Search is not available for this dataset
Unnamed: 0 int64 3 189k | Access Gained stringclasses 2
values | Attack Origin stringclasses 4
values | Authentication Required stringclasses 3
values | Availability stringclasses 3
values | CVE ID stringlengths 13 43 ⌀ | CVE Page stringlengths 45 48 ⌀ | CWE ID stringclasses 90
values | Complexity stringclasses 4
values | Confidentiality stringclasses 3
values | Integrity stringclasses 3
values | Known Exploits float64 | Publish Date stringclasses 911
values | Score float64 0 10 ⌀ | Summary stringlengths 60 1.32k ⌀ | Update Date stringclasses 671
values | Vulnerability Classification stringclasses 75
values | add_lines int64 0 382 | codeLink stringlengths 46 139 | commit_id stringlengths 6 81 | commit_message stringlengths 3 13.3k ⌀ | del_lines int64 0 459 | file_name stringlengths 4 100 ⌀ | files_changed stringlengths 345 13.9M ⌀ | func_after stringlengths 14 235k | func_before stringlengths 14 234k | lang stringclasses 3
values | lines_after stringlengths 1 10k ⌀ | lines_before stringlengths 2 10.2k ⌀ | parentID stringclasses 626
values | patch stringlengths 101 359k | project stringclasses 305
values | project_after stringlengths 6 200 | project_before stringlengths 40 200 | vul int64 0 1 | vul_func_with_fix stringlengths 14 235k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
131,311 | null | Remote | Not required | Partial | CVE-2014-1713 | https://www.cvedetails.com/cve/CVE-2014-1713/ | CWE-399 | Low | Partial | Partial | null | 2014-03-16 | 7.5 | Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact ... | 2017-01-06 | DoS | 0 | https://github.com/chromium/chromium/commit/f85a87ec670ad0fce9d98d90c9a705b72a288154 | f85a87ec670ad0fce9d98d90c9a705b72a288154 | document.location bindings fix
BUG=352374
R=jochen@chromium.org
Review URL: https://codereview.chromium.org/196343011
git-svn-id: svn://svn.chromium.org/blink/trunk@169176 bbb929c8-8fbe-4397-9dbb-9b2b20218538 | 0 | third_party/WebKit/Source/bindings/tests/results/V8TestObjectPython.cpp | {"sha": "b82e2fe8129793c21901e96095ad155dd4dbb51e", "filename": "third_party/WebKit/Source/bindings/templates/attributes.cpp", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f85a87ec670ad0fce9d98d90c9a705b72a288154/third_party/WebKit/Source/bin... | static void customElementsCallbacksReadonlyLongAttributeAttributeGetter(const v8::PropertyCallbackInfo<v8::Value>& info)
{
TestObjectPython* imp = V8TestObjectPython::toNative(info.Holder());
v8SetReturnValueInt(info, imp->customElementsCallbacksReadonlyLongAttribute());
}
| static void customElementsCallbacksReadonlyLongAttributeAttributeGetter(const v8::PropertyCallbackInfo<v8::Value>& info)
{
TestObjectPython* imp = V8TestObjectPython::toNative(info.Holder());
v8SetReturnValueInt(info, imp->customElementsCallbacksReadonlyLongAttribute());
}
| C | null | null | null | @@ -2525,7 +2525,7 @@ static void locationAttributeGetterCallback(v8::Local<v8::String>, const v8::Pro
static void locationAttributeSetter(v8::Local<v8::Value> jsValue, const v8::PropertyCallbackInfo<void>& info)
{
TestObjectPython* proxyImp = V8TestObjectPython::toNative(info.Holder());
- TestNode* imp = WTF... | Chrome | f85a87ec670ad0fce9d98d90c9a705b72a288154 | 2c217b1d3f3f95e579481976d73e07ab4c77752c | 0 | static void customElementsCallbacksReadonlyLongAttributeAttributeGetter(const v8::PropertyCallbackInfo<v8::Value>& info)
{
TestObjectPython* imp = V8TestObjectPython::toNative(info.Holder());
v8SetReturnValueInt(info, imp->customElementsCallbacksReadonlyLongAttribute());
}
|
45,655 | null | Local | Not required | null | CVE-2014-9644 | https://www.cvedetails.com/cve/CVE-2014-9644/ | CWE-264 | Low | null | Partial | null | 2015-03-02 | 2.1 | The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-2013-7421. | 2018-01-04 | null | 0 | https://github.com/torvalds/linux/commit/4943ba16bbc2db05115707b3ff7b4874e9e3c560 | 4943ba16bbc2db05115707b3ff7b4874e9e3c560 | crypto: include crypto- module prefix in template
This adds the module loading prefix "crypto-" to the template lookup
as well.
For example, attempting to load 'vfat(blowfish)' via AF_ALG now correctly
includes the "crypto-" prefix at every level, correctly rejecting "vfat":
net-pf-38
algif-hash
crypto-vfat(blowf... | 0 | crypto/cryptd.c | {"sha": "f368ba261739fa09be28bc02fe34cf3112099fa8", "filename": "arch/x86/crypto/fpu.c", "status": "modified", "additions": 3, "deletions": 0, "changes": 3, "blob_url": "https://github.com/torvalds/linux/blob/4943ba16bbc2db05115707b3ff7b4874e9e3c560/arch/x86/crypto/fpu.c", "raw_url": "https://github.com/torvalds/linux/... | void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm)
{
crypto_free_ablkcipher(&tfm->base);
}
| void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm)
{
crypto_free_ablkcipher(&tfm->base);
}
| C | null | null | null | @@ -955,3 +955,4 @@ module_exit(cryptd_exit);
MODULE_LICENSE("GPL");
MODULE_DESCRIPTION("Software async crypto daemon");
+MODULE_ALIAS_CRYPTO("cryptd"); | linux | 4943ba16bbc2db05115707b3ff7b4874e9e3c560 | 476c7fe20f30818e16339391aeeb01b29818f708 | 0 | void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm)
{
crypto_free_ablkcipher(&tfm->base);
}
|
93,994 | null | Remote | Not required | Partial | CVE-2016-7398 | https://www.cvedetails.com/cve/CVE-2016-7398/ | CWE-704 | Low | Partial | Partial | null | 2019-09-06 | 7.5 | A type confusion vulnerability in the merge_param() function of php_http_params.c in PHP's pecl-http extension 3.1.0beta2 (PHP 7) and earlier as well as 2.6.0beta2 (PHP 5) and earlier allows attackers to crash PHP and possibly execute arbitrary code via crafted HTTP requests. | 2019-09-20 | Exec Code | 0 | https://github.com/m6w6/ext-http/commit/17137d4ab1ce81a2cee0fae842340a344ef3da83 | 17137d4ab1ce81a2cee0fae842340a344ef3da83 | fix bug #73055 | 0 | src/php_http_params.c | {"sha": "45ac1a5f203ae766bd3662ce1fe7a59e677ceb02", "filename": ".gitignore", "status": "modified", "additions": 33, "deletions": 0, "changes": 33, "blob_url": "https://github.com/m6w6/ext-http/blob/17137d4ab1ce81a2cee0fae842340a344ef3da83/.gitignore", "raw_url": "https://github.com/m6w6/ext-http/raw/17137d4ab1ce81a2ce... | static inline void prepare_escaped(zval *zv TSRMLS_DC)
{
if (Z_TYPE_P(zv) == IS_STRING) {
quote_string(zv, 0 TSRMLS_CC);
} else {
zval_dtor(zv);
ZVAL_EMPTY_STRING(zv);
}
}
| static inline void prepare_escaped(zval *zv TSRMLS_DC)
{
if (Z_TYPE_P(zv) == IS_STRING) {
quote_string(zv, 0 TSRMLS_CC);
} else {
zval_dtor(zv);
ZVAL_EMPTY_STRING(zv);
}
}
| C | null | null | null | @@ -470,7 +470,7 @@ static void merge_param(HashTable *params, zval *zdata, zval ***current_param, z
while (Z_TYPE_PP(zdata_ptr) == IS_ARRAY
&& SUCCESS == zend_hash_get_current_data(Z_ARRVAL_PP(zdata_ptr), (void *) &test_ptr)
) {
- if (Z_TYPE_PP(test_ptr) == IS_ARRAY) {
+ if (Z_TYPE_PP(test_ptr) == IS... | ext-http | 17137d4ab1ce81a2cee0fae842340a344ef3da83 | 3c7b514d38d844b855d430fcbaed6dea67c9c17b | 0 | static inline void prepare_escaped(zval *zv TSRMLS_DC)
{
if (Z_TYPE_P(zv) == IS_STRING) {
quote_string(zv, 0 TSRMLS_CC);
} else {
zval_dtor(zv);
ZVAL_EMPTY_STRING(zv);
}
}
|
118,699 | null | Remote | Not required | Partial | CVE-2013-6624 | https://www.cvedetails.com/cve/CVE-2013-6624/ | CWE-399 | Low | Partial | Partial | null | 2013-11-13 | 7.5 | Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes. | 2017-09-18 | DoS | 0 | https://github.com/chromium/chromium/commit/36773850210becda3d76f27285ecd899fafdfc72 | 36773850210becda3d76f27285ecd899fafdfc72 | Fix tracking of the id attribute string if it is shared across elements.
The patch to remove AtomicStringImpl:
http://src.chromium.org/viewvc/blink?view=rev&rev=154790
Exposed a lifetime issue with strings for id attributes. We simply need to use
AtomicString.
BUG=290566
Review URL: https://codereview.chromium.org/... | 0 | third_party/WebKit/Source/bindings/v8/V8WindowShell.cpp | {"sha": "7ef22e9a431ad0272713b71fdc8794016c8ef12f", "filename": "third_party/WebKit/LayoutTests/fast/dom/id-attribute-shared-expected.txt", "status": "added", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/36773850210becda3d76f27285ecd899fafdfc72/third_party/WebKit/... | void V8WindowShell::updateDocumentWrapper(v8::Handle<v8::Object> wrapper)
{
ASSERT(m_world->isMainWorld());
m_document.set(m_isolate, wrapper);
}
| void V8WindowShell::updateDocumentWrapper(v8::Handle<v8::Object> wrapper)
{
ASSERT(m_world->isMainWorld());
m_document.set(m_isolate, wrapper);
}
| C | null | null | null | @@ -429,7 +429,7 @@ void V8WindowShell::updateDocument()
static v8::Handle<v8::Value> getNamedProperty(HTMLDocument* htmlDocument, const AtomicString& key, v8::Handle<v8::Object> creationContext, v8::Isolate* isolate)
{
- if (!htmlDocument->hasNamedItem(key.impl()) && !htmlDocument->hasExtraNamedItem(key.impl())... | Chrome | 36773850210becda3d76f27285ecd899fafdfc72 | 490453f684fec58ecf648a55d1c5ef2319c578c3 | 0 | void V8WindowShell::updateDocumentWrapper(v8::Handle<v8::Object> wrapper)
{
ASSERT(m_world->isMainWorld());
m_document.set(m_isolate, wrapper);
}
|
151,925 | null | Remote | Not required | Partial | CVE-2017-5019 | https://www.cvedetails.com/cve/CVE-2017-5019/ | CWE-416 | Medium | Partial | Partial | null | 2017-02-17 | 6.8 | A use after free in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2018-01-04 | null | 0 | https://github.com/chromium/chromium/commit/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | Convert FrameHostMsg_DidAddMessageToConsole to Mojo.
Note: Since this required changing the test
RenderViewImplTest.DispatchBeforeUnloadCanDetachFrame, I manually
re-introduced https://crbug.com/666714 locally (the bug the test was
added for), and reran the test to confirm that it still covers the bug.
Bug: 786836
Ch... | 0 | content/browser/frame_host/render_frame_host_impl.cc | {"sha": "f2bd60be6f35037de28774456df91833dd753f20", "filename": "content/browser/frame_host/render_frame_host_impl.cc", "status": "modified", "additions": 23, "deletions": 11, "changes": 34, "blob_url": "https://github.com/chromium/chromium/blob/f03ea5a5c2ff26e239dfd23e263b15da2d9cee93/content/browser/frame_host/render... | void RenderFrameHostImpl::DidReceiveFirstUserActivation() {
delegate_->DidReceiveFirstUserActivation(this);
}
| void RenderFrameHostImpl::DidReceiveFirstUserActivation() {
delegate_->DidReceiveFirstUserActivation(this);
}
| C | null | null | null | @@ -1375,8 +1375,6 @@ bool RenderFrameHostImpl::OnMessageReceived(const IPC::Message &msg) {
handled = true;
IPC_BEGIN_MESSAGE_MAP(RenderFrameHostImpl, msg)
- IPC_MESSAGE_HANDLER(FrameHostMsg_DidAddMessageToConsole,
- OnDidAddMessageToConsole)
IPC_MESSAGE_HANDLER(FrameHostMsg_Deta... | Chrome | f03ea5a5c2ff26e239dfd23e263b15da2d9cee93 | c246049ec1b28d1af4fe3be886ac5904e1762026 | 0 | void RenderFrameHostImpl::DidReceiveFirstUserActivation() {
delegate_->DidReceiveFirstUserActivation(this);
}
|
87,925 | null | Local | Not required | Complete | CVE-2019-15924 | https://www.cvedetails.com/cve/CVE-2019-15924/ | CWE-476 | Low | null | null | null | 2019-09-04 | 4.9 | An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure. | 2019-09-14 | null | 0 | https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f | 01ca667133d019edc9f0a1f70a272447c84ec41f | fm10k: Fix a potential NULL pointer dereference
Syzkaller report this:
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN PTI
CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),... | 0 | drivers/net/ethernet/intel/fm10k/fm10k_main.c | {"sha": "ecef949f3baae022d46082f4a1dc32d18cb082ec", "filename": "drivers/net/ethernet/intel/fm10k/fm10k_main.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/01ca667133d019edc9f0a1f70a272447c84ec41f/drivers/net/ethernet/intel/fm10k/fm10k_main.c"... | static void fm10k_free_q_vector(struct fm10k_intfc *interface, int v_idx)
{
struct fm10k_q_vector *q_vector = interface->q_vector[v_idx];
struct fm10k_ring *ring;
fm10k_dbg_q_vector_exit(q_vector);
fm10k_for_each_ring(ring, q_vector->tx)
interface->tx_ring[ring->queue_index] = NULL;
fm10k_for_each_ring(ring, ... | static void fm10k_free_q_vector(struct fm10k_intfc *interface, int v_idx)
{
struct fm10k_q_vector *q_vector = interface->q_vector[v_idx];
struct fm10k_ring *ring;
fm10k_dbg_q_vector_exit(q_vector);
fm10k_for_each_ring(ring, q_vector->tx)
interface->tx_ring[ring->queue_index] = NULL;
fm10k_for_each_ring(ring, ... | C | null | null | null | @@ -41,6 +41,8 @@ static int __init fm10k_init_module(void)
/* create driver workqueue */
fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0,
fm10k_driver_name);
+ if (!fm10k_workqueue)
+ return -ENOMEM;
fm10k_dbg_init();
| linux | 01ca667133d019edc9f0a1f70a272447c84ec41f | f669d24f3dd00beab452c0fc9257f6a942ffca9b | 0 | static void fm10k_free_q_vector(struct fm10k_intfc *interface, int v_idx)
{
struct fm10k_q_vector *q_vector = interface->q_vector[v_idx];
struct fm10k_ring *ring;
fm10k_dbg_q_vector_exit(q_vector);
fm10k_for_each_ring(ring, q_vector->tx)
interface->tx_ring[ring->queue_index] = NULL;
fm10k_for_each_ring(ring, ... |
73,653 | null | Remote | Not required | Partial | CVE-2016-7513 | https://www.cvedetails.com/cve/CVE-2016-7513/ | CWE-189 | Medium | null | null | null | 2017-04-20 | 4.3 | Off-by-one error in magick/cache.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors. | 2017-05-09 | DoS | 0 | https://github.com/ImageMagick/ImageMagick/commit/a54fe0e8600eaf3dc6fe717d3c0398001507f723 | a54fe0e8600eaf3dc6fe717d3c0398001507f723 | null | 0 | magick/cache.c | {"sha": "369c52caff1795ac3140634ef1ee0f99e4f8836f", "filename": "magick/cache.c", "status": "modified", "additions": 2, "deletions": 25, "changes": 27, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/a54fe0e8600eaf3dc6fe717d3c0398001507f723/magick/cache.c", "raw_url": "https://github.com/ImageMagick/ImageM... | static inline MagickOffsetType ReadPixelCacheRegion(
const CacheInfo *restrict cache_info,const MagickOffsetType offset,
const MagickSizeType length,unsigned char *restrict buffer)
{
register MagickOffsetType
i;
ssize_t
count;
#if !defined(MAGICKCORE_HAVE_PREAD)
if (lseek(cache_info->file,offset,SEE... | static inline MagickOffsetType ReadPixelCacheRegion(
const CacheInfo *restrict cache_info,const MagickOffsetType offset,
const MagickSizeType length,unsigned char *restrict buffer)
{
register MagickOffsetType
i;
ssize_t
count;
#if !defined(MAGICKCORE_HAVE_PREAD)
if (lseek(cache_info->file,offset,SEE... | C | null | null | null | @@ -583,29 +583,6 @@ MagickExport void ClonePixelCacheMethods(Cache clone,const Cache cache)
%
*/
-static inline void CopyPixels(PixelPacket *destination,
- const PixelPacket *source,const MagickSizeType number_pixels)
-{
-#if !defined(MAGICKCORE_OPENMP_SUPPORT) || (MAGICKCORE_QUANTUM_DEPTH <= 8)
- (void) memcpy(... | ImageMagick | a54fe0e8600eaf3dc6fe717d3c0398001507f723 | b5ec441dfe2bdb979a4cad4f315a63f49b0d7d54 | 0 | static inline MagickOffsetType ReadPixelCacheRegion(
const CacheInfo *restrict cache_info,const MagickOffsetType offset,
const MagickSizeType length,unsigned char *restrict buffer)
{
register MagickOffsetType
i;
ssize_t
count;
#if !defined(MAGICKCORE_HAVE_PREAD)
if (lseek(cache_info->file,offset,SEE... |
114,606 | null | Remote | Not required | Complete | CVE-2012-2816 | https://www.cvedetails.com/cve/CVE-2012-2816/ | null | Low | null | null | null | 2012-06-27 | 7.8 | Google Chrome before 20.0.1132.43 on Windows does not properly isolate sandboxed processes, which might allow remote attackers to cause a denial of service (process interference) via unspecified vectors. | 2017-09-18 | DoS | 0 | https://github.com/chromium/chromium/commit/cd0bd79d6ebdb72183e6f0833673464cc10b3600 | cd0bd79d6ebdb72183e6f0833673464cc10b3600 | Convert plugin and GPU process to brokered handle duplication.
BUG=119250
Review URL: https://chromiumcodereview.appspot.com/9958034
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@132303 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/renderer/render_thread_impl.cc | {"sha": "cbb47ddf0c9cb496b29e6a45b27d0ad8d5ffa495", "filename": "chrome/common/chrome_content_client.cc", "status": "modified", "additions": 9, "deletions": 0, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/cd0bd79d6ebdb72183e6f0833673464cc10b3600/chrome/common/chrome_content_client.cc", "raw_url"... | void RenderThreadImpl::ReleaseCachedFonts() {
Send(new ChildProcessHostMsg_ReleaseCachedFonts());
}
| void RenderThreadImpl::ReleaseCachedFonts() {
Send(new ChildProcessHostMsg_ReleaseCachedFonts());
}
| C | null | null | null | @@ -910,18 +910,15 @@ GpuChannelHost* RenderThreadImpl::EstablishGpuChannelSync(
// Ask the browser for the channel name.
int client_id = 0;
IPC::ChannelHandle channel_handle;
- base::ProcessHandle renderer_process_for_gpu;
content::GPUInfo gpu_info;
if (!Send(new GpuHostMsg_EstablishGpuChannel(cause_fo... | Chrome | cd0bd79d6ebdb72183e6f0833673464cc10b3600 | 612c5b8df2f2a72126c88765dc00ac876a2aa6ff | 0 | void RenderThreadImpl::ReleaseCachedFonts() {
Send(new ChildProcessHostMsg_ReleaseCachedFonts());
}
|
177,173 | null | Remote | Not required | Complete | CVE-2016-2476 | https://www.cvedetails.com/cve/CVE-2016-2476/ | CWE-119 | Medium | Complete | Complete | null | 2016-06-12 | 9.3 | mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not validate OMX buffer sizes, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27207275. | 2016-06-13 | Overflow +Priv | 0 | https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff | 295c883fe3105b19bcd0f9e07d54c6b589fc5bff | DO NOT MERGE Verify OMX buffer sizes prior to access
Bug: 27207275
Change-Id: I4412825d1ee233d993af0a67708bea54304ff62d
| 0 | media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp | {"filename": "media/libmedia/IOMX.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/media/libmedia/IOMX.cpp", "patch": "@@ -18,6 +18,8 @@\n\n #define LOG_TAG \"IOMX\"\n #include <utils/Log.h>\n \n+#include <sys/mman.h>\n+\n #include <binder/IMemory.h>\n... | void SoftVideoDecoderOMXComponent::handlePortSettingsChange(
bool *portWillReset, uint32_t width, uint32_t height,
CropSettingsMode cropSettingsMode, bool fakeStride) {
*portWillReset = false;
bool sizeChanged = (width != mWidth || height != mHeight);
bool updateCrop = (cropSettingsMode == kCropUnSet);
bool cropC... | void SoftVideoDecoderOMXComponent::handlePortSettingsChange(
bool *portWillReset, uint32_t width, uint32_t height,
CropSettingsMode cropSettingsMode, bool fakeStride) {
*portWillReset = false;
bool sizeChanged = (width != mWidth || height != mHeight);
bool updateCrop = (cropSettingsMode == kCropUnSet);
bool cropC... | C | null | null | null | @@ -264,6 +264,10 @@
OMX_VIDEO_PARAM_PORTFORMATTYPE *formatParams =
(OMX_VIDEO_PARAM_PORTFORMATTYPE *)params;
+ if (!isValidOMXParam(formatParams)) {
+ return OMX_ErrorBadParameter;
+ }
+
if (formatParams->nPortIndex > kMaxPortIndex) {
... | Android | https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/ | https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff%5E/ | 0 | void SoftVideoDecoderOMXComponent::handlePortSettingsChange(
bool *portWillReset, uint32_t width, uint32_t height,
CropSettingsMode cropSettingsMode, bool fakeStride) {
*portWillReset = false;
bool sizeChanged = (width != mWidth || height != mHeight);
bool updateCrop = (cropSettingsMode == kCropUnSet);
bool cropC... |
77,233 | null | Remote | Not required | Partial | CVE-2018-17205 | https://www.cvedetails.com/cve/CVE-2018-17205/ | CWE-617 | Low | null | null | null | 2018-09-19 | 5 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to r... | 2019-10-02 | null | 0 | https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6 | 0befd1f3745055c32940f5faf9559be6a14395e6 | ofproto: Fix OVS crash when reverting old flows in bundle commit
During bundle commit flows which are added in bundle are applied
to ofproto in-order. In case if a flow cannot be added (e.g. flow
action is go-to group id which does not exist), OVS tries to
revert back all previous flows which were successfully applied... | 0 | ofproto/ofproto.c | {"sha": "50df9dc9c099b965378d5be3e78eb49dbb509b81", "filename": "ofproto/ofproto.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/openvswitch/ovs/blob/0befd1f3745055c32940f5faf9559be6a14395e6/ofproto/ofproto.c", "raw_url": "https://github.com/openvswitch/ovs/raw/0b... | handle_barrier_request(struct ofconn *ofconn, const struct ofp_header *oh)
{
struct ofpbuf *buf;
buf = ofpraw_alloc_reply((oh->version == OFP10_VERSION
? OFPRAW_OFPT10_BARRIER_REPLY
: OFPRAW_OFPT11_BARRIER_REPLY), oh, 0);
ofconn_send_reply(ofconn,... | handle_barrier_request(struct ofconn *ofconn, const struct ofp_header *oh)
{
struct ofpbuf *buf;
buf = ofpraw_alloc_reply((oh->version == OFP10_VERSION
? OFPRAW_OFPT10_BARRIER_REPLY
: OFPRAW_OFPT11_BARRIER_REPLY), oh, 0);
ofconn_send_reply(ofconn,... | C | null | null | null | @@ -8465,7 +8465,7 @@ ofproto_rule_insert__(struct ofproto *ofproto, struct rule *rule)
const struct rule_actions *actions = rule_get_actions(rule);
/* A rule may not be reinserted. */
- ovs_assert(rule->state == RULE_INITIALIZED);
+ ovs_assert(rule->state != RULE_INSERTED);
if (rule->hard_time... | ovs | 0befd1f3745055c32940f5faf9559be6a14395e6 | f9df636ef91c639cf97c6bd8e5433381ac63859b | 0 | handle_barrier_request(struct ofconn *ofconn, const struct ofp_header *oh)
{
struct ofpbuf *buf;
buf = ofpraw_alloc_reply((oh->version == OFP10_VERSION
? OFPRAW_OFPT10_BARRIER_REPLY
: OFPRAW_OFPT11_BARRIER_REPLY), oh, 0);
ofconn_send_reply(ofconn,... |
166,748 | null | Remote | Not required | Partial | CVE-2018-6158 | https://www.cvedetails.com/cve/CVE-2018-6158/ | CWE-362 | High | Partial | Partial | null | 2019-01-09 | 5.1 | A race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2019-01-14 | null | 0 | https://github.com/chromium/chromium/commit/20b65d00ca3d8696430e22efad7485366f8c3a21 | 20b65d00ca3d8696430e22efad7485366f8c3a21 | [oilpan] Fix GCInfoTable for multiple threads
Previously, grow and access from different threads could lead to a race
on the table backing; see bug.
- Rework the table to work on an existing reservation.
- Commit upon growing, avoiding any copies.
Drive-by: Fix over-allocation of table.
Bug: chromium:841280
Change-... | 0 | third_party/blink/renderer/platform/heap/heap_page.cc | {"sha": "f4bdb9fe8fb3f24078f58afdf884726c6da90500", "filename": "third_party/blink/renderer/platform/heap/BUILD.gn", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/20b65d00ca3d8696430e22efad7485366f8c3a21/third_party/blink/renderer/platform/hea... | Address NormalPageArena::LazySweepPages(size_t allocation_size,
size_t gc_info_index) {
DCHECK(!HasCurrentAllocationArea());
AutoReset<bool> is_lazy_sweeping(&is_lazy_sweeping_, true);
Address result = nullptr;
while (!SweepingCompleted()) {
BasePage* page = first_uns... | Address NormalPageArena::LazySweepPages(size_t allocation_size,
size_t gc_info_index) {
DCHECK(!HasCurrentAllocationArea());
AutoReset<bool> is_lazy_sweeping(&is_lazy_sweeping_, true);
Address result = nullptr;
while (!SweepingCompleted()) {
BasePage* page = first_uns... | C | null | null | null | @@ -98,7 +98,7 @@ void HeapObjectHeader::ZapMagic() {
void HeapObjectHeader::Finalize(Address object, size_t object_size) {
HeapAllocHooks::FreeHookIfEnabled(object);
- const GCInfo* gc_info = ThreadHeap::GcInfo(GcInfoIndex());
+ const GCInfo* gc_info = GCInfoTable::Get().GCInfoFromIndex(GcInfoIndex());
if (... | Chrome | 20b65d00ca3d8696430e22efad7485366f8c3a21 | 1d0b7474e5737da7f6914cf56c16c924552c3693 | 0 | Address NormalPageArena::LazySweepPages(size_t allocation_size,
size_t gc_info_index) {
DCHECK(!HasCurrentAllocationArea());
AutoReset<bool> is_lazy_sweeping(&is_lazy_sweeping_, true);
Address result = nullptr;
while (!SweepingCompleted()) {
BasePage* page = first_uns... |
36,655 | null | Remote | Not required | Complete | CVE-2014-4502 | https://www.cvedetails.com/cve/CVE-2014-4502/ | CWE-119 | Low | Complete | Complete | null | 2014-07-23 | 10 | Multiple heap-based buffer overflows in the parse_notify function in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 4.1.0 allow remote pool servers to have unspecified impact via a (1) large or (2) negative value in the Extranonc2_size parameter in a mining.subscribe response and a crafted mining.notif... | 2015-08-28 | Overflow | 0 | https://github.com/ckolivas/cgminer/commit/e1c5050734123973b99d181c45e74b2cbb00272e | e1c5050734123973b99d181c45e74b2cbb00272e | Do some random sanity checking for stratum message parsing | 0 | util.c | {"sha": "6401bb822a3b2b3df9620edb3169a4fca9dacf71", "filename": "util.c", "status": "modified", "additions": 41, "deletions": 14, "changes": 55, "blob_url": "https://github.com/ckolivas/cgminer/blob/e1c5050734123973b99d181c45e74b2cbb00272e/util.c", "raw_url": "https://github.com/ckolivas/cgminer/raw/e1c5050734123973b99... | static size_t all_data_cb(const void *ptr, size_t size, size_t nmemb,
void *user_data)
{
struct data_buffer *db = user_data;
size_t len = size * nmemb;
size_t oldlen, newlen;
void *newmem;
static const unsigned char zero = 0;
oldlen = db->len;
newlen = oldlen + len;
newmem = realloc(db->buf, newlen + 1);... | static size_t all_data_cb(const void *ptr, size_t size, size_t nmemb,
void *user_data)
{
struct data_buffer *db = user_data;
size_t len = size * nmemb;
size_t oldlen, newlen;
void *newmem;
static const unsigned char zero = 0;
oldlen = db->len;
newlen = oldlen + len;
newmem = realloc(db->buf, newlen + 1);... | C | null | null | null | @@ -1,5 +1,5 @@
/*
- * Copyright 2011-2013 Con Kolivas
+ * Copyright 2011-2014 Con Kolivas
* Copyright 2010 Jeff Garzik
*
* This program is free software; you can redistribute it and/or modify it
@@ -720,6 +720,34 @@ bool hex2bin(unsigned char *p, const char *hexstr, size_t len)
return ret;
}
+static bool _... | cgminer | e1c5050734123973b99d181c45e74b2cbb00272e | e8b0a29db51a967e709161c52787227208d2eaa2 | 0 | static size_t all_data_cb(const void *ptr, size_t size, size_t nmemb,
void *user_data)
{
struct data_buffer *db = user_data;
size_t len = size * nmemb;
size_t oldlen, newlen;
void *newmem;
static const unsigned char zero = 0;
oldlen = db->len;
newlen = oldlen + len;
newmem = realloc(db->buf, newlen + 1);... |
120,826 | null | Remote | Not required | Partial | CVE-2013-2867 | https://www.cvedetails.com/cve/CVE-2013-2867/ | null | Low | Partial | Partial | null | 2013-07-10 | 7.5 | Google Chrome before 28.0.1500.71 does not properly prevent pop-under windows, which allows remote attackers to have an unspecified impact via a crafted web site. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/d358f57009b85fb7440208afa5ba87636b491889 | d358f57009b85fb7440208afa5ba87636b491889 | Refactor to support default Bluetooth pairing delegate
In order to support a default pairing delegate we need to move the agent
service provider delegate implementation from BluetoothDevice to
BluetoothAdapter while retaining the existing API.
BUG=338492
TEST=device_unittests, unit_tests, browser_tests
Review URL: h... | 0 | device/bluetooth/bluetooth_device_chromeos.cc | {"sha": "b2bdf964cc4acd25fc8cc35ed28fe3f3503a284a", "filename": "chromeos/dbus/fake_bluetooth_agent_manager_client.cc", "status": "modified", "additions": 5, "deletions": 2, "changes": 7, "blob_url": "https://github.com/chromium/chromium/blob/d358f57009b85fb7440208afa5ba87636b491889/chromeos/dbus/fake_bluetooth_agent_m... | void BluetoothDeviceChromeOS::SetTrusted() {
DBusThreadManager::Get()->GetBluetoothDeviceClient()->
GetProperties(object_path_)->trusted.Set(
true,
base::Bind(&BluetoothDeviceChromeOS::OnSetTrusted,
weak_ptr_factory_.GetWeakPtr()));
}
| void BluetoothDeviceChromeOS::SetTrusted() {
DBusThreadManager::Get()->GetBluetoothDeviceClient()->
GetProperties(object_path_)->trusted.Set(
true,
base::Bind(&BluetoothDeviceChromeOS::OnSetTrusted,
weak_ptr_factory_.GetWeakPtr()));
}
| C | null | null | null | @@ -9,8 +9,6 @@
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_util.h"
#include "chromeos/dbus/bluetooth_adapter_client.h"
-#include "chromeos/dbus/bluetooth_agent_manager_client.h"
-#include "chromeos/dbus/bluetooth_agent_service_provider.h"
#include "chromeos/dbus/bluetooth_devi... | Chrome | d358f57009b85fb7440208afa5ba87636b491889 | 5a0ca726eb113bad510932703c302826687b5818 | 0 | void BluetoothDeviceChromeOS::SetTrusted() {
// Unconditionally send the property change, rather than checking the value
// first; there's no harm in doing this and it solves any race conditions
// with the property becoming true or false and this call happening before
// we get the D-Bus signal about the earli... |
63,408 | null | Remote | Not required | Partial | CVE-2017-11399 | https://www.cvedetails.com/cve/CVE-2017-11399/ | CWE-125 | Medium | Partial | Partial | null | 2017-07-17 | 6.8 | Integer overflow in the ape_decode_frame function in libavcodec/apedec.c in FFmpeg through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access and application crash) or possibly have unspecified other impact via a crafted APE file. | 2017-11-06 | DoS Overflow | 0 | https://github.com/FFmpeg/FFmpeg/commit/ba4beaf6149f7241c8bd85fe853318c2f6837ad0 | ba4beaf6149f7241c8bd85fe853318c2f6837ad0 | avcodec/apedec: Fix integer overflow
Fixes: out of array access
Fixes: PoC.ape and others
Found-by: Bingchang, Liu@VARAS of IIE
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | libavcodec/apedec.c | {"sha": "15eb416ba4ea9b226c0f86907b76c312b5586ef3", "filename": "libavcodec/apedec.c", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/ba4beaf6149f7241c8bd85fe853318c2f6837ad0/libavcodec/apedec.c", "raw_url": "https://github.com/FFmpeg/FFmpeg/raw/ba... | static void entropy_decode_stereo_3860(APEContext *ctx, int blockstodecode)
{
int32_t *decoded0 = ctx->decoded[0];
int32_t *decoded1 = ctx->decoded[1];
int blocks = blockstodecode;
while (blockstodecode--)
*decoded0++ = ape_decode_value_3860(ctx, &ctx->gb, &ctx->riceY);
while (blocks--)
... | static void entropy_decode_stereo_3860(APEContext *ctx, int blockstodecode)
{
int32_t *decoded0 = ctx->decoded[0];
int32_t *decoded1 = ctx->decoded[1];
int blocks = blockstodecode;
while (blockstodecode--)
*decoded0++ = ape_decode_value_3860(ctx, &ctx->gb, &ctx->riceY);
while (blocks--)
... | C | null | null | null | @@ -1412,6 +1412,7 @@ static int ape_decode_frame(AVCodecContext *avctx, void *data,
int32_t *sample24;
int i, ch, ret;
int blockstodecode;
+ uint64_t decoded_buffer_size;
/* this should never be negative, but bad things will happen if it is, so
check it just to make sure. */
@@ -1467,7... | FFmpeg | ba4beaf6149f7241c8bd85fe853318c2f6837ad0 | 615479d51c6a76275c114888b5600b929309f4c4 | 0 | static void entropy_decode_stereo_3860(APEContext *ctx, int blockstodecode)
{
int32_t *decoded0 = ctx->decoded[0];
int32_t *decoded1 = ctx->decoded[1];
int blocks = blockstodecode;
while (blockstodecode--)
*decoded0++ = ape_decode_value_3860(ctx, &ctx->gb, &ctx->riceY);
while (blocks--)
... |
50,900 | null | Remote | Not required | Partial | CVE-2016-6250 | https://www.cvedetails.com/cve/CVE-2016-6250/ | CWE-190 | Low | Partial | Partial | null | 2016-09-21 | 7.5 | Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow. | 2018-01-04 | DoS Exec Code Overflow | 0 | https://github.com/libarchive/libarchive/commit/3014e198 | 3014e198 | Issue 711: Be more careful about verifying filename lengths when writing ISO9660 archives
* Don't cast size_t to int, since this can lead to overflow
on machines where sizeof(int) < sizeof(size_t)
* Check a + b > limit by writing it as
a > limit || b > limit || a + b > limit
to avoid problems when a + b wraps... | 0 | libarchive/archive_write_set_format_iso9660.c | {"sha": "cb3e54e8d21b10ece9a241f638c63ccbcec358b6", "filename": "libarchive/archive_write_set_format_iso9660.c", "status": "modified", "additions": 10, "deletions": 8, "changes": 18, "blob_url": "https://github.com/libarchive/libarchive/blob/3014e19820ea53c15c90f9d447ca3e668a0b76c6/libarchive/archive_write_set_format_i... | write_null(struct archive_write *a, size_t size)
{
size_t remaining;
unsigned char *p, *old;
int r;
remaining = wb_remaining(a);
p = wb_buffptr(a);
if (size <= remaining) {
memset(p, 0, size);
return (wb_consume(a, size));
}
memset(p, 0, remaining);
r = wb_consume(a, remaining);
if (r != ARCHIVE_OK)
re... | write_null(struct archive_write *a, size_t size)
{
size_t remaining;
unsigned char *p, *old;
int r;
remaining = wb_remaining(a);
p = wb_buffptr(a);
if (size <= remaining) {
memset(p, 0, size);
return (wb_consume(a, size));
}
memset(p, 0, remaining);
r = wb_consume(a, remaining);
if (r != ARCHIVE_OK)
re... | C | null | null | null | @@ -6225,7 +6225,7 @@ isoent_gen_joliet_identifier(struct archive_write *a, struct isoent *isoent,
unsigned char *p;
size_t l;
int r;
- int ffmax, parent_len;
+ size_t ffmax, parent_len;
static const struct archive_rb_tree_ops rb_ops = {
isoent_cmp_node_joliet, isoent_cmp_key_joliet
};
@@ -6239,7 +6239,7 @... | libarchive | 3014e198 | 7bb6d7078fa2fb9eae214029a019c71ce256eeb7 | 0 | write_null(struct archive_write *a, size_t size)
{
size_t remaining;
unsigned char *p, *old;
int r;
remaining = wb_remaining(a);
p = wb_buffptr(a);
if (size <= remaining) {
memset(p, 0, size);
return (wb_consume(a, size));
}
memset(p, 0, remaining);
r = wb_consume(a, remaining);
if (r != ARCHIVE_OK)
re... |
41,916 | null | Local | Not required | Complete | CVE-2015-8104 | https://www.cvedetails.com/cve/CVE-2015-8104/ | CWE-399 | Medium | null | null | null | 2015-11-16 | 4.7 | The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c. | 2017-05-23 | DoS | 0 | https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d | cbdb967af3d54993f5814f1cee0ed311a055377d | KVM: svm: unconditionally intercept #DB
This is needed to avoid the possibility that the guest triggers
an infinite stream of #DB exceptions (CVE-2015-8104).
VMX is not affected: because it does not save DR6 in the VMCS,
it already intercepts #DB unconditionally.
Reported-by: Jan Beulich <jbeulich@suse.com>
Cc: stab... | 0 | arch/x86/kvm/svm.c | {"sha": "1cc1ffca0d8c3fe9693a0b4f6d23cddfcc81e826", "filename": "arch/x86/kvm/svm.c", "status": "modified", "additions": 3, "deletions": 11, "changes": 14, "blob_url": "https://github.com/torvalds/linux/blob/cbdb967af3d54993f5814f1cee0ed311a055377d/arch/x86/kvm/svm.c", "raw_url": "https://github.com/torvalds/linux/raw/... | static int svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4)
{
unsigned long host_cr4_mce = cr4_read_shadow() & X86_CR4_MCE;
unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4;
if (cr4 & X86_CR4_VMXE)
return 1;
if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE))
svm_flush_tlb(vcpu);
vcpu->arch.cr4 = c... | static int svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4)
{
unsigned long host_cr4_mce = cr4_read_shadow() & X86_CR4_MCE;
unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4;
if (cr4 & X86_CR4_VMXE)
return 1;
if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE))
svm_flush_tlb(vcpu);
vcpu->arch.cr4 = c... | C | null | null | null | @@ -1020,6 +1020,7 @@ static void init_vmcb(struct vcpu_svm *svm)
set_exception_intercept(svm, UD_VECTOR);
set_exception_intercept(svm, MC_VECTOR);
set_exception_intercept(svm, AC_VECTOR);
+ set_exception_intercept(svm, DB_VECTOR);
set_intercept(svm, INTERCEPT_INTR);
set_intercept(svm, INTERCEPT_NMI);
@@ -1... | linux | cbdb967af3d54993f5814f1cee0ed311a055377d | 54a20552e1eae07aa240fa370a0293e006b5faed | 0 | static int svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4)
{
unsigned long host_cr4_mce = cr4_read_shadow() & X86_CR4_MCE;
unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4;
if (cr4 & X86_CR4_VMXE)
return 1;
if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE))
svm_flush_tlb(vcpu);
vcpu->arch.cr4 = c... |
100,955 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2011-12 | null | 0 | https://github.com/chromium/chromium/commit/a1f6ba4c1c488be710013f8548ff5513b32a7f3b | a1f6ba4c1c488be710013f8548ff5513b32a7f3b | Define DEBUG_GL_COMMANDS only in debug builds.
https://bugs.webkit.org/show_bug.cgi?id=74083
Reviewed by Noam Rosenthal.
No tests added as this change does not affect functionality.
* platform/graphics/opengl/TextureMapperGL.cpp:
git-svn-id: svn://svn.chromium.org/blink/trunk@102359 bbb929c8-8fbe-4397-9dbb-9b2b202... | 0 | third_party/WebKit/Source/WebCore/platform/graphics/opengl/TextureMapperGL.cpp | {"sha": "2ca5cd9f0038abc985290c76b52191eeaef31a7e", "filename": "third_party/WebKit/Source/WebCore/ChangeLog", "status": "modified", "additions": 11, "deletions": 0, "changes": 11, "blob_url": "https://github.com/chromium/chromium/blob/a1f6ba4c1c488be710013f8548ff5513b32a7f3b/third_party/WebKit/Source/WebCore/ChangeLog... | void createShaderProgram(const char* vertexShaderSource, const char* fragmentShaderSource, ShaderProgramIndex index)
{
GLuint vertexShader = glCreateShader(GL_VERTEX_SHADER);
GLuint fragmentShader = glCreateShader(GL_FRAGMENT_SHADER);
GL_CMD(glShaderSource(vertexShade... | void createShaderProgram(const char* vertexShaderSource, const char* fragmentShaderSource, ShaderProgramIndex index)
{
GLuint vertexShader = glCreateShader(GL_VERTEX_SHADER);
GLuint fragmentShader = glCreateShader(GL_FRAGMENT_SHADER);
GL_CMD(glShaderSource(vertexShade... | C | null | null | null | @@ -96,12 +96,10 @@ inline static void debugGLCommand(const char* command, int line)
ASSERT_NOT_REACHED();
}
-#define DEBUG_GL_COMMANDS
-
-#ifdef DEBUG_GL_COMMANDS
+#ifndef NDEBUG
#define GL_CMD(x) {x, debugGLCommand(#x, __LINE__); }
#else
-#define GL_CMD(x) x
+#define GL_CMD(x) x;
#endif
struct TextureMa... | Chrome | a1f6ba4c1c488be710013f8548ff5513b32a7f3b | 7273304da7898a7835a880171e519cb3816945ee | 0 | void createShaderProgram(const char* vertexShaderSource, const char* fragmentShaderSource, ShaderProgramIndex index)
{
GLuint vertexShader = glCreateShader(GL_VERTEX_SHADER);
GLuint fragmentShader = glCreateShader(GL_FRAGMENT_SHADER);
GL_CMD(glShaderSource(vertexShade... |
75,110 | null | Remote | Not required | Partial | CVE-2018-1000524 | https://www.cvedetails.com/cve/CVE-2018-1000524/ | CWE-190 | Medium | null | null | null | 2018-06-26 | 4.3 | miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap... | 2018-08-28 | DoS Overflow | 0 | https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996 | 252c1ca184cb38e1acb917aa0e451c5f08519996 | Fix integer overflow in layer_resize in map_engine.c (#268)
* Fix integer overflow in layer_resize in map_engine.c
There's a buffer overflow bug in the function layer_resize. It allocates
a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`.
But it didn't check for integer overflow, so if x_si... | 0 | src/minisphere/map_engine.c | {"sha": "cba8a6123ffb11dd5e1af712da513beadec55f1c", "filename": "src/minisphere/map_engine.c", "status": "modified", "additions": 4, "deletions": 1, "changes": 5, "blob_url": "https://github.com/fatcerberus/miniSphere/blob/252c1ca184cb38e1acb917aa0e451c5f08519996/src/minisphere/map_engine.c", "raw_url": "https://github... | person_set_leader(person_t* person, person_t* leader, int distance)
{
const person_t* node;
if (leader != NULL) {
node = leader;
do {
if (node == person)
return false;
} while ((node = node->leader));
}
if (leader != NULL) {
if (!enlarge_step_history(leader, distance))
return false;
person->le... | person_set_leader(person_t* person, person_t* leader, int distance)
{
const person_t* node;
if (leader != NULL) {
node = leader;
do {
if (node == person)
return false;
} while ((node = node->leader));
}
if (leader != NULL) {
if (!enlarge_step_history(leader, distance))
return false;
person->le... | C | null | null | null | @@ -1036,6 +1036,7 @@ layer_resize(int layer, int x_size, int y_size)
struct map_tile* tilemap;
struct map_trigger* trigger;
struct map_zone* zone;
+ size_t tilemap_size;
int x, y, i;
@@ -1044,7 +1045,9 @@ layer_resize(int layer, int x_size, int y_size)
// allocate a new tilemap and c... | minisphere | 252c1ca184cb38e1acb917aa0e451c5f08519996 | 23c16ff65ac8831de1dea721e4998bd140d91080 | 0 | person_set_leader(person_t* person, person_t* leader, int distance)
{
const person_t* node;
// prevent circular follower chains from forming
if (leader != NULL) {
node = leader;
do {
if (node == person)
return false;
} while ((node = node->leader));
}
// add the person as a follower (or sever existi... |
14,666 | null | Remote | Not required | Partial | CVE-2015-6527 | https://www.cvedetails.com/cve/CVE-2015-6527/ | CWE-17 | Low | Partial | Partial | null | 2016-01-19 | 7.5 | The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function. | 2016-01-21 | Exec Code | 0 | https://git.php.net/?p=php-src.git;a=commit;h=6aeee47b2cd47915ccfa3b41433a3f57aea24dd5 | 6aeee47b2cd47915ccfa3b41433a3f57aea24dd5 | null | 0 | null | null | PHP_MINIT_FUNCTION(nl_langinfo)
{
#define REGISTER_NL_LANGINFO_CONSTANT(x) REGISTER_LONG_CONSTANT(#x, x, CONST_CS | CONST_PERSISTENT)
#ifdef ABDAY_1
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_1);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_2);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_3);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_4);
REGIST... | PHP_MINIT_FUNCTION(nl_langinfo)
{
#define REGISTER_NL_LANGINFO_CONSTANT(x) REGISTER_LONG_CONSTANT(#x, x, CONST_CS | CONST_PERSISTENT)
#ifdef ABDAY_1
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_1);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_2);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_3);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_4);
REGIST... | C | null | null | d44fc4a07361d2527dd7073b09e5e88134708858 | @@ -4055,7 +4055,7 @@ static zend_long php_str_replace_in_subject(zval *search, zval *replace, zval *s
Z_STRVAL_P(search), Z_STRLEN_P(search),
Z_STRVAL_P(replace), Z_STRLEN_P(replace), &replace_count));
... | php | https://git.php.net/?p=php-src.git;a=blob;f=ext/standard/string.c;h=2a9ddb2a180b85feca3de464ff9aa54afb71e361;hb=2a9ddb2a180b85feca3de464ff9aa54afb71e361 | https://git.php.net/?p=php-src.git;a=blob;f=ext/standard/string.c;h=bb482ba7a159e7f5976b99212c87552b0f46f2ad;hb=bb482ba7a159e7f5976b99212c87552b0f46f2ad | 0 | PHP_MINIT_FUNCTION(nl_langinfo)
{
#define REGISTER_NL_LANGINFO_CONSTANT(x) REGISTER_LONG_CONSTANT(#x, x, CONST_CS | CONST_PERSISTENT)
#ifdef ABDAY_1
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_1);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_2);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_3);
REGISTER_NL_LANGINFO_CONSTANT(ABDAY_4);
REGIST... |
30,679 | null | Local | Not required | null | CVE-2013-3227 | https://www.cvedetails.com/cve/CVE-2013-3227/ | CWE-200 | Low | Complete | null | null | 2013-04-22 | 4.9 | The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. | 2017-11-28 | +Info | 0 | https://github.com/torvalds/linux/commit/2d6fbfe733f35c6b355c216644e08e149c61b271 | 2d6fbfe733f35c6b355c216644e08e149c61b271 | caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
The current code does not fill the msg_name member in case it is set.
It also does not set the msg_namelen member to 0 and therefore makes
net/socket.c leak the local, uninitialized sockaddr_storage variable
to userland -- 128 bytes of kernel stack memory.
... | 0 | net/caif/caif_socket.c | {"sha": "ff2ff3ce6965a73dcf74918cd5c5bcc1b4a7d51b", "filename": "net/caif/caif_socket.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/2d6fbfe733f35c6b355c216644e08e149c61b271/net/caif/caif_socket.c", "raw_url": "https://github.com/torvalds/linu... | static void caif_sock_destructor(struct sock *sk)
{
struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
caif_assert(!atomic_read(&sk->sk_wmem_alloc));
caif_assert(sk_unhashed(sk));
caif_assert(!sk->sk_socket);
if (!sock_flag(sk, SOCK_DEAD)) {
pr_debug("Attempt to release alive CAIF socket: %p\n", sk)... | static void caif_sock_destructor(struct sock *sk)
{
struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
caif_assert(!atomic_read(&sk->sk_wmem_alloc));
caif_assert(sk_unhashed(sk));
caif_assert(!sk->sk_socket);
if (!sock_flag(sk, SOCK_DEAD)) {
pr_debug("Attempt to release alive CAIF socket: %p\n", sk)... | C | null | null | null | @@ -286,6 +286,8 @@ static int caif_seqpkt_recvmsg(struct kiocb *iocb, struct socket *sock,
if (m->msg_flags&MSG_OOB)
goto read_error;
+ m->msg_namelen = 0;
+
skb = skb_recv_datagram(sk, flags, 0 , &ret);
if (!skb)
goto read_error; | linux | 2d6fbfe733f35c6b355c216644e08e149c61b271 | c8c499175f7d295ef867335bceb9a76a2c3cdc38 | 0 | static void caif_sock_destructor(struct sock *sk)
{
struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
caif_assert(!atomic_read(&sk->sk_wmem_alloc));
caif_assert(sk_unhashed(sk));
caif_assert(!sk->sk_socket);
if (!sock_flag(sk, SOCK_DEAD)) {
pr_debug("Attempt to release alive CAIF socket: %p\n", sk)... |
20,351 | null | Local | Not required | Complete | CVE-2012-2121 | https://www.cvedetails.com/cve/CVE-2012-2121/ | CWE-264 | Low | null | null | null | 2012-05-17 | 4.9 | The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations ... | 2018-01-04 | DoS | 0 | https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195 | 09ca8e1173bcb12e2a449698c9ae3b86a8a10195 | KVM: unmap pages from the iommu when slots are removed
commit 32f6daad4651a748a58a3ab6da0611862175722f upstream.
We've been adding new mappings, but not destroying old mappings.
This can lead to a page leak as pages are pinned using
get_user_pages, but only unpinned with put_page if they still
exist in the memslots l... | 0 | virt/kvm/kvm_main.c | {"sha": "bc2172077d9d27cf10eeb155b44e716a9b0f7d02", "filename": "include/linux/kvm_host.h", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/09ca8e1173bcb12e2a449698c9ae3b86a8a10195/include/linux/kvm_host.h", "raw_url": "https://github.com/torvalds/... | unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn)
{
struct vm_area_struct *vma;
unsigned long addr, size;
size = PAGE_SIZE;
addr = gfn_to_hva(kvm, gfn);
if (kvm_is_error_hva(addr))
return PAGE_SIZE;
down_read(¤t->mm->mmap_sem);
vma = find_vma(current->mm, addr);
if (!vma)
goto out;
siz... | unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn)
{
struct vm_area_struct *vma;
unsigned long addr, size;
size = PAGE_SIZE;
addr = gfn_to_hva(kvm, gfn);
if (kvm_is_error_hva(addr))
return PAGE_SIZE;
down_read(¤t->mm->mmap_sem);
vma = find_vma(current->mm, addr);
if (!vma)
goto out;
siz... | C | null | null | null | @@ -873,12 +873,13 @@ int __kvm_set_memory_region(struct kvm *kvm,
if (r)
goto out_free;
- /* map the pages in iommu page table */
+ /* map/unmap the pages in iommu page table */
if (npages) {
r = kvm_iommu_map_pages(kvm, &new);
if (r)
goto out_free;
- }
+ } else
+ kvm_iommu_unmap_pages(kvm, &old);
... | linux | 09ca8e1173bcb12e2a449698c9ae3b86a8a10195 | f16e3ad91afa96717232a393e07e86f76099af03 | 0 | unsigned long kvm_host_page_size(struct kvm *kvm, gfn_t gfn)
{
struct vm_area_struct *vma;
unsigned long addr, size;
size = PAGE_SIZE;
addr = gfn_to_hva(kvm, gfn);
if (kvm_is_error_hva(addr))
return PAGE_SIZE;
down_read(¤t->mm->mmap_sem);
vma = find_vma(current->mm, addr);
if (!vma)
goto out;
siz... |
117,137 | null | Remote | Not required | Complete | CVE-2011-3099 | https://www.cvedetails.com/cve/CVE-2011-3099/ | CWE-399 | Low | Complete | Complete | null | 2012-05-15 | 10 | Use-after-free vulnerability in the PDF functionality in Google Chrome before 19.0.1084.46 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a malformed name for the font encoding. | 2017-12-04 | DoS | 0 | https://github.com/chromium/chromium/commit/3bbc818ed1a7b63b8290bbde9ae975956748cb8a | 3bbc818ed1a7b63b8290bbde9ae975956748cb8a | [GTK] Inspector should set a default attached height before being attached
https://bugs.webkit.org/show_bug.cgi?id=90767
Reviewed by Xan Lopez.
We are currently using the minimum attached height in
WebKitWebViewBase as the default height for the inspector when
attached. It would be easier for WebKitWebViewBase and em... | 0 | third_party/WebKit/Source/WebKit2/UIProcess/API/gtk/WebKitWebViewBase.cpp | {"sha": "736ae1ede06ad8b64d22eec23667d1ebecb111c4", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 26, "deletions": 0, "changes": 26, "blob_url": "https://github.com/chromium/chromium/blob/3bbc818ed1a7b63b8290bbde9ae975956748cb8a/third_party/WebKit/Source/WebKit2/ChangeLog... | static gboolean webkitWebViewBaseFocusOutEvent(GtkWidget* widget, GdkEventFocus* event)
{
WebKitWebViewBase* webViewBase = WEBKIT_WEB_VIEW_BASE(widget);
WebKitWebViewBasePrivate* priv = webViewBase->priv;
priv->isPageActive = FALSE;
priv->pageProxy->viewStateDidChange(WebPageProxy::ViewWindowIsActive);... | static gboolean webkitWebViewBaseFocusOutEvent(GtkWidget* widget, GdkEventFocus* event)
{
WebKitWebViewBase* webViewBase = WEBKIT_WEB_VIEW_BASE(widget);
WebKitWebViewBasePrivate* priv = webViewBase->priv;
priv->isPageActive = FALSE;
priv->pageProxy->viewStateDidChange(WebPageProxy::ViewWindowIsActive);... | C | null | null | null | @@ -101,9 +101,6 @@ struct _WebKitWebViewBasePrivate {
G_DEFINE_TYPE(WebKitWebViewBase, webkit_web_view_base, GTK_TYPE_CONTAINER)
-// Keep this in sync with the value minimumAttachedHeight in WebInspectorProxy.
-static const unsigned gMinimumAttachedInspectorHeight = 250;
-
static void webkitWebViewBaseNotifyResi... | Chrome | 3bbc818ed1a7b63b8290bbde9ae975956748cb8a | 4bc851f188711a797a1632a9f6ce135afd233587 | 0 | static gboolean webkitWebViewBaseFocusOutEvent(GtkWidget* widget, GdkEventFocus* event)
{
WebKitWebViewBase* webViewBase = WEBKIT_WEB_VIEW_BASE(widget);
WebKitWebViewBasePrivate* priv = webViewBase->priv;
priv->isPageActive = FALSE;
priv->pageProxy->viewStateDidChange(WebPageProxy::ViewWindowIsActive);... |
179,959 | null | Remote | Not required | null | CVE-2014-9423 | https://www.cvedetails.com/cve/CVE-2014-9423/ | CWE-200 | Low | Partial | null | null | 2015-02-19 | 5 | The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing... | 2016-11-28 | +Info | 0 | https://github.com/krb5/krb5/commit/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c | 5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c | Fix gssrpc data leakage [CVE-2014-9423]
[MITKRB5-SA-2015-001] In svcauth_gss_accept_sec_context(), do not copy
bytes from the union context into the handle field we send to the
client. We do not use this handle field, so just supply a fixed
string of "xxxx".
In gss_union_ctx_id_struct, remove the unused "interposer"... | 3 | src/lib/rpc/svc_auth_gss.c | {"sha": "2b5145e079fe27517cbfe1a7c94113bfb184ac50", "filename": "src/lib/gssapi/mechglue/mglueP.h", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/krb5/krb5/blob/5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c/src/lib/gssapi/mechglue/mglueP.h", "raw_url": "https://github.co... | gssrpc__svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg,
bool_t *no_dispatch)
{
enum auth_stat retstat;
XDR xdrs;
SVCAUTH *auth;
struct svc_rpc_gss_data *gd;
struct rpc_gss_cred *gc;
struct rpc_gss_init_res gr;
int call_stat, offset;
OM_uint32 min_stat;
log_debug("in svcauth_gss()");
/*... | gssrpc__svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg,
bool_t *no_dispatch)
{
enum auth_stat retstat;
XDR xdrs;
SVCAUTH *auth;
struct svc_rpc_gss_data *gd;
struct rpc_gss_cred *gc;
struct rpc_gss_init_res gr;
int call_stat, offset;
OM_uint32 min_stat;
log_debug("in svcauth_gss()");
/*... | C | null | mem_free(gr.gr_ctx.value,
sizeof(gss_union_ctx_id_desc));
mem_free(gr.gr_ctx.value, sizeof(gss_union_ctx_id_desc));
| null | @@ -65,16 +65,6 @@ extern const gss_OID_desc * const gss_mech_spkm3;
extern SVCAUTH svc_auth_none;
-/*
- * from mit-krb5-1.2.1 mechglue/mglueP.h:
- * Array of context IDs typed by mechanism OID
- */
-typedef struct gss_union_ctx_id_t {
- gss_OID mech_type;
- gss_ctx_id_t internal_ctx_id;
-} gss_union_ctx_... | krb5 | 5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c | 6609658db0799053fbef0d7d0aa2f1fd68ef32d8 | 1 | gssrpc__svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg,
bool_t *no_dispatch)
{
enum auth_stat retstat;
XDR xdrs;
SVCAUTH *auth;
struct svc_rpc_gss_data *gd;
struct rpc_gss_cred *gc;
struct rpc_gss_init_res gr;
int call_stat, offset;
OM_uint32 min_stat;
log_debug("in svcauth_gss()");
/*... |
101,302 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2011-11 | null | 0 | https://github.com/chromium/chromium/commit/19190765882e272a6a2162c89acdb29110f7e3cf | 19190765882e272a6a2162c89acdb29110f7e3cf | Revert 102184 - [Sync] use base::Time in sync
Make EntryKernel/Entry/BaseNode use base::Time instead of int64s.
Add sync/util/time.h, with utility functions to manage the sync proto
time format.
Store times on disk in proto format instead of the local system.
This requires a database version bump (to 77).
Update Se... | 0 | chrome/browser/sync/engine/syncer_util.cc | {"sha": "98d00951a5cdbae37c5ff82273375587493a88a0", "filename": "chrome/browser/sync/engine/build_commit_command.cc", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/chromium/chromium/blob/19190765882e272a6a2162c89acdb29110f7e3cf/chrome/browser/sync/engine/build_commi... | VerifyResult SyncerUtil::VerifyNewEntry(
const SyncEntity& update,
syncable::Entry* target,
const bool deleted) {
if (target->good()) {
return VERIFY_UNDECIDED;
}
if (deleted) {
return VERIFY_SKIP;
}
return VERIFY_SUCCESS;
}
| VerifyResult SyncerUtil::VerifyNewEntry(
const SyncEntity& update,
syncable::Entry* target,
const bool deleted) {
if (target->good()) {
return VERIFY_UNDECIDED;
}
if (deleted) {
return VERIFY_SKIP;
}
return VERIFY_SUCCESS;
}
| C | null | null | null | @@ -23,7 +23,6 @@
#include "chrome/browser/sync/syncable/model_type.h"
#include "chrome/browser/sync/syncable/syncable.h"
#include "chrome/browser/sync/syncable/syncable_changes_version.h"
-#include "chrome/browser/sync/util/time.h"
using syncable::BASE_VERSION;
using syncable::Blob;
@@ -426,8 +425,10 @@ void Sy... | Chrome | 19190765882e272a6a2162c89acdb29110f7e3cf | 603b62a3200ccc75370d3750b5a76f8f8960d299 | 0 | VerifyResult SyncerUtil::VerifyNewEntry(
const SyncEntity& update,
syncable::Entry* target,
const bool deleted) {
if (target->good()) {
// Not a new update.
return VERIFY_UNDECIDED;
}
if (deleted) {
// Deletion of an item we've never seen can be ignored.
return VERIFY_SKIP;
}
retu... |
176,216 | null | Remote | Not required | Complete | CVE-2018-9490 | https://www.cvedetails.com/cve/CVE-2018-9490/ | CWE-704 | Medium | Complete | Complete | null | 2018-10-02 | 9.3 | In CollectValuesOrEntriesImpl of elements.cc, there is possible remote code execution due to type confusion. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 ... | 2018-12-28 | Exec Code | 0 | https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb | a24543157ae2cdd25da43e20f4e48a07481e6ceb | Backport: Fix Object.entries/values with changing elements
Bug: 111274046
Test: m -j proxy_resolver_v8_unittest && adb sync && adb shell \
/data/nativetest64/proxy_resolver_v8_unittest/proxy_resolver_v8_unittest
Change-Id: I705fc512cc5837e9364ed187559cc75d079aa5cb
(cherry picked from commit d8be9a10287afed07705ac8af02... | 0 | src/elements.cc | {"filename": "src/elements.cc", "raw_url": "https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb/src/elements.cc", "patch": "@@ -511,6 +511,21 @@\n\n return Just<int64_t>(-1);\n }\n \n+// The InternalElementsAccessor is a helper class to expose otherwise protected\n+// meth... | static Handle<FixedArrayBase> ConvertElementsWithCapacity(
Handle<JSObject> object, Handle<FixedArrayBase> old_elements,
ElementsKind from_kind, uint32_t capacity, int copy_size) {
return ConvertElementsWithCapacity(object, old_elements, from_kind,
capacity, 0, 0, copy_size);
... | static Handle<FixedArrayBase> ConvertElementsWithCapacity(
Handle<JSObject> object, Handle<FixedArrayBase> old_elements,
ElementsKind from_kind, uint32_t capacity, int copy_size) {
return ConvertElementsWithCapacity(object, old_elements, from_kind,
capacity, 0, 0, copy_size);
... | C | null | null | null | @@ -511,6 +511,21 @@
return Just<int64_t>(-1);
}
+// The InternalElementsAccessor is a helper class to expose otherwise protected
+// methods to its subclasses. Namely, we don't want to publicly expose methods
+// that take an entry (instead of an index) as an argument.
+class InternalElementsAccessor : public E... | Android | https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb/ | https://android.googlesource.com/platform/external/v8/+/a24543157ae2cdd25da43e20f4e48a07481e6ceb%5E/ | 0 | static Handle<FixedArrayBase> ConvertElementsWithCapacity(
Handle<JSObject> object, Handle<FixedArrayBase> old_elements,
ElementsKind from_kind, uint32_t capacity, int copy_size) {
return ConvertElementsWithCapacity(object, old_elements, from_kind,
capacity, 0, 0, copy_size);
... |
38,679 | null | Remote | Not required | Complete | CVE-2014-2672 | https://www.cvedetails.com/cve/CVE-2014-2672/ | CWE-362 | Medium | null | null | null | 2014-04-01 | 7.1 | Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions. | 2014-04-19 | DoS | 0 | https://github.com/torvalds/linux/commit/21f8aaee0c62708654988ce092838aa7df4d25d8 | 21f8aaee0c62708654988ce092838aa7df4d25d8 | ath9k: protect tid->sched check
We check tid->sched without a lock taken on ath_tx_aggr_sleep(). That
is race condition which can result of doing list_del(&tid->list) twice
(second time with poisoned list node) and cause crash like shown below:
[424271.637220] BUG: unable to handle kernel paging request at 00100104
[... | 0 | drivers/net/wireless/ath/ath9k/xmit.c | {"sha": "4f4ce83f7ab4afd69fb4ed4ae937953711d3343a", "filename": "drivers/net/wireless/ath/ath9k/xmit.c", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/torvalds/linux/blob/21f8aaee0c62708654988ce092838aa7df4d25d8/drivers/net/wireless/ath/ath9k/xmit.c", "raw_url": "ht... | int ath_tx_aggr_start(struct ath_softc *sc, struct ieee80211_sta *sta,
u16 tid, u16 *ssn)
{
struct ath_atx_tid *txtid;
struct ath_txq *txq;
struct ath_node *an;
u8 density;
an = (struct ath_node *)sta->drv_priv;
txtid = ATH_AN_2_TID(an, tid);
txq = txtid->ac->txq;
ath_txq_lock(sc, txq);
/* update am... | int ath_tx_aggr_start(struct ath_softc *sc, struct ieee80211_sta *sta,
u16 tid, u16 *ssn)
{
struct ath_atx_tid *txtid;
struct ath_txq *txq;
struct ath_node *an;
u8 density;
an = (struct ath_node *)sta->drv_priv;
txtid = ATH_AN_2_TID(an, tid);
txq = txtid->ac->txq;
ath_txq_lock(sc, txq);
/* update am... | C | null | null | null | @@ -1444,14 +1444,16 @@ void ath_tx_aggr_sleep(struct ieee80211_sta *sta, struct ath_softc *sc,
for (tidno = 0, tid = &an->tid[tidno];
tidno < IEEE80211_NUM_TIDS; tidno++, tid++) {
- if (!tid->sched)
- continue;
-
ac = tid->ac;
txq = ac->txq;
ath_txq_lock(sc, txq);
+ if (!tid->sched) {
+ a... | linux | 21f8aaee0c62708654988ce092838aa7df4d25d8 | 1c97560f6d751a620978504a4a888c631192b71a | 0 | int ath_tx_aggr_start(struct ath_softc *sc, struct ieee80211_sta *sta,
u16 tid, u16 *ssn)
{
struct ath_atx_tid *txtid;
struct ath_txq *txq;
struct ath_node *an;
u8 density;
an = (struct ath_node *)sta->drv_priv;
txtid = ATH_AN_2_TID(an, tid);
txq = txtid->ac->txq;
ath_txq_lock(sc, txq);
/* update am... |
115,321 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2012-02 | null | 0 | https://github.com/chromium/chromium/commit/0008e75b613a252c8a5e2cca58c8376bf0e0a6a8 | 0008e75b613a252c8a5e2cca58c8376bf0e0a6a8 | Disables PanelBrowserTest.MinimizeTwoPanelsWithoutTabbedWindow on
windows as it's causing other interactive ui tests to fail.
BUG=103253
TBR=dimich@chromium.org
R=dimich@chromium.org
Review URL: http://codereview.chromium.org/8467025
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@108901 0039d316-1c4b-4281-b951-... | 0 | chrome/browser/ui/panels/panel_browsertest.cc | {"sha": "630c14f5e861fa68e127d3ffce8f7553bb43d7a7", "filename": "chrome/browser/ui/panels/panel_browsertest.cc", "status": "modified", "additions": 3, "deletions": 2, "changes": 5, "blob_url": "https://github.com/chromium/chromium/blob/0008e75b613a252c8a5e2cca58c8376bf0e0a6a8/chrome/browser/ui/panels/panel_browsertest.... | PanelDownloadTest() : PanelBrowserTest() { }
| PanelDownloadTest() : PanelBrowserTest() { }
| C | null | null | null | @@ -1294,8 +1294,9 @@ IN_PROC_BROWSER_TEST_F(PanelBrowserTest, MAYBE_FocusLostOnMinimize) {
panel->Close();
}
-// TODO(dimich): try/enable on other platforms.
-#if defined(OS_MACOSX) || defined(OS_WIN)
+// TODO(dimich): try/enable on other platforms. See bug 103253 for details on
+// why this is disabled on windo... | Chrome | 0008e75b613a252c8a5e2cca58c8376bf0e0a6a8 | 0eb4a12ea4740eedcbfeb6c939dca15353ffde13 | 0 | PanelDownloadTest() : PanelBrowserTest() { }
|
125,196 | null | Remote | Not required | Partial | CVE-2013-0910 | https://www.cvedetails.com/cve/CVE-2013-0910/ | CWE-287 | Low | Partial | Partial | null | 2013-03-05 | 7.5 | Google Chrome before 25.0.1364.152 does not properly manage the interaction between the browser process and renderer processes during authorization of the loading of a plug-in, which makes it easier for remote attackers to bypass intended access restrictions via vectors involving a blocked plug-in. | 2017-09-18 | Bypass | 0 | https://github.com/chromium/chromium/commit/ac8bd041b81e46e4e4fcd5021aaa5499703952e6 | ac8bd041b81e46e4e4fcd5021aaa5499703952e6 | Follow-on fixes and naming changes for https://codereview.chromium.org/12086077/
BUG=172573
Review URL: https://codereview.chromium.org/12177018
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@180600 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/browser/renderer_host/render_message_filter.cc | {"sha": "072269f723daf87a86251f9f4a4fae5574f5be8b", "filename": "chrome/browser/plugins/chrome_plugin_service_filter.cc", "status": "modified", "additions": 4, "deletions": 5, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/ac8bd041b81e46e4e4fcd5021aaa5499703952e6/chrome/browser/plugins/chrome_plug... | void RenderMessageFilter::OnCreateFullscreenWidget(int opener_id,
int* route_id,
int* surface_id) {
render_widget_helper_->CreateNewFullscreenWidget(
opener_id, route_id, surface_id);
}
| void RenderMessageFilter::OnCreateFullscreenWidget(int opener_id,
int* route_id,
int* surface_id) {
render_widget_helper_->CreateNewFullscreenWidget(
opener_id, route_id, surface_id);
}
| C | null | null | null | @@ -673,12 +673,12 @@ void RenderMessageFilter::GetPluginsCallback(
for (size_t i = 0; i < all_plugins.size(); ++i) {
// Copy because the filter can mutate.
webkit::WebPluginInfo plugin(all_plugins[i]);
- if (!filter || filter->IsPluginEnabled(child_process_id,
- ... | Chrome | ac8bd041b81e46e4e4fcd5021aaa5499703952e6 | a0461055bead3cb4904fec723e4145b629db4360 | 0 | void RenderMessageFilter::OnCreateFullscreenWidget(int opener_id,
int* route_id,
int* surface_id) {
render_widget_helper_->CreateNewFullscreenWidget(
opener_id, route_id, surface_id);
}
|
35,726 | null | Remote | Not required | null | CVE-2014-8109 | https://www.cvedetails.com/cve/CVE-2014-8109/ | CWE-264 | Medium | null | Partial | null | 2014-12-29 | 4.3 | mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic ... | 2016-12-30 | Bypass | 0 | https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb | 3f1693d558d0758f829c8b53993f1749ddf6ffcb | Merge r1642499 from trunk:
*) SECURITY: CVE-2014-8109 (cve.mitre.org)
mod_lua: Fix handling of the Require line when a LuaAuthzProvider is
used in multiple Require directives with different arguments.
PR57204 [Edward Lu <Chaosed0 gmail.com>]
Submitted By: Edward Lu
Committed By: covener
Submitted b... | 0 | modules/lua/mod_lua.c | {"sha": "f770724b69a75c5d609dd3d00a99b66b14f4edd9", "filename": "CHANGES", "status": "modified", "additions": 5, "deletions": 0, "changes": 5, "blob_url": "https://github.com/apache/httpd/blob/3f1693d558d0758f829c8b53993f1749ddf6ffcb/CHANGES", "raw_url": "https://github.com/apache/httpd/raw/3f1693d558d0758f829c8b53993f... | static const char *register_insert_filter_hook(cmd_parms *cmd, void *_cfg,
const char *file,
const char *function)
{
return "LuaHookInsertFilter not yet implemented";
}
| static const char *register_insert_filter_hook(cmd_parms *cmd, void *_cfg,
const char *file,
const char *function)
{
return "LuaHookInsertFilter not yet implemented";
}
| C | null | null | null | @@ -66,9 +66,13 @@ typedef struct {
const char *file_name;
const char *function_name;
ap_lua_vm_spec *spec;
- apr_array_header_t *args;
} lua_authz_provider_spec;
+typedef struct {
+ lua_authz_provider_spec *spec;
+ apr_array_header_t *args;
+} lua_authz_provider_func;
+
apr_hash_t *lua_auth... | httpd | 3f1693d558d0758f829c8b53993f1749ddf6ffcb | 82d00bafabeb2ea902cc95183de5640c7c922758 | 0 | static const char *register_insert_filter_hook(cmd_parms *cmd, void *_cfg,
const char *file,
const char *function)
{
return "LuaHookInsertFilter not yet implemented";
}
|
87,621 | null | Remote | Not required | Partial | CVE-2019-17178 | https://www.cvedetails.com/cve/CVE-2019-17178/ | CWE-772 | Low | null | null | null | 2019-10-04 | 5 | HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value. | 2019-10-11 | null | 0 | https://github.com/akallabeth/FreeRDP/commit/fc80ab45621bd966f70594c0b7393ec005a94007 | fc80ab45621bd966f70594c0b7393ec005a94007 | Fixed #5645: realloc return handling | 0 | winpr/libwinpr/utils/lodepng/lodepng.c | {"sha": "1a3ebf563b886da2f0590bf25df2f8f554ad939a", "filename": "client/X11/generate_argument_docbook.c", "status": "modified", "additions": 27, "deletions": 6, "changes": 33, "blob_url": "https://github.com/akallabeth/FreeRDP/blob/fc80ab45621bd966f70594c0b7393ec005a94007/client/X11/generate_argument_docbook.c", "raw_u... | static unsigned zlib_decompress(unsigned char** out, size_t* outsize, const unsigned char* in,
size_t insize, const LodePNGDecompressSettings* settings)
{
if(settings->custom_zlib)
{
return settings->custom_zlib(out, outsize, in, insize, settings);
}
else
{
return lodep... | static unsigned zlib_decompress(unsigned char** out, size_t* outsize, const unsigned char* in,
size_t insize, const LodePNGDecompressSettings* settings)
{
if(settings->custom_zlib)
{
return settings->custom_zlib(out, outsize, in, insize, settings);
}
else
{
return lodep... | C | null | null | null | @@ -841,11 +841,15 @@ unsigned lodepng_huffman_code_lengths(unsigned* lengths, const unsigned* frequen
static unsigned HuffmanTree_makeFromFrequencies(HuffmanTree* tree, const unsigned* frequencies,
size_t mincodes, size_t numcodes, unsigned maxbitlen)
{
+ unsigned* le... | FreeRDP | fc80ab45621bd966f70594c0b7393ec005a94007 | a301e08be52f520fb4cb794b0c25c7de34351d59 | 0 | static unsigned zlib_decompress(unsigned char** out, size_t* outsize, const unsigned char* in,
size_t insize, const LodePNGDecompressSettings* settings)
{
if(settings->custom_zlib)
{
return settings->custom_zlib(out, outsize, in, insize, settings);
}
else
{
return lodep... |
103,770 | null | Remote | Not required | Partial | CVE-2011-2861 | https://www.cvedetails.com/cve/CVE-2011-2861/ | CWE-20 | Medium | Partial | Partial | null | 2011-09-19 | 6.8 | Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce | 8262245d384be025f13e2a5b3a03b7e5c98374ce | DevTools: move DevToolsAgent/Client into content.
BUG=84078
TEST=
Review URL: http://codereview.chromium.org/7461019
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@93596 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/renderer/render_view.cc | {"sha": "24059d48a3bcbe447efb7408f77415576f0c36a4", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/8262245d384be025f13e2a5b3a03b7e5c98374ce/chrome/browser/chrome_content_browser_cli... | gfx::PluginWindowHandle RenderView::AllocateFakePluginWindowHandle(
bool opaque, bool root) {
gfx::PluginWindowHandle window = NULL;
Send(new ViewHostMsg_AllocateFakePluginWindowHandle(
routing_id(), opaque, root, &window));
if (window) {
fake_plugin_window_handles_.insert(window);
}
return wind... | gfx::PluginWindowHandle RenderView::AllocateFakePluginWindowHandle(
bool opaque, bool root) {
gfx::PluginWindowHandle window = NULL;
Send(new ViewHostMsg_AllocateFakePluginWindowHandle(
routing_id(), opaque, root, &window));
if (window) {
fake_plugin_window_handles_.insert(window);
}
return wind... | C | null | null | null | @@ -40,6 +40,7 @@
#include "content/common/url_constants.h"
#include "content/common/view_messages.h"
#include "content/renderer/content_renderer_client.h"
+#include "content/renderer/devtools_agent.h"
#include "content/renderer/device_orientation_dispatcher.h"
#include "content/renderer/mhtml_generator.h"
#inclu... | Chrome | 8262245d384be025f13e2a5b3a03b7e5c98374ce | 2469a22063c3539147f55fe899a8dabc12901c01 | 0 | gfx::PluginWindowHandle RenderView::AllocateFakePluginWindowHandle(
bool opaque, bool root) {
gfx::PluginWindowHandle window = NULL;
Send(new ViewHostMsg_AllocateFakePluginWindowHandle(
routing_id(), opaque, root, &window));
if (window) {
fake_plugin_window_handles_.insert(window);
}
return wind... |
19,857 | null | Local Network | Not required | Complete | CVE-2012-2375 | https://www.cvedetails.com/cve/CVE-2012-2375/ | CWE-189 | High | null | null | null | 2012-06-13 | 4.6 | The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NO... | 2016-08-22 | DoS | 0 | https://github.com/torvalds/linux/commit/20e0fa98b751facf9a1101edaefbc19c82616a68 | 20e0fa98b751facf9a1101edaefbc19c82616a68 | Fix length of buffer copied in __nfs4_get_acl_uncached
_copy_from_pages() used to copy data from the temporary buffer to the
user passed buffer is passed the wrong size parameter when copying
data. res.acl_len contains both the bitmap and acl lenghts while
acl_len contains the acl length after adjusting for the bitmap... | 0 | fs/nfs/nfs4proc.c | {"sha": "45df7d4a3acc1f92e18822b5285eb9d603ebe52b", "filename": "fs/nfs/nfs4proc.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/20e0fa98b751facf9a1101edaefbc19c82616a68/fs/nfs/nfs4proc.c", "raw_url": "https://github.com/torvalds/linux/raw/20e0... | static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
{
struct rpc_task *task;
int ret = 0;
if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0)
return 0;
task = _nfs41_proc_sequence(clp, cred);
if (IS_ERR(task))
ret = PTR_ERR(task);
else
rpc_put_task_async(task)... | static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
{
struct rpc_task *task;
int ret = 0;
if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0)
return 0;
task = _nfs41_proc_sequence(clp, cred);
if (IS_ERR(task))
ret = PTR_ERR(task);
else
rpc_put_task_async(task)... | C | null | null | null | @@ -3712,7 +3712,7 @@ static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t bu
if (acl_len > buflen)
goto out_free;
_copy_from_pages(buf, pages, res.acl_data_offset,
- res.acl_len);
+ acl_len);
}
ret = acl_len;
out_free: | linux | 20e0fa98b751facf9a1101edaefbc19c82616a68 | 250f6715a4112d6686670c5a62ceb9305da94616 | 0 | static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
{
struct rpc_task *task;
int ret = 0;
if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0)
return 0;
task = _nfs41_proc_sequence(clp, cred);
if (IS_ERR(task))
ret = PTR_ERR(task);
else
rpc_put_task_async(task)... |
172,253 | null | Remote | Not required | null | CVE-2016-3837 | https://www.cvedetails.com/cve/CVE-2016-3837/ | CWE-200 | Medium | Partial | null | null | 2016-08-05 | 4.3 | service/jni/com_android_server_wifi_WifiNative.cpp in Wi-Fi in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows attackers to obtain sensitive information via a crafted application that provides a MAC address with too few characters, aka internal bug 28164077. | 2016-11-28 | +Info | 0 | https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399 | a209ff12ba9617c10550678ff93d01fb72a33399 | Deal correctly with short strings
The parseMacAddress function anticipates only properly formed
MAC addresses (6 hexadecimal octets separated by ":"). This
change properly deals with situations where the string is
shorter than expected, making sure that the passed in char*
reference in parseHexByte never exceeds the ... | 0 | service/jni/com_android_server_wifi_WifiNative.cpp | {"filename": "service/jni/com_android_server_wifi_WifiNative.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/service/jni/com_android_server_wifi_WifiNative.cpp", "patch": "@@ -697,15 +697,23 @@\n\n }\n \n static byte parseHexByte(const char ... | static jboolean android_net_wifi_get_fw_memory_dump(JNIEnv *env, jclass cls, jint iface){
JNIHelper helper(env);
wifi_interface_handle handle = getIfaceHandle(helper, cls, iface);
if (handle == NULL) {
ALOGE("Can not get wifi_interface_handle");
return false;
}
wifi_firmware_memory_dump_handler f... | static jboolean android_net_wifi_get_fw_memory_dump(JNIEnv *env, jclass cls, jint iface){
JNIHelper helper(env);
wifi_interface_handle handle = getIfaceHandle(helper, cls, iface);
if (handle == NULL) {
ALOGE("Can not get wifi_interface_handle");
return false;
}
wifi_firmware_memory_dump_handler f... | C | null | null | null | @@ -697,15 +697,23 @@
}
static byte parseHexByte(const char * &str) {
+ if (str[0] == '\0') {
+ ALOGE("Passed an empty string");
+ return 0;
+ }
byte b = parseHexChar(str[0]);
- if (str[1] == ':' || str[1] == '\0') {
- str += 2;
- return b;
+ if (str[1] == '\0' || str[1... | Android | https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399/ | https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a209ff12ba9617c10550678ff93d01fb72a33399%5E/ | 0 | static jboolean android_net_wifi_get_fw_memory_dump(JNIEnv *env, jclass cls, jint iface){
JNIHelper helper(env);
wifi_interface_handle handle = getIfaceHandle(helper, cls, iface);
// ALOGD("android_net_wifi_get_fw_memory_dump = %p", handle);
if (handle == NULL) {
ALOGE("Can not get wifi_interface_handl... |
147,234 | null | Remote | Not required | null | CVE-2017-5120 | https://www.cvedetails.com/cve/CVE-2017-5120/ | null | Medium | null | Partial | null | 2017-10-27 | 4.3 | Inappropriate use of www mismatch redirects in browser navigation in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially downgrade HTTPS requests to HTTP via a crafted HTML page. In other words, Chrome could transmit cleartext even thou... | 2019-10-02 | null | 0 | https://github.com/chromium/chromium/commit/b7277af490d28ac7f802c015bb0ff31395768556 | b7277af490d28ac7f802c015bb0ff31395768556 | bindings: Support "attribute FrozenArray<T>?"
Adds a quick hack to support a case of "attribute FrozenArray<T>?".
Bug: 1028047
Change-Id: Ib3cecc4beb6bcc0fb0dbc667aca595454cc90c86
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1933866
Reviewed-by: Hitoshi Yoshida <peria@chromium.org>
Commit-Qu... | 0 | third_party/blink/renderer/bindings/tests/results/core/v8_test_object.cc | {"sha": "e58cc6148f59f30b89a79cdb4626e3fec90229b9", "filename": "third_party/blink/renderer/bindings/scripts/v8_attributes.py", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/b7277af490d28ac7f802c015bb0ff31395768556/third_party/blink/renderer/b... | void V8TestObject::CSSAttributeAttributeGetterCallback(const v8::FunctionCallbackInfo<v8::Value>& info) {
RUNTIME_CALL_TIMER_SCOPE_DISABLED_BY_DEFAULT(info.GetIsolate(), "Blink_TestObject_cssAttribute_Getter");
test_object_v8_internal::CSSAttributeAttributeGetter(info);
}
| void V8TestObject::CSSAttributeAttributeGetterCallback(const v8::FunctionCallbackInfo<v8::Value>& info) {
RUNTIME_CALL_TIMER_SCOPE_DISABLED_BY_DEFAULT(info.GetIsolate(), "Blink_TestObject_cssAttribute_Getter");
test_object_v8_internal::CSSAttributeAttributeGetter(info);
}
| C | null | null | null | @@ -1387,12 +1387,13 @@ static void BooleanOrNullAttributeAttributeSetter(
ExceptionState exception_state(isolate, ExceptionState::kSetterContext, "TestObject", "booleanOrNullAttribute");
+ bool is_null = IsUndefinedOrNull(v8_value);
+
// Prepare the value to be set.
- bool cpp_value = NativeValueTraits<IDL... | Chrome | b7277af490d28ac7f802c015bb0ff31395768556 | bd20486aa79c853462458c065737a6815b5ea107 | 0 | void V8TestObject::CSSAttributeAttributeGetterCallback(const v8::FunctionCallbackInfo<v8::Value>& info) {
RUNTIME_CALL_TIMER_SCOPE_DISABLED_BY_DEFAULT(info.GetIsolate(), "Blink_TestObject_cssAttribute_Getter");
test_object_v8_internal::CSSAttributeAttributeGetter(info);
}
|
68,370 | null | Remote | Not required | Complete | CVE-2017-6001 | https://www.cvedetails.com/cve/CVE-2017-6001/ | CWE-362 | High | Complete | Complete | null | 2017-02-18 | 7.6 | Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786. | 2018-06-19 | +Priv | 0 | https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290 | 321027c1fe77f892f4ea07846aeae08cefbbb290 | perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
Di Shen reported a race between two concurrent sys_perf_event_open()
calls where both try and move the same pre-existing software group
into a hardware context.
The problem is exactly that described in commit:
f63a8daa5812 ("perf: Fix event->ctx... | 0 | kernel/events/core.c | {"sha": "cbc5937265da842bc714cbccf8091484caa5f536", "filename": "kernel/events/core.c", "status": "modified", "additions": 54, "deletions": 4, "changes": 58, "blob_url": "https://github.com/torvalds/linux/blob/321027c1fe77f892f4ea07846aeae08cefbbb290/kernel/events/core.c", "raw_url": "https://github.com/torvalds/linux/... | perf_event_output(struct perf_event *event,
struct perf_sample_data *data,
struct pt_regs *regs)
{
__perf_event_output(event, data, regs, perf_output_begin);
}
| perf_event_output(struct perf_event *event,
struct perf_sample_data *data,
struct pt_regs *regs)
{
__perf_event_output(event, data, regs, perf_output_begin);
}
| C | null | null | null | @@ -9529,6 +9529,37 @@ static int perf_event_set_clock(struct perf_event *event, clockid_t clk_id)
return 0;
}
+/*
+ * Variation on perf_event_ctx_lock_nested(), except we take two context
+ * mutexes.
+ */
+static struct perf_event_context *
+__perf_event_ctx_lock_double(struct perf_event *group_leader,
+ ... | linux | 321027c1fe77f892f4ea07846aeae08cefbbb290 | 63cae12bce9861cec309798d34701cf3da20bc71 | 0 | perf_event_output(struct perf_event *event,
struct perf_sample_data *data,
struct pt_regs *regs)
{
__perf_event_output(event, data, regs, perf_output_begin);
}
|
101,686 | null | Remote | Not required | Partial | CVE-2011-3896 | https://www.cvedetails.com/cve/CVE-2011-3896/ | CWE-119 | Low | Partial | Partial | null | 2011-11-11 | 7.5 | Buffer overflow in Google Chrome before 15.0.874.120 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to shader variable mapping. | 2017-09-18 | DoS Overflow | 0 | https://github.com/chromium/chromium/commit/5925dff83699508b5e2735afb0297dfb310e159d | 5925dff83699508b5e2735afb0297dfb310e159d | Implement a bubble that appears at the top of the screen when a tab enters
fullscreen mode via webkitRequestFullScreen(), telling the user how to exit
fullscreen.
This is implemented as an NSView rather than an NSWindow because the floating
chrome that appears in presentation mode should overlap the bubble.
Cont... | 0 | chrome/browser/ui/browser.cc | {"sha": "eade4b30911a73d266fca78ed5cd3870f3b12f08", "filename": "chrome/app/nibs/FullscreenExitBubble.xib", "status": "added", "additions": 1122, "deletions": 0, "changes": 1122, "blob_url": "https://github.com/chromium/chromium/blob/5925dff83699508b5e2735afb0297dfb310e159d/chrome/app/nibs/FullscreenExitBubble.xib", "r... | void Browser::Home(WindowOpenDisposition disposition) {
UserMetrics::RecordAction(UserMetricsAction("Home"));
OpenURL(GetHomePage(), GURL(), disposition,
PageTransition::AUTO_BOOKMARK | PageTransition::HOME_PAGE);
}
| void Browser::Home(WindowOpenDisposition disposition) {
UserMetrics::RecordAction(UserMetricsAction("Home"));
OpenURL(GetHomePage(), GURL(), disposition,
PageTransition::AUTO_BOOKMARK | PageTransition::HOME_PAGE);
}
| C | null | null | null | @@ -1314,7 +1314,13 @@ void Browser::WindowFullscreenStateChanged() {
MessageLoop::current()->PostTask(
FROM_HERE, method_factory_.NewRunnableMethod(
&Browser::NotifyFullscreenChange));
- if (!window_->IsFullscreen())
+ bool notify_tab_of_exit;
+#if defined(OS_MACOSX)
+ notify_tab_of_exit = !window_... | Chrome | 5925dff83699508b5e2735afb0297dfb310e159d | 66e1bd084a4818f624ee133f56163d0a71e472a3 | 0 | void Browser::Home(WindowOpenDisposition disposition) {
UserMetrics::RecordAction(UserMetricsAction("Home"));
OpenURL(GetHomePage(), GURL(), disposition,
PageTransition::AUTO_BOOKMARK | PageTransition::HOME_PAGE);
}
|
43,546 | null | Local | Not required | Complete | CVE-2015-3212 | https://www.cvedetails.com/cve/CVE-2015-3212/ | CWE-362 | Low | null | null | null | 2015-08-31 | 4.9 | Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls. | 2019-04-08 | DoS | 0 | https://github.com/torvalds/linux/commit/2d45a02d0166caf2627fe91897c6ffc3b19514c4 | 2d45a02d0166caf2627fe91897c6ffc3b19514c4 | sctp: fix ASCONF list handling
->auto_asconf_splist is per namespace and mangled by functions like
sctp_setsockopt_auto_asconf() which doesn't guarantee any serialization.
Also, the call to inet_sk_copy_descendant() was backuping
->auto_asconf_list through the copy but was not honoring
->do_auto_asconf, which could l... | 0 | net/sctp/socket.c | {"sha": "8ba379f9e4678d7f00209a6b2ac12d41d82f4b25", "filename": "include/net/netns/sctp.h", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/2d45a02d0166caf2627fe91897c6ffc3b19514c4/include/net/netns/sctp.h", "raw_url": "https://github.com/torvalds/... | static int sctp_getsockopt_peer_addrs(struct sock *sk, int len,
char __user *optval, int __user *optlen)
{
struct sctp_association *asoc;
int cnt = 0;
struct sctp_getaddrs getaddrs;
struct sctp_transport *from;
void __user *to;
union sctp_addr temp;
struct sctp_sock *sp = sctp_sk(sk);
int addrlen;
si... | static int sctp_getsockopt_peer_addrs(struct sock *sk, int len,
char __user *optval, int __user *optlen)
{
struct sctp_association *asoc;
int cnt = 0;
struct sctp_getaddrs getaddrs;
struct sctp_transport *from;
void __user *to;
union sctp_addr temp;
struct sctp_sock *sp = sctp_sk(sk);
int addrlen;
si... | C | null | null | null | @@ -1528,8 +1528,10 @@ static void sctp_close(struct sock *sk, long timeout)
/* Supposedly, no process has access to the socket, but
* the net layers still may.
+ * Also, sctp_destroy_sock() needs to be called with addr_wq_lock
+ * held and that should be grabbed before socket lock.
*/
- local_bh_disable();... | linux | 2d45a02d0166caf2627fe91897c6ffc3b19514c4 | c8d17b451aa18b07b60e771addf17a5fdd4138c7 | 0 | static int sctp_getsockopt_peer_addrs(struct sock *sk, int len,
char __user *optval, int __user *optlen)
{
struct sctp_association *asoc;
int cnt = 0;
struct sctp_getaddrs getaddrs;
struct sctp_transport *from;
void __user *to;
union sctp_addr temp;
struct sctp_sock *sp = sctp_sk(sk);
int addrlen;
si... |
143,105 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2016-07 | null | 0 | https://github.com/chromium/chromium/commit/8353baf8d1504dbdd4ad7584ff2466de657521cd | 8353baf8d1504dbdd4ad7584ff2466de657521cd | Remove WebFrame::canHaveSecureChild
To simplify the public API, ServiceWorkerNetworkProvider can do the
parent walk itself.
Follow-up to https://crrev.com/ad1850962644e19.
BUG=607543
Review-Url: https://codereview.chromium.org/2082493002
Cr-Commit-Position: refs/heads/master@{#400896} | 0 | content/child/service_worker/service_worker_network_provider.cc | {"sha": "5c883a0154ddb182d6ad680b5a4c77660f2b373f", "filename": "content/child/service_worker/service_worker_network_provider.cc", "status": "modified", "additions": 15, "deletions": 2, "changes": 17, "blob_url": "https://github.com/chromium/chromium/blob/8353baf8d1504dbdd4ad7584ff2466de657521cd/content/child/service_w... | ServiceWorkerNetworkProvider::ServiceWorkerNetworkProvider(
int route_id,
ServiceWorkerProviderType provider_type,
int browser_provider_id,
bool is_parent_frame_secure)
: provider_id_(browser_provider_id) {
if (provider_id_ == kInvalidServiceWorkerProviderId)
return;
if (!ChildThreadImpl::cu... | ServiceWorkerNetworkProvider::ServiceWorkerNetworkProvider(
int route_id,
ServiceWorkerProviderType provider_type,
int browser_provider_id,
bool is_parent_frame_secure)
: provider_id_(browser_provider_id) {
if (provider_id_ == kInvalidServiceWorkerProviderId)
return;
if (!ChildThreadImpl::cu... | C | null | null | null | @@ -11,6 +11,7 @@
#include "content/common/service_worker/service_worker_messages.h"
#include "content/common/service_worker/service_worker_utils.h"
#include "content/public/common/browser_side_navigation_policy.h"
+#include "third_party/WebKit/public/platform/WebSecurityOrigin.h"
#include "third_party/WebKit/publi... | Chrome | 8353baf8d1504dbdd4ad7584ff2466de657521cd | 04817566fb446d8315cbc4049266c4859a010a74 | 0 | ServiceWorkerNetworkProvider::ServiceWorkerNetworkProvider(
int route_id,
ServiceWorkerProviderType provider_type,
int browser_provider_id,
bool is_parent_frame_secure)
: provider_id_(browser_provider_id) {
if (provider_id_ == kInvalidServiceWorkerProviderId)
return;
if (!ChildThreadImpl::cu... |
170,835 | null | Remote | Not required | Complete | CVE-2015-1536 | https://www.cvedetails.com/cve/CVE-2015-1536/ | CWE-189 | Low | Partial | null | null | 2015-09-30 | 8.5 | Integer overflow in the Bitmap_createFromParcel function in core/jni/android/graphics/Bitmap.cpp in Android before 5.1.1 LMY48I allows attackers to cause a denial of service (system_server crash) or obtain sensitive system_server memory-content information via a crafted application that leverages improper unmarshalling... | 2015-10-01 | DoS Overflow +Info | 0 | https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb | d44e5bde18a41beda39d49189bef7f2ba7c8f3cb | Make Bitmap_createFromParcel check the color count. DO NOT MERGE
When reading from the parcel, if the number of colors is invalid, early
exit.
Add two more checks: setInfo must return true, and Parcel::readInplace
must return non-NULL. The former ensures that the previously read values
(width, height, etc) were valid... | 0 | core/jni/android/graphics/Bitmap.cpp | {"filename": "core/jni/android/graphics/Bitmap.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb/core/jni/android/graphics/Bitmap.cpp", "patch": "@@ -575,24 +575,33 @@\n\n return NULL;\n }\n \n- SkBitmap* bitmap = new SkBitmap;\n+ Sk... | static void ToColor_S565(SkColor dst[], const void* src, int width,
SkColorTable*) {
SkASSERT(width > 0);
const uint16_t* s = (const uint16_t*)src;
do {
uint16_t c = *s++;
*dst++ = SkColorSetRGB(SkPacked16ToR32(c), SkPacked16ToG32(c),
SkPacked16ToB32(c));
} while (--width != 0);
}
| static void ToColor_S565(SkColor dst[], const void* src, int width,
SkColorTable*) {
SkASSERT(width > 0);
const uint16_t* s = (const uint16_t*)src;
do {
uint16_t c = *s++;
*dst++ = SkColorSetRGB(SkPacked16ToR32(c), SkPacked16ToG32(c),
SkPacked16ToB32(c));
} while (--width != 0);
}
| C | null | null | null | @@ -575,24 +575,33 @@
return NULL;
}
- SkBitmap* bitmap = new SkBitmap;
+ SkAutoTDelete<SkBitmap> bitmap(new SkBitmap);
- bitmap->setInfo(SkImageInfo::Make(width, height, colorType, alphaType), rowBytes);
+ if (!bitmap->setInfo(SkImageInfo::Make(width, height, colorType, alphaType), rowBy... | Android | https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb/ | https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb%5E/ | 0 | static void ToColor_S565(SkColor dst[], const void* src, int width,
SkColorTable*) {
SkASSERT(width > 0);
const uint16_t* s = (const uint16_t*)src;
do {
uint16_t c = *s++;
*dst++ = SkColorSetRGB(SkPacked16ToR32(c), SkPacked16ToG32(c),
SkPacked16ToB32(c));
} while (--width != 0);
}
|
70,314 | null | Remote | Not required | Partial | CVE-2016-10267 | https://www.cvedetails.com/cve/CVE-2016-10267/ | CWE-369 | Medium | null | null | null | 2017-03-24 | 4.3 | LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8. | 2018-03-21 | DoS | 0 | https://github.com/vadz/libtiff/commit/43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec | 43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec | * libtiff/tif_ojpeg.c: make OJPEGDecode() early exit in case of failure in
OJPEGPreDecode(). This will avoid a divide by zero, and potential other issues.
Reported by Agostino Sarubbo.
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611 | 0 | libtiff/tif_ojpeg.c | {"sha": "5b23665b1730e31dea0f6ca7e1fb403612a973d6", "filename": "ChangeLog", "status": "modified", "additions": 7, "deletions": 0, "changes": 7, "blob_url": "https://github.com/vadz/libtiff/blob/43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec/ChangeLog", "raw_url": "https://github.com/vadz/libtiff/raw/43bc256d8ae44b92d2734a3c... | OJPEGWriteStreamAcTable(TIFF* tif, uint8 table_index, void** mem, uint32* len)
{
OJPEGState* sp=(OJPEGState*)tif->tif_data;
if (sp->actable[table_index]!=0)
{
*mem=(void*)(sp->actable[table_index]+sizeof(uint32));
*len=*((uint32*)sp->actable[table_index])-sizeof(uint32);
}
sp->out_state++;
}
| OJPEGWriteStreamAcTable(TIFF* tif, uint8 table_index, void** mem, uint32* len)
{
OJPEGState* sp=(OJPEGState*)tif->tif_data;
if (sp->actable[table_index]!=0)
{
*mem=(void*)(sp->actable[table_index]+sizeof(uint32));
*len=*((uint32*)sp->actable[table_index])-sizeof(uint32);
}
sp->out_state++;
}
| C | null | null | null | @@ -244,6 +244,7 @@ typedef enum {
typedef struct {
TIFF* tif;
+ int decoder_ok;
#ifndef LIBJPEG_ENCAP_EXTERNAL
JMP_BUF exit_jmpbuf;
#endif
@@ -722,6 +723,7 @@ OJPEGPreDecode(TIFF* tif, uint16 s)
}
sp->write_curstrile++;
}
+ sp->decoder_ok = 1;
return(1);
}
@@ -784,8 +786,14 @@ OJPEGPreDe... | libtiff | 43bc256d8ae44b92d2734a3c5bc73957a4d7c1ec | 9a72a69e035ee70ff5c41541c8c61cd97990d018 | 0 | OJPEGWriteStreamAcTable(TIFF* tif, uint8 table_index, void** mem, uint32* len)
{
OJPEGState* sp=(OJPEGState*)tif->tif_data;
if (sp->actable[table_index]!=0)
{
*mem=(void*)(sp->actable[table_index]+sizeof(uint32));
*len=*((uint32*)sp->actable[table_index])-sizeof(uint32);
}
sp->out_state++;
}
|
147,807 | null | Remote | Not required | null | CVE-2017-5120 | https://www.cvedetails.com/cve/CVE-2017-5120/ | null | Medium | null | Partial | null | 2017-10-27 | 4.3 | Inappropriate use of www mismatch redirects in browser navigation in Google Chrome prior to 61.0.3163.79 for Mac, Windows, and Linux, and 61.0.3163.81 for Android, allowed a remote attacker to potentially downgrade HTTPS requests to HTTP via a crafted HTML page. In other words, Chrome could transmit cleartext even thou... | 2019-10-02 | null | 0 | https://github.com/chromium/chromium/commit/b7277af490d28ac7f802c015bb0ff31395768556 | b7277af490d28ac7f802c015bb0ff31395768556 | bindings: Support "attribute FrozenArray<T>?"
Adds a quick hack to support a case of "attribute FrozenArray<T>?".
Bug: 1028047
Change-Id: Ib3cecc4beb6bcc0fb0dbc667aca595454cc90c86
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1933866
Reviewed-by: Hitoshi Yoshida <peria@chromium.org>
Commit-Qu... | 0 | third_party/blink/renderer/bindings/tests/results/core/v8_test_object.cc | {"sha": "e58cc6148f59f30b89a79cdb4626e3fec90229b9", "filename": "third_party/blink/renderer/bindings/scripts/v8_attributes.py", "status": "modified", "additions": 2, "deletions": 1, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/b7277af490d28ac7f802c015bb0ff31395768556/third_party/blink/renderer/b... | static void RuntimeEnabledOverloadedVoidMethod1Method(const v8::FunctionCallbackInfo<v8::Value>& info) {
TestObject* impl = V8TestObject::ToImpl(info.Holder());
V8StringResource<> string_arg;
string_arg = info[0];
if (!string_arg.Prepare())
return;
impl->runtimeEnabledOverloadedVoidMethod(string_arg);
}... | static void RuntimeEnabledOverloadedVoidMethod1Method(const v8::FunctionCallbackInfo<v8::Value>& info) {
TestObject* impl = V8TestObject::ToImpl(info.Holder());
V8StringResource<> string_arg;
string_arg = info[0];
if (!string_arg.Prepare())
return;
impl->runtimeEnabledOverloadedVoidMethod(string_arg);
}... | C | null | null | null | @@ -1387,12 +1387,13 @@ static void BooleanOrNullAttributeAttributeSetter(
ExceptionState exception_state(isolate, ExceptionState::kSetterContext, "TestObject", "booleanOrNullAttribute");
+ bool is_null = IsUndefinedOrNull(v8_value);
+
// Prepare the value to be set.
- bool cpp_value = NativeValueTraits<IDL... | Chrome | b7277af490d28ac7f802c015bb0ff31395768556 | bd20486aa79c853462458c065737a6815b5ea107 | 0 | static void RuntimeEnabledOverloadedVoidMethod1Method(const v8::FunctionCallbackInfo<v8::Value>& info) {
TestObject* impl = V8TestObject::ToImpl(info.Holder());
V8StringResource<> string_arg;
string_arg = info[0];
if (!string_arg.Prepare())
return;
impl->runtimeEnabledOverloadedVoidMethod(string_arg);
}... |
70,969 | null | Remote | Not required | Partial | CVE-2016-10165 | https://www.cvedetails.com/cve/CVE-2016-10165/ | CWE-125 | Medium | Partial | null | null | 2017-02-03 | 5.8 | The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read. | 2018-10-30 | DoS +Info | 0 | https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2 | 5ca71a7bc18b6897ab21d815d15e218e204581e2 | Added an extra check to MLU bounds
Thanks to Ibrahim el-sayed for spotting the bug | 0 | src/cmstypes.c | {"sha": "c7328b9999826069e919f57bed4fef69210e5173", "filename": "src/cmstypes.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/mm2/Little-CMS/blob/5ca71a7bc18b6897ab21d815d15e218e204581e2/src/cmstypes.c", "raw_url": "https://github.com/mm2/Little-CMS/raw/5ca71a7bc1... | void Type_ColorantOrderType_Free(struct _cms_typehandler_struct* self, void* Ptr)
{
_cmsFree(self ->ContextID, Ptr);
}
| void Type_ColorantOrderType_Free(struct _cms_typehandler_struct* self, void* Ptr)
{
_cmsFree(self ->ContextID, Ptr);
}
| C | null | null | null | @@ -1460,6 +1460,7 @@ void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsU
// Check for overflow
if (Offset < (SizeOfHeader + 8)) goto Error;
+ if ((Offset + Len) > SizeOfTag + 8) goto Error;
// True begin of the string
BeginOfThisString = Offse... | Little-CMS | 5ca71a7bc18b6897ab21d815d15e218e204581e2 | 696d6b171fd8c270aeaa2cd1a69f6211426fd6b1 | 0 | void Type_ColorantOrderType_Free(struct _cms_typehandler_struct* self, void* Ptr)
{
_cmsFree(self ->ContextID, Ptr);
}
|
110,775 | null | Remote | Not required | Partial | CVE-2012-2875 | https://www.cvedetails.com/cve/CVE-2012-2875/ | null | Medium | Partial | Partial | null | 2012-09-26 | 6.8 | Multiple unspecified vulnerabilities in the PDF functionality in Google Chrome before 22.0.1229.79 allow remote attackers to have an unknown impact via a crafted document. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/0e9e87823285d504a210dcce2eabdc847f230f09 | 0e9e87823285d504a210dcce2eabdc847f230f09 | Adds per-provider information to omnibox UMA logs.
Adds a fairly general structure to omnibox logs that can be used to pass information (that's not per-result information) from providers to the UMA logs. Right now it's only used to pass whether the asynchronous pass of a provider has finished, but it will probably be... | 0 | chrome/browser/autocomplete/autocomplete_edit.cc | {"sha": "d646a2f54f1a98d22adb0561e73247de7d05f4a5", "filename": "chrome/browser/autocomplete/autocomplete.cc", "status": "modified", "additions": 46, "deletions": 1, "changes": 47, "blob_url": "https://github.com/chromium/chromium/blob/0e9e87823285d504a210dcce2eabdc847f230f09/chrome/browser/autocomplete/autocomplete.cc... | AutocompleteEditModel::ClassifyPage(const GURL& gurl) const {
if (!gurl.is_valid())
return metrics::OmniboxEventProto_PageClassification_INVALID_SPEC;
const std::string& url = gurl.spec();
if (url == chrome::kChromeUINewTabURL)
return metrics::OmniboxEventProto_PageClassification_NEW_TAB_PAGE;
if (u... | AutocompleteEditModel::ClassifyPage(const GURL& gurl) const {
if (!gurl.is_valid())
return metrics::OmniboxEventProto_PageClassification_INVALID_SPEC;
const std::string& url = gurl.spec();
if (url == chrome::kChromeUINewTabURL)
return metrics::OmniboxEventProto_PageClassification_NEW_TAB_PAGE;
if (u... | C | null | null | null | @@ -539,6 +539,7 @@ void AutocompleteEditModel::OpenMatch(const AutocompleteMatch& match,
log.tab_id = controller_->GetTabContentsWrapper()->
restore_tab_helper()->session_id().id();
}
+ autocomplete_controller_->AddProvidersInfo(&log.providers_info);
content::NotificationService::current... | Chrome | 0e9e87823285d504a210dcce2eabdc847f230f09 | ace4a123275eba3934dc1b1b7c2d8dc859d2e07a | 0 | AutocompleteEditModel::ClassifyPage(const GURL& gurl) const {
if (!gurl.is_valid())
return metrics::OmniboxEventProto_PageClassification_INVALID_SPEC;
const std::string& url = gurl.spec();
if (url == chrome::kChromeUINewTabURL)
return metrics::OmniboxEventProto_PageClassification_NEW_TAB_PAGE;
if (u... |
63,768 | null | Remote | Not required | Partial | CVE-2017-10807 | https://www.cvedetails.com/cve/CVE-2017-10807/ | CWE-287 | Low | Partial | Partial | null | 2017-07-04 | 7.5 | JabberD 2.x (aka jabberd2) before 2.6.1 allows anyone to authenticate using SASL ANONYMOUS, even when the sasl.anonymous c2s.xml option is not enabled. | 2017-11-03 | null | 0 | https://github.com/jabberd2/jabberd2/commit/8416ae54ecefa670534f27a31db71d048b9c7f16 | 8416ae54ecefa670534f27a31db71d048b9c7f16 | Fixed offered SASL mechanism check | 0 | sx/sasl.c | {"sha": "7972c5474f8eed00a529fb2c94d025a0cc1ab43b", "filename": "c2s/main.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/jabberd2/jabberd2/blob/8416ae54ecefa670534f27a31db71d048b9c7f16/c2s/main.c", "raw_url": "https://github.com/jabberd2/jabberd2/raw/8416ae54ecef... | static nad_t _sx_sasl_challenge(sx_t s, const char *data, int dlen) {
nad_t nad;
int ns;
nad = nad_new();
ns = nad_add_namespace(nad, uri_SASL, NULL);
nad_append_elem(nad, ns, "challenge", 0);
if(data != NULL)
nad_append_cdata(nad, data, dlen, 1);
return nad;
}
| static nad_t _sx_sasl_challenge(sx_t s, const char *data, int dlen) {
nad_t nad;
int ns;
nad = nad_new();
ns = nad_add_namespace(nad, uri_SASL, NULL);
nad_append_elem(nad, ns, "challenge", 0);
if(data != NULL)
nad_append_cdata(nad, data, dlen, 1);
return nad;
}
| C | null | null | null | @@ -332,7 +332,7 @@ static void _sx_sasl_client_process(sx_t s, sx_plugin_t p, Gsasl_session *sd, co
if(mech != NULL) {
_sx_debug(ZONE, "auth request from client (mechanism=%s)", mech);
- if(!gsasl_server_support_p(ctx->gsasl_ctx, mech)) {
+ if(!gsasl_server_support_p(ctx->gsasl_ctx, mech)... | jabberd2 | 8416ae54ecefa670534f27a31db71d048b9c7f16 | e5c5518701e270070f974e5a9f5dc72ad9679e2e | 0 | static nad_t _sx_sasl_challenge(sx_t s, const char *data, int dlen) {
nad_t nad;
int ns;
nad = nad_new();
ns = nad_add_namespace(nad, uri_SASL, NULL);
nad_append_elem(nad, ns, "challenge", 0);
if(data != NULL)
nad_append_cdata(nad, data, dlen, 1);
return nad;
}
|
98,020 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2010-10 | null | 0 | https://github.com/chromium/chromium/commit/5041f984669fe3a989a84c348eb838c8f7233f6b | 5041f984669fe3a989a84c348eb838c8f7233f6b | AutoFill: Release the cached frame when we receive the frameDestroyed() message
from WebKit.
BUG=48857
TEST=none
Review URL: http://codereview.chromium.org/3173005
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@55789 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | chrome/renderer/render_view.cc | {"sha": "c1f5e65e2fce7f24461a62827a343d3f1ffb96bf", "filename": "chrome/renderer/autofill_helper.cc", "status": "modified", "additions": 4, "deletions": 0, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/5041f984669fe3a989a84c348eb838c8f7233f6b/chrome/renderer/autofill_helper.cc", "raw_url": "https... | RenderView::RenderView(RenderThreadBase* render_thread,
const WebPreferences& webkit_preferences,
int64 session_storage_namespace_id)
: RenderWidget(render_thread, WebKit::WebPopupTypeNone),
webkit_preferences_(webkit_preferences),
send_content_state_immedia... | RenderView::RenderView(RenderThreadBase* render_thread,
const WebPreferences& webkit_preferences,
int64 session_storage_namespace_id)
: RenderWidget(render_thread, WebKit::WebPopupTypeNone),
webkit_preferences_(webkit_preferences),
send_content_state_immedia... | C | null | null | null | @@ -2393,6 +2393,10 @@ WebCookieJar* RenderView::cookieJar() {
return &cookie_jar_;
}
+void RenderView::frameDetached(WebFrame* frame) {
+ autofill_helper_.FrameDetached(frame);
+}
+
void RenderView::willClose(WebFrame* frame) {
if (!frame->parent()) {
const GURL& url = frame->url();
@@ -2404,6 +2408,7 ... | Chrome | 5041f984669fe3a989a84c348eb838c8f7233f6b | 64fd176302087ad4de3d88770cf948479a1e9852 | 0 | RenderView::RenderView(RenderThreadBase* render_thread,
const WebPreferences& webkit_preferences,
int64 session_storage_namespace_id)
: RenderWidget(render_thread, WebKit::WebPopupTypeNone),
webkit_preferences_(webkit_preferences),
send_content_state_immedia... |
32,524 | null | Local | Not required | Partial | CVE-2013-1929 | https://www.cvedetails.com/cve/CVE-2013-1929/ | CWE-119 | Medium | Partial | Partial | null | 2013-06-07 | 4.4 | Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data... | 2014-01-03 | DoS Exec Code Overflow | 0 | https://github.com/torvalds/linux/commit/715230a44310a8cf66fbfb5a46f9a62a9b2de424 | 715230a44310a8cf66fbfb5a46f9a62a9b2de424 | tg3: fix length overflow in VPD firmware parsing
Commit 184b89044fb6e2a74611dafa69b1dce0d98612c6 ("tg3: Use VPD fw version
when present") introduced VPD parsing that contained a potential length
overflow.
Limit the hardware's reported firmware string length (max 255 bytes) to
stay inside the driver's firmware string ... | 0 | drivers/net/ethernet/broadcom/tg3.c | {"sha": "17a972734ba746d9218df4bf025218a91ebee947", "filename": "drivers/net/ethernet/broadcom/tg3.c", "status": "modified", "additions": 5, "deletions": 2, "changes": 7, "blob_url": "https://github.com/torvalds/linux/blob/715230a44310a8cf66fbfb5a46f9a62a9b2de424/drivers/net/ethernet/broadcom/tg3.c", "raw_url": "https:... | static int tg3_do_test_dma(struct tg3 *tp, u32 *buf, dma_addr_t buf_dma,
int size, int to_device)
{
struct tg3_internal_buffer_desc test_desc;
u32 sram_dma_descs;
int i, ret;
sram_dma_descs = NIC_SRAM_DMA_DESC_POOL_BASE;
tw32(FTQ_RCVBD_COMP_FIFO_ENQDEQ, 0);
tw32(FTQ_RCVDATA_COMP_FIFO_ENQDEQ, 0);
tw32(RDM... | static int tg3_do_test_dma(struct tg3 *tp, u32 *buf, dma_addr_t buf_dma,
int size, int to_device)
{
struct tg3_internal_buffer_desc test_desc;
u32 sram_dma_descs;
int i, ret;
sram_dma_descs = NIC_SRAM_DMA_DESC_POOL_BASE;
tw32(FTQ_RCVBD_COMP_FIFO_ENQDEQ, 0);
tw32(FTQ_RCVDATA_COMP_FIFO_ENQDEQ, 0);
tw32(RDM... | C | null | null | null | @@ -14604,8 +14604,11 @@ static void tg3_read_vpd(struct tg3 *tp)
if (j + len > block_end)
goto partno;
- memcpy(tp->fw_ver, &vpd_data[j], len);
- strncat(tp->fw_ver, " bc ", vpdlen - len - 1);
+ if (len >= sizeof(tp->fw_ver))
+ len = sizeof(tp->fw_ver) - 1;
+ memset(tp->fw_ver, 0, sizeof(tp->fw_ver));
+... | linux | 715230a44310a8cf66fbfb5a46f9a62a9b2de424 | ea872d7712528ad991bdabb63515bc00ee10993e | 0 | static int tg3_do_test_dma(struct tg3 *tp, u32 *buf, dma_addr_t buf_dma,
int size, int to_device)
{
struct tg3_internal_buffer_desc test_desc;
u32 sram_dma_descs;
int i, ret;
sram_dma_descs = NIC_SRAM_DMA_DESC_POOL_BASE;
tw32(FTQ_RCVBD_COMP_FIFO_ENQDEQ, 0);
tw32(FTQ_RCVDATA_COMP_FIFO_ENQDEQ, 0);
tw32(RDM... |
21,235 | null | Local Network | Single system | Complete | CVE-2012-1179 | https://www.cvedetails.com/cve/CVE-2012-1179/ | CWE-264 | Medium | null | null | null | 2012-05-17 | 5.2 | The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial of service (host OS crash) by leveraging administrative access to the guest OS, related to the pmd_none_or_clear_bad function and page faults for huge pages. | 2017-12-28 | DoS | 0 | https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850 | 4a1d704194a441bf83c636004a479e01360ec850 | mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode
commit 1a5a9906d4e8d1976b701f889d8f35d54b928f25 upstream.
In some cases it may happen that pmd_none_or_clear_bad() is called with
the mmap_sem hold in read mode. In those cases the huge page faults can
allocate hugepmds under pmd_none_or_clea... | 0 | mm/memory.c | {"sha": "328cb37bb827915ccc3e87cc6518acd7ccf25686", "filename": "arch/x86/kernel/vm86_32.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/4a1d704194a441bf83c636004a479e01360ec850/arch/x86/kernel/vm86_32.c", "raw_url": "https://github.com/torvald... | int generic_access_phys(struct vm_area_struct *vma, unsigned long addr,
void *buf, int len, int write)
{
resource_size_t phys_addr;
unsigned long prot = 0;
void __iomem *maddr;
int offset = addr & (PAGE_SIZE-1);
if (follow_phys(vma, addr, write, &prot, &phys_addr))
return -EINVAL;
maddr = ioremap_prot(phys... | int generic_access_phys(struct vm_area_struct *vma, unsigned long addr,
void *buf, int len, int write)
{
resource_size_t phys_addr;
unsigned long prot = 0;
void __iomem *maddr;
int offset = addr & (PAGE_SIZE-1);
if (follow_phys(vma, addr, write, &prot, &phys_addr))
return -EINVAL;
maddr = ioremap_prot(phys... | C | null | null | null | @@ -1247,16 +1247,24 @@ static inline unsigned long zap_pmd_range(struct mmu_gather *tlb,
do {
next = pmd_addr_end(addr, end);
if (pmd_trans_huge(*pmd)) {
- if (next-addr != HPAGE_PMD_SIZE) {
+ if (next - addr != HPAGE_PMD_SIZE) {
VM_BUG_ON(!rwsem_is_locked(&tlb->mm->mmap_sem));
split_huge_page_pm... | linux | 4a1d704194a441bf83c636004a479e01360ec850 | a998dc2fa76f496d2944f0602b920d1d10d7467d | 0 | int generic_access_phys(struct vm_area_struct *vma, unsigned long addr,
void *buf, int len, int write)
{
resource_size_t phys_addr;
unsigned long prot = 0;
void __iomem *maddr;
int offset = addr & (PAGE_SIZE-1);
if (follow_phys(vma, addr, write, &prot, &phys_addr))
return -EINVAL;
maddr = ioremap_prot(phys... |
156,573 | null | Remote | Not required | null | CVE-2018-18346 | https://www.cvedetails.com/cve/CVE-2018-18346/ | CWE-20 | Medium | null | Partial | null | 2018-12-11 | 4.3 | Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page. | 2019-08-17 | null | 0 | https://github.com/chromium/chromium/commit/9004be20a4cfde70456579489258c3aca4ed45a4 | 9004be20a4cfde70456579489258c3aca4ed45a4 | Add trace event to sync_sessions::OnReadAllMetadata()
It is likely a cause of janks on UI thread on Android.
Add a trace event to get metrics about the duration.
BUG=902203
Change-Id: I4c4e9c2a20790264b982007ea7ee88ddfa7b972c
Reviewed-on: https://chromium-review.googlesource.com/c/1319369
Reviewed-by: Mikel Astiz <m... | 0 | components/sync_sessions/session_store.cc | {"sha": "300f40f91e2d69ec124e8c228d04ee6e9a7fc867", "filename": "components/sync_sessions/session_store.cc", "status": "modified", "additions": 3, "deletions": 0, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/9004be20a4cfde70456579489258c3aca4ed45a4/components/sync_sessions/session_store.cc", "ra... | bool SessionStore::AreValidSpecifics(const SessionSpecifics& specifics) {
if (specifics.session_tag().empty()) {
return false;
}
if (specifics.has_tab()) {
return specifics.tab_node_id() >= 0 && specifics.tab().tab_id() > 0;
}
if (specifics.has_header()) {
std::set<int> session_tab_ids;
for (c... | bool SessionStore::AreValidSpecifics(const SessionSpecifics& specifics) {
if (specifics.session_tag().empty()) {
return false;
}
if (specifics.has_tab()) {
return specifics.tab_node_id() >= 0 && specifics.tab().tab_id() > 0;
}
if (specifics.has_header()) {
std::set<int> session_tab_ids;
for (c... | C | null | null | null | @@ -16,6 +16,7 @@
#include "base/metrics/histogram_macros.h"
#include "base/pickle.h"
#include "base/strings/stringprintf.h"
+#include "base/trace_event/trace_event.h"
#include "components/sync/base/time.h"
#include "components/sync/device_info/device_info.h"
#include "components/sync/device_info/device_info_util... | Chrome | 9004be20a4cfde70456579489258c3aca4ed45a4 | ce6ad323cd9aa0c49aa7245fe942dc5b9a91e421 | 0 | bool SessionStore::AreValidSpecifics(const SessionSpecifics& specifics) {
if (specifics.session_tag().empty()) {
return false;
}
if (specifics.has_tab()) {
return specifics.tab_node_id() >= 0 && specifics.tab().tab_id() > 0;
}
if (specifics.has_header()) {
// Verify that tab IDs appear only once w... |
19,408 | null | Remote | Not required | Complete | CVE-2012-3412 | https://www.cvedetails.com/cve/CVE-2012-3412/ | CWE-189 | Low | null | null | null | 2012-10-03 | 7.8 | The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value. | 2013-08-17 | DoS | 0 | https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c | 68cb695ccecf949d48949e72f8ce591fdaaa325c | sfc: Fix maximum number of TSO segments and minimum TX queue size
[ Upstream commit 7e6d06f0de3f74ca929441add094518ae332257c ]
Currently an skb requiring TSO may not fit within a minimum-size TX
queue. The TX queue selected for the skb may stall and trigger the TX
watchdog repeatedly (since the problem skb will be r... | 0 | drivers/net/ethernet/sfc/efx.c | {"sha": "a6611f1c48f90fcaa0d83ff1532cdc5cbbbf7acb", "filename": "drivers/net/ethernet/sfc/efx.c", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/68cb695ccecf949d48949e72f8ce591fdaaa325c/drivers/net/ethernet/sfc/efx.c", "raw_url": "https://github.c... | static int efx_probe_channels(struct efx_nic *efx)
{
struct efx_channel *channel;
int rc;
/* Restart special buffer allocation */
efx->next_buffer_table = 0;
efx_for_each_channel(channel, efx) {
rc = efx_probe_channel(channel);
if (rc) {
netif_err(efx, probe, efx->net_dev,
"failed to create channel ... | static int efx_probe_channels(struct efx_nic *efx)
{
struct efx_channel *channel;
int rc;
/* Restart special buffer allocation */
efx->next_buffer_table = 0;
efx_for_each_channel(channel, efx) {
rc = efx_probe_channel(channel);
if (rc) {
netif_err(efx, probe, efx->net_dev,
"failed to create channel ... | C | null | null | null | @@ -1383,6 +1383,11 @@ static int efx_probe_all(struct efx_nic *efx)
goto fail2;
}
+ BUILD_BUG_ON(EFX_DEFAULT_DMAQ_SIZE < EFX_RXQ_MIN_ENT);
+ if (WARN_ON(EFX_DEFAULT_DMAQ_SIZE < EFX_TXQ_MIN_ENT(efx))) {
+ rc = -EINVAL;
+ goto fail3;
+ }
efx->rxq_entries = efx->txq_entries = EFX_DEFAULT_DMAQ_SIZE;
rc = efx_... | linux | 68cb695ccecf949d48949e72f8ce591fdaaa325c | 99ea81edff2135603588fe12bd95cca2dd76a5cb | 0 | static int efx_probe_channels(struct efx_nic *efx)
{
struct efx_channel *channel;
int rc;
/* Restart special buffer allocation */
efx->next_buffer_table = 0;
efx_for_each_channel(channel, efx) {
rc = efx_probe_channel(channel);
if (rc) {
netif_err(efx, probe, efx->net_dev,
"failed to create channel ... |
78,607 | null | Local | Not required | Partial | CVE-2018-16427 | https://www.cvedetails.com/cve/CVE-2018-16427/ | CWE-125 | Low | null | null | null | 2018-09-03 | 2.1 | Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs. | 2019-08-06 | null | 0 | https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa | 8fe377e93b4b56060e5bbfb6f3142ceaeca744fa | fixed out of bounds reads
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting and suggesting security fixes. | 0 | src/libopensc/card-openpgp.c | {"sha": "e43c0f13620dd8328fc88f81a476ce91869ed952", "filename": "src/libopensc/asn1.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/OpenSC/OpenSC/blob/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa/src/libopensc/asn1.c", "raw_url": "https://github.com/OpenSC/OpenSC/raw/... | pgp_seek_blob(sc_card_t *card, pgp_blob_t *root, unsigned int id,
pgp_blob_t **ret)
{
pgp_blob_t *child;
int r;
if ((r = pgp_get_blob(card, root, id, ret)) == 0)
/* the sought blob is right under root */
return r;
/* not found, seek deeper */
for (child = root->files; child; child = child->next) {
/* T... | pgp_seek_blob(sc_card_t *card, pgp_blob_t *root, unsigned int id,
pgp_blob_t **ret)
{
pgp_blob_t *child;
int r;
if ((r = pgp_get_blob(card, root, id, ret)) == 0)
/* the sought blob is right under root */
return r;
/* not found, seek deeper */
for (child = root->files; child; child = child->next) {
/* T... | C | null | null | null | @@ -1061,6 +1061,9 @@ pgp_enumerate_blob(sc_card_t *card, pgp_blob_t *blob)
const u8 *data = in;
pgp_blob_t *new;
+ if (!in)
+ return SC_ERROR_OBJECT_NOT_VALID;
+
r = sc_asn1_read_tag(&data, blob->len - (in - blob->data),
&cla, &tag, &len);
if (r < 0 || data == NULL) {
@@ -1069,6 +1072,9 @@ pgp_e... | OpenSC | 8fe377e93b4b56060e5bbfb6f3142ceaeca744fa | f66ceab4bbc3cae529a22b5f3688076cc119bd7c | 0 | pgp_seek_blob(sc_card_t *card, pgp_blob_t *root, unsigned int id,
pgp_blob_t **ret)
{
pgp_blob_t *child;
int r;
if ((r = pgp_get_blob(card, root, id, ret)) == 0)
/* the sought blob is right under root */
return r;
/* not found, seek deeper */
for (child = root->files; child; child = child->next) {
/* T... |
181,081 | null | Remote | Not required | Partial | CVE-2017-12998 | https://www.cvedetails.com/cve/CVE-2017-12998/ | CWE-125 | Low | Partial | Partial | null | 2017-09-14 | 7.5 | The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach(). | 2019-10-02 | null | 1 | https://github.com/the-tcpdump-group/tcpdump/commit/979dcefd7b259e9e233f77fe1c5312793bfd948f | 979dcefd7b259e9e233f77fe1c5312793bfd948f | CVE-2017-12998/IS-IS: Check for 2 bytes if we're going to fetch 2 bytes.
Probably a copy-and-pasteo.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 1 | print-isoclns.c | {"sha": "1f871603a4babf241ae29cc0ca086e32515762c2", "filename": "print-isoclns.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/the-tcpdump-group/tcpdump/blob/979dcefd7b259e9e233f77fe1c5312793bfd948f/print-isoclns.c", "raw_url": "https://github.com/the-tcpdump-grou... | isis_print_extd_ip_reach(netdissect_options *ndo,
const uint8_t *tptr, const char *ident, uint16_t afi)
{
char ident_buffer[20];
uint8_t prefix[sizeof(struct in6_addr)]; /* shared copy buffer for IPv4 and IPv6 prefixes */
u_int metric, status_byte, bit_length, byte_length, sublen, p... | isis_print_extd_ip_reach(netdissect_options *ndo,
const uint8_t *tptr, const char *ident, uint16_t afi)
{
char ident_buffer[20];
uint8_t prefix[sizeof(struct in6_addr)]; /* shared copy buffer for IPv4 and IPv6 prefixes */
u_int metric, status_byte, bit_length, byte_length, sublen, p... | C | if (!ND_TTEST2(*tptr, 2)) /* fetch status & prefix_len byte */
| if (!ND_TTEST2(*tptr, 1)) /* fetch status & prefix_len byte */
| null | @@ -2038,7 +2038,7 @@ isis_print_extd_ip_reach(netdissect_options *ndo,
}
processed++;
} else if (afi == AF_INET6) {
- if (!ND_TTEST2(*tptr, 1)) /* fetch status & prefix_len byte */
+ if (!ND_TTEST2(*tptr, 2)) /* fetch status & prefix_len byte */
return (0);
st... | tcpdump | 979dcefd7b259e9e233f77fe1c5312793bfd948f | 3b32029db354cbc875127869d9b12a9addc75b50 | 1 | isis_print_extd_ip_reach(netdissect_options *ndo,
const uint8_t *tptr, const char *ident, uint16_t afi)
{
char ident_buffer[20];
uint8_t prefix[sizeof(struct in6_addr)]; /* shared copy buffer for IPv4 and IPv6 prefixes */
u_int metric, status_byte, bit_length, byte_length, sublen, p... |
143,227 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2016-07 | null | 0 | https://github.com/chromium/chromium/commit/8353baf8d1504dbdd4ad7584ff2466de657521cd | 8353baf8d1504dbdd4ad7584ff2466de657521cd | Remove WebFrame::canHaveSecureChild
To simplify the public API, ServiceWorkerNetworkProvider can do the
parent walk itself.
Follow-up to https://crrev.com/ad1850962644e19.
BUG=607543
Review-Url: https://codereview.chromium.org/2082493002
Cr-Commit-Position: refs/heads/master@{#400896} | 0 | third_party/WebKit/Source/core/dom/Document.cpp | {"sha": "5c883a0154ddb182d6ad680b5a4c77660f2b373f", "filename": "content/child/service_worker/service_worker_network_provider.cc", "status": "modified", "additions": 15, "deletions": 2, "changes": 17, "blob_url": "https://github.com/chromium/chromium/blob/8353baf8d1504dbdd4ad7584ff2466de657521cd/content/child/service_w... | void Document::nodeChildrenWillBeRemoved(ContainerNode& container)
{
EventDispatchForbiddenScope assertNoEventDispatch;
for (Range* range : m_ranges)
range->nodeChildrenWillBeRemoved(container);
for (NodeIterator* ni : m_nodeIterators) {
for (Node& n : NodeTraversal::childrenOf(container))
... | void Document::nodeChildrenWillBeRemoved(ContainerNode& container)
{
EventDispatchForbiddenScope assertNoEventDispatch;
for (Range* range : m_ranges)
range->nodeChildrenWillBeRemoved(container);
for (NodeIterator* ni : m_nodeIterators) {
for (Node& n : NodeTraversal::childrenOf(container))
... | C | null | null | null | @@ -3355,9 +3355,14 @@ bool Document::isSecureContextImpl(const SecureContextCheck privilegeContextChec
return true;
if (privilegeContextCheck == StandardSecureContextCheck) {
- Frame* parent = m_frame ? m_frame->tree().parent() : nullptr;
- if (parent && !parent->canHaveSecureChild())
- ... | Chrome | 8353baf8d1504dbdd4ad7584ff2466de657521cd | 04817566fb446d8315cbc4049266c4859a010a74 | 0 | void Document::nodeChildrenWillBeRemoved(ContainerNode& container)
{
EventDispatchForbiddenScope assertNoEventDispatch;
for (Range* range : m_ranges)
range->nodeChildrenWillBeRemoved(container);
for (NodeIterator* ni : m_nodeIterators) {
for (Node& n : NodeTraversal::childrenOf(container))
... |
141,803 | null | Remote | Not required | null | CVE-2016-5165 | https://www.cvedetails.com/cve/CVE-2016-5165/ | CWE-79 | Medium | null | Partial | null | 2016-09-11 | 4.3 | Cross-site scripting (XSS) vulnerability in the Developer Tools (aka DevTools) subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux allows remote attackers to inject arbitrary web script or HTML via the settings parameter in a chrome-devtools-frontend.appspot.com URL's que... | 2018-10-30 | XSS | 0 | https://github.com/chromium/chromium/commit/19b8593007150b9a78da7d13f6e5f8feb10881a7 | 19b8593007150b9a78da7d13f6e5f8feb10881a7 | Add CPU metrics provider and Add CPU/GPU provider for UKM.
Bug: 907674
Change-Id: I61b88aeac8d2a7ff81d812fa5a267f48203ec7e2
Reviewed-on: https://chromium-review.googlesource.com/c/1381376
Commit-Queue: Nik Bhagat <nikunjb@chromium.org>
Reviewed-by: Robert Kaplow <rkaplow@chromium.org>
Cr-Commit-Position: refs/heads/ma... | 0 | chrome/browser/metrics/chrome_metrics_service_client.cc | {"sha": "6bfa3bc75563eb09dc6d18a58d8454f7e524b5a4", "filename": "chrome/browser/metrics/chrome_metrics_service_client.cc", "status": "modified", "additions": 13, "deletions": 0, "changes": 13, "blob_url": "https://github.com/chromium/chromium/blob/19b8593007150b9a78da7d13f6e5f8feb10881a7/chrome/browser/metrics/chrome_m... | void RegisterFileMetricsPreferences(PrefRegistrySimple* registry) {
metrics::FileMetricsProvider::RegisterPrefs(registry, kBrowserMetricsName);
metrics::FileMetricsProvider::RegisterPrefs(registry,
kCrashpadHistogramAllocatorName);
#if defined(OS_WIN)
metrics::FileM... | void RegisterFileMetricsPreferences(PrefRegistrySimple* registry) {
metrics::FileMetricsProvider::RegisterPrefs(registry, kBrowserMetricsName);
metrics::FileMetricsProvider::RegisterPrefs(registry,
kCrashpadHistogramAllocatorName);
#if defined(OS_WIN)
metrics::FileM... | C | null | null | null | @@ -65,6 +65,7 @@
#include "components/history/core/browser/history_service.h"
#include "components/metrics/call_stack_profile_metrics_provider.h"
#include "components/metrics/component_metrics_provider.h"
+#include "components/metrics/cpu_metrics_provider.h"
#include "components/metrics/drive_metrics_provider.h"
... | Chrome | 19b8593007150b9a78da7d13f6e5f8feb10881a7 | 1d937c7a926082670b9025f7a04e62d8fc3128d6 | 0 | void RegisterFileMetricsPreferences(PrefRegistrySimple* registry) {
metrics::FileMetricsProvider::RegisterPrefs(registry, kBrowserMetricsName);
metrics::FileMetricsProvider::RegisterPrefs(registry,
kCrashpadHistogramAllocatorName);
#if defined(OS_WIN)
metrics::FileM... |
73,806 | null | Remote | Not required | null | CVE-2016-6255 | https://www.cvedetails.com/cve/CVE-2016-6255/ | CWE-284 | Low | null | Partial | null | 2017-03-07 | 5 | Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler. | 2017-11-02 | null | 0 | https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | Don't allow unhandled POSTs to write to the filesystem by default
If there's no registered handler for a POST request, the default behaviour
is to write it to the filesystem. Several million deployed devices appear
to have this behaviour, making it possible to (at least) store arbitrary
data on them. Add a configure o... | 0 | upnp/src/genlib/net/http/webserver.c | {"sha": "ea2bc09ef1234e075484369484199dcdda829134", "filename": "configure.ac", "status": "modified", "additions": 4, "deletions": 0, "changes": 4, "blob_url": "https://github.com/mjg59/pupnp-code/blob/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd/configure.ac", "raw_url": "https://github.com/mjg59/pupnp-code/raw/be0a01bdb8... | static int isFileInVirtualDir(
/*! [in] Directory path to be tested for virtual directory. */
char *filePath)
{
virtualDirList *pCurVirtualDir;
size_t webDirLen;
pCurVirtualDir = pVirtualDirList;
while (pCurVirtualDir != NULL) {
webDirLen = strlen(pCurVirtualDir->dirName);
if (webDirLen) {
if (pCurVirtual... | static int isFileInVirtualDir(
/*! [in] Directory path to be tested for virtual directory. */
char *filePath)
{
virtualDirList *pCurVirtualDir;
size_t webDirLen;
pCurVirtualDir = pVirtualDirList;
while (pCurVirtualDir != NULL) {
webDirLen = strlen(pCurVirtualDir->dirName);
if (webDirLen) {
if (pCurVirtual... | C | null | null | null | @@ -1369,9 +1369,13 @@ static int http_RecvPostMessage(
if (Fp == NULL)
return HTTP_INTERNAL_SERVER_ERROR;
} else {
+#ifdef UPNP_ENABLE_POST_WRITE
Fp = fopen(filename, "wb");
if (Fp == NULL)
return HTTP_UNAUTHORIZED;
+#else
+ return HTTP_NOT_FOUND;
+#endif
}
parser->position = POS_ENTITY;
do { | pupnp-code | be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | bb994b975abf52ce9573dbca7cfd0d4e10b8c3e1 | 0 | static int isFileInVirtualDir(
/*! [in] Directory path to be tested for virtual directory. */
char *filePath)
{
virtualDirList *pCurVirtualDir;
size_t webDirLen;
pCurVirtualDir = pVirtualDirList;
while (pCurVirtualDir != NULL) {
webDirLen = strlen(pCurVirtualDir->dirName);
if (webDirLen) {
if (pCurVirtual... |
142,684 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2016-07 | null | 0 | https://github.com/chromium/chromium/commit/be655fd4fb9ab3291a855a939496111674037a2f | be655fd4fb9ab3291a855a939496111674037a2f | Always use FrameNavigationDisabler during DocumentLoader detach.
BUG=617495
Review-Url: https://codereview.chromium.org/2079473002
Cr-Commit-Position: refs/heads/master@{#400558} | 0 | third_party/WebKit/Source/core/loader/FrameLoader.cpp | {"sha": "4f8c4d0a9cb3e3ed7f94be0bad612c82b8b0cdd3", "filename": "third_party/WebKit/Source/core/loader/FrameLoader.cpp", "status": "modified", "additions": 2, "deletions": 5, "changes": 7, "blob_url": "https://github.com/chromium/chromium/blob/be655fd4fb9ab3291a855a939496111674037a2f/third_party/WebKit/Source/core/load... | void FrameLoader::dispatchUnloadEvent()
{
NavigationCounterForUnload counter;
m_protectProvisionalLoader = false;
saveScrollState();
if (m_frame->document() && !SVGImage::isInSVGImage(m_frame->document()))
m_frame->document()->dispatchUnloadEvents();
if (Page* page = m_frame->page())
... | void FrameLoader::dispatchUnloadEvent()
{
NavigationCounterForUnload counter;
m_protectProvisionalLoader = false;
saveScrollState();
if (m_frame->document() && !SVGImage::isInSVGImage(m_frame->document()))
m_frame->document()->dispatchUnloadEvents();
if (Page* page = m_frame->page())
... | C | null | null | null | @@ -725,6 +725,7 @@ void FrameLoader::detachDocumentLoader(Member<DocumentLoader>& loader)
if (!loader)
return;
+ FrameNavigationDisabler navigationDisabler(*m_frame);
loader->detachFromFrame();
loader = nullptr;
}
@@ -1113,7 +1114,6 @@ bool FrameLoader::prepareForCommit()
// At this ... | Chrome | be655fd4fb9ab3291a855a939496111674037a2f | 23024078fb2e07f6852031e76f08712bcd6303f0 | 0 | void FrameLoader::dispatchUnloadEvent()
{
NavigationCounterForUnload counter;
// If the frame is unloading, the provisional loader should no longer be
// protected. It will be detached soon.
m_protectProvisionalLoader = false;
saveScrollState();
if (m_frame->document() && !SVGImage::isInSVGIma... |
48,039 | null | Local | Not required | Partial | CVE-2016-9588 | https://www.cvedetails.com/cve/CVE-2016-9588/ | CWE-388 | Low | null | null | null | 2016-12-28 | 2.1 | arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest. | 2018-11-28 | DoS | 0 | https://github.com/torvalds/linux/commit/ef85b67385436ddc1998f45f1d6a210f935b3388 | ef85b67385436ddc1998f45f1d6a210f935b3388 | kvm: nVMX: Allow L1 to intercept software exceptions (#BP and #OF)
When L2 exits to L0 due to "exception or NMI", software exceptions
(#BP and #OF) for which L1 has requested an intercept should be
handled by L1 rather than L0. Previously, only hardware exceptions
were forwarded to L1.
Signed-off-by: Jim Mattson <jma... | 0 | arch/x86/kvm/vmx.c | {"sha": "24db5fb6f575af27d3b61a67b15ce9996158ed8b", "filename": "arch/x86/kvm/vmx.c", "status": "modified", "additions": 5, "deletions": 6, "changes": 11, "blob_url": "https://github.com/torvalds/linux/blob/ef85b67385436ddc1998f45f1d6a210f935b3388/arch/x86/kvm/vmx.c", "raw_url": "https://github.com/torvalds/linux/raw/e... | static int handle_vmclear(struct kvm_vcpu *vcpu)
{
struct vcpu_vmx *vmx = to_vmx(vcpu);
gpa_t vmptr;
struct vmcs12 *vmcs12;
struct page *page;
if (!nested_vmx_check_permission(vcpu))
return 1;
if (nested_vmx_check_vmptr(vcpu, EXIT_REASON_VMCLEAR, &vmptr))
return 1;
if (vmptr == vmx->nested.current_vmptr)
... | static int handle_vmclear(struct kvm_vcpu *vcpu)
{
struct vcpu_vmx *vmx = to_vmx(vcpu);
gpa_t vmptr;
struct vmcs12 *vmcs12;
struct page *page;
if (!nested_vmx_check_permission(vcpu))
return 1;
if (nested_vmx_check_vmptr(vcpu, EXIT_REASON_VMCLEAR, &vmptr))
return 1;
if (vmptr == vmx->nested.current_vmptr)
... | C | null | null | null | @@ -1389,10 +1389,10 @@ static inline bool nested_cpu_has_posted_intr(struct vmcs12 *vmcs12)
return vmcs12->pin_based_vm_exec_control & PIN_BASED_POSTED_INTR;
}
-static inline bool is_exception(u32 intr_info)
+static inline bool is_nmi(u32 intr_info)
{
return (intr_info & (INTR_INFO_INTR_TYPE_MASK | INTR_INFO_V... | linux | ef85b67385436ddc1998f45f1d6a210f935b3388 | cc0d907c0907561f108b2f4d4da24e85f18d0ca5 | 0 | static int handle_vmclear(struct kvm_vcpu *vcpu)
{
struct vcpu_vmx *vmx = to_vmx(vcpu);
gpa_t vmptr;
struct vmcs12 *vmcs12;
struct page *page;
if (!nested_vmx_check_permission(vcpu))
return 1;
if (nested_vmx_check_vmptr(vcpu, EXIT_REASON_VMCLEAR, &vmptr))
return 1;
if (vmptr == vmx->nested.current_vmptr)
... |
93,889 | null | Remote | Not required | null | CVE-2016-10746 | https://www.cvedetails.com/cve/CVE-2016-10746/ | CWE-254 | Low | null | Partial | null | 2019-04-18 | 5 | libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886. | 2019-05-01 | null | 0 | https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f | 506e9d6c2d4baaf580d489fff0690c0ff2ff588f | virDomainGetTime: Deny on RO connections
We have a policy that if API may end up talking to a guest agent
it should require RW connection. We don't obey the rule in
virDomainGetTime().
Signed-off-by: Michal Privoznik <mprivozn@redhat.com> | 0 | src/libvirt-domain.c | {"sha": "9491845758570c879e28b18c4b4133ec76a48e90", "filename": "src/libvirt-domain.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/libvirt/libvirt/blob/506e9d6c2d4baaf580d489fff0690c0ff2ff588f/src/libvirt-domain.c", "raw_url": "https://github.com/libvirt/libvirt/... | virDomainOpenConsole(virDomainPtr dom,
const char *dev_name,
virStreamPtr st,
unsigned int flags)
{
virConnectPtr conn;
VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x",
NULLSTR(dev_name), st, flags);
virResetLastError... | virDomainOpenConsole(virDomainPtr dom,
const char *dev_name,
virStreamPtr st,
unsigned int flags)
{
virConnectPtr conn;
VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x",
NULLSTR(dev_name), st, flags);
virResetLastError... | C | null | null | null | @@ -10934,6 +10934,7 @@ virDomainGetTime(virDomainPtr dom,
virResetLastError();
virCheckDomainReturn(dom, -1);
+ virCheckReadOnlyGoto(dom->conn->flags, error);
if (dom->conn->driver->domainGetTime) {
int ret = dom->conn->driver->domainGetTime(dom, seconds, | libvirt | 506e9d6c2d4baaf580d489fff0690c0ff2ff588f | 95c370f0eead8ab0bedf333d54019f55aa001116 | 0 | virDomainOpenConsole(virDomainPtr dom,
const char *dev_name,
virStreamPtr st,
unsigned int flags)
{
virConnectPtr conn;
VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x",
NULLSTR(dev_name), st, flags);
virResetLastError... |
9,652 | null | Remote | Not required | Partial | CVE-2016-6289 | https://www.cvedetails.com/cve/CVE-2016-6289/ | CWE-190 | Medium | Partial | Partial | null | 2016-07-25 | 6.8 | Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive. | 2018-01-04 | DoS Overflow | 0 | https://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 | 0218acb7e756a469099c4ccfb22bce6c2bd1ef87 | null | 0 | null | null | static int php_is_dir_ok(const cwd_state *state) /* {{{ */
{
struct stat buf;
if (php_sys_stat(state->cwd, &buf) == 0 && S_ISDIR(buf.st_mode))
return (0);
return (1);
}
/* }}} */
| static int php_is_dir_ok(const cwd_state *state) /* {{{ */
{
struct stat buf;
if (php_sys_stat(state->cwd, &buf) == 0 && S_ISDIR(buf.st_mode))
return (0);
return (1);
}
/* }}} */
| C | null | null | aca4f65c7e98b9f07ac625eaf6be8eadbeb55929 | @@ -621,14 +621,14 @@ CWD_API void realpath_cache_del(const char *path, int path_len TSRMLS_DC) /* {{{
memcmp(path, (*bucket)->path, path_len) == 0) {
realpath_cache_bucket *r = *bucket;
*bucket = (*bucket)->next;
- ... | php | https://git.php.net/?p=php-src.git;a=blob;f=TSRM/tsrm_virtual_cwd.c;h=6c22ee85b25c395f0444f292f8bf876eda3b5897;hb=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 | https://git.php.net/?p=php-src.git;a=blob;f=TSRM/tsrm_virtual_cwd.c;h=ba92711f892732bc3616d046c083df385502f8ca | 0 | static int php_is_dir_ok(const cwd_state *state) /* {{{ */
{
struct stat buf;
if (php_sys_stat(state->cwd, &buf) == 0 && S_ISDIR(buf.st_mode))
return (0);
return (1);
}
/* }}} */
|
65,486 | null | Local | Not required | Complete | CVE-2017-9059 | https://www.cvedetails.com/cve/CVE-2017-9059/ | CWE-404 | Low | null | null | null | 2017-05-18 | 4.9 | The NFSv4 implementation in the Linux kernel through 4.11.1 allows local users to cause a denial of service (resource consumption) by leveraging improper channel callback shutdown when unmounting an NFSv4 filesystem, aka a *module reference and kernel daemon* leak. | 2019-10-02 | DoS | 0 | https://github.com/torvalds/linux/commit/c70422f760c120480fee4de6c38804c72aa26bc1 | c70422f760c120480fee4de6c38804c72aa26bc1 | Merge tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux
Pull nfsd updates from Bruce Fields:
"Another RDMA update from Chuck Lever, and a bunch of miscellaneous
bugfixes"
* tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux: (26 commits)
nfsd: Fix up the "supattr_exclcreat" attributes
nfsd: encoders mus... | 0 | fs/nfsd/nfs4state.c | {"sha": "5d481e8a1b5d0c732207c4a583027ec084d7a0db", "filename": "fs/lockd/svc.c", "status": "modified", "additions": 4, "deletions": 2, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/c70422f760c120480fee4de6c38804c72aa26bc1/fs/lockd/svc.c", "raw_url": "https://github.com/torvalds/linux/raw/c70422f760... | hash_sessionid(struct nfs4_sessionid *sessionid)
{
struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid;
return sid->sequence % SESSION_HASH_SIZE;
}
| hash_sessionid(struct nfs4_sessionid *sessionid)
{
struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid;
return sid->sequence % SESSION_HASH_SIZE;
}
| C | null | null | null | @@ -1912,28 +1912,15 @@ static void copy_clid(struct nfs4_client *target, struct nfs4_client *source)
target->cl_clientid.cl_id = source->cl_clientid.cl_id;
}
-int strdup_if_nonnull(char **target, char *source)
-{
- if (source) {
- *target = kstrdup(source, GFP_KERNEL);
- if (!*target)
- return -ENOMEM;
- } e... | linux | c70422f760c120480fee4de6c38804c72aa26bc1 | 73ccb023a2f25b72c4b95499ca24760588014614 | 0 | hash_sessionid(struct nfs4_sessionid *sessionid)
{
struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid;
return sid->sequence % SESSION_HASH_SIZE;
}
|
70,893 | null | Remote | Not required | Partial | CVE-2016-10172 | https://www.cvedetails.com/cve/CVE-2016-10172/ | CWE-125 | Medium | null | null | null | 2017-03-14 | 4.3 | The read_new_config_info function in open_utils.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file. | 2017-03-14 | DoS | 0 | https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | fixes for 4 fuzz failures posted to SourceForge mailing list | 0 | src/open_utils.c | {"sha": "a8440463f70f22960d7d4caf59154b03eba3444b", "filename": "src/open_utils.c", "status": "modified", "additions": 5, "deletions": 1, "changes": 6, "blob_url": "https://github.com/dbry/WavPack/blob/4bc05fc490b66ef2d45b1de26abf1455b486b0dc/src/open_utils.c", "raw_url": "https://github.com/dbry/WavPack/raw/4bc05fc490... | static int read_channel_info (WavpackContext *wpc, WavpackMetadata *wpmd)
{
int bytecnt = wpmd->byte_length, shift = 0, mask_bits;
unsigned char *byteptr = wpmd->data;
uint32_t mask = 0;
if (!bytecnt || bytecnt > 7)
return FALSE;
if (!wpc->config.num_channels) {
if (bytecnt >= 6)... | static int read_channel_info (WavpackContext *wpc, WavpackMetadata *wpmd)
{
int bytecnt = wpmd->byte_length, shift = 0, mask_bits;
unsigned char *byteptr = wpmd->data;
uint32_t mask = 0;
if (!bytecnt || bytecnt > 7)
return FALSE;
if (!wpc->config.num_channels) {
if (bytecnt >= 6)... | C | null | null | null | @@ -560,7 +560,7 @@ static int read_new_config_info (WavpackContext *wpc, WavpackMetadata *wpmd)
// if there's any data, the first two bytes are file_format and qmode flags
- if (bytecnt) {
+ if (bytecnt >= 2) {
wpc->file_format = *byteptr++;
wpc->config.qmode = (wpc->config.qmode & ~0x... | WavPack | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | df0488c2e0fb4b7e3c78b96611cdebb69b002769 | 0 | static int read_channel_info (WavpackContext *wpc, WavpackMetadata *wpmd)
{
int bytecnt = wpmd->byte_length, shift = 0, mask_bits;
unsigned char *byteptr = wpmd->data;
uint32_t mask = 0;
if (!bytecnt || bytecnt > 7)
return FALSE;
if (!wpc->config.num_channels) {
// if bytecnt is 6... |
168,485 | null | Remote | Not required | null | CVE-2018-6148 | https://www.cvedetails.com/cve/CVE-2018-6148/ | CWE-93 | Medium | null | Partial | null | 2019-06-27 | 4.3 | Incorrect implementation in Content Security Policy in Google Chrome prior to 67.0.3396.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | 2019-07-02 | Bypass | 0 | https://github.com/chromium/chromium/commit/fa68dcfd12e376aa880b3193a77b896e6c54efdf | fa68dcfd12e376aa880b3193a77b896e6c54efdf | Verify that header values set from Blink don't contain '\n'.
Because that would be silly.
Bug: 845961
Change-Id: I69de2cb093a3629de63c48652c9499f7387b8334
Reviewed-on: https://chromium-review.googlesource.com/1109757
Commit-Queue: Mike West <mkwst@chromium.org>
Reviewed-by: Daniel Cheng <dcheng@chromium.org>
Cr-Commi... | 0 | third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc | {"sha": "d58fe497799390cdd55690d0d7bfa728054e5312", "filename": "third_party/blink/renderer/core/exported/web_associated_url_loader_impl_test.cc", "status": "modified", "additions": 0, "deletions": 3, "changes": 3, "blob_url": "https://github.com/chromium/chromium/blob/fa68dcfd12e376aa880b3193a77b896e6c54efdf/third_par... | void CheckHeaderFails(const char* header_field, const char* header_value) {
WebURLRequest request(ToKURL("http://www.test.com/success.html"));
request.SetFetchRequestMode(network::mojom::FetchRequestMode::kSameOrigin);
request.SetFetchCredentialsMode(
network::mojom::FetchCredentialsMode::kOmit);
... | void CheckHeaderFails(const char* header_field, const char* header_value) {
WebURLRequest request(ToKURL("http://www.test.com/success.html"));
request.SetFetchRequestMode(network::mojom::FetchRequestMode::kSameOrigin);
request.SetFetchCredentialsMode(
network::mojom::FetchCredentialsMode::kOmit);
... | C | null | null | null | @@ -628,9 +628,6 @@ TEST_F(WebAssociatedURLLoaderTest, MAYBE_UntrustedCheckHeaders) {
// Check that validation is case-insensitive.
CheckHeaderFails("AcCePt-ChArSeT");
CheckHeaderFails("ProXy-FoO");
-
- // Check invalid header values.
- CheckHeaderFails("foo", "bar\x0d\x0ax-csrf-token:\x20test1234");
}
/... | Chrome | fa68dcfd12e376aa880b3193a77b896e6c54efdf | 059d76f6ac346fd4a05c526a665f356d1306f99c | 0 | void CheckHeaderFails(const char* header_field, const char* header_value) {
WebURLRequest request(ToKURL("http://www.test.com/success.html"));
request.SetFetchRequestMode(network::mojom::FetchRequestMode::kSameOrigin);
request.SetFetchCredentialsMode(
network::mojom::FetchCredentialsMode::kOmit);
... |
58,975 | Admin | Local Network | Not required | Complete | CVE-2017-1000251 | https://www.cvedetails.com/cve/CVE-2017-1000251/ | CWE-119 | Low | Complete | Complete | null | 2017-09-12 | 8.3 | The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space. | 2018-02-16 | Exec Code Overflow | 0 | https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe | f2fcfcd670257236ebf2088bbdf26f6a8ef459fe | Bluetooth: Add configuration support for ERTM and Streaming mode
Add support to config_req and config_rsp to configure ERTM and Streaming
mode. If the remote device specifies ERTM or Streaming mode, then the
same mode is proposed. Otherwise ERTM or Basic mode is used. And in case
of a state 2 device, the remote device... | 0 | net/bluetooth/l2cap.c | {"sha": "6fc76986d70a9366a287508b619bcc37c244a800", "filename": "include/net/bluetooth/l2cap.h", "status": "modified", "additions": 21, "deletions": 7, "changes": 28, "blob_url": "https://github.com/torvalds/linux/blob/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe/include/net/bluetooth/l2cap.h", "raw_url": "https://github.c... | static void l2cap_sock_set_timer(struct sock *sk, long timeout)
{
BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout);
sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
}
| static void l2cap_sock_set_timer(struct sock *sk, long timeout)
{
BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout);
sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
}
| C | null | null | null | @@ -966,6 +966,7 @@ static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int al
case L2CAP_MODE_BASIC:
break;
case L2CAP_MODE_ERTM:
+ case L2CAP_MODE_STREAMING:
if (enable_ertm)
break;
/* fall through */
@@ -1029,6 +1030,7 @@ static int l2cap_sock_listen(struct socket *sock, int ba... | linux | f2fcfcd670257236ebf2088bbdf26f6a8ef459fe | 65c7c4918450f8c4545ccb02a9c7a3d77e073535 | 0 | static void l2cap_sock_set_timer(struct sock *sk, long timeout)
{
BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout);
sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
}
|
9,681 | null | Remote | Not required | Partial | CVE-2010-2808 | https://www.cvedetails.com/cve/CVE-2010-2808/ | CWE-119 | Medium | Partial | Partial | null | 2010-08-19 | 6.8 | Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font. | 2011-01-12 | DoS Exec Code Overflow Mem. Corr. | 0 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975 | 81f3472c0ba7b8f6466e2e214fa8c1c17fade975 | null | 0 | null | null | destroy_charmaps( FT_Face face,
FT_Memory memory )
{
FT_Int n;
if ( !face )
return;
for ( n = 0; n < face->num_charmaps; n++ )
{
FT_CMap cmap = FT_CMAP( face->charmaps[n] );
ft_cmap_done_internal( cmap );
face->charmaps[n] = NULL;
}
FT... | destroy_charmaps( FT_Face face,
FT_Memory memory )
{
FT_Int n;
if ( !face )
return;
for ( n = 0; n < face->num_charmaps; n++ )
{
FT_CMap cmap = FT_CMAP( face->charmaps[n] );
ft_cmap_done_internal( cmap );
face->charmaps[n] = NULL;
}
FT... | C | null | null | 223cb1b57c1c89fbaf76772af11f1b06490bde3c | @@ -1574,6 +1574,7 @@
FT_TRACE3(( "POST fragment[%d]: offsets=0x%08x, rlen=0x%08x, flags=0x%04x\n",
i, offsets[i], rlen, flags ));
+ /* postpone the check of rlen longer than buffer until FT_Stream_Read() */
if ( ( flags >> 8 ) == 0 ) /* Comment, should not be loaded */
... | savannah | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/base/ftobjs.c?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/base/ftobjs.c?id=223cb1b57c1c89fbaf76772af11f1b06490bde3c | 0 | destroy_charmaps( FT_Face face,
FT_Memory memory )
{
FT_Int n;
if ( !face )
return;
for ( n = 0; n < face->num_charmaps; n++ )
{
FT_CMap cmap = FT_CMAP( face->charmaps[n] );
ft_cmap_done_internal( cmap );
face->charmaps[n] = NULL;
}
FT... |
6,442 | null | Local | Not required | Partial | CVE-2017-8933 | https://www.cvedetails.com/cve/CVE-2017-8933/ | CWE-20 | Low | null | null | null | 2017-05-15 | 2.1 | Libmenu-cache 1.0.2 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (menu unavailability). | 2017-05-22 | DoS | 0 | https://git.lxde.org/gitweb/?p=lxde/menu-cache.git;a=commit;h=56f66684592abf257c4004e6e1fff041c64a12ce | 56f66684592abf257c4004e6e1fff041c64a12ce | null | 0 | null | null | const char* menu_cache_item_get_file_dirname( MenuCacheItem* item )
{
return item->file_dir ? item->file_dir->dir + 1 : NULL;
}
| const char* menu_cache_item_get_file_dirname( MenuCacheItem* item )
{
return item->file_dir ? item->file_dir->dir + 1 : NULL;
}
| C | null | null | dffb1314ec1b7212bbee5dfa9a021a069b826cbb | @@ -3,7 +3,7 @@
*
* Copyright 2008 PCMan <pcman.tw@gmail.com>
* Copyright 2009 Jürgen Hötzel <juergen@archlinux.org>
- * Copyright 2012-2015 Andriy Grytsenko (LStranger) <andrej@rep.kiev.ua>
+ * Copyright 2012-2017 Andriy Grytsenko (LStranger) <andrej@rep.kiev.ua>
*
* This library is ... | lxde | https://git.lxde.org/gitweb/?p=lxde/menu-cache.git;a=blob;f=libmenu-cache/menu-cache.c;h=d9141274aca1ba103d63cd41630db4ae3211a3a2;hb=56f66684592abf257c4004e6e1fff041c64a12ce | https://git.lxde.org/gitweb/?p=lxde/menu-cache.git;a=blob;f=libmenu-cache/menu-cache.c;h=9e3e0db79fcf92706da823f74311af1ddb95a7ec | 0 | const char* menu_cache_item_get_file_dirname( MenuCacheItem* item )
{
return item->file_dir ? item->file_dir->dir + 1 : NULL;
}
|
71,763 | null | Remote | Not required | Partial | CVE-2016-10066 | https://www.cvedetails.com/cve/CVE-2016-10066/ | CWE-119 | Medium | null | null | null | 2017-03-03 | 4.3 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | 2017-03-04 | DoS Overflow | 0 | https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | null | 0 | coders/tiff.c | {"sha": "ca393265a99b634fb87ee6aefa65985b1eae5cd6", "filename": "ChangeLog", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/ImageMagick/ImageMagick/blob/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6/ChangeLog", "raw_url": "https://github.com/ImageMagick/ImageMagick/raw/f6... | static MagickBooleanType WritePTIFImage(const ImageInfo *image_info,
Image *image)
{
ExceptionInfo
*exception;
Image
*images,
*next,
*pyramid_image;
ImageInfo
*write_info;
MagickBooleanType
status;
PointInfo
resolution;
size_t
columns,
rows;
/*
Create pyrami... | static MagickBooleanType WritePTIFImage(const ImageInfo *image_info,
Image *image)
{
ExceptionInfo
*exception;
Image
*images,
*next,
*pyramid_image;
ImageInfo
*write_info;
MagickBooleanType
status;
PointInfo
resolution;
size_t
columns,
rows;
/*
Create pyrami... | C | null | null | null | @@ -1195,6 +1195,12 @@ RestoreMSCWarning
image->columns=(size_t) width;
image->rows=(size_t) height;
image->depth=(size_t) bits_per_sample;
+ status=SetImageExtent(image,image->columns,image->rows);
+ if (status == MagickFalse)
+ {
+ InheritException(exception,&image->exception);
+ ... | ImageMagick | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | 6773cce8ff0bfb32fd568c2a0f74acc34b66ec03 | 0 | static MagickBooleanType WritePTIFImage(const ImageInfo *image_info,
Image *image)
{
ExceptionInfo
*exception;
Image
*images,
*next,
*pyramid_image;
ImageInfo
*write_info;
MagickBooleanType
status;
PointInfo
resolution;
size_t
columns,
rows;
/*
Create pyrami... |
110,096 | null | Remote | Not required | Partial | CVE-2012-5111 | https://www.cvedetails.com/cve/CVE-2012-5111/ | null | Low | Partial | Partial | null | 2012-10-09 | 7.5 | Google Chrome before 22.0.1229.92 does not monitor for crashes of Pepper plug-ins, which has unspecified impact and remote attack vectors. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/ef97ce340c462d5212336f09bf8075d1cb10faa4 | ef97ce340c462d5212336f09bf8075d1cb10faa4 | Handle crashing Pepper plug-ins the same as crashing NPAPI plug-ins.
BUG=151895
Review URL: https://chromiumcodereview.appspot.com/10956065
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@158364 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/browser/ppapi_plugin_process_host.cc | {"sha": "1f3c029bf67a16fe766d874f3fee4f7eee7f60d8", "filename": "chrome/browser/renderer_host/plugin_info_message_filter.cc", "status": "modified", "additions": 11, "deletions": 3, "changes": 14, "blob_url": "https://github.com/chromium/chromium/blob/ef97ce340c462d5212336f09bf8075d1cb10faa4/chrome/browser/renderer_host... | virtual void OnConnectionTypeChanged(
net::NetworkChangeNotifier::ConnectionType type) {
process_host_->Send(new PpapiMsg_SetNetworkState(
type != net::NetworkChangeNotifier::CONNECTION_NONE));
}
| virtual void OnConnectionTypeChanged(
net::NetworkChangeNotifier::ConnectionType type) {
process_host_->Send(new PpapiMsg_SetNetworkState(
type != net::NetworkChangeNotifier::CONNECTION_NONE));
}
| C | null | null | null | @@ -295,6 +295,10 @@ void PpapiPluginProcessHost::OnProcessLaunched() {
host_impl_->set_plugin_process_handle(process_->GetHandle());
}
+void PpapiPluginProcessHost::OnProcessCrashed(int exit_code) {
+ PluginServiceImpl::GetInstance()->RegisterPluginCrash(plugin_path_);
+}
+
bool PpapiPluginProcessHost::OnMessa... | Chrome | ef97ce340c462d5212336f09bf8075d1cb10faa4 | e036acf3f2de5f3446e233ee1ec9519b35f323a5 | 0 | virtual void OnConnectionTypeChanged(
net::NetworkChangeNotifier::ConnectionType type) {
process_host_->Send(new PpapiMsg_SetNetworkState(
type != net::NetworkChangeNotifier::CONNECTION_NONE));
}
|
159,355 | null | Remote | Not required | Partial | CVE-2018-6035 | https://www.cvedetails.com/cve/CVE-2018-6035/ | CWE-200 | Medium | Partial | Partial | null | 2018-09-25 | 6.8 | Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user local file data via a crafted Chrome Extension. | 2018-11-15 | +Info | 0 | https://github.com/chromium/chromium/commit/2649de11c562aa96d336c06136a1a20c01711be0 | 2649de11c562aa96d336c06136a1a20c01711be0 | Hide DevTools frontend from webRequest API
Prevent extensions from observing requests for remote DevTools frontends
and add regression tests.
And update ExtensionTestApi to support initializing the embedded test
server and port from SetUpCommandLine (before SetUpOnMainThread).
BUG=797497,797500
TEST=browser_test --g... | 0 | chrome/browser/extensions/api/chrome_extensions_api_client.cc | {"sha": "c732c6ef6d0ecf8b43f61b2d1ff6034f99f3c316", "filename": "chrome/browser/extensions/api/chrome_extensions_api_client.cc", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/chromium/chromium/blob/2649de11c562aa96d336c06136a1a20c01711be0/chrome/browser/extensions/a... | FileSystemDelegate* ChromeExtensionsAPIClient::GetFileSystemDelegate() {
if (!file_system_delegate_)
file_system_delegate_ = base::MakeUnique<ChromeFileSystemDelegate>();
return file_system_delegate_.get();
}
| FileSystemDelegate* ChromeExtensionsAPIClient::GetFileSystemDelegate() {
if (!file_system_delegate_)
file_system_delegate_ = base::MakeUnique<ChromeFileSystemDelegate>();
return file_system_delegate_.get();
}
| C | null | null | null | @@ -33,6 +33,7 @@
#include "chrome/browser/guest_view/web_view/chrome_web_view_guest_delegate.h"
#include "chrome/browser/guest_view/web_view/chrome_web_view_permission_helper_delegate.h"
#include "chrome/browser/ui/pdf/chrome_pdf_web_contents_helper_client.h"
+#include "chrome/browser/ui/webui/devtools_ui.h"
#incl... | Chrome | 2649de11c562aa96d336c06136a1a20c01711be0 | 7896c18d7d1ae0246660efa69d19ca7224938c2d | 0 | FileSystemDelegate* ChromeExtensionsAPIClient::GetFileSystemDelegate() {
if (!file_system_delegate_)
file_system_delegate_ = base::MakeUnique<ChromeFileSystemDelegate>();
return file_system_delegate_.get();
}
|
29,637 | null | Remote | Not required | null | CVE-2013-4350 | https://www.cvedetails.com/cve/CVE-2013-4350/ | CWE-310 | Low | Partial | null | null | 2013-09-25 | 5 | The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network. | 2014-01-03 | +Info | 0 | https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7 | 95ee62083cb6453e056562d91f597552021e6ae7 | net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit
Alan Chester reported an issue with IPv6 on SCTP that IPsec traffic is not
being encrypted, whereas on IPv4 it is. Setting up an AH + ESP transport
does not seem to have the desired effect:
SCTP + IPv4:
22:14:20.809645 IP (tos 0x2,ECT(0), ttl 64, id 0, offse... | 0 | net/sctp/ipv6.c | {"sha": "4f52e2ce263d0852bf01cc286560f8d13fbe208a", "filename": "net/sctp/ipv6.c", "status": "modified", "additions": 13, "deletions": 29, "changes": 42, "blob_url": "https://github.com/torvalds/linux/blob/95ee62083cb6453e056562d91f597552021e6ae7/net/sctp/ipv6.c", "raw_url": "https://github.com/torvalds/linux/raw/95ee6... | static struct sock *sctp_v6_create_accept_sk(struct sock *sk,
struct sctp_association *asoc)
{
struct sock *newsk;
struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
struct sctp6_sock *newsctp6sk;
newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_prot);
if (!newsk)
goto out;
sock_init_data(NULL... | static struct sock *sctp_v6_create_accept_sk(struct sock *sk,
struct sctp_association *asoc)
{
struct sock *newsk;
struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
struct sctp6_sock *newsctp6sk;
newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_prot);
if (!newsk)
goto out;
sock_init_data(NULL... | C | null | null | null | @@ -204,44 +204,23 @@ static void sctp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
in6_dev_put(idev);
}
-/* Based on tcp_v6_xmit() in tcp_ipv6.c. */
static int sctp_v6_xmit(struct sk_buff *skb, struct sctp_transport *transport)
{
struct sock *sk = skb->sk;
struct ipv6_pinfo *np = inet6_sk(sk);
-... | linux | 95ee62083cb6453e056562d91f597552021e6ae7 | 662ca437e714caaab855b12415d6ffd815985bc0 | 0 | static struct sock *sctp_v6_create_accept_sk(struct sock *sk,
struct sctp_association *asoc)
{
struct sock *newsk;
struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
struct sctp6_sock *newsctp6sk;
newsk = sk_alloc(sock_net(sk), PF_INET6, GFP_KERNEL, sk->sk_prot);
if (!newsk)
goto out;
sock_init_data(NULL... |
103,905 | null | Remote | Not required | Partial | CVE-2011-2861 | https://www.cvedetails.com/cve/CVE-2011-2861/ | CWE-20 | Medium | Partial | Partial | null | 2011-09-19 | 6.8 | Google Chrome before 14.0.835.163 does not properly handle strings in PDF documents, which allows remote attackers to have an unspecified impact via a crafted document that triggers an incorrect read operation. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/8262245d384be025f13e2a5b3a03b7e5c98374ce | 8262245d384be025f13e2a5b3a03b7e5c98374ce | DevTools: move DevToolsAgent/Client into content.
BUG=84078
TEST=
Review URL: http://codereview.chromium.org/7461019
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@93596 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/renderer/render_view.cc | {"sha": "24059d48a3bcbe447efb7408f77415576f0c36a4", "filename": "chrome/browser/chrome_content_browser_client.cc", "status": "modified", "additions": 0, "deletions": 1, "changes": 1, "blob_url": "https://github.com/chromium/chromium/blob/8262245d384be025f13e2a5b3a03b7e5c98374ce/chrome/browser/chrome_content_browser_cli... | void RenderView::frameDetached(WebFrame* frame) {
FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameDetached(frame));
}
| void RenderView::frameDetached(WebFrame* frame) {
FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameDetached(frame));
}
| C | null | null | null | @@ -40,6 +40,7 @@
#include "content/common/url_constants.h"
#include "content/common/view_messages.h"
#include "content/renderer/content_renderer_client.h"
+#include "content/renderer/devtools_agent.h"
#include "content/renderer/device_orientation_dispatcher.h"
#include "content/renderer/mhtml_generator.h"
#inclu... | Chrome | 8262245d384be025f13e2a5b3a03b7e5c98374ce | 2469a22063c3539147f55fe899a8dabc12901c01 | 0 | void RenderView::frameDetached(WebFrame* frame) {
FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameDetached(frame));
}
|
109,107 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2012-11 | null | 0 | https://github.com/chromium/chromium/commit/d1a59e4e845a01d7d7b80ef184b672752a9eae4d | d1a59e4e845a01d7d7b80ef184b672752a9eae4d | Fixing cross-process postMessage replies on more than two iterations.
When two frames are replying to each other using event.source across processes,
after the first two replies, things break down. The root cause is that in
RenderViewImpl::GetFrameByMappedID, the lookup was incorrect. It is now
properly searching fo... | 0 | content/renderer/render_view_impl.cc | {"sha": "63ed831e8ed1453c1c1f39c4d80c1fc21fce8429", "filename": "content/browser/renderer_host/render_view_host_manager_browsertest.cc", "status": "modified", "additions": 5, "deletions": 4, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/d1a59e4e845a01d7d7b80ef184b672752a9eae4d/content/browser/ren... | void RenderViewImpl::didLoadResourceFromMemoryCache(
WebFrame* frame, const WebURLRequest& request,
const WebURLResponse& response) {
GURL url(request.url());
if (url.SchemeIs("data"))
return;
Send(new ViewHostMsg_DidLoadResourceFromMemoryCache(
routing_id_,
url,
response.securityIn... | void RenderViewImpl::didLoadResourceFromMemoryCache(
WebFrame* frame, const WebURLRequest& request,
const WebURLResponse& response) {
GURL url(request.url());
if (url.SchemeIs("data"))
return;
Send(new ViewHostMsg_DidLoadResourceFromMemoryCache(
routing_id_,
url,
response.securityIn... | C | null | null | null | @@ -3905,12 +3905,13 @@ void RenderViewImpl::CreateFrameTree(WebKit::WebFrame* frame,
}
}
-WebKit::WebFrame* RenderViewImpl::GetFrameByMappedID(int frame_id) {
- std::map<int, int>::iterator it = active_frame_id_map_.find(frame_id);
- if (it == active_frame_id_map_.end())
- return NULL;
-
- return FindFrame... | Chrome | d1a59e4e845a01d7d7b80ef184b672752a9eae4d | 5c6fe1f82c4dcd02695537d05423576bca388fea | 0 | void RenderViewImpl::didLoadResourceFromMemoryCache(
WebFrame* frame, const WebURLRequest& request,
const WebURLResponse& response) {
// The recipients of this message have no use for data: URLs: they don't
// affect the page's insecure content list and are not in the disk cache. To
// prevent large (1M+)... |
63,981 | null | Remote | Not required | Partial | CVE-2017-9994 | https://www.cvedetails.com/cve/CVE-2017-9994/ | CWE-119 | Medium | Partial | Partial | null | 2017-06-28 | 6.8 | libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a... | 2019-01-08 | DoS Overflow | 0 | https://github.com/FFmpeg/FFmpeg/commit/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | 6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | avcodec/webp: Always set pix_fmt
Fixes: out of array access
Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632
Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Reviewed-by: "Ronald S. Bultje" <rsbult... | 0 | libavcodec/vp8.c | {"sha": "5bf601a8ef9654bbf29ca7b339bf865cee22ea88", "filename": "libavcodec/vp8.c", "status": "modified", "additions": 2, "deletions": 0, "changes": 2, "blob_url": "https://github.com/FFmpeg/FFmpeg/blob/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef/libavcodec/vp8.c", "raw_url": "https://github.com/FFmpeg/FFmpeg/raw/6b5d3fb2... | static void update_refs(VP8Context *s)
{
VP56RangeCoder *c = &s->c;
int update_golden = vp8_rac_get(c);
int update_altref = vp8_rac_get(c);
s->update_golden = ref_to_update(s, update_golden, VP56_FRAME_GOLDEN);
s->update_altref = ref_to_update(s, update_altref, VP56_FRAME_GOLDEN2);
}
| static void update_refs(VP8Context *s)
{
VP56RangeCoder *c = &s->c;
int update_golden = vp8_rac_get(c);
int update_altref = vp8_rac_get(c);
s->update_golden = ref_to_update(s, update_golden, VP56_FRAME_GOLDEN);
s->update_altref = ref_to_update(s, update_altref, VP56_FRAME_GOLDEN2);
}
| C | null | null | null | @@ -2550,6 +2550,8 @@ int vp78_decode_frame(AVCodecContext *avctx, void *data, int *got_frame,
enum AVDiscard skip_thresh;
VP8Frame *av_uninit(curframe), *prev_frame;
+ av_assert0(avctx->pix_fmt == AV_PIX_FMT_YUVA420P || avctx->pix_fmt == AV_PIX_FMT_YUV420P);
+
if (is_vp7)
ret = vp7_decode_... | FFmpeg | 6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | 942036e97c8b149ce2f3ec6e7cbc990df8713d0c | 0 | static void update_refs(VP8Context *s)
{
VP56RangeCoder *c = &s->c;
int update_golden = vp8_rac_get(c);
int update_altref = vp8_rac_get(c);
s->update_golden = ref_to_update(s, update_golden, VP56_FRAME_GOLDEN);
s->update_altref = ref_to_update(s, update_altref, VP56_FRAME_GOLDEN2);
}
|
121,812 | null | Remote | Not required | Partial | CVE-2013-2856 | https://www.cvedetails.com/cve/CVE-2013-2856/ | CWE-416 | Low | Partial | Partial | null | 2013-06-04 | 7.5 | Use-after-free vulnerability in Google Chrome before 27.0.1453.110 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input. | 2017-09-18 | DoS | 0 | https://github.com/chromium/chromium/commit/e68fafe04d29810cebe8d25554863b0cae4c1356 | e68fafe04d29810cebe8d25554863b0cae4c1356 | Map posix error codes in bind better, and fix one windows mapping.
r=wtc
BUG=330233
Review URL: https://codereview.chromium.org/101193008
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@242224 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | net/udp/udp_socket_win.cc | {"sha": "a51567df05db48794cd0db51018958e88b54b944", "filename": "net/udp/udp_socket_libevent.cc", "status": "modified", "additions": 8, "deletions": 1, "changes": 9, "blob_url": "https://github.com/chromium/chromium/blob/e68fafe04d29810cebe8d25554863b0cae4c1356/net/udp/udp_socket_libevent.cc", "raw_url": "https://githu... | UDPSocketWin::UDPSocketWin(DatagramSocket::BindType bind_type,
const RandIntCallback& rand_int_cb,
net::NetLog* net_log,
const net::NetLog::Source& source)
: socket_(INVALID_SOCKET),
addr_family_(0),
socket_options_(SOCKET_... | UDPSocketWin::UDPSocketWin(DatagramSocket::BindType bind_type,
const RandIntCallback& rand_int_cb,
net::NetLog* net_log,
const net::NetLog::Source& source)
: socket_(INVALID_SOCKET),
addr_family_(0),
socket_options_(SOCKET_... | C | null | null | null | @@ -339,7 +339,7 @@ int UDPSocketWin::InternalConnect(const IPEndPoint& address) {
// else connect() does the DatagramSocket::DEFAULT_BIND
if (rv < 0) {
- UMA_HISTOGRAM_SPARSE_SLOWLY("Net.UdpSocketRandomBindErrorCode", rv);
+ UMA_HISTOGRAM_SPARSE_SLOWLY("Net.UdpSocketRandomBindErrorCode", -rv);
Close... | Chrome | e68fafe04d29810cebe8d25554863b0cae4c1356 | af540a4511352caf66aa9292c2c743f5c2d74c12 | 0 | UDPSocketWin::UDPSocketWin(DatagramSocket::BindType bind_type,
const RandIntCallback& rand_int_cb,
net::NetLog* net_log,
const net::NetLog::Source& source)
: socket_(INVALID_SOCKET),
addr_family_(0),
socket_options_(SOCKET_... |
7,162 | null | Remote | Not required | Partial | CVE-2014-9659 | https://www.cvedetails.com/cve/CVE-2014-9659/ | CWE-119 | Low | Partial | Partial | null | 2015-02-08 | 7.5 | cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font. NOTE: this vulnerability exists... | 2018-10-30 | DoS Exec Code Overflow | 0 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2cdc4562f873237f1c77d43540537c7a721d3fd8 | 2cdc4562f873237f1c77d43540537c7a721d3fd8 | null | 0 | null | null | cf2_hintmask_init( CF2_HintMask hintmask,
FT_Error* error )
{
FT_ZERO( hintmask );
hintmask->error = error;
}
| cf2_hintmask_init( CF2_HintMask hintmask,
FT_Error* error )
{
FT_ZERO( hintmask );
hintmask->error = error;
}
| C | null | null | 8fa69a88d75fd374ea86a9869f6e74a924926e49 | @@ -4,7 +4,7 @@
/* */
/* Adobe's CFF Interpreter (body). */
/* */
-/* Copyright 2007-2013 Adobe Systems Incorporated. ... | savannah | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cf2intrp.c?id=2cdc4562f873237f1c77d43540537c7a721d3fd8 | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/cff/cf2intrp.c?id=8fa69a88d75fd374ea86a9869f6e74a924926e49 | 0 | cf2_hintmask_init( CF2_HintMask hintmask,
FT_Error* error )
{
FT_ZERO( hintmask );
hintmask->error = error;
}
|
115,394 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2012-02 | null | 0 | https://github.com/chromium/chromium/commit/dc3857aac17be72c96f28d860d875235b3be349a | dc3857aac17be72c96f28d860d875235b3be349a | Unreviewed, rolling out r142736.
http://trac.webkit.org/changeset/142736
https://bugs.webkit.org/show_bug.cgi?id=109716
Broke ABI, nightly builds crash on launch (Requested by ap on
#webkit).
Patch by Sheriff Bot <webkit.review.bot@gmail.com> on 2013-02-13
Source/WebKit2:
* Shared/APIClientTraits.cpp:
(WebKit):
* S... | 0 | third_party/WebKit/Tools/WebKitTestRunner/InjectedBundle/InjectedBundlePage.cpp | {"sha": "4747a285ac89a42c70faaaabb65a017f86d1d0ad", "filename": "third_party/WebKit/Source/WebKit2/ChangeLog", "status": "modified", "additions": 19, "deletions": 0, "changes": 19, "blob_url": "https://github.com/chromium/chromium/blob/dc3857aac17be72c96f28d860d875235b3be349a/third_party/WebKit/Source/WebKit2/ChangeLog... | void InjectedBundlePage::didFinishLoadForResource(WKBundlePageRef page, WKBundleFrameRef frame, uint64_t identifier, const void* clientInfo)
{
static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->didFinishLoadForResource(page, frame, identifier);
}
| void InjectedBundlePage::didFinishLoadForResource(WKBundlePageRef page, WKBundleFrameRef frame, uint64_t identifier, const void* clientInfo)
{
static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->didFinishLoadForResource(page, frame, identifier);
}
| C | null | null | null | @@ -319,6 +319,8 @@ InjectedBundlePage::InjectedBundlePage(WKBundlePageRef page)
0, // willDestroyGlobalObjectForDOMWindowExtension
didFinishProgress, // didFinishProgress
0, // shouldForceUniversalAccessFromLocalURL
+ 0, // didReceiveIntentForFrame
+ 0, // registerIntentService... | Chrome | dc3857aac17be72c96f28d860d875235b3be349a | cd2d7b3da48d2727a9f8f555b0af79169dce0918 | 0 | void InjectedBundlePage::didFinishLoadForResource(WKBundlePageRef page, WKBundleFrameRef frame, uint64_t identifier, const void* clientInfo)
{
static_cast<InjectedBundlePage*>(const_cast<void*>(clientInfo))->didFinishLoadForResource(page, frame, identifier);
}
|
159,016 | null | Remote | Not required | Partial | CVE-2018-6031 | https://www.cvedetails.com/cve/CVE-2018-6031/ | CWE-416 | Medium | Partial | Partial | null | 2018-09-25 | 6.8 | Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | 2018-11-20 | null | 0 | https://github.com/chromium/chromium/commit/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | 01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | [pdf] Use a temporary list when unloading pages
When traversing the |deferred_page_unloads_| list and handling the
unloads it's possible for new pages to get added to the list which will
invalidate the iterator.
This CL swaps the list with an empty list and does the iteration on the
list copy. New items that are unlo... | 0 | pdf/pdfium/pdfium_engine.cc | {"sha": "7c6b7da1c70f4071d071d2f111be90a01b1233b3", "filename": "pdf/pdfium/pdfium_engine.cc", "status": "modified", "additions": 8, "deletions": 2, "changes": 10, "blob_url": "https://github.com/chromium/chromium/blob/01c9a7e71ca435651723e8cbcab0b3ad4c5351e2/pdf/pdfium/pdfium_engine.cc", "raw_url": "https://github.com... | void PDFiumEngine::ScrolledToYPosition(int position) {
CancelPaints();
int old_y = position_.y();
position_.set_y(position);
CalculateVisiblePages();
client_->Scroll(pp::Point(0, old_y - position));
OnSelectionChanged();
}
| void PDFiumEngine::ScrolledToYPosition(int position) {
CancelPaints();
int old_y = position_.y();
position_.set_y(position);
CalculateVisiblePages();
client_->Scroll(pp::Point(0, old_y - position));
OnSelectionChanged();
}
| C | null | null | null | @@ -1405,9 +1405,15 @@ bool PDFiumEngine::HandleEvent(const pp::InputEvent& event) {
DCHECK(defer_page_unload_);
defer_page_unload_ = false;
- for (int page_index : deferred_page_unloads_)
+
+ // Store the pages to unload away because the act of unloading pages can cause
+ // there to be more pages to unload... | Chrome | 01c9a7e71ca435651723e8cbcab0b3ad4c5351e2 | 345dab421e9ff30af4f11fc0b55ab02bdd7d1011 | 0 | void PDFiumEngine::ScrolledToYPosition(int position) {
CancelPaints();
int old_y = position_.y();
position_.set_y(position);
CalculateVisiblePages();
client_->Scroll(pp::Point(0, old_y - position));
OnSelectionChanged();
}
|
3,429 | null | Remote | Not required | null | CVE-2011-1428 | https://www.cvedetails.com/cve/CVE-2011-1428/ | CWE-20 | Medium | Partial | Partial | null | 2011-03-16 | 5.8 | Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS AP... | 2011-03-22 | null | 0 | https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commit;h=c265cad1c95b84abfd4e8d861f25926ef13b5d91 | c265cad1c95b84abfd4e8d861f25926ef13b5d91 | null | 0 | null | null | hook_process_child (struct t_hook *hook_process)
{
char *exec_args[4] = { "sh", "-c", NULL, NULL };
/*
* close stdin, so that process will fail to read stdin (process reading
* stdin should not be run inside WeeChat!)
*/
close (STDIN_FILENO);
/* redirect stdout/stderr to pipe (s... | hook_process_child (struct t_hook *hook_process)
{
char *exec_args[4] = { "sh", "-c", NULL, NULL };
/*
* close stdin, so that process will fail to read stdin (process reading
* stdin should not be run inside WeeChat!)
*/
close (STDIN_FILENO);
/* redirect stdout/stderr to pipe (s... | C | null | null | bf2f7d33ef7c906142a839ad97bb81d8f13b0c6f | @@ -1700,7 +1700,40 @@ hook_connect (struct t_weechat_plugin *plugin, const char *proxy, const char *ad
}
/*
- * hook_connect_gnutls_set_certificates: set gnutls
+ * hook_connect_gnutls_verify_certificates: verify certificates
+ */
+
+#ifdef HAVE_GNUTLS
+int
+hook_connect_gnutls_verify_certificates (gnutls_session_... | savannah | https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=blob;f=src/core/wee-hook.c;h=606c878c97878fc8078c9491b363dd93844c9e26;hb=c265cad1c95b84abfd4e8d861f25926ef13b5d91 | https://git.savannah.gnu.org/gitweb/?p=weechat.git;a=blob;f=src/core/wee-hook.c;h=87942064dcbe6749c3f1adb71d3e0b0604870f74 | 0 | hook_process_child (struct t_hook *hook_process)
{
char *exec_args[4] = { "sh", "-c", NULL, NULL };
/*
* close stdin, so that process will fail to read stdin (process reading
* stdin should not be run inside WeeChat!)
*/
close (STDIN_FILENO);
/* redirect stdout/stderr to pipe (s... |
151,324 | null | Remote | Not required | Partial | CVE-2017-5009 | https://www.cvedetails.com/cve/CVE-2017-5009/ | CWE-119 | Medium | Partial | Partial | null | 2017-02-17 | 6.8 | WebRTC in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to perform proper bounds checking, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2018-01-04 | Overflow | 0 | https://github.com/chromium/chromium/commit/1c40f9042ae2d6ee7483d72998aabb5e73b2ff60 | 1c40f9042ae2d6ee7483d72998aabb5e73b2ff60 | DevTools: send proper resource type in Network.RequestWillBeSent
This patch plumbs resoure type into the DispatchWillSendRequest
instrumenation. This allows us to report accurate type in
Network.RequestWillBeSent event, instead of "Other", that we report
today.
BUG=765501
R=dgozman
Change-Id: I0134c08b841e8dd247fdc8... | 0 | third_party/WebKit/Source/core/inspector/InspectorTraceEvents.cpp | {"sha": "e0315835867b0b88b2fac25e800f67fc9c9ce7b2", "filename": "third_party/WebKit/LayoutTests/http/tests/devtools/network/network-imported-resource-content-expected.txt", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/1c40f9042ae2d6ee7483d729... | std::unique_ptr<TracedValue> InspectorPaintImageEvent::Data(
const LayoutObject* owning_layout_object,
const ImageResourceContent& image_resource) {
std::unique_ptr<TracedValue> value = TracedValue::Create();
SetGeneratingNodeInfo(value.get(), owning_layout_object, "nodeId");
value->SetString("url", image... | std::unique_ptr<TracedValue> InspectorPaintImageEvent::Data(
const LayoutObject* owning_layout_object,
const ImageResourceContent& image_resource) {
std::unique_ptr<TracedValue> value = TracedValue::Create();
SetGeneratingNodeInfo(value.get(), owning_layout_object, "nodeId");
value->SetString("url", image... | C | null | null | null | @@ -114,7 +114,8 @@ void InspectorTraceEvents::WillSendRequest(
DocumentLoader* loader,
ResourceRequest& request,
const ResourceResponse& redirect_response,
- const FetchInitiatorInfo&) {
+ const FetchInitiatorInfo&,
+ Resource::Type) {
LocalFrame* frame = loader ? loader->GetFrame() : nullpt... | Chrome | 1c40f9042ae2d6ee7483d72998aabb5e73b2ff60 | 1fab25bdd1a38c7f760dee27b06348257e0d0971 | 0 | std::unique_ptr<TracedValue> InspectorPaintImageEvent::Data(
const LayoutObject* owning_layout_object,
const ImageResourceContent& image_resource) {
std::unique_ptr<TracedValue> value = TracedValue::Create();
SetGeneratingNodeInfo(value.get(), owning_layout_object, "nodeId");
value->SetString("url", image... |
28,576 | null | Local | Not required | Complete | CVE-2013-6381 | https://www.cvedetails.com/cve/CVE-2013-6381/ | CWE-119 | Medium | Complete | Complete | null | 2013-11-26 | 6.9 | Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size. | 2016-12-30 | DoS Overflow | 0 | https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | 6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | qeth: avoid buffer overflow in snmp ioctl
Check user-defined length in snmp ioctl request and allow request
only if it fits into a qeth command buffer.
Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com>
Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com>
Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c... | 0 | drivers/s390/net/qeth_core_main.c | {"sha": "bd8c09e7a8d9f519928be75819255cfe05bab2b7", "filename": "drivers/s390/net/qeth_core_main.c", "status": "modified", "additions": 5, "deletions": 1, "changes": 6, "blob_url": "https://github.com/torvalds/linux/blob/6fb392b1a63ae36c31f62bc3fc8630b49d602b62/drivers/s390/net/qeth_core_main.c", "raw_url": "https://gi... | static int qeth_hw_trap_cb(struct qeth_card *card,
struct qeth_reply *reply, unsigned long data)
{
struct qeth_ipa_cmd *cmd;
__u16 rc;
cmd = (struct qeth_ipa_cmd *)data;
rc = cmd->hdr.return_code;
if (rc)
QETH_CARD_TEXT_(card, 2, "trapc:%x", rc);
return 0;
}
| static int qeth_hw_trap_cb(struct qeth_card *card,
struct qeth_reply *reply, unsigned long data)
{
struct qeth_ipa_cmd *cmd;
__u16 rc;
cmd = (struct qeth_ipa_cmd *)data;
rc = cmd->hdr.return_code;
if (rc)
QETH_CARD_TEXT_(card, 2, "trapc:%x", rc);
return 0;
}
| C | null | null | null | @@ -4451,7 +4451,7 @@ int qeth_snmp_command(struct qeth_card *card, char __user *udata)
struct qeth_cmd_buffer *iob;
struct qeth_ipa_cmd *cmd;
struct qeth_snmp_ureq *ureq;
- int req_len;
+ unsigned int req_len;
struct qeth_arp_query_info qinfo = {0, };
int rc = 0;
@@ -4467,6 +4467,10 @@ int qeth_snmp_comman... | linux | 6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | 17102f8be41699525cfeeab02adbaf969b156731 | 0 | static int qeth_hw_trap_cb(struct qeth_card *card,
struct qeth_reply *reply, unsigned long data)
{
struct qeth_ipa_cmd *cmd;
__u16 rc;
cmd = (struct qeth_ipa_cmd *)data;
rc = cmd->hdr.return_code;
if (rc)
QETH_CARD_TEXT_(card, 2, "trapc:%x", rc);
return 0;
}
|
135,205 | null | Remote | Not required | Partial | CVE-2015-6768 | https://www.cvedetails.com/cve/CVE-2015-6768/ | CWE-264 | Low | Partial | Partial | null | 2015-12-05 | 7.5 | The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770. | 2017-09-13 | Bypass | 0 | https://github.com/chromium/chromium/commit/4c8b008f055f79e622344627fed7f820375a4f01 | 4c8b008f055f79e622344627fed7f820375a4f01 | Change Document::detach() to RELEASE_ASSERT all subframes are gone.
BUG=556724,577105
Review URL: https://codereview.chromium.org/1667573002
Cr-Commit-Position: refs/heads/master@{#373642} | 0 | third_party/WebKit/Source/core/dom/Document.cpp | {"sha": "112c8cd99e3f5587281d9fe297c61e280725fcbd", "filename": "third_party/WebKit/Source/core/dom/Document.cpp", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/4c8b008f055f79e622344627fed7f820375a4f01/third_party/WebKit/Source/core/dom/Docume... | void Document::didLoadAllScriptBlockingResources()
{
loadingTaskRunner()->postTask(BLINK_FROM_HERE, m_executeScriptsWaitingForResourcesTask->cancelAndCreate());
if (frame())
frame()->loader().client()->didRemoveAllPendingStylesheet();
if (m_gotoAnchorNeededAfterStylesheetsLoad && view())
v... | void Document::didLoadAllScriptBlockingResources()
{
loadingTaskRunner()->postTask(BLINK_FROM_HERE, m_executeScriptsWaitingForResourcesTask->cancelAndCreate());
if (frame())
frame()->loader().client()->didRemoveAllPendingStylesheet();
if (m_gotoAnchorNeededAfterStylesheetsLoad && view())
v... | C | null | null | null | @@ -2189,7 +2189,7 @@ void Document::attach(const AttachContext& context)
void Document::detach(const AttachContext& context)
{
TRACE_EVENT0("blink", "Document::detach");
- ASSERT(!m_frame || m_frame->tree().childCount() == 0);
+ RELEASE_ASSERT(!m_frame || m_frame->tree().childCount() == 0);
if (!isAc... | Chrome | 4c8b008f055f79e622344627fed7f820375a4f01 | 6bc4255ecd25658b430cec1f6191e0044c5e6c7f | 0 | void Document::didLoadAllScriptBlockingResources()
{
loadingTaskRunner()->postTask(BLINK_FROM_HERE, m_executeScriptsWaitingForResourcesTask->cancelAndCreate());
if (frame())
frame()->loader().client()->didRemoveAllPendingStylesheet();
if (m_gotoAnchorNeededAfterStylesheetsLoad && view())
v... |
129,531 | null | Remote | Not required | Partial | CVE-2014-3173 | https://www.cvedetails.com/cve/CVE-2014-3173/ | CWE-119 | Low | null | null | null | 2014-08-26 | 5 | The WebGL implementation in Google Chrome before 37.0.2062.94 does not ensure that clear calls interact properly with the state of a draw buffer, which allows remote attackers to cause a denial of service (read of uninitialized memory) via a crafted CANVAS element, related to gpu/command_buffer/service/framebuffer_mana... | 2017-08-28 | DoS Overflow | 0 | https://github.com/chromium/chromium/commit/ee7579229ff7e9e5ae28bf53aea069251499d7da | ee7579229ff7e9e5ae28bf53aea069251499d7da | Framebuffer clear() needs to consider the situation some draw buffers are disabled.
This is when we expose DrawBuffers extension.
BUG=376951
TEST=the attached test case, webgl conformance
R=kbr@chromium.org,bajones@chromium.org
Review URL: https://codereview.chromium.org/315283002
git-svn-id: svn://svn.chromium.org... | 0 | gpu/command_buffer/service/gles2_cmd_decoder.cc | {"sha": "4022b3defaa1e286e85e72f7ac6aa702fa1e9fb2", "filename": "gpu/command_buffer/service/framebuffer_manager.cc", "status": "modified", "additions": 51, "deletions": 0, "changes": 51, "blob_url": "https://github.com/chromium/chromium/blob/ee7579229ff7e9e5ae28bf53aea069251499d7da/gpu/command_buffer/service/framebuffe... | virtual ~AsyncUploadTokenCompletionObserver() {
}
| virtual ~AsyncUploadTokenCompletionObserver() {
}
| C | null | null | null | @@ -3076,7 +3076,20 @@ bool GLES2DecoderImpl::CheckFramebufferValid(
glClearDepth(1.0f);
state_.SetDeviceDepthMask(GL_TRUE);
state_.SetDeviceCapabilityState(GL_SCISSOR_TEST, false);
+ bool reset_draw_buffer = false;
+ if ((backbuffer_needs_clear_bits_ | GL_COLOR_BUFFER_BIT) != 0 &&
+ ... | Chrome | ee7579229ff7e9e5ae28bf53aea069251499d7da | 38f4c0adff7b42decb912e5382a57e35729315a0 | 0 | virtual ~AsyncUploadTokenCompletionObserver() {
}
|
177,177 | null | Remote | Not required | Complete | CVE-2016-2476 | https://www.cvedetails.com/cve/CVE-2016-2476/ | CWE-119 | Medium | Complete | Complete | null | 2016-06-12 | 9.3 | mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 does not validate OMX buffer sizes, which allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27207275. | 2016-06-13 | Overflow +Priv | 0 | https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff | 295c883fe3105b19bcd0f9e07d54c6b589fc5bff | DO NOT MERGE Verify OMX buffer sizes prior to access
Bug: 27207275
Change-Id: I4412825d1ee233d993af0a67708bea54304ff62d
| 0 | media/libstagefright/omx/SoftVideoDecoderOMXComponent.cpp | {"filename": "media/libmedia/IOMX.cpp", "raw_url": "https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/media/libmedia/IOMX.cpp", "patch": "@@ -18,6 +18,8 @@\n\n #define LOG_TAG \"IOMX\"\n #include <utils/Log.h>\n \n+#include <sys/mman.h>\n+\n #include <binder/IMemory.h>\n... | uint32_t SoftVideoDecoderOMXComponent::outputBufferHeight() {
return mIsAdaptive ? mAdaptiveMaxHeight : mHeight;
}
| uint32_t SoftVideoDecoderOMXComponent::outputBufferHeight() {
return mIsAdaptive ? mAdaptiveMaxHeight : mHeight;
}
| C | null | null | null | @@ -264,6 +264,10 @@
OMX_VIDEO_PARAM_PORTFORMATTYPE *formatParams =
(OMX_VIDEO_PARAM_PORTFORMATTYPE *)params;
+ if (!isValidOMXParam(formatParams)) {
+ return OMX_ErrorBadParameter;
+ }
+
if (formatParams->nPortIndex > kMaxPortIndex) {
... | Android | https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff/ | https://android.googlesource.com/platform/frameworks/av/+/295c883fe3105b19bcd0f9e07d54c6b589fc5bff%5E/ | 0 | uint32_t SoftVideoDecoderOMXComponent::outputBufferHeight() {
return mIsAdaptive ? mAdaptiveMaxHeight : mHeight;
}
|
182,243 | null | Local | Not required | Partial | CVE-2018-16425 | https://www.cvedetails.com/cve/CVE-2018-16425/ | CWE-415 | Low | Partial | Partial | null | 2018-09-03 | 4.6 | A double free when handling responses from an HSM Card in sc_pkcs15emu_sc_hsm_init in libopensc/pkcs15-sc-hsm.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | 2019-09-11 | DoS | 1 | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5 | 360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | src/libopensc/card-cac.c | {"sha": "756788a0fbbbed8487e8cf33b6115bb4d4f58860", "filename": "src/libopensc/card-cac.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/OpenSC/OpenSC/blob/360e95d45ac4123255a4c796db96337f332160ad/src/libopensc/card-cac.c", "raw_url": "https://github.com/OpenSC/Ope... | static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial)
{
cac_private_data_t * priv = CAC_DATA(card);
SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL);
if (card->serialnr.len) {
*serial = card->serialnr;
SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL... | static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial)
{
cac_private_data_t * priv = CAC_DATA(card);
SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL);
if (card->serialnr.len) {
*serial = card->serialnr;
SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL... | C | memcpy(serial->value, priv->cac_id, serial->len);
| memcpy(serial->value, priv->cac_id, priv->cac_id_len);
| null | @@ -794,7 +794,7 @@ static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* seri
}
if (priv->cac_id_len) {
serial->len = MIN(priv->cac_id_len, SC_MAX_SERIALNR);
- memcpy(serial->value, priv->cac_id, priv->cac_id_len);
+ memcpy(serial->value, priv->cac_id, serial->len);
SC_FUNC_RET... | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5 | 8fe377e93b4b56060e5bbfb6f3142ceaeca744fa | 1 | static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial)
{
cac_private_data_t * priv = CAC_DATA(card);
SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL);
if (card->serialnr.len) {
*serial = card->serialnr;
SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL... |
163,312 | null | Remote | Not required | null | CVE-2017-15423 | https://www.cvedetails.com/cve/CVE-2017-15423/ | CWE-310 | Low | Partial | null | null | 2018-08-28 | 5 | Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic. | 2018-11-02 | null | 0 | https://github.com/chromium/chromium/commit/a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2 | a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2 | Roll src/third_party/boringssl/src 664e99a64..696c13bd6
https://boringssl.googlesource.com/boringssl/+log/664e99a6486c293728097c661332f92bf2d847c6..696c13bd6ab78011adfe7b775519c8b7cc82b604
BUG=778101
Change-Id: I8dda4f3db952597148e3c7937319584698d00e1c
Reviewed-on: https://chromium-review.googlesource.com/747941
Rev... | 0 | content/renderer/render_thread_impl.cc | {"sha": "7574d5f80ec19444322f211bc11c16f21d8f8a26", "filename": "DEPS", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2/DEPS", "raw_url": "https://github.com/chromium/chromium/raw/a263d1cf62a9c75be6aaafde... | RenderThreadImpl::CreateMediaStreamCenter(
blink::WebMediaStreamCenterClient* client) {
std::unique_ptr<blink::WebMediaStreamCenter> media_stream_center;
#if BUILDFLAG(ENABLE_WEBRTC)
if (!media_stream_center) {
media_stream_center =
GetContentClient()->renderer()->OverrideCreateWebMediaStreamCenter(... | RenderThreadImpl::CreateMediaStreamCenter(
blink::WebMediaStreamCenterClient* client) {
std::unique_ptr<blink::WebMediaStreamCenter> media_stream_center;
#if BUILDFLAG(ENABLE_WEBRTC)
if (!media_stream_center) {
media_stream_center =
GetContentClient()->renderer()->OverrideCreateWebMediaStreamCenter(... | C | null | null | null | @@ -994,9 +994,6 @@ void RenderThreadImpl::Init(
if (!command_line.HasSwitch(switches::kSingleProcess))
base::SequencedWorkerPool::EnableForProcess();
- EVP_set_buggy_rsa_parser(
- base::FeatureList::IsEnabled(features::kBuggyRSAParser));
-
GetConnector()->BindInterface(mojom::kBrowserServiceName,
... | Chrome | a263d1cf62a9c75be6aaafdec88aacfcef1e8fd2 | 0fe9417f1d39231fa41c41d8eeaa1afde8d364a3 | 0 | RenderThreadImpl::CreateMediaStreamCenter(
blink::WebMediaStreamCenterClient* client) {
std::unique_ptr<blink::WebMediaStreamCenter> media_stream_center;
#if BUILDFLAG(ENABLE_WEBRTC)
if (!media_stream_center) {
media_stream_center =
GetContentClient()->renderer()->OverrideCreateWebMediaStreamCenter(... |
176,940 | null | Remote | Not required | Complete | CVE-2016-2496 | https://www.cvedetails.com/cve/CVE-2016-2496/ | CWE-264 | Low | Complete | Complete | null | 2016-06-12 | 10 | The Framework UI permission-dialog implementation in Android 6.x before 2016-06-01 allows attackers to conduct tapjacking attacks and access arbitrary private-storage files by creating a partially overlapping window, aka internal bug 26677796. | 2016-06-14 | null | 0 | https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf | 03a53d1c7765eeb3af0bc34c3dff02ada1953fbf | Add new MotionEvent flag for partially obscured windows.
Due to more complex window layouts resulting in lots of overlapping
windows, the policy around FLAG_WINDOW_IS_OBSCURED has changed to
only be set when the point at which the window was touched is
obscured. Unfortunately, this doesn't prevent tapjacking attacks t... | 0 | services/inputflinger/InputDispatcher.cpp | {"filename": "include/input/Input.h", "raw_url": "https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf/include/input/Input.h", "patch": "@@ -45,6 +45,19 @@\n\n };\n \n enum {\n+\n+ /**\n+ * This flag indicates that the window that received this motion event is pa... | ssize_t InputDispatcher::getConnectionIndexLocked(const sp<InputChannel>& inputChannel) {
ssize_t connectionIndex = mConnectionsByFd.indexOfKey(inputChannel->getFd());
if (connectionIndex >= 0) {
sp<Connection> connection = mConnectionsByFd.valueAt(connectionIndex);
if (connection->inputChannel.get() == inpu... | ssize_t InputDispatcher::getConnectionIndexLocked(const sp<InputChannel>& inputChannel) {
ssize_t connectionIndex = mConnectionsByFd.indexOfKey(inputChannel->getFd());
if (connectionIndex >= 0) {
sp<Connection> connection = mConnectionsByFd.valueAt(connectionIndex);
if (connection->inputChannel.get() == inpu... | C | null | null | null | @@ -1225,6 +1225,8 @@
int32_t outsideTargetFlags = InputTarget::FLAG_DISPATCH_AS_OUTSIDE;
if (isWindowObscuredAtPointLocked(windowHandle, x, y)) {
outsideTargetFlags |= InputTarget::FLAG_WINDOW_IS_OBSCURED;
+ } else if (isWindowObscu... | Android | https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf/ | https://android.googlesource.com/platform/frameworks/native/+/03a53d1c7765eeb3af0bc34c3dff02ada1953fbf%5E/ | 0 | ssize_t InputDispatcher::getConnectionIndexLocked(const sp<InputChannel>& inputChannel) {
ssize_t connectionIndex = mConnectionsByFd.indexOfKey(inputChannel->getFd());
if (connectionIndex >= 0) {
sp<Connection> connection = mConnectionsByFd.valueAt(connectionIndex);
if (connection->inputChannel.get() == inpu... |
96,301 | null | Remote | Not required | Partial | CVE-2015-3215 | https://www.cvedetails.com/cve/CVE-2015-3215/ | CWE-20 | Low | null | null | null | 2017-06-26 | 5 | The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options. | 2017-07-03 | DoS | 0 | https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/723416fa4210b7464b28eab89cc76252e6193ac1 | 723416fa4210b7464b28eab89cc76252e6193ac1 | NetKVM: BZ#1169718: Checking the length only on read
Signed-off-by: Joseph Hindin <yhindin@rehat.com> | 0 | NetKVM/Common/ParaNdis-TX.cpp | {"sha": "9024ba631fc1c6914c41b9af789a6aa9c10bd248", "filename": "NetKVM/Common/ParaNdis-Common.cpp", "status": "modified", "additions": 4, "deletions": 2, "changes": 6, "blob_url": "https://github.com/YanVugenfirer/kvm-guest-drivers-windows/blob/723416fa4210b7464b28eab89cc76252e6193ac1/NetKVM/Common/ParaNdis-Common.cpp... | void CNB::BuildPriorityHeader(PETH_HEADER EthHeader, PVLAN_HEADER VlanHeader) const
{
VlanHeader->TCI = RtlUshortByteSwap(m_ParentNBL->TCI());
if (VlanHeader->TCI != 0)
{
VlanHeader->EthType = EthHeader->EthType;
EthHeader->EthType = RtlUshortByteSwap(PRIO_HEADER_ETH_TYPE);
}
}
| void CNB::BuildPriorityHeader(PETH_HEADER EthHeader, PVLAN_HEADER VlanHeader) const
{
VlanHeader->TCI = RtlUshortByteSwap(m_ParentNBL->TCI());
if (VlanHeader->TCI != 0)
{
VlanHeader->EthType = EthHeader->EthType;
EthHeader->EthType = RtlUshortByteSwap(PRIO_HEADER_ETH_TYPE);
}
}
| C | null | null | null | @@ -649,6 +649,7 @@ void CNB::SetupLSO(virtio_net_hdr_basic *VirtioHeader, PVOID IpHeader, ULONG Eth
tTcpIpPacketParsingResult packetReview;
packetReview = ParaNdis_CheckSumVerifyFlat(reinterpret_cast<IPv4Header*>(IpHeader), EthPayloadLength,
pcrIpChecksum | pcr... | kvm-guest-drivers-windows | 723416fa4210b7464b28eab89cc76252e6193ac1 | 59cb10c492e653d64b273ac33943f227ef41ce47 | 0 | void CNB::BuildPriorityHeader(PETH_HEADER EthHeader, PVLAN_HEADER VlanHeader) const
{
VlanHeader->TCI = RtlUshortByteSwap(m_ParentNBL->TCI());
if (VlanHeader->TCI != 0)
{
VlanHeader->EthType = EthHeader->EthType;
EthHeader->EthType = RtlUshortByteSwap(PRIO_HEADER_ETH_TYPE);
}
}
|
86,947 | null | Remote | Not required | null | CVE-2019-1010294 | https://www.cvedetails.com/cve/CVE-2019-1010294/ | CWE-189 | Low | Partial | null | null | 2019-07-15 | 5 | Linaro/OP-TEE OP-TEE 3.3.0 and earlier is affected by: Rounding error. The impact is: Potentially leaking code and/or data from previous Trusted Application. The component is: optee_os. The fixed version is: 3.4.0 and later. | 2019-07-16 | null | 0 | https://github.com/OP-TEE/optee_os/commit/7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | 7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | core: clear the entire TA area
Previously we cleared (memset to zero) the size corresponding to code
and data segments, however the allocation for the TA is made on the
granularity of the memory pool, meaning that we did not clear all memory
and because of that we could potentially leak code and data of a
previous loa... | 0 | core/arch/arm/kernel/user_ta.c | {"sha": "e70061e36861e277a5e3340843ad80bdbb90c806", "filename": "core/arch/arm/kernel/user_ta.c", "status": "modified", "additions": 6, "deletions": 2, "changes": 8, "blob_url": "https://github.com/OP-TEE/optee_os/blob/7e768f8a473409215fe3fff8f6e31f8a3a0103c6/core/arch/arm/kernel/user_ta.c", "raw_url": "https://github.... | static void release_ta_memory_by_mobj(struct mobj *mobj)
{
void *va;
if (!mobj)
return;
va = mobj_get_va(mobj, 0);
if (!va)
return;
memset(va, 0, mobj->size);
cache_op_inner(DCACHE_AREA_CLEAN, va, mobj->size);
}
| static void release_ta_memory_by_mobj(struct mobj *mobj)
{
void *va;
if (!mobj)
return;
va = mobj_get_va(mobj, 0);
if (!va)
return;
memset(va, 0, mobj->size);
cache_op_inner(DCACHE_AREA_CLEAN, va, mobj->size);
}
| C | null | null | null | @@ -197,8 +197,12 @@ static struct mobj *alloc_ta_mem(size_t size)
#else
struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr);
- if (mobj)
- memset(mobj_get_va(mobj, 0), 0, size);
+ if (mobj) {
+ size_t granularity = BIT(tee_mm_sec_ddr.shift);
+
+ /* Round up to allocation granularity size */
... | optee_os | 7e768f8a473409215fe3fff8f6e31f8a3a0103c6 | 5ee85d76897c95c21fa5eb86d66b288b9b19c62b | 0 | static void release_ta_memory_by_mobj(struct mobj *mobj)
{
void *va;
if (!mobj)
return;
va = mobj_get_va(mobj, 0);
if (!va)
return;
memset(va, 0, mobj->size);
cache_op_inner(DCACHE_AREA_CLEAN, va, mobj->size);
}
|
15,538 | null | Remote | Not required | Partial | CVE-2016-1908 | https://www.cvedetails.com/cve/CVE-2016-1908/ | CWE-254 | Low | Partial | Partial | null | 2017-04-11 | 7.5 | The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as ... | 2018-09-11 | null | 0 | https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c | ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c | null | 0 | null | null | mux_client_request_stdio_fwd(int fd)
{
Buffer m;
char *e;
u_int type, rid, sid;
int devnull;
debug3("%s: entering", __func__);
if ((muxserver_pid = mux_client_request_alive(fd)) == 0) {
error("%s: master alive request failed", __func__);
return -1;
}
signal(SIGPIPE, SIG_IGN);
if (stdin_null_flag) {
i... | mux_client_request_stdio_fwd(int fd)
{
Buffer m;
char *e;
u_int type, rid, sid;
int devnull;
debug3("%s: entering", __func__);
if ((muxserver_pid = mux_client_request_alive(fd)) == 0) {
error("%s: master alive request failed", __func__);
return -1;
}
signal(SIGPIPE, SIG_IGN);
if (stdin_null_flag) {
i... | C | null | null | 9a728cc918fad67c8a9a71201088b1e150340ba4 | @@ -1,4 +1,4 @@
-/* $OpenBSD: mux.c,v 1.57 2015/12/26 07:46:03 semarie Exp $ */
+/* $OpenBSD: mux.c,v 1.58 2016/01/13 23:04:47 djm Exp $ */
/*
* Copyright (c) 2002-2008 Damien Miller <djm@openbsd.org>
*
@@ -1354,16 +1354,18 @@ mux_session_confirm(int id, int success, void *arg)
char *proto, *data;
/* Get r... | mindrot | https://anongit.mindrot.org/openssh.git/tree/mux.c?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c | https://anongit.mindrot.org/openssh.git/tree/mux.c?id=9a728cc918fad67c8a9a71201088b1e150340ba4 | 0 | mux_client_request_stdio_fwd(int fd)
{
Buffer m;
char *e;
u_int type, rid, sid;
int devnull;
debug3("%s: entering", __func__);
if ((muxserver_pid = mux_client_request_alive(fd)) == 0) {
error("%s: master alive request failed", __func__);
return -1;
}
signal(SIGPIPE, SIG_IGN);
if (stdin_null_flag) {
i... |
179,335 | null | Remote | Not required | Partial | CVE-2013-0281 | https://www.cvedetails.com/cve/CVE-2013-0281/ | CWE-399 | Medium | null | null | null | 2013-11-23 | 4.3 | Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking). | 2019-04-22 | DoS | 184 | https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93 | 564f7cc2a51dcd2f28ab12a13394f31be5aa3c93 | High: core: Internal tls api improvements for reuse with future LRMD tls backend. | 9 | lib/common/remote.c | {"sha": "aa5f6a82723ba3fe06403b690fd642ade58197d1", "filename": "cib/callbacks.c", "status": "modified", "additions": 9, "deletions": 4, "changes": 13, "blob_url": "https://github.com/ClusterLabs/pacemaker/blob/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93/cib/callbacks.c", "raw_url": "https://github.com/ClusterLabs/pacemak... | crm_recv_remote_msg(void *session, gboolean encrypted)
crm_parse_remote_buffer(char **msg_buf)
{
char *buf = NULL;
char *start = NULL;
char *end = NULL;
xmlNode *xml = NULL;
if (*msg_buf == NULL) {
return NULL;
}
/* take ownership of the buffer */
buf = *msg_buf;
*msg_bu... | crm_recv_remote_msg(void *session, gboolean encrypted)
{
char *reply = NULL;
xmlNode *xml = NULL;
if (encrypted) {
#ifdef HAVE_GNUTLS_GNUTLS_H
reply = cib_recv_tls(session);
#else
CRM_ASSERT(encrypted == FALSE);
#endif
} else {
reply = cib_recv_plaintext(GPOINTER_TO_INT... | C | crm_parse_remote_buffer(char **msg_buf)
char *buf = NULL;
char *start = NULL;
char *end = NULL;
if (*msg_buf == NULL) {
return NULL;
}
/* take ownership of the buffer */
buf = *msg_buf;
*msg_buf = NULL;
/* MSGS are separated by a '\r\n\r\n'. Split a message off the buffer a... | char *reply = NULL;
reply = cib_recv_tls(session);
reply = cib_recv_plaintext(GPOINTER_TO_INT(session));
} else {
xml = string2xml(reply);
if (xml == NULL) {
crm_err("Couldn't parse: '%.120s'", reply);
free(reply);
return xml;
| null | @@ -25,8 +25,10 @@
#include <sys/stat.h>
#include <unistd.h>
#include <sys/socket.h>
-
+#include <arpa/inet.h>
#include <netinet/ip.h>
+#include <netdb.h>
+
#include <stdlib.h>
#include <errno.h>
@@ -42,30 +44,40 @@
#endif
#ifdef HAVE_GNUTLS_GNUTLS_H
-const int tls_kx_order[] = {
+const int anon_tls_kx_orde... | pacemaker | 564f7cc2a51dcd2f28ab12a13394f31be5aa3c93 | df60384260759397921802e7287d4f23a3a1f2a9 | 1 | crm_recv_remote_msg(void *session, gboolean encrypted)
//fix_flaw_line_below:
//crm_parse_remote_buffer(char **msg_buf)
{
//flaw_line_below:
char *reply = NULL;
//fix_flaw_line_below:
// char *buf = NULL;
//fix_flaw_line_below:
// char *start = NULL;
//fix_flaw_line_below:
// char *end = NULL;
xmlNod... |
64,721 | null | Remote | Not required | Partial | CVE-2017-9225 | https://www.cvedetails.com/cve/CVE-2017-9225/ | CWE-787 | Low | Partial | Partial | null | 2017-05-24 | 7.5 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A... | 2017-06-02 | Overflow | 0 | https://github.com/kkos/oniguruma/commit/166a6c3999bf06b4de0ab4ce6b088a468cc4029f | 166a6c3999bf06b4de0ab4ce6b088a468cc4029f | fix #56 : return invalid result for codepoint 0xFFFFFFFF | 0 | src/unicode_unfold_key.c | {"sha": "34f9c2fd4110efb212786b9d0ed1d76800ecc539", "filename": "src/gperf_unfold_key_conv.py", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/kkos/oniguruma/blob/166a6c3999bf06b4de0ab4ce6b088a468cc4029f/src/gperf_unfold_key_conv.py", "raw_url": "https://github.com/k... | hash(OnigCodePoint codes[])
{
static const unsigned short asso_values[] =
{
8, 6, 2, 124, 5, 1, 36, 1545, 1545, 1545,
1545, 1545, 1545, 11, 1545, 1545, 1545, 16, 1545, 1545,
562, 1545, 1545, 1545, 1545, 77, 1545, 1545, 1545, 1545,
1545, 0, 3, 1545, 61, 628... | hash(OnigCodePoint codes[])
{
static const unsigned short asso_values[] =
{
8, 6, 2, 124, 5, 1, 36, 1545, 1545, 1545,
1545, 1545, 1545, 11, 1545, 1545, 1545, 16, 1545, 1545,
562, 1545, 1545, 1545, 1545, 77, 1545, 1545, 1545, 1545,
1545, 0, 3, 1545, 61, 628... | C | null | null | null | @@ -2850,7 +2850,7 @@ unicode_unfold_key(OnigCodePoint code)
{
OnigCodePoint gcode = wordlist[key].code;
- if (code == gcode)
+ if (code == gcode && wordlist[key].index >= 0)
return &wordlist[key];
}
} | oniguruma | 166a6c3999bf06b4de0ab4ce6b088a468cc4029f | 42c9a8aa87922f2a0fbb85237dfd2b3dadbdafb7 | 0 | hash(OnigCodePoint codes[])
{
static const unsigned short asso_values[] =
{
8, 6, 2, 124, 5, 1, 36, 1545, 1545, 1545,
1545, 1545, 1545, 11, 1545, 1545, 1545, 16, 1545, 1545,
562, 1545, 1545, 1545, 1545, 77, 1545, 1545, 1545, 1545,
1545, 0, 3, 1545, 61, 628... |
101,386 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2011-11 | null | 0 | https://github.com/chromium/chromium/commit/19190765882e272a6a2162c89acdb29110f7e3cf | 19190765882e272a6a2162c89acdb29110f7e3cf | Revert 102184 - [Sync] use base::Time in sync
Make EntryKernel/Entry/BaseNode use base::Time instead of int64s.
Add sync/util/time.h, with utility functions to manage the sync proto
time format.
Store times on disk in proto format instead of the local system.
This requires a database version bump (to 77).
Update Se... | 0 | chrome/browser/sync/internal_api/base_node.cc | {"sha": "98d00951a5cdbae37c5ff82273375587493a88a0", "filename": "chrome/browser/sync/engine/build_commit_command.cc", "status": "modified", "additions": 5, "deletions": 3, "changes": 8, "blob_url": "https://github.com/chromium/chromium/blob/19190765882e272a6a2162c89acdb29110f7e3cf/chrome/browser/sync/engine/build_commi... | GURL BaseNode::GetURL() const {
return GURL(GetBookmarkSpecifics().url());
}
| GURL BaseNode::GetURL() const {
return GURL(GetBookmarkSpecifics().url());
}
| C | null | null | null | @@ -23,7 +23,6 @@
#include "chrome/browser/sync/syncable/directory_manager.h"
#include "chrome/browser/sync/syncable/syncable.h"
#include "chrome/browser/sync/syncable/syncable_id.h"
-#include "chrome/browser/sync/util/time.h"
using syncable::SPECIFICS;
using sync_pb::AutofillProfileSpecifics;
@@ -175,7 +174,7 @... | Chrome | 19190765882e272a6a2162c89acdb29110f7e3cf | 603b62a3200ccc75370d3750b5a76f8f8960d299 | 0 | GURL BaseNode::GetURL() const {
return GURL(GetBookmarkSpecifics().url());
}
|
26,410 | null | Local | Not required | Complete | CVE-2011-2906 | https://www.cvedetails.com/cve/CVE-2011-2906/ | CWE-189 | Low | null | null | null | 2012-05-24 | 4.9 | ** DISPUTED ** Integer signedness error in the pmcraid_ioctl_passthrough function in drivers/scsi/pmcraid.c in the Linux kernel before 3.1 might allow local users to cause a denial of service (memory consumption or memory corruption) via a negative size value in an ioctl call. NOTE: this may be a vulnerability only in... | 2012-05-29 | DoS Mem. Corr. | 0 | https://github.com/torvalds/linux/commit/b5b515445f4f5a905c5dd27e6e682868ccd6c09d | b5b515445f4f5a905c5dd27e6e682868ccd6c09d | [SCSI] pmcraid: reject negative request size
There's a code path in pmcraid that can be reached via device ioctl that
causes all sorts of ugliness, including heap corruption or triggering the
OOM killer due to consecutive allocation of large numbers of pages.
First, the user can call pmcraid_chr_ioctl(), with a type
... | 0 | drivers/scsi/pmcraid.c | {"sha": "d079f9a3c6b3a7fc2dedd4cc850d32fcc82b4930", "filename": "drivers/scsi/pmcraid.c", "status": "modified", "additions": 3, "deletions": 0, "changes": 3, "blob_url": "https://github.com/torvalds/linux/blob/b5b515445f4f5a905c5dd27e6e682868ccd6c09d/drivers/scsi/pmcraid.c", "raw_url": "https://github.com/torvalds/linu... | pmcraid_allocate_cmd_blocks(struct pmcraid_instance *pinstance)
{
int i;
sprintf(pinstance->cmd_pool_name, "pmcraid_cmd_pool_%d",
pinstance->host->unique_id);
pinstance->cmd_cachep = kmem_cache_create(
pinstance->cmd_pool_name,
sizeof(struct pmcraid_cmd), 0,
SLAB_HWCACHE_ALIGN, NULL);
if (!pinst... | pmcraid_allocate_cmd_blocks(struct pmcraid_instance *pinstance)
{
int i;
sprintf(pinstance->cmd_pool_name, "pmcraid_cmd_pool_%d",
pinstance->host->unique_id);
pinstance->cmd_cachep = kmem_cache_create(
pinstance->cmd_pool_name,
sizeof(struct pmcraid_cmd), 0,
SLAB_HWCACHE_ALIGN, NULL);
if (!pinst... | C | null | null | null | @@ -3871,6 +3871,9 @@ static long pmcraid_ioctl_passthrough(
pmcraid_err("couldn't build passthrough ioadls\n");
goto out_free_buffer;
}
+ } else if (request_size < 0) {
+ rc = -EINVAL;
+ goto out_free_buffer;
}
/* If data is being written into the device, copy the data from user | linux | b5b515445f4f5a905c5dd27e6e682868ccd6c09d | 5911e963d3718e306bcac387b83e259aa4228896 | 0 | pmcraid_allocate_cmd_blocks(struct pmcraid_instance *pinstance)
{
int i;
sprintf(pinstance->cmd_pool_name, "pmcraid_cmd_pool_%d",
pinstance->host->unique_id);
pinstance->cmd_cachep = kmem_cache_create(
pinstance->cmd_pool_name,
sizeof(struct pmcraid_cmd), 0,
SLAB_HWCACHE_ALIGN, NULL);
if (!pinst... |
107,432 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | 2011-02 | null | 0 | https://github.com/chromium/chromium/commit/0c4225d1e9b23e7071bbf47ada310a9a7e5661a3 | 0c4225d1e9b23e7071bbf47ada310a9a7e5661a3 | 2011-07-01 Oliver Hunt <oliver@apple.com>
IE Web Workers demo crashes in JSC::SlotVisitor::visitChildren()
https://bugs.webkit.org/show_bug.cgi?id=63732
Reviewed by Gavin Barraclough.
Initialise the memory at the head of the new storage so that
GC is safe if triggered by rep... | 0 | third_party/WebKit/Source/JavaScriptCore/runtime/JSArray.cpp | {"sha": "ea011f3a35c70ada6a0a43516082ae7e0b865376", "filename": "third_party/WebKit/Source/JavaScriptCore/ChangeLog", "status": "modified", "additions": 13, "deletions": 0, "changes": 13, "blob_url": "https://github.com/chromium/chromium/blob/0c4225d1e9b23e7071bbf47ada310a9a7e5661a3/third_party/WebKit/Source/JavaScript... | int get_balance_factor(handle h)
{
if (m_nodes[h].gt & 0x80000000)
return -1;
return static_cast<unsigned>(m_nodes[h].lt) >> 31;
}
| int get_balance_factor(handle h)
{
if (m_nodes[h].gt & 0x80000000)
return -1;
return static_cast<unsigned>(m_nodes[h].lt) >> 31;
}
| C | null | null | null | @@ -638,7 +638,10 @@ bool JSArray::increaseVectorPrefixLength(unsigned newLength)
m_vectorLength = newLength;
fastFree(storage->m_allocBase);
-
+ ASSERT(newLength > vectorLength);
+ unsigned delta = newLength - vectorLength;
+ for (unsigned i = 0; i < delta; i++)
+ m_storage->m_vector[i]... | Chrome | 0c4225d1e9b23e7071bbf47ada310a9a7e5661a3 | 800981f5bbce63fb5da3b8b1bb43e36a04ec18ac | 0 | int get_balance_factor(handle h)
{
if (m_nodes[h].gt & 0x80000000)
return -1;
return static_cast<unsigned>(m_nodes[h].lt) >> 31;
}
|
76,311 | null | Local | Not required | null | CVE-2018-18710 | https://www.cvedetails.com/cve/CVE-2018-18710/ | CWE-200 | Low | Partial | null | null | 2018-10-29 | 2.1 | An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658. | 2019-04-03 | +Info | 0 | https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 | e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 | cdrom: fix improper type cast, which can leat to information leak.
There is another cast from unsigned long to int which causes
a bounds check to fail with specially crafted input. The value is
then used as an index in the slot array in cdrom_slot_status().
This issue is similar to CVE-2018-16658 and CVE-2018-10940.
... | 0 | drivers/cdrom/cdrom.c | {"sha": "10802d1fc554c02a696371639a3869f22c06736c", "filename": "drivers/cdrom/cdrom.c", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/torvalds/linux/blob/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276/drivers/cdrom/cdrom.c", "raw_url": "https://github.com/torvalds/linux/... | static void setup_send_key(struct packet_command *cgc, unsigned agid, unsigned type)
{
cgc->cmd[0] = GPCMD_SEND_KEY;
cgc->cmd[10] = type | (agid << 6);
switch (type) {
case 1: {
cgc->buflen = 16;
break;
}
case 3: {
cgc->buflen = 12;
break;
}
case 6: {
cgc->buflen = 8;
break;
}
}
cgc->... | static void setup_send_key(struct packet_command *cgc, unsigned agid, unsigned type)
{
cgc->cmd[0] = GPCMD_SEND_KEY;
cgc->cmd[10] = type | (agid << 6);
switch (type) {
case 1: {
cgc->buflen = 16;
break;
}
case 3: {
cgc->buflen = 12;
break;
}
case 6: {
cgc->buflen = 8;
break;
}
}
cgc->... | C | null | null | null | @@ -2445,7 +2445,7 @@ static int cdrom_ioctl_select_disc(struct cdrom_device_info *cdi,
return -ENOSYS;
if (arg != CDSL_CURRENT && arg != CDSL_NONE) {
- if ((int)arg >= cdi->capacity)
+ if (arg >= cdi->capacity)
return -EINVAL;
}
| linux | e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 | fb6360b1ef33b7799e6a81e1075a47e3b8ae01fd | 0 | static void setup_send_key(struct packet_command *cgc, unsigned agid, unsigned type)
{
cgc->cmd[0] = GPCMD_SEND_KEY;
cgc->cmd[10] = type | (agid << 6);
switch (type) {
case 1: {
cgc->buflen = 16;
break;
}
case 3: {
cgc->buflen = 12;
break;
}
case 6: {
cgc->buflen = 8;
break;
}
}
cgc->... |
74,685 | null | Local | Not required | Partial | CVE-2014-4978 | https://www.cvedetails.com/cve/CVE-2014-4978/ | CWE-59 | Low | null | Partial | null | 2017-12-29 | 3.6 | The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph. | 2018-01-10 | null | 0 | https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d | 9c2cd3c93c05d009a91d84eedbb85873b0cb505d | Fixes insecure use of temporary file (CVE-2014-4978). | 0 | librawstudio/rs-filter.c | {"sha": "352b23c51a00b32c4993732b1534ff5a988ee763", "filename": "librawstudio/rs-filter.c", "status": "modified", "additions": 18, "deletions": 3, "changes": 21, "blob_url": "https://github.com/rawstudio/rawstudio/blob/9c2cd3c93c05d009a91d84eedbb85873b0cb505d/librawstudio/rs-filter.c", "raw_url": "https://github.com/ra... | rs_filter_set_label(RSFilter *filter, const gchar *label)
{
g_return_if_fail(RS_IS_FILTER(filter));
filter->label = label;
}
| rs_filter_set_label(RSFilter *filter, const gchar *label)
{
g_return_if_fail(RS_IS_FILTER(filter));
filter->label = label;
}
| C | null | null | null | @@ -772,17 +772,32 @@ void
rs_filter_graph(RSFilter *filter)
{
g_return_if_fail(RS_IS_FILTER(filter));
+ gchar *dot_filename;
+ gchar *png_filename;
+ gchar *command_line;
GString *str = g_string_new("digraph G {\n");
rs_filter_graph_helper(str, filter);
g_string_append_printf(str, "}\n");
- g_file_set_co... | rawstudio | 9c2cd3c93c05d009a91d84eedbb85873b0cb505d | 70f2da78b575ea1105eae865c7e49465b838bdfd | 0 | rs_filter_set_label(RSFilter *filter, const gchar *label)
{
g_return_if_fail(RS_IS_FILTER(filter));
filter->label = label;
}
|
5,491 | null | Remote | Not required | Partial | CVE-2017-9739 | https://www.cvedetails.com/cve/CVE-2017-9739/ | CWE-125 | Medium | Partial | Partial | null | 2017-07-26 | 6.8 | The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | 2019-10-02 | DoS | 0 | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | c501a58f8d5650c8ba21d447c0d6f07eafcb0f15 | null | 0 | null | null | static TT_F26Dot6 Round_Super( EXEC_OPS TT_F26Dot6 distance,
TT_F26Dot6 compensation )
{
TT_F26Dot6 val;
if ( distance >= 0 )
{
val = (distance - CUR.phase + CUR.threshold + compensation) &
(-CUR.period);
if ( val < 0 )
va... | static TT_F26Dot6 Round_Super( EXEC_OPS TT_F26Dot6 distance,
TT_F26Dot6 compensation )
{
TT_F26Dot6 val;
if ( distance >= 0 )
{
val = (distance - CUR.phase + CUR.threshold + compensation) &
(-CUR.period);
if ( val < 0 )
va... | C | null | null | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | @@ -1794,6 +1794,12 @@ static int nInstrCount=0;
static void Ins_JMPR( INS_ARG )
{
+ if ( BOUNDS(CUR.IP + args[0], CUR.codeSize ) )
+ {
+ CUR.error = TT_Err_Invalid_Reference;
+ return;
+ }
+
CUR.IP += (Int)(args[0]);
CUR.step_ins = FALSE; | ghostscript | http://git.ghostscript.com/?p=ghostpdl.git;a=blob;f=base/ttinterp.c;h=adf3f0c94b9f5c023dabe25782970c591fb76c28;hb=adf3f0c94b9f5c023dabe25782970c591fb76c28 | http://git.ghostscript.com/?p=ghostpdl.git;a=blob;f=base/ttinterp.c;h=af457e89f91bc7f52bee1538a5ce8e12cb92c680;hb=af457e89f91bc7f52bee1538a5ce8e12cb92c680 | 0 | static TT_F26Dot6 Round_Super( EXEC_OPS TT_F26Dot6 distance,
TT_F26Dot6 compensation )
{
TT_F26Dot6 val;
if ( distance >= 0 )
{
val = (distance - CUR.phase + CUR.threshold + compensation) &
(-CUR.period);
if ( val < 0 )
va... |
125,718 | null | Remote | Not required | Complete | CVE-2013-0840 | https://www.cvedetails.com/cve/CVE-2013-0840/ | null | Low | Complete | Complete | null | 2013-01-24 | 10 | Google Chrome before 24.0.1312.56 does not validate URLs during the opening of new windows, which has unspecified impact and remote attack vectors. | 2017-09-18 | null | 0 | https://github.com/chromium/chromium/commit/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d | 7f48b71cb22bb2fc9fcec2013e9eaff55381a43d | Filter more incoming URLs in the CreateWindow path.
BUG=170532
Review URL: https://chromiumcodereview.appspot.com/12036002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178728 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | content/browser/renderer_host/render_view_host_impl.cc | {"sha": "a659ea67fa7be30bb38257b1b4003982acdb4deb", "filename": "content/browser/renderer_host/render_message_filter.cc", "status": "modified", "additions": 2, "deletions": 2, "changes": 4, "blob_url": "https://github.com/chromium/chromium/blob/7f48b71cb22bb2fc9fcec2013e9eaff55381a43d/content/browser/renderer_host/rend... | void RenderViewHostImpl::SwapOut(int new_render_process_host_id,
int new_request_id) {
is_waiting_for_unload_ack_ = true;
increment_in_flight_event_count();
StartHangMonitorTimeout(TimeDelta::FromMilliseconds(kUnloadTimeoutMS));
ViewMsg_SwapOut_Params params;
params.closing_p... | void RenderViewHostImpl::SwapOut(int new_render_process_host_id,
int new_request_id) {
is_waiting_for_unload_ack_ = true;
increment_in_flight_event_count();
StartHangMonitorTimeout(TimeDelta::FromMilliseconds(kUnloadTimeoutMS));
ViewMsg_SwapOut_Params params;
params.closing_p... | C | null | null | null | @@ -1056,8 +1056,10 @@ void RenderViewHostImpl::CreateNewWindow(
ViewHostMsg_CreateWindow_Params validated_params(params);
ChildProcessSecurityPolicyImpl* policy =
ChildProcessSecurityPolicyImpl::GetInstance();
- // TODO(cevans): also validate opener_url, opener_security_origin.
FilterURL(policy, GetPr... | Chrome | 7f48b71cb22bb2fc9fcec2013e9eaff55381a43d | 3c8352cdd0c90b22e7130a6949c81192804a65ba | 0 | void RenderViewHostImpl::SwapOut(int new_render_process_host_id,
int new_request_id) {
// This will be set back to false in OnSwapOutACK, just before we replace
// this RVH with the pending RVH.
is_waiting_for_unload_ack_ = true;
// Start the hang monitor in case the renderer ha... |
101,955 | null | Remote | Not required | Partial | CVE-2011-3897 | https://www.cvedetails.com/cve/CVE-2011-3897/ | CWE-399 | Medium | Partial | Partial | null | 2011-11-11 | 6.8 | Use-after-free vulnerability in Google Chrome before 15.0.874.120 allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to editing. | 2018-01-05 | DoS | 0 | https://github.com/chromium/chromium/commit/c7a90019bf7054145b11d2577b851cf2779d3d79 | c7a90019bf7054145b11d2577b851cf2779d3d79 | Fix print preview workflow to reflect settings of selected printer.
BUG=95110
TEST=none
Review URL: http://codereview.chromium.org/7831041
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@102242 0039d316-1c4b-4281-b951-d872f2087c98 | 0 | chrome/renderer/print_web_view_helper.cc | {"sha": "c7669434aff1c88fd6353479b6ab2814435fe206", "filename": "chrome/app/generated_resources.grd", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/c7a90019bf7054145b11d2577b851cf2779d3d79/chrome/app/generated_resources.grd", "raw_url": "https... | void PrintWebViewHelper::PrintPreviewContext::FinalizePrintReadyDocument() {
if (state_ != DONE && state_ != RENDERING)
NOTREACHED();
base::TimeTicks begin_time = base::TimeTicks::Now();
metafile_->FinishDocument();
if (print_ready_metafile_page_count_ <= 0) {
NOTREACHED();
return;
}
UMA_HIST... | void PrintWebViewHelper::PrintPreviewContext::FinalizePrintReadyDocument() {
if (state_ != DONE && state_ != RENDERING)
NOTREACHED();
base::TimeTicks begin_time = base::TimeTicks::Now();
metafile_->FinishDocument();
if (print_ready_metafile_page_count_ <= 0) {
NOTREACHED();
return;
}
UMA_HIST... | C | null | null | null | @@ -567,19 +567,19 @@ void PrintWebViewHelper::OnPrintForPrintPreview(
return;
}
- WebFrame* pdf_frame = pdf_element.document().frame();
- scoped_ptr<PrepareFrameAndViewForPrint> prepare;
- if (!InitPrintSettingsAndPrepareFrame(pdf_frame, &pdf_element, &prepare)) {
- LOG(ERROR) << "Failed to initialize ... | Chrome | c7a90019bf7054145b11d2577b851cf2779d3d79 | 19cc5b468085104e660cc977987e1b78ad99db13 | 0 | void PrintWebViewHelper::PrintPreviewContext::FinalizePrintReadyDocument() {
if (state_ != DONE && state_ != RENDERING)
NOTREACHED();
base::TimeTicks begin_time = base::TimeTicks::Now();
metafile_->FinishDocument();
if (print_ready_metafile_page_count_ <= 0) {
NOTREACHED();
return;
}
UMA_HIST... |
185,714 | null | Remote | Not required | Complete | CVE-2015-6787 | https://www.cvedetails.com/cve/CVE-2015-6787/ | null | Low | Complete | Complete | null | 2015-12-05 | 10 | Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | 2017-09-13 | DoS | 2 | https://github.com/chromium/chromium/commit/f911e11e7f6b5c0d6f5ee694a9871de6619889f7 | f911e11e7f6b5c0d6f5ee694a9871de6619889f7 | Reland "[CI] Make paint property nodes non-ref-counted"
This reverts commit 887383b30842d9d9006e11bb6932660a3cb5b1b7.
Reason for revert: Retry in M69.
Original change's description:
> Revert "[CI] Make paint property nodes non-ref-counted"
>
> This reverts commit 70fc0b018c9517558b7aa2be00edf2debb449123.
>
> Reason ... | 2 | third_party/blink/renderer/platform/graphics/paint/paint_controller.cc | {"sha": "6da131da4ecafb786c67365ccc6cd446111933b4", "filename": "third_party/blink/renderer/core/paint/block_painter.cc", "status": "modified", "additions": 1, "deletions": 1, "changes": 2, "blob_url": "https://github.com/chromium/chromium/blob/f911e11e7f6b5c0d6f5ee694a9871de6619889f7/third_party/blink/renderer/core/pa... | void PaintController::CopyCachedSubsequence(size_t begin_index,
size_t end_index) {
DCHECK(!RuntimeEnabledFeatures::PaintUnderInvalidationCheckingEnabled());
base::AutoReset<size_t> subsequence_begin_index(
¤t_cached_subsequence_begin_index_in_new_list_,
... | void PaintController::CopyCachedSubsequence(size_t begin_index,
size_t end_index) {
DCHECK(!RuntimeEnabledFeatures::PaintUnderInvalidationCheckingEnabled());
base::AutoReset<size_t> subsequence_begin_index(
¤t_cached_subsequence_begin_index_in_new_list_,
... | C | cached_chunk->id, cached_chunk->properties);
cached_chunk->id, cached_chunk->properties);
| cached_chunk->id, cached_chunk->properties.GetPropertyTreeState());
cached_chunk->id, cached_chunk->properties.GetPropertyTreeState());
| null | @@ -517,7 +517,7 @@ void PaintController::CopyCachedSubsequence(size_t begin_index,
properties_before_subsequence =
new_paint_chunks_.CurrentPaintChunkProperties();
UpdateCurrentPaintChunkPropertiesUsingIdWithFragment(
- cached_chunk->id, cached_chunk->properties.GetPropertyTreeState());
+ ... | Chrome | f911e11e7f6b5c0d6f5ee694a9871de6619889f7 | 95f5260501ac2660f29fb98ab5cb351a956c1dab | 1 | void PaintController::CopyCachedSubsequence(size_t begin_index,
size_t end_index) {
DCHECK(!RuntimeEnabledFeatures::PaintUnderInvalidationCheckingEnabled());
base::AutoReset<size_t> subsequence_begin_index(
¤t_cached_subsequence_begin_index_in_new_list_,
... |
42,221 | null | Local | Not required | Partial | CVE-2015-6252 | https://www.cvedetails.com/cve/CVE-2015-6252/ | CWE-399 | Low | null | null | null | 2015-10-19 | 2.1 | The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel before 4.1.5 allows local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggers permanent file-descriptor allocation. | 2017-11-03 | DoS | 0 | https://github.com/torvalds/linux/commit/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5 | 7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5 | vhost: actually track log eventfd file
While reviewing vhost log code, I found out that log_file is never
set. Note: I haven't tested the change (QEMU doesn't use LOG_FD yet).
Cc: stable@vger.kernel.org
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com> | 0 | drivers/vhost/vhost.c | {"sha": "95bdb90fd7f06a13a99e2d37a2c97aabc4545c05", "filename": "drivers/vhost/vhost.c", "status": "modified", "additions": 1, "deletions": 0, "changes": 1, "blob_url": "https://github.com/torvalds/linux/blob/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5/drivers/vhost/vhost.c", "raw_url": "https://github.com/torvalds/linux/... | static long vhost_get_vring_endian(struct vhost_virtqueue *vq, u32 idx,
int __user *argp)
{
return -ENOIOCTLCMD;
}
| static long vhost_get_vring_endian(struct vhost_virtqueue *vq, u32 idx,
int __user *argp)
{
return -ENOIOCTLCMD;
}
| C | null | null | null | @@ -995,6 +995,7 @@ long vhost_dev_ioctl(struct vhost_dev *d, unsigned int ioctl, void __user *argp)
}
if (eventfp != d->log_file) {
filep = d->log_file;
+ d->log_file = eventfp;
ctx = d->log_ctx;
d->log_ctx = eventfp ?
eventfd_ctx_fileget(eventfp) : NULL; | linux | 7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5 | cbfe8fa6cd672011c755c3cd85c9ffd4e2d10a6f | 0 | static long vhost_get_vring_endian(struct vhost_virtqueue *vq, u32 idx,
int __user *argp)
{
return -ENOIOCTLCMD;
}
|
76,345 | null | Remote | Not required | Partial | CVE-2018-18585 | https://www.cvedetails.com/cve/CVE-2018-18585/ | CWE-476 | Medium | null | null | null | 2018-10-22 | 4.3 | chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '0' as its first or second character (such as the */0* name). | 2019-08-06 | null | 0 | https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f | 8759da8db6ec9e866cb8eb143313f397f925bb4f | Avoid returning CHM file entries that are "blank" because they have embedded null bytes | 0 | libmspack/mspack/chmd.c | {"sha": "a5873b69c26252fa830c3ce1dd76b5d13a73c34b", "filename": "libmspack/ChangeLog", "status": "modified", "additions": 6, "deletions": 0, "changes": 6, "blob_url": "https://github.com/kyz/libmspack/blob/8759da8db6ec9e866cb8eb143313f397f925bb4f/libmspack/ChangeLog", "raw_url": "https://github.com/kyz/libmspack/raw/87... | static unsigned char *read_sys_file(struct mschm_decompressor_p *self,
struct mschmd_file *file)
{
struct mspack_system *sys = self->system;
unsigned char *data = NULL;
int len;
if (!file || !file->section || (file->section->id != 0)) {
self->error = MSPACK_ERR_DATAFORMAT;
return NULL;
}
l... | static unsigned char *read_sys_file(struct mschm_decompressor_p *self,
struct mschmd_file *file)
{
struct mspack_system *sys = self->system;
unsigned char *data = NULL;
int len;
if (!file || !file->section || (file->section->id != 0)) {
self->error = MSPACK_ERR_DATAFORMAT;
return NULL;
}
l... | C | null | null | null | @@ -447,14 +447,14 @@ static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,
while (num_entries--) {
READ_ENCINT(name_len);
if (name_len > (unsigned int) (end - p)) goto chunk_end;
- /* consider blank filenames to be an error */
- if (name_len == 0) goto chunk_end;
... | libmspack | 8759da8db6ec9e866cb8eb143313f397f925bb4f | 944cc107cf8aa0f1537f13a7795bc619cf674c94 | 0 | static unsigned char *read_sys_file(struct mschm_decompressor_p *self,
struct mschmd_file *file)
{
struct mspack_system *sys = self->system;
unsigned char *data = NULL;
int len;
if (!file || !file->section || (file->section->id != 0)) {
self->error = MSPACK_ERR_DATAFORMAT;
return NULL;
}
l... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.