com/cve/CVE-2014-9710/ | CWE-362 | Medium | Complete | Complete | null | 2015-05-27 | 6.9 | The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race... | 2016-12-30 | +Priv Bypass | 0 | https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 | 5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 | Btrfs: make xattr replace operations atomic
Replacing a xattr consists of doing a lookup for its existing value, delete
the current value from the respective leaf, release the search path and then
finally insert the new value. This leaves a time window where readers (getxattr,
listxattrs) won't see any value for the x... | 0 | fs/btrfs/ctree.c | {"sha": "817234168a7fc298c16ec624f82a7952ff60f488", "filename": "fs/btrfs/ctree.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339/fs/btrfs/ctree.c", "raw_url": "https://github.com/torvalds/linux/raw/5f5bc6... | void btrfs_free_path(struct btrfs_path *p)
{
if (!p)
return;
btrfs_release_path(p);
kmem_cache_free(btrfs_path_cachep, p);
}
| void btrfs_free_path(struct btrfs_path *p)
{
if (!p)
return;
btrfs_release_path(p);
kmem_cache_free(btrfs_path_cachep, p);
}
| C | null | null | null | @@ -2939,7 +2939,7 @@ int btrfs_search_slot(struct btrfs_trans_handle *trans, struct btrfs_root
*/
if (!p->leave_spinning)
btrfs_set_path_blocking(p);
- if (ret < 0)
+ if (ret < 0 && !p->skip_release_on_error)
btrfs_release_path(p);
return ret;
} | linux | 5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 | c7bc6319c59cc791743cf1b6e98f86be69444495 | 0 | void btrfs_free_path(struct btrfs_path *p)
{
if (!p)
return;
btrfs_release_path(p);
kmem_cache_free(btrfs_path_cachep, p);
}
|
152,432 | null | Remote | Not required | Partial | CVE-2017-5019 | https://www.cvedetails.com/cve/CVE-2017-5019/ | CWE-416 | Medium | Partial | Partial | null | 2017-02-17 | 6.8 | A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | Convert FrameHostMsg_DidAddMessageToConsole to Mojo.
Note: Since this required changing the test
RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually
re-introduced https://crbug.com/666714 locally (the bug the test was
added for), and reran the test to confirm that it still covers the bug.
Bug: 786836
Ch... | 0 | content/renderer/render_frame_impl.cc | {"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render... | void RenderFrameImpl::OnEnableViewSourceMode() {
DCHECK(frame_);
DCHECK(!frame_->Parent());
frame_->EnableViewSourceMode(true);
}
| void RenderFrameImpl::OnEnableViewSourceMode() {
DCHECK(frame_);
DCHECK(!frame_->Parent());
frame_->EnableViewSourceMode(true);
}
| C | null | null | null | @@ -4545,9 +4545,9 @@ void RenderFrameImpl::DidAddMessageToConsole(
}
}
- Send(new FrameHostMsg_DidAddMessageToConsole(
- routing_id_, static_cast<int32_t>(log_severity), message.text.Utf16(),
- static_cast<int32_t>(source_line), source_name.Utf16()));
+ GetFrameHost()->DidAddMessageToConsole(mess... | Chrome | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | c246049ec1b28d1af4fe3be886ac5904e1762026 | 0 | void RenderFrameImpl::OnEnableViewSourceMode() {
DCHECK(frame_);
DCHECK(!frame_->Parent());
frame_->EnableViewSourceMode(true);
}
|
81,809 | null | Remote | Not required | Partial | CVE-2018-12453 | https://www.cvedetails.com/cve/CVE-2018-12453/ | CWE-704 | Low | null | null | null | 2018-06-16 | 5 | Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream. | 2018-08-14 | null | 0 | https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | Abort in XGROUP if the key is not a stream | 0 | src/t_stream.c | {"sha": "c48928018c04d68e68b0191e202144978fe327a4", "filename": "src/t_stream.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/antirez/redis/blob/c04082cf138f1f51cedf05ee9ad36fb6763cafc6/src/t_stream.c", "raw_url": "https://github.com/antirez/redis/raw/c04082cf138f... | int64_t streamTrimByLength(stream *s, size_t maxlen, int approx) {
if (s->length <= maxlen) return 0;
raxIterator ri;
raxStart(&ri,s->rax);
raxSeek(&ri,"^",NULL,0);
int64_t deleted = 0;
while(s->length > maxlen && raxNext(&ri)) {
unsigned char *lp = ri.data, *p = lpFirst(lp);
i... | int64_t streamTrimByLength(stream *s, size_t maxlen, int approx) {
if (s->length <= maxlen) return 0;
raxIterator ri;
raxStart(&ri,s->rax);
raxSeek(&ri,"^",NULL,0);
int64_t deleted = 0;
while(s->length > maxlen && raxNext(&ri)) {
unsigned char *lp = ri.data, *p = lpFirst(lp);
i... | C | null | null | null | @@ -1576,7 +1576,7 @@ NULL
/* Lookup the key now, this is common for all the subcommands but HELP. */
if (c->argc >= 4) {
robj *o = lookupKeyWriteOrReply(c,c->argv[2],shared.nokeyerr);
- if (o == NULL) return;
+ if (o == NULL || checkType(c,o,OBJ_STREAM)) return;
s = o->ptr;
... | redis | c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | be899b824edd312d4e3a1998c56626d66fae3b61 | 0 | int64_t streamTrimByLength(stream *s, size_t maxlen, int approx) {
if (s->length <= maxlen) return 0;
raxIterator ri;
raxStart(&ri,s->rax);
raxSeek(&ri,"^",NULL,0);
int64_t deleted = 0;
while(s->length > maxlen && raxNext(&ri)) {
unsigned char *lp = ri.data, *p = lpFirst(lp);
i... |
71,700 | null | Remote | Not required | Partial | CVE-2016-10066 | https://www.cvedetails.com/cve/CVE-2016-10066/ | CWE-119 | Medium | null | null | null | 2017-03-03 | 4.3 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | 2017-03-04 | DoS Overflow | 0 | https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | null | 0 | coders/sixel.c | {"sha": "ca393265a99b634fb87ee6aefa65985b1eae5cd6", "filename": "ChangeLog", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6/ChangeLog", "raw_url": "https://github.com/ImageMagick/ImageMagick/raw/f6... | static void sixel_node_del(sixel_output_t *const context, sixel_node_t *np)
{
sixel_node_t *tp;
if ((tp = context->node_top) == np) {
context->node_top = np->next;
}
else {
while (tp->next != NULL) {
if (tp->next == np) {
tp->next = np->next;
... | static void sixel_node_del(sixel_output_t *const context, sixel_node_t *np)
{
sixel_node_t *tp;
if ((tp = context->node_top) == np) {
context->node_top = np->next;
}
else {
while (tp->next != NULL) {
if (tp->next == np) {
tp->next = np->next;
... | C | null | null | null | @@ -1027,7 +1027,12 @@ static Image *ReadSIXELImage(const ImageInfo *image_info,ExceptionInfo *exceptio
sixel_buffer=(char *) RelinquishMagickMemory(sixel_buffer);
image->depth=24;
image->storage_class=PseudoClass;
-
+ status=SetImageExtent(image,image->columns,image->rows);
+ if (status == MagickFalse)
+ ... | ImageMagick | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | 6773cce8ff0bfb32fd568c2a0f74acc34b66ec03 | 0 | static void sixel_node_del(sixel_output_t *const context, sixel_node_t *np)
{
sixel_node_t *tp;
if ((tp = context->node_top) == np) {
context->node_top = np->next;
}
else {
while (tp->next != NULL) {
if (tp->next == np) {
tp->next = np->next;
... |
115,483 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2012-02 | null | 0 | https://github.com/chromium/chromium/commit/dc3857aac17be72c96f28d860d875235b3be349a | dc3857aac17be72c96f28d860d875235b3be349a | Unreviewed, rolling out r142736.
http://trac.webkit.org/changeset/142736
https://bugs.webkit.org/show_bug.cgi?id=109716
Broke ABI, nightly builds crash on launch (Requested by ap on
#webkit).
Patch by Sheriff Bot <webkit.review.bot@gmail.com> on 2013-02-13
Source/WebKit2:
* Shared/APIClientTraits.cpp:
(WebKit):
* S... | 0 | third_party/WebKit/Tools/WebKitTestRunner/InjectedBundle/InjectedBundlePage.cpp | {"sha": "4747a285ac89a42c70faaaabb65a017f86d1d0ad", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 19, "deletions": 0, "changes": 19, "blob_url": "https://github.com/chromium/chromium/blob/dc3857aac17be72c96f28d860d875235b3be349a/third_party/WebKit/Source/WebKit2/ChangeLog... | void InjectedBundlePage::willRunJavaScriptConfirm(WKBundlePageRef page, WKStringRef message, WKBundleFrameRef frame, const void *clientInfo)
{
return static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->willRunJavaScriptConfirm(message, frame);
}
| void InjectedBundlePage::willRunJavaScriptConfirm(WKBundlePageRef page, WKStringRef message, WKBundleFrameRef frame, const void *clientInfo)
{
return static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->willRunJavaScriptConfirm(message, frame);
}
| C | null | null | null | @@ -319,6 +319,8 @@ InjectedBundlePage::InjectedBundlePage(WKBundlePageRef page)
0, // willDestroyGlobalObjectForDOMWindowExtension
didFinishProgress, // didFinishProgress
0, // shouldForceUniversalAccessFromLocalURL
+ 0, // didReceiveIntentForFrame
+ 0, // registerIntentService... | Chrome | dc3857aac17be72c96f28d860d875235b3be349a | cd2d7b3da48d2727a9f8f555b0af79169dce0918 | 0 | void InjectedBundlePage::willRunJavaScriptConfirm(WKBundlePageRef page, WKStringRef message, WKBundleFrameRef frame, const void *clientInfo)
{
return static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->willRunJavaScriptConfirm(message, frame);
}
|
149,947 | null | Remote | Not required | null | CVE-2017-5061 | https://www.cvedetails.com/cve/CVE-2017-5061/ | CWE-362 | High | null | Partial | null | 2017-10-27 | 2.6 | A race condition in navigation in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34 | 5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34 | (Reland) Discard compositor frames from unloaded web content
This is a reland of https://codereview.chromium.org/2707243005/ with a
small change to fix an uninitialized memory error that fails on MSAN
bots.
BUG=672847
TBR=danakj@chromium.org, creis@chromium.org
CQ_INCLUDE_TRYBOTS=master.tryserver.blink:linux_trusty_b... | 0 | cc/trees/layer_tree_host_impl.cc | {"sha": "42e97e419e13449a165990f1b0f48beaee13e291", "filename": "cc/ipc/cc_param_traits_macros.h", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34/cc/ipc/cc_param_traits_macros.h", "raw_url": "https://git... | LayerImpl* LayerTreeHostImpl::FindScrollLayerForDeviceViewportPoint(
const gfx::PointF& device_viewport_point,
InputHandler::ScrollInputType type,
LayerImpl* layer_impl,
bool* scroll_on_main_thread,
uint32_t* main_thread_scrolling_reasons) const {
DCHECK(scroll_on_main_thread);
DCHECK(main_threa... | LayerImpl* LayerTreeHostImpl::FindScrollLayerForDeviceViewportPoint(
const gfx::PointF& device_viewport_point,
InputHandler::ScrollInputType type,
LayerImpl* layer_impl,
bool* scroll_on_main_thread,
uint32_t* main_thread_scrolling_reasons) const {
DCHECK(scroll_on_main_thread);
DCHECK(main_threa... | C | null | null | null | @@ -1581,6 +1581,7 @@ CompositorFrameMetadata LayerTreeHostImpl::MakeCompositorFrameMetadata() const {
metadata.bottom_controls_shown_ratio =
browser_controls_offset_manager_->BottomControlsShownRatio();
metadata.root_background_color = active_tree_->background_color();
+ metadata.content_source_id = acti... | Chrome | 5d78b84d39bd34bc9fce9d01c0dcd5a22a330d34 | aae574ee52af5df55c8b7175ff096481a5bfb703 | 0 | LayerImpl* LayerTreeHostImpl::FindScrollLayerForDeviceViewportPoint(
const gfx::PointF& device_viewport_point,
InputHandler::ScrollInputType type,
LayerImpl* layer_impl,
bool* scroll_on_main_thread,
uint32_t* main_thread_scrolling_reasons) const {
DCHECK(scroll_on_main_thread);
DCHECK(main_threa... |
164,821 | null | Remote | Not required | Partial | CVE-2019-5822 | https://www.cvedetails.com/cve/CVE-2019-5822/ | CWE-284 | Medium | Partial | Partial | null | 2019-06-27 | 6.8 | Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page. | 2019-07-25 | Bypass | 0 | https://github.com/chromium/chromium/commit/2f81d000fdb5331121cba7ff81dfaaec25b520a5 | 2f81d000fdb5331121cba7ff81dfaaec25b520a5 | When turning a download into a navigation, navigate the right frame
Code changes from Nate Chapin <japhet@chromium.org>
Bug: 926105
Change-Id: I098599394e6ebe7d2fce5af838014297a337d294
Reviewed-on: https://chromium-review.googlesource.com/c/1454962
Reviewed-by: Camille Lamy <clamy@chromium.org>
Commit-Queue: Jochen E... | 0 | chrome/browser/download/download_browsertest.cc | {"sha": "5bff3e24e623e2f22b4fc2db17e54c8911112e3d", "filename": "chrome/browser/download/download_browsertest.cc", "status": "modified", "additions": 61, "deletions": 0, "changes": 61, "blob_url": "https://github.com/chromium/chromium/blob/2f81d000fdb5331121cba7ff81dfaaec25b520a5/chrome/browser/download/download_browse... | content::DownloadTestObserver* DangerousDownloadWaiter(
Browser* browser,
int num_downloads,
content::DownloadTestObserver::DangerousDownloadAction
dangerous_download_action) {
DownloadManager* download_manager = DownloadManagerForBrowser(browser);
return new content::DownloadTestO... | content::DownloadTestObserver* DangerousDownloadWaiter(
Browser* browser,
int num_downloads,
content::DownloadTestObserver::DangerousDownloadAction
dangerous_download_action) {
DownloadManager* download_manager = DownloadManagerForBrowser(browser);
return new content::DownloadTestO... | C | null | null | null | @@ -3563,6 +3563,67 @@ IN_PROC_BROWSER_TEST_F(DownloadTest, FileExistenceCheckOpeningDownloadsPage) {
.WaitForEvent();
}
+// Checks that the navigation resulting from a cross origin download navigates
+// the correct iframe.
+IN_PROC_BROWSER_TEST_F(DownloadTest, CrossOriginDownloadNavigatesIframe) {
+ Embedd... | Chrome | 2f81d000fdb5331121cba7ff81dfaaec25b520a5 | 6aff2928bf6a19ea5069ae38405704c377aff56e | 0 | content::DownloadTestObserver* DangerousDownloadWaiter(
Browser* browser,
int num_downloads,
content::DownloadTestObserver::DangerousDownloadAction
dangerous_download_action) {
DownloadManager* download_manager = DownloadManagerForBrowser(browser);
return new content::DownloadTestO... |
106,429 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2011-05 | null | 0 | https://github.com/chromium/chromium/commit/df831400bcb63db4259b5858281b1727ba972a2a | df831400bcb63db4259b5858281b1727ba972a2a | WebKit2: Support window bounce when panning.
https://bugs.webkit.org/show_bug.cgi?id=58065
<rdar://problem/9244367>
Reviewed by Adam Roben.
Make gestureDidScroll synchronous, as once we scroll, we need to know
whether or not we are at the beginning or end of the scrollable document.
If we are at eith... | 0 | third_party/WebKit/Source/WebKit2/UIProcess/WebPageProxy.cpp | {"sha": "394aac509603ac833b379946cb1be38a0bb5418a", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 29, "deletions": 0, "changes": 29, "blob_url": "https://github.com/chromium/chromium/blob/df831400bcb63db4259b5858281b1727ba972a2a/third_party/WebKit/Source/WebKit2/ChangeLog... | WebPageProxy::WebPageProxy(PageClient* pageClient, WebContext* context, WebPageGroup* pageGroup, uint64_t pageID)
: m_pageClient(pageClient)
, m_context(context)
, m_pageGroup(pageGroup)
, m_mainFrame(0)
, m_userAgent(standardUserAgent())
, m_geolocationPermissionRequestManager(this)
, m_est... | WebPageProxy::WebPageProxy(PageClient* pageClient, WebContext* context, WebPageGroup* pageGroup, uint64_t pageID)
: m_pageClient(pageClient)
, m_context(context)
, m_pageGroup(pageGroup)
, m_mainFrame(0)
, m_userAgent(standardUserAgent())
, m_geolocationPermissionRequestManager(this)
, m_est... | C | null | null | null | @@ -670,14 +670,16 @@ String WebPageProxy::getSelectedText()
bool WebPageProxy::gestureWillBegin(const IntPoint& point)
{
- bool canBeginPanning;
+ bool canBeginPanning = false;
process()->sendSync(Messages::WebPage::GestureWillBegin(point), Messages::WebPage::GestureWillBegin::Reply(canBeginPanning), m_... | Chrome | df831400bcb63db4259b5858281b1727ba972a2a | ed03cbf291b69831f85347962d190a391c8b6bdc | 0 | WebPageProxy::WebPageProxy(PageClient* pageClient, WebContext* context, WebPageGroup* pageGroup, uint64_t pageID)
: m_pageClient(pageClient)
, m_context(context)
, m_pageGroup(pageGroup)
, m_mainFrame(0)
, m_userAgent(standardUserAgent())
, m_geolocationPermissionRequestManager(this)
, m_est... |
184,130 | null | Remote | Not required | Partial | CVE-2011-1296 | https://www.cvedetails.com/cve/CVE-2011-1296/ | CWE-20 | Low | Partial | Partial | null | 2011-03-25 | 7.5 | Google Chrome before 10.0.648.204 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a *stale pointer.* | 2017-09-18 | DoS | 3 | https://github.com/chromium/chromium/commit/c90c6ca59378d7e86d1a2f28fe96bada35df1508 | c90c6ca59378d7e86d1a2f28fe96bada35df1508 | Rename the TabContentWrapper pieces to be "TabHelper"s. (Except for the PasswordManager... for now.) Also, just pre-create them up-front. It saves us effort, as they're all going to be eventually created anyway, so being lazy saves us nothing and creates headaches since the rules about what can be lazy differ from feat... | 3 | chrome/browser/ui/find_bar/find_bar_controller.cc | {"sha": "adc563b70e1411d23c19c0d0f8d743c57b558b67", "filename": "chrome/browser/automation/automation_provider.cc", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/c90c6ca59378d7e86d1a2f28fe96bada35df1508/chrome/browser/automation/automation_pro... | void FindBarController::UpdateFindBarForCurrentResult() {
FindTabHelper* find_tab_helper = tab_contents_->find_tab_helper();
const FindNotificationDetails& find_result = find_tab_helper->find_result();
if (find_result.number_of_matches() > -1) {
if (last_reported_matchcount_ > 0 &&
find_result.numb... | void FindBarController::UpdateFindBarForCurrentResult() {
FindManager* find_manager = tab_contents_->GetFindManager();
const FindNotificationDetails& find_result = find_manager->find_result();
if (find_result.number_of_matches() > -1) {
if (last_reported_matchcount_ > 0 &&
find_result.number_of_mat... | C | FindTabHelper* find_tab_helper = tab_contents_->find_tab_helper();
const FindNotificationDetails& find_result = find_tab_helper->find_result();
find_bar_->UpdateUIForFindResult(find_result, find_tab_helper->find_text());
| FindManager* find_manager = tab_contents_->GetFindManager();
const FindNotificationDetails& find_result = find_manager->find_result();
find_bar_->UpdateUIForFindResult(find_result, find_manager->find_text());
| null | @@ -11,7 +11,7 @@
#include "chrome/browser/tab_contents/navigation_entry.h"
#include "chrome/browser/ui/find_bar/find_bar.h"
#include "chrome/browser/ui/find_bar/find_bar_state.h"
-#include "chrome/browser/ui/find_bar/find_manager.h"
+#include "chrome/browser/ui/find_bar/find_tab_helper.h"
#include "chrome/browser/... | Chrome | c90c6ca59378d7e86d1a2f28fe96bada35df1508 | 8d61f1c281dd3490e482c63eba56f4787acf42f1 | 1 | void FindBarController::UpdateFindBarForCurrentResult() {
//flaw_line_below:
FindManager* find_manager = tab_contents_->GetFindManager();
//flaw_line_below:
const FindNotificationDetails& find_result = find_manager->find_result();
//fix_flaw_line_below:
// FindTabHelper* find_tab_helper = tab_contents_->find_tab_... |
136,605 | null | Remote | Not required | Partial | CVE-2015-6761 | https://www.cvedetails.com/cve/CVE-2015-6761/ | CWE-362 | Medium | Partial | Partial | null | 2015-10-15 | 6.8 | The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possi... | 2018-12-21 | DoS Mem. Corr. | 0 | https://github.com/chromium/chromium/commit/fd506b0ac6c7846ae45b5034044fe85c28ee68ac | fd506b0ac6c7846ae45b5034044fe85c28ee68ac | Fix detach with open()ed document leaving parent loading indefinitely
Change-Id: I26c2a054b9f1e5eb076acd677e1223058825f6d6
Bug: 803416
Test: fast/loader/document-open-iframe-then-detach.html
Change-Id: I26c2a054b9f1e5eb076acd677e1223058825f6d6
Reviewed-on: https://chromium-review.googlesource.com/887298
Reviewed-by: ... | 0 | third_party/WebKit/Source/core/loader/DocumentLoader.cpp | {"sha": "ef3dbcd3ba3fe8d1797310ac4ba4a02541c06b4b", "filename": "third_party/WebKit/LayoutTests/fast/loader/document-open-iframe-then-detach-expected.txt", "status": "added", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/fd506b0ac6c7846ae45b5034044fe85c28ee68ac/thi... | void DocumentLoader::DidObserveLoadingBehavior(
WebLoadingBehaviorFlag behavior) {
if (frame_) {
DCHECK_GE(state_, kCommitted);
GetLocalFrameClient().DidObserveLoadingBehavior(behavior);
}
}
| void DocumentLoader::DidObserveLoadingBehavior(
WebLoadingBehaviorFlag behavior) {
if (frame_) {
DCHECK_GE(state_, kCommitted);
GetLocalFrameClient().DidObserveLoadingBehavior(behavior);
}
}
| C | null | null | null | @@ -773,14 +773,15 @@ void DocumentLoader::AppendRedirect(const KURL& url) {
redirect_chain_.push_back(url);
}
-void DocumentLoader::DetachFromFrame() {
- DCHECK(frame_);
-
- // It never makes sense to have a document loader that is detached from its
- // frame have any loads active, so go ahead and kill all t... | Chrome | fd506b0ac6c7846ae45b5034044fe85c28ee68ac | 913109149534a732bdb5461d0ba2759f5d2f50f4 | 0 | void DocumentLoader::DidObserveLoadingBehavior(
WebLoadingBehaviorFlag behavior) {
if (frame_) {
DCHECK_GE(state_, kCommitted);
GetLocalFrameClient().DidObserveLoadingBehavior(behavior);
}
}
|
141,993 | null | Remote | Not required | Partial | CVE-2016-5185 | https://www.cvedetails.com/cve/CVE-2016-5185/ | CWE-416 | Medium | Partial | Partial | null | 2016-12-17 | 6.8 | Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/f2d26633cbd50735ac2af30436888b71ac0abad3 | f2d26633cbd50735ac2af30436888b71ac0abad3 | [Autofill] Remove AutofillPopupViewViews and associated feature.
Bug: 906135,831603
Change-Id: I3c982f8b3ffb4928c7c878e74e10113999106499
Reviewed-on: https://chromium-review.googlesource.com/c/1387124
Reviewed-by: Robert Kaplow <rkaplow@chromium.org>
Reviewed-by: Vasilii Sukhanov <vasilii@chromium.org>
Reviewed-by: Fa... | 0 | components/autofill/core/browser/autofill_external_delegate.cc | {"sha": "2a07c46e078e5a63a8a8bf0934d0a0234d4c456d", "filename": "chrome/browser/about_flags.cc", "status": "modified", "additions": 0, "deletions": 5, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/f2d26633cbd50735ac2af30436888b71ac0abad3/chrome/browser/about_flags.cc", "raw_url": "https://github.... | bool AutofillExternalDelegate::RemoveSuggestion(const base::string16& value,
int identifier) {
if (identifier > 0)
return manager_->RemoveAutofillProfileOrCreditCard(identifier);
if (identifier == POPUP_ITEM_ID_AUTOCOMPLETE_ENTRY) {
manager_->RemoveAutocomple... | bool AutofillExternalDelegate::RemoveSuggestion(const base::string16& value,
int identifier) {
if (identifier > 0)
return manager_->RemoveAutofillProfileOrCreditCard(identifier);
if (identifier == POPUP_ITEM_ID_AUTOCOMPLETE_ENTRY) {
manager_->RemoveAutocomple... | C | null | null | null | @@ -82,17 +82,6 @@ void AutofillExternalDelegate::OnSuggestionsReturned(
// Hide warnings as appropriate.
PossiblyRemoveAutofillWarnings(&suggestions);
-#if !defined(OS_ANDROID)
- // If there are above the fold suggestions at this point, add a separator to
- // go between the values and menu items. Skip this ... | Chrome | f2d26633cbd50735ac2af30436888b71ac0abad3 | 1b9e54bfbe066e986efe150e1596112dbaab6652 | 0 | bool AutofillExternalDelegate::RemoveSuggestion(const base::string16& value,
int identifier) {
if (identifier > 0)
return manager_->RemoveAutofillProfileOrCreditCard(identifier);
if (identifier == POPUP_ITEM_ID_AUTOCOMPLETE_ENTRY) {
manager_->RemoveAutocomple... |
70,240 | null | Remote | Not required | Partial | CVE-2016-10269 | https://www.cvedetails.com/cve/CVE-2016-10269/ | CWE-125 | Medium | Partial | Partial | null | 2017-03-24 | 6.8 | LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to *READ of size 512* and libtiff/tif_unix.c:340:2. | 2018-03-21 | DoS | 0 | https://github.com/vadz/libtiff/commit/1044b43637fa7f70fb19b93593777b78bd20da86 | 1044b43637fa7f70fb19b93593777b78bd20da86 | * libtiff/tif_pixarlog.c, libtiff/tif_luv.c: fix heap-based buffer
overflow on generation of PixarLog / LUV compressed files, with
ColorMap, TransferFunction attached and nasty plays with bitspersample.
The fix for LUV has not been tested, but suffers from the same kind
of issue of PixarLog.
Reported by Agostino Sarubb... | 0 | libtiff/tif_luv.c | {"sha": "93c01f80edf83e0a0d25b8f587a481492f322a80", "filename": "ChangeLog", "status": "modified", "additions": 10, "deletions": 0, "changes": 10, "blob_url": "https://github.com/vadz/libtiff/blob/1044b43637fa7f70fb19b93593777b78bd20da86/ChangeLog", "raw_url": "https://github.com/vadz/libtiff/raw/1044b43637fa7f70fb19b9... | LogLuvDecodeStrip(TIFF* tif, uint8* bp, tmsize_t cc, uint16 s)
{
tmsize_t rowlen = TIFFScanlineSize(tif);
if (rowlen == 0)
return 0;
assert(cc%rowlen == 0);
while (cc && (*tif->tif_decoderow)(tif, bp, rowlen, s)) {
bp += rowlen;
cc -= rowlen;
}
return (cc == 0);
}
| LogLuvDecodeStrip(TIFF* tif, uint8* bp, tmsize_t cc, uint16 s)
{
tmsize_t rowlen = TIFFScanlineSize(tif);
if (rowlen == 0)
return 0;
assert(cc%rowlen == 0);
while (cc && (*tif->tif_decoderow)(tif, bp, rowlen, s)) {
bp += rowlen;
cc -= rowlen;
}
return (cc == 0);
}
| C | null | null | null | @@ -158,6 +158,7 @@
typedef struct logLuvState LogLuvState;
struct logLuvState {
+ int encoder_state; /* 1 if encoder correctly initialized */
int user_datafmt; /* user data format */
int encode_meth; /* encoding method */
int ... | libtiff | 1044b43637fa7f70fb19b93593777b78bd20da86 | 5397a417e61258c69209904e652a1f409ec3b9df | 0 | LogLuvDecodeStrip(TIFF* tif, uint8* bp, tmsize_t cc, uint16 s)
{
tmsize_t rowlen = TIFFScanlineSize(tif);
if (rowlen == 0)
return 0;
assert(cc%rowlen == 0);
while (cc && (*tif->tif_decoderow)(tif, bp, rowlen, s)) {
bp += rowlen;
cc -= rowlen;
}
return (cc == 0);
}
|
168,404 | null | Remote | Not required | null | CVE-2018-16080 | https://www.cvedetails.com/cve/CVE-2018-16080/ | CWE-20 | Medium | null | Partial | null | 2019-01-09 | 4.3 | A missing check for popup window handling in Fullscreen in Google Chrome on macOS prior to 69.0.3497.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | 2019-01-18 | null | 0 | https://github.com/chromium/chromium/commit/c552cd7b8a0862f6b3c8c6a07f98bda3721101eb | c552cd7b8a0862f6b3c8c6a07f98bda3721101eb | Mac: turn popups into new tabs while in fullscreen.
It's platform convention to show popups as new tabs while in
non-HTML5 fullscreen. (Popups cause tabs to lose HTML5 fullscreen.)
This was implemented for Cocoa in a BrowserWindow override, but
it makes sense to just stick it into Browser and remove a ton
of override... | 0 | chrome/test/base/test_browser_window.cc | {"sha": "eff931f91d557df3b9e203dd92928ab78333197a", "filename": "chrome/browser/ui/browser.cc", "status": "modified", "additions": 11, "deletions": 0, "changes": 11, "blob_url": "https://github.com/chromium/chromium/blob/c552cd7b8a0862f6b3c8c6a07f98bda3721101eb/chrome/browser/ui/browser.cc", "raw_url": "https://github.... | TestBrowserWindow::TestLocationBar::GetPageTransition() const {
return ui::PAGE_TRANSITION_LINK;
}
| TestBrowserWindow::TestLocationBar::GetPageTransition() const {
return ui::PAGE_TRANSITION_LINK;
}
| C | null | null | null | @@ -180,11 +180,6 @@ DownloadShelf* TestBrowserWindow::GetDownloadShelf() {
return &download_shelf_;
}
-WindowOpenDisposition TestBrowserWindow::GetDispositionForPopupBounds(
- const gfx::Rect& bounds) {
- return WindowOpenDisposition::NEW_POPUP;
-}
-
FindBar* TestBrowserWindow::CreateFindBar() {
return N... | Chrome | c552cd7b8a0862f6b3c8c6a07f98bda3721101eb | f2d4f9d463a01cdd194437a3f62f68cab9eadb7f | 0 | TestBrowserWindow::TestLocationBar::GetPageTransition() const {
return ui::PAGE_TRANSITION_LINK;
}
|
17,037 | null | Remote | Not required | null | CVE-2016-1586 | https://www.cvedetails.com/cve/CVE-2016-1586/ | CWE-20 | Low | null | Partial | null | 2019-04-22 | 5 | A malicious webview could install long-lived unload handlers that re-use an incognito BrowserContext that is queued for destruction in versions of Oxide before 1.18.3. | 2019-10-09 | null | 0 | https://git.launchpad.net/oxide/commit/?id=29014da83e5fc358d6bff0f574e9ed45e61a35ac | 29014da83e5fc358d6bff0f574e9ed45e61a35ac | null | 0 | null | null | void OxideQQuickWebViewPrivate::FrameRemoved(QObject* frame) {
Q_Q(OxideQQuickWebView);
emit q->frameRemoved(qobject_cast<OxideQQuickWebFrame*>(frame));
}
| void OxideQQuickWebViewPrivate::FrameRemoved(QObject* frame) {
Q_Q(OxideQQuickWebView);
emit q->frameRemoved(qobject_cast<OxideQQuickWebFrame*>(frame));
}
| CPP | null | null | 648e85080604e22bab00b48428b4e80c522cabea | @@ -2042,8 +2042,8 @@ If the application doesn't set this, then WebView will use the application
default WebContext (Oxide::defaultWebContext).
The application should ensure that the provided WebContext outlives this
-WebView. Although WebView will continue to function normally if its provided
-WebContext is delete... | launchpad | https://git.launchpad.net/oxide/tree/qt/quick/api/oxideqquickwebview.cc?id=29014da83e5fc358d6bff0f574e9ed45e61a35ac | https://git.launchpad.net/oxide/tree/qt/quick/api/oxideqquickwebview.cc?id=648e85080604e22bab00b48428b4e80c522cabea | 0 | void OxideQQuickWebViewPrivate::FrameRemoved(QObject* frame) {
Q_Q(OxideQQuickWebView);
emit q->frameRemoved(qobject_cast<OxideQQuickWebFrame*>(frame));
}
|
4,072 | null | Remote | Not required | Partial | CVE-2013-1790 | https://www.cvedetails.com/cve/CVE-2013-1790/ | CWE-119 | Medium | Partial | Partial | null | 2013-04-09 | 6.8 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | 2014-01-27 | Overflow | 0 | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | b1026b5978c385328f2a15a2185c599a563edf91 | null | 0 | null | null | FileStream::~FileStream() {
close();
}
| FileStream::~FileStream() {
close();
}
| CPP | null | null | bef2c42f381c74fdb8bbb43babe1a93a0e229fb0 | @@ -14,7 +14,7 @@
// under GPL version 2 or later
//
// Copyright (C) 2005 Jeff Muizelaar <jeff@infidigm.net>
-// Copyright (C) 2006-2010, 2012 Albert Astals Cid <aacid@kde.org>
+// Copyright (C) 2006-2010, 2012, 2013 Albert Astals Cid <aacid@kde.org>
// Copyright (C) 2007 Krzysztof Kowalczyk <kkowalczyk@gmail.com>... | poppler | https://cgit.freedesktop.org/poppler/poppler/tree/poppler/Stream.cc?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | https://cgit.freedesktop.org/poppler/poppler/tree/poppler/Stream.cc?h=poppler-0.22&id=bef2c42f381c74fdb8bbb43babe1a93a0e229fb0 | 0 | FileStream::~FileStream() {
close();
}
|
102,766 | null | Remote | Not required | Partial | CVE-2011-2881 | https://www.cvedetails.com/cve/CVE-2011-2881/ | CWE-119 | Medium | Partial | Partial | null | 2011-10-04 | 6.8 | Google Chrome before 14.0.835.202 does not properly handle Google V8 hidden objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code. | 2017-09-18 | DoS Overflow Mem. Corr. | 0 | https://github.com/chromium/chromium/commit/88c4913f11967abfd08a8b22b4423710322ac49b | 88c4913f11967abfd08a8b22b4423710322ac49b | [chromium] Fix shutdown race when posting main thread task to CCThreadProxy and enable tests
https://bugs.webkit.org/show_bug.cgi?id=70161
Reviewed by David Levin.
Source/WebCore:
Adds a weak pointer mechanism to cancel main thread tasks posted to CCThreadProxy instances from the compositor
thread. Previously there ... | 0 | third_party/WebKit/Source/WebKit/chromium/tests/CCLayerTreeHostTest.cpp | {"sha": "1d3fae6819d78c4df92427aa27758554fbeda852", "filename": "third_party/WebKit/Source/WebCore/ChangeLog", "status": "modified", "additions": 30, "deletions": 0, "changes": 30, "blob_url": "https://github.com/chromium/chromium/blob/88c4913f11967abfd08a8b22b4423710322ac49b/third_party/WebKit/Source/WebCore/ChangeLog... | virtual void commitComplete()
{
CCLayerTreeHostImpl::commitComplete();
m_testHooks->commitCompleteOnCCThread(this);
}
| virtual void commitComplete()
{
CCLayerTreeHostImpl::commitComplete();
m_testHooks->commitCompleteOnCCThread(this);
}
| C | null | null | null | @@ -24,13 +24,12 @@
#include "config.h"
-#if USE(THREADED_COMPOSITING)
-
#include "cc/CCLayerTreeHost.h"
#include "cc/CCLayerImpl.h"
#include "cc/CCLayerTreeHostImpl.h"
#include "cc/CCMainThreadTask.h"
+#include "cc/CCScopedMainThreadProxy.h"
#include "cc/CCThreadTask.h"
#include "GraphicsContext3DPrivate.... | Chrome | 88c4913f11967abfd08a8b22b4423710322ac49b | a12059c05d115350633d6ca4275780eb37a98f68 | 0 | virtual void commitComplete()
{
CCLayerTreeHostImpl::commitComplete();
m_testHooks->commitCompleteOnCCThread(this);
}
|
36,007 | null | Remote | Not required | Complete | CVE-2014-7145 | https://www.cvedetails.com/cve/CVE-2014-7145/ | CWE-399 | Low | null | null | null | 2014-09-28 | 7.8 | The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals. | 2016-08-24 | DoS | 0 | https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce | 18f39e7be0121317550d03e267e3ebd4dbfbb3ce | [CIFS] Possible null ptr deref in SMB2_tcon
As Raphael Geissert pointed out, tcon_error_exit can dereference tcon
and there is one path in which tcon can be null.
Signed-off-by: Steve French <smfrench@gmail.com>
CC: Stable <stable@vger.kernel.org> # v3.7+
Reported-by: Raphael Geissert <geissert@debian.org> | 0 | fs/cifs/smb2pdu.c | {"sha": "240c627bc0c6619a55423428eec4c7b941365acf", "filename": "fs/cifs/smb2pdu.c", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/torvalds/linux/blob/18f39e7be0121317550d03e267e3ebd4dbfbb3ce/fs/cifs/smb2pdu.c", "raw_url": "https://github.com/torvalds/linux/raw/18f3... | smb2_echo_callback(struct mid_q_entry *mid)
{
struct TCP_Server_Info *server = mid->callback_data;
struct smb2_echo_rsp *smb2 = (struct smb2_echo_rsp *)mid->resp_buf;
unsigned int credits_received = 1;
if (mid->mid_state == MID_RESPONSE_RECEIVED)
credits_received = le16_to_cpu(smb2->hdr.CreditRequest);
DeleteM... | smb2_echo_callback(struct mid_q_entry *mid)
{
struct TCP_Server_Info *server = mid->callback_data;
struct smb2_echo_rsp *smb2 = (struct smb2_echo_rsp *)mid->resp_buf;
unsigned int credits_received = 1;
if (mid->mid_state == MID_RESPONSE_RECEIVED)
credits_received = le16_to_cpu(smb2->hdr.CreditRequest);
DeleteM... | C | null | null | null | @@ -907,7 +907,8 @@ SMB2_tcon(const unsigned int xid, struct cifs_ses *ses, const char *tree,
tcon_error_exit:
if (rsp->hdr.Status == STATUS_BAD_NETWORK_NAME) {
cifs_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree);
- tcon->bad_network_name = true;
+ if (tcon)
+ tcon->bad_network_name = true;
}
goto tcon_exit;
} | linux | 18f39e7be0121317550d03e267e3ebd4dbfbb3ce | 754789a1c046106cfdb067102642f73e0fd35fb3 | 0 | smb2_echo_callback(struct mid_q_entry *mid)
{
struct TCP_Server_Info *server = mid->callback_data;
struct smb2_echo_rsp *smb2 = (struct smb2_echo_rsp *)mid->resp_buf;
unsigned int credits_received = 1;
if (mid->mid_state == MID_RESPONSE_RECEIVED)
credits_received = le16_to_cpu(smb2->hdr.CreditRequest);
DeleteM... |
132,699 | null | Remote | Not required | Partial | CVE-2014-1700 | https://www.cvedetails.com/cve/CVE-2014-1700/ | CWE-399 | Low | Partial | Partial | null | 2014-03-16 | 7.5 | Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure. | 2017-01-06 | DoS | 0 | https://github.com/chromium/chromium/commit/685c3980d31b5199924086b8c93a1ce751d24733 | 685c3980d31b5199924086b8c93a1ce751d24733 | content: Rename webkit_test_helpers.{cc,h} to blink_test_helpers.{cc,h}
Now that webkit/ is gone, we are preparing ourselves for the merge of
third_party/WebKit into //blink.
BUG=None
BUG=content_shell && content_unittests
R=avi@chromium.org
Review URL: https://codereview.chromium.org/1118183003
Cr-Commit-Position:... | 0 | content/shell/renderer/layout_test/layout_test_content_renderer_client.cc | {"sha": "5a9805e6009278dfd2a1ad70452673ffee55947e", "filename": "content/DEPS", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/685c3980d31b5199924086b8c93a1ce751d24733/content/DEPS", "raw_url": "https://github.com/chromium/chromium/raw/685c3980... | WebClipboard* LayoutTestContentRendererClient::OverrideWebClipboard() {
if (!clipboard_)
clipboard_.reset(new MockWebClipboardImpl);
return clipboard_.get();
}
| WebClipboard* LayoutTestContentRendererClient::OverrideWebClipboard() {
if (!clipboard_)
clipboard_.reset(new MockWebClipboardImpl);
return clipboard_.get();
}
| C | null | null | null | @@ -13,7 +13,7 @@
#include "content/public/renderer/render_view.h"
#include "content/public/test/layouttest_support.h"
#include "content/shell/common/shell_switches.h"
-#include "content/shell/common/webkit_test_helpers.h"
+#include "content/shell/renderer/layout_test/blink_test_helpers.h"
#include "content/shell/r... | Chrome | 685c3980d31b5199924086b8c93a1ce751d24733 | 0fa5b759d2bbd5c074277e2a13e6a765da031af4 | 0 | WebClipboard* LayoutTestContentRendererClient::OverrideWebClipboard() {
if (!clipboard_)
clipboard_.reset(new MockWebClipboardImpl);
return clipboard_.get();
}
|
103,668 | null | Remote | Not required | Partial | CVE-2011-2861 | https://www.cvedetails.com/cve/CVE-2011-2861/ | CWE-20 | Medium | Partial | Partial | null | 2011-09-19 | 6.8 | Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce | 8262245d384be025f13e2a5b3a03b7e5c98374ce | DevTools: move DevToolsAgent/Client into content.
BUG=84078
TEST=
Review URL: http://codereview.chromium.org/7461019
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@93596 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/browser/renderer_host/browser_render_process_host.cc | {"sha": "24059d48a3bcbe447efb7408f77415576f0c36a4", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/8262245d384be025f13e2a5b3a03b7e5c98374ce/chrome/browser/chrome_content_browser_cli... | virtual net::URLRequestContext* GetRequestContext(
ResourceType::Type resource_type) {
net::URLRequestContextGetter* request_context = request_context_;
if (resource_type == ResourceType::MEDIA)
request_context = media_request_context_;
return request_context->GetURLRequestContext();
}
| virtual net::URLRequestContext* GetRequestContext(
ResourceType::Type resource_type) {
net::URLRequestContextGetter* request_context = request_context_;
if (resource_type == ResourceType::MEDIA)
request_context = media_request_context_;
return request_context->GetURLRequestContext();
}
| C | null | null | null | @@ -576,6 +576,7 @@ void BrowserRenderProcessHost::PropagateBrowserCommandLineToRenderer(
switches::kPpapiOutOfProcess,
switches::kRecordMode,
switches::kRegisterPepperPlugins,
+ switches::kRemoteShellPort,
switches::kRendererAssertTest,
#if !defined(OFFICIAL_BUILD)
switches::kRendererCheck... | Chrome | 8262245d384be025f13e2a5b3a03b7e5c98374ce | 2469a22063c3539147f55fe899a8dabc12901c01 | 0 | virtual net::URLRequestContext* GetRequestContext(
ResourceType::Type resource_type) {
net::URLRequestContextGetter* request_context = request_context_;
// If the request has resource type of ResourceType::MEDIA, we use a request
// context specific to media for handling it because these resources h... |
112,813 | null | Remote | Not required | null | CVE-2012-2891 | https://www.cvedetails.com/cve/CVE-2012-2891/ | CWE-200 | Low | Partial | null | null | 2012-09-26 | 5 | The IPC implementation in Google Chrome before 22.0.1229.79 allows attackers to obtain potentially sensitive information about memory addresses via unspecified vectors. | 2017-09-18 | +Info | 0 | https://github.com/chromium/chromium/commit/116d0963cadfbf55ef2ec3d13781987c4d80517a | 116d0963cadfbf55ef2ec3d13781987c4d80517a | Print preview: Use an ID instead of memory pointer string in WebUI.
BUG=144051
Review URL: https://chromiumcodereview.appspot.com/10870003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@153342 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | chrome/renderer/chrome_mock_render_thread.cc | {"sha": "c03c51998e84b755a01af37f111faec14f227eb0", "filename": "chrome/browser/printing/print_preview_data_service.cc", "status": "modified", "additions": 21, "deletions": 27, "changes": 48, "blob_url": "https://github.com/chromium/chromium/blob/116d0963cadfbf55ef2ec3d13781987c4d80517a/chrome/browser/printing/print_pr... | void ChromeMockRenderThread::OnTempFileForPrintingWritten(int render_view_id,
int browser_fd) {
close(browser_fd);
}
| void ChromeMockRenderThread::OnTempFileForPrintingWritten(int render_view_id,
int browser_fd) {
close(browser_fd);
}
| C | null | null | null | @@ -4,20 +4,23 @@
#include "chrome/renderer/chrome_mock_render_thread.h"
-#include <fcntl.h>
+#include <vector>
-#include "base/file_util.h"
-#include "base/process_util.h"
+#include "base/values.h"
#include "chrome/common/extensions/extension_messages.h"
#include "chrome/common/print_messages.h"
-#include "ch... | Chrome | 116d0963cadfbf55ef2ec3d13781987c4d80517a | 0ccc7e3af6db2fc2ce09ebcd780dace294adeb61 | 0 | void ChromeMockRenderThread::OnTempFileForPrintingWritten(int render_view_id,
int browser_fd) {
close(browser_fd);
}
|
57,136 | null | Remote | Not required | Partial | CVE-2015-8746 | https://www.cvedetails.com/cve/CVE-2015-8746/ | null | Low | null | null | null | 2016-05-02 | 5 | fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic. | 2018-01-04 | DoS | 0 | https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da | 18e3b739fdc826481c6a1335ce0c5b19b3d415da | NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2 client
---Steps to Reproduce--
<nfs-server>
# cat /etc/exports
/nfs/referal *(rw,insecure,no_subtree_check,no_root_squash,crossmnt)
/nfs/old *(ro,insecure,subtree_check,root_squash,crossmnt)
<nfs-client>
# mount -t nfs nfs-server:/nfs/ /mnt/... | 0 | fs/nfs/nfs4proc.c | {"sha": "43bace809be7dfb5c23c893ff3ae0d22b42efffa", "filename": "fs/nfs/nfs4proc.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/18e3b739fdc826481c6a1335ce0c5b19b3d415da/fs/nfs/nfs4proc.c", "raw_url": "https://github.com/torvalds/linux/raw/18e3... | nfs4_init_nonuniform_client_string(struct nfs_client *clp)
{
int result;
size_t len;
char *str;
bool retried = false;
if (clp->cl_owner_id != NULL)
return 0;
retry:
rcu_read_lock();
len = 10 + strlen(clp->cl_ipaddr) + 1 +
strlen(rpc_peeraddr2str(clp->cl_rpcclient, RPC_DISPLAY_ADDR)) +
1 +
strlen(rpc_pee... | nfs4_init_nonuniform_client_string(struct nfs_client *clp)
{
int result;
size_t len;
char *str;
bool retried = false;
if (clp->cl_owner_id != NULL)
return 0;
retry:
rcu_read_lock();
len = 10 + strlen(clp->cl_ipaddr) + 1 +
strlen(rpc_peeraddr2str(clp->cl_rpcclient, RPC_DISPLAY_ADDR)) +
1 +
strlen(rpc_pee... | C | null | null | null | @@ -8661,6 +8661,7 @@ static const struct nfs4_minor_version_ops nfs_v4_2_minor_ops = {
.reboot_recovery_ops = &nfs41_reboot_recovery_ops,
.nograce_recovery_ops = &nfs41_nograce_recovery_ops,
.state_renewal_ops = &nfs41_state_renewal_ops,
+ .mig_recovery_ops = &nfs41_mig_recovery_ops,
};
#endif
| linux | 18e3b739fdc826481c6a1335ce0c5b19b3d415da | 0847ef88c3c9318d85e92fc42369df0e0190e1ab | 0 | nfs4_init_nonuniform_client_string(struct nfs_client *clp)
{
int result;
size_t len;
char *str;
bool retried = false;
if (clp->cl_owner_id != NULL)
return 0;
retry:
rcu_read_lock();
len = 10 + strlen(clp->cl_ipaddr) + 1 +
strlen(rpc_peeraddr2str(clp->cl_rpcclient, RPC_DISPLAY_ADDR)) +
1 +
strlen(rpc_pee... |
120,523 | null | Remote | Not required | Partial | CVE-2013-2884 | https://www.cvedetails.com/cve/CVE-2013-2884/ | CWE-399 | Low | Partial | Partial | null | 2013-07-31 | 7.5 | Use-after-free vulnerability in the DOM implementation in Google Chrome before 28.0.1500.95 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper tracking of which document owns an Attr object. | 2017-09-18 | DoS | 0 | https://github.com/chromium/chromium/commit/4ac8bc08e3306f38a5ab3e551aef6ad43753579c | 4ac8bc08e3306f38a5ab3e551aef6ad43753579c | Set Attr.ownerDocument in Element#setAttributeNode()
Attr objects can move across documents by setAttributeNode().
So It needs to reset ownerDocument through TreeScopeAdoptr::adoptIfNeeded().
BUG=248950
TEST=set-attribute-node-from-iframe.html
Review URL: https://chromiumcodereview.appspot.com/17583003
git-svn-id: ... | 0 | third_party/WebKit/Source/core/dom/Element.cpp | {"sha": "accc3ae56534fa3669de3bbb2543911df0a20ebd", "filename": "third_party/WebKit/LayoutTests/fast/dom/Attr/set-attribute-node-from-iframe-expected.txt", "status": "added", "additions": 12, "deletions": 0, "changes": 12, "blob_url": "https://github.com/chromium/chromium/blob/4ac8bc08e3306f38a5ab3e551aef6ad43753579c/t... | size_t ElementData::getAttrIndex(Attr* attr) const
{
for (unsigned i = 0; i < length(); ++i) {
if (attributeItem(i)->name() == attr->qualifiedName())
return i;
}
return notFound;
}
| size_t ElementData::getAttrIndex(Attr* attr) const
{
for (unsigned i = 0; i < length(); ++i) {
if (attributeItem(i)->name() == attr->qualifiedName())
return i;
}
return notFound;
}
| C | null | null | null | @@ -1809,6 +1809,7 @@ PassRefPtr<Attr> Element::setAttributeNode(Attr* attrNode, ExceptionCode& ec)
setAttributeInternal(index, attrNode->qualifiedName(), attrNode->value(), NotInSynchronizationOfLazyAttribute);
attrNode->attachToElement(this);
+ treeScope()->adoptIfNeeded(attrNode);
ensureAttrNodeL... | Chrome | 4ac8bc08e3306f38a5ab3e551aef6ad43753579c | a8ece285c70c60709aa8e33a9d4b58bb88401301 | 0 | size_t ElementData::getAttrIndex(Attr* attr) const
{
// This relies on the fact that Attr's QualifiedName == the Attribute's name.
for (unsigned i = 0; i < length(); ++i) {
if (attributeItem(i)->name() == attr->qualifiedName())
return i;
}
return notFound;
}
|
70,588 | null | Remote | Not required | Partial | CVE-2016-10197 | https://www.cvedetails.com/cve/CVE-2016-10197/ | CWE-125 | Low | null | null | null | 2017-03-15 | 5 | The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname. | 2018-01-04 | DoS | 0 | https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e | ec65c42052d95d2c23d1d837136d1cf1d9ecef9e | evdns: fix searching empty hostnames
From #332:
Here follows a bug report by **Guido Vranken** via the _Tor bug bounty program_. Please credit Guido accordingly.
## Bug report
The DNS code of Libevent contains this rather obvious OOB read:
```c
static char *
search_make_new(const struct search_state *co... | 0 | evdns.c | {"sha": "e9dbc35c60662ccda395d21d95997193840b4b57", "filename": "evdns.c", "status": "modified", "additions": 4, "deletions": 1, "changes": 5, "blob_url": "https://github.com/libevent/libevent/blob/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e/evdns.c", "raw_url": "https://github.com/libevent/libevent/raw/ec65c42052d95d2c23... | evdns_base_resolv_conf_parse(struct evdns_base *base, int flags, const char *const filename) {
int res;
EVDNS_LOCK(base);
res = evdns_base_resolv_conf_parse_impl(base, flags, filename);
EVDNS_UNLOCK(base);
return res;
}
| evdns_base_resolv_conf_parse(struct evdns_base *base, int flags, const char *const filename) {
int res;
EVDNS_LOCK(base);
res = evdns_base_resolv_conf_parse_impl(base, flags, filename);
EVDNS_UNLOCK(base);
return res;
}
| C | null | null | null | @@ -3175,9 +3175,12 @@ search_set_from_hostname(struct evdns_base *base) {
static char *
search_make_new(const struct search_state *const state, int n, const char *const base_name) {
const size_t base_len = strlen(base_name);
- const char need_to_append_dot = base_name[base_len - 1] == '.' ? 0 : 1;
+ char need_to_a... | libevent | ec65c42052d95d2c23d1d837136d1cf1d9ecef9e | d7348bab602cf4dbdf65b9eeba2fb9ce4646bc0b | 0 | evdns_base_resolv_conf_parse(struct evdns_base *base, int flags, const char *const filename) {
int res;
EVDNS_LOCK(base);
res = evdns_base_resolv_conf_parse_impl(base, flags, filename);
EVDNS_UNLOCK(base);
return res;
}
|
67,022 | null | Remote | Not required | Partial | CVE-2017-7865 | https://www.cvedetails.com/cve/CVE-2017-7865/ | CWE-787 | Low | Partial | Partial | null | 2017-04-14 | 7.5 | FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c. | 2017-04-20 | Overflow | 0 | https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb | 2080bc33717955a0e4268e738acf8c1eeddbf8cb | avcodec/utils: correct align value for interplay
Fixes out of array access
Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | libavcodec/utils.c | {"sha": "4ae752ff2ffad74045545b8e4ac3d4c28eec5834", "filename": "libavcodec/utils.c", "status": "modified", "additions": 6, "deletions": 1, "changes": 7, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/2080bc33717955a0e4268e738acf8c1eeddbf8cb/libavcodec/utils.c", "raw_url": "https://github.com/FFmpeg/FFmpeg/raw/2080... | int ff_decode_frame_props(AVCodecContext *avctx, AVFrame *frame)
{
return ff_init_buffer_info(avctx, frame);
}
| int ff_decode_frame_props(AVCodecContext *avctx, AVFrame *frame)
{
return ff_init_buffer_info(avctx, frame);
}
| C | null | null | null | @@ -376,6 +376,10 @@ void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,
w_align = 4;
h_align = 4;
}
+ if (s->codec_id == AV_CODEC_ID_INTERPLAY_VIDEO) {
+ w_align = 8;
+ h_align = 8;
+ }
break;
case AV_PIX_FMT_PA... | FFmpeg | 2080bc33717955a0e4268e738acf8c1eeddbf8cb | 0b607228bf7260a13404ef98bf87bafeaeecbfa8 | 0 | int ff_decode_frame_props(AVCodecContext *avctx, AVFrame *frame)
{
return ff_init_buffer_info(avctx, frame);
}
|
115,993 | null | Remote | Not required | Partial | CVE-2011-3104 | https://www.cvedetails.com/cve/CVE-2011-3104/ | CWE-119 | Low | null | null | null | 2012-05-24 | 5 | Skia, as used in Google Chrome before 19.0.1084.52, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | 2017-09-18 | DoS Overflow | 0 | https://github.com/chromium/chromium/commit/6b5f83842b5edb5d4bd6684b196b3630c6769731 | 6b5f83842b5edb5d4bd6684b196b3630c6769731 | [i18n-fixlet] Make strings branding specific in extension code.
IDS_EXTENSIONS_UNINSTALL
IDS_EXTENSIONS_INCOGNITO_WARNING
IDS_EXTENSION_INSTALLED_HEADING
IDS_EXTENSION_ALERT_ITEM_EXTERNAL And fix a $1 $1 bug.
IDS_EXTENSION_INLINE_INSTALL_PROMPT_TITLE
BUG=NONE
TEST=NONE
Review URL: http://codereview.chromium.org/910... | 0 | chrome/browser/extensions/extension_global_error.cc | {"sha": "17b94b5b0bab3a87c084c439a04d43039f47cd62", "filename": "chrome/app/chromium_strings.grd", "status": "modified", "additions": 24, "deletions": 0, "changes": 24, "blob_url": "https://github.com/chromium/chromium/blob/6b5f83842b5edb5d4bd6684b196b3630c6769731/chrome/app/chromium_strings.grd", "raw_url": "https://g... | void ExtensionGlobalError::BubbleViewAcceptButtonPressed() {
if (!accept_callback_.is_null()) {
accept_callback_.Run(*this, current_browser_);
}
}
| void ExtensionGlobalError::BubbleViewAcceptButtonPressed() {
if (!accept_callback_.is_null()) {
accept_callback_.Run(*this, current_browser_);
}
}
| C | null | null | null | @@ -1,4 +1,4 @@
-// Copyright (c) 2011 The Chromium Authors. All rights reserved.
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
@@ -98,10 +98,8 @@ string16 ExtensionGlobalError::GenerateMessag... | Chrome | 6b5f83842b5edb5d4bd6684b196b3630c6769731 | 2a7d8183360056520958b908ebec80948b83f2d1 | 0 | void ExtensionGlobalError::BubbleViewAcceptButtonPressed() {
if (!accept_callback_.is_null()) {
accept_callback_.Run(*this, current_browser_);
}
}
|
15,200 | null | Remote | Not required | null | CVE-2015-3412 | https://www.cvedetails.com/cve/CVE-2015-3412/ | CWE-254 | Low | Partial | null | null | 2016-05-16 | 5 | PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filena... | 2019-04-22 | Bypass | 0 | https://git.php.net/?p=php-src.git;a=commit;h=4435b9142ff9813845d5c97ab29a5d637bedb257 | 4435b9142ff9813845d5c97ab29a5d637bedb257 | null | 0 | null | null | static void php_image_filter_gaussian_blur(INTERNAL_FUNCTION_PARAMETERS)
{
PHP_GD_SINGLE_RES
if (gdImageGaussianBlur(im_src) == 1) {
RETURN_TRUE;
}
RETURN_FALSE;
}
| static void php_image_filter_gaussian_blur(INTERNAL_FUNCTION_PARAMETERS)
{
PHP_GD_SINGLE_RES
if (gdImageGaussianBlur(im_src) == 1) {
RETURN_TRUE;
}
RETURN_FALSE;
}
| C | null | null | 9faaee66fa493372c7340b1ab05f8fd115131a42 | @@ -1495,7 +1495,7 @@ PHP_FUNCTION(imageloadfont)
gdFontPtr font;
php_stream *stream;
- if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", &file, &file_name) == FAILURE) {
+ if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "p", &file, &file_name) == FAILURE) {
re... | php | https://git.php.net/?p=php-src.git;a=blob;f=ext/gd/gd.c;h=d258c3dbc7862534762d3640688f1b980c031459;hb=4435b9142ff9813845d5c97ab29a5d637bedb257 | https://git.php.net/?p=php-src.git;a=blob;f=ext/gd/gd.c;h=e5657f7424ab30c8f3ca7ec73e9201375d1fab39 | 0 | static void php_image_filter_gaussian_blur(INTERNAL_FUNCTION_PARAMETERS)
{
PHP_GD_SINGLE_RES
if (gdImageGaussianBlur(im_src) == 1) {
RETURN_TRUE;
}
RETURN_FALSE;
}
|
64,630 | null | Local | Not required | Complete | CVE-2017-9242 | https://www.cvedetails.com/cve/CVE-2017-9242/ | CWE-20 | Low | null | null | null | 2017-05-26 | 4.9 | The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls. | 2018-01-04 | DoS | 0 | https://github.com/torvalds/linux/commit/232cd35d0804cc241eb887bb8d4d9b3b9881c64a | 232cd35d0804cc241eb887bb8d4d9b3b9881c64a | ipv6: fix out of bound writes in __ip6_append_data()
Andrey Konovalov and idaifish@gmail.com reported crashes caused by
one skb shared_info being overwritten from __ip6_append_data()
Andrey program lead to following state :
copy -4200 datalen 2000 fraglen 2040
maxfraglen 2040 alloclen 2048 transhdrlen 0 offset 0 fra... | 0 | net/ipv6/ip6_output.c | {"sha": "bf8a58a1c32d83a9605844075da5815be23a6bf1", "filename": "net/ipv6/ip6_output.c", "status": "modified", "additions": 8, "deletions": 7, "changes": 15, "blob_url": "https://github.com/torvalds/linux/blob/232cd35d0804cc241eb887bb8d4d9b3b9881c64a/net/ipv6/ip6_output.c", "raw_url": "https://github.com/torvalds/linux... | static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
struct dst_entry **dst, struct flowi6 *fl6)
{
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
struct neighbour *n;
struct rt6_info *rt;
#endif
int err;
int flags = 0;
/* The correct way to handle this would be to do
* ip6_route_get_saddr, and th... | static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
struct dst_entry **dst, struct flowi6 *fl6)
{
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
struct neighbour *n;
struct rt6_info *rt;
#endif
int err;
int flags = 0;
/* The correct way to handle this would be to do
* ip6_route_get_saddr, and th... | C | null | null | null | @@ -1466,6 +1466,11 @@ static int __ip6_append_data(struct sock *sk,
*/
alloclen += sizeof(struct frag_hdr);
+ copy = datalen - transhdrlen - fraggap;
+ if (copy < 0) {
+ err = -EINVAL;
+ goto error;
+ }
if (transhdrlen) {
skb = sock_alloc_send_skb(sk,
alloclen + hh_len,
@@ -1515,... | linux | 232cd35d0804cc241eb887bb8d4d9b3b9881c64a | 6d18c732b95c0a9d35e9f978b4438bba15412284 | 0 | static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
struct dst_entry **dst, struct flowi6 *fl6)
{
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
struct neighbour *n;
struct rt6_info *rt;
#endif
int err;
int flags = 0;
/* The correct way to handle this would be to do
* ip6_route_get_saddr, and th... |
30,004 | null | Local | Not required | Complete | CVE-2013-4129 | https://www.cvedetails.com/cve/CVE-2013-4129/ | CWE-20 | Medium | null | null | null | 2013-07-29 | 4.7 | The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to ne... | 2017-08-28 | DoS | 0 | https://github.com/torvalds/linux/commit/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1 | c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1 | bridge: fix some kernel warning in multicast timer
Several people reported the warning: "kernel BUG at kernel/timer.c:729!"
and the stack trace is:
#7 [ffff880214d25c10] mod_timer+501 at ffffffff8106d905
#8 [ffff880214d25c50] br_multicast_del_pg.isra.20+261 at ffffffffa0731d25 [bridge]
#9 [ffff880214d25c80] br_mul... | 0 | net/bridge/br_multicast.c | {"sha": "0daae3ec2355543bce3600001db5fd32cf6d6ff7", "filename": "net/bridge/br_mdb.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1/net/bridge/br_mdb.c", "raw_url": "https://github.com/torvalds/linux/raw/... | static struct net_bridge_mdb_entry *br_mdb_ip6_get(
struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
__u16 vid)
{
struct br_ip br_dst;
br_dst.u.ip6 = *dst;
br_dst.proto = htons(ETH_P_IPV6);
br_dst.vid = vid;
return br_mdb_ip_get(mdb, &br_dst);
}
| static struct net_bridge_mdb_entry *br_mdb_ip6_get(
struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
__u16 vid)
{
struct br_ip br_dst;
br_dst.u.ip6 = *dst;
br_dst.proto = htons(ETH_P_IPV6);
br_dst.vid = vid;
return br_mdb_ip_get(mdb, &br_dst);
}
| C | null | null | null | @@ -270,7 +270,7 @@ static void br_multicast_del_pg(struct net_bridge *br,
del_timer(&p->timer);
call_rcu_bh(&p->rcu, br_multicast_free_pg);
- if (!mp->ports && !mp->mglist &&
+ if (!mp->ports && !mp->mglist && mp->timer_armed &&
netif_running(br->dev))
mod_timer(&mp->timer, jiffies);
| linux | c7e8e8a8f7a70b343ca1e0f90a31e35ab2d16de1 | 734d4e159b283a4ae4d007b7e7a91d84398ccb92 | 0 | static struct net_bridge_mdb_entry *br_mdb_ip6_get(
struct net_bridge_mdb_htable *mdb, const struct in6_addr *dst,
__u16 vid)
{
struct br_ip br_dst;
br_dst.u.ip6 = *dst;
br_dst.proto = htons(ETH_P_IPV6);
br_dst.vid = vid;
return br_mdb_ip_get(mdb, &br_dst);
}
|
50,231 | null | Remote | Not required | Partial | CVE-2016-7124 | https://www.cvedetails.com/cve/CVE-2016-7124/ | CWE-502 | Low | Partial | Partial | null | 2016-09-11 | 7.5 | ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call. | 2018-01-04 | DoS | 0 | https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 | 20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 | Fix bug #72663 - destroy broken object when unserializing
(cherry picked from commit 448c9be157f4147e121f1a2a524536c75c9c6059) | 0 | ext/standard/var_unserializer.c | {"sha": "e61f939d4dbef881c33b8eb6bfb809a70c479f16", "filename": "ext/standard/tests/strings/bug72663.phpt", "status": "added", "additions": 26, "deletions": 0, "changes": 26, "blob_url": "https://github.com/php/php-src/blob/20ce2fe8e3c211a42fee05a461a5881be9a8790e/ext/standard/tests/strings/bug72663.phpt", "raw_url": "... | static zend_always_inline int process_nested_data(UNSERIALIZE_PARAMETER, HashTable *ht, zend_long elements, int objprops)
{
while (elements-- > 0) {
zval key, *data, d, *old_data;
zend_ulong idx;
ZVAL_UNDEF(&key);
if (!php_var_unserialize_internal(&key, p, max, NULL, classes)) {
zval_dtor(&key);
return... | static zend_always_inline int process_nested_data(UNSERIALIZE_PARAMETER, HashTable *ht, zend_long elements, int objprops)
{
while (elements-- > 0) {
zval key, *data, d, *old_data;
zend_ulong idx;
ZVAL_UNDEF(&key);
if (!php_var_unserialize_internal(&key, p, max, NULL, classes)) {
zval_dtor(&key);
return... | C | null | null | null | @@ -1,4 +1,4 @@
-/* Generated by re2c 0.13.5 */
+/* Generated by re2c 0.13.7.5 */
#line 1 "ext/standard/var_unserializer.re"
/*
+----------------------------------------------------------------------+
@@ -687,7 +687,8 @@ static int php_var_unserialize_internal(UNSERIALIZE_PARAMETER)
if (yybm[0+yych] & 128) {
... | php-src | 20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 | 8d7766a948999b990dbd13f96fa845a26d6f8f66 | 0 | static zend_always_inline int process_nested_data(UNSERIALIZE_PARAMETER, HashTable *ht, zend_long elements, int objprops)
{
while (elements-- > 0) {
zval key, *data, d, *old_data;
zend_ulong idx;
ZVAL_UNDEF(&key);
if (!php_var_unserialize_internal(&key, p, max, NULL, classes)) {
zval_dtor(&key);
return... |
176,709 | null | Remote | Not required | Complete | CVE-2015-3835 | https://www.cvedetails.com/cve/CVE-2015-3835/ | CWE-119 | Medium | Complete | Complete | null | 2015-09-30 | 9.3 | Buffer overflow in the OMXNodeInstance::emptyBuffer function in omx/OMXNodeInstance.cpp in libstagefright in Android before 5.1.1 LMY48I allows attackers to execute arbitrary code via a crafted application, aka internal bug 20634516. | 2015-10-01 | Exec Code Overflow | 0 | https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab | 086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab | IOMX: Add buffer range check to emptyBuffer
Bug: 20634516
Change-Id: If351dbd573bb4aeb6968bfa33f6d407225bc752c
(cherry picked from commit d971df0eb300356b3c995d533289216f43aa60de)
| 0 | media/libstagefright/omx/OMXNodeInstance.cpp | {"filename": "media/libstagefright/omx/OMXNodeInstance.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab/media/libstagefright/omx/OMXNodeInstance.cpp", "patch": "@@ -980,6 +980,12 @@\n\n Mutex::Autolock autoLock(mLock);\n \n OMX_BUFFERHEADERTYPE... | OMX_BUFFERHEADERTYPE *OMXNodeInstance::findBufferHeader(OMX::buffer_id buffer) {
return (OMX_BUFFERHEADERTYPE *)buffer;
}
| OMX_BUFFERHEADERTYPE *OMXNodeInstance::findBufferHeader(OMX::buffer_id buffer) {
return (OMX_BUFFERHEADERTYPE *)buffer;
}
| C | null | null | null | @@ -980,6 +980,12 @@
Mutex::Autolock autoLock(mLock);
OMX_BUFFERHEADERTYPE *header = findBufferHeader(buffer);
+ // rangeLength and rangeOffset must be a subset of the allocated data in the buffer.
+ // corner case: we permit rangeOffset == end-of-buffer with rangeLength == 0.
+ if (rangeOffset > ... | Android | https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab/ | https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab%5E/ | 0 | OMX_BUFFERHEADERTYPE *OMXNodeInstance::findBufferHeader(OMX::buffer_id buffer) {
return (OMX_BUFFERHEADERTYPE *)buffer;
}
|
9,804 | null | Remote | Not required | Partial | CVE-2014-6269 | https://www.cvedetails.com/cve/CVE-2014-6269/ | CWE-189 | Low | null | null | null | 2014-09-30 | 5 | Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read. | 2014-10-02 | DoS Overflow | 0 | https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c | b4d05093bc89f71377230228007e69a1434c1a0c | null | 0 | null | null | int http_process_tarpit(struct session *s, struct channel *req, int an_bit)
{
struct http_txn *txn = &s->txn;
/* This connection is being tarpitted. The CLIENT side has
* already set the connect expiration date to the right
* timeout. We just have to check that the client is still
* there and that the timeout ... | int http_process_tarpit(struct session *s, struct channel *req, int an_bit)
{
struct http_txn *txn = &s->txn;
/* This connection is being tarpitted. The CLIENT side has
* already set the connect expiration date to the right
* timeout. We just have to check that the client is still
* there and that the timeout ... | C | null | null | 2c8d700e8af297a813db1eaae5d45b7b07ac72b6 | @@ -4886,8 +4886,8 @@ void http_end_txn_clean_session(struct session *s)
s->req->cons->conn_retries = 0; /* used for logging too */
s->req->cons->exp = TICK_ETERNITY;
s->req->cons->flags &= SI_FL_DONT_WAKE; /* we're in the context of process_session */
- s->req->flags &= ~(CF_SHU... | haproxy | https://git.haproxy.org/?p=haproxy-1.5.git;a=blob;f=src/proto_http.c;h=4d27b2c89db01df9e7f9f50932cd66267cdbf232;hb=b4d05093bc89f71377230228007e69a1434c1a0c | https://git.haproxy.org/?p=haproxy-1.5.git;a=blob;f=src/proto_http.c;h=a47f0a1e35e4b6d10e4f1672c7a397f0e50a1454 | 0 | int http_process_tarpit(struct session *s, struct channel *req, int an_bit)
{
struct http_txn *txn = &s->txn;
/* This connection is being tarpitted. The CLIENT side has
* already set the connect expiration date to the right
* timeout. We just have to check that the client is still
* there and that the timeout ... |
161,685 | null | Remote | Not required | Partial | CVE-2018-6061 | https://www.cvedetails.com/cve/CVE-2018-6061/ | CWE-362 | High | Partial | Partial | null | 2018-11-14 | 5.1 | A race in the handling of SharedArrayBuffers in WebAssembly in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2018-12-19 | null | 0 | https://github.com/chromium/chromium/commit/70340ce072cee8a0bdcddb5f312d32567b2269f6 | 70340ce072cee8a0bdcddb5f312d32567b2269f6 | vaapi vda: Delete owned objects on worker thread in Cleanup()
This CL adds a SEQUENCE_CHECKER to Vaapi*Accelerator classes, and
posts the destruction of those objects to the appropriate thread on
Cleanup().
Also makes {H264,VP8,VP9}Picture RefCountedThreadSafe, see miu@
comment in
https://chromium-review.googlesource... | 0 | media/gpu/vaapi/vaapi_video_decode_accelerator.cc | {"sha": "3841842656ff84683b319eea25079943ddb17857", "filename": "media/gpu/h264_dpb.h", "status": "modified", "additions": 3, "deletions": 2, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/70340ce072cee8a0bdcddb5f312d32567b2269f6/media/gpu/h264_dpb.h", "raw_url": "https://github.com/chromium/chrom... | bool IsFlushRequest() const { return shm_ == nullptr; }
| bool IsFlushRequest() const { return shm_ == nullptr; }
| C | null | null | null | @@ -171,6 +171,8 @@ class VaapiVideoDecodeAccelerator::VaapiH264Accelerator
VaapiWrapper* vaapi_wrapper_;
VaapiVideoDecodeAccelerator* vaapi_dec_;
+ SEQUENCE_CHECKER(sequence_checker_);
+
DISALLOW_COPY_AND_ASSIGN(VaapiH264Accelerator);
};
@@ -218,6 +220,8 @@ class VaapiVideoDecodeAccelerator::VaapiVP8Acc... | Chrome | 70340ce072cee8a0bdcddb5f312d32567b2269f6 | 56e11d791c805e69a79704748a040c2959d88293 | 0 | bool IsFlushRequest() const { return shm_ == nullptr; }
|
161,418 | null | Remote | Not required | Partial | CVE-2018-6111 | https://www.cvedetails.com/cve/CVE-2018-6111/ | CWE-20 | Medium | Partial | Partial | null | 2019-01-09 | 6.8 | An object lifetime issue in the developer tools network handler in Google Chrome prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via a crafted HTML page. | 2019-01-16 | Exec Code | 0 | https://github.com/chromium/chromium/commit/3c8e4852477d5b1e2da877808c998dc57db9460f | 3c8e4852477d5b1e2da877808c998dc57db9460f | DevTools: speculative fix for crash in NetworkHandler::Disable
This keeps BrowserContext* and StoragePartition* instead of
RenderProcessHost* in an attemp to resolve UAF of RenderProcessHost
upon closure of DevTools front-end.
Bug: 801117, 783067, 780694
Change-Id: I6c2cca60cc0c29f0949d189cf918769059f80c1b
Reviewed-o... | 0 | content/browser/devtools/protocol/service_worker_handler.cc | {"sha": "cf6e07122f5c16c19622890fd41cfaad4c597247", "filename": "content/browser/devtools/devtools_session.cc", "status": "modified", "additions": 9, "deletions": 7, "changes": 16, "blob_url": "https://github.com/chromium/chromium/blob/3c8e4852477d5b1e2da877808c998dc57db9460f/content/browser/devtools/devtools_session.c... | void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {}
| void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {}
| C | null | null | null | @@ -49,8 +49,6 @@ void StatusNoOpKeepingRegistration(
ServiceWorkerStatusCode status) {
}
-void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {}
-
const std::string GetVersionRunningStatusString(
EmbeddedWorkerStatus running_status) {
switch (running_status) {
@@ -158,7 +156,8 @@ void DispatchSync... | Chrome | 3c8e4852477d5b1e2da877808c998dc57db9460f | 488e9ef26e7e265f627b3db349ad4440b4575e93 | 0 | void PushDeliveryNoOp(mojom::PushDeliveryStatus status) {}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.