Search is not available for this dataset
Unnamed: 0
int64
3
189k
Access Gained
stringclasses
2 values
Attack Origin
stringclasses
4 values
Authentication Required
stringclasses
3 values
Availability
stringclasses
3 values
CVE ID
stringlengths
13
43
CVE Page
stringlengths
45
48
CWE ID
stringclasses
90 values
Complexity
stringclasses
4 values
Confidentiality
stringclasses
3 values
Integrity
stringclasses
3 values
Known Exploits
float64
Publish Date
stringclasses
911 values
Score
float64
0
10
Summary
stringlengths
60
1.32k
Update Date
stringclasses
671 values
Vulnerability Classification
stringclasses
75 values
add_lines
int64
0
382
codeLink
stringlengths
46
139
commit_id
stringlengths
6
81
commit_message
stringlengths
3
13.3k
del_lines
int64
0
459
file_name
stringlengths
4
100
files_changed
stringlengths
345
13.9M
func_after
stringlengths
14
235k
func_before
stringlengths
14
234k
lang
stringclasses
3 values
lines_after
stringlengths
1
10k
lines_before
stringlengths
2
10.2k
parentID
stringclasses
626 values
patch
stringlengths
101
359k
project
stringclasses
305 values
project_after
stringlengths
6
200
project_before
stringlengths
40
200
vul
int64
0
1
vul_func_with_fix
stringlengths
14
235k
131,311
null
Remote
Not required
Partial
CVE-2014-1713
https://www.cvedetails.com/cve/CVE-2014-1713/
CWE-399
Low
Partial
Partial
null
2014-03-16
7.5
Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact ...
2017-01-06
DoS
0
https://github.com/chromium/chromium/commit/f85a87ec670ad0fce9d98d90c9a705b72a288154
f85a87ec670ad0fce9d98d90c9a705b72a288154
document.location bindings fix BUG=352374 R=jochen@chromium.org Review URL: https://codereview.chromium.org/196343011 git-svn-id: svn://svn.chromium.org/blink/trunk@169176 bbb929c8-8fbe-4397-9dbb-9b2b20218538
0
third_party/WebKit/Source/bindings/tests/results/V8TestObjectPython.cpp
{"sha": "b82e2fe8129793c21901e96095ad155dd4dbb51e", "filename": "third_party/WebKit/Source/bindings/templates/attributes.cpp", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f85a87ec670ad0fce9d98d90c9a705b72a288154/third_party/WebKit/Source/bin...
static void customElementsCallbacksReadonlyLongAttributeAttributeGetter(const v8::PropertyCallbackInfo<v8::Value>& info) { TestObjectPython* imp = V8TestObjectPython::toNative(info.Holder()); v8SetReturnValueInt(info, imp->customElementsCallbacksReadonlyLongAttribute()); }
static void customElementsCallbacksReadonlyLongAttributeAttributeGetter(const v8::PropertyCallbackInfo<v8::Value>& info) { TestObjectPython* imp = V8TestObjectPython::toNative(info.Holder()); v8SetReturnValueInt(info, imp->customElementsCallbacksReadonlyLongAttribute()); }
C
null
null
null
@@ -2525,7 +2525,7 @@ static void locationAttributeGetterCallback(v8::Local<v8::String>, const v8::Pro static void locationAttributeSetter(v8::Local<v8::Value> jsValue, const v8::PropertyCallbackInfo<void>& info) { TestObjectPython* proxyImp = V8TestObjectPython::toNative(info.Holder()); - TestNode* imp = WTF...
Chrome
f85a87ec670ad0fce9d98d90c9a705b72a288154
2c217b1d3f3f95e579481976d73e07ab4c77752c
0
static void customElementsCallbacksReadonlyLongAttributeAttributeGetter(const v8::PropertyCallbackInfo<v8::Value>& info) { TestObjectPython* imp = V8TestObjectPython::toNative(info.Holder()); v8SetReturnValueInt(info, imp->customElementsCallbacksReadonlyLongAttribute()); }
45,655
null
Local
Not required
null
CVE-2014-9644
https://www.cvedetails.com/cve/CVE-2014-9644/
CWE-264
Low
null
Partial
null
2015-03-02
2.1
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-2013-7421.
2018-01-04
null
0
https://github.com/torvalds/linux/commit/4943ba16bbc2db05115707b3ff7b4874e9e3c560
4943ba16bbc2db05115707b3ff7b4874e9e3c560
crypto: include crypto- module prefix in template This adds the module loading prefix "crypto-" to the template lookup as well. For example, attempting to load 'vfat(blowfish)' via AF_ALG now correctly includes the "crypto-" prefix at every level, correctly rejecting "vfat": net-pf-38 algif-hash crypto-vfat(blowf...
0
crypto/cryptd.c
{"sha": "f368ba261739fa09be28bc02fe34cf3112099fa8", "filename": "arch/x86/crypto/fpu.c", "status": "modified", "additions": 3, "deletions": 0, "changes": 3, "blob_url": "https://github.com/torvalds/linux/blob/4943ba16bbc2db05115707b3ff7b4874e9e3c560/arch/x86/crypto/fpu.c", "raw_url": "https://github.com/torvalds/linux/...
void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm) { crypto_free_ablkcipher(&tfm->base); }
void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm) { crypto_free_ablkcipher(&tfm->base); }
C
null
null
null
@@ -955,3 +955,4 @@ module_exit(cryptd_exit); MODULE_LICENSE("GPL"); MODULE_DESCRIPTION("Software async crypto daemon"); +MODULE_ALIAS_CRYPTO("cryptd");
linux
4943ba16bbc2db05115707b3ff7b4874e9e3c560
476c7fe20f30818e16339391aeeb01b29818f708
0
void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm) { crypto_free_ablkcipher(&tfm->base); }
93,994
null
Remote
Not required
Partial
CVE-2016-7398
https://www.cvedetails.com/cve/CVE-2016-7398/
CWE-704
Low
Partial
Partial
null
2019-09-06
7.5
A type confusion vulnerability in the merge_param() function of php_http_params.c in PHP's pecl-http extension 3.1.0beta2 (PHP 7) and earlier as well as 2.6.0beta2 (PHP 5) and earlier allows attackers to crash PHP and possibly execute arbitrary code via crafted HTTP requests.
2019-09-20
Exec Code
0
https://github.com/m6w6/ext-http/commit/17137d4ab1ce81a2cee0fae842340a344ef3da83
17137d4ab1ce81a2cee0fae842340a344ef3da83
fix bug #73055
0
src/php_http_params.c
{"sha": "45ac1a5f203ae766bd3662ce1fe7a59e677ceb02", "filename": ".gitignore", "status": "modified", "additions": 33, "deletions": 0, "changes": 33, "blob_url": "https://github.com/m6w6/ext-http/blob/17137d4ab1ce81a2cee0fae842340a344ef3da83/.gitignore", "raw_url": "https://github.com/m6w6/ext-http/raw/17137d4ab1ce81a2ce...
static inline void prepare_escaped(zval *zv TSRMLS_DC) { if (Z_TYPE_P(zv) == IS_STRING) { quote_string(zv, 0 TSRMLS_CC); } else { zval_dtor(zv); ZVAL_EMPTY_STRING(zv); } }
static inline void prepare_escaped(zval *zv TSRMLS_DC) { if (Z_TYPE_P(zv) == IS_STRING) { quote_string(zv, 0 TSRMLS_CC); } else { zval_dtor(zv); ZVAL_EMPTY_STRING(zv); } }
C
null
null
null
@@ -470,7 +470,7 @@ static void merge_param(HashTable *params, zval *zdata, zval ***current_param, z while (Z_TYPE_PP(zdata_ptr) == IS_ARRAY && SUCCESS == zend_hash_get_current_data(Z_ARRVAL_PP(zdata_ptr), (void *) &test_ptr) ) { - if (Z_TYPE_PP(test_ptr) == IS_ARRAY) { + if (Z_TYPE_PP(test_ptr) == IS...
ext-http
17137d4ab1ce81a2cee0fae842340a344ef3da83
3c7b514d38d844b855d430fcbaed6dea67c9c17b
0
static inline void prepare_escaped(zval *zv TSRMLS_DC) { if (Z_TYPE_P(zv) == IS_STRING) { quote_string(zv, 0 TSRMLS_CC); } else { zval_dtor(zv); ZVAL_EMPTY_STRING(zv); } }
118,699
null
Remote
Not required
Partial
CVE-2013-6624
https://www.cvedetails.com/cve/CVE-2013-6624/
CWE-399
Low
Partial
Partial
null
2013-11-13
7.5
Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.
2017-09-18
DoS
0
https://github.com/chromium/chromium/commit/36773850210becda3d76f27285ecd899fafdfc72
36773850210becda3d76f27285ecd899fafdfc72
Fix tracking of the id attribute string if it is shared across elements. The patch to remove AtomicStringImpl: http://src.chromium.org/viewvc/blink?view=rev&rev=154790 Exposed a lifetime issue with strings for id attributes. We simply need to use AtomicString. BUG=290566 Review URL: https://codereview.chromium.org/...
0
third_party/WebKit/Source/bindings/v8/V8WindowShell.cpp
{"sha": "7ef22e9a431ad0272713b71fdc8794016c8ef12f", "filename": "third_party/WebKit/LayoutTests/fast/dom/id-attribute-shared-expected.txt", "status": "added", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/36773850210becda3d76f27285ecd899fafdfc72/third_party/WebKit/...
void V8WindowShell::updateDocumentWrapper(v8::Handle<v8::Object> wrapper) { ASSERT(m_world->isMainWorld()); m_document.set(m_isolate, wrapper); }
void V8WindowShell::updateDocumentWrapper(v8::Handle<v8::Object> wrapper) { ASSERT(m_world->isMainWorld()); m_document.set(m_isolate, wrapper); }
C
null
null
null
@@ -429,7 +429,7 @@ void V8WindowShell::updateDocument() static v8::Handle<v8::Value> getNamedProperty(HTMLDocument* htmlDocument, const AtomicString& key, v8::Handle<v8::Object> creationContext, v8::Isolate* isolate) { - if (!htmlDocument->hasNamedItem(key.impl()) && !htmlDocument->hasExtraNamedItem(key.impl())...
Chrome
36773850210becda3d76f27285ecd899fafdfc72
490453f684fec58ecf648a55d1c5ef2319c578c3
0
void V8WindowShell::updateDocumentWrapper(v8::Handle<v8::Object> wrapper) { ASSERT(m_world->isMainWorld()); m_document.set(m_isolate, wrapper); }
151,925
null
Remote
Not required
Partial
CVE-2017-5019
https://www.cvedetails.com/cve/CVE-2017-5019/
CWE-416
Medium
Partial
Partial
null
2017-02-17
6.8
A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2018-01-04
null
0
https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
Convert FrameHostMsg_DidAddMessageToConsole to Mojo. Note: Since this required changing the test RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually re-introduced https://crbug.com/666714 locally (the bug the test was added for), and reran the test to confirm that it still covers the bug. Bug: 786836 Ch...
0
content/browser/frame_host/render_frame_host_impl.cc
{"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render...
void RenderFrameHostImpl::DidReceiveFirstUserActivation() { delegate_->DidReceiveFirstUserActivation(this); }
void RenderFrameHostImpl::DidReceiveFirstUserActivation() { delegate_->DidReceiveFirstUserActivation(this); }
C
null
null
null
@@ -1375,8 +1375,6 @@ bool RenderFrameHostImpl::OnMessageReceived(const IPC::Message &msg) { handled = true; IPC_BEGIN_MESSAGE_MAP(RenderFrameHostImpl, msg) - IPC_MESSAGE_HANDLER(FrameHostMsg_DidAddMessageToConsole, - OnDidAddMessageToConsole) IPC_MESSAGE_HANDLER(FrameHostMsg_Deta...
Chrome
f03ea5a5c2ff26e239dfd23e263b15da2d9cee93
c246049ec1b28d1af4fe3be886ac5904e1762026
0
void RenderFrameHostImpl::DidReceiveFirstUserActivation() { delegate_->DidReceiveFirstUserActivation(this); }
87,925
null
Local
Not required
Complete
CVE-2019-15924
https://www.cvedetails.com/cve/CVE-2019-15924/
CWE-476
Low
null
null
null
2019-09-04
4.9
An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.
2019-09-14
null
0
https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
01ca667133d019edc9f0a1f70a272447c84ec41f
fm10k: Fix a potential NULL pointer dereference Syzkaller report this: kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN PTI CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),...
0
drivers/net/ethernet/intel/fm10k/fm10k_main.c
{"sha": "ecef949f3baae022d46082f4a1dc32d18cb082ec", "filename": "drivers/net/ethernet/intel/fm10k/fm10k_main.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/01ca667133d019edc9f0a1f70a272447c84ec41f/drivers/net/ethernet/intel/fm10k/fm10k_main.c"...
static void fm10k_free_q_vector(struct fm10k_intfc *interface, int v_idx) { struct fm10k_q_vector *q_vector = interface->q_vector[v_idx]; struct fm10k_ring *ring; fm10k_dbg_q_vector_exit(q_vector); fm10k_for_each_ring(ring, q_vector->tx) interface->tx_ring[ring->queue_index] = NULL; fm10k_for_each_ring(ring, ...
static void fm10k_free_q_vector(struct fm10k_intfc *interface, int v_idx) { struct fm10k_q_vector *q_vector = interface->q_vector[v_idx]; struct fm10k_ring *ring; fm10k_dbg_q_vector_exit(q_vector); fm10k_for_each_ring(ring, q_vector->tx) interface->tx_ring[ring->queue_index] = NULL; fm10k_for_each_ring(ring, ...
C
null
null
null
@@ -41,6 +41,8 @@ static int __init fm10k_init_module(void) /* create driver workqueue */ fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0, fm10k_driver_name); + if (!fm10k_workqueue) + return -ENOMEM; fm10k_dbg_init();
linux
01ca667133d019edc9f0a1f70a272447c84ec41f
f669d24f3dd00beab452c0fc9257f6a942ffca9b
0
static void fm10k_free_q_vector(struct fm10k_intfc *interface, int v_idx) { struct fm10k_q_vector *q_vector = interface->q_vector[v_idx]; struct fm10k_ring *ring; fm10k_dbg_q_vector_exit(q_vector); fm10k_for_each_ring(ring, q_vector->tx) interface->tx_ring[ring->queue_index] = NULL; fm10k_for_each_ring(ring, ...
73,653
null
Remote
Not required
Partial
CVE-2016-7513
https://www.cvedetails.com/cve/CVE-2016-7513/
CWE-189
Medium
null
null
null
2017-04-20
4.3
Off-by-one error in magick/cache.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors.
2017-05-09
DoS
0
https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723
a54fe0e8600eaf3dc6fe717d3c0398001507f723
null
0
magick/cache.c
{"sha": "369c52caff1795ac3140634ef1ee0f99e4f8836f", "filename": "magick/cache.c", "status": "modified", "additions": 2, "deletions": 25, "changes": 27, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/a54fe0e8600eaf3dc6fe717d3c0398001507f723/magick/cache.c", "raw_url": "https://github.com/ImageMagick/ImageM...
static inline MagickOffsetType ReadPixelCacheRegion( const CacheInfo *restrict cache_info,const MagickOffsetType offset, const MagickSizeType length,unsigned char *restrict buffer) { register MagickOffsetType i; ssize_t count; #if !defined(MAGICKCORE_HAVE_PREAD) if (lseek(cache_info->file,offset,SEE...
static inline MagickOffsetType ReadPixelCacheRegion( const CacheInfo *restrict cache_info,const MagickOffsetType offset, const MagickSizeType length,unsigned char *restrict buffer) { register MagickOffsetType i; ssize_t count; #if !defined(MAGICKCORE_HAVE_PREAD) if (lseek(cache_info->file,offset,SEE...
C
null
null
null
@@ -583,29 +583,6 @@ MagickExport void ClonePixelCacheMethods(Cache clone,const Cache cache) % */ -static inline void CopyPixels(PixelPacket *destination, - const PixelPacket *source,const MagickSizeType number_pixels) -{ -#if !defined(MAGICKCORE_OPENMP_SUPPORT) || (MAGICKCORE_QUANTUM_DEPTH <= 8) - (void) memcpy(...
ImageMagick
a54fe0e8600eaf3dc6fe717d3c0398001507f723
b5ec441dfe2bdb979a4cad4f315a63f49b0d7d54
0
static inline MagickOffsetType ReadPixelCacheRegion( const CacheInfo *restrict cache_info,const MagickOffsetType offset, const MagickSizeType length,unsigned char *restrict buffer) { register MagickOffsetType i; ssize_t count; #if !defined(MAGICKCORE_HAVE_PREAD) if (lseek(cache_info->file,offset,SEE...
114,606
null
Remote
Not required
Complete
CVE-2012-2816
https://www.cvedetails.com/cve/CVE-2012-2816/
null
Low
null
null
null
2012-06-27
7.8
Google Chrome before 20.0.1132.43 on Windows does not properly isolate sandboxed processes, which might allow remote attackers to cause a denial of service (process interference) via unspecified vectors.
2017-09-18
DoS
0
https://github.com/chromium/chromium/commit/cd0bd79d6ebdb72183e6f0833673464cc10b3600
cd0bd79d6ebdb72183e6f0833673464cc10b3600
Convert plugin and GPU process to brokered handle duplication. BUG=119250 Review URL: https://chromiumcodereview.appspot.com/9958034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@132303 0039d316-1c4b-4281-b951-d872f2087c98
0
content/renderer/render_thread_impl.cc
{"sha": "cbb47ddf0c9cb496b29e6a45b27d0ad8d5ffa495", "filename": "chrome/common/chrome_content_client.cc", "status": "modified", "additions": 9, "deletions": 0, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/cd0bd79d6ebdb72183e6f0833673464cc10b3600/chrome/common/chrome_content_client.cc", "raw_url"...
void RenderThreadImpl::ReleaseCachedFonts() { Send(new ChildProcessHostMsg_ReleaseCachedFonts()); }
void RenderThreadImpl::ReleaseCachedFonts() { Send(new ChildProcessHostMsg_ReleaseCachedFonts()); }
C
null
null
null
@@ -910,18 +910,15 @@ GpuChannelHost* RenderThreadImpl::EstablishGpuChannelSync( // Ask the browser for the channel name. int client_id = 0; IPC::ChannelHandle channel_handle; - base::ProcessHandle renderer_process_for_gpu; content::GPUInfo gpu_info; if (!Send(new GpuHostMsg_EstablishGpuChannel(cause_fo...
Chrome
cd0bd79d6ebdb72183e6f0833673464cc10b3600
612c5b8df2f2a72126c88765dc00ac876a2aa6ff
0
void RenderThreadImpl::ReleaseCachedFonts() { Send(new ChildProcessHostMsg_ReleaseCachedFonts()); }
177,173
null
Remote
Not required
Complete
CVE-2016-2476
https://www.cvedetails.com/cve/CVE-2016-2476/
CWE-119
Medium
Complete
Complete
null
2016-06-12
9.3
mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not validate OMX buffer sizes, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27207275.
2016-06-13
Overflow +Priv
0
https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff
295c883fe3105b19bcd0f9e07d54c6b589fc5bff
DO NOT MERGE Verify OMX buffer sizes prior to access Bug: 27207275 Change-Id: I4412825d1ee233d993af0a67708bea54304ff62d
0
media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp
{"filename": "media/libmedia/IOMX.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/media/libmedia/IOMX.cpp", "patch": "@@ -18,6 +18,8 @@\n\n #define LOG_TAG \"IOMX\"\n #include <utils/Log.h>\n \n+#include <sys/mman.h>\n+\n #include <binder/IMemory.h>\n...
void SoftVideoDecoderOMXComponent::handlePortSettingsChange( bool *portWillReset, uint32_t width, uint32_t height, CropSettingsMode cropSettingsMode, bool fakeStride) { *portWillReset = false; bool sizeChanged = (width != mWidth || height != mHeight); bool updateCrop = (cropSettingsMode == kCropUnSet); bool cropC...
void SoftVideoDecoderOMXComponent::handlePortSettingsChange( bool *portWillReset, uint32_t width, uint32_t height, CropSettingsMode cropSettingsMode, bool fakeStride) { *portWillReset = false; bool sizeChanged = (width != mWidth || height != mHeight); bool updateCrop = (cropSettingsMode == kCropUnSet); bool cropC...
C
null
null
null
@@ -264,6 +264,10 @@ OMX_VIDEO_PARAM_PORTFORMATTYPE *formatParams = (OMX_VIDEO_PARAM_PORTFORMATTYPE *)params; + if (!isValidOMXParam(formatParams)) { + return OMX_ErrorBadParameter; + } + if (formatParams->nPortIndex > kMaxPortIndex) { ...
Android
https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/
https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff%5E/
0
void SoftVideoDecoderOMXComponent::handlePortSettingsChange( bool *portWillReset, uint32_t width, uint32_t height, CropSettingsMode cropSettingsMode, bool fakeStride) { *portWillReset = false; bool sizeChanged = (width != mWidth || height != mHeight); bool updateCrop = (cropSettingsMode == kCropUnSet); bool cropC...
77,233
null
Remote
Not required
Partial
CVE-2018-17205
https://www.cvedetails.com/cve/CVE-2018-17205/
CWE-617
Low
null
null
null
2018-09-19
5
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to r...
2019-10-02
null
0
https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6
0befd1f3745055c32940f5faf9559be6a14395e6
ofproto: Fix OVS crash when reverting old flows in bundle commit During bundle commit flows which are added in bundle are applied to ofproto in-order. In case if a flow cannot be added (e.g. flow action is go-to group id which does not exist), OVS tries to revert back all previous flows which were successfully applied...
0
ofproto/ofproto.c
{"sha": "50df9dc9c099b965378d5be3e78eb49dbb509b81", "filename": "ofproto/ofproto.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/openvswitch/ovs/blob/0befd1f3745055c32940f5faf9559be6a14395e6/ofproto/ofproto.c", "raw_url": "https://github.com/openvswitch/ovs/raw/0b...
handle_barrier_request(struct ofconn *ofconn, const struct ofp_header *oh) { struct ofpbuf *buf; buf = ofpraw_alloc_reply((oh->version == OFP10_VERSION ? OFPRAW_OFPT10_BARRIER_REPLY : OFPRAW_OFPT11_BARRIER_REPLY), oh, 0); ofconn_send_reply(ofconn,...
handle_barrier_request(struct ofconn *ofconn, const struct ofp_header *oh) { struct ofpbuf *buf; buf = ofpraw_alloc_reply((oh->version == OFP10_VERSION ? OFPRAW_OFPT10_BARRIER_REPLY : OFPRAW_OFPT11_BARRIER_REPLY), oh, 0); ofconn_send_reply(ofconn,...
C
null
null
null
@@ -8465,7 +8465,7 @@ ofproto_rule_insert__(struct ofproto *ofproto, struct rule *rule) const struct rule_actions *actions = rule_get_actions(rule); /* A rule may not be reinserted. */ - ovs_assert(rule->state == RULE_INITIALIZED); + ovs_assert(rule->state != RULE_INSERTED); if (rule->hard_time...
ovs
0befd1f3745055c32940f5faf9559be6a14395e6
f9df636ef91c639cf97c6bd8e5433381ac63859b
0
handle_barrier_request(struct ofconn *ofconn, const struct ofp_header *oh) { struct ofpbuf *buf; buf = ofpraw_alloc_reply((oh->version == OFP10_VERSION ? OFPRAW_OFPT10_BARRIER_REPLY : OFPRAW_OFPT11_BARRIER_REPLY), oh, 0); ofconn_send_reply(ofconn,...
166,748
null
Remote
Not required
Partial
CVE-2018-6158
https://www.cvedetails.com/cve/CVE-2018-6158/
CWE-362
High
Partial
Partial
null
2019-01-09
5.1
A race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2019-01-14
null
0
https://github.com/chromium/chromium/commit/20b65d00ca3d8696430e22efad7485366f8c3a21
20b65d00ca3d8696430e22efad7485366f8c3a21
[oilpan] Fix GCInfoTable for multiple threads Previously, grow and access from different threads could lead to a race on the table backing; see bug. - Rework the table to work on an existing reservation. - Commit upon growing, avoiding any copies. Drive-by: Fix over-allocation of table. Bug: chromium:841280 Change-...
0
third_party/blink/renderer/platform/heap/heap_page.cc
{"sha": "f4bdb9fe8fb3f24078f58afdf884726c6da90500", "filename": "third_party/blink/renderer/platform/heap/BUILD.gn", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/20b65d00ca3d8696430e22efad7485366f8c3a21/third_party/blink/renderer/platform/hea...
Address NormalPageArena::LazySweepPages(size_t allocation_size, size_t gc_info_index) { DCHECK(!HasCurrentAllocationArea()); AutoReset<bool> is_lazy_sweeping(&is_lazy_sweeping_, true); Address result = nullptr; while (!SweepingCompleted()) { BasePage* page = first_uns...
Address NormalPageArena::LazySweepPages(size_t allocation_size, size_t gc_info_index) { DCHECK(!HasCurrentAllocationArea()); AutoReset<bool> is_lazy_sweeping(&is_lazy_sweeping_, true); Address result = nullptr; while (!SweepingCompleted()) { BasePage* page = first_uns...
C
null
null
null
@@ -98,7 +98,7 @@ void HeapObjectHeader::ZapMagic() { void HeapObjectHeader::Finalize(Address object, size_t object_size) { HeapAllocHooks::FreeHookIfEnabled(object); - const GCInfo* gc_info = ThreadHeap::GcInfo(GcInfoIndex()); + const GCInfo* gc_info = GCInfoTable::Get().GCInfoFromIndex(GcInfoIndex()); if (...
Chrome
20b65d00ca3d8696430e22efad7485366f8c3a21
1d0b7474e5737da7f6914cf56c16c924552c3693
0
Address NormalPageArena::LazySweepPages(size_t allocation_size, size_t gc_info_index) { DCHECK(!HasCurrentAllocationArea()); AutoReset<bool> is_lazy_sweeping(&is_lazy_sweeping_, true); Address result = nullptr; while (!SweepingCompleted()) { BasePage* page = first_uns...
36,655
null
Remote
Not required
Complete
CVE-2014-4502
https://www.cvedetails.com/cve/CVE-2014-4502/
CWE-119
Low
Complete
Complete
null
2014-07-23
10
Multiple heap-based buffer overflows in the parse_notify function in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 4.1.0 allow remote pool servers to have unspecified impact via a (1) large or (2) negative value in the Extranonc2_size parameter in a mining.subscribe response and a crafted mining.notif...
2015-08-28
Overflow
0
https://github.com/ckolivas/cgminer/commit/e1c5050734123973b99d181c45e74b2cbb00272e
e1c5050734123973b99d181c45e74b2cbb00272e
Do some random sanity checking for stratum message parsing
0
util.c
{"sha": "6401bb822a3b2b3df9620edb3169a4fca9dacf71", "filename": "util.c", "status": "modified", "additions": 41, "deletions": 14, "changes": 55, "blob_url": "https://github.com/ckolivas/cgminer/blob/e1c5050734123973b99d181c45e74b2cbb00272e/util.c", "raw_url": "https://github.com/ckolivas/cgminer/raw/e1c5050734123973b99...
static size_t all_data_cb(const void *ptr, size_t size, size_t nmemb, void *user_data) { struct data_buffer *db = user_data; size_t len = size * nmemb; size_t oldlen, newlen; void *newmem; static const unsigned char zero = 0; oldlen = db->len; newlen = oldlen + len; newmem = realloc(db->buf, newlen + 1);...
static size_t all_data_cb(const void *ptr, size_t size, size_t nmemb, void *user_data) { struct data_buffer *db = user_data; size_t len = size * nmemb; size_t oldlen, newlen; void *newmem; static const unsigned char zero = 0; oldlen = db->len; newlen = oldlen + len; newmem = realloc(db->buf, newlen + 1);...
C
null
null
null
@@ -1,5 +1,5 @@ /* - * Copyright 2011-2013 Con Kolivas + * Copyright 2011-2014 Con Kolivas * Copyright 2010 Jeff Garzik * * This program is free software; you can redistribute it and/or modify it @@ -720,6 +720,34 @@ bool hex2bin(unsigned char *p, const char *hexstr, size_t len) return ret; } +static bool _...
cgminer
e1c5050734123973b99d181c45e74b2cbb00272e
e8b0a29db51a967e709161c52787227208d2eaa2
0
static size_t all_data_cb(const void *ptr, size_t size, size_t nmemb, void *user_data) { struct data_buffer *db = user_data; size_t len = size * nmemb; size_t oldlen, newlen; void *newmem; static const unsigned char zero = 0; oldlen = db->len; newlen = oldlen + len; newmem = realloc(db->buf, newlen + 1);...
120,826
null
Remote
Not required
Partial
CVE-2013-2867
https://www.cvedetails.com/cve/CVE-2013-2867/
null
Low
Partial
Partial
null
2013-07-10
7.5
Google Chrome before 28.0.1500.71 does not properly prevent pop-under windows, which allows remote attackers to have an unspecified impact via a crafted web site.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/d358f57009b85fb7440208afa5ba87636b491889
d358f57009b85fb7440208afa5ba87636b491889
Refactor to support default Bluetooth pairing delegate In order to support a default pairing delegate we need to move the agent service provider delegate implementation from BluetoothDevice to BluetoothAdapter while retaining the existing API. BUG=338492 TEST=device_unittests, unit_tests, browser_tests Review URL: h...
0
device/bluetooth/bluetooth_device_chromeos.cc
{"sha": "b2bdf964cc4acd25fc8cc35ed28fe3f3503a284a", "filename": "chromeos/dbus/fake_bluetooth_agent_manager_client.cc", "status": "modified", "additions": 5, "deletions": 2, "changes": 7, "blob_url": "https://github.com/chromium/chromium/blob/d358f57009b85fb7440208afa5ba87636b491889/chromeos/dbus/fake_bluetooth_agent_m...
void BluetoothDeviceChromeOS::SetTrusted() { DBusThreadManager::Get()->GetBluetoothDeviceClient()-> GetProperties(object_path_)->trusted.Set( true, base::Bind(&BluetoothDeviceChromeOS::OnSetTrusted, weak_ptr_factory_.GetWeakPtr())); }
void BluetoothDeviceChromeOS::SetTrusted() { DBusThreadManager::Get()->GetBluetoothDeviceClient()-> GetProperties(object_path_)->trusted.Set( true, base::Bind(&BluetoothDeviceChromeOS::OnSetTrusted, weak_ptr_factory_.GetWeakPtr())); }
C
null
null
null
@@ -9,8 +9,6 @@ #include "base/strings/string_number_conversions.h" #include "base/strings/string_util.h" #include "chromeos/dbus/bluetooth_adapter_client.h" -#include "chromeos/dbus/bluetooth_agent_manager_client.h" -#include "chromeos/dbus/bluetooth_agent_service_provider.h" #include "chromeos/dbus/bluetooth_devi...
Chrome
d358f57009b85fb7440208afa5ba87636b491889
5a0ca726eb113bad510932703c302826687b5818
0
void BluetoothDeviceChromeOS::SetTrusted() { // Unconditionally send the property change, rather than checking the value // first; there's no harm in doing this and it solves any race conditions // with the property becoming true or false and this call happening before // we get the D-Bus signal about the earli...
63,408
null
Remote
Not required
Partial
CVE-2017-11399
https://www.cvedetails.com/cve/CVE-2017-11399/
CWE-125
Medium
Partial
Partial
null
2017-07-17
6.8
Integer overflow in the ape_decode_frame function in libavcodec/apedec.c in FFmpeg through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access and application crash) or possibly have unspecified other impact via a crafted APE file.
2017-11-06
DoS Overflow
0
https://github.com/FFmpeg/FFmpeg/commit/ba4beaf6149f7241c8bd85fe853318c2f6837ad0
ba4beaf6149f7241c8bd85fe853318c2f6837ad0
avcodec/apedec: Fix integer overflow Fixes: out of array access Fixes: PoC.ape and others Found-by: Bingchang, Liu@VARAS of IIE Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
libavcodec/apedec.c
{"sha": "15eb416ba4ea9b226c0f86907b76c312b5586ef3", "filename": "libavcodec/apedec.c", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/ba4beaf6149f7241c8bd85fe853318c2f6837ad0/libavcodec/apedec.c", "raw_url": "https://github.com/FFmpeg/FFmpeg/raw/ba...
static void entropy_decode_stereo_3860(APEContext *ctx, int blockstodecode) { int32_t *decoded0 = ctx->decoded[0]; int32_t *decoded1 = ctx->decoded[1]; int blocks = blockstodecode; while (blockstodecode--) *decoded0++ = ape_decode_value_3860(ctx, &ctx->gb, &ctx->riceY); while (blocks--) ...
static void entropy_decode_stereo_3860(APEContext *ctx, int blockstodecode) { int32_t *decoded0 = ctx->decoded[0]; int32_t *decoded1 = ctx->decoded[1]; int blocks = blockstodecode; while (blockstodecode--) *decoded0++ = ape_decode_value_3860(ctx, &ctx->gb, &ctx->riceY); while (blocks--) ...
C
null
null
null
@@ -1412,6 +1412,7 @@ static int ape_decode_frame(AVCodecContext *avctx, void *data, int32_t *sample24; int i, ch, ret; int blockstodecode; + uint64_t decoded_buffer_size; /* this should never be negative, but bad things will happen if it is, so check it just to make sure. */ @@ -1467,7...
FFmpeg
ba4beaf6149f7241c8bd85fe853318c2f6837ad0
615479d51c6a76275c114888b5600b929309f4c4
0
static void entropy_decode_stereo_3860(APEContext *ctx, int blockstodecode) { int32_t *decoded0 = ctx->decoded[0]; int32_t *decoded1 = ctx->decoded[1]; int blocks = blockstodecode; while (blockstodecode--) *decoded0++ = ape_decode_value_3860(ctx, &ctx->gb, &ctx->riceY); while (blocks--) ...
50,900
null
Remote
Not required
Partial
CVE-2016-6250
https://www.cvedetails.com/cve/CVE-2016-6250/
CWE-190
Low
Partial
Partial
null
2016-09-21
7.5
Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.
2018-01-04
DoS Exec Code Overflow
0
https://github.com/libarchive/libarchive/commit/3014e198
3014e198
Issue 711: Be more careful about verifying filename lengths when writing ISO9660 archives * Don't cast size_t to int, since this can lead to overflow on machines where sizeof(int) < sizeof(size_t) * Check a + b > limit by writing it as a > limit || b > limit || a + b > limit to avoid problems when a + b wraps...
0
libarchive/archive_write_set_format_iso9660.c
{"sha": "cb3e54e8d21b10ece9a241f638c63ccbcec358b6", "filename": "libarchive/archive_write_set_format_iso9660.c", "status": "modified", "additions": 10, "deletions": 8, "changes": 18, "blob_url": "https://github.com/libarchive/libarchive/blob/3014e19820ea53c15c90f9d447ca3e668a0b76c6/libarchive/archive_write_set_format_i...
write_null(struct archive_write *a, size_t size) { size_t remaining; unsigned char *p, *old; int r; remaining = wb_remaining(a); p = wb_buffptr(a); if (size <= remaining) { memset(p, 0, size); return (wb_consume(a, size)); } memset(p, 0, remaining); r = wb_consume(a, remaining); if (r != ARCHIVE_OK) re...
write_null(struct archive_write *a, size_t size) { size_t remaining; unsigned char *p, *old; int r; remaining = wb_remaining(a); p = wb_buffptr(a); if (size <= remaining) { memset(p, 0, size); return (wb_consume(a, size)); } memset(p, 0, remaining); r = wb_consume(a, remaining); if (r != ARCHIVE_OK) re...
C
null
null
null
@@ -6225,7 +6225,7 @@ isoent_gen_joliet_identifier(struct archive_write *a, struct isoent *isoent, unsigned char *p; size_t l; int r; - int ffmax, parent_len; + size_t ffmax, parent_len; static const struct archive_rb_tree_ops rb_ops = { isoent_cmp_node_joliet, isoent_cmp_key_joliet }; @@ -6239,7 +6239,7 @...
libarchive
3014e198
7bb6d7078fa2fb9eae214029a019c71ce256eeb7
0
write_null(struct archive_write *a, size_t size) { size_t remaining; unsigned char *p, *old; int r; remaining = wb_remaining(a); p = wb_buffptr(a); if (size <= remaining) { memset(p, 0, size); return (wb_consume(a, size)); } memset(p, 0, remaining); r = wb_consume(a, remaining); if (r != ARCHIVE_OK) re...
41,916
null
Local
Not required
Complete
CVE-2015-8104
https://www.cvedetails.com/cve/CVE-2015-8104/
CWE-399
Medium
null
null
null
2015-11-16
4.7
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
2017-05-23
DoS
0
https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
cbdb967af3d54993f5814f1cee0ed311a055377d
KVM: svm: unconditionally intercept #DB This is needed to avoid the possibility that the guest triggers an infinite stream of #DB exceptions (CVE-2015-8104). VMX is not affected: because it does not save DR6 in the VMCS, it already intercepts #DB unconditionally. Reported-by: Jan Beulich <jbeulich@suse.com> Cc: stab...
0
arch/x86/kvm/svm.c
{"sha": "1cc1ffca0d8c3fe9693a0b4f6d23cddfcc81e826", "filename": "arch/x86/kvm/svm.c", "status": "modified", "additions": 3, "deletions": 11, "changes": 14, "blob_url": "https://github.com/torvalds/linux/blob/cbdb967af3d54993f5814f1cee0ed311a055377d/arch/x86/kvm/svm.c", "raw_url": "https://github.com/torvalds/linux/raw/...
static int svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) { unsigned long host_cr4_mce = cr4_read_shadow() & X86_CR4_MCE; unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4; if (cr4 & X86_CR4_VMXE) return 1; if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE)) svm_flush_tlb(vcpu); vcpu->arch.cr4 = c...
static int svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) { unsigned long host_cr4_mce = cr4_read_shadow() & X86_CR4_MCE; unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4; if (cr4 & X86_CR4_VMXE) return 1; if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE)) svm_flush_tlb(vcpu); vcpu->arch.cr4 = c...
C
null
null
null
@@ -1020,6 +1020,7 @@ static void init_vmcb(struct vcpu_svm *svm) set_exception_intercept(svm, UD_VECTOR); set_exception_intercept(svm, MC_VECTOR); set_exception_intercept(svm, AC_VECTOR); + set_exception_intercept(svm, DB_VECTOR); set_intercept(svm, INTERCEPT_INTR); set_intercept(svm, INTERCEPT_NMI); @@ -1...
linux
cbdb967af3d54993f5814f1cee0ed311a055377d
54a20552e1eae07aa240fa370a0293e006b5faed
0
static int svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) { unsigned long host_cr4_mce = cr4_read_shadow() & X86_CR4_MCE; unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4; if (cr4 & X86_CR4_VMXE) return 1; if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE)) svm_flush_tlb(vcpu); vcpu->arch.cr4 = c...
100,955
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2011-12
null
0
https://github.com/chromium/chromium/commit/a1f6ba4c1c488be710013f8548ff5513b32a7f3b
a1f6ba4c1c488be710013f8548ff5513b32a7f3b
Define DEBUG_GL_COMMANDS only in debug builds. https://bugs.webkit.org/show_bug.cgi?id=74083 Reviewed by Noam Rosenthal. No tests added as this change does not affect functionality. * platform/graphics/opengl/TextureMapperGL.cpp: git-svn-id: svn://svn.chromium.org/blink/trunk@102359 bbb929c8-8fbe-4397-9dbb-9b2b202...
0
third_party/WebKit/Source/WebCore/platform/graphics/opengl/TextureMapperGL.cpp
{"sha": "2ca5cd9f0038abc985290c76b52191eeaef31a7e", "filename": "third_party/WebKit/Source/WebCore/ChangeLog", "status": "modified", "additions": 11, "deletions": 0, "changes": 11, "blob_url": "https://github.com/chromium/chromium/blob/a1f6ba4c1c488be710013f8548ff5513b32a7f3b/third_party/WebKit/Source/WebCore/ChangeLog...
void createShaderProgram(const char* vertexShaderSource, const char* fragmentShaderSource, ShaderProgramIndex index) { GLuint vertexShader = glCreateShader(GL_VERTEX_SHADER); GLuint fragmentShader = glCreateShader(GL_FRAGMENT_SHADER); GL_CMD(glShaderSource(vertexShade...
void createShaderProgram(const char* vertexShaderSource, const char* fragmentShaderSource, ShaderProgramIndex index) { GLuint vertexShader = glCreateShader(GL_VERTEX_SHADER); GLuint fragmentShader = glCreateShader(GL_FRAGMENT_SHADER); GL_CMD(glShaderSource(vertexShade...
C
null
null
null
@@ -96,12 +96,10 @@ inline static void debugGLCommand(const char* command, int line) ASSERT_NOT_REACHED(); } -#define DEBUG_GL_COMMANDS - -#ifdef DEBUG_GL_COMMANDS +#ifndef NDEBUG #define GL_CMD(x) {x, debugGLCommand(#x, __LINE__); } #else -#define GL_CMD(x) x +#define GL_CMD(x) x; #endif struct TextureMa...
Chrome
a1f6ba4c1c488be710013f8548ff5513b32a7f3b
7273304da7898a7835a880171e519cb3816945ee
0
void createShaderProgram(const char* vertexShaderSource, const char* fragmentShaderSource, ShaderProgramIndex index) { GLuint vertexShader = glCreateShader(GL_VERTEX_SHADER); GLuint fragmentShader = glCreateShader(GL_FRAGMENT_SHADER); GL_CMD(glShaderSource(vertexShade...
75,110
null
Remote
Not required
Partial
CVE-2018-1000524
https://www.cvedetails.com/cve/CVE-2018-1000524/
CWE-190
Medium
null
null
null
2018-06-26
4.3
miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap...
2018-08-28
DoS Overflow
0
https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996
252c1ca184cb38e1acb917aa0e451c5f08519996
Fix integer overflow in layer_resize in map_engine.c (#268) * Fix integer overflow in layer_resize in map_engine.c There's a buffer overflow bug in the function layer_resize. It allocates a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`. But it didn't check for integer overflow, so if x_si...
0
src/minisphere/map_engine.c
{"sha": "cba8a6123ffb11dd5e1af712da513beadec55f1c", "filename": "src/minisphere/map_engine.c", "status": "modified", "additions": 4, "deletions": 1, "changes": 5, "blob_url": "https://github.com/fatcerberus/miniSphere/blob/252c1ca184cb38e1acb917aa0e451c5f08519996/src/minisphere/map_engine.c", "raw_url": "https://github...
person_set_leader(person_t* person, person_t* leader, int distance) { const person_t* node; if (leader != NULL) { node = leader; do { if (node == person) return false; } while ((node = node->leader)); } if (leader != NULL) { if (!enlarge_step_history(leader, distance)) return false; person->le...
person_set_leader(person_t* person, person_t* leader, int distance) { const person_t* node; if (leader != NULL) { node = leader; do { if (node == person) return false; } while ((node = node->leader)); } if (leader != NULL) { if (!enlarge_step_history(leader, distance)) return false; person->le...
C
null
null
null
@@ -1036,6 +1036,7 @@ layer_resize(int layer, int x_size, int y_size) struct map_tile* tilemap; struct map_trigger* trigger; struct map_zone* zone; + size_t tilemap_size; int x, y, i; @@ -1044,7 +1045,9 @@ layer_resize(int layer, int x_size, int y_size) // allocate a new tilemap and c...
minisphere
252c1ca184cb38e1acb917aa0e451c5f08519996
23c16ff65ac8831de1dea721e4998bd140d91080
0
person_set_leader(person_t* person, person_t* leader, int distance) { const person_t* node; // prevent circular follower chains from forming if (leader != NULL) { node = leader; do { if (node == person) return false; } while ((node = node->leader)); } // add the person as a follower (or sever existi...
14,666
null
Remote
Not required
Partial
CVE-2015-6527
https://www.cvedetails.com/cve/CVE-2015-6527/
CWE-17
Low
Partial
Partial
null
2016-01-19
7.5
The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.
2016-01-21
Exec Code
0
https://git.php.net/?p=php-src.git;a=commit;h=6aeee47b2cd47915ccfa3b41433a3f57aea24dd5
6aeee47b2cd47915ccfa3b41433a3f57aea24dd5
null
0
null
null
PHP_MINIT_FUNCTION(nl_langinfo) { #define REGISTER_NL_LANGINFO_CONSTANT(x) REGISTER_LONG_CONSTANT(#x, x, CONST_CS | CONST_PERSISTENT) #ifdef ABDAY_1 REGISTER_NL_LANGINFO_CONSTANT(ABDAY_1); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_2); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_3); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_4); REGIST...
PHP_MINIT_FUNCTION(nl_langinfo) { #define REGISTER_NL_LANGINFO_CONSTANT(x) REGISTER_LONG_CONSTANT(#x, x, CONST_CS | CONST_PERSISTENT) #ifdef ABDAY_1 REGISTER_NL_LANGINFO_CONSTANT(ABDAY_1); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_2); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_3); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_4); REGIST...
C
null
null
d44fc4a07361d2527dd7073b09e5e88134708858
@@ -4055,7 +4055,7 @@ static zend_long php_str_replace_in_subject(zval *search, zval *replace, zval *s Z_STRVAL_P(search), Z_STRLEN_P(search), Z_STRVAL_P(replace), Z_STRLEN_P(replace), &replace_count)); ...
php
https://git.php.net/?p=php-src.git;a=blob;f=ext/standard/string.c;h=2a9ddb2a180b85feca3de464ff9aa54afb71e361;hb=2a9ddb2a180b85feca3de464ff9aa54afb71e361
https://git.php.net/?p=php-src.git;a=blob;f=ext/standard/string.c;h=bb482ba7a159e7f5976b99212c87552b0f46f2ad;hb=bb482ba7a159e7f5976b99212c87552b0f46f2ad
0
PHP_MINIT_FUNCTION(nl_langinfo) { #define REGISTER_NL_LANGINFO_CONSTANT(x) REGISTER_LONG_CONSTANT(#x, x, CONST_CS | CONST_PERSISTENT) #ifdef ABDAY_1 REGISTER_NL_LANGINFO_CONSTANT(ABDAY_1); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_2); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_3); REGISTER_NL_LANGINFO_CONSTANT(ABDAY_4); REGIST...
30,679
null
Local
Not required
null
CVE-2013-3227
https://www.cvedetails.com/cve/CVE-2013-3227/
CWE-200
Low
Complete
null
null
2013-04-22
4.9
The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
2017-11-28
+Info
0
https://github.com/torvalds/linux/commit/2d6fbfe733f35c6b355c216644e08e149c61b271
2d6fbfe733f35c6b355c216644e08e149c61b271
caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg() The current code does not fill the msg_name member in case it is set. It also does not set the msg_namelen member to 0 and therefore makes net/socket.c leak the local, uninitialized sockaddr_storage variable to userland -- 128 bytes of kernel stack memory. ...
0
net/caif/caif_socket.c
{"sha": "ff2ff3ce6965a73dcf74918cd5c5bcc1b4a7d51b", "filename": "net/caif/caif_socket.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/2d6fbfe733f35c6b355c216644e08e149c61b271/net/caif/caif_socket.c", "raw_url": "https://github.com/torvalds/linu...
static void caif_sock_destructor(struct sock *sk) { struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); caif_assert(!atomic_read(&sk->sk_wmem_alloc)); caif_assert(sk_unhashed(sk)); caif_assert(!sk->sk_socket); if (!sock_flag(sk, SOCK_DEAD)) { pr_debug("Attempt to release alive CAIF socket: %p\n", sk)...
static void caif_sock_destructor(struct sock *sk) { struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); caif_assert(!atomic_read(&sk->sk_wmem_alloc)); caif_assert(sk_unhashed(sk)); caif_assert(!sk->sk_socket); if (!sock_flag(sk, SOCK_DEAD)) { pr_debug("Attempt to release alive CAIF socket: %p\n", sk)...
C
null
null
null
@@ -286,6 +286,8 @@ static int caif_seqpkt_recvmsg(struct kiocb *iocb, struct socket *sock, if (m->msg_flags&MSG_OOB) goto read_error; + m->msg_namelen = 0; + skb = skb_recv_datagram(sk, flags, 0 , &ret); if (!skb) goto read_error;
linux
2d6fbfe733f35c6b355c216644e08e149c61b271
c8c499175f7d295ef867335bceb9a76a2c3cdc38
0
static void caif_sock_destructor(struct sock *sk) { struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); caif_assert(!atomic_read(&sk->sk_wmem_alloc)); caif_assert(sk_unhashed(sk)); caif_assert(!sk->sk_socket); if (!sock_flag(sk, SOCK_DEAD)) { pr_debug("Attempt to release alive CAIF socket: %p\n", sk)...
20,351
null
Local
Not required
Complete
CVE-2012-2121
https://www.cvedetails.com/cve/CVE-2012-2121/
CWE-264
Low
null
null
null
2012-05-17
4.9
The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations ...
2018-01-04
DoS
0
https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195
09ca8e1173bcb12e2a449698c9ae3b86a8a10195
KVM: unmap pages from the iommu when slots are removed commit 32f6daad4651a748a58a3ab6da0611862175722f upstream. We've been adding new mappings, but not destroying old mappings. This can lead to a page leak as pages are pinned using get_user_pages, but only unpinned with put_page if they still exist in the memslots l...
0
virt/kvm/kvm_main.c
{"sha": "bc2172077d9d27cf10eeb155b44e716a9b0f7d02", "filename": "include/linux/kvm_host.h", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/09ca8e1173bcb12e2a449698c9ae3b86a8a10195/include/linux/kvm_host.h", "raw_url": "https://github.com/torvalds/...
unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn) { struct vm_area_struct *vma; unsigned long addr, size; size = PAGE_SIZE; addr = gfn_to_hva(kvm, gfn); if (kvm_is_error_hva(addr)) return PAGE_SIZE; down_read(&current->mm->mmap_sem); vma = find_vma(current->mm, addr); if (!vma) goto out; siz...
unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn) { struct vm_area_struct *vma; unsigned long addr, size; size = PAGE_SIZE; addr = gfn_to_hva(kvm, gfn); if (kvm_is_error_hva(addr)) return PAGE_SIZE; down_read(&current->mm->mmap_sem); vma = find_vma(current->mm, addr); if (!vma) goto out; siz...
C
null
null
null
@@ -873,12 +873,13 @@ int __kvm_set_memory_region(struct kvm *kvm, if (r) goto out_free; - /* map the pages in iommu page table */ + /* map/unmap the pages in iommu page table */ if (npages) { r = kvm_iommu_map_pages(kvm, &new); if (r) goto out_free; - } + } else + kvm_iommu_unmap_pages(kvm, &old); ...
linux
09ca8e1173bcb12e2a449698c9ae3b86a8a10195
f16e3ad91afa96717232a393e07e86f76099af03
0
unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn) { struct vm_area_struct *vma; unsigned long addr, size; size = PAGE_SIZE; addr = gfn_to_hva(kvm, gfn); if (kvm_is_error_hva(addr)) return PAGE_SIZE; down_read(&current->mm->mmap_sem); vma = find_vma(current->mm, addr); if (!vma) goto out; siz...
117,137
null
Remote
Not required
Complete
CVE-2011-3099
https://www.cvedetails.com/cve/CVE-2011-3099/
CWE-399
Low
Complete
Complete
null
2012-05-15
10
Use-after-free vulnerability in the PDF functionality in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a malformed name for the font encoding.
2017-12-04
DoS
0
https://github.com/chromium/chromium/commit/3bbc818ed1a7b63b8290bbde9ae975956748cb8a
3bbc818ed1a7b63b8290bbde9ae975956748cb8a
[GTK] Inspector should set a default attached height before being attached https://bugs.webkit.org/show_bug.cgi?id=90767 Reviewed by Xan Lopez. We are currently using the minimum attached height in WebKitWebViewBase as the default height for the inspector when attached. It would be easier for WebKitWebViewBase and em...
0
third_party/WebKit/Source/WebKit2/UIProcess/API/gtk/WebKitWebViewBase.cpp
{"sha": "736ae1ede06ad8b64d22eec23667d1ebecb111c4", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 26, "deletions": 0, "changes": 26, "blob_url": "https://github.com/chromium/chromium/blob/3bbc818ed1a7b63b8290bbde9ae975956748cb8a/third_party/WebKit/Source/WebKit2/ChangeLog...
static gboolean webkitWebViewBaseFocusOutEvent(GtkWidget* widget, GdkEventFocus* event) { WebKitWebViewBase* webViewBase = WEBKIT_WEB_VIEW_BASE(widget); WebKitWebViewBasePrivate* priv = webViewBase->priv; priv->isPageActive = FALSE; priv->pageProxy->viewStateDidChange(WebPageProxy::ViewWindowIsActive);...
static gboolean webkitWebViewBaseFocusOutEvent(GtkWidget* widget, GdkEventFocus* event) { WebKitWebViewBase* webViewBase = WEBKIT_WEB_VIEW_BASE(widget); WebKitWebViewBasePrivate* priv = webViewBase->priv; priv->isPageActive = FALSE; priv->pageProxy->viewStateDidChange(WebPageProxy::ViewWindowIsActive);...
C
null
null
null
@@ -101,9 +101,6 @@ struct _WebKitWebViewBasePrivate { G_DEFINE_TYPE(WebKitWebViewBase, webkit_web_view_base, GTK_TYPE_CONTAINER) -// Keep this in sync with the value minimumAttachedHeight in WebInspectorProxy. -static const unsigned gMinimumAttachedInspectorHeight = 250; - static void webkitWebViewBaseNotifyResi...
Chrome
3bbc818ed1a7b63b8290bbde9ae975956748cb8a
4bc851f188711a797a1632a9f6ce135afd233587
0
static gboolean webkitWebViewBaseFocusOutEvent(GtkWidget* widget, GdkEventFocus* event) { WebKitWebViewBase* webViewBase = WEBKIT_WEB_VIEW_BASE(widget); WebKitWebViewBasePrivate* priv = webViewBase->priv; priv->isPageActive = FALSE; priv->pageProxy->viewStateDidChange(WebPageProxy::ViewWindowIsActive);...
179,959
null
Remote
Not required
null
CVE-2014-9423
https://www.cvedetails.com/cve/CVE-2014-9423/
CWE-200
Low
Partial
null
null
2015-02-19
5
The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing...
2016-11-28
+Info
0
https://github.com/krb5/krb5/commit/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c
5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c
Fix gssrpc data leakage [CVE-2014-9423] [MITKRB5-SA-2015-001] In svcauth_gss_accept_sec_context(), do not copy bytes from the union context into the handle field we send to the client. We do not use this handle field, so just supply a fixed string of "xxxx". In gss_union_ctx_id_struct, remove the unused "interposer"...
3
src/lib/rpc/svc_auth_gss.c
{"sha": "2b5145e079fe27517cbfe1a7c94113bfb184ac50", "filename": "src/lib/gssapi/mechglue/mglueP.h", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/krb5/krb5/blob/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c/src/lib/gssapi/mechglue/mglueP.h", "raw_url": "https://github.co...
gssrpc__svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, bool_t *no_dispatch) { enum auth_stat retstat; XDR xdrs; SVCAUTH *auth; struct svc_rpc_gss_data *gd; struct rpc_gss_cred *gc; struct rpc_gss_init_res gr; int call_stat, offset; OM_uint32 min_stat; log_debug("in svcauth_gss()"); /*...
gssrpc__svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, bool_t *no_dispatch) { enum auth_stat retstat; XDR xdrs; SVCAUTH *auth; struct svc_rpc_gss_data *gd; struct rpc_gss_cred *gc; struct rpc_gss_init_res gr; int call_stat, offset; OM_uint32 min_stat; log_debug("in svcauth_gss()"); /*...
C
null
mem_free(gr.gr_ctx.value, sizeof(gss_union_ctx_id_desc)); mem_free(gr.gr_ctx.value, sizeof(gss_union_ctx_id_desc));
null
@@ -65,16 +65,6 @@ extern const gss_OID_desc * const gss_mech_spkm3; extern SVCAUTH svc_auth_none; -/* - * from mit-krb5-1.2.1 mechglue/mglueP.h: - * Array of context IDs typed by mechanism OID - */ -typedef struct gss_union_ctx_id_t { - gss_OID mech_type; - gss_ctx_id_t internal_ctx_id; -} gss_union_ctx_...
krb5
5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c
6609658db0799053fbef0d7d0aa2f1fd68ef32d8
1
gssrpc__svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, bool_t *no_dispatch) { enum auth_stat retstat; XDR xdrs; SVCAUTH *auth; struct svc_rpc_gss_data *gd; struct rpc_gss_cred *gc; struct rpc_gss_init_res gr; int call_stat, offset; OM_uint32 min_stat; log_debug("in svcauth_gss()"); /*...
101,302
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2011-11
null
0
https://github.com/chromium/chromium/commit/19190765882e272a6a2162c89acdb29110f7e3cf
19190765882e272a6a2162c89acdb29110f7e3cf
Revert 102184 - [Sync] use base::Time in sync Make EntryKernel/Entry/BaseNode use base::Time instead of int64s. Add sync/util/time.h, with utility functions to manage the sync proto time format. Store times on disk in proto format instead of the local system. This requires a database version bump (to 77). Update Se...
0
chrome/browser/sync/engine/syncer_util.cc
{"sha": "98d00951a5cdbae37c5ff82273375587493a88a0", "filename": "chrome/browser/sync/engine/build_commit_command.cc", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/chromium/chromium/blob/19190765882e272a6a2162c89acdb29110f7e3cf/chrome/browser/sync/engine/build_commi...
VerifyResult SyncerUtil::VerifyNewEntry( const SyncEntity& update, syncable::Entry* target, const bool deleted) { if (target->good()) { return VERIFY_UNDECIDED; } if (deleted) { return VERIFY_SKIP; } return VERIFY_SUCCESS; }
VerifyResult SyncerUtil::VerifyNewEntry( const SyncEntity& update, syncable::Entry* target, const bool deleted) { if (target->good()) { return VERIFY_UNDECIDED; } if (deleted) { return VERIFY_SKIP; } return VERIFY_SUCCESS; }
C
null
null
null
@@ -23,7 +23,6 @@ #include "chrome/browser/sync/syncable/model_type.h" #include "chrome/browser/sync/syncable/syncable.h" #include "chrome/browser/sync/syncable/syncable_changes_version.h" -#include "chrome/browser/sync/util/time.h" using syncable::BASE_VERSION; using syncable::Blob; @@ -426,8 +425,10 @@ void Sy...
Chrome
19190765882e272a6a2162c89acdb29110f7e3cf
603b62a3200ccc75370d3750b5a76f8f8960d299
0
VerifyResult SyncerUtil::VerifyNewEntry( const SyncEntity& update, syncable::Entry* target, const bool deleted) { if (target->good()) { // Not a new update. return VERIFY_UNDECIDED; } if (deleted) { // Deletion of an item we've never seen can be ignored. return VERIFY_SKIP; } retu...
176,216
null
Remote
Not required
Complete
CVE-2018-9490
https://www.cvedetails.com/cve/CVE-2018-9490/
CWE-704
Medium
Complete
Complete
null
2018-10-02
9.3
In CollectValuesOrEntriesImpl of elements.cc, there is possible remote code execution due to type confusion. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 ...
2018-12-28
Exec Code
0
https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb
a24543157ae2cdd25da43e20f4e48a07481e6ceb
Backport: Fix Object.entries/values with changing elements Bug: 111274046 Test: m -j proxy_resolver_v8_unittest && adb sync && adb shell \ /data/nativetest64/proxy_resolver_v8_unittest/proxy_resolver_v8_unittest Change-Id: I705fc512cc5837e9364ed187559cc75d079aa5cb (cherry picked from commit d8be9a10287afed07705ac8af02...
0
src/elements.cc
{"filename": "src/elements.cc", "raw_url": "https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb/src/elements.cc", "patch": "@@ -511,6 +511,21 @@\n\n return Just<int64_t>(-1);\n }\n \n+// The InternalElementsAccessor is a helper class to expose otherwise protected\n+// meth...
static Handle<FixedArrayBase> ConvertElementsWithCapacity( Handle<JSObject> object, Handle<FixedArrayBase> old_elements, ElementsKind from_kind, uint32_t capacity, int copy_size) { return ConvertElementsWithCapacity(object, old_elements, from_kind, capacity, 0, 0, copy_size); ...
static Handle<FixedArrayBase> ConvertElementsWithCapacity( Handle<JSObject> object, Handle<FixedArrayBase> old_elements, ElementsKind from_kind, uint32_t capacity, int copy_size) { return ConvertElementsWithCapacity(object, old_elements, from_kind, capacity, 0, 0, copy_size); ...
C
null
null
null
@@ -511,6 +511,21 @@ return Just<int64_t>(-1); } +// The InternalElementsAccessor is a helper class to expose otherwise protected +// methods to its subclasses. Namely, we don't want to publicly expose methods +// that take an entry (instead of an index) as an argument. +class InternalElementsAccessor : public E...
Android
https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb/
https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb%5E/
0
static Handle<FixedArrayBase> ConvertElementsWithCapacity( Handle<JSObject> object, Handle<FixedArrayBase> old_elements, ElementsKind from_kind, uint32_t capacity, int copy_size) { return ConvertElementsWithCapacity(object, old_elements, from_kind, capacity, 0, 0, copy_size); ...
38,679
null
Remote
Not required
Complete
CVE-2014-2672
https://www.cvedetails.com/cve/CVE-2014-2672/
CWE-362
Medium
null
null
null
2014-04-01
7.1
Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
2014-04-19
DoS
0
https://github.com/torvalds/linux/commit/21f8aaee0c62708654988ce092838aa7df4d25d8
21f8aaee0c62708654988ce092838aa7df4d25d8
ath9k: protect tid->sched check We check tid->sched without a lock taken on ath_tx_aggr_sleep(). That is race condition which can result of doing list_del(&tid->list) twice (second time with poisoned list node) and cause crash like shown below: [424271.637220] BUG: unable to handle kernel paging request at 00100104 [...
0
drivers/net/wireless/ath/ath9k/xmit.c
{"sha": "4f4ce83f7ab4afd69fb4ed4ae937953711d3343a", "filename": "drivers/net/wireless/ath/ath9k/xmit.c", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/torvalds/linux/blob/21f8aaee0c62708654988ce092838aa7df4d25d8/drivers/net/wireless/ath/ath9k/xmit.c", "raw_url": "ht...
int ath_tx_aggr_start(struct ath_softc *sc, struct ieee80211_sta *sta, u16 tid, u16 *ssn) { struct ath_atx_tid *txtid; struct ath_txq *txq; struct ath_node *an; u8 density; an = (struct ath_node *)sta->drv_priv; txtid = ATH_AN_2_TID(an, tid); txq = txtid->ac->txq; ath_txq_lock(sc, txq); /* update am...
int ath_tx_aggr_start(struct ath_softc *sc, struct ieee80211_sta *sta, u16 tid, u16 *ssn) { struct ath_atx_tid *txtid; struct ath_txq *txq; struct ath_node *an; u8 density; an = (struct ath_node *)sta->drv_priv; txtid = ATH_AN_2_TID(an, tid); txq = txtid->ac->txq; ath_txq_lock(sc, txq); /* update am...
C
null
null
null
@@ -1444,14 +1444,16 @@ void ath_tx_aggr_sleep(struct ieee80211_sta *sta, struct ath_softc *sc, for (tidno = 0, tid = &an->tid[tidno]; tidno < IEEE80211_NUM_TIDS; tidno++, tid++) { - if (!tid->sched) - continue; - ac = tid->ac; txq = ac->txq; ath_txq_lock(sc, txq); + if (!tid->sched) { + a...
linux
21f8aaee0c62708654988ce092838aa7df4d25d8
1c97560f6d751a620978504a4a888c631192b71a
0
int ath_tx_aggr_start(struct ath_softc *sc, struct ieee80211_sta *sta, u16 tid, u16 *ssn) { struct ath_atx_tid *txtid; struct ath_txq *txq; struct ath_node *an; u8 density; an = (struct ath_node *)sta->drv_priv; txtid = ATH_AN_2_TID(an, tid); txq = txtid->ac->txq; ath_txq_lock(sc, txq); /* update am...
115,321
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2012-02
null
0
https://github.com/chromium/chromium/commit/0008e75b613a252c8a5e2cca58c8376bf0e0a6a8
0008e75b613a252c8a5e2cca58c8376bf0e0a6a8
Disables PanelBrowserTest.MinimizeTwoPanelsWithoutTabbedWindow on windows as it's causing other interactive ui tests to fail. BUG=103253 TBR=dimich@chromium.org R=dimich@chromium.org Review URL: http://codereview.chromium.org/8467025 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@108901 0039d316-1c4b-4281-b951-...
0
chrome/browser/ui/panels/panel_browsertest.cc
{"sha": "630c14f5e861fa68e127d3ffce8f7553bb43d7a7", "filename": "chrome/browser/ui/panels/panel_browsertest.cc", "status": "modified", "additions": 3, "deletions": 2, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/0008e75b613a252c8a5e2cca58c8376bf0e0a6a8/chrome/browser/ui/panels/panel_browsertest....
PanelDownloadTest() : PanelBrowserTest() { }
PanelDownloadTest() : PanelBrowserTest() { }
C
null
null
null
@@ -1294,8 +1294,9 @@ IN_PROC_BROWSER_TEST_F(PanelBrowserTest, MAYBE_FocusLostOnMinimize) { panel->Close(); } -// TODO(dimich): try/enable on other platforms. -#if defined(OS_MACOSX) || defined(OS_WIN) +// TODO(dimich): try/enable on other platforms. See bug 103253 for details on +// why this is disabled on windo...
Chrome
0008e75b613a252c8a5e2cca58c8376bf0e0a6a8
0eb4a12ea4740eedcbfeb6c939dca15353ffde13
0
PanelDownloadTest() : PanelBrowserTest() { }
125,196
null
Remote
Not required
Partial
CVE-2013-0910
https://www.cvedetails.com/cve/CVE-2013-0910/
CWE-287
Low
Partial
Partial
null
2013-03-05
7.5
Google Chrome before 25.0.1364.152 does not properly manage the interaction between the browser process and renderer processes during authorization of the loading of a plug-in, which makes it easier for remote attackers to bypass intended access restrictions via vectors involving a blocked plug-in.
2017-09-18
Bypass
0
https://github.com/chromium/chromium/commit/ac8bd041b81e46e4e4fcd5021aaa5499703952e6
ac8bd041b81e46e4e4fcd5021aaa5499703952e6
Follow-on fixes and naming changes for https://codereview.chromium.org/12086077/ BUG=172573 Review URL: https://codereview.chromium.org/12177018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@180600 0039d316-1c4b-4281-b951-d872f2087c98
0
content/browser/renderer_host/render_message_filter.cc
{"sha": "072269f723daf87a86251f9f4a4fae5574f5be8b", "filename": "chrome/browser/plugins/chrome_plugin_service_filter.cc", "status": "modified", "additions": 4, "deletions": 5, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/ac8bd041b81e46e4e4fcd5021aaa5499703952e6/chrome/browser/plugins/chrome_plug...
void RenderMessageFilter::OnCreateFullscreenWidget(int opener_id, int* route_id, int* surface_id) { render_widget_helper_->CreateNewFullscreenWidget( opener_id, route_id, surface_id); }
void RenderMessageFilter::OnCreateFullscreenWidget(int opener_id, int* route_id, int* surface_id) { render_widget_helper_->CreateNewFullscreenWidget( opener_id, route_id, surface_id); }
C
null
null
null
@@ -673,12 +673,12 @@ void RenderMessageFilter::GetPluginsCallback( for (size_t i = 0; i < all_plugins.size(); ++i) { // Copy because the filter can mutate. webkit::WebPluginInfo plugin(all_plugins[i]); - if (!filter || filter->IsPluginEnabled(child_process_id, - ...
Chrome
ac8bd041b81e46e4e4fcd5021aaa5499703952e6
a0461055bead3cb4904fec723e4145b629db4360
0
void RenderMessageFilter::OnCreateFullscreenWidget(int opener_id, int* route_id, int* surface_id) { render_widget_helper_->CreateNewFullscreenWidget( opener_id, route_id, surface_id); }
35,726
null
Remote
Not required
null
CVE-2014-8109
https://www.cvedetails.com/cve/CVE-2014-8109/
CWE-264
Medium
null
Partial
null
2014-12-29
4.3
mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic ...
2016-12-30
Bypass
0
https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb
3f1693d558d0758f829c8b53993f1749ddf6ffcb
Merge r1642499 from trunk: *) SECURITY: CVE-2014-8109 (cve.mitre.org) mod_lua: Fix handling of the Require line when a LuaAuthzProvider is used in multiple Require directives with different arguments. PR57204 [Edward Lu <Chaosed0 gmail.com>] Submitted By: Edward Lu Committed By: covener Submitted b...
0
modules/lua/mod_lua.c
{"sha": "f770724b69a75c5d609dd3d00a99b66b14f4edd9", "filename": "CHANGES", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/apache/httpd/blob/3f1693d558d0758f829c8b53993f1749ddf6ffcb/CHANGES", "raw_url": "https://github.com/apache/httpd/raw/3f1693d558d0758f829c8b53993f...
static const char *register_insert_filter_hook(cmd_parms *cmd, void *_cfg, const char *file, const char *function) { return "LuaHookInsertFilter not yet implemented"; }
static const char *register_insert_filter_hook(cmd_parms *cmd, void *_cfg, const char *file, const char *function) { return "LuaHookInsertFilter not yet implemented"; }
C
null
null
null
@@ -66,9 +66,13 @@ typedef struct { const char *file_name; const char *function_name; ap_lua_vm_spec *spec; - apr_array_header_t *args; } lua_authz_provider_spec; +typedef struct { + lua_authz_provider_spec *spec; + apr_array_header_t *args; +} lua_authz_provider_func; + apr_hash_t *lua_auth...
httpd
3f1693d558d0758f829c8b53993f1749ddf6ffcb
82d00bafabeb2ea902cc95183de5640c7c922758
0
static const char *register_insert_filter_hook(cmd_parms *cmd, void *_cfg, const char *file, const char *function) { return "LuaHookInsertFilter not yet implemented"; }
87,621
null
Remote
Not required
Partial
CVE-2019-17178
https://www.cvedetails.com/cve/CVE-2019-17178/
CWE-772
Low
null
null
null
2019-10-04
5
HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
2019-10-11
null
0
https://github.com/akallabeth/FreeRDP/commit/fc80ab45621bd966f70594c0b7393ec005a94007
fc80ab45621bd966f70594c0b7393ec005a94007
Fixed #5645: realloc return handling
0
winpr/libwinpr/utils/lodepng/lodepng.c
{"sha": "1a3ebf563b886da2f0590bf25df2f8f554ad939a", "filename": "client/X11/generate_argument_docbook.c", "status": "modified", "additions": 27, "deletions": 6, "changes": 33, "blob_url": "https://github.com/akallabeth/FreeRDP/blob/fc80ab45621bd966f70594c0b7393ec005a94007/client/X11/generate_argument_docbook.c", "raw_u...
static unsigned zlib_decompress(unsigned char** out, size_t* outsize, const unsigned char* in, size_t insize, const LodePNGDecompressSettings* settings) { if(settings->custom_zlib) { return settings->custom_zlib(out, outsize, in, insize, settings); } else { return lodep...
static unsigned zlib_decompress(unsigned char** out, size_t* outsize, const unsigned char* in, size_t insize, const LodePNGDecompressSettings* settings) { if(settings->custom_zlib) { return settings->custom_zlib(out, outsize, in, insize, settings); } else { return lodep...
C
null
null
null
@@ -841,11 +841,15 @@ unsigned lodepng_huffman_code_lengths(unsigned* lengths, const unsigned* frequen static unsigned HuffmanTree_makeFromFrequencies(HuffmanTree* tree, const unsigned* frequencies, size_t mincodes, size_t numcodes, unsigned maxbitlen) { + unsigned* le...
FreeRDP
fc80ab45621bd966f70594c0b7393ec005a94007
a301e08be52f520fb4cb794b0c25c7de34351d59
0
static unsigned zlib_decompress(unsigned char** out, size_t* outsize, const unsigned char* in, size_t insize, const LodePNGDecompressSettings* settings) { if(settings->custom_zlib) { return settings->custom_zlib(out, outsize, in, insize, settings); } else { return lodep...
103,770
null
Remote
Not required
Partial
CVE-2011-2861
https://www.cvedetails.com/cve/CVE-2011-2861/
CWE-20
Medium
Partial
Partial
null
2011-09-19
6.8
Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce
8262245d384be025f13e2a5b3a03b7e5c98374ce
DevTools: move DevToolsAgent/Client into content. BUG=84078 TEST= Review URL: http://codereview.chromium.org/7461019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@93596 0039d316-1c4b-4281-b951-d872f2087c98
0
content/renderer/render_view.cc
{"sha": "24059d48a3bcbe447efb7408f77415576f0c36a4", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/8262245d384be025f13e2a5b3a03b7e5c98374ce/chrome/browser/chrome_content_browser_cli...
gfx::PluginWindowHandle RenderView::AllocateFakePluginWindowHandle( bool opaque, bool root) { gfx::PluginWindowHandle window = NULL; Send(new ViewHostMsg_AllocateFakePluginWindowHandle( routing_id(), opaque, root, &window)); if (window) { fake_plugin_window_handles_.insert(window); } return wind...
gfx::PluginWindowHandle RenderView::AllocateFakePluginWindowHandle( bool opaque, bool root) { gfx::PluginWindowHandle window = NULL; Send(new ViewHostMsg_AllocateFakePluginWindowHandle( routing_id(), opaque, root, &window)); if (window) { fake_plugin_window_handles_.insert(window); } return wind...
C
null
null
null
@@ -40,6 +40,7 @@ #include "content/common/url_constants.h" #include "content/common/view_messages.h" #include "content/renderer/content_renderer_client.h" +#include "content/renderer/devtools_agent.h" #include "content/renderer/device_orientation_dispatcher.h" #include "content/renderer/mhtml_generator.h" #inclu...
Chrome
8262245d384be025f13e2a5b3a03b7e5c98374ce
2469a22063c3539147f55fe899a8dabc12901c01
0
gfx::PluginWindowHandle RenderView::AllocateFakePluginWindowHandle( bool opaque, bool root) { gfx::PluginWindowHandle window = NULL; Send(new ViewHostMsg_AllocateFakePluginWindowHandle( routing_id(), opaque, root, &window)); if (window) { fake_plugin_window_handles_.insert(window); } return wind...
19,857
null
Local Network
Not required
Complete
CVE-2012-2375
https://www.cvedetails.com/cve/CVE-2012-2375/
CWE-189
High
null
null
null
2012-06-13
4.6
The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO...
2016-08-22
DoS
0
https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68
20e0fa98b751facf9a1101edaefbc19c82616a68
Fix length of buffer copied in __nfs4_get_acl_uncached _copy_from_pages() used to copy data from the temporary buffer to the user passed buffer is passed the wrong size parameter when copying data. res.acl_len contains both the bitmap and acl lenghts while acl_len contains the acl length after adjusting for the bitmap...
0
fs/nfs/nfs4proc.c
{"sha": "45df7d4a3acc1f92e18822b5285eb9d603ebe52b", "filename": "fs/nfs/nfs4proc.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/20e0fa98b751facf9a1101edaefbc19c82616a68/fs/nfs/nfs4proc.c", "raw_url": "https://github.com/torvalds/linux/raw/20e0...
static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags) { struct rpc_task *task; int ret = 0; if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0) return 0; task = _nfs41_proc_sequence(clp, cred); if (IS_ERR(task)) ret = PTR_ERR(task); else rpc_put_task_async(task)...
static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags) { struct rpc_task *task; int ret = 0; if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0) return 0; task = _nfs41_proc_sequence(clp, cred); if (IS_ERR(task)) ret = PTR_ERR(task); else rpc_put_task_async(task)...
C
null
null
null
@@ -3712,7 +3712,7 @@ static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t bu if (acl_len > buflen) goto out_free; _copy_from_pages(buf, pages, res.acl_data_offset, - res.acl_len); + acl_len); } ret = acl_len; out_free:
linux
20e0fa98b751facf9a1101edaefbc19c82616a68
250f6715a4112d6686670c5a62ceb9305da94616
0
static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags) { struct rpc_task *task; int ret = 0; if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0) return 0; task = _nfs41_proc_sequence(clp, cred); if (IS_ERR(task)) ret = PTR_ERR(task); else rpc_put_task_async(task)...
172,253
null
Remote
Not required
null
CVE-2016-3837
https://www.cvedetails.com/cve/CVE-2016-3837/
CWE-200
Medium
Partial
null
null
2016-08-05
4.3
service/jni/com_android_server_wifi_WifiNative.cpp in Wi-Fi in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows attackers to obtain sensitive information via a crafted application that provides a MAC address with too few characters, aka internal bug 28164077.
2016-11-28
+Info
0
https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399
a209ff12ba9617c10550678ff93d01fb72a33399
Deal correctly with short strings The parseMacAddress function anticipates only properly formed MAC addresses (6 hexadecimal octets separated by ":"). This change properly deals with situations where the string is shorter than expected, making sure that the passed in char* reference in parseHexByte never exceeds the ...
0
service/jni/com_android_server_wifi_WifiNative.cpp
{"filename": "service/jni/com_android_server_wifi_WifiNative.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/service/jni/com_android_server_wifi_WifiNative.cpp", "patch": "@@ -697,15 +697,23 @@\n\n }\n \n static byte parseHexByte(const char ...
static jboolean android_net_wifi_get_fw_memory_dump(JNIEnv *env, jclass cls, jint iface){ JNIHelper helper(env); wifi_interface_handle handle = getIfaceHandle(helper, cls, iface); if (handle == NULL) { ALOGE("Can not get wifi_interface_handle"); return false; } wifi_firmware_memory_dump_handler f...
static jboolean android_net_wifi_get_fw_memory_dump(JNIEnv *env, jclass cls, jint iface){ JNIHelper helper(env); wifi_interface_handle handle = getIfaceHandle(helper, cls, iface); if (handle == NULL) { ALOGE("Can not get wifi_interface_handle"); return false; } wifi_firmware_memory_dump_handler f...
C
null
null
null
@@ -697,15 +697,23 @@ } static byte parseHexByte(const char * &str) { + if (str[0] == '\0') { + ALOGE("Passed an empty string"); + return 0; + } byte b = parseHexChar(str[0]); - if (str[1] == ':' || str[1] == '\0') { - str += 2; - return b; + if (str[1] == '\0' || str[1...
Android
https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/
https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399%5E/
0
static jboolean android_net_wifi_get_fw_memory_dump(JNIEnv *env, jclass cls, jint iface){ JNIHelper helper(env); wifi_interface_handle handle = getIfaceHandle(helper, cls, iface); // ALOGD("android_net_wifi_get_fw_memory_dump = %p", handle); if (handle == NULL) { ALOGE("Can not get wifi_interface_handl...
147,234
null
Remote
Not required
null
CVE-2017-5120
https://www.cvedetails.com/cve/CVE-2017-5120/
null
Medium
null
Partial
null
2017-10-27
4.3
Inappropriate use of www mismatch redirects in browser navigation in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially downgrade HTTPS requests to HTTP via a crafted HTML page. In other words, Chrome could transmit cleartext even thou...
2019-10-02
null
0
https://github.com/chromium/chromium/commit/b7277af490d28ac7f802c015bb0ff31395768556
b7277af490d28ac7f802c015bb0ff31395768556
bindings: Support "attribute FrozenArray<T>?" Adds a quick hack to support a case of "attribute FrozenArray<T>?". Bug: 1028047 Change-Id: Ib3cecc4beb6bcc0fb0dbc667aca595454cc90c86 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1933866 Reviewed-by: Hitoshi Yoshida <peria@chromium.org> Commit-Qu...
0
third_party/blink/renderer/bindings/tests/results/core/v8_test_object.cc
{"sha": "e58cc6148f59f30b89a79cdb4626e3fec90229b9", "filename": "third_party/blink/renderer/bindings/scripts/v8_attributes.py", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/b7277af490d28ac7f802c015bb0ff31395768556/third_party/blink/renderer/b...
void V8TestObject::CSSAttributeAttributeGetterCallback(const v8::FunctionCallbackInfo<v8::Value>& info) { RUNTIME_CALL_TIMER_SCOPE_DISABLED_BY_DEFAULT(info.GetIsolate(), "Blink_TestObject_cssAttribute_Getter"); test_object_v8_internal::CSSAttributeAttributeGetter(info); }
void V8TestObject::CSSAttributeAttributeGetterCallback(const v8::FunctionCallbackInfo<v8::Value>& info) { RUNTIME_CALL_TIMER_SCOPE_DISABLED_BY_DEFAULT(info.GetIsolate(), "Blink_TestObject_cssAttribute_Getter"); test_object_v8_internal::CSSAttributeAttributeGetter(info); }
C
null
null
null
@@ -1387,12 +1387,13 @@ static void BooleanOrNullAttributeAttributeSetter( ExceptionState exception_state(isolate, ExceptionState::kSetterContext, "TestObject", "booleanOrNullAttribute"); + bool is_null = IsUndefinedOrNull(v8_value); + // Prepare the value to be set. - bool cpp_value = NativeValueTraits<IDL...
Chrome
b7277af490d28ac7f802c015bb0ff31395768556
bd20486aa79c853462458c065737a6815b5ea107
0
void V8TestObject::CSSAttributeAttributeGetterCallback(const v8::FunctionCallbackInfo<v8::Value>& info) { RUNTIME_CALL_TIMER_SCOPE_DISABLED_BY_DEFAULT(info.GetIsolate(), "Blink_TestObject_cssAttribute_Getter"); test_object_v8_internal::CSSAttributeAttributeGetter(info); }
68,370
null
Remote
Not required
Complete
CVE-2017-6001
https://www.cvedetails.com/cve/CVE-2017-6001/
CWE-362
High
Complete
Complete
null
2017-02-18
7.6
Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
2018-06-19
+Priv
0
https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290
321027c1fe77f892f4ea07846aeae08cefbbb290
perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race Di Shen reported a race between two concurrent sys_perf_event_open() calls where both try and move the same pre-existing software group into a hardware context. The problem is exactly that described in commit: f63a8daa5812 ("perf: Fix event->ctx...
0
kernel/events/core.c
{"sha": "cbc5937265da842bc714cbccf8091484caa5f536", "filename": "kernel/events/core.c", "status": "modified", "additions": 54, "deletions": 4, "changes": 58, "blob_url": "https://github.com/torvalds/linux/blob/321027c1fe77f892f4ea07846aeae08cefbbb290/kernel/events/core.c", "raw_url": "https://github.com/torvalds/linux/...
perf_event_output(struct perf_event *event, struct perf_sample_data *data, struct pt_regs *regs) { __perf_event_output(event, data, regs, perf_output_begin); }
perf_event_output(struct perf_event *event, struct perf_sample_data *data, struct pt_regs *regs) { __perf_event_output(event, data, regs, perf_output_begin); }
C
null
null
null
@@ -9529,6 +9529,37 @@ static int perf_event_set_clock(struct perf_event *event, clockid_t clk_id) return 0; } +/* + * Variation on perf_event_ctx_lock_nested(), except we take two context + * mutexes. + */ +static struct perf_event_context * +__perf_event_ctx_lock_double(struct perf_event *group_leader, + ...
linux
321027c1fe77f892f4ea07846aeae08cefbbb290
63cae12bce9861cec309798d34701cf3da20bc71
0
perf_event_output(struct perf_event *event, struct perf_sample_data *data, struct pt_regs *regs) { __perf_event_output(event, data, regs, perf_output_begin); }
101,686
null
Remote
Not required
Partial
CVE-2011-3896
https://www.cvedetails.com/cve/CVE-2011-3896/
CWE-119
Low
Partial
Partial
null
2011-11-11
7.5
Buffer overflow in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to shader variable mapping.
2017-09-18
DoS Overflow
0
https://github.com/chromium/chromium/commit/5925dff83699508b5e2735afb0297dfb310e159d
5925dff83699508b5e2735afb0297dfb310e159d
Implement a bubble that appears at the top of the screen when a tab enters fullscreen mode via webkitRequestFullScreen(), telling the user how to exit fullscreen. This is implemented as an NSView rather than an NSWindow because the floating chrome that appears in presentation mode should overlap the bubble. Cont...
0
chrome/browser/ui/browser.cc
{"sha": "eade4b30911a73d266fca78ed5cd3870f3b12f08", "filename": "chrome/app/nibs/FullscreenExitBubble.xib", "status": "added", "additions": 1122, "deletions": 0, "changes": 1122, "blob_url": "https://github.com/chromium/chromium/blob/5925dff83699508b5e2735afb0297dfb310e159d/chrome/app/nibs/FullscreenExitBubble.xib", "r...
void Browser::Home(WindowOpenDisposition disposition) { UserMetrics::RecordAction(UserMetricsAction("Home")); OpenURL(GetHomePage(), GURL(), disposition, PageTransition::AUTO_BOOKMARK | PageTransition::HOME_PAGE); }
void Browser::Home(WindowOpenDisposition disposition) { UserMetrics::RecordAction(UserMetricsAction("Home")); OpenURL(GetHomePage(), GURL(), disposition, PageTransition::AUTO_BOOKMARK | PageTransition::HOME_PAGE); }
C
null
null
null
@@ -1314,7 +1314,13 @@ void Browser::WindowFullscreenStateChanged() { MessageLoop::current()->PostTask( FROM_HERE, method_factory_.NewRunnableMethod( &Browser::NotifyFullscreenChange)); - if (!window_->IsFullscreen()) + bool notify_tab_of_exit; +#if defined(OS_MACOSX) + notify_tab_of_exit = !window_...
Chrome
5925dff83699508b5e2735afb0297dfb310e159d
66e1bd084a4818f624ee133f56163d0a71e472a3
0
void Browser::Home(WindowOpenDisposition disposition) { UserMetrics::RecordAction(UserMetricsAction("Home")); OpenURL(GetHomePage(), GURL(), disposition, PageTransition::AUTO_BOOKMARK | PageTransition::HOME_PAGE); }
43,546
null
Local
Not required
Complete
CVE-2015-3212
https://www.cvedetails.com/cve/CVE-2015-3212/
CWE-362
Low
null
null
null
2015-08-31
4.9
Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.
2019-04-08
DoS
0
https://github.com/torvalds/linux/commit/2d45a02d0166caf2627fe91897c6ffc3b19514c4
2d45a02d0166caf2627fe91897c6ffc3b19514c4
sctp: fix ASCONF list handling ->auto_asconf_splist is per namespace and mangled by functions like sctp_setsockopt_auto_asconf() which doesn't guarantee any serialization. Also, the call to inet_sk_copy_descendant() was backuping ->auto_asconf_list through the copy but was not honoring ->do_auto_asconf, which could l...
0
net/sctp/socket.c
{"sha": "8ba379f9e4678d7f00209a6b2ac12d41d82f4b25", "filename": "include/net/netns/sctp.h", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/2d45a02d0166caf2627fe91897c6ffc3b19514c4/include/net/netns/sctp.h", "raw_url": "https://github.com/torvalds/...
static int sctp_getsockopt_peer_addrs(struct sock *sk, int len, char __user *optval, int __user *optlen) { struct sctp_association *asoc; int cnt = 0; struct sctp_getaddrs getaddrs; struct sctp_transport *from; void __user *to; union sctp_addr temp; struct sctp_sock *sp = sctp_sk(sk); int addrlen; si...
static int sctp_getsockopt_peer_addrs(struct sock *sk, int len, char __user *optval, int __user *optlen) { struct sctp_association *asoc; int cnt = 0; struct sctp_getaddrs getaddrs; struct sctp_transport *from; void __user *to; union sctp_addr temp; struct sctp_sock *sp = sctp_sk(sk); int addrlen; si...
C
null
null
null
@@ -1528,8 +1528,10 @@ static void sctp_close(struct sock *sk, long timeout) /* Supposedly, no process has access to the socket, but * the net layers still may. + * Also, sctp_destroy_sock() needs to be called with addr_wq_lock + * held and that should be grabbed before socket lock. */ - local_bh_disable();...
linux
2d45a02d0166caf2627fe91897c6ffc3b19514c4
c8d17b451aa18b07b60e771addf17a5fdd4138c7
0
static int sctp_getsockopt_peer_addrs(struct sock *sk, int len, char __user *optval, int __user *optlen) { struct sctp_association *asoc; int cnt = 0; struct sctp_getaddrs getaddrs; struct sctp_transport *from; void __user *to; union sctp_addr temp; struct sctp_sock *sp = sctp_sk(sk); int addrlen; si...
143,105
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2016-07
null
0
https://github.com/chromium/chromium/commit/8353baf8d1504dbdd4ad7584ff2466de657521cd
8353baf8d1504dbdd4ad7584ff2466de657521cd
Remove WebFrame::canHaveSecureChild To simplify the public API, ServiceWorkerNetworkProvider can do the parent walk itself. Follow-up to https://crrev.com/ad1850962644e19. BUG=607543 Review-Url: https://codereview.chromium.org/2082493002 Cr-Commit-Position: refs/heads/master@{#400896}
0
content/child/service_worker/service_worker_network_provider.cc
{"sha": "5c883a0154ddb182d6ad680b5a4c77660f2b373f", "filename": "content/child/service_worker/service_worker_network_provider.cc", "status": "modified", "additions": 15, "deletions": 2, "changes": 17, "blob_url": "https://github.com/chromium/chromium/blob/8353baf8d1504dbdd4ad7584ff2466de657521cd/content/child/service_w...
ServiceWorkerNetworkProvider::ServiceWorkerNetworkProvider( int route_id, ServiceWorkerProviderType provider_type, int browser_provider_id, bool is_parent_frame_secure) : provider_id_(browser_provider_id) { if (provider_id_ == kInvalidServiceWorkerProviderId) return; if (!ChildThreadImpl::cu...
ServiceWorkerNetworkProvider::ServiceWorkerNetworkProvider( int route_id, ServiceWorkerProviderType provider_type, int browser_provider_id, bool is_parent_frame_secure) : provider_id_(browser_provider_id) { if (provider_id_ == kInvalidServiceWorkerProviderId) return; if (!ChildThreadImpl::cu...
C
null
null
null
@@ -11,6 +11,7 @@ #include "content/common/service_worker/service_worker_messages.h" #include "content/common/service_worker/service_worker_utils.h" #include "content/public/common/browser_side_navigation_policy.h" +#include "third_party/WebKit/public/platform/WebSecurityOrigin.h" #include "third_party/WebKit/publi...
Chrome
8353baf8d1504dbdd4ad7584ff2466de657521cd
04817566fb446d8315cbc4049266c4859a010a74
0
ServiceWorkerNetworkProvider::ServiceWorkerNetworkProvider( int route_id, ServiceWorkerProviderType provider_type, int browser_provider_id, bool is_parent_frame_secure) : provider_id_(browser_provider_id) { if (provider_id_ == kInvalidServiceWorkerProviderId) return; if (!ChildThreadImpl::cu...
170,835
null
Remote
Not required
Complete
CVE-2015-1536
https://www.cvedetails.com/cve/CVE-2015-1536/
CWE-189
Low
Partial
null
null
2015-09-30
8.5
Integer overflow in the Bitmap_createFromParcel function in core/jni/android/graphics/Bitmap.cpp in Android before 5.1.1 LMY48I allows attackers to cause a denial of service (system_server crash) or obtain sensitive system_server memory-content information via a crafted application that leverages improper unmarshalling...
2015-10-01
DoS Overflow +Info
0
https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb
d44e5bde18a41beda39d49189bef7f2ba7c8f3cb
Make Bitmap_createFromParcel check the color count. DO NOT MERGE When reading from the parcel, if the number of colors is invalid, early exit. Add two more checks: setInfo must return true, and Parcel::readInplace must return non-NULL. The former ensures that the previously read values (width, height, etc) were valid...
0
core/jni/android/graphics/Bitmap.cpp
{"filename": "core/jni/android/graphics/Bitmap.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb/core/jni/android/graphics/Bitmap.cpp", "patch": "@@ -575,24 +575,33 @@\n\n return NULL;\n }\n \n- SkBitmap* bitmap = new SkBitmap;\n+ Sk...
static void ToColor_S565(SkColor dst[], const void* src, int width, SkColorTable*) { SkASSERT(width > 0); const uint16_t* s = (const uint16_t*)src; do { uint16_t c = *s++; *dst++ = SkColorSetRGB(SkPacked16ToR32(c), SkPacked16ToG32(c), SkPacked16ToB32(c)); } while (--width != 0); }
static void ToColor_S565(SkColor dst[], const void* src, int width, SkColorTable*) { SkASSERT(width > 0); const uint16_t* s = (const uint16_t*)src; do { uint16_t c = *s++; *dst++ = SkColorSetRGB(SkPacked16ToR32(c), SkPacked16ToG32(c), SkPacked16ToB32(c)); } while (--width != 0); }
C
null
null
null
@@ -575,24 +575,33 @@ return NULL; } - SkBitmap* bitmap = new SkBitmap; + SkAutoTDelete<SkBitmap> bitmap(new SkBitmap); - bitmap->setInfo(SkImageInfo::Make(width, height, colorType, alphaType), rowBytes); + if (!bitmap->setInfo(SkImageInfo::Make(width, height, colorType, alphaType), rowBy...
Android
https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb/
https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb%5E/
0
static void ToColor_S565(SkColor dst[], const void* src, int width, SkColorTable*) { SkASSERT(width > 0); const uint16_t* s = (const uint16_t*)src; do { uint16_t c = *s++; *dst++ = SkColorSetRGB(SkPacked16ToR32(c), SkPacked16ToG32(c), SkPacked16ToB32(c)); } while (--width != 0); }
70,314
null
Remote
Not required
Partial
CVE-2016-10267
https://www.cvedetails.com/cve/CVE-2016-10267/
CWE-369
Medium
null
null
null
2017-03-24
4.3
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.
2018-03-21
DoS
0
https://github.com/vadz/libtiff/commit/43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec
43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec
* libtiff/tif_ojpeg.c: make OJPEGDecode() early exit in case of failure in OJPEGPreDecode(). This will avoid a divide by zero, and potential other issues. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611
0
libtiff/tif_ojpeg.c
{"sha": "5b23665b1730e31dea0f6ca7e1fb403612a973d6", "filename": "ChangeLog", "status": "modified", "additions": 7, "deletions": 0, "changes": 7, "blob_url": "https://github.com/vadz/libtiff/blob/43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec/ChangeLog", "raw_url": "https://github.com/vadz/libtiff/raw/43bc256d8ae44b92d2734a3c...
OJPEGWriteStreamAcTable(TIFF* tif, uint8 table_index, void** mem, uint32* len) { OJPEGState* sp=(OJPEGState*)tif->tif_data; if (sp->actable[table_index]!=0) { *mem=(void*)(sp->actable[table_index]+sizeof(uint32)); *len=*((uint32*)sp->actable[table_index])-sizeof(uint32); } sp->out_state++; }
OJPEGWriteStreamAcTable(TIFF* tif, uint8 table_index, void** mem, uint32* len) { OJPEGState* sp=(OJPEGState*)tif->tif_data; if (sp->actable[table_index]!=0) { *mem=(void*)(sp->actable[table_index]+sizeof(uint32)); *len=*((uint32*)sp->actable[table_index])-sizeof(uint32); } sp->out_state++; }
C
null
null
null
@@ -244,6 +244,7 @@ typedef enum { typedef struct { TIFF* tif; + int decoder_ok; #ifndef LIBJPEG_ENCAP_EXTERNAL JMP_BUF exit_jmpbuf; #endif @@ -722,6 +723,7 @@ OJPEGPreDecode(TIFF* tif, uint16 s) } sp->write_curstrile++; } + sp->decoder_ok = 1; return(1); } @@ -784,8 +786,14 @@ OJPEGPreDe...
libtiff
43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec
9a72a69e035ee70ff5c41541c8c61cd97990d018
0
OJPEGWriteStreamAcTable(TIFF* tif, uint8 table_index, void** mem, uint32* len) { OJPEGState* sp=(OJPEGState*)tif->tif_data; if (sp->actable[table_index]!=0) { *mem=(void*)(sp->actable[table_index]+sizeof(uint32)); *len=*((uint32*)sp->actable[table_index])-sizeof(uint32); } sp->out_state++; }
147,807
null
Remote
Not required
null
CVE-2017-5120
https://www.cvedetails.com/cve/CVE-2017-5120/
null
Medium
null
Partial
null
2017-10-27
4.3
Inappropriate use of www mismatch redirects in browser navigation in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially downgrade HTTPS requests to HTTP via a crafted HTML page. In other words, Chrome could transmit cleartext even thou...
2019-10-02
null
0
https://github.com/chromium/chromium/commit/b7277af490d28ac7f802c015bb0ff31395768556
b7277af490d28ac7f802c015bb0ff31395768556
bindings: Support "attribute FrozenArray<T>?" Adds a quick hack to support a case of "attribute FrozenArray<T>?". Bug: 1028047 Change-Id: Ib3cecc4beb6bcc0fb0dbc667aca595454cc90c86 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1933866 Reviewed-by: Hitoshi Yoshida <peria@chromium.org> Commit-Qu...
0
third_party/blink/renderer/bindings/tests/results/core/v8_test_object.cc
{"sha": "e58cc6148f59f30b89a79cdb4626e3fec90229b9", "filename": "third_party/blink/renderer/bindings/scripts/v8_attributes.py", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/b7277af490d28ac7f802c015bb0ff31395768556/third_party/blink/renderer/b...
static void RuntimeEnabledOverloadedVoidMethod1Method(const v8::FunctionCallbackInfo<v8::Value>& info) { TestObject* impl = V8TestObject::ToImpl(info.Holder()); V8StringResource<> string_arg; string_arg = info[0]; if (!string_arg.Prepare()) return; impl->runtimeEnabledOverloadedVoidMethod(string_arg); }...
static void RuntimeEnabledOverloadedVoidMethod1Method(const v8::FunctionCallbackInfo<v8::Value>& info) { TestObject* impl = V8TestObject::ToImpl(info.Holder()); V8StringResource<> string_arg; string_arg = info[0]; if (!string_arg.Prepare()) return; impl->runtimeEnabledOverloadedVoidMethod(string_arg); }...
C
null
null
null
@@ -1387,12 +1387,13 @@ static void BooleanOrNullAttributeAttributeSetter( ExceptionState exception_state(isolate, ExceptionState::kSetterContext, "TestObject", "booleanOrNullAttribute"); + bool is_null = IsUndefinedOrNull(v8_value); + // Prepare the value to be set. - bool cpp_value = NativeValueTraits<IDL...
Chrome
b7277af490d28ac7f802c015bb0ff31395768556
bd20486aa79c853462458c065737a6815b5ea107
0
static void RuntimeEnabledOverloadedVoidMethod1Method(const v8::FunctionCallbackInfo<v8::Value>& info) { TestObject* impl = V8TestObject::ToImpl(info.Holder()); V8StringResource<> string_arg; string_arg = info[0]; if (!string_arg.Prepare()) return; impl->runtimeEnabledOverloadedVoidMethod(string_arg); }...
70,969
null
Remote
Not required
Partial
CVE-2016-10165
https://www.cvedetails.com/cve/CVE-2016-10165/
CWE-125
Medium
Partial
null
null
2017-02-03
5.8
The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
2018-10-30
DoS +Info
0
https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2
5ca71a7bc18b6897ab21d815d15e218e204581e2
Added an extra check to MLU bounds Thanks to Ibrahim el-sayed for spotting the bug
0
src/cmstypes.c
{"sha": "c7328b9999826069e919f57bed4fef69210e5173", "filename": "src/cmstypes.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/mm2/Little-CMS/blob/5ca71a7bc18b6897ab21d815d15e218e204581e2/src/cmstypes.c", "raw_url": "https://github.com/mm2/Little-CMS/raw/5ca71a7bc1...
void Type_ColorantOrderType_Free(struct _cms_typehandler_struct* self, void* Ptr) { _cmsFree(self ->ContextID, Ptr); }
void Type_ColorantOrderType_Free(struct _cms_typehandler_struct* self, void* Ptr) { _cmsFree(self ->ContextID, Ptr); }
C
null
null
null
@@ -1460,6 +1460,7 @@ void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsU // Check for overflow if (Offset < (SizeOfHeader + 8)) goto Error; + if ((Offset + Len) > SizeOfTag + 8) goto Error; // True begin of the string BeginOfThisString = Offse...
Little-CMS
5ca71a7bc18b6897ab21d815d15e218e204581e2
696d6b171fd8c270aeaa2cd1a69f6211426fd6b1
0
void Type_ColorantOrderType_Free(struct _cms_typehandler_struct* self, void* Ptr) { _cmsFree(self ->ContextID, Ptr); }
110,775
null
Remote
Not required
Partial
CVE-2012-2875
https://www.cvedetails.com/cve/CVE-2012-2875/
null
Medium
Partial
Partial
null
2012-09-26
6.8
Multiple unspecified vulnerabilities in the PDF functionality in Google Chrome before 22.0.1229.79 allow remote attackers to have an unknown impact via a crafted document.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/0e9e87823285d504a210dcce2eabdc847f230f09
0e9e87823285d504a210dcce2eabdc847f230f09
Adds per-provider information to omnibox UMA logs. Adds a fairly general structure to omnibox logs that can be used to pass information (that's not per-result information) from providers to the UMA logs. Right now it's only used to pass whether the asynchronous pass of a provider has finished, but it will probably be...
0
chrome/browser/autocomplete/autocomplete_edit.cc
{"sha": "d646a2f54f1a98d22adb0561e73247de7d05f4a5", "filename": "chrome/browser/autocomplete/autocomplete.cc", "status": "modified", "additions": 46, "deletions": 1, "changes": 47, "blob_url": "https://github.com/chromium/chromium/blob/0e9e87823285d504a210dcce2eabdc847f230f09/chrome/browser/autocomplete/autocomplete.cc...
AutocompleteEditModel::ClassifyPage(const GURL& gurl) const { if (!gurl.is_valid()) return metrics::OmniboxEventProto_PageClassification_INVALID_SPEC; const std::string& url = gurl.spec(); if (url == chrome::kChromeUINewTabURL) return metrics::OmniboxEventProto_PageClassification_NEW_TAB_PAGE; if (u...
AutocompleteEditModel::ClassifyPage(const GURL& gurl) const { if (!gurl.is_valid()) return metrics::OmniboxEventProto_PageClassification_INVALID_SPEC; const std::string& url = gurl.spec(); if (url == chrome::kChromeUINewTabURL) return metrics::OmniboxEventProto_PageClassification_NEW_TAB_PAGE; if (u...
C
null
null
null
@@ -539,6 +539,7 @@ void AutocompleteEditModel::OpenMatch(const AutocompleteMatch& match, log.tab_id = controller_->GetTabContentsWrapper()-> restore_tab_helper()->session_id().id(); } + autocomplete_controller_->AddProvidersInfo(&log.providers_info); content::NotificationService::current...
Chrome
0e9e87823285d504a210dcce2eabdc847f230f09
ace4a123275eba3934dc1b1b7c2d8dc859d2e07a
0
AutocompleteEditModel::ClassifyPage(const GURL& gurl) const { if (!gurl.is_valid()) return metrics::OmniboxEventProto_PageClassification_INVALID_SPEC; const std::string& url = gurl.spec(); if (url == chrome::kChromeUINewTabURL) return metrics::OmniboxEventProto_PageClassification_NEW_TAB_PAGE; if (u...
63,768
null
Remote
Not required
Partial
CVE-2017-10807
https://www.cvedetails.com/cve/CVE-2017-10807/
CWE-287
Low
Partial
Partial
null
2017-07-04
7.5
JabberD 2.x (aka jabberd2) before 2.6.1 allows anyone to authenticate using SASL ANONYMOUS, even when the sasl.anonymous c2s.xml option is not enabled.
2017-11-03
null
0
https://github.com/jabberd2/jabberd2/commit/8416ae54ecefa670534f27a31db71d048b9c7f16
8416ae54ecefa670534f27a31db71d048b9c7f16
Fixed offered SASL mechanism check
0
sx/sasl.c
{"sha": "7972c5474f8eed00a529fb2c94d025a0cc1ab43b", "filename": "c2s/main.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/jabberd2/jabberd2/blob/8416ae54ecefa670534f27a31db71d048b9c7f16/c2s/main.c", "raw_url": "https://github.com/jabberd2/jabberd2/raw/8416ae54ecef...
static nad_t _sx_sasl_challenge(sx_t s, const char *data, int dlen) { nad_t nad; int ns; nad = nad_new(); ns = nad_add_namespace(nad, uri_SASL, NULL); nad_append_elem(nad, ns, "challenge", 0); if(data != NULL) nad_append_cdata(nad, data, dlen, 1); return nad; }
static nad_t _sx_sasl_challenge(sx_t s, const char *data, int dlen) { nad_t nad; int ns; nad = nad_new(); ns = nad_add_namespace(nad, uri_SASL, NULL); nad_append_elem(nad, ns, "challenge", 0); if(data != NULL) nad_append_cdata(nad, data, dlen, 1); return nad; }
C
null
null
null
@@ -332,7 +332,7 @@ static void _sx_sasl_client_process(sx_t s, sx_plugin_t p, Gsasl_session *sd, co if(mech != NULL) { _sx_debug(ZONE, "auth request from client (mechanism=%s)", mech); - if(!gsasl_server_support_p(ctx->gsasl_ctx, mech)) { + if(!gsasl_server_support_p(ctx->gsasl_ctx, mech)...
jabberd2
8416ae54ecefa670534f27a31db71d048b9c7f16
e5c5518701e270070f974e5a9f5dc72ad9679e2e
0
static nad_t _sx_sasl_challenge(sx_t s, const char *data, int dlen) { nad_t nad; int ns; nad = nad_new(); ns = nad_add_namespace(nad, uri_SASL, NULL); nad_append_elem(nad, ns, "challenge", 0); if(data != NULL) nad_append_cdata(nad, data, dlen, 1); return nad; }
98,020
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2010-10
null
0
https://github.com/chromium/chromium/commit/5041f984669fe3a989a84c348eb838c8f7233f6b
5041f984669fe3a989a84c348eb838c8f7233f6b
AutoFill: Release the cached frame when we receive the frameDestroyed() message from WebKit. BUG=48857 TEST=none Review URL: http://codereview.chromium.org/3173005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@55789 0039d316-1c4b-4281-b951-d872f2087c98
0
chrome/renderer/render_view.cc
{"sha": "c1f5e65e2fce7f24461a62827a343d3f1ffb96bf", "filename": "chrome/renderer/autofill_helper.cc", "status": "modified", "additions": 4, "deletions": 0, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/5041f984669fe3a989a84c348eb838c8f7233f6b/chrome/renderer/autofill_helper.cc", "raw_url": "https...
RenderView::RenderView(RenderThreadBase* render_thread, const WebPreferences& webkit_preferences, int64 session_storage_namespace_id) : RenderWidget(render_thread, WebKit::WebPopupTypeNone), webkit_preferences_(webkit_preferences), send_content_state_immedia...
RenderView::RenderView(RenderThreadBase* render_thread, const WebPreferences& webkit_preferences, int64 session_storage_namespace_id) : RenderWidget(render_thread, WebKit::WebPopupTypeNone), webkit_preferences_(webkit_preferences), send_content_state_immedia...
C
null
null
null
@@ -2393,6 +2393,10 @@ WebCookieJar* RenderView::cookieJar() { return &cookie_jar_; } +void RenderView::frameDetached(WebFrame* frame) { + autofill_helper_.FrameDetached(frame); +} + void RenderView::willClose(WebFrame* frame) { if (!frame->parent()) { const GURL& url = frame->url(); @@ -2404,6 +2408,7 ...
Chrome
5041f984669fe3a989a84c348eb838c8f7233f6b
64fd176302087ad4de3d88770cf948479a1e9852
0
RenderView::RenderView(RenderThreadBase* render_thread, const WebPreferences& webkit_preferences, int64 session_storage_namespace_id) : RenderWidget(render_thread, WebKit::WebPopupTypeNone), webkit_preferences_(webkit_preferences), send_content_state_immedia...
32,524
null
Local
Not required
Partial
CVE-2013-1929
https://www.cvedetails.com/cve/CVE-2013-1929/
CWE-119
Medium
Partial
Partial
null
2013-06-07
4.4
Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data...
2014-01-03
DoS Exec Code Overflow
0
https://github.com/torvalds/linux/commit/715230a44310a8cf66fbfb5a46f9a62a9b2de424
715230a44310a8cf66fbfb5a46f9a62a9b2de424
tg3: fix length overflow in VPD firmware parsing Commit 184b89044fb6e2a74611dafa69b1dce0d98612c6 ("tg3: Use VPD fw version when present") introduced VPD parsing that contained a potential length overflow. Limit the hardware's reported firmware string length (max 255 bytes) to stay inside the driver's firmware string ...
0
drivers/net/ethernet/broadcom/tg3.c
{"sha": "17a972734ba746d9218df4bf025218a91ebee947", "filename": "drivers/net/ethernet/broadcom/tg3.c", "status": "modified", "additions": 5, "deletions": 2, "changes": 7, "blob_url": "https://github.com/torvalds/linux/blob/715230a44310a8cf66fbfb5a46f9a62a9b2de424/drivers/net/ethernet/broadcom/tg3.c", "raw_url": "https:...
static int tg3_do_test_dma(struct tg3 *tp, u32 *buf, dma_addr_t buf_dma, int size, int to_device) { struct tg3_internal_buffer_desc test_desc; u32 sram_dma_descs; int i, ret; sram_dma_descs = NIC_SRAM_DMA_DESC_POOL_BASE; tw32(FTQ_RCVBD_COMP_FIFO_ENQDEQ, 0); tw32(FTQ_RCVDATA_COMP_FIFO_ENQDEQ, 0); tw32(RDM...
static int tg3_do_test_dma(struct tg3 *tp, u32 *buf, dma_addr_t buf_dma, int size, int to_device) { struct tg3_internal_buffer_desc test_desc; u32 sram_dma_descs; int i, ret; sram_dma_descs = NIC_SRAM_DMA_DESC_POOL_BASE; tw32(FTQ_RCVBD_COMP_FIFO_ENQDEQ, 0); tw32(FTQ_RCVDATA_COMP_FIFO_ENQDEQ, 0); tw32(RDM...
C
null
null
null
@@ -14604,8 +14604,11 @@ static void tg3_read_vpd(struct tg3 *tp) if (j + len > block_end) goto partno; - memcpy(tp->fw_ver, &vpd_data[j], len); - strncat(tp->fw_ver, " bc ", vpdlen - len - 1); + if (len >= sizeof(tp->fw_ver)) + len = sizeof(tp->fw_ver) - 1; + memset(tp->fw_ver, 0, sizeof(tp->fw_ver)); +...
linux
715230a44310a8cf66fbfb5a46f9a62a9b2de424
ea872d7712528ad991bdabb63515bc00ee10993e
0
static int tg3_do_test_dma(struct tg3 *tp, u32 *buf, dma_addr_t buf_dma, int size, int to_device) { struct tg3_internal_buffer_desc test_desc; u32 sram_dma_descs; int i, ret; sram_dma_descs = NIC_SRAM_DMA_DESC_POOL_BASE; tw32(FTQ_RCVBD_COMP_FIFO_ENQDEQ, 0); tw32(FTQ_RCVDATA_COMP_FIFO_ENQDEQ, 0); tw32(RDM...
21,235
null
Local Network
Single system
Complete
CVE-2012-1179
https://www.cvedetails.com/cve/CVE-2012-1179/
CWE-264
Medium
null
null
null
2012-05-17
5.2
The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial of service (host OS crash) by leveraging administrative access to the guest OS, related to the pmd_none_or_clear_bad function and page faults for huge pages.
2017-12-28
DoS
0
https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850
4a1d704194a441bf83c636004a479e01360ec850
mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode commit 1a5a9906d4e8d1976b701f889d8f35d54b928f25 upstream. In some cases it may happen that pmd_none_or_clear_bad() is called with the mmap_sem hold in read mode. In those cases the huge page faults can allocate hugepmds under pmd_none_or_clea...
0
mm/memory.c
{"sha": "328cb37bb827915ccc3e87cc6518acd7ccf25686", "filename": "arch/x86/kernel/vm86_32.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/4a1d704194a441bf83c636004a479e01360ec850/arch/x86/kernel/vm86_32.c", "raw_url": "https://github.com/torvald...
int generic_access_phys(struct vm_area_struct *vma, unsigned long addr, void *buf, int len, int write) { resource_size_t phys_addr; unsigned long prot = 0; void __iomem *maddr; int offset = addr & (PAGE_SIZE-1); if (follow_phys(vma, addr, write, &prot, &phys_addr)) return -EINVAL; maddr = ioremap_prot(phys...
int generic_access_phys(struct vm_area_struct *vma, unsigned long addr, void *buf, int len, int write) { resource_size_t phys_addr; unsigned long prot = 0; void __iomem *maddr; int offset = addr & (PAGE_SIZE-1); if (follow_phys(vma, addr, write, &prot, &phys_addr)) return -EINVAL; maddr = ioremap_prot(phys...
C
null
null
null
@@ -1247,16 +1247,24 @@ static inline unsigned long zap_pmd_range(struct mmu_gather *tlb, do { next = pmd_addr_end(addr, end); if (pmd_trans_huge(*pmd)) { - if (next-addr != HPAGE_PMD_SIZE) { + if (next - addr != HPAGE_PMD_SIZE) { VM_BUG_ON(!rwsem_is_locked(&tlb->mm->mmap_sem)); split_huge_page_pm...
linux
4a1d704194a441bf83c636004a479e01360ec850
a998dc2fa76f496d2944f0602b920d1d10d7467d
0
int generic_access_phys(struct vm_area_struct *vma, unsigned long addr, void *buf, int len, int write) { resource_size_t phys_addr; unsigned long prot = 0; void __iomem *maddr; int offset = addr & (PAGE_SIZE-1); if (follow_phys(vma, addr, write, &prot, &phys_addr)) return -EINVAL; maddr = ioremap_prot(phys...
156,573
null
Remote
Not required
null
CVE-2018-18346
https://www.cvedetails.com/cve/CVE-2018-18346/
CWE-20
Medium
null
Partial
null
2018-12-11
4.3
Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page.
2019-08-17
null
0
https://github.com/chromium/chromium/commit/9004be20a4cfde70456579489258c3aca4ed45a4
9004be20a4cfde70456579489258c3aca4ed45a4
Add trace event to sync_sessions::OnReadAllMetadata() It is likely a cause of janks on UI thread on Android. Add a trace event to get metrics about the duration. BUG=902203 Change-Id: I4c4e9c2a20790264b982007ea7ee88ddfa7b972c Reviewed-on: https://chromium-review.googlesource.com/c/1319369 Reviewed-by: Mikel Astiz <m...
0
components/sync_sessions/session_store.cc
{"sha": "300f40f91e2d69ec124e8c228d04ee6e9a7fc867", "filename": "components/sync_sessions/session_store.cc", "status": "modified", "additions": 3, "deletions": 0, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/9004be20a4cfde70456579489258c3aca4ed45a4/components/sync_sessions/session_store.cc", "ra...
bool SessionStore::AreValidSpecifics(const SessionSpecifics& specifics) { if (specifics.session_tag().empty()) { return false; } if (specifics.has_tab()) { return specifics.tab_node_id() >= 0 && specifics.tab().tab_id() > 0; } if (specifics.has_header()) { std::set<int> session_tab_ids; for (c...
bool SessionStore::AreValidSpecifics(const SessionSpecifics& specifics) { if (specifics.session_tag().empty()) { return false; } if (specifics.has_tab()) { return specifics.tab_node_id() >= 0 && specifics.tab().tab_id() > 0; } if (specifics.has_header()) { std::set<int> session_tab_ids; for (c...
C
null
null
null
@@ -16,6 +16,7 @@ #include "base/metrics/histogram_macros.h" #include "base/pickle.h" #include "base/strings/stringprintf.h" +#include "base/trace_event/trace_event.h" #include "components/sync/base/time.h" #include "components/sync/device_info/device_info.h" #include "components/sync/device_info/device_info_util...
Chrome
9004be20a4cfde70456579489258c3aca4ed45a4
ce6ad323cd9aa0c49aa7245fe942dc5b9a91e421
0
bool SessionStore::AreValidSpecifics(const SessionSpecifics& specifics) { if (specifics.session_tag().empty()) { return false; } if (specifics.has_tab()) { return specifics.tab_node_id() >= 0 && specifics.tab().tab_id() > 0; } if (specifics.has_header()) { // Verify that tab IDs appear only once w...
19,408
null
Remote
Not required
Complete
CVE-2012-3412
https://www.cvedetails.com/cve/CVE-2012-3412/
CWE-189
Low
null
null
null
2012-10-03
7.8
The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
2013-08-17
DoS
0
https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c
68cb695ccecf949d48949e72f8ce591fdaaa325c
sfc: Fix maximum number of TSO segments and minimum TX queue size [ Upstream commit 7e6d06f0de3f74ca929441add094518ae332257c ] Currently an skb requiring TSO may not fit within a minimum-size TX queue. The TX queue selected for the skb may stall and trigger the TX watchdog repeatedly (since the problem skb will be r...
0
drivers/net/ethernet/sfc/efx.c
{"sha": "a6611f1c48f90fcaa0d83ff1532cdc5cbbbf7acb", "filename": "drivers/net/ethernet/sfc/efx.c", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/68cb695ccecf949d48949e72f8ce591fdaaa325c/drivers/net/ethernet/sfc/efx.c", "raw_url": "https://github.c...
static int efx_probe_channels(struct efx_nic *efx) { struct efx_channel *channel; int rc; /* Restart special buffer allocation */ efx->next_buffer_table = 0; efx_for_each_channel(channel, efx) { rc = efx_probe_channel(channel); if (rc) { netif_err(efx, probe, efx->net_dev, "failed to create channel ...
static int efx_probe_channels(struct efx_nic *efx) { struct efx_channel *channel; int rc; /* Restart special buffer allocation */ efx->next_buffer_table = 0; efx_for_each_channel(channel, efx) { rc = efx_probe_channel(channel); if (rc) { netif_err(efx, probe, efx->net_dev, "failed to create channel ...
C
null
null
null
@@ -1383,6 +1383,11 @@ static int efx_probe_all(struct efx_nic *efx) goto fail2; } + BUILD_BUG_ON(EFX_DEFAULT_DMAQ_SIZE < EFX_RXQ_MIN_ENT); + if (WARN_ON(EFX_DEFAULT_DMAQ_SIZE < EFX_TXQ_MIN_ENT(efx))) { + rc = -EINVAL; + goto fail3; + } efx->rxq_entries = efx->txq_entries = EFX_DEFAULT_DMAQ_SIZE; rc = efx_...
linux
68cb695ccecf949d48949e72f8ce591fdaaa325c
99ea81edff2135603588fe12bd95cca2dd76a5cb
0
static int efx_probe_channels(struct efx_nic *efx) { struct efx_channel *channel; int rc; /* Restart special buffer allocation */ efx->next_buffer_table = 0; efx_for_each_channel(channel, efx) { rc = efx_probe_channel(channel); if (rc) { netif_err(efx, probe, efx->net_dev, "failed to create channel ...
78,607
null
Local
Not required
Partial
CVE-2018-16427
https://www.cvedetails.com/cve/CVE-2018-16427/
CWE-125
Low
null
null
null
2018-09-03
2.1
Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs.
2019-08-06
null
0
https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
fixed out of bounds reads Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting and suggesting security fixes.
0
src/libopensc/card-openpgp.c
{"sha": "e43c0f13620dd8328fc88f81a476ce91869ed952", "filename": "src/libopensc/asn1.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/OpenSC/OpenSC/blob/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa/src/libopensc/asn1.c", "raw_url": "https://github.com/OpenSC/OpenSC/raw/...
pgp_seek_blob(sc_card_t *card, pgp_blob_t *root, unsigned int id, pgp_blob_t **ret) { pgp_blob_t *child; int r; if ((r = pgp_get_blob(card, root, id, ret)) == 0) /* the sought blob is right under root */ return r; /* not found, seek deeper */ for (child = root->files; child; child = child->next) { /* T...
pgp_seek_blob(sc_card_t *card, pgp_blob_t *root, unsigned int id, pgp_blob_t **ret) { pgp_blob_t *child; int r; if ((r = pgp_get_blob(card, root, id, ret)) == 0) /* the sought blob is right under root */ return r; /* not found, seek deeper */ for (child = root->files; child; child = child->next) { /* T...
C
null
null
null
@@ -1061,6 +1061,9 @@ pgp_enumerate_blob(sc_card_t *card, pgp_blob_t *blob) const u8 *data = in; pgp_blob_t *new; + if (!in) + return SC_ERROR_OBJECT_NOT_VALID; + r = sc_asn1_read_tag(&data, blob->len - (in - blob->data), &cla, &tag, &len); if (r < 0 || data == NULL) { @@ -1069,6 +1072,9 @@ pgp_e...
OpenSC
8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
f66ceab4bbc3cae529a22b5f3688076cc119bd7c
0
pgp_seek_blob(sc_card_t *card, pgp_blob_t *root, unsigned int id, pgp_blob_t **ret) { pgp_blob_t *child; int r; if ((r = pgp_get_blob(card, root, id, ret)) == 0) /* the sought blob is right under root */ return r; /* not found, seek deeper */ for (child = root->files; child; child = child->next) { /* T...
181,081
null
Remote
Not required
Partial
CVE-2017-12998
https://www.cvedetails.com/cve/CVE-2017-12998/
CWE-125
Low
Partial
Partial
null
2017-09-14
7.5
The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach().
2019-10-02
null
1
https://github.com/the-tcpdump-group/tcpdump/commit/979dcefd7b259e9e233f77fe1c5312793bfd948f
979dcefd7b259e9e233f77fe1c5312793bfd948f
CVE-2017-12998/IS-IS: Check for 2 bytes if we're going to fetch 2 bytes. Probably a copy-and-pasteo. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the capture file supplied by the reporter(s).
1
print-isoclns.c
{"sha": "1f871603a4babf241ae29cc0ca086e32515762c2", "filename": "print-isoclns.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/the-tcpdump-group/tcpdump/blob/979dcefd7b259e9e233f77fe1c5312793bfd948f/print-isoclns.c", "raw_url": "https://github.com/the-tcpdump-grou...
isis_print_extd_ip_reach(netdissect_options *ndo, const uint8_t *tptr, const char *ident, uint16_t afi) { char ident_buffer[20]; uint8_t prefix[sizeof(struct in6_addr)]; /* shared copy buffer for IPv4 and IPv6 prefixes */ u_int metric, status_byte, bit_length, byte_length, sublen, p...
isis_print_extd_ip_reach(netdissect_options *ndo, const uint8_t *tptr, const char *ident, uint16_t afi) { char ident_buffer[20]; uint8_t prefix[sizeof(struct in6_addr)]; /* shared copy buffer for IPv4 and IPv6 prefixes */ u_int metric, status_byte, bit_length, byte_length, sublen, p...
C
if (!ND_TTEST2(*tptr, 2)) /* fetch status & prefix_len byte */
if (!ND_TTEST2(*tptr, 1)) /* fetch status & prefix_len byte */
null
@@ -2038,7 +2038,7 @@ isis_print_extd_ip_reach(netdissect_options *ndo, } processed++; } else if (afi == AF_INET6) { - if (!ND_TTEST2(*tptr, 1)) /* fetch status & prefix_len byte */ + if (!ND_TTEST2(*tptr, 2)) /* fetch status & prefix_len byte */ return (0); st...
tcpdump
979dcefd7b259e9e233f77fe1c5312793bfd948f
3b32029db354cbc875127869d9b12a9addc75b50
1
isis_print_extd_ip_reach(netdissect_options *ndo, const uint8_t *tptr, const char *ident, uint16_t afi) { char ident_buffer[20]; uint8_t prefix[sizeof(struct in6_addr)]; /* shared copy buffer for IPv4 and IPv6 prefixes */ u_int metric, status_byte, bit_length, byte_length, sublen, p...
143,227
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2016-07
null
0
https://github.com/chromium/chromium/commit/8353baf8d1504dbdd4ad7584ff2466de657521cd
8353baf8d1504dbdd4ad7584ff2466de657521cd
Remove WebFrame::canHaveSecureChild To simplify the public API, ServiceWorkerNetworkProvider can do the parent walk itself. Follow-up to https://crrev.com/ad1850962644e19. BUG=607543 Review-Url: https://codereview.chromium.org/2082493002 Cr-Commit-Position: refs/heads/master@{#400896}
0
third_party/WebKit/Source/core/dom/Document.cpp
{"sha": "5c883a0154ddb182d6ad680b5a4c77660f2b373f", "filename": "content/child/service_worker/service_worker_network_provider.cc", "status": "modified", "additions": 15, "deletions": 2, "changes": 17, "blob_url": "https://github.com/chromium/chromium/blob/8353baf8d1504dbdd4ad7584ff2466de657521cd/content/child/service_w...
void Document::nodeChildrenWillBeRemoved(ContainerNode& container) { EventDispatchForbiddenScope assertNoEventDispatch; for (Range* range : m_ranges) range->nodeChildrenWillBeRemoved(container); for (NodeIterator* ni : m_nodeIterators) { for (Node& n : NodeTraversal::childrenOf(container)) ...
void Document::nodeChildrenWillBeRemoved(ContainerNode& container) { EventDispatchForbiddenScope assertNoEventDispatch; for (Range* range : m_ranges) range->nodeChildrenWillBeRemoved(container); for (NodeIterator* ni : m_nodeIterators) { for (Node& n : NodeTraversal::childrenOf(container)) ...
C
null
null
null
@@ -3355,9 +3355,14 @@ bool Document::isSecureContextImpl(const SecureContextCheck privilegeContextChec return true; if (privilegeContextCheck == StandardSecureContextCheck) { - Frame* parent = m_frame ? m_frame->tree().parent() : nullptr; - if (parent && !parent->canHaveSecureChild()) - ...
Chrome
8353baf8d1504dbdd4ad7584ff2466de657521cd
04817566fb446d8315cbc4049266c4859a010a74
0
void Document::nodeChildrenWillBeRemoved(ContainerNode& container) { EventDispatchForbiddenScope assertNoEventDispatch; for (Range* range : m_ranges) range->nodeChildrenWillBeRemoved(container); for (NodeIterator* ni : m_nodeIterators) { for (Node& n : NodeTraversal::childrenOf(container)) ...
141,803
null
Remote
Not required
null
CVE-2016-5165
https://www.cvedetails.com/cve/CVE-2016-5165/
CWE-79
Medium
null
Partial
null
2016-09-11
4.3
Cross-site scripting (XSS) vulnerability in the Developer Tools (aka DevTools) subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux allows remote attackers to inject arbitrary web script or HTML via the settings parameter in a chrome-devtools-frontend.appspot.com URL's que...
2018-10-30
XSS
0
https://github.com/chromium/chromium/commit/19b8593007150b9a78da7d13f6e5f8feb10881a7
19b8593007150b9a78da7d13f6e5f8feb10881a7
Add CPU metrics provider and Add CPU/GPU provider for UKM. Bug: 907674 Change-Id: I61b88aeac8d2a7ff81d812fa5a267f48203ec7e2 Reviewed-on: https://chromium-review.googlesource.com/c/1381376 Commit-Queue: Nik Bhagat <nikunjb@chromium.org> Reviewed-by: Robert Kaplow <rkaplow@chromium.org> Cr-Commit-Position: refs/heads/ma...
0
chrome/browser/metrics/chrome_metrics_service_client.cc
{"sha": "6bfa3bc75563eb09dc6d18a58d8454f7e524b5a4", "filename": "chrome/browser/metrics/chrome_metrics_service_client.cc", "status": "modified", "additions": 13, "deletions": 0, "changes": 13, "blob_url": "https://github.com/chromium/chromium/blob/19b8593007150b9a78da7d13f6e5f8feb10881a7/chrome/browser/metrics/chrome_m...
void RegisterFileMetricsPreferences(PrefRegistrySimple* registry) { metrics::FileMetricsProvider::RegisterPrefs(registry, kBrowserMetricsName); metrics::FileMetricsProvider::RegisterPrefs(registry, kCrashpadHistogramAllocatorName); #if defined(OS_WIN) metrics::FileM...
void RegisterFileMetricsPreferences(PrefRegistrySimple* registry) { metrics::FileMetricsProvider::RegisterPrefs(registry, kBrowserMetricsName); metrics::FileMetricsProvider::RegisterPrefs(registry, kCrashpadHistogramAllocatorName); #if defined(OS_WIN) metrics::FileM...
C
null
null
null
@@ -65,6 +65,7 @@ #include "components/history/core/browser/history_service.h" #include "components/metrics/call_stack_profile_metrics_provider.h" #include "components/metrics/component_metrics_provider.h" +#include "components/metrics/cpu_metrics_provider.h" #include "components/metrics/drive_metrics_provider.h" ...
Chrome
19b8593007150b9a78da7d13f6e5f8feb10881a7
1d937c7a926082670b9025f7a04e62d8fc3128d6
0
void RegisterFileMetricsPreferences(PrefRegistrySimple* registry) { metrics::FileMetricsProvider::RegisterPrefs(registry, kBrowserMetricsName); metrics::FileMetricsProvider::RegisterPrefs(registry, kCrashpadHistogramAllocatorName); #if defined(OS_WIN) metrics::FileM...
73,806
null
Remote
Not required
null
CVE-2016-6255
https://www.cvedetails.com/cve/CVE-2016-6255/
CWE-284
Low
null
Partial
null
2017-03-07
5
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.
2017-11-02
null
0
https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
Don't allow unhandled POSTs to write to the filesystem by default If there's no registered handler for a POST request, the default behaviour is to write it to the filesystem. Several million deployed devices appear to have this behaviour, making it possible to (at least) store arbitrary data on them. Add a configure o...
0
upnp/src/genlib/net/http/webserver.c
{"sha": "ea2bc09ef1234e075484369484199dcdda829134", "filename": "configure.ac", "status": "modified", "additions": 4, "deletions": 0, "changes": 4, "blob_url": "https://github.com/mjg59/pupnp-code/blob/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd/configure.ac", "raw_url": "https://github.com/mjg59/pupnp-code/raw/be0a01bdb8...
static int isFileInVirtualDir( /*! [in] Directory path to be tested for virtual directory. */ char *filePath) { virtualDirList *pCurVirtualDir; size_t webDirLen; pCurVirtualDir = pVirtualDirList; while (pCurVirtualDir != NULL) { webDirLen = strlen(pCurVirtualDir->dirName); if (webDirLen) { if (pCurVirtual...
static int isFileInVirtualDir( /*! [in] Directory path to be tested for virtual directory. */ char *filePath) { virtualDirList *pCurVirtualDir; size_t webDirLen; pCurVirtualDir = pVirtualDirList; while (pCurVirtualDir != NULL) { webDirLen = strlen(pCurVirtualDir->dirName); if (webDirLen) { if (pCurVirtual...
C
null
null
null
@@ -1369,9 +1369,13 @@ static int http_RecvPostMessage( if (Fp == NULL) return HTTP_INTERNAL_SERVER_ERROR; } else { +#ifdef UPNP_ENABLE_POST_WRITE Fp = fopen(filename, "wb"); if (Fp == NULL) return HTTP_UNAUTHORIZED; +#else + return HTTP_NOT_FOUND; +#endif } parser->position = POS_ENTITY; do {
pupnp-code
be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
bb994b975abf52ce9573dbca7cfd0d4e10b8c3e1
0
static int isFileInVirtualDir( /*! [in] Directory path to be tested for virtual directory. */ char *filePath) { virtualDirList *pCurVirtualDir; size_t webDirLen; pCurVirtualDir = pVirtualDirList; while (pCurVirtualDir != NULL) { webDirLen = strlen(pCurVirtualDir->dirName); if (webDirLen) { if (pCurVirtual...
142,684
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2016-07
null
0
https://github.com/chromium/chromium/commit/be655fd4fb9ab3291a855a939496111674037a2f
be655fd4fb9ab3291a855a939496111674037a2f
Always use FrameNavigationDisabler during DocumentLoader detach. BUG=617495 Review-Url: https://codereview.chromium.org/2079473002 Cr-Commit-Position: refs/heads/master@{#400558}
0
third_party/WebKit/Source/core/loader/FrameLoader.cpp
{"sha": "4f8c4d0a9cb3e3ed7f94be0bad612c82b8b0cdd3", "filename": "third_party/WebKit/Source/core/loader/FrameLoader.cpp", "status": "modified", "additions": 2, "deletions": 5, "changes": 7, "blob_url": "https://github.com/chromium/chromium/blob/be655fd4fb9ab3291a855a939496111674037a2f/third_party/WebKit/Source/core/load...
void FrameLoader::dispatchUnloadEvent() { NavigationCounterForUnload counter; m_protectProvisionalLoader = false; saveScrollState(); if (m_frame->document() && !SVGImage::isInSVGImage(m_frame->document())) m_frame->document()->dispatchUnloadEvents(); if (Page* page = m_frame->page()) ...
void FrameLoader::dispatchUnloadEvent() { NavigationCounterForUnload counter; m_protectProvisionalLoader = false; saveScrollState(); if (m_frame->document() && !SVGImage::isInSVGImage(m_frame->document())) m_frame->document()->dispatchUnloadEvents(); if (Page* page = m_frame->page()) ...
C
null
null
null
@@ -725,6 +725,7 @@ void FrameLoader::detachDocumentLoader(Member<DocumentLoader>& loader) if (!loader) return; + FrameNavigationDisabler navigationDisabler(*m_frame); loader->detachFromFrame(); loader = nullptr; } @@ -1113,7 +1114,6 @@ bool FrameLoader::prepareForCommit() // At this ...
Chrome
be655fd4fb9ab3291a855a939496111674037a2f
23024078fb2e07f6852031e76f08712bcd6303f0
0
void FrameLoader::dispatchUnloadEvent() { NavigationCounterForUnload counter; // If the frame is unloading, the provisional loader should no longer be // protected. It will be detached soon. m_protectProvisionalLoader = false; saveScrollState(); if (m_frame->document() && !SVGImage::isInSVGIma...
48,039
null
Local
Not required
Partial
CVE-2016-9588
https://www.cvedetails.com/cve/CVE-2016-9588/
CWE-388
Low
null
null
null
2016-12-28
2.1
arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.
2018-11-28
DoS
0
https://github.com/torvalds/linux/commit/ef85b67385436ddc1998f45f1d6a210f935b3388
ef85b67385436ddc1998f45f1d6a210f935b3388
kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF) When L2 exits to L0 due to "exception or NMI", software exceptions (#BP and #OF) for which L1 has requested an intercept should be handled by L1 rather than L0. Previously, only hardware exceptions were forwarded to L1. Signed-off-by: Jim Mattson <jma...
0
arch/x86/kvm/vmx.c
{"sha": "24db5fb6f575af27d3b61a67b15ce9996158ed8b", "filename": "arch/x86/kvm/vmx.c", "status": "modified", "additions": 5, "deletions": 6, "changes": 11, "blob_url": "https://github.com/torvalds/linux/blob/ef85b67385436ddc1998f45f1d6a210f935b3388/arch/x86/kvm/vmx.c", "raw_url": "https://github.com/torvalds/linux/raw/e...
static int handle_vmclear(struct kvm_vcpu *vcpu) { struct vcpu_vmx *vmx = to_vmx(vcpu); gpa_t vmptr; struct vmcs12 *vmcs12; struct page *page; if (!nested_vmx_check_permission(vcpu)) return 1; if (nested_vmx_check_vmptr(vcpu, EXIT_REASON_VMCLEAR, &vmptr)) return 1; if (vmptr == vmx->nested.current_vmptr) ...
static int handle_vmclear(struct kvm_vcpu *vcpu) { struct vcpu_vmx *vmx = to_vmx(vcpu); gpa_t vmptr; struct vmcs12 *vmcs12; struct page *page; if (!nested_vmx_check_permission(vcpu)) return 1; if (nested_vmx_check_vmptr(vcpu, EXIT_REASON_VMCLEAR, &vmptr)) return 1; if (vmptr == vmx->nested.current_vmptr) ...
C
null
null
null
@@ -1389,10 +1389,10 @@ static inline bool nested_cpu_has_posted_intr(struct vmcs12 *vmcs12) return vmcs12->pin_based_vm_exec_control & PIN_BASED_POSTED_INTR; } -static inline bool is_exception(u32 intr_info) +static inline bool is_nmi(u32 intr_info) { return (intr_info & (INTR_INFO_INTR_TYPE_MASK | INTR_INFO_V...
linux
ef85b67385436ddc1998f45f1d6a210f935b3388
cc0d907c0907561f108b2f4d4da24e85f18d0ca5
0
static int handle_vmclear(struct kvm_vcpu *vcpu) { struct vcpu_vmx *vmx = to_vmx(vcpu); gpa_t vmptr; struct vmcs12 *vmcs12; struct page *page; if (!nested_vmx_check_permission(vcpu)) return 1; if (nested_vmx_check_vmptr(vcpu, EXIT_REASON_VMCLEAR, &vmptr)) return 1; if (vmptr == vmx->nested.current_vmptr) ...
93,889
null
Remote
Not required
null
CVE-2016-10746
https://www.cvedetails.com/cve/CVE-2016-10746/
CWE-254
Low
null
Partial
null
2019-04-18
5
libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.
2019-05-01
null
0
https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f
506e9d6c2d4baaf580d489fff0690c0ff2ff588f
virDomainGetTime: Deny on RO connections We have a policy that if API may end up talking to a guest agent it should require RW connection. We don't obey the rule in virDomainGetTime(). Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
0
src/libvirt-domain.c
{"sha": "9491845758570c879e28b18c4b4133ec76a48e90", "filename": "src/libvirt-domain.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/libvirt/libvirt/blob/506e9d6c2d4baaf580d489fff0690c0ff2ff588f/src/libvirt-domain.c", "raw_url": "https://github.com/libvirt/libvirt/...
virDomainOpenConsole(virDomainPtr dom, const char *dev_name, virStreamPtr st, unsigned int flags) { virConnectPtr conn; VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x", NULLSTR(dev_name), st, flags); virResetLastError...
virDomainOpenConsole(virDomainPtr dom, const char *dev_name, virStreamPtr st, unsigned int flags) { virConnectPtr conn; VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x", NULLSTR(dev_name), st, flags); virResetLastError...
C
null
null
null
@@ -10934,6 +10934,7 @@ virDomainGetTime(virDomainPtr dom, virResetLastError(); virCheckDomainReturn(dom, -1); + virCheckReadOnlyGoto(dom->conn->flags, error); if (dom->conn->driver->domainGetTime) { int ret = dom->conn->driver->domainGetTime(dom, seconds,
libvirt
506e9d6c2d4baaf580d489fff0690c0ff2ff588f
95c370f0eead8ab0bedf333d54019f55aa001116
0
virDomainOpenConsole(virDomainPtr dom, const char *dev_name, virStreamPtr st, unsigned int flags) { virConnectPtr conn; VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x", NULLSTR(dev_name), st, flags); virResetLastError...
9,652
null
Remote
Not required
Partial
CVE-2016-6289
https://www.cvedetails.com/cve/CVE-2016-6289/
CWE-190
Medium
Partial
Partial
null
2016-07-25
6.8
Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
2018-01-04
DoS Overflow
0
https://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
0218acb7e756a469099c4ccfb22bce6c2bd1ef87
null
0
null
null
static int php_is_dir_ok(const cwd_state *state) /* {{{ */ { struct stat buf; if (php_sys_stat(state->cwd, &buf) == 0 && S_ISDIR(buf.st_mode)) return (0); return (1); } /* }}} */
static int php_is_dir_ok(const cwd_state *state) /* {{{ */ { struct stat buf; if (php_sys_stat(state->cwd, &buf) == 0 && S_ISDIR(buf.st_mode)) return (0); return (1); } /* }}} */
C
null
null
aca4f65c7e98b9f07ac625eaf6be8eadbeb55929
@@ -621,14 +621,14 @@ CWD_API void realpath_cache_del(const char *path, int path_len TSRMLS_DC) /* {{{ memcmp(path, (*bucket)->path, path_len) == 0) { realpath_cache_bucket *r = *bucket; *bucket = (*bucket)->next; - ...
php
https://git.php.net/?p=php-src.git;a=blob;f=TSRM/tsrm_virtual_cwd.c;h=6c22ee85b25c395f0444f292f8bf876eda3b5897;hb=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
https://git.php.net/?p=php-src.git;a=blob;f=TSRM/tsrm_virtual_cwd.c;h=ba92711f892732bc3616d046c083df385502f8ca
0
static int php_is_dir_ok(const cwd_state *state) /* {{{ */ { struct stat buf; if (php_sys_stat(state->cwd, &buf) == 0 && S_ISDIR(buf.st_mode)) return (0); return (1); } /* }}} */
65,486
null
Local
Not required
Complete
CVE-2017-9059
https://www.cvedetails.com/cve/CVE-2017-9059/
CWE-404
Low
null
null
null
2017-05-18
4.9
The NFSv4 implementation in the Linux kernel through 4.11.1 allows local users to cause a denial of service (resource consumption) by leveraging improper channel callback shutdown when unmounting an NFSv4 filesystem, aka a *module reference and kernel daemon* leak.
2019-10-02
DoS
0
https://github.com/torvalds/linux/commit/c70422f760c120480fee4de6c38804c72aa26bc1
c70422f760c120480fee4de6c38804c72aa26bc1
Merge tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux Pull nfsd updates from Bruce Fields: "Another RDMA update from Chuck Lever, and a bunch of miscellaneous bugfixes" * tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux: (26 commits) nfsd: Fix up the "supattr_exclcreat" attributes nfsd: encoders mus...
0
fs/nfsd/nfs4state.c
{"sha": "5d481e8a1b5d0c732207c4a583027ec084d7a0db", "filename": "fs/lockd/svc.c", "status": "modified", "additions": 4, "deletions": 2, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/c70422f760c120480fee4de6c38804c72aa26bc1/fs/lockd/svc.c", "raw_url": "https://github.com/torvalds/linux/raw/c70422f760...
hash_sessionid(struct nfs4_sessionid *sessionid) { struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid; return sid->sequence % SESSION_HASH_SIZE; }
hash_sessionid(struct nfs4_sessionid *sessionid) { struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid; return sid->sequence % SESSION_HASH_SIZE; }
C
null
null
null
@@ -1912,28 +1912,15 @@ static void copy_clid(struct nfs4_client *target, struct nfs4_client *source) target->cl_clientid.cl_id = source->cl_clientid.cl_id; } -int strdup_if_nonnull(char **target, char *source) -{ - if (source) { - *target = kstrdup(source, GFP_KERNEL); - if (!*target) - return -ENOMEM; - } e...
linux
c70422f760c120480fee4de6c38804c72aa26bc1
73ccb023a2f25b72c4b95499ca24760588014614
0
hash_sessionid(struct nfs4_sessionid *sessionid) { struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid; return sid->sequence % SESSION_HASH_SIZE; }
70,893
null
Remote
Not required
Partial
CVE-2016-10172
https://www.cvedetails.com/cve/CVE-2016-10172/
CWE-125
Medium
null
null
null
2017-03-14
4.3
The read_new_config_info function in open_utils.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
2017-03-14
DoS
0
https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc
4bc05fc490b66ef2d45b1de26abf1455b486b0dc
fixes for 4 fuzz failures posted to SourceForge mailing list
0
src/open_utils.c
{"sha": "a8440463f70f22960d7d4caf59154b03eba3444b", "filename": "src/open_utils.c", "status": "modified", "additions": 5, "deletions": 1, "changes": 6, "blob_url": "https://github.com/dbry/WavPack/blob/4bc05fc490b66ef2d45b1de26abf1455b486b0dc/src/open_utils.c", "raw_url": "https://github.com/dbry/WavPack/raw/4bc05fc490...
static int read_channel_info (WavpackContext *wpc, WavpackMetadata *wpmd) { int bytecnt = wpmd->byte_length, shift = 0, mask_bits; unsigned char *byteptr = wpmd->data; uint32_t mask = 0; if (!bytecnt || bytecnt > 7) return FALSE; if (!wpc->config.num_channels) { if (bytecnt >= 6)...
static int read_channel_info (WavpackContext *wpc, WavpackMetadata *wpmd) { int bytecnt = wpmd->byte_length, shift = 0, mask_bits; unsigned char *byteptr = wpmd->data; uint32_t mask = 0; if (!bytecnt || bytecnt > 7) return FALSE; if (!wpc->config.num_channels) { if (bytecnt >= 6)...
C
null
null
null
@@ -560,7 +560,7 @@ static int read_new_config_info (WavpackContext *wpc, WavpackMetadata *wpmd) // if there's any data, the first two bytes are file_format and qmode flags - if (bytecnt) { + if (bytecnt >= 2) { wpc->file_format = *byteptr++; wpc->config.qmode = (wpc->config.qmode & ~0x...
WavPack
4bc05fc490b66ef2d45b1de26abf1455b486b0dc
df0488c2e0fb4b7e3c78b96611cdebb69b002769
0
static int read_channel_info (WavpackContext *wpc, WavpackMetadata *wpmd) { int bytecnt = wpmd->byte_length, shift = 0, mask_bits; unsigned char *byteptr = wpmd->data; uint32_t mask = 0; if (!bytecnt || bytecnt > 7) return FALSE; if (!wpc->config.num_channels) { // if bytecnt is 6...
168,485
null
Remote
Not required
null
CVE-2018-6148
https://www.cvedetails.com/cve/CVE-2018-6148/
CWE-93
Medium
null
Partial
null
2019-06-27
4.3
Incorrect implementation in Content Security Policy in Google Chrome prior to 67.0.3396.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
2019-07-02
Bypass
0
https://github.com/chromium/chromium/commit/fa68dcfd12e376aa880b3193a77b896e6c54efdf
fa68dcfd12e376aa880b3193a77b896e6c54efdf
Verify that header values set from Blink don't contain '\n'. Because that would be silly. Bug: 845961 Change-Id: I69de2cb093a3629de63c48652c9499f7387b8334 Reviewed-on: https://chromium-review.googlesource.com/1109757 Commit-Queue: Mike West <mkwst@chromium.org> Reviewed-by: Daniel Cheng <dcheng@chromium.org> Cr-Commi...
0
third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc
{"sha": "d58fe497799390cdd55690d0d7bfa728054e5312", "filename": "third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc", "status": "modified", "additions": 0, "deletions": 3, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/fa68dcfd12e376aa880b3193a77b896e6c54efdf/third_par...
void CheckHeaderFails(const char* header_field, const char* header_value) { WebURLRequest request(ToKURL("http://www.test.com/success.html")); request.SetFetchRequestMode(network::mojom::FetchRequestMode::kSameOrigin); request.SetFetchCredentialsMode( network::mojom::FetchCredentialsMode::kOmit); ...
void CheckHeaderFails(const char* header_field, const char* header_value) { WebURLRequest request(ToKURL("http://www.test.com/success.html")); request.SetFetchRequestMode(network::mojom::FetchRequestMode::kSameOrigin); request.SetFetchCredentialsMode( network::mojom::FetchCredentialsMode::kOmit); ...
C
null
null
null
@@ -628,9 +628,6 @@ TEST_F(WebAssociatedURLLoaderTest, MAYBE_UntrustedCheckHeaders) { // Check that validation is case-insensitive. CheckHeaderFails("AcCePt-ChArSeT"); CheckHeaderFails("ProXy-FoO"); - - // Check invalid header values. - CheckHeaderFails("foo", "bar\x0d\x0ax-csrf-token:\x20test1234"); } /...
Chrome
fa68dcfd12e376aa880b3193a77b896e6c54efdf
059d76f6ac346fd4a05c526a665f356d1306f99c
0
void CheckHeaderFails(const char* header_field, const char* header_value) { WebURLRequest request(ToKURL("http://www.test.com/success.html")); request.SetFetchRequestMode(network::mojom::FetchRequestMode::kSameOrigin); request.SetFetchCredentialsMode( network::mojom::FetchCredentialsMode::kOmit); ...
58,975
Admin
Local Network
Not required
Complete
CVE-2017-1000251
https://www.cvedetails.com/cve/CVE-2017-1000251/
CWE-119
Low
Complete
Complete
null
2017-09-12
8.3
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
2018-02-16
Exec Code Overflow
0
https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
Bluetooth: Add configuration support for ERTM and Streaming mode Add support to config_req and config_rsp to configure ERTM and Streaming mode. If the remote device specifies ERTM or Streaming mode, then the same mode is proposed. Otherwise ERTM or Basic mode is used. And in case of a state 2 device, the remote device...
0
net/bluetooth/l2cap.c
{"sha": "6fc76986d70a9366a287508b619bcc37c244a800", "filename": "include/net/bluetooth/l2cap.h", "status": "modified", "additions": 21, "deletions": 7, "changes": 28, "blob_url": "https://github.com/torvalds/linux/blob/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe/include/net/bluetooth/l2cap.h", "raw_url": "https://github.c...
static void l2cap_sock_set_timer(struct sock *sk, long timeout) { BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout); sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout); }
static void l2cap_sock_set_timer(struct sock *sk, long timeout) { BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout); sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout); }
C
null
null
null
@@ -966,6 +966,7 @@ static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int al case L2CAP_MODE_BASIC: break; case L2CAP_MODE_ERTM: + case L2CAP_MODE_STREAMING: if (enable_ertm) break; /* fall through */ @@ -1029,6 +1030,7 @@ static int l2cap_sock_listen(struct socket *sock, int ba...
linux
f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
65c7c4918450f8c4545ccb02a9c7a3d77e073535
0
static void l2cap_sock_set_timer(struct sock *sk, long timeout) { BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout); sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout); }
9,681
null
Remote
Not required
Partial
CVE-2010-2808
https://www.cvedetails.com/cve/CVE-2010-2808/
CWE-119
Medium
Partial
Partial
null
2010-08-19
6.8
Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
2011-01-12
DoS Exec Code Overflow Mem. Corr.
0
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
81f3472c0ba7b8f6466e2e214fa8c1c17fade975
null
0
null
null
destroy_charmaps( FT_Face face, FT_Memory memory ) { FT_Int n; if ( !face ) return; for ( n = 0; n < face->num_charmaps; n++ ) { FT_CMap cmap = FT_CMAP( face->charmaps[n] ); ft_cmap_done_internal( cmap ); face->charmaps[n] = NULL; } FT...
destroy_charmaps( FT_Face face, FT_Memory memory ) { FT_Int n; if ( !face ) return; for ( n = 0; n < face->num_charmaps; n++ ) { FT_CMap cmap = FT_CMAP( face->charmaps[n] ); ft_cmap_done_internal( cmap ); face->charmaps[n] = NULL; } FT...
C
null
null
223cb1b57c1c89fbaf76772af11f1b06490bde3c
@@ -1574,6 +1574,7 @@ FT_TRACE3(( "POST fragment[%d]: offsets=0x%08x, rlen=0x%08x, flags=0x%04x\n", i, offsets[i], rlen, flags )); + /* postpone the check of rlen longer than buffer until FT_Stream_Read() */ if ( ( flags >> 8 ) == 0 ) /* Comment, should not be loaded */ ...
savannah
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/base/ftobjs.c?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/base/ftobjs.c?id=223cb1b57c1c89fbaf76772af11f1b06490bde3c
0
destroy_charmaps( FT_Face face, FT_Memory memory ) { FT_Int n; if ( !face ) return; for ( n = 0; n < face->num_charmaps; n++ ) { FT_CMap cmap = FT_CMAP( face->charmaps[n] ); ft_cmap_done_internal( cmap ); face->charmaps[n] = NULL; } FT...
6,442
null
Local
Not required
Partial
CVE-2017-8933
https://www.cvedetails.com/cve/CVE-2017-8933/
CWE-20
Low
null
null
null
2017-05-15
2.1
Libmenu-cache 1.0.2 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (menu unavailability).
2017-05-22
DoS
0
https://git.lxde.org/gitweb/?p=lxde/menu-cache.git;a=commit;h=56f66684592abf257c4004e6e1fff041c64a12ce
56f66684592abf257c4004e6e1fff041c64a12ce
null
0
null
null
const char* menu_cache_item_get_file_dirname( MenuCacheItem* item ) { return item->file_dir ? item->file_dir->dir + 1 : NULL; }
const char* menu_cache_item_get_file_dirname( MenuCacheItem* item ) { return item->file_dir ? item->file_dir->dir + 1 : NULL; }
C
null
null
dffb1314ec1b7212bbee5dfa9a021a069b826cbb
@@ -3,7 +3,7 @@ * * Copyright 2008 PCMan <pcman.tw@gmail.com> * Copyright 2009 Jürgen Hötzel <juergen@archlinux.org> - * Copyright 2012-2015 Andriy Grytsenko (LStranger) <andrej@rep.kiev.ua> + * Copyright 2012-2017 Andriy Grytsenko (LStranger) <andrej@rep.kiev.ua> * * This library is ...
lxde
https://git.lxde.org/gitweb/?p=lxde/menu-cache.git;a=blob;f=libmenu-cache/menu-cache.c;h=d9141274aca1ba103d63cd41630db4ae3211a3a2;hb=56f66684592abf257c4004e6e1fff041c64a12ce
https://git.lxde.org/gitweb/?p=lxde/menu-cache.git;a=blob;f=libmenu-cache/menu-cache.c;h=9e3e0db79fcf92706da823f74311af1ddb95a7ec
0
const char* menu_cache_item_get_file_dirname( MenuCacheItem* item ) { return item->file_dir ? item->file_dir->dir + 1 : NULL; }
71,763
null
Remote
Not required
Partial
CVE-2016-10066
https://www.cvedetails.com/cve/CVE-2016-10066/
CWE-119
Medium
null
null
null
2017-03-03
4.3
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
2017-03-04
DoS Overflow
0
https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
null
0
coders/tiff.c
{"sha": "ca393265a99b634fb87ee6aefa65985b1eae5cd6", "filename": "ChangeLog", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6/ChangeLog", "raw_url": "https://github.com/ImageMagick/ImageMagick/raw/f6...
static MagickBooleanType WritePTIFImage(const ImageInfo *image_info, Image *image) { ExceptionInfo *exception; Image *images, *next, *pyramid_image; ImageInfo *write_info; MagickBooleanType status; PointInfo resolution; size_t columns, rows; /* Create pyrami...
static MagickBooleanType WritePTIFImage(const ImageInfo *image_info, Image *image) { ExceptionInfo *exception; Image *images, *next, *pyramid_image; ImageInfo *write_info; MagickBooleanType status; PointInfo resolution; size_t columns, rows; /* Create pyrami...
C
null
null
null
@@ -1195,6 +1195,12 @@ RestoreMSCWarning image->columns=(size_t) width; image->rows=(size_t) height; image->depth=(size_t) bits_per_sample; + status=SetImageExtent(image,image->columns,image->rows); + if (status == MagickFalse) + { + InheritException(exception,&image->exception); + ...
ImageMagick
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
6773cce8ff0bfb32fd568c2a0f74acc34b66ec03
0
static MagickBooleanType WritePTIFImage(const ImageInfo *image_info, Image *image) { ExceptionInfo *exception; Image *images, *next, *pyramid_image; ImageInfo *write_info; MagickBooleanType status; PointInfo resolution; size_t columns, rows; /* Create pyrami...
110,096
null
Remote
Not required
Partial
CVE-2012-5111
https://www.cvedetails.com/cve/CVE-2012-5111/
null
Low
Partial
Partial
null
2012-10-09
7.5
Google Chrome before 22.0.1229.92 does not monitor for crashes of Pepper plug-ins, which has unspecified impact and remote attack vectors.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/ef97ce340c462d5212336f09bf8075d1cb10faa4
ef97ce340c462d5212336f09bf8075d1cb10faa4
Handle crashing Pepper plug-ins the same as crashing NPAPI plug-ins. BUG=151895 Review URL: https://chromiumcodereview.appspot.com/10956065 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@158364 0039d316-1c4b-4281-b951-d872f2087c98
0
content/browser/ppapi_plugin_process_host.cc
{"sha": "1f3c029bf67a16fe766d874f3fee4f7eee7f60d8", "filename": "chrome/browser/renderer_host/plugin_info_message_filter.cc", "status": "modified", "additions": 11, "deletions": 3, "changes": 14, "blob_url": "https://github.com/chromium/chromium/blob/ef97ce340c462d5212336f09bf8075d1cb10faa4/chrome/browser/renderer_host...
virtual void OnConnectionTypeChanged( net::NetworkChangeNotifier::ConnectionType type) { process_host_->Send(new PpapiMsg_SetNetworkState( type != net::NetworkChangeNotifier::CONNECTION_NONE)); }
virtual void OnConnectionTypeChanged( net::NetworkChangeNotifier::ConnectionType type) { process_host_->Send(new PpapiMsg_SetNetworkState( type != net::NetworkChangeNotifier::CONNECTION_NONE)); }
C
null
null
null
@@ -295,6 +295,10 @@ void PpapiPluginProcessHost::OnProcessLaunched() { host_impl_->set_plugin_process_handle(process_->GetHandle()); } +void PpapiPluginProcessHost::OnProcessCrashed(int exit_code) { + PluginServiceImpl::GetInstance()->RegisterPluginCrash(plugin_path_); +} + bool PpapiPluginProcessHost::OnMessa...
Chrome
ef97ce340c462d5212336f09bf8075d1cb10faa4
e036acf3f2de5f3446e233ee1ec9519b35f323a5
0
virtual void OnConnectionTypeChanged( net::NetworkChangeNotifier::ConnectionType type) { process_host_->Send(new PpapiMsg_SetNetworkState( type != net::NetworkChangeNotifier::CONNECTION_NONE)); }
159,355
null
Remote
Not required
Partial
CVE-2018-6035
https://www.cvedetails.com/cve/CVE-2018-6035/
CWE-200
Medium
Partial
Partial
null
2018-09-25
6.8
Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user local file data via a crafted Chrome Extension.
2018-11-15
+Info
0
https://github.com/chromium/chromium/commit/2649de11c562aa96d336c06136a1a20c01711be0
2649de11c562aa96d336c06136a1a20c01711be0
Hide DevTools frontend from webRequest API Prevent extensions from observing requests for remote DevTools frontends and add regression tests. And update ExtensionTestApi to support initializing the embedded test server and port from SetUpCommandLine (before SetUpOnMainThread). BUG=797497,797500 TEST=browser_test --g...
0
chrome/browser/extensions/api/chrome_extensions_api_client.cc
{"sha": "c732c6ef6d0ecf8b43f61b2d1ff6034f99f3c316", "filename": "chrome/browser/extensions/api/chrome_extensions_api_client.cc", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/chromium/chromium/blob/2649de11c562aa96d336c06136a1a20c01711be0/chrome/browser/extensions/a...
FileSystemDelegate* ChromeExtensionsAPIClient::GetFileSystemDelegate() { if (!file_system_delegate_) file_system_delegate_ = base::MakeUnique<ChromeFileSystemDelegate>(); return file_system_delegate_.get(); }
FileSystemDelegate* ChromeExtensionsAPIClient::GetFileSystemDelegate() { if (!file_system_delegate_) file_system_delegate_ = base::MakeUnique<ChromeFileSystemDelegate>(); return file_system_delegate_.get(); }
C
null
null
null
@@ -33,6 +33,7 @@ #include "chrome/browser/guest_view/web_view/chrome_web_view_guest_delegate.h" #include "chrome/browser/guest_view/web_view/chrome_web_view_permission_helper_delegate.h" #include "chrome/browser/ui/pdf/chrome_pdf_web_contents_helper_client.h" +#include "chrome/browser/ui/webui/devtools_ui.h" #incl...
Chrome
2649de11c562aa96d336c06136a1a20c01711be0
7896c18d7d1ae0246660efa69d19ca7224938c2d
0
FileSystemDelegate* ChromeExtensionsAPIClient::GetFileSystemDelegate() { if (!file_system_delegate_) file_system_delegate_ = base::MakeUnique<ChromeFileSystemDelegate>(); return file_system_delegate_.get(); }
29,637
null
Remote
Not required
null
CVE-2013-4350
https://www.cvedetails.com/cve/CVE-2013-4350/
CWE-310
Low
Partial
null
null
2013-09-25
5
The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network.
2014-01-03
+Info
0
https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7
95ee62083cb6453e056562d91f597552021e6ae7
net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit Alan Chester reported an issue with IPv6 on SCTP that IPsec traffic is not being encrypted, whereas on IPv4 it is. Setting up an AH + ESP transport does not seem to have the desired effect: SCTP + IPv4: 22:14:20.809645 IP (tos 0x2,ECT(0), ttl 64, id 0, offse...
0
net/sctp/ipv6.c
{"sha": "4f52e2ce263d0852bf01cc286560f8d13fbe208a", "filename": "net/sctp/ipv6.c", "status": "modified", "additions": 13, "deletions": 29, "changes": 42, "blob_url": "https://github.com/torvalds/linux/blob/95ee62083cb6453e056562d91f597552021e6ae7/net/sctp/ipv6.c", "raw_url": "https://github.com/torvalds/linux/raw/95ee6...
static struct sock *sctp_v6_create_accept_sk(struct sock *sk, struct sctp_association *asoc) { struct sock *newsk; struct ipv6_pinfo *newnp, *np = inet6_sk(sk); struct sctp6_sock *newsctp6sk; newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_prot); if (!newsk) goto out; sock_init_data(NULL...
static struct sock *sctp_v6_create_accept_sk(struct sock *sk, struct sctp_association *asoc) { struct sock *newsk; struct ipv6_pinfo *newnp, *np = inet6_sk(sk); struct sctp6_sock *newsctp6sk; newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_prot); if (!newsk) goto out; sock_init_data(NULL...
C
null
null
null
@@ -204,44 +204,23 @@ static void sctp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, in6_dev_put(idev); } -/* Based on tcp_v6_xmit() in tcp_ipv6.c. */ static int sctp_v6_xmit(struct sk_buff *skb, struct sctp_transport *transport) { struct sock *sk = skb->sk; struct ipv6_pinfo *np = inet6_sk(sk); -...
linux
95ee62083cb6453e056562d91f597552021e6ae7
662ca437e714caaab855b12415d6ffd815985bc0
0
static struct sock *sctp_v6_create_accept_sk(struct sock *sk, struct sctp_association *asoc) { struct sock *newsk; struct ipv6_pinfo *newnp, *np = inet6_sk(sk); struct sctp6_sock *newsctp6sk; newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_prot); if (!newsk) goto out; sock_init_data(NULL...
103,905
null
Remote
Not required
Partial
CVE-2011-2861
https://www.cvedetails.com/cve/CVE-2011-2861/
CWE-20
Medium
Partial
Partial
null
2011-09-19
6.8
Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce
8262245d384be025f13e2a5b3a03b7e5c98374ce
DevTools: move DevToolsAgent/Client into content. BUG=84078 TEST= Review URL: http://codereview.chromium.org/7461019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@93596 0039d316-1c4b-4281-b951-d872f2087c98
0
content/renderer/render_view.cc
{"sha": "24059d48a3bcbe447efb7408f77415576f0c36a4", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/8262245d384be025f13e2a5b3a03b7e5c98374ce/chrome/browser/chrome_content_browser_cli...
void RenderView::frameDetached(WebFrame* frame) { FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameDetached(frame)); }
void RenderView::frameDetached(WebFrame* frame) { FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameDetached(frame)); }
C
null
null
null
@@ -40,6 +40,7 @@ #include "content/common/url_constants.h" #include "content/common/view_messages.h" #include "content/renderer/content_renderer_client.h" +#include "content/renderer/devtools_agent.h" #include "content/renderer/device_orientation_dispatcher.h" #include "content/renderer/mhtml_generator.h" #inclu...
Chrome
8262245d384be025f13e2a5b3a03b7e5c98374ce
2469a22063c3539147f55fe899a8dabc12901c01
0
void RenderView::frameDetached(WebFrame* frame) { FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameDetached(frame)); }
109,107
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2012-11
null
0
https://github.com/chromium/chromium/commit/d1a59e4e845a01d7d7b80ef184b672752a9eae4d
d1a59e4e845a01d7d7b80ef184b672752a9eae4d
Fixing cross-process postMessage replies on more than two iterations. When two frames are replying to each other using event.source across processes, after the first two replies, things break down. The root cause is that in RenderViewImpl::GetFrameByMappedID, the lookup was incorrect. It is now properly searching fo...
0
content/renderer/render_view_impl.cc
{"sha": "63ed831e8ed1453c1c1f39c4d80c1fc21fce8429", "filename": "content/browser/renderer_host/render_view_host_manager_browsertest.cc", "status": "modified", "additions": 5, "deletions": 4, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/d1a59e4e845a01d7d7b80ef184b672752a9eae4d/content/browser/ren...
void RenderViewImpl::didLoadResourceFromMemoryCache( WebFrame* frame, const WebURLRequest& request, const WebURLResponse& response) { GURL url(request.url()); if (url.SchemeIs("data")) return; Send(new ViewHostMsg_DidLoadResourceFromMemoryCache( routing_id_, url, response.securityIn...
void RenderViewImpl::didLoadResourceFromMemoryCache( WebFrame* frame, const WebURLRequest& request, const WebURLResponse& response) { GURL url(request.url()); if (url.SchemeIs("data")) return; Send(new ViewHostMsg_DidLoadResourceFromMemoryCache( routing_id_, url, response.securityIn...
C
null
null
null
@@ -3905,12 +3905,13 @@ void RenderViewImpl::CreateFrameTree(WebKit::WebFrame* frame, } } -WebKit::WebFrame* RenderViewImpl::GetFrameByMappedID(int frame_id) { - std::map<int, int>::iterator it = active_frame_id_map_.find(frame_id); - if (it == active_frame_id_map_.end()) - return NULL; - - return FindFrame...
Chrome
d1a59e4e845a01d7d7b80ef184b672752a9eae4d
5c6fe1f82c4dcd02695537d05423576bca388fea
0
void RenderViewImpl::didLoadResourceFromMemoryCache( WebFrame* frame, const WebURLRequest& request, const WebURLResponse& response) { // The recipients of this message have no use for data: URLs: they don't // affect the page's insecure content list and are not in the disk cache. To // prevent large (1M+)...
63,981
null
Remote
Not required
Partial
CVE-2017-9994
https://www.cvedetails.com/cve/CVE-2017-9994/
CWE-119
Medium
Partial
Partial
null
2017-06-28
6.8
libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a...
2019-01-08
DoS Overflow
0
https://github.com/FFmpeg/FFmpeg/commit/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
avcodec/webp: Always set pix_fmt Fixes: out of array access Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632 Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Reviewed-by: "Ronald S. Bultje" <rsbult...
0
libavcodec/vp8.c
{"sha": "5bf601a8ef9654bbf29ca7b339bf865cee22ea88", "filename": "libavcodec/vp8.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef/libavcodec/vp8.c", "raw_url": "https://github.com/FFmpeg/FFmpeg/raw/6b5d3fb2...
static void update_refs(VP8Context *s) { VP56RangeCoder *c = &s->c; int update_golden = vp8_rac_get(c); int update_altref = vp8_rac_get(c); s->update_golden = ref_to_update(s, update_golden, VP56_FRAME_GOLDEN); s->update_altref = ref_to_update(s, update_altref, VP56_FRAME_GOLDEN2); }
static void update_refs(VP8Context *s) { VP56RangeCoder *c = &s->c; int update_golden = vp8_rac_get(c); int update_altref = vp8_rac_get(c); s->update_golden = ref_to_update(s, update_golden, VP56_FRAME_GOLDEN); s->update_altref = ref_to_update(s, update_altref, VP56_FRAME_GOLDEN2); }
C
null
null
null
@@ -2550,6 +2550,8 @@ int vp78_decode_frame(AVCodecContext *avctx, void *data, int *got_frame, enum AVDiscard skip_thresh; VP8Frame *av_uninit(curframe), *prev_frame; + av_assert0(avctx->pix_fmt == AV_PIX_FMT_YUVA420P || avctx->pix_fmt == AV_PIX_FMT_YUV420P); + if (is_vp7) ret = vp7_decode_...
FFmpeg
6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
942036e97c8b149ce2f3ec6e7cbc990df8713d0c
0
static void update_refs(VP8Context *s) { VP56RangeCoder *c = &s->c; int update_golden = vp8_rac_get(c); int update_altref = vp8_rac_get(c); s->update_golden = ref_to_update(s, update_golden, VP56_FRAME_GOLDEN); s->update_altref = ref_to_update(s, update_altref, VP56_FRAME_GOLDEN2); }
121,812
null
Remote
Not required
Partial
CVE-2013-2856
https://www.cvedetails.com/cve/CVE-2013-2856/
CWE-416
Low
Partial
Partial
null
2013-06-04
7.5
Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input.
2017-09-18
DoS
0
https://github.com/chromium/chromium/commit/e68fafe04d29810cebe8d25554863b0cae4c1356
e68fafe04d29810cebe8d25554863b0cae4c1356
Map posix error codes in bind better, and fix one windows mapping. r=wtc BUG=330233 Review URL: https://codereview.chromium.org/101193008 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@242224 0039d316-1c4b-4281-b951-d872f2087c98
0
net/udp/udp_socket_win.cc
{"sha": "a51567df05db48794cd0db51018958e88b54b944", "filename": "net/udp/udp_socket_libevent.cc", "status": "modified", "additions": 8, "deletions": 1, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/e68fafe04d29810cebe8d25554863b0cae4c1356/net/udp/udp_socket_libevent.cc", "raw_url": "https://githu...
UDPSocketWin::UDPSocketWin(DatagramSocket::BindType bind_type, const RandIntCallback& rand_int_cb, net::NetLog* net_log, const net::NetLog::Source& source) : socket_(INVALID_SOCKET), addr_family_(0), socket_options_(SOCKET_...
UDPSocketWin::UDPSocketWin(DatagramSocket::BindType bind_type, const RandIntCallback& rand_int_cb, net::NetLog* net_log, const net::NetLog::Source& source) : socket_(INVALID_SOCKET), addr_family_(0), socket_options_(SOCKET_...
C
null
null
null
@@ -339,7 +339,7 @@ int UDPSocketWin::InternalConnect(const IPEndPoint& address) { // else connect() does the DatagramSocket::DEFAULT_BIND if (rv < 0) { - UMA_HISTOGRAM_SPARSE_SLOWLY("Net.UdpSocketRandomBindErrorCode", rv); + UMA_HISTOGRAM_SPARSE_SLOWLY("Net.UdpSocketRandomBindErrorCode", -rv); Close...
Chrome
e68fafe04d29810cebe8d25554863b0cae4c1356
af540a4511352caf66aa9292c2c743f5c2d74c12
0
UDPSocketWin::UDPSocketWin(DatagramSocket::BindType bind_type, const RandIntCallback& rand_int_cb, net::NetLog* net_log, const net::NetLog::Source& source) : socket_(INVALID_SOCKET), addr_family_(0), socket_options_(SOCKET_...
7,162
null
Remote
Not required
Partial
CVE-2014-9659
https://www.cvedetails.com/cve/CVE-2014-9659/
CWE-119
Low
Partial
Partial
null
2015-02-08
7.5
cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists...
2018-10-30
DoS Exec Code Overflow
0
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2cdc4562f873237f1c77d43540537c7a721d3fd8
2cdc4562f873237f1c77d43540537c7a721d3fd8
null
0
null
null
cf2_hintmask_init( CF2_HintMask hintmask, FT_Error* error ) { FT_ZERO( hintmask ); hintmask->error = error; }
cf2_hintmask_init( CF2_HintMask hintmask, FT_Error* error ) { FT_ZERO( hintmask ); hintmask->error = error; }
C
null
null
8fa69a88d75fd374ea86a9869f6e74a924926e49
@@ -4,7 +4,7 @@ /* */ /* Adobe's CFF Interpreter (body). */ /* */ -/* Copyright 2007-2013 Adobe Systems Incorporated. ...
savannah
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cf2intrp.c?id=2cdc4562f873237f1c77d43540537c7a721d3fd8
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cf2intrp.c?id=8fa69a88d75fd374ea86a9869f6e74a924926e49
0
cf2_hintmask_init( CF2_HintMask hintmask, FT_Error* error ) { FT_ZERO( hintmask ); hintmask->error = error; }
115,394
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2012-02
null
0
https://github.com/chromium/chromium/commit/dc3857aac17be72c96f28d860d875235b3be349a
dc3857aac17be72c96f28d860d875235b3be349a
Unreviewed, rolling out r142736. http://trac.webkit.org/changeset/142736 https://bugs.webkit.org/show_bug.cgi?id=109716 Broke ABI, nightly builds crash on launch (Requested by ap on #webkit). Patch by Sheriff Bot <webkit.review.bot@gmail.com> on 2013-02-13 Source/WebKit2: * Shared/APIClientTraits.cpp: (WebKit): * S...
0
third_party/WebKit/Tools/WebKitTestRunner/InjectedBundle/InjectedBundlePage.cpp
{"sha": "4747a285ac89a42c70faaaabb65a017f86d1d0ad", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 19, "deletions": 0, "changes": 19, "blob_url": "https://github.com/chromium/chromium/blob/dc3857aac17be72c96f28d860d875235b3be349a/third_party/WebKit/Source/WebKit2/ChangeLog...
void InjectedBundlePage::didFinishLoadForResource(WKBundlePageRef page, WKBundleFrameRef frame, uint64_t identifier, const void* clientInfo) { static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->didFinishLoadForResource(page, frame, identifier); }
void InjectedBundlePage::didFinishLoadForResource(WKBundlePageRef page, WKBundleFrameRef frame, uint64_t identifier, const void* clientInfo) { static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->didFinishLoadForResource(page, frame, identifier); }
C
null
null
null
@@ -319,6 +319,8 @@ InjectedBundlePage::InjectedBundlePage(WKBundlePageRef page) 0, // willDestroyGlobalObjectForDOMWindowExtension didFinishProgress, // didFinishProgress 0, // shouldForceUniversalAccessFromLocalURL + 0, // didReceiveIntentForFrame + 0, // registerIntentService...
Chrome
dc3857aac17be72c96f28d860d875235b3be349a
cd2d7b3da48d2727a9f8f555b0af79169dce0918
0
void InjectedBundlePage::didFinishLoadForResource(WKBundlePageRef page, WKBundleFrameRef frame, uint64_t identifier, const void* clientInfo) { static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->didFinishLoadForResource(page, frame, identifier); }
159,016
null
Remote
Not required
Partial
CVE-2018-6031
https://www.cvedetails.com/cve/CVE-2018-6031/
CWE-416
Medium
Partial
Partial
null
2018-09-25
6.8
Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
2018-11-20
null
0
https://github.com/chromium/chromium/commit/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2
01c9a7e71ca435651723e8cbcab0b3ad4c5351e2
[pdf] Use a temporary list when unloading pages When traversing the |deferred_page_unloads_| list and handling the unloads it's possible for new pages to get added to the list which will invalidate the iterator. This CL swaps the list with an empty list and does the iteration on the list copy. New items that are unlo...
0
pdf/pdfium/pdfium_engine.cc
{"sha": "7c6b7da1c70f4071d071d2f111be90a01b1233b3", "filename": "pdf/pdfium/pdfium_engine.cc", "status": "modified", "additions": 8, "deletions": 2, "changes": 10, "blob_url": "https://github.com/chromium/chromium/blob/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2/pdf/pdfium/pdfium_engine.cc", "raw_url": "https://github.com...
void PDFiumEngine::ScrolledToYPosition(int position) { CancelPaints(); int old_y = position_.y(); position_.set_y(position); CalculateVisiblePages(); client_->Scroll(pp::Point(0, old_y - position)); OnSelectionChanged(); }
void PDFiumEngine::ScrolledToYPosition(int position) { CancelPaints(); int old_y = position_.y(); position_.set_y(position); CalculateVisiblePages(); client_->Scroll(pp::Point(0, old_y - position)); OnSelectionChanged(); }
C
null
null
null
@@ -1405,9 +1405,15 @@ bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) { DCHECK(defer_page_unload_); defer_page_unload_ = false; - for (int page_index : deferred_page_unloads_) + + // Store the pages to unload away because the act of unloading pages can cause + // there to be more pages to unload...
Chrome
01c9a7e71ca435651723e8cbcab0b3ad4c5351e2
345dab421e9ff30af4f11fc0b55ab02bdd7d1011
0
void PDFiumEngine::ScrolledToYPosition(int position) { CancelPaints(); int old_y = position_.y(); position_.set_y(position); CalculateVisiblePages(); client_->Scroll(pp::Point(0, old_y - position)); OnSelectionChanged(); }
3,429
null
Remote
Not required
null
CVE-2011-1428
https://www.cvedetails.com/cve/CVE-2011-1428/
CWE-20
Medium
Partial
Partial
null
2011-03-16
5.8
Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS AP...
2011-03-22
null
0
https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commit;h=c265cad1c95b84abfd4e8d861f25926ef13b5d91
c265cad1c95b84abfd4e8d861f25926ef13b5d91
null
0
null
null
hook_process_child (struct t_hook *hook_process) { char *exec_args[4] = { "sh", "-c", NULL, NULL }; /* * close stdin, so that process will fail to read stdin (process reading * stdin should not be run inside WeeChat!) */ close (STDIN_FILENO); /* redirect stdout/stderr to pipe (s...
hook_process_child (struct t_hook *hook_process) { char *exec_args[4] = { "sh", "-c", NULL, NULL }; /* * close stdin, so that process will fail to read stdin (process reading * stdin should not be run inside WeeChat!) */ close (STDIN_FILENO); /* redirect stdout/stderr to pipe (s...
C
null
null
bf2f7d33ef7c906142a839ad97bb81d8f13b0c6f
@@ -1700,7 +1700,40 @@ hook_connect (struct t_weechat_plugin *plugin, const char *proxy, const char *ad } /* - * hook_connect_gnutls_set_certificates: set gnutls + * hook_connect_gnutls_verify_certificates: verify certificates + */ + +#ifdef HAVE_GNUTLS +int +hook_connect_gnutls_verify_certificates (gnutls_session_...
savannah
https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=blob;f=src/core/wee-hook.c;h=606c878c97878fc8078c9491b363dd93844c9e26;hb=c265cad1c95b84abfd4e8d861f25926ef13b5d91
https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=blob;f=src/core/wee-hook.c;h=87942064dcbe6749c3f1adb71d3e0b0604870f74
0
hook_process_child (struct t_hook *hook_process) { char *exec_args[4] = { "sh", "-c", NULL, NULL }; /* * close stdin, so that process will fail to read stdin (process reading * stdin should not be run inside WeeChat!) */ close (STDIN_FILENO); /* redirect stdout/stderr to pipe (s...
151,324
null
Remote
Not required
Partial
CVE-2017-5009
https://www.cvedetails.com/cve/CVE-2017-5009/
CWE-119
Medium
Partial
Partial
null
2017-02-17
6.8
WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2018-01-04
Overflow
0
https://github.com/chromium/chromium/commit/1c40f9042ae2d6ee7483d72998aabb5e73b2ff60
1c40f9042ae2d6ee7483d72998aabb5e73b2ff60
DevTools: send proper resource type in Network.RequestWillBeSent This patch plumbs resoure type into the DispatchWillSendRequest instrumenation. This allows us to report accurate type in Network.RequestWillBeSent event, instead of "Other", that we report today. BUG=765501 R=dgozman Change-Id: I0134c08b841e8dd247fdc8...
0
third_party/WebKit/Source/core/inspector/InspectorTraceEvents.cpp
{"sha": "e0315835867b0b88b2fac25e800f67fc9c9ce7b2", "filename": "third_party/WebKit/LayoutTests/http/tests/devtools/network/network-imported-resource-content-expected.txt", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/1c40f9042ae2d6ee7483d729...
std::unique_ptr<TracedValue> InspectorPaintImageEvent::Data( const LayoutObject* owning_layout_object, const ImageResourceContent& image_resource) { std::unique_ptr<TracedValue> value = TracedValue::Create(); SetGeneratingNodeInfo(value.get(), owning_layout_object, "nodeId"); value->SetString("url", image...
std::unique_ptr<TracedValue> InspectorPaintImageEvent::Data( const LayoutObject* owning_layout_object, const ImageResourceContent& image_resource) { std::unique_ptr<TracedValue> value = TracedValue::Create(); SetGeneratingNodeInfo(value.get(), owning_layout_object, "nodeId"); value->SetString("url", image...
C
null
null
null
@@ -114,7 +114,8 @@ void InspectorTraceEvents::WillSendRequest( DocumentLoader* loader, ResourceRequest& request, const ResourceResponse& redirect_response, - const FetchInitiatorInfo&) { + const FetchInitiatorInfo&, + Resource::Type) { LocalFrame* frame = loader ? loader->GetFrame() : nullpt...
Chrome
1c40f9042ae2d6ee7483d72998aabb5e73b2ff60
1fab25bdd1a38c7f760dee27b06348257e0d0971
0
std::unique_ptr<TracedValue> InspectorPaintImageEvent::Data( const LayoutObject* owning_layout_object, const ImageResourceContent& image_resource) { std::unique_ptr<TracedValue> value = TracedValue::Create(); SetGeneratingNodeInfo(value.get(), owning_layout_object, "nodeId"); value->SetString("url", image...
28,576
null
Local
Not required
Complete
CVE-2013-6381
https://www.cvedetails.com/cve/CVE-2013-6381/
CWE-119
Medium
Complete
Complete
null
2013-11-26
6.9
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
2016-12-30
DoS Overflow
0
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
0
drivers/s390/net/qeth_core_main.c
{"sha": "bd8c09e7a8d9f519928be75819255cfe05bab2b7", "filename": "drivers/s390/net/qeth_core_main.c", "status": "modified", "additions": 5, "deletions": 1, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/6fb392b1a63ae36c31f62bc3fc8630b49d602b62/drivers/s390/net/qeth_core_main.c", "raw_url": "https://gi...
static int qeth_hw_trap_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; __u16 rc; cmd = (struct qeth_ipa_cmd *)data; rc = cmd->hdr.return_code; if (rc) QETH_CARD_TEXT_(card, 2, "trapc:%x", rc); return 0; }
static int qeth_hw_trap_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; __u16 rc; cmd = (struct qeth_ipa_cmd *)data; rc = cmd->hdr.return_code; if (rc) QETH_CARD_TEXT_(card, 2, "trapc:%x", rc); return 0; }
C
null
null
null
@@ -4451,7 +4451,7 @@ int qeth_snmp_command(struct qeth_card *card, char __user *udata) struct qeth_cmd_buffer *iob; struct qeth_ipa_cmd *cmd; struct qeth_snmp_ureq *ureq; - int req_len; + unsigned int req_len; struct qeth_arp_query_info qinfo = {0, }; int rc = 0; @@ -4467,6 +4467,10 @@ int qeth_snmp_comman...
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
17102f8be41699525cfeeab02adbaf969b156731
0
static int qeth_hw_trap_cb(struct qeth_card *card, struct qeth_reply *reply, unsigned long data) { struct qeth_ipa_cmd *cmd; __u16 rc; cmd = (struct qeth_ipa_cmd *)data; rc = cmd->hdr.return_code; if (rc) QETH_CARD_TEXT_(card, 2, "trapc:%x", rc); return 0; }
135,205
null
Remote
Not required
Partial
CVE-2015-6768
https://www.cvedetails.com/cve/CVE-2015-6768/
CWE-264
Low
Partial
Partial
null
2015-12-05
7.5
The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770.
2017-09-13
Bypass
0
https://github.com/chromium/chromium/commit/4c8b008f055f79e622344627fed7f820375a4f01
4c8b008f055f79e622344627fed7f820375a4f01
Change Document::detach() to RELEASE_ASSERT all subframes are gone. BUG=556724,577105 Review URL: https://codereview.chromium.org/1667573002 Cr-Commit-Position: refs/heads/master@{#373642}
0
third_party/WebKit/Source/core/dom/Document.cpp
{"sha": "112c8cd99e3f5587281d9fe297c61e280725fcbd", "filename": "third_party/WebKit/Source/core/dom/Document.cpp", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/4c8b008f055f79e622344627fed7f820375a4f01/third_party/WebKit/Source/core/dom/Docume...
void Document::didLoadAllScriptBlockingResources() { loadingTaskRunner()->postTask(BLINK_FROM_HERE, m_executeScriptsWaitingForResourcesTask->cancelAndCreate()); if (frame()) frame()->loader().client()->didRemoveAllPendingStylesheet(); if (m_gotoAnchorNeededAfterStylesheetsLoad && view()) v...
void Document::didLoadAllScriptBlockingResources() { loadingTaskRunner()->postTask(BLINK_FROM_HERE, m_executeScriptsWaitingForResourcesTask->cancelAndCreate()); if (frame()) frame()->loader().client()->didRemoveAllPendingStylesheet(); if (m_gotoAnchorNeededAfterStylesheetsLoad && view()) v...
C
null
null
null
@@ -2189,7 +2189,7 @@ void Document::attach(const AttachContext& context) void Document::detach(const AttachContext& context) { TRACE_EVENT0("blink", "Document::detach"); - ASSERT(!m_frame || m_frame->tree().childCount() == 0); + RELEASE_ASSERT(!m_frame || m_frame->tree().childCount() == 0); if (!isAc...
Chrome
4c8b008f055f79e622344627fed7f820375a4f01
6bc4255ecd25658b430cec1f6191e0044c5e6c7f
0
void Document::didLoadAllScriptBlockingResources() { loadingTaskRunner()->postTask(BLINK_FROM_HERE, m_executeScriptsWaitingForResourcesTask->cancelAndCreate()); if (frame()) frame()->loader().client()->didRemoveAllPendingStylesheet(); if (m_gotoAnchorNeededAfterStylesheetsLoad && view()) v...
129,531
null
Remote
Not required
Partial
CVE-2014-3173
https://www.cvedetails.com/cve/CVE-2014-3173/
CWE-119
Low
null
null
null
2014-08-26
5
The WebGL implementation in Google Chrome before 37.0.2062.94 does not ensure that clear calls interact properly with the state of a draw buffer, which allows remote attackers to cause a denial of service (read of uninitialized memory) via a crafted CANVAS element, related to gpu/command_buffer/service/framebuffer_mana...
2017-08-28
DoS Overflow
0
https://github.com/chromium/chromium/commit/ee7579229ff7e9e5ae28bf53aea069251499d7da
ee7579229ff7e9e5ae28bf53aea069251499d7da
Framebuffer clear() needs to consider the situation some draw buffers are disabled. This is when we expose DrawBuffers extension. BUG=376951 TEST=the attached test case, webgl conformance R=kbr@chromium.org,bajones@chromium.org Review URL: https://codereview.chromium.org/315283002 git-svn-id: svn://svn.chromium.org...
0
gpu/command_buffer/service/gles2_cmd_decoder.cc
{"sha": "4022b3defaa1e286e85e72f7ac6aa702fa1e9fb2", "filename": "gpu/command_buffer/service/framebuffer_manager.cc", "status": "modified", "additions": 51, "deletions": 0, "changes": 51, "blob_url": "https://github.com/chromium/chromium/blob/ee7579229ff7e9e5ae28bf53aea069251499d7da/gpu/command_buffer/service/framebuffe...
virtual ~AsyncUploadTokenCompletionObserver() { }
virtual ~AsyncUploadTokenCompletionObserver() { }
C
null
null
null
@@ -3076,7 +3076,20 @@ bool GLES2DecoderImpl::CheckFramebufferValid( glClearDepth(1.0f); state_.SetDeviceDepthMask(GL_TRUE); state_.SetDeviceCapabilityState(GL_SCISSOR_TEST, false); + bool reset_draw_buffer = false; + if ((backbuffer_needs_clear_bits_ | GL_COLOR_BUFFER_BIT) != 0 && + ...
Chrome
ee7579229ff7e9e5ae28bf53aea069251499d7da
38f4c0adff7b42decb912e5382a57e35729315a0
0
virtual ~AsyncUploadTokenCompletionObserver() { }
177,177
null
Remote
Not required
Complete
CVE-2016-2476
https://www.cvedetails.com/cve/CVE-2016-2476/
CWE-119
Medium
Complete
Complete
null
2016-06-12
9.3
mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not validate OMX buffer sizes, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27207275.
2016-06-13
Overflow +Priv
0
https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff
295c883fe3105b19bcd0f9e07d54c6b589fc5bff
DO NOT MERGE Verify OMX buffer sizes prior to access Bug: 27207275 Change-Id: I4412825d1ee233d993af0a67708bea54304ff62d
0
media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp
{"filename": "media/libmedia/IOMX.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/media/libmedia/IOMX.cpp", "patch": "@@ -18,6 +18,8 @@\n\n #define LOG_TAG \"IOMX\"\n #include <utils/Log.h>\n \n+#include <sys/mman.h>\n+\n #include <binder/IMemory.h>\n...
uint32_t SoftVideoDecoderOMXComponent::outputBufferHeight() { return mIsAdaptive ? mAdaptiveMaxHeight : mHeight; }
uint32_t SoftVideoDecoderOMXComponent::outputBufferHeight() { return mIsAdaptive ? mAdaptiveMaxHeight : mHeight; }
C
null
null
null
@@ -264,6 +264,10 @@ OMX_VIDEO_PARAM_PORTFORMATTYPE *formatParams = (OMX_VIDEO_PARAM_PORTFORMATTYPE *)params; + if (!isValidOMXParam(formatParams)) { + return OMX_ErrorBadParameter; + } + if (formatParams->nPortIndex > kMaxPortIndex) { ...
Android
https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/
https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff%5E/
0
uint32_t SoftVideoDecoderOMXComponent::outputBufferHeight() { return mIsAdaptive ? mAdaptiveMaxHeight : mHeight; }
182,243
null
Local
Not required
Partial
CVE-2018-16425
https://www.cvedetails.com/cve/CVE-2018-16425/
CWE-415
Low
Partial
Partial
null
2018-09-03
4.6
A double free when handling responses from an HSM Card in sc_pkcs15emu_sc_hsm_init in libopensc/pkcs15-sc-hsm.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
2019-09-11
DoS
1
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
src/libopensc/card-cac.c
{"sha": "756788a0fbbbed8487e8cf33b6115bb4d4f58860", "filename": "src/libopensc/card-cac.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/OpenSC/OpenSC/blob/360e95d45ac4123255a4c796db96337f332160ad/src/libopensc/card-cac.c", "raw_url": "https://github.com/OpenSC/Ope...
static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial) { cac_private_data_t * priv = CAC_DATA(card); SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL); if (card->serialnr.len) { *serial = card->serialnr; SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL...
static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial) { cac_private_data_t * priv = CAC_DATA(card); SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL); if (card->serialnr.len) { *serial = card->serialnr; SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL...
C
memcpy(serial->value, priv->cac_id, serial->len);
memcpy(serial->value, priv->cac_id, priv->cac_id_len);
null
@@ -794,7 +794,7 @@ static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* seri } if (priv->cac_id_len) { serial->len = MIN(priv->cac_id_len, SC_MAX_SERIALNR); - memcpy(serial->value, priv->cac_id, priv->cac_id_len); + memcpy(serial->value, priv->cac_id, serial->len); SC_FUNC_RET...
OpenSC
360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
1
static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial) { cac_private_data_t * priv = CAC_DATA(card); SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL); if (card->serialnr.len) { *serial = card->serialnr; SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL...
163,312
null
Remote
Not required
null
CVE-2017-15423
https://www.cvedetails.com/cve/CVE-2017-15423/
CWE-310
Low
Partial
null
null
2018-08-28
5
Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.
2018-11-02
null
0
https://github.com/chromium/chromium/commit/a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2
a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2
Roll src/third_party/boringssl/src 664e99a64..696c13bd6 https://boringssl.googlesource.com/boringssl/+log/664e99a6486c293728097c661332f92bf2d847c6..696c13bd6ab78011adfe7b775519c8b7cc82b604 BUG=778101 Change-Id: I8dda4f3db952597148e3c7937319584698d00e1c Reviewed-on: https://chromium-review.googlesource.com/747941 Rev...
0
content/renderer/render_thread_impl.cc
{"sha": "7574d5f80ec19444322f211bc11c16f21d8f8a26", "filename": "DEPS", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2/DEPS", "raw_url": "https://github.com/chromium/chromium/raw/a263d1cf62a9c75be6aaafde...
RenderThreadImpl::CreateMediaStreamCenter( blink::WebMediaStreamCenterClient* client) { std::unique_ptr<blink::WebMediaStreamCenter> media_stream_center; #if BUILDFLAG(ENABLE_WEBRTC) if (!media_stream_center) { media_stream_center = GetContentClient()->renderer()->OverrideCreateWebMediaStreamCenter(...
RenderThreadImpl::CreateMediaStreamCenter( blink::WebMediaStreamCenterClient* client) { std::unique_ptr<blink::WebMediaStreamCenter> media_stream_center; #if BUILDFLAG(ENABLE_WEBRTC) if (!media_stream_center) { media_stream_center = GetContentClient()->renderer()->OverrideCreateWebMediaStreamCenter(...
C
null
null
null
@@ -994,9 +994,6 @@ void RenderThreadImpl::Init( if (!command_line.HasSwitch(switches::kSingleProcess)) base::SequencedWorkerPool::EnableForProcess(); - EVP_set_buggy_rsa_parser( - base::FeatureList::IsEnabled(features::kBuggyRSAParser)); - GetConnector()->BindInterface(mojom::kBrowserServiceName, ...
Chrome
a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2
0fe9417f1d39231fa41c41d8eeaa1afde8d364a3
0
RenderThreadImpl::CreateMediaStreamCenter( blink::WebMediaStreamCenterClient* client) { std::unique_ptr<blink::WebMediaStreamCenter> media_stream_center; #if BUILDFLAG(ENABLE_WEBRTC) if (!media_stream_center) { media_stream_center = GetContentClient()->renderer()->OverrideCreateWebMediaStreamCenter(...
176,940
null
Remote
Not required
Complete
CVE-2016-2496
https://www.cvedetails.com/cve/CVE-2016-2496/
CWE-264
Low
Complete
Complete
null
2016-06-12
10
The Framework UI permission-dialog implementation in Android 6.x before 2016-06-01 allows attackers to conduct tapjacking attacks and access arbitrary private-storage files by creating a partially overlapping window, aka internal bug 26677796.
2016-06-14
null
0
https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf
03a53d1c7765eeb3af0bc34c3dff02ada1953fbf
Add new MotionEvent flag for partially obscured windows. Due to more complex window layouts resulting in lots of overlapping windows, the policy around FLAG_WINDOW_IS_OBSCURED has changed to only be set when the point at which the window was touched is obscured. Unfortunately, this doesn't prevent tapjacking attacks t...
0
services/inputflinger/InputDispatcher.cpp
{"filename": "include/input/Input.h", "raw_url": "https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf/include/input/Input.h", "patch": "@@ -45,6 +45,19 @@\n\n };\n \n enum {\n+\n+ /**\n+ * This flag indicates that the window that received this motion event is pa...
ssize_t InputDispatcher::getConnectionIndexLocked(const sp<InputChannel>& inputChannel) { ssize_t connectionIndex = mConnectionsByFd.indexOfKey(inputChannel->getFd()); if (connectionIndex >= 0) { sp<Connection> connection = mConnectionsByFd.valueAt(connectionIndex); if (connection->inputChannel.get() == inpu...
ssize_t InputDispatcher::getConnectionIndexLocked(const sp<InputChannel>& inputChannel) { ssize_t connectionIndex = mConnectionsByFd.indexOfKey(inputChannel->getFd()); if (connectionIndex >= 0) { sp<Connection> connection = mConnectionsByFd.valueAt(connectionIndex); if (connection->inputChannel.get() == inpu...
C
null
null
null
@@ -1225,6 +1225,8 @@ int32_t outsideTargetFlags = InputTarget::FLAG_DISPATCH_AS_OUTSIDE; if (isWindowObscuredAtPointLocked(windowHandle, x, y)) { outsideTargetFlags |= InputTarget::FLAG_WINDOW_IS_OBSCURED; + } else if (isWindowObscu...
Android
https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf/
https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf%5E/
0
ssize_t InputDispatcher::getConnectionIndexLocked(const sp<InputChannel>& inputChannel) { ssize_t connectionIndex = mConnectionsByFd.indexOfKey(inputChannel->getFd()); if (connectionIndex >= 0) { sp<Connection> connection = mConnectionsByFd.valueAt(connectionIndex); if (connection->inputChannel.get() == inpu...
96,301
null
Remote
Not required
Partial
CVE-2015-3215
https://www.cvedetails.com/cve/CVE-2015-3215/
CWE-20
Low
null
null
null
2017-06-26
5
The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.
2017-07-03
DoS
0
https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/723416fa4210b7464b28eab89cc76252e6193ac1
723416fa4210b7464b28eab89cc76252e6193ac1
NetKVM: BZ#1169718: Checking the length only on read Signed-off-by: Joseph Hindin <yhindin@rehat.com>
0
NetKVM/Common/ParaNdis-TX.cpp
{"sha": "9024ba631fc1c6914c41b9af789a6aa9c10bd248", "filename": "NetKVM/Common/ParaNdis-Common.cpp", "status": "modified", "additions": 4, "deletions": 2, "changes": 6, "blob_url": "https://github.com/YanVugenfirer/kvm-guest-drivers-windows/blob/723416fa4210b7464b28eab89cc76252e6193ac1/NetKVM/Common/ParaNdis-Common.cpp...
void CNB::BuildPriorityHeader(PETH_HEADER EthHeader, PVLAN_HEADER VlanHeader) const { VlanHeader->TCI = RtlUshortByteSwap(m_ParentNBL->TCI()); if (VlanHeader->TCI != 0) { VlanHeader->EthType = EthHeader->EthType; EthHeader->EthType = RtlUshortByteSwap(PRIO_HEADER_ETH_TYPE); } }
void CNB::BuildPriorityHeader(PETH_HEADER EthHeader, PVLAN_HEADER VlanHeader) const { VlanHeader->TCI = RtlUshortByteSwap(m_ParentNBL->TCI()); if (VlanHeader->TCI != 0) { VlanHeader->EthType = EthHeader->EthType; EthHeader->EthType = RtlUshortByteSwap(PRIO_HEADER_ETH_TYPE); } }
C
null
null
null
@@ -649,6 +649,7 @@ void CNB::SetupLSO(virtio_net_hdr_basic *VirtioHeader, PVOID IpHeader, ULONG Eth tTcpIpPacketParsingResult packetReview; packetReview = ParaNdis_CheckSumVerifyFlat(reinterpret_cast<IPv4Header*>(IpHeader), EthPayloadLength, pcrIpChecksum | pcr...
kvm-guest-drivers-windows
723416fa4210b7464b28eab89cc76252e6193ac1
59cb10c492e653d64b273ac33943f227ef41ce47
0
void CNB::BuildPriorityHeader(PETH_HEADER EthHeader, PVLAN_HEADER VlanHeader) const { VlanHeader->TCI = RtlUshortByteSwap(m_ParentNBL->TCI()); if (VlanHeader->TCI != 0) { VlanHeader->EthType = EthHeader->EthType; EthHeader->EthType = RtlUshortByteSwap(PRIO_HEADER_ETH_TYPE); } }
86,947
null
Remote
Not required
null
CVE-2019-1010294
https://www.cvedetails.com/cve/CVE-2019-1010294/
CWE-189
Low
Partial
null
null
2019-07-15
5
Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later.
2019-07-16
null
0
https://github.com/OP-TEE/optee_os/commit/7e768f8a473409215fe3fff8f6e31f8a3a0103c6
7e768f8a473409215fe3fff8f6e31f8a3a0103c6
core: clear the entire TA area Previously we cleared (memset to zero) the size corresponding to code and data segments, however the allocation for the TA is made on the granularity of the memory pool, meaning that we did not clear all memory and because of that we could potentially leak code and data of a previous loa...
0
core/arch/arm/kernel/user_ta.c
{"sha": "e70061e36861e277a5e3340843ad80bdbb90c806", "filename": "core/arch/arm/kernel/user_ta.c", "status": "modified", "additions": 6, "deletions": 2, "changes": 8, "blob_url": "https://github.com/OP-TEE/optee_os/blob/7e768f8a473409215fe3fff8f6e31f8a3a0103c6/core/arch/arm/kernel/user_ta.c", "raw_url": "https://github....
static void release_ta_memory_by_mobj(struct mobj *mobj) { void *va; if (!mobj) return; va = mobj_get_va(mobj, 0); if (!va) return; memset(va, 0, mobj->size); cache_op_inner(DCACHE_AREA_CLEAN, va, mobj->size); }
static void release_ta_memory_by_mobj(struct mobj *mobj) { void *va; if (!mobj) return; va = mobj_get_va(mobj, 0); if (!va) return; memset(va, 0, mobj->size); cache_op_inner(DCACHE_AREA_CLEAN, va, mobj->size); }
C
null
null
null
@@ -197,8 +197,12 @@ static struct mobj *alloc_ta_mem(size_t size) #else struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr); - if (mobj) - memset(mobj_get_va(mobj, 0), 0, size); + if (mobj) { + size_t granularity = BIT(tee_mm_sec_ddr.shift); + + /* Round up to allocation granularity size */ ...
optee_os
7e768f8a473409215fe3fff8f6e31f8a3a0103c6
5ee85d76897c95c21fa5eb86d66b288b9b19c62b
0
static void release_ta_memory_by_mobj(struct mobj *mobj) { void *va; if (!mobj) return; va = mobj_get_va(mobj, 0); if (!va) return; memset(va, 0, mobj->size); cache_op_inner(DCACHE_AREA_CLEAN, va, mobj->size); }
15,538
null
Remote
Not required
Partial
CVE-2016-1908
https://www.cvedetails.com/cve/CVE-2016-1908/
CWE-254
Low
Partial
Partial
null
2017-04-11
7.5
The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as ...
2018-09-11
null
0
https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
null
0
null
null
mux_client_request_stdio_fwd(int fd) { Buffer m; char *e; u_int type, rid, sid; int devnull; debug3("%s: entering", __func__); if ((muxserver_pid = mux_client_request_alive(fd)) == 0) { error("%s: master alive request failed", __func__); return -1; } signal(SIGPIPE, SIG_IGN); if (stdin_null_flag) { i...
mux_client_request_stdio_fwd(int fd) { Buffer m; char *e; u_int type, rid, sid; int devnull; debug3("%s: entering", __func__); if ((muxserver_pid = mux_client_request_alive(fd)) == 0) { error("%s: master alive request failed", __func__); return -1; } signal(SIGPIPE, SIG_IGN); if (stdin_null_flag) { i...
C
null
null
9a728cc918fad67c8a9a71201088b1e150340ba4
@@ -1,4 +1,4 @@ -/* $OpenBSD: mux.c,v 1.57 2015/12/26 07:46:03 semarie Exp $ */ +/* $OpenBSD: mux.c,v 1.58 2016/01/13 23:04:47 djm Exp $ */ /* * Copyright (c) 2002-2008 Damien Miller <djm@openbsd.org> * @@ -1354,16 +1354,18 @@ mux_session_confirm(int id, int success, void *arg) char *proto, *data; /* Get r...
mindrot
https://anongit.mindrot.org/openssh.git/tree/mux.c?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
https://anongit.mindrot.org/openssh.git/tree/mux.c?id=9a728cc918fad67c8a9a71201088b1e150340ba4
0
mux_client_request_stdio_fwd(int fd) { Buffer m; char *e; u_int type, rid, sid; int devnull; debug3("%s: entering", __func__); if ((muxserver_pid = mux_client_request_alive(fd)) == 0) { error("%s: master alive request failed", __func__); return -1; } signal(SIGPIPE, SIG_IGN); if (stdin_null_flag) { i...
179,335
null
Remote
Not required
Partial
CVE-2013-0281
https://www.cvedetails.com/cve/CVE-2013-0281/
CWE-399
Medium
null
null
null
2013-11-23
4.3
Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).
2019-04-22
DoS
184
https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93
564f7cc2a51dcd2f28ab12a13394f31be5aa3c93
High: core: Internal tls api improvements for reuse with future LRMD tls backend.
9
lib/common/remote.c
{"sha": "aa5f6a82723ba3fe06403b690fd642ade58197d1", "filename": "cib/callbacks.c", "status": "modified", "additions": 9, "deletions": 4, "changes": 13, "blob_url": "https://github.com/ClusterLabs/pacemaker/blob/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93/cib/callbacks.c", "raw_url": "https://github.com/ClusterLabs/pacemak...
crm_recv_remote_msg(void *session, gboolean encrypted) crm_parse_remote_buffer(char **msg_buf) { char *buf = NULL; char *start = NULL; char *end = NULL; xmlNode *xml = NULL; if (*msg_buf == NULL) { return NULL; } /* take ownership of the buffer */ buf = *msg_buf; *msg_bu...
crm_recv_remote_msg(void *session, gboolean encrypted) { char *reply = NULL; xmlNode *xml = NULL; if (encrypted) { #ifdef HAVE_GNUTLS_GNUTLS_H reply = cib_recv_tls(session); #else CRM_ASSERT(encrypted == FALSE); #endif } else { reply = cib_recv_plaintext(GPOINTER_TO_INT...
C
crm_parse_remote_buffer(char **msg_buf) char *buf = NULL; char *start = NULL; char *end = NULL; if (*msg_buf == NULL) { return NULL; } /* take ownership of the buffer */ buf = *msg_buf; *msg_buf = NULL; /* MSGS are separated by a '\r\n\r\n'. Split a message off the buffer a...
char *reply = NULL; reply = cib_recv_tls(session); reply = cib_recv_plaintext(GPOINTER_TO_INT(session)); } else { xml = string2xml(reply); if (xml == NULL) { crm_err("Couldn't parse: '%.120s'", reply); free(reply); return xml;
null
@@ -25,8 +25,10 @@ #include <sys/stat.h> #include <unistd.h> #include <sys/socket.h> - +#include <arpa/inet.h> #include <netinet/ip.h> +#include <netdb.h> + #include <stdlib.h> #include <errno.h> @@ -42,30 +44,40 @@ #endif #ifdef HAVE_GNUTLS_GNUTLS_H -const int tls_kx_order[] = { +const int anon_tls_kx_orde...
pacemaker
564f7cc2a51dcd2f28ab12a13394f31be5aa3c93
df60384260759397921802e7287d4f23a3a1f2a9
1
crm_recv_remote_msg(void *session, gboolean encrypted) //fix_flaw_line_below: //crm_parse_remote_buffer(char **msg_buf) { //flaw_line_below: char *reply = NULL; //fix_flaw_line_below: // char *buf = NULL; //fix_flaw_line_below: // char *start = NULL; //fix_flaw_line_below: // char *end = NULL; xmlNod...
64,721
null
Remote
Not required
Partial
CVE-2017-9225
https://www.cvedetails.com/cve/CVE-2017-9225/
CWE-787
Low
Partial
Partial
null
2017-05-24
7.5
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A...
2017-06-02
Overflow
0
https://github.com/kkos/oniguruma/commit/166a6c3999bf06b4de0ab4ce6b088a468cc4029f
166a6c3999bf06b4de0ab4ce6b088a468cc4029f
fix #56 : return invalid result for codepoint 0xFFFFFFFF
0
src/unicode_unfold_key.c
{"sha": "34f9c2fd4110efb212786b9d0ed1d76800ecc539", "filename": "src/gperf_unfold_key_conv.py", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/kkos/oniguruma/blob/166a6c3999bf06b4de0ab4ce6b088a468cc4029f/src/gperf_unfold_key_conv.py", "raw_url": "https://github.com/k...
hash(OnigCodePoint codes[]) { static const unsigned short asso_values[] = { 8, 6, 2, 124, 5, 1, 36, 1545, 1545, 1545, 1545, 1545, 1545, 11, 1545, 1545, 1545, 16, 1545, 1545, 562, 1545, 1545, 1545, 1545, 77, 1545, 1545, 1545, 1545, 1545, 0, 3, 1545, 61, 628...
hash(OnigCodePoint codes[]) { static const unsigned short asso_values[] = { 8, 6, 2, 124, 5, 1, 36, 1545, 1545, 1545, 1545, 1545, 1545, 11, 1545, 1545, 1545, 16, 1545, 1545, 562, 1545, 1545, 1545, 1545, 77, 1545, 1545, 1545, 1545, 1545, 0, 3, 1545, 61, 628...
C
null
null
null
@@ -2850,7 +2850,7 @@ unicode_unfold_key(OnigCodePoint code) { OnigCodePoint gcode = wordlist[key].code; - if (code == gcode) + if (code == gcode && wordlist[key].index >= 0) return &wordlist[key]; } }
oniguruma
166a6c3999bf06b4de0ab4ce6b088a468cc4029f
42c9a8aa87922f2a0fbb85237dfd2b3dadbdafb7
0
hash(OnigCodePoint codes[]) { static const unsigned short asso_values[] = { 8, 6, 2, 124, 5, 1, 36, 1545, 1545, 1545, 1545, 1545, 1545, 11, 1545, 1545, 1545, 16, 1545, 1545, 562, 1545, 1545, 1545, 1545, 77, 1545, 1545, 1545, 1545, 1545, 0, 3, 1545, 61, 628...
101,386
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2011-11
null
0
https://github.com/chromium/chromium/commit/19190765882e272a6a2162c89acdb29110f7e3cf
19190765882e272a6a2162c89acdb29110f7e3cf
Revert 102184 - [Sync] use base::Time in sync Make EntryKernel/Entry/BaseNode use base::Time instead of int64s. Add sync/util/time.h, with utility functions to manage the sync proto time format. Store times on disk in proto format instead of the local system. This requires a database version bump (to 77). Update Se...
0
chrome/browser/sync/internal_api/base_node.cc
{"sha": "98d00951a5cdbae37c5ff82273375587493a88a0", "filename": "chrome/browser/sync/engine/build_commit_command.cc", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/chromium/chromium/blob/19190765882e272a6a2162c89acdb29110f7e3cf/chrome/browser/sync/engine/build_commi...
GURL BaseNode::GetURL() const { return GURL(GetBookmarkSpecifics().url()); }
GURL BaseNode::GetURL() const { return GURL(GetBookmarkSpecifics().url()); }
C
null
null
null
@@ -23,7 +23,6 @@ #include "chrome/browser/sync/syncable/directory_manager.h" #include "chrome/browser/sync/syncable/syncable.h" #include "chrome/browser/sync/syncable/syncable_id.h" -#include "chrome/browser/sync/util/time.h" using syncable::SPECIFICS; using sync_pb::AutofillProfileSpecifics; @@ -175,7 +174,7 @...
Chrome
19190765882e272a6a2162c89acdb29110f7e3cf
603b62a3200ccc75370d3750b5a76f8f8960d299
0
GURL BaseNode::GetURL() const { return GURL(GetBookmarkSpecifics().url()); }
26,410
null
Local
Not required
Complete
CVE-2011-2906
https://www.cvedetails.com/cve/CVE-2011-2906/
CWE-189
Low
null
null
null
2012-05-24
4.9
** DISPUTED ** Integer signedness error in the pmcraid_ioctl_passthrough function in drivers/scsi/pmcraid.c in the Linux kernel before 3.1 might allow local users to cause a denial of service (memory consumption or memory corruption) via a negative size value in an ioctl call. NOTE: this may be a vulnerability only in...
2012-05-29
DoS Mem. Corr.
0
https://github.com/torvalds/linux/commit/b5b515445f4f5a905c5dd27e6e682868ccd6c09d
b5b515445f4f5a905c5dd27e6e682868ccd6c09d
[SCSI] pmcraid: reject negative request size There's a code path in pmcraid that can be reached via device ioctl that causes all sorts of ugliness, including heap corruption or triggering the OOM killer due to consecutive allocation of large numbers of pages. First, the user can call pmcraid_chr_ioctl(), with a type ...
0
drivers/scsi/pmcraid.c
{"sha": "d079f9a3c6b3a7fc2dedd4cc850d32fcc82b4930", "filename": "drivers/scsi/pmcraid.c", "status": "modified", "additions": 3, "deletions": 0, "changes": 3, "blob_url": "https://github.com/torvalds/linux/blob/b5b515445f4f5a905c5dd27e6e682868ccd6c09d/drivers/scsi/pmcraid.c", "raw_url": "https://github.com/torvalds/linu...
pmcraid_allocate_cmd_blocks(struct pmcraid_instance *pinstance) { int i; sprintf(pinstance->cmd_pool_name, "pmcraid_cmd_pool_%d", pinstance->host->unique_id); pinstance->cmd_cachep = kmem_cache_create( pinstance->cmd_pool_name, sizeof(struct pmcraid_cmd), 0, SLAB_HWCACHE_ALIGN, NULL); if (!pinst...
pmcraid_allocate_cmd_blocks(struct pmcraid_instance *pinstance) { int i; sprintf(pinstance->cmd_pool_name, "pmcraid_cmd_pool_%d", pinstance->host->unique_id); pinstance->cmd_cachep = kmem_cache_create( pinstance->cmd_pool_name, sizeof(struct pmcraid_cmd), 0, SLAB_HWCACHE_ALIGN, NULL); if (!pinst...
C
null
null
null
@@ -3871,6 +3871,9 @@ static long pmcraid_ioctl_passthrough( pmcraid_err("couldn't build passthrough ioadls\n"); goto out_free_buffer; } + } else if (request_size < 0) { + rc = -EINVAL; + goto out_free_buffer; } /* If data is being written into the device, copy the data from user
linux
b5b515445f4f5a905c5dd27e6e682868ccd6c09d
5911e963d3718e306bcac387b83e259aa4228896
0
pmcraid_allocate_cmd_blocks(struct pmcraid_instance *pinstance) { int i; sprintf(pinstance->cmd_pool_name, "pmcraid_cmd_pool_%d", pinstance->host->unique_id); pinstance->cmd_cachep = kmem_cache_create( pinstance->cmd_pool_name, sizeof(struct pmcraid_cmd), 0, SLAB_HWCACHE_ALIGN, NULL); if (!pinst...
107,432
null
null
null
null
null
null
null
null
null
null
null
null
null
null
2011-02
null
0
https://github.com/chromium/chromium/commit/0c4225d1e9b23e7071bbf47ada310a9a7e5661a3
0c4225d1e9b23e7071bbf47ada310a9a7e5661a3
2011-07-01 Oliver Hunt <oliver@apple.com> IE Web Workers demo crashes in JSC::SlotVisitor::visitChildren() https://bugs.webkit.org/show_bug.cgi?id=63732 Reviewed by Gavin Barraclough. Initialise the memory at the head of the new storage so that GC is safe if triggered by rep...
0
third_party/WebKit/Source/JavaScriptCore/runtime/JSArray.cpp
{"sha": "ea011f3a35c70ada6a0a43516082ae7e0b865376", "filename": "third_party/WebKit/Source/JavaScriptCore/ChangeLog", "status": "modified", "additions": 13, "deletions": 0, "changes": 13, "blob_url": "https://github.com/chromium/chromium/blob/0c4225d1e9b23e7071bbf47ada310a9a7e5661a3/third_party/WebKit/Source/JavaScript...
int get_balance_factor(handle h) { if (m_nodes[h].gt & 0x80000000) return -1; return static_cast<unsigned>(m_nodes[h].lt) >> 31; }
int get_balance_factor(handle h) { if (m_nodes[h].gt & 0x80000000) return -1; return static_cast<unsigned>(m_nodes[h].lt) >> 31; }
C
null
null
null
@@ -638,7 +638,10 @@ bool JSArray::increaseVectorPrefixLength(unsigned newLength) m_vectorLength = newLength; fastFree(storage->m_allocBase); - + ASSERT(newLength > vectorLength); + unsigned delta = newLength - vectorLength; + for (unsigned i = 0; i < delta; i++) + m_storage->m_vector[i]...
Chrome
0c4225d1e9b23e7071bbf47ada310a9a7e5661a3
800981f5bbce63fb5da3b8b1bb43e36a04ec18ac
0
int get_balance_factor(handle h) { if (m_nodes[h].gt & 0x80000000) return -1; return static_cast<unsigned>(m_nodes[h].lt) >> 31; }
76,311
null
Local
Not required
null
CVE-2018-18710
https://www.cvedetails.com/cve/CVE-2018-18710/
CWE-200
Low
Partial
null
null
2018-10-29
2.1
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
2019-04-03
+Info
0
https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
cdrom: fix improper type cast, which can leat to information leak. There is another cast from unsigned long to int which causes a bounds check to fail with specially crafted input. The value is then used as an index in the slot array in cdrom_slot_status(). This issue is similar to CVE-2018-16658 and CVE-2018-10940. ...
0
drivers/cdrom/cdrom.c
{"sha": "10802d1fc554c02a696371639a3869f22c06736c", "filename": "drivers/cdrom/cdrom.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276/drivers/cdrom/cdrom.c", "raw_url": "https://github.com/torvalds/linux/...
static void setup_send_key(struct packet_command *cgc, unsigned agid, unsigned type) { cgc->cmd[0] = GPCMD_SEND_KEY; cgc->cmd[10] = type | (agid << 6); switch (type) { case 1: { cgc->buflen = 16; break; } case 3: { cgc->buflen = 12; break; } case 6: { cgc->buflen = 8; break; } } cgc->...
static void setup_send_key(struct packet_command *cgc, unsigned agid, unsigned type) { cgc->cmd[0] = GPCMD_SEND_KEY; cgc->cmd[10] = type | (agid << 6); switch (type) { case 1: { cgc->buflen = 16; break; } case 3: { cgc->buflen = 12; break; } case 6: { cgc->buflen = 8; break; } } cgc->...
C
null
null
null
@@ -2445,7 +2445,7 @@ static int cdrom_ioctl_select_disc(struct cdrom_device_info *cdi, return -ENOSYS; if (arg != CDSL_CURRENT && arg != CDSL_NONE) { - if ((int)arg >= cdi->capacity) + if (arg >= cdi->capacity) return -EINVAL; }
linux
e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
fb6360b1ef33b7799e6a81e1075a47e3b8ae01fd
0
static void setup_send_key(struct packet_command *cgc, unsigned agid, unsigned type) { cgc->cmd[0] = GPCMD_SEND_KEY; cgc->cmd[10] = type | (agid << 6); switch (type) { case 1: { cgc->buflen = 16; break; } case 3: { cgc->buflen = 12; break; } case 6: { cgc->buflen = 8; break; } } cgc->...
74,685
null
Local
Not required
Partial
CVE-2014-4978
https://www.cvedetails.com/cve/CVE-2014-4978/
CWE-59
Low
null
Partial
null
2017-12-29
3.6
The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph.
2018-01-10
null
0
https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d
9c2cd3c93c05d009a91d84eedbb85873b0cb505d
Fixes insecure use of temporary file (CVE-2014-4978).
0
librawstudio/rs-filter.c
{"sha": "352b23c51a00b32c4993732b1534ff5a988ee763", "filename": "librawstudio/rs-filter.c", "status": "modified", "additions": 18, "deletions": 3, "changes": 21, "blob_url": "https://github.com/rawstudio/rawstudio/blob/9c2cd3c93c05d009a91d84eedbb85873b0cb505d/librawstudio/rs-filter.c", "raw_url": "https://github.com/ra...
rs_filter_set_label(RSFilter *filter, const gchar *label) { g_return_if_fail(RS_IS_FILTER(filter)); filter->label = label; }
rs_filter_set_label(RSFilter *filter, const gchar *label) { g_return_if_fail(RS_IS_FILTER(filter)); filter->label = label; }
C
null
null
null
@@ -772,17 +772,32 @@ void rs_filter_graph(RSFilter *filter) { g_return_if_fail(RS_IS_FILTER(filter)); + gchar *dot_filename; + gchar *png_filename; + gchar *command_line; GString *str = g_string_new("digraph G {\n"); rs_filter_graph_helper(str, filter); g_string_append_printf(str, "}\n"); - g_file_set_co...
rawstudio
9c2cd3c93c05d009a91d84eedbb85873b0cb505d
70f2da78b575ea1105eae865c7e49465b838bdfd
0
rs_filter_set_label(RSFilter *filter, const gchar *label) { g_return_if_fail(RS_IS_FILTER(filter)); filter->label = label; }
5,491
null
Remote
Not required
Partial
CVE-2017-9739
https://www.cvedetails.com/cve/CVE-2017-9739/
CWE-125
Medium
Partial
Partial
null
2017-07-26
6.8
The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
2019-10-02
DoS
0
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
c501a58f8d5650c8ba21d447c0d6f07eafcb0f15
null
0
null
null
static TT_F26Dot6 Round_Super( EXEC_OPS TT_F26Dot6 distance, TT_F26Dot6 compensation ) { TT_F26Dot6 val; if ( distance >= 0 ) { val = (distance - CUR.phase + CUR.threshold + compensation) & (-CUR.period); if ( val < 0 ) va...
static TT_F26Dot6 Round_Super( EXEC_OPS TT_F26Dot6 distance, TT_F26Dot6 compensation ) { TT_F26Dot6 val; if ( distance >= 0 ) { val = (distance - CUR.phase + CUR.threshold + compensation) & (-CUR.period); if ( val < 0 ) va...
C
null
null
937ccd17ac65935633b2ebc06cb7089b91e17e6b
@@ -1794,6 +1794,12 @@ static int nInstrCount=0; static void Ins_JMPR( INS_ARG ) { + if ( BOUNDS(CUR.IP + args[0], CUR.codeSize ) ) + { + CUR.error = TT_Err_Invalid_Reference; + return; + } + CUR.IP += (Int)(args[0]); CUR.step_ins = FALSE;
ghostscript
http://git.ghostscript.com/?p=ghostpdl.git;a=blob;f=base/ttinterp.c;h=adf3f0c94b9f5c023dabe25782970c591fb76c28;hb=adf3f0c94b9f5c023dabe25782970c591fb76c28
http://git.ghostscript.com/?p=ghostpdl.git;a=blob;f=base/ttinterp.c;h=af457e89f91bc7f52bee1538a5ce8e12cb92c680;hb=af457e89f91bc7f52bee1538a5ce8e12cb92c680
0
static TT_F26Dot6 Round_Super( EXEC_OPS TT_F26Dot6 distance, TT_F26Dot6 compensation ) { TT_F26Dot6 val; if ( distance >= 0 ) { val = (distance - CUR.phase + CUR.threshold + compensation) & (-CUR.period); if ( val < 0 ) va...
125,718
null
Remote
Not required
Complete
CVE-2013-0840
https://www.cvedetails.com/cve/CVE-2013-0840/
null
Low
Complete
Complete
null
2013-01-24
10
Google Chrome before 24.0.1312.56 does not validate URLs during the opening of new windows, which has unspecified impact and remote attack vectors.
2017-09-18
null
0
https://github.com/chromium/chromium/commit/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d
7f48b71cb22bb2fc9fcec2013e9eaff55381a43d
Filter more incoming URLs in the CreateWindow path. BUG=170532 Review URL: https://chromiumcodereview.appspot.com/12036002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178728 0039d316-1c4b-4281-b951-d872f2087c98
0
content/browser/renderer_host/render_view_host_impl.cc
{"sha": "a659ea67fa7be30bb38257b1b4003982acdb4deb", "filename": "content/browser/renderer_host/render_message_filter.cc", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d/content/browser/renderer_host/rend...
void RenderViewHostImpl::SwapOut(int new_render_process_host_id, int new_request_id) { is_waiting_for_unload_ack_ = true; increment_in_flight_event_count(); StartHangMonitorTimeout(TimeDelta::FromMilliseconds(kUnloadTimeoutMS)); ViewMsg_SwapOut_Params params; params.closing_p...
void RenderViewHostImpl::SwapOut(int new_render_process_host_id, int new_request_id) { is_waiting_for_unload_ack_ = true; increment_in_flight_event_count(); StartHangMonitorTimeout(TimeDelta::FromMilliseconds(kUnloadTimeoutMS)); ViewMsg_SwapOut_Params params; params.closing_p...
C
null
null
null
@@ -1056,8 +1056,10 @@ void RenderViewHostImpl::CreateNewWindow( ViewHostMsg_CreateWindow_Params validated_params(params); ChildProcessSecurityPolicyImpl* policy = ChildProcessSecurityPolicyImpl::GetInstance(); - // TODO(cevans): also validate opener_url, opener_security_origin. FilterURL(policy, GetPr...
Chrome
7f48b71cb22bb2fc9fcec2013e9eaff55381a43d
3c8352cdd0c90b22e7130a6949c81192804a65ba
0
void RenderViewHostImpl::SwapOut(int new_render_process_host_id, int new_request_id) { // This will be set back to false in OnSwapOutACK, just before we replace // this RVH with the pending RVH. is_waiting_for_unload_ack_ = true; // Start the hang monitor in case the renderer ha...
101,955
null
Remote
Not required
Partial
CVE-2011-3897
https://www.cvedetails.com/cve/CVE-2011-3897/
CWE-399
Medium
Partial
Partial
null
2011-11-11
6.8
Use-after-free vulnerability in Google Chrome before 15.0.874.120 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to editing.
2018-01-05
DoS
0
https://github.com/chromium/chromium/commit/c7a90019bf7054145b11d2577b851cf2779d3d79
c7a90019bf7054145b11d2577b851cf2779d3d79
Fix print preview workflow to reflect settings of selected printer. BUG=95110 TEST=none Review URL: http://codereview.chromium.org/7831041 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@102242 0039d316-1c4b-4281-b951-d872f2087c98
0
chrome/renderer/print_web_view_helper.cc
{"sha": "c7669434aff1c88fd6353479b6ab2814435fe206", "filename": "chrome/app/generated_resources.grd", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/c7a90019bf7054145b11d2577b851cf2779d3d79/chrome/app/generated_resources.grd", "raw_url": "https...
void PrintWebViewHelper::PrintPreviewContext::FinalizePrintReadyDocument() { if (state_ != DONE && state_ != RENDERING) NOTREACHED(); base::TimeTicks begin_time = base::TimeTicks::Now(); metafile_->FinishDocument(); if (print_ready_metafile_page_count_ <= 0) { NOTREACHED(); return; } UMA_HIST...
void PrintWebViewHelper::PrintPreviewContext::FinalizePrintReadyDocument() { if (state_ != DONE && state_ != RENDERING) NOTREACHED(); base::TimeTicks begin_time = base::TimeTicks::Now(); metafile_->FinishDocument(); if (print_ready_metafile_page_count_ <= 0) { NOTREACHED(); return; } UMA_HIST...
C
null
null
null
@@ -567,19 +567,19 @@ void PrintWebViewHelper::OnPrintForPrintPreview( return; } - WebFrame* pdf_frame = pdf_element.document().frame(); - scoped_ptr<PrepareFrameAndViewForPrint> prepare; - if (!InitPrintSettingsAndPrepareFrame(pdf_frame, &pdf_element, &prepare)) { - LOG(ERROR) << "Failed to initialize ...
Chrome
c7a90019bf7054145b11d2577b851cf2779d3d79
19cc5b468085104e660cc977987e1b78ad99db13
0
void PrintWebViewHelper::PrintPreviewContext::FinalizePrintReadyDocument() { if (state_ != DONE && state_ != RENDERING) NOTREACHED(); base::TimeTicks begin_time = base::TimeTicks::Now(); metafile_->FinishDocument(); if (print_ready_metafile_page_count_ <= 0) { NOTREACHED(); return; } UMA_HIST...
185,714
null
Remote
Not required
Complete
CVE-2015-6787
https://www.cvedetails.com/cve/CVE-2015-6787/
null
Low
Complete
Complete
null
2015-12-05
10
Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
2017-09-13
DoS
2
https://github.com/chromium/chromium/commit/f911e11e7f6b5c0d6f5ee694a9871de6619889f7
f911e11e7f6b5c0d6f5ee694a9871de6619889f7
Reland "[CI] Make paint property nodes non-ref-counted" This reverts commit 887383b30842d9d9006e11bb6932660a3cb5b1b7. Reason for revert: Retry in M69. Original change's description: > Revert "[CI] Make paint property nodes non-ref-counted" > > This reverts commit 70fc0b018c9517558b7aa2be00edf2debb449123. > > Reason ...
2
third_party/blink/renderer/platform/graphics/paint/paint_controller.cc
{"sha": "6da131da4ecafb786c67365ccc6cd446111933b4", "filename": "third_party/blink/renderer/core/paint/block_painter.cc", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f911e11e7f6b5c0d6f5ee694a9871de6619889f7/third_party/blink/renderer/core/pa...
void PaintController::CopyCachedSubsequence(size_t begin_index, size_t end_index) { DCHECK(!RuntimeEnabledFeatures::PaintUnderInvalidationCheckingEnabled()); base::AutoReset<size_t> subsequence_begin_index( &current_cached_subsequence_begin_index_in_new_list_, ...
void PaintController::CopyCachedSubsequence(size_t begin_index, size_t end_index) { DCHECK(!RuntimeEnabledFeatures::PaintUnderInvalidationCheckingEnabled()); base::AutoReset<size_t> subsequence_begin_index( &current_cached_subsequence_begin_index_in_new_list_, ...
C
cached_chunk->id, cached_chunk->properties); cached_chunk->id, cached_chunk->properties);
cached_chunk->id, cached_chunk->properties.GetPropertyTreeState()); cached_chunk->id, cached_chunk->properties.GetPropertyTreeState());
null
@@ -517,7 +517,7 @@ void PaintController::CopyCachedSubsequence(size_t begin_index, properties_before_subsequence = new_paint_chunks_.CurrentPaintChunkProperties(); UpdateCurrentPaintChunkPropertiesUsingIdWithFragment( - cached_chunk->id, cached_chunk->properties.GetPropertyTreeState()); + ...
Chrome
f911e11e7f6b5c0d6f5ee694a9871de6619889f7
95f5260501ac2660f29fb98ab5cb351a956c1dab
1
void PaintController::CopyCachedSubsequence(size_t begin_index, size_t end_index) { DCHECK(!RuntimeEnabledFeatures::PaintUnderInvalidationCheckingEnabled()); base::AutoReset<size_t> subsequence_begin_index( &current_cached_subsequence_begin_index_in_new_list_, ...
42,221
null
Local
Not required
Partial
CVE-2015-6252
https://www.cvedetails.com/cve/CVE-2015-6252/
CWE-399
Low
null
null
null
2015-10-19
2.1
The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation.
2017-11-03
DoS
0
https://github.com/torvalds/linux/commit/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
vhost: actually track log eventfd file While reviewing vhost log code, I found out that log_file is never set. Note: I haven't tested the change (QEMU doesn't use LOG_FD yet). Cc: stable@vger.kernel.org Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
0
drivers/vhost/vhost.c
{"sha": "95bdb90fd7f06a13a99e2d37a2c97aabc4545c05", "filename": "drivers/vhost/vhost.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5/drivers/vhost/vhost.c", "raw_url": "https://github.com/torvalds/linux/...
static long vhost_get_vring_endian(struct vhost_virtqueue *vq, u32 idx, int __user *argp) { return -ENOIOCTLCMD; }
static long vhost_get_vring_endian(struct vhost_virtqueue *vq, u32 idx, int __user *argp) { return -ENOIOCTLCMD; }
C
null
null
null
@@ -995,6 +995,7 @@ long vhost_dev_ioctl(struct vhost_dev *d, unsigned int ioctl, void __user *argp) } if (eventfp != d->log_file) { filep = d->log_file; + d->log_file = eventfp; ctx = d->log_ctx; d->log_ctx = eventfp ? eventfd_ctx_fileget(eventfp) : NULL;
linux
7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
cbfe8fa6cd672011c755c3cd85c9ffd4e2d10a6f
0
static long vhost_get_vring_endian(struct vhost_virtqueue *vq, u32 idx, int __user *argp) { return -ENOIOCTLCMD; }
76,345
null
Remote
Not required
Partial
CVE-2018-18585
https://www.cvedetails.com/cve/CVE-2018-18585/
CWE-476
Medium
null
null
null
2018-10-22
4.3
chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '0' as its first or second character (such as the */0* name).
2019-08-06
null
0
https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f
8759da8db6ec9e866cb8eb143313f397f925bb4f
Avoid returning CHM file entries that are "blank" because they have embedded null bytes
0
libmspack/mspack/chmd.c
{"sha": "a5873b69c26252fa830c3ce1dd76b5d13a73c34b", "filename": "libmspack/ChangeLog", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/kyz/libmspack/blob/8759da8db6ec9e866cb8eb143313f397f925bb4f/libmspack/ChangeLog", "raw_url": "https://github.com/kyz/libmspack/raw/87...
static unsigned char *read_sys_file(struct mschm_decompressor_p *self, struct mschmd_file *file) { struct mspack_system *sys = self->system; unsigned char *data = NULL; int len; if (!file || !file->section || (file->section->id != 0)) { self->error = MSPACK_ERR_DATAFORMAT; return NULL; } l...
static unsigned char *read_sys_file(struct mschm_decompressor_p *self, struct mschmd_file *file) { struct mspack_system *sys = self->system; unsigned char *data = NULL; int len; if (!file || !file->section || (file->section->id != 0)) { self->error = MSPACK_ERR_DATAFORMAT; return NULL; } l...
C
null
null
null
@@ -447,14 +447,14 @@ static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh, while (num_entries--) { READ_ENCINT(name_len); if (name_len > (unsigned int) (end - p)) goto chunk_end; - /* consider blank filenames to be an error */ - if (name_len == 0) goto chunk_end; ...
libmspack
8759da8db6ec9e866cb8eb143313f397f925bb4f
944cc107cf8aa0f1537f13a7795bc619cf674c94
0
static unsigned char *read_sys_file(struct mschm_decompressor_p *self, struct mschmd_file *file) { struct mspack_system *sys = self->system; unsigned char *data = NULL; int len; if (!file || !file->section || (file->section->id != 0)) { self->error = MSPACK_ERR_DATAFORMAT; return NULL; } l...