cve_id
stringlengths
13
16
cwe_ids
stringclasses
400 values
cvss_vector
stringclasses
256 values
cvss_is_v3
float64
0
1
repo_name
stringlengths
3
45
commit_msg
stringlengths
3
19.3k
commit_hash
stringlengths
7
40
git_url
stringlengths
56
159
file_path
stringlengths
4
100
func_name
stringlengths
1
127
func_before
stringlengths
10
83k
abstract_func_before
stringlengths
10
68.1k
func_graph_path_before
stringlengths
38
127
func
stringlengths
8
83.3k
abstract_func
stringlengths
8
68.4k
func_graph_path
stringlengths
35
126
diff_func
stringlengths
77
14.5k
diff_line_info
stringlengths
42
5.91k
is_vul
bool
2 classes
CVE-2018-9336
['CWE-415']
AV:L/AC:L/Au:N/C:P/I:P/A:P
0
OpenVPN/openvpn
Fix potential double-free() in Interactive Service (CVE-2018-9336) Malformed input data on the service pipe towards the OpenVPN interactive service (normally used by the OpenVPN GUI to request openvpn instances from the service) can result in a double free() in the error handling code. This usually only leads to a pr...
1394192b210cb3c6624a7419bcf3ff966742e79b
https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b
src/openvpnserv/interactive.c
RegisterDNS
null
null
null
static DWORD WINAPI RegisterDNS(LPVOID unused) { DWORD err; DWORD i; WCHAR sys_path[MAX_PATH]; DWORD timeout = RDNS_TIMEOUT * 1000; /* in milliseconds */ /* default path of ipconfig command */ WCHAR ipcfg[MAX_PATH] = L"C:\\Windows\\system32\\ipconfig.exe"; struct { WCHAR *argv0...
static DWORD VAR_0 RegisterDNS(LPVOID VAR_1) { DWORD VAR_2; DWORD VAR_3; WCHAR VAR_4[VAR_5]; DWORD VAR_6 = VAR_7 * 1000; /* COMMENT_0 */ /* COMMENT_1 */ WCHAR VAR_8[VAR_5] = L"C:\\Windows\\system32\\ipconfig.exe"; struct { WCHAR *argv0; WCHAR *cmdline; DWORD tim...
null
null
null
false
CVE-2021-31916
['CWE-787']
AV:L/AC:L/Au:N/C:P/I:P/A:C
0
torvalds/linux
dm ioctl: fix out of bounds array access when no devices If there are not any dm devices, we need to zero the "dev" argument in the first structure dm_name_list. However, this can cause out of bounds write, because the "needed" variable is zero and len may be less than eight. Fix this bug by reporting DM_BUFFER_FULL_...
4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
drivers/md/dm-ioctl.c
invalid_str
null
null
null
static int invalid_str(char *str, void *end) { while ((void *) str < end) if (!*str++) return 0; return -EINVAL; }
static int invalid_str(char *VAR_0, void *VAR_1) { while ((void *) VAR_0 < VAR_1) if (!*VAR_0++) return 0; return -VAR_2; }
torvalds/linux/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a/dm-ioctl.c/non_vul/19.json
null
null
false
CVE-2018-11693
['CWE-125']
AV:N/AC:M/Au:N/C:P/I:N/A:P
0
sass/libsass
Fix handling of unclosed interpolant in url Fixes #2661
af0e12cdf09d43dbd1fc11e3f64b244277cc1a1e
https://github.com/sass/libsass/commit/af0e12cdf09d43dbd1fc11e3f64b244277cc1a1e
src/parser.cpp
Parser::parse_almost_any_value
null
null
null
String_Schema_Obj Parser::parse_almost_any_value() { String_Schema_Obj schema = SASS_MEMORY_NEW(String_Schema, pstate); if (*position == 0) return 0; lex < spaces >(false); Expression_Obj token = lex_almost_any_value_token(); if (!token) return 0; schema->append(token); if (*position == 0...
String_Schema_Obj Parser::parse_almost_any_value() { String_Schema_Obj VAR_0 = SASS_MEMORY_NEW(VAR_1, VAR_2); if (*VAR_3 == 0) return 0; VAR_4 < spaces >(false); Expression_Obj VAR_5 = lex_almost_any_value_token(); if (!VAR_5) return 0; VAR_0->append(VAR_5); if (*VAR_3 == 0) { VAR_0...
sass/libsass/af0e12cdf09d43dbd1fc11e3f64b244277cc1a1e/parser.cpp/non_vul/11.json
null
null
false
CVE-2021-46914
['CWE-Other']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
torvalds/linux
commit debb9df311582c83fe369baa35fa4b92e8a9c58a upstream. pci_disable_device() called in __ixgbe_shutdown() decreases dev->enable_cnt by 1. pci_enable_device_mem() which increases dev->enable_cnt by 1, was removed from ixgbe_resume() in commit 6f82b2558735 ("ixgbe: use generic power management"). This caused unbalance...
be07581aacae7cd0a073afae8e8862032f794309
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=be07581aacae7cd0a073afae8e8862032f794309
drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
ixgbe_irq_disable
null
null
null
static inline void ixgbe_irq_disable(struct ixgbe_adapter *adapter) { switch (adapter->hw.mac.type) { case ixgbe_mac_82598EB: IXGBE_WRITE_REG(&adapter->hw, IXGBE_EIMC, ~0); break; case ixgbe_mac_82599EB: case ixgbe_mac_X540: case ixgbe_mac_X550: case ixgbe_mac_X550EM_x: case ixgbe_mac_x550em_a: IXGBE_WRITE...
static inline void ixgbe_irq_disable(struct ixgbe_adapter *VAR_0) { switch (VAR_0->hw.mac.type) { case VAR_1: IXGBE_WRITE_REG(&VAR_0->hw, VAR_2, ~0); break; case VAR_3: case VAR_4: case VAR_5: case VAR_6: case VAR_7: IXGBE_WRITE_REG(&VAR_0->hw, VAR_2, 0xFFFF0000); IXGBE_WRITE_REG(&VAR_0->hw, IXGBE_EIMC_E...
torvalds/linux/be07581aacae7cd0a073afae8e8862032f794309/ixgbe_main.c/non_vul/22.json
null
null
false
CVE-2018-14017
['CWE-125']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
radareorg/radare2
Fix #10498 - Fix crash in fuzzed java files (#10511)
e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
https://github.com/radareorg/radare2/commit/e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
shlr/java/class.c
r_bin_java_get_item_name_from_cp_item_list
null
null
null
R_API char *r_bin_java_get_item_name_from_cp_item_list(RList *cp_list, RBinJavaCPTypeObj *obj, int depth) { /* Given a constant poool object Class, FieldRef, MethodRef, or InterfaceMethodRef return the actual descriptor string. @param cp_list: RList of RBinJavaCPTypeObj * @param obj object to look up the name for ...
R_API char *r_bin_java_get_item_name_from_cp_item_list(RList *VAR_0, RBinJavaCPTypeObj *VAR_1, int VAR_2) { /* COMMENT_0 */ ...
null
null
null
false
CVE-2017-11569
['CWE-125']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
fontforge
parsettf.c: Fix out of bounds read condition on buffer Closes #3093
7bfec47910293bf149b8debe44c6f3f788506092
https://github.com/fontforge/fontforge/commit/7bfec47910293bf149b8debe44c6f3f788506092
fontforge/parsettf.c
FindLangEntry
null
null
null
static char *FindLangEntry(struct ttfinfo *info, int id ) { /* Look for an entry with string id */ /* we prefer english, if we can't find english look for something in ascii */ struct ttflangname *cur; char *ret; for ( cur=info->names; cur!=NULL && cur->lang!=0x409; cur=cur->next ); if ( cur!=N...
static char *FindLangEntry(struct ttfinfo *VAR_0, int VAR_1 ) { /* COMMENT_0 */ /* COMMENT_1 */ struct ttflangname *VAR_2; char *VAR_3; for ( VAR_2=VAR_0->names; VAR_2!=NULL && VAR_2->lang!=0x409; VAR_2=VAR_2->next ); if ( VAR_2!=NULL && VAR_2->names[VAR_1]==NULL ) VAR_2 = NULL; if ( VAR_2=...
fontforge/7bfec47910293bf149b8debe44c6f3f788506092/parsettf.c/non_vul/72.json
null
null
false
CVE-2017-20006
['CWE-787']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
aawc/unrar
5.6.1.4: Use in-memory archive instead of file IO
0ff832d31470471803b175cfff4e40c1b08ee779
https://github.com/aawc/unrar/commit/0ff832d31470471803b175cfff4e40c1b08ee779
archive.cpp
Archive::Tell
int64 Archive::Tell() { int64 QPos; if (QOpen.Tell(&QPos)) return QPos; return File::Tell(); }
int64 Archive::Tell() { int64 VAR_0; if (VAR_1.Tell(&VAR_0)) return VAR_0; return File::Tell(); }
aawc/unrar/0ff832d31470471803b175cfff4e40c1b08ee779/archive.cpp/vul/before/2.json
int64 Archive::Tell() { #ifdef USE_QOPEN int64 QPos; if (QOpen.Tell(&QPos)) return QPos; #endif #ifdef USE_ARCMEM int64 APos; if (ArcMem.Tell(&APos)) return APos; #endif return File::Tell(); }
int64 Archive::Tell() { #ifdef VAR_0 int64 VAR_1; if (VAR_2.Tell(&VAR_1)) return VAR_1; #endif #ifdef VAR_3 int64 VAR_4; if (VAR_5.Tell(&VAR_4)) return VAR_4; #endif return File::Tell(); }
aawc/unrar/0ff832d31470471803b175cfff4e40c1b08ee779/archive.cpp/vul/after/2.json
--- func_before +++ func_after @@ -1,7 +1,14 @@ int64 Archive::Tell() { +#ifdef USE_QOPEN int64 QPos; if (QOpen.Tell(&QPos)) return QPos; +#endif +#ifdef USE_ARCMEM + int64 APos; + if (ArcMem.Tell(&APos)) + return APos; +#endif return File::Tell(); }
{'deleted_lines': [], 'added_lines': ['#ifdef USE_QOPEN', '#endif', '#ifdef USE_ARCMEM', ' int64 APos;', ' if (ArcMem.Tell(&APos))', ' return APos;', '#endif']}
true
CVE-2021-41035
['CWE-440', 'CWE-250']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
eclipse-openj9/openj9
Throw IAE when an InterfaceHandle thunk finds a non-public method The interface dispatch implemented by InterfaceHandle is supposed to throw IllegalAccessError (IAE) when the dispatched callee is not public, just like the dispatch performed by invokeinterface.
c6e0d9296ff9a3084965d83e207403de373c0bad
https://github.com/eclipse-openj9/openj9/commit/c6e0d9296ff9a3084965d83e207403de373c0bad
runtime/compiler/env/VMJ9.cpp
TR_J9VMBase::getOSRFrameHeaderSizeInBytes
null
null
null
UDATA TR_J9VMBase::getOSRFrameHeaderSizeInBytes() {return sizeof(J9OSRFrame);}
UDATA TR_J9VMBase::getOSRFrameHeaderSizeInBytes() {return sizeof(VAR_0);}
eclipse-openj9/openj9/c6e0d9296ff9a3084965d83e207403de373c0bad/VMJ9.cpp/non_vul/497.json
null
null
false
CVE-2019-20052
['CWE-401']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
tbeu/matio
Fix memory leak As reported by https://github.com/tbeu/matio/issues/131
a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3
https://github.com/tbeu/matio/commit/a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3
src/mat.c
SafeMul
null
null
null
int SafeMul(size_t* res, size_t a, size_t b) { if ( !psnip_safe_size_mul(res, a, b) ) { *res = 0; return 1; } return 0; }
int SafeMul(size_t* VAR_0, size_t VAR_1, size_t VAR_2) { if ( !psnip_safe_size_mul(VAR_0, VAR_1, VAR_2) ) { *VAR_0 = 0; return 1; } return 0; }
tbeu/matio/a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3/mat.c/non_vul/10.json
null
null
false
CVE-2014-8559
['CWE-400']
AV:L/AC:L/Au:N/C:N/I:N/A:C
0
torvalds/linux
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
946e51f2bf37f1656916eb75bd0742ba33983c28
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?h=946e51f2bf37f1656916eb75bd0742ba33983c28
kernel/trace/trace_events.c
create_new_subsystem
null
null
null
static struct event_subsystem * create_new_subsystem(const char *name) { struct event_subsystem *system; /* need to create new entry */ system = kmalloc(sizeof(*system), GFP_KERNEL); if (!system) return NULL; system->ref_count = 1; /* Only allocate if dynamic (kprobes and modules) */ if (!core_kernel_data((...
static struct event_subsystem * create_new_subsystem(const char *VAR_0) { struct event_subsystem *VAR_1; /* COMMENT_0 */ VAR_1 = kmalloc(sizeof(*VAR_1), VAR_2); if (!VAR_1) return NULL; VAR_1->ref_count = 1; /* COMMENT_1 */ if (!core_kernel_data((unsigned long)VAR_0)) { VAR_1->ref_count |= VAR_3; VAR_1-...
torvalds/linux/946e51f2bf37f1656916eb75bd0742ba33983c28/trace_events.c/non_vul/29.json
null
null
false
CVE-2022-0695
['CWE-400']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
radareorg/radare2
Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash * Reported by lazymio * Reproducer: AAA4AAAAAB4=
634b886e84a5c568d243e744becc6b3223e089cf
https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf
libr/util/buf.c
r_buf_new_slice
null
null
null
R_API RBuffer *r_buf_new_slice(RBuffer *b, ut64 offset, ut64 size) { struct buf_ref_user u = { 0 }; u.parent = b; u.offset = offset; u.size = size; return new_buffer (R_BUFFER_REF, &u); }
R_API RBuffer *r_buf_new_slice(RBuffer *VAR_0, ut64 VAR_1, ut64 VAR_2) { struct buf_ref_user VAR_3 = { 0 }; VAR_3.parent = VAR_0; VAR_3.offset = VAR_1; VAR_3.size = VAR_2; return new_buffer (VAR_4, &VAR_3); }
null
null
null
false
CVE-2019-3459
['CWE-125']
AV:A/AC:L/Au:N/C:P/I:N/A:N
0
torvalds/linux
The function l2cap_get_conf_opt will return L2CAP_CONF_OPT_SIZE + opt->len as length value. The opt->len however is in control over the remote user and can be used by an attacker to gain access beyond the bounds of the actual packet. To prevent any potential leak of heap memory, it is enough to check that the resultin...
7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
net/bluetooth/l2cap_core.c
l2cap_chan_put
null
null
null
void l2cap_chan_put(struct l2cap_chan *c) { BT_DBG("chan %p orig refcnt %d", c, kref_read(&c->kref)); kref_put(&c->kref, l2cap_chan_destroy); }
void l2cap_chan_put(struct l2cap_chan *VAR_0) { BT_DBG("chan %p orig refcnt %d", VAR_0, kref_read(&VAR_0->kref)); kref_put(&VAR_0->kref, VAR_1); }
torvalds/linux/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69/l2cap_core.c/non_vul/7.json
null
null
false
CVE-2020-27671
['CWE-Other']
AV:L/AC:M/Au:N/C:C/I:C/A:C
0
xen-project/xen
IOMMU: hold page ref until after deferred TLB flush When moving around a page via XENMAPSPACE_gmfn_range, deferring the TLB flush for the "from" GFN range requires that the page remains allocated to the guest until the TLB flush has actually occurred. Otherwise a parallel hypercall to remove the page would only flush ...
5777a3742d88ff1c0ebc626ceb4fd47f9b3dc6d5
https://github.com/xen-project/xen/commit/5777a3742d88ff1c0ebc626ceb4fd47f9b3dc6d5
xen/arch/arm/mm.c
xen_pt_update_entry
null
null
null
static int xen_pt_update_entry(mfn_t root, unsigned long virt, mfn_t mfn, unsigned int flags) { int rc; unsigned int level; /* We only support 4KB mapping (i.e level 3) for now */ unsigned int target = 3; lpae_t *table; /* * The intermediate page tables are re...
static int xen_pt_update_entry(mfn_t VAR_0, unsigned long VAR_1, mfn_t VAR_2, unsigned int VAR_3) { int VAR_4; unsigned int VAR_5; /* COMMENT_0 */ unsigned int VAR_6 = 3; lpae_t *VAR_7; /* COMMENT_1 */ ...
xen-project/xen/5777a3742d88ff1c0ebc626ceb4fd47f9b3dc6d5/mm.c/non_vul/1.json
null
null
false
CVE-2017-0861
['CWE-416']
AV:L/AC:L/Au:N/C:P/I:P/A:P
0
torvalds/linux
Drivers can implement 'struct snd_pcm_ops.ioctl' to handle some requests from ALSA PCM core. These requests are internal purpose in kernel land. Usually common set of operations are used for it. SNDRV_PCM_IOCTL1_INFO is one of the requests. According to code comment, it has been obsoleted in the old days. We can see ...
e11f0f90a626f93899687b1cc909ee37dd6c5809
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=e11f0f90a626f93899687b1cc909ee37dd6c5809
sound/core/pcm_lib.c
snd_pcm_hw_rule_ranges
null
null
null
static int snd_pcm_hw_rule_ranges(struct snd_pcm_hw_params *params, struct snd_pcm_hw_rule *rule) { struct snd_pcm_hw_constraint_ranges *r = rule->private; return snd_interval_ranges(hw_param_interval(params, rule->var), r->count, r->ranges, r->mask); }
static int snd_pcm_hw_rule_ranges(struct snd_pcm_hw_params *VAR_0, struct snd_pcm_hw_rule *VAR_1) { struct snd_pcm_hw_constraint_ranges *VAR_2 = VAR_1->private; return snd_interval_ranges(hw_param_interval(VAR_0, VAR_1->var), VAR_2->count, VAR_2->ranges, VAR_2->mask); }
torvalds/linux/e11f0f90a626f93899687b1cc909ee37dd6c5809/pcm_lib.c/non_vul/48.json
null
null
false
CVE-2017-7395
['CWE-190']
AV:N/AC:L/Au:S/C:N/I:N/A:P
0
TigerVNC/tigervnc
Fix crash from integer overflow in SMsgReader::readClientCutText The length sent by client is U32, but is converted into int. If it was bigger than 0x7fffffff the resulting int is negative, it passes the check against maxCutText and later throws std::bad_alloc from CharArray which takes down the whole server. All the...
bf3bdac082978ca32895a4b6a123016094905689
https://github.com/TigerVNC/tigervnc/commit/bf3bdac082978ca32895a4b6a123016094905689
common/rfb/SMsgReader.cxx
SMsgReader::readFence
null
null
null
void SMsgReader::readFence() { rdr::U32 flags; rdr::U8 len; char data[64]; is->skip(3); flags = is->readU32(); len = is->readU8(); if (len > sizeof(data)) { fprintf(stderr, "Ignoring fence with too large payload\n"); is->skip(len); return; } is->readBytes(data, len); handler->fenc...
void SMsgReader::readFence() { rdr::U32 VAR_0; rdr::U8 VAR_1; char VAR_2[64]; VAR_3->skip(3); VAR_0 = VAR_3->readU32(); VAR_1 = VAR_3->readU8(); if (VAR_1 > sizeof(VAR_2)) { fprintf(VAR_4, "Ignoring fence with too large payload\n"); VAR_3->skip(VAR_1); return; } VAR_3->readBytes(VAR_2,...
TigerVNC/tigervnc/bf3bdac082978ca32895a4b6a123016094905689/SMsgReader.cxx/non_vul/6.json
null
null
false
CVE-2023-5377
['CWE-125']
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
gpac
fixed #2606
8e9d6b38c036a97020c462ad48e1132e0ddc57ce
https://github.com/gpac/gpac/commit/8e9d6b38c036a97020c462ad48e1132e0ddc57ce
src/isomedia/box_code_base.c
rtp_hnti_box_del
null
null
null
void rtp_hnti_box_del(GF_Box *s) { GF_RTPBox *ptr = (GF_RTPBox *)s; if (ptr->sdpText) gf_free(ptr->sdpText); gf_free(ptr); }
void rtp_hnti_box_del(GF_Box *VAR_0) { GF_RTPBox *VAR_1 = (GF_RTPBox *)VAR_0; if (VAR_1->sdpText) gf_free(VAR_1->sdpText); gf_free(VAR_1); }
gpac/8e9d6b38c036a97020c462ad48e1132e0ddc57ce/box_code_base.c/non_vul/600.json
null
null
false
CVE-2021-34141
['CWE-697']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
numpy
DEP: Remove deprecated numeric style dtype strings (#19539) Finishes the deprecation, and effectively closes gh-18993 * Insecure String Comparison * Finished Deprecations * Breaks numpy types * Removed elements in dep_tps * Delete Typecode Comment * Deleted for loop * Fixed 80 characters or more i...
eeef9d4646103c3b1afd3085f1393f2b3f9575b2
https://github.com/numpy/numpy/commit/eeef9d4646103c3b1afd3085f1393f2b3f9575b2
numpy/core/src/multiarray/descriptor.c
arraydescr_protocol_typestr_get
null
null
null
NPY_NO_EXPORT PyObject * arraydescr_protocol_typestr_get(PyArray_Descr *self, void *NPY_UNUSED(ignored)) { char basic_ = self->kind; char endian = self->byteorder; int size = self->elsize; PyObject *ret; if (endian == '=') { endian = '<'; if (!PyArray_IsNativeByteOrder(endian)) { ...
NPY_NO_EXPORT VAR_0 * arraydescr_protocol_typestr_get(PyArray_Descr *VAR_1, void *NPY_UNUSED(ignored)) { char VAR_2 = VAR_1->kind; char VAR_3 = VAR_1->byteorder; int VAR_4 = VAR_1->elsize; PyObject *VAR_5; if (VAR_3 == '=') { VAR_3 = '<'; if (!PyArray_IsNativeByteOrder(VAR_3)) { ...
null
null
null
false
CVE-2017-6903
['CWE-Other']
AV:N/AC:M/Au:N/C:C/I:C/A:C
0
iortcw
All: Merge some file writing extension checks
11a83410153756ae350a82ed41b08d128ff7f998
https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998
MP/code/qcommon/common.c
Z_LogZoneHeap
null
null
null
void Z_LogZoneHeap( memzone_t *zone, char *name ) { #ifdef ZONE_DEBUG char dump[32], *ptr; int i, j; #endif memblock_t *block; char buf[4096]; int size, allocSize, numBlocks; if ( !logfile || !FS_Initialized() ) { return; } size = numBlocks = 0; #ifdef ZONE_DEBUG allocSize = 0; #endif Com_sprintf( buf, si...
void Z_LogZoneHeap( memzone_t *VAR_0, char *VAR_1 ) { #ifdef VAR_2 char VAR_3[32], *VAR_4; int VAR_5, VAR_6; #endif memblock_t *VAR_7; char VAR_8[4096]; int VAR_9, VAR_10, VAR_11; if ( !VAR_12 || !FS_Initialized() ) { return; } VAR_9 = VAR_11 = 0; #ifdef VAR_2 VAR_10 = 0; #endif Com_sprintf( VAR_8, sizeof...
iortcw/11a83410153756ae350a82ed41b08d128ff7f998/common.c/non_vul/43.json
null
null
false
CVE-2021-21261
['CWE-74']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
flatpak
portal: Do not use caller-supplied variables in environment If the caller specifies a variable that can be used to inject arbitrary code into processes, we must not allow it to enter the environment block used to run `flatpak run`, which runs unsandboxed. This change requires the previous commit "context: Add --env-f...
cc1401043c075268ecc652eac557ef8076b5eaba
https://github.com/flatpak/flatpak/commit/cc1401043c075268ecc652eac557ef8076b5eaba
portal/flatpak-portal.c
update_monitor_get_data
null
null
null
static UpdateMonitorData * update_monitor_get_data (PortalFlatpakUpdateMonitor *monitor) { return (UpdateMonitorData *)g_object_get_data (G_OBJECT (monitor), "update-monitor-data"); }
static UpdateMonitorData * update_monitor_get_data (PortalFlatpakUpdateMonitor *VAR_0) { return (UpdateMonitorData *)g_object_get_data (G_OBJECT (VAR_0), "update-monitor-data"); }
flatpak/cc1401043c075268ecc652eac557ef8076b5eaba/flatpak-portal.c/non_vul/46.json
null
null
false
CVE-2023-25193
['CWE-770']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
harfbuzz
[layout] Limit how far we skip when looking back See comments.
85be877925ddbf34f74a1229f3ca1716bb6170dc
https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc
src/hb-ot-layout-gsubgpos.hh
pop_cur_done_glyphs
null
null
null
bool pop_cur_done_glyphs () { if (!active_glyphs_stack) return false; active_glyphs_stack.pop (); return true; }
bool pop_cur_done_glyphs () { if (!VAR_0) return false; VAR_0.pop (); return true; }
harfbuzz/85be877925ddbf34f74a1229f3ca1716bb6170dc/hb-ot-layout-gsubgpos.hh/non_vul/20.json
null
null
false
CVE-2013-2905
['CWE-264']
AV:N/AC:L/Au:N/C:P/I:N/A:N
0
chromium
Posix: fix named SHM mappings permissions. Make sure that named mappings in /dev/shm/ aren't created with broad permissions. BUG=254159 R=mark@chromium.org, markus@chromium.org Review URL: https://codereview.chromium.org/17779002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209814 0039d316-1c4b-4281-b951-d87...
afb848acb43ba316097ab4fddfa38dbd80bc6a71
https://github.com/chromium/chromium/commit/afb848acb43ba316097ab4fddfa38dbd80bc6a71
base/memory/shared_memory_posix.cc
SharedMemory::SharedMemory
null
null
null
SharedMemory::SharedMemory(SharedMemoryHandle handle, bool read_only, ProcessHandle process) : mapped_file_(handle.fd), inode_(0), mapped_size_(0), memory_(NULL), read_only_(read_only), requested_size_(0) { // We don't handle this case yet (note the ignored...
SharedMemory::SharedMemory(SharedMemoryHandle VAR_0, bool VAR_1, ProcessHandle VAR_2) : mapped_file_(VAR_0.fd), inode_(0), mapped_size_(0), memory_(NULL), read_only_(VAR_1), requested_size_(0) { /* COMMENT_0 */ /* COMMENT_1 */ NOTREACHED(); }
chromium/afb848acb43ba316097ab4fddfa38dbd80bc6a71/shared_memory_posix.cc/non_vul/0.json
null
null
false
CVE-2016-9815
['CWE-284']
AV:L/AC:L/Au:N/C:N/I:N/A:C
0
xen-project/xen
arm: crash the guest when it traps on external abort If we spot a data or prefetch abort bearing the ESR_EL2.EA bit set, we know that this is an external abort, and that should crash the guest. This is part of XSA-201. Signed-off-by: Wei Chen <Wei.Chen@arm.com> Reviewed-by: Stefano Stabellini <sstabellini@kernel.org...
f8c6a9334b251d2e78b0873a71b4d369908fb123
https://github.com/xen-project/xen/commit/f8c6a9334b251d2e78b0873a71b4d369908fb123
xen/arch/arm/traps.c
mode_string
null
null
null
static const char *mode_string(uint32_t cpsr) { uint32_t mode; static const char *mode_strings[] = { [PSR_MODE_USR] = "32-bit Guest USR", [PSR_MODE_FIQ] = "32-bit Guest FIQ", [PSR_MODE_IRQ] = "32-bit Guest IRQ", [PSR_MODE_SVC] = "32-bit Guest SVC", [PSR_MODE_MON] = "32-bit Mon...
static const char *mode_string(uint32_t VAR_0) { uint32_t VAR_1; static const char *VAR_2[] = { [VAR_3] = "32-bit Guest USR", [VAR_4] = "32-bit Guest FIQ", [VAR_5] = "32-bit Guest IRQ", [VAR_6] = "32-bit Guest SVC", [VAR_7] = "32-bit Monitor", [VAR_8] = "32-bit Guest AB...
xen-project/xen/f8c6a9334b251d2e78b0873a71b4d369908fb123/traps.c/non_vul/8.json
null
null
false
CVE-2017-6355
['CWE-190']
AV:L/AC:L/Au:N/C:N/I:N/A:P
0
virglrenderer
As the 'pkt_length' and 'offlen' can be malicious from guest, the vrend_create_shader function has an integer overflow, this will make the next 'memcpy' oob access. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
93761787b29f37fa627dea9082cdfc1a1ec608d6
https://cgit.freedesktop.org/virglrenderer/commit/?id=93761787b29f37fa627dea9082cdfc1a1ec608d6
src/vrend_renderer.c
vrend_object_bind_blend
null
null
null
void vrend_object_bind_blend(struct vrend_context *ctx, uint32_t handle) { struct pipe_blend_state *state; if (handle == 0) { memset(&ctx->sub->blend_state, 0, sizeof(ctx->sub->blend_state)); vrend_blend_enable(ctx, false); return; } state = vrend_object_looku...
void vrend_object_bind_blend(struct vrend_context *VAR_0, uint32_t VAR_1) { struct pipe_blend_state *VAR_2; if (VAR_1 == 0) { memset(&VAR_0->sub->blend_state, 0, sizeof(VAR_0->sub->blend_state)); vrend_blend_enable(VAR_0, false); return; } VAR_2 = vrend_object...
virglrenderer/93761787b29f37fa627dea9082cdfc1a1ec608d6/vrend_renderer.c/non_vul/93.json
null
null
false
CVE-2017-9520
['CWE-416']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
radareorg/radare2
Fix #7698 - UAF in r_config_set when loading a dex
f85bc674b2a2256a364fe796351bc1971e106005
https://github.com/radareorg/radare2/commit/f85bc674b2a2256a364fe796351bc1971e106005
libr/config/config.c
r_config_save_char
null
null
null
R_API bool r_config_save_char(RConfigHold *h, ...) { va_list ap; char *key; if (!h->list_char) { h->list_char = r_list_newf ((RListFree) free); if (!h->list_char) { return false; } } va_start (ap, h); while ((key = va_arg (ap, char *))) { RConfigHoldChar *hc = R_NEW0 (RConfigHoldChar); if (!hc) { ...
R_API bool r_config_save_char(RConfigHold *VAR_0, ...) { va_list VAR_1; char *VAR_2; if (!VAR_0->list_char) { VAR_0->list_char = r_list_newf ((RListFree) VAR_3); if (!VAR_0->list_char) { return false; } } va_start (VAR_1, VAR_0); while ((VAR_2 = va_arg (VAR_1, char *))) { RConfigHoldChar *VAR_4 = R_NEW...
null
null
null
false
CVE-2022-27147
['CWE-416']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
gpac
fixed #2109
9723dd0955894f2cb7be13b94cf7a47f2754b893
https://github.com/gpac/gpac/commit/9723dd0955894f2cb7be13b94cf7a47f2754b893
src/scenegraph/base_scenegraph.c
insert_node_def
null
null
null
static GFINLINE void insert_node_def(GF_SceneGraph *sg, GF_Node *def, u32 ID, const char *name) { NodeIDedItem *reg_node, *cur; reg_node = (NodeIDedItem *) gf_malloc(sizeof(NodeIDedItem)); reg_node->node = def; reg_node->NodeID = ID; reg_node->NodeName = name ? gf_strdup(name) : NULL; if (!sg->id_node) { sg->...
static GFINLINE VAR_0 insert_node_def(GF_SceneGraph *VAR_1, GF_Node *VAR_2, u32 VAR_3, const char *VAR_4) { NodeIDedItem *VAR_5, *VAR_6; VAR_5 = (NodeIDedItem *) gf_malloc(sizeof(NodeIDedItem)); VAR_5->node = VAR_2; VAR_5->NodeID = VAR_3; VAR_5->NodeName = VAR_4 ? gf_strdup(VAR_4) : NULL; if (!VAR_1->id_node) {...
null
null
null
false
CVE-2015-6563
['CWE-20']
AV:L/AC:M/Au:N/C:N/I:P/A:N
0
openssh/openssh-portable
Don't resend username to PAM; it already has it. Pointed out by Moritz Jodeit; ok dtucker@
d4697fe9a28dab7255c60433e4dd23cf7fce8a8b
https://github.com/openssh/openssh-portable/commit/d4697fe9a28dab7255c60433e4dd23cf7fce8a8b
monitor.c
monitor_permit
null
null
null
static void monitor_permit(struct mon_table *ent, enum monitor_reqtype type, int permit) { while (ent->f != NULL) { if (ent->type == type) { ent->flags &= ~MON_PERMIT; ent->flags |= permit ? MON_PERMIT : 0; return; } ent++; } }
static void monitor_permit(struct mon_table *VAR_0, enum monitor_reqtype VAR_1, int VAR_2) { while (VAR_0->f != NULL) { if (VAR_0->type == VAR_1) { VAR_0->flags &= ~VAR_3; VAR_0->flags |= VAR_2 ? VAR_3 : 0; return; } VAR_0++; } }
openssh/openssh-portable/d4697fe9a28dab7255c60433e4dd23cf7fce8a8b/monitor.c/non_vul/7.json
null
null
false
CVE-2017-12995
['CWE-835']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
the-tcpdump-group/tcpdump
CVE-2017-12995/Check for DNS compression pointers that don't point backwards. This is what BIND 9.11.0-P2 does; it not only detects pointers that loop, as "point backwards" means "point before anything we've processed so far, including what we're processing right now", so the pointer can't point to itself (as that's w...
3a76fd7c95fced2c2f8c8148a9055c3a542eff29
https://github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29
print-domain.c
ns_nskip
null
null
null
static const u_char * ns_nskip(netdissect_options *ndo, register const u_char *cp) { register u_char i; if (!ND_TTEST2(*cp, 1)) return (NULL); i = *cp++; while (i) { if ((i & INDIR_MASK) == INDIR_MASK) return (cp + 1); if ((i & INDIR_MASK) == EDNS0_MASK) { int bitlen, bytelen; if ((i & ~IN...
static const u_char * ns_nskip(netdissect_options *VAR_0, register const u_char *VAR_1) { register u_char VAR_2; if (!ND_TTEST2(*VAR_1, 1)) return (NULL); VAR_2 = *VAR_1++; while (VAR_2) { if ((VAR_2 & VAR_3) == VAR_3) return (VAR_1 + 1); if ((VAR_2 & VAR_3) == VAR_4) { int VAR_5, VAR_6; i...
the-tcpdump-group/tcpdump/3a76fd7c95fced2c2f8c8148a9055c3a542eff29/print-domain.c/non_vul/4.json
null
null
false
CVE-2020-29534
['CWE-Other']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
torvalds/linux
Grab actual references to the files_struct. To avoid circular references issues due to this, we add a per-task note that keeps track of what io_uring contexts a task has used. When the tasks execs or exits its assigned files, we cancel requests based on this tracking. With that, we can grab proper references to the fi...
0f2122045b946241a9e549c2a76cea54fa58a7ff
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=0f2122045b946241a9e549c2a76cea54fa58a7ff
kernel/fork.c
exec_mm_release
null
null
null
void exec_mm_release(struct task_struct *tsk, struct mm_struct *mm) { futex_exec_release(tsk); mm_release(tsk, mm); }
void exec_mm_release(struct task_struct *VAR_0, struct mm_struct *VAR_1) { futex_exec_release(VAR_0); mm_release(VAR_0, VAR_1); }
torvalds/linux/0f2122045b946241a9e549c2a76cea54fa58a7ff/fork.c/non_vul/2.json
null
null
false
CVE-2023-31618
['CWE-89']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
openlink/virtuoso-opensource
Fixed non-terminal in union branch is not supported (fixes #1136)
030e47a29976709a50603e3f34e82278e5f462df
https://github.com/openlink/virtuoso-opensource/commit/030e47a29976709a50603e3f34e82278e5f462df
libsrc/Wi/sqldf.c
dfe_body_len
null
null
null
int dfe_body_len (df_elt_t * body) { int ctr = 0; df_elt_t * elt = body->_.sub.first; while (elt) { ctr++; elt = elt->dfe_next; } return ctr; }
int dfe_body_len (df_elt_t * VAR_0) { int VAR_1 = 0; df_elt_t * VAR_2 = VAR_0->_.sub.first; while (VAR_2) { VAR_1++; VAR_2 = VAR_2->dfe_next; } return VAR_1; }
openlink/virtuoso-opensource/030e47a29976709a50603e3f34e82278e5f462df/sqldf.c/non_vul/163.json
null
null
false
CVE-2015-3400
['CWE-200']
AV:N/AC:M/Au:S/C:P/I:N/A:N
0
FransUrbo/zfs
Move nfs.c:foreach_nfs_shareopt() to libshare.c:foreach_shareopt() so that it can be (re)used in other parts of libshare.
99aa4d2b4fd12c6bef62d02ffd1b375ddd42fcf4
https://github.com/FransUrbo/zfs/commit/99aa4d2b4fd12c6bef62d02ffd1b375ddd42fcf4
lib/libshare/nfs.c
libshare_nfs_init
null
null
null
void libshare_nfs_init(void) { nfs_fstype = register_fstype("nfs", &nfs_shareops); }
void libshare_nfs_init(void) { VAR_0 = register_fstype("nfs", &VAR_1); }
FransUrbo/zfs/99aa4d2b4fd12c6bef62d02ffd1b375ddd42fcf4/nfs.c/non_vul/13.json
null
null
false
CVE-2017-8359
['CWE-787']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
grpc
Remove call from sibling list when it is not first child.
aab6992c006be6fb80df73fd9f218365099c016d
https://github.com/grpc/grpc/commit/aab6992c006be6fb80df73fd9f218365099c016d
src/core/lib/surface/call.c
cancel_with_error
null
null
null
static void cancel_with_error(grpc_exec_ctx *exec_ctx, grpc_call *c, status_source source, grpc_error *error) { GRPC_CALL_INTERNAL_REF(c, "termination"); set_status_from_error(exec_ctx, c, source, GRPC_ERROR_REF(error)); grpc_transport_stream_op *op = grpc_make_transport_stream_op( ...
static void cancel_with_error(grpc_exec_ctx *VAR_0, grpc_call *VAR_1, status_source VAR_2, grpc_error *VAR_3) { GRPC_CALL_INTERNAL_REF(VAR_1, "termination"); set_status_from_error(VAR_0, VAR_1, VAR_2, GRPC_ERROR_REF(VAR_3)); grpc_transport_stream_op *VAR_4 = grpc_make_transport_strea...
grpc/aab6992c006be6fb80df73fd9f218365099c016d/call.c/non_vul/10.json
null
null
false
CVE-2023-35848
['CWE-682', 'CWE-754']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
virtualsquare/picotcp
More checks for correct header sizes Reported-by: "P. Amsuo, Purdue University"
4b9a16764f2b12b611de9c34a50b4713d10ca401
https://github.com/virtualsquare/picotcp/commit/4b9a16764f2b12b611de9c34a50b4713d10ca401
modules/pico_ipv4.c
pico_ipv4_process_finally_try_forward
null
null
null
static void pico_ipv4_process_finally_try_forward(struct pico_stack *S, struct pico_frame *f) { struct pico_ipv4_hdr *hdr = (struct pico_ipv4_hdr *) f->net_hdr; if ((pico_ipv4_is_broadcast(S, hdr->dst.addr)) || ((f->flags & PICO_FRAME_FLAG_BCAST) != 0)) { /* don't forward broadcast frame, discard! */ ...
static void pico_ipv4_process_finally_try_forward(struct pico_stack *VAR_0, struct pico_frame *VAR_1) { struct pico_ipv4_hdr *VAR_2 = (struct pico_ipv4_hdr *) VAR_1->net_hdr; if ((pico_ipv4_is_broadcast(VAR_0, VAR_2->dst.addr)) || ((VAR_1->flags & VAR_3) != 0)) { /* COMMENT_0 */ pico_frame_disca...
virtualsquare/picotcp/4b9a16764f2b12b611de9c34a50b4713d10ca401/pico_ipv4.c/non_vul/20.json
null
null
false
CVE-2017-15951
['CWE-20']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
torvalds/linux
KEYS: Fix race between updating and finding a negative key Consolidate KEY_FLAG_INSTANTIATED, KEY_FLAG_NEGATIVE and the rejection error into one field such that: (1) The instantiation state can be modified/read atomically. (2) The error can be accessed atomically with the state. (3) The error isn't stored unione...
363b02dab09b3226f3bd1420dad9c72b79a42a76
https://github.com/torvalds/linux/commit/363b02dab09b3226f3bd1420dad9c72b79a42a76
security/keys/proc.c
proc_key_users_open
null
null
null
static int proc_key_users_open(struct inode *inode, struct file *file) { return seq_open(file, &proc_key_users_ops); }
static int proc_key_users_open(struct inode *inode, struct file *file) { return seq_open(file, &VAR_0); }
torvalds/linux/363b02dab09b3226f3bd1420dad9c72b79a42a76/proc.c/non_vul/1.json
null
null
false
CVE-2023-37464
['CWE-327']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
OpenIDC/cjose
use fixed authentication tag length of 16 octets in AES GCM decryption see: https://github.com/cisco/cjose/issues/125 Signed-off-by: Hans Zandbelt <hans.zandbelt@openidc.com>
7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e
https://github.com/OpenIDC/cjose/commit/7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e
src/jwe.c
cjose_jwe_import_json
null
null
null
cjose_jwe_t *cjose_jwe_import_json(const char *cser, size_t cser_len, cjose_err *err) { cjose_jwe_t *jwe = NULL; json_t *form = NULL; json_t *protected_header = NULL; if (NULL == cser) { CJOSE_ERROR(err, CJOSE_ERR_INVALID_ARG); return NULL; } // allocate and initialize a ne...
cjose_jwe_t *cjose_jwe_import_json(const char *VAR_0, size_t VAR_1, cjose_err *VAR_2) { cjose_jwe_t *VAR_3 = NULL; json_t *VAR_4 = NULL; json_t *VAR_5 = NULL; if (NULL == VAR_0) { CJOSE_ERROR(VAR_2, VAR_6); return NULL; } /* COMMENT_0 */ if (!_cjose_jwe_malloc(sizeof(cj...
OpenIDC/cjose/7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e/jwe.c/non_vul/36.json
null
null
false
CVE-2014-1703
['CWE-399']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
chromium
Fix UAF in WebSocketDispatcherHost If Send() fails in SendOrDrop(), then |message| will have been deleted, but SendOrDrop() will still try to access its header fields. Fixed. BUG=338354 TEST=content_unittests Review URL: https://codereview.chromium.org/148263009 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@...
09b09312b9847e025249b9ba5bb2071dd77a19c3
https://github.com/chromium/chromium/commit/09b09312b9847e025249b9ba5bb2071dd77a19c3
content/browser/renderer_host/websocket_dispatcher_host.cc
WebSocketDispatcherHost::CreateWebSocketHost
null
null
null
WebSocketHost* WebSocketDispatcherHost::CreateWebSocketHost(int routing_id) { return new WebSocketHost(routing_id, this, get_context_callback_.Run()); }
WebSocketHost* WebSocketDispatcherHost::CreateWebSocketHost(int VAR_0) { return new WebSocketHost(VAR_0, this, VAR_1.Run()); }
chromium/09b09312b9847e025249b9ba5bb2071dd77a19c3/websocket_dispatcher_host.cc/non_vul/13.json
null
null
false
CVE-2020-21913
['CWE-416']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
unicode-org/icu
ICU-20850 Use LocalMemory for cmd to prevent use after free
657c326d4b8a6c4c6721957320fc8c3c68670cfb
https://github.com/unicode-org/icu/commit/657c326d4b8a6c4c6721957320fc8c3c68670cfb
icu4c/source/tools/pkgdata/pkgdata.cpp
pkg_installCommonMode
null
null
null
static int32_t pkg_installCommonMode(const char *installDir, const char *fileName) { int32_t result = 0; char cmd[SMALL_BUFFER_MAX_SIZE] = ""; if (!T_FileStream_file_exists(installDir)) { UErrorCode status = U_ZERO_ERROR; uprv_mkdir(installDir, &status); if (U_FAILURE(status)) { ...
static int32_t pkg_installCommonMode(const char *VAR_0, const char *VAR_1) { int32_t VAR_2 = 0; char VAR_3[VAR_4] = ""; if (!T_FileStream_file_exists(VAR_0)) { UErrorCode VAR_5 = VAR_6; uprv_mkdir(VAR_0, &VAR_5); if (U_FAILURE(VAR_5)) { fprintf(VAR_7, "Error creating in...
unicode-org/icu/657c326d4b8a6c4c6721957320fc8c3c68670cfb/pkgdata.cpp/non_vul/11.json
null
null
false
CVE-2012-1584
['CWE-189']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
taglib
Avoid uint overflow in case the length + index is over UINT_MAX
dcdf4fd954e3213c355746fa15b7480461972308
https://github.com/taglib/taglib/commit/dcdf4fd954e3213c355746fa15b7480461972308
taglib/toolkit/tbytevector.cpp
at
null
null
null
char at(int index) const { return v.at(v.size() - index - 1); }
char at(int VAR_0) const { return VAR_1.at(VAR_1.size() - VAR_0 - 1); }
taglib/dcdf4fd954e3213c355746fa15b7480461972308/tbytevector.cpp/non_vul/18.json
null
null
false
CVE-2016-2451
['CWE-264']
AV:N/AC:M/Au:N/C:C/I:C/A:C
0
android
Add VPX output buffer size check and handle dead observers more gracefully Bug: 27597103 Change-Id: Id7acb25d5ef69b197da15ec200a9e4f9e7b03518
f9ed2fe6d61259e779a37d4c2d7edb33a1c1f8ba
https://android.googlesource.com/platform/frameworks/av/+/f9ed2fe6d61259e779a37d4c2d7edb33a1c1f8ba
media/libstagefright/omx/OMX.cpp
OMX::signalEndOfInputStream
null
null
null
status_t OMX::signalEndOfInputStream(node_id node) { return findInstance(node)->signalEndOfInputStream(); }
status_t OMX::signalEndOfInputStream(node_id VAR_0) { return findInstance(VAR_0)->signalEndOfInputStream(); }
android/f9ed2fe6d61259e779a37d4c2d7edb33a1c1f8ba/OMX.cpp/non_vul/25.json
null
null
false
CVE-2017-11721
['CWE-119']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
ioquake/ioq3
Fix/improve buffer overflow in MSG_ReadBits/MSG_WriteBits Prevent reading past end of message in MSG_ReadBits. If read past end of msg->data buffer (16348 bytes) the engine could SEGFAULT. Make MSG_WriteBits use an exact buffer overflow check instead of possibly failing with a few bytes left.
d2b1d124d4055c2fcbe5126863487c52fd58cca1
https://github.com/ioquake/ioq3/commit/d2b1d124d4055c2fcbe5126863487c52fd58cca1
code/qcommon/msg.c
MSG_ReadByte
null
null
null
int MSG_ReadByte( msg_t *msg ) { int c; c = (unsigned char)MSG_ReadBits( msg, 8 ); if ( msg->readcount > msg->cursize ) { c = -1; } return c; }
int MSG_ReadByte( msg_t *VAR_0 ) { int VAR_1; VAR_1 = (unsigned char)MSG_ReadBits( VAR_0, 8 ); if ( VAR_0->readcount > VAR_0->cursize ) { VAR_1 = -1; } return VAR_1; }
ioquake/ioq3/d2b1d124d4055c2fcbe5126863487c52fd58cca1/msg.c/non_vul/31.json
null
null
false
CVE-2023-39615
['CWE-119']
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
GNOME/libxml2
parser: Fix old SAX1 parser with custom callbacks For some reason, xmlCtxtUseOptionsInternal set the start and end element SAX handlers to the internal DOM builder functions when XML_PARSE_SAX1 was specified. This means that custom SAX handlers could never work with that flag because these functions would receive the ...
d0c3f01e110d54415611c5fa0040cdf4a56053f9
https://github.com/GNOME/libxml2/commit/d0c3f01e110d54415611c5fa0040cdf4a56053f9
parser.c
xmlParseCharDataComplex
null
null
null
static void xmlParseCharDataComplex(xmlParserCtxtPtr ctxt) { xmlChar buf[XML_PARSER_BIG_BUFFER_SIZE + 5]; int nbchar = 0; int cur, l; cur = CUR_CHAR(l); while ((cur != '<') && /* checked */ (cur != '&') && (IS_CHAR(cur))) /* test also done in xmlCurrentChar() */ { if ((cur == ']') &...
static void xmlParseCharDataComplex(xmlParserCtxtPtr VAR_0) { xmlChar VAR_1[VAR_2 + 5]; int VAR_3 = 0; int VAR_4, VAR_5; VAR_4 = CUR_CHAR(VAR_5); while ((VAR_4 != '<') && /* COMMENT_0 */ (VAR_4 != '&') && (IS_CHAR(VAR_4))) /* COMMENT_1 */ { if ((VAR_4 == ']') && (NXT(1) == ']') && (...
GNOME/libxml2/d0c3f01e110d54415611c5fa0040cdf4a56053f9/parser.c/non_vul/57.json
null
null
false
CVE-2011-2723
['CWE-20']
AV:A/AC:M/Au:N/C:N/I:N/A:C
0
torvalds/linux
Currently skb_gro_header_slow unconditionally resets frag0 and frag0_len. However, when we can't pull on the skb this leaves the GRO fields in an inconsistent state. This patch fixes this by only resetting those fields after the pskb_may_pull test. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-b...
17dd759c67f21e34f2156abcf415e1f60605a188
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=17dd759c67f21e34f2156abcf415e1f60605a188
include/linux/netdevice.h
netif_oper_up
null
null
null
static inline int netif_oper_up(const struct net_device *dev) { return (dev->operstate == IF_OPER_UP || dev->operstate == IF_OPER_UNKNOWN /* backward compat */); }
static inline int netif_oper_up(const struct net_device *VAR_0) { return (VAR_0->operstate == VAR_1 || VAR_0->operstate == VAR_2 /* COMMENT_0 */); }
torvalds/linux/17dd759c67f21e34f2156abcf415e1f60605a188/netdevice.h/non_vul/74.json
null
null
false
CVE-2021-3975
['CWE-416']
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
libvirt
qemu: Add missing lock in qemuProcessHandleMonitorEOF qemuMonitorUnregister will be called in multiple threads (e.g. threads in rpc worker pool and the vm event thread). In some cases, it isn't protected by the monitor lock, which may lead to call g_source_unref more than one time and a use-after-free problem eventua...
1ac703a7d0789e46833f4013a3876c2e3af18ec7
https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
src/qemu/qemu_process.c
qemuProcessQMPInitMonitor
null
null
null
int qemuProcessQMPInitMonitor(qemuMonitorPtr mon) { if (qemuMonitorSetCapabilities(mon) < 0) { VIR_DEBUG("Failed to set monitor capabilities %s", virGetLastErrorMessage()); return -1; } return 0; }
int qemuProcessQMPInitMonitor(qemuMonitorPtr VAR_0) { if (qemuMonitorSetCapabilities(VAR_0) < 0) { VIR_DEBUG("Failed to set monitor capabilities %s", virGetLastErrorMessage()); return -1; } return 0; }
libvirt/1ac703a7d0789e46833f4013a3876c2e3af18ec7/qemu_process.c/non_vul/18.json
null
null
false
CVE-2016-3750
['CWE-20']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
android
Correctly handle dup() failure in Parcel::readNativeHandle bail out if dup() fails, instead of creating an invalid native_handle_t Bug: 28395952 Change-Id: Ia1a6198c0f45165b9c6a55a803e5f64d8afa0572
54cb02ad733fb71b1bdf78590428817fb780aff8
https://android.googlesource.com/platform/frameworks/native/+/54cb02ad733fb71b1bdf78590428817fb780aff8
libs/binder/Parcel.cpp
unflatten_binder
null
null
null
status_t unflatten_binder(const sp<ProcessState>& proc, const Parcel& in, sp<IBinder>* out) { const flat_binder_object* flat = in.readObject(false); if (flat) { switch (flat->type) { case BINDER_TYPE_BINDER: *out = reinterpret_cast<IBinder*>(flat->cookie); ...
status_t unflatten_binder(const sp<ProcessState>& VAR_0, const Parcel& VAR_1, sp<IBinder>* VAR_2) { const flat_binder_object* VAR_3 = VAR_1.readObject(false); if (VAR_3) { switch (VAR_3->type) { case VAR_4: *VAR_2 = VAR_5<IBinder*>(VAR_3->cookie); return ...
android/54cb02ad733fb71b1bdf78590428817fb780aff8/Parcel.cpp/non_vul/76.json
null
null
false
CVE-2014-1438
['CWE-264']
AV:L/AC:M/Au:N/C:N/I:N/A:C
0
torvalds/linux
x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround Before we do an EMMS in the AMD FXSAVE information leak workaround we need to clear any pending exceptions, otherwise we trap with a floating-point exception inside this code. Reported-by: halfdog <me@halfdog.net> Tested-by: Borislav Petkov <bp@suse.de> Link: h...
26bef1318adc1b3a530ecc807ef99346db2aa8b0
https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0
arch/x86/include/asm/fpu-internal.h
fpu_restore_checking
null
null
null
static inline int fpu_restore_checking(struct fpu *fpu) { if (use_xsave()) return fpu_xrstor_checking(&fpu->state->xsave); else if (use_fxsr()) return fxrstor_checking(&fpu->state->fxsave); else return frstor_checking(&fpu->state->fsave); }
static inline int fpu_restore_checking(struct fpu *fpu) { if (use_xsave()) return fpu_xrstor_checking(&fpu->state->xsave); else if (use_fxsr()) return fxrstor_checking(&fpu->state->fxsave); else return frstor_checking(&fpu->state->fsave); }
torvalds/linux/26bef1318adc1b3a530ecc807ef99346db2aa8b0/fpu-internal.h/non_vul/37.json
null
null
false
CVE-2010-2713
['CWE-Other']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
GNOME/vte
Fix terminal title reporting Fixed CVE-2003-0070 again. See also http://marc.info/?l=bugtraq&m=104612710031920&w=2 . (cherry picked from commit 6042c75b5a6daa0e499e61c8e07242d890d38ff1)
8b971a7b2c59902914ecbbc3915c45dd21530a91
https://github.com/GNOME/vte/commit/8b971a7b2c59902914ecbbc3915c45dd21530a91
src/vteseq.c
vte_sequence_handler_AL
null
null
null
static void vte_sequence_handler_AL (VteTerminal *terminal, GValueArray *params) { vte_sequence_handler_al (terminal, params); }
static void vte_sequence_handler_AL (VteTerminal *VAR_0, GValueArray *VAR_1) { vte_sequence_handler_al (VAR_0, VAR_1); }
GNOME/vte/8b971a7b2c59902914ecbbc3915c45dd21530a91/vteseq.c/non_vul/27.json
null
null
false
CVE-2016-10132
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
ArtifexSoftware/mujs
Fix 697381: check allocation when compiling regular expressions. Also use allocator callback function.
fd003eceda531e13fbdd1aeb6e9c73156496e569
https://github.com/ArtifexSoftware/mujs/commit/fd003eceda531e13fbdd1aeb6e9c73156496e569
regexp.c
incclasscanon
null
null
null
static int incclasscanon(Reclass *cc, Rune c) { Rune *p, r; for (p = cc->spans; p < cc->end; p += 2) for (r = p[0]; r <= p[1]; ++r) if (c == canon(r)) return 1; return 0; }
static int incclasscanon(Reclass *VAR_0, Rune VAR_1) { Rune *VAR_2, VAR_3; for (VAR_2 = VAR_0->spans; VAR_2 < VAR_0->end; VAR_2 += 2) for (VAR_3 = VAR_2[0]; VAR_3 <= VAR_2[1]; ++VAR_3) if (VAR_1 == canon(VAR_3)) return 1; return 0; }
ArtifexSoftware/mujs/fd003eceda531e13fbdd1aeb6e9c73156496e569/regexp.c/non_vul/3.json
null
null
false
CVE-2022-3543
['CWE-401']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
kernel/git/bpf/bpf-next
syzbot reported a sequence of memory leaks, and one of them indicated we failed to free a whole sk: unreferenced object 0xffff8880126e0000 (size 1088): comm "syz-executor419", pid 326, jiffies 4294773607 (age 12.609s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 7d 00 00 00 00 00 00 00 ........}...
7a62ed61367b8fd01bae1e18e30602c25060d824
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?h=7a62ed61367b8fd01bae1e18e30602c25060d824
net/unix/af_unix.c
unix_dgram_recvmsg
null
null
null
static int unix_dgram_recvmsg(struct socket *sock, struct msghdr *msg, size_t size, int flags) { struct sock *sk = sock->sk; #ifdef CONFIG_BPF_SYSCALL const struct proto *prot = READ_ONCE(sk->sk_prot); if (prot != &unix_dgram_proto) return prot->recvmsg(sk, msg, size, flags, NULL); #endif return __unix...
static int unix_dgram_recvmsg(struct socket *VAR_0, struct msghdr *VAR_1, size_t VAR_2, int VAR_3) { struct sock *VAR_4 = sock->sk; #ifdef VAR_5 const struct proto *VAR_6 = READ_ONCE(VAR_4->sk_prot); if (VAR_6 != &VAR_7) return VAR_6->recvmsg(VAR_4, VAR_1, VAR_2, VAR_3, NULL); #endif return __unix_dgra...
kernel/git/bpf/bpf-next/7a62ed61367b8fd01bae1e18e30602c25060d824/af_unix.c/non_vul/85.json
null
null
false
CVE-2022-25299
['CWE-552']
AV:N/AC:L/Au:N/C:N/I:P/A:N
0
cesanta/mongoose
Protect against the directory traversal in mg_upload()
c65c8fdaaa257e0487ab0aaae9e8f6b439335945
https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945
src/http.c
printdirentry
null
null
null
static void printdirentry(const char *name, void *userdata) { struct printdirentrydata *d = (struct printdirentrydata *) userdata; struct mg_fs *fs = d->opts->fs == NULL ? &mg_fs_posix : d->opts->fs; size_t size = 0; time_t t = 0; char path[MG_PATH_MAX], sz[64], mod[64]; int flags, n = 0; // LOG(LL_DEBUG...
static void printdirentry(const char *VAR_0, void *VAR_1) { struct printdirentrydata *VAR_2 = (struct printdirentrydata *) VAR_1; struct mg_fs *VAR_3 = VAR_2->opts->fs == NULL ? &VAR_4 : VAR_2->opts->fs; size_t VAR_5 = 0; time_t VAR_6 = 0; char VAR_7[VAR_8], VAR_9[64], VAR_10[64]; int VAR_11, VAR_12 = 0; ...
cesanta/mongoose/c65c8fdaaa257e0487ab0aaae9e8f6b439335945/http.c/non_vul/11.json
null
null
false
CVE-2019-11599
['CWE-667']
AV:L/AC:M/Au:N/C:C/I:C/A:C
0
torvalds/linux
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signal serialization on the processes bel...
04f5866e41fb70690e28397487d8bd8eea7d712a
https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
drivers/infiniband/core/uverbs_main.c
ib_uverbs_comp_event_fasync
null
null
null
static int ib_uverbs_comp_event_fasync(int fd, struct file *filp, int on) { struct ib_uverbs_completion_event_file *comp_ev_file = filp->private_data; return fasync_helper(fd, filp, on, &comp_ev_file->ev_queue.async_queue); }
static int ib_uverbs_comp_event_fasync(int VAR_0, struct file *VAR_1, int VAR_2) { struct ib_uverbs_completion_event_file *VAR_3 = VAR_1->private_data; return fasync_helper(VAR_0, VAR_1, VAR_2, &VAR_3->ev_queue.async_queue); }
torvalds/linux/04f5866e41fb70690e28397487d8bd8eea7d712a/uverbs_main.c/non_vul/19.json
null
null
false
CVE-2015-1241
['CWE-1021']
AV:N/AC:M/Au:N/C:N/I:P/A:N
0
chromium
[Android] Thoroughly reset gesture detection upon page navigation The current gesture reset logic on Android uses a cancellation event synthesized from the active touch sequence. However, this fails to reset detection for timeout-based events, e.g. delayed tap and double-tap, just after the pointer has just been relea...
d47c1e4b6bb7e9b485f6dfede0236ddd5c823878
https://chromium.googlesource.com/chromium/src/+/d47c1e4b6bb7e9b485f6dfede0236ddd5c823878
content/browser/renderer_host/render_widget_host_view_android.cc
RenderWidgetHostViewAndroid::DestroyDelegatedContent
null
null
null
void RenderWidgetHostViewAndroid::DestroyDelegatedContent() { RemoveLayers(); frame_provider_ = NULL; layer_ = NULL; // This gets called when ever any eviction, loosing resources, swapping // problems are encountered and so we abort any pending readbacks here. AbortPendingReadbackRequests(); }
void RenderWidgetHostViewAndroid::DestroyDelegatedContent() { RemoveLayers(); VAR_0 = NULL; VAR_1 = NULL; /* COMMENT_0 */ /* COMMENT_1 */ AbortPendingReadbackRequests(); }
chromium/d47c1e4b6bb7e9b485f6dfede0236ddd5c823878/render_widget_host_view_android.cc/non_vul/70.json
null
null
false
CVE-2020-23258
['CWE-787', 'CWE-476']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
pcmacdon/jsish
Release "3.0.10": Fix issues #12, #13, and #14. FossilOrigin-Name: 70747c8d1c4e7bf176bec8cfb9d3cac3e64a696e7df0b1e3712d3f6b952164c3
20ff8e2f6f66493b65f20c00c53d4f1e9f426631
https://github.com/pcmacdon/jsish/commit/20ff8e2f6f66493b65f20c00c53d4f1e9f426631
src/jsiSqlite.c
jsi_DbOptionTypeStr
null
null
null
const char *jsi_DbOptionTypeStr(Jsi_OptionId typ, bool cname) { const Jsi_OptionTypedef* ti = Jsi_OptionTypeInfo(typ); if (ti) return (cname?ti->cName:ti->idName); return NULL; }
const char *jsi_DbOptionTypeStr(Jsi_OptionId VAR_0, bool VAR_1) { const Jsi_OptionTypedef* VAR_2 = Jsi_OptionTypeInfo(VAR_0); if (VAR_2) return (VAR_1?VAR_2->cName:VAR_2->idName); return NULL; }
pcmacdon/jsish/20ff8e2f6f66493b65f20c00c53d4f1e9f426631/jsiSqlite.c/non_vul/46.json
null
null
false
CVE-2014-9939
['CWE-119']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
binutils-gdb
Fix stack buffer overflows when parsing corrupt ihex files. PR binutils/18750 * ihex.c (ihex_scan): Fixes incorrect escape sequence in error message and stack overflow when char is signed and \200-\376 was in place of hex digit; also fixes \377 was handled as EOF instead of "incorrect character". (ihex_read_sect...
7e27a9d5f22f9f7ead11738b1546d0b5c737266b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
bfd/ihex.c
ihex_write_record
null
null
null
static bfd_boolean ihex_write_record (bfd *abfd, size_t count, unsigned int addr, unsigned int type, bfd_byte *data) { static const char digs[] = "0123456789ABCDEF"; char buf[9 + CHUNK * 2 + 4]; char *p; unsigned int chksum; unsigned int i; size_t total; #define TOHEX(buf, v) \ ((buf)...
static bfd_boolean ihex_write_record (bfd *VAR_0, size_t VAR_1, unsigned int VAR_2, unsigned int VAR_3, bfd_byte *VAR_4) { static const char VAR_5[] = "0123456789ABCDEF"; char VAR_6[9 + VAR_7 * 2 + 4]; char *VAR_8; unsigned int VAR_9; unsigned int VAR_10; size_t VAR_11; #define TOHEX(VA...
binutils-gdb/7e27a9d5f22f9f7ead11738b1546d0b5c737266b/ihex.c/non_vul/0.json
null
null
false
CVE-2023-46752
['CWE-Other']
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
FRRouting/frr
bgpd: Handle MP_REACH_NLRI malformed packets with session reset Avoid crashing bgpd. ``` (gdb) bgp_mp_reach_parse (args=<optimized out>, mp_update=0x7fffffffe140) at bgpd/bgp_attr.c:2341 2341 stream_get(&attr->mp_nexthop_global, s, IPV6_MAX_BYTELEN); (gdb) stream_get (dst=0x7fffffffe1ac, s=0x7ffff0006e80, size=16) ...
b08afc81c60607a4f736f418f2e3eb06087f1a35
https://github.com/FRRouting/frr/commit/b08afc81c60607a4f736f418f2e3eb06087f1a35
bgpd/bgp_attr.c
encap_hash_alloc
null
null
null
static void *encap_hash_alloc(void *p) { /* Encap structure is already allocated. */ return p; }
static void *encap_hash_alloc(void *VAR_0) { /* COMMENT_0 */ return VAR_0; }
FRRouting/frr/b08afc81c60607a4f736f418f2e3eb06087f1a35/bgp_attr.c/non_vul/20.json
null
null
false
CVE-2017-0196
['CWE-200']
AV:N/AC:M/Au:N/C:P/I:N/A:N
0
chakra-core/ChakraCore
[CVE-2017-0196] Fixing an heap overread during slice. The MissingItem check is happening on the array in a loop. It is possible that we get called into script and that mutates the array. So the Array's head is newly created with length. However the loop is still performing over the old length. Fixed this by checking t...
065b7978c40ded35c356ced6cd922a40156c9c46
https://github.com/chakra-core/ChakraCore/commit/065b7978c40ded35c356ced6cd922a40156c9c46
lib/Runtime/Library/JavascriptArray.cpp
SegmentBTree::GetLazyCrossOverLimit
null
null
null
uint32 SegmentBTree::GetLazyCrossOverLimit() { #ifdef ENABLE_DEBUG_CONFIG_OPTIONS if (Js::Configuration::Global.flags.DisableArrayBTree) { return Js::JavascriptArray::InvalidIndex; } else if (Js::Configuration::Global.flags.ForceArrayBTree) { return AR...
uint32 SegmentBTree::GetLazyCrossOverLimit() { #ifdef VAR_0 if (Js::Configuration::Global.flags.DisableArrayBTree) { return Js::JavascriptArray::InvalidIndex; } else if (Js::Configuration::Global.flags.ForceArrayBTree) { return VAR_1; } #endif ...
chakra-core/ChakraCore/065b7978c40ded35c356ced6cd922a40156c9c46/JavascriptArray.cpp/non_vul/106.json
null
null
false
CVE-2020-7105
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
redis/hiredis
Safe allocation wrappers (#754) Create allocation wrappers with a configurable OOM handler (defaults to abort()). See #752, #747
a15378861368a4267c2c2c73b90db2849f943ebd
https://github.com/redis/hiredis/commit/a15378861368a4267c2c2c73b90db2849f943ebd
adapters/libev.h
redisLibevWriteEvent
null
null
null
static void redisLibevWriteEvent(EV_P_ ev_io *watcher, int revents) { #if EV_MULTIPLICITY ((void)loop); #endif ((void)revents); redisLibevEvents *e = (redisLibevEvents*)watcher->data; redisAsyncHandleWrite(e->context); }
static void redisLibevWriteEvent(EV_P_ VAR_0 *VAR_1, int VAR_2) { #if VAR_3 ((void)VAR_4); #endif ((void)VAR_2); redisLibevEvents *VAR_5 = (redisLibevEvents*)VAR_1->data; redisAsyncHandleWrite(VAR_5->context); }
null
null
null
false
CVE-2015-8744
['CWE-20']
AV:L/AC:L/Au:N/C:N/I:N/A:P
0
qemu
net/vmxnet3: Refine l2 header validation Validation of l2 header length assumed minimal packet size as eth_header + 2 * vlan_header regardless of the actual protocol. This caused crash for valid non-IP packets shorter than 22 bytes, as 'tx_pkt->packet_type' hasn't been assigned for such packets, and 'vmxnet3_on_tx_do...
a7278b36fcab9af469563bd7b
https://github.com/qemu/qemu/commit/a7278b36fcab9af469563bd7b9dadebe2ae25e48
hw/net/vmxnet3.c
vmxnet3_setup_tx_offloads
null
null
null
static bool vmxnet3_setup_tx_offloads(VMXNET3State *s) { switch (s->offload_mode) { case VMXNET3_OM_NONE: vmxnet_tx_pkt_build_vheader(s->tx_pkt, false, false, 0); break; case VMXNET3_OM_CSUM: vmxnet_tx_pkt_build_vheader(s->tx_pkt, false, true, 0); VMW_PKPRN("L4 CSO requested...
static bool vmxnet3_setup_tx_offloads(VMXNET3State *VAR_0) { switch (VAR_0->offload_mode) { case VAR_1: vmxnet_tx_pkt_build_vheader(VAR_0->tx_pkt, false, false, 0); break; case VAR_2: vmxnet_tx_pkt_build_vheader(VAR_0->tx_pkt, false, true, 0); VMW_PKPRN("L4 CSO requested\n")...
qemu/a7278b36fcab9af469563bd7b/vmxnet3.c/non_vul/7.json
null
null
false
CVE-2020-26247
['CWE-611']
AV:N/AC:L/Au:S/C:P/I:N/A:N
0
sparklemotion/nokogiri
feat: XML::Schema and RelaxNG creation accept optional ParseOptions I'm trying out a new pattern, which is that the parsed object carries around the ParseOptions it was created with, which should make some testing a bit easier. I'm also not implementing the "config block" pattern in use for Documents, because I think...
9c87439d9afa14a365ff13e73adc809cb2c3d97b
https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b
ext/nokogiri/xml_relax_ng.c
validate_document
null
null
null
static VALUE validate_document(VALUE self, VALUE document) { xmlDocPtr doc; xmlRelaxNGPtr schema; VALUE errors; xmlRelaxNGValidCtxtPtr valid_ctxt; Data_Get_Struct(self, xmlRelaxNG, schema); Data_Get_Struct(document, xmlDoc, doc); errors = rb_ary_new(); valid_ctxt = xmlRelaxNGNewValidCtxt(schema); ...
static VALUE validate_document(VALUE VAR_0, VALUE VAR_1) { xmlDocPtr VAR_2; xmlRelaxNGPtr VAR_3; VALUE VAR_4; xmlRelaxNGValidCtxtPtr VAR_5; Data_Get_Struct(VAR_0, VAR_6, VAR_3); Data_Get_Struct(VAR_1, VAR_7, VAR_2); VAR_4 = rb_ary_new(); VAR_5 = xmlRelaxNGNewValidCtxt(VAR_3); if(NULL == VAR_5) { ...
sparklemotion/nokogiri/9c87439d9afa14a365ff13e73adc809cb2c3d97b/xml_relax_ng.c/non_vul/0.json
null
null
false
CVE-2024-22050
['CWE-22']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
boazsegev/iodine
update to facil.io 0.7.3
5558233fb7defda706b4f9c87c17759705949889
https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889
ext/iodine/fio.c
fio_cluster_on_close
null
null
null
static void fio_cluster_on_close(intptr_t uuid, fio_protocol_s *pr_) { cluster_pr_s *c = (cluster_pr_s *)pr_; if (!fio_data->is_worker) { /* a child was lost, respawning is handled elsewhere. */ fio_lock(&cluster_data.lock); FIO_LS_FOR(&cluster_data.clients, pos) { if (pos->obj == (void *)uuid) { ...
static void fio_cluster_on_close(intptr_t VAR_0, fio_protocol_s *VAR_1) { cluster_pr_s *VAR_2 = (cluster_pr_s *)VAR_1; if (!VAR_3->is_worker) { /* COMMENT_0 */ fio_lock(&VAR_4.lock); FIO_LS_FOR(&VAR_4.clients, VAR_5) { if (VAR_5->obj == (void *)VAR_0) { fio_ls_remove(VAR_5); break;...
boazsegev/iodine/5558233fb7defda706b4f9c87c17759705949889/fio.c/non_vul/174.json
null
null
false
CVE-2012-0855
['CWE-119']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
ffmpeg
j2kdec: Check curtileno for validity Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
3eedf9f716733b3b4c5205726d2c1ca52b3d3d78
http://git.videolan.org/?p=ffmpeg.git;a=commit;h=3eedf9f716733b3b4c5205726d2c1ca52b3d3d78
libavcodec/j2kdec.c
decode_cblk
null
null
null
static int decode_cblk(J2kDecoderContext *s, J2kCodingStyle *codsty, J2kT1Context *t1, J2kCblk *cblk, int width, int height, int bandpos) { int passno = cblk->npasses, pass_t = 2, bpno = cblk->nonzerobits - 1, y, clnpass_cnt = 0; int bpass_csty_symbol = J2K_CBLK_BYPASS & codsty->cblk_styl...
static int decode_cblk(J2kDecoderContext *VAR_0, J2kCodingStyle *VAR_1, J2kT1Context *VAR_2, J2kCblk *VAR_3, int VAR_4, int VAR_5, int VAR_6) { int VAR_7 = VAR_3->npasses, VAR_8 = 2, VAR_9 = VAR_3->nonzerobits - 1, VAR_10, VAR_11 = 0; int VAR_12 = VAR_13 & VAR_1->cblk_style; int VAR_1...
ffmpeg/3eedf9f716733b3b4c5205726d2c1ca52b3d3d78/j2kdec.c/non_vul/3.json
null
null
false
CVE-2020-14394
['CWE-835']
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
1
qemu-project/qemu
hw/usb/hcd-xhci: Fix unbounded loop in xhci_ring_chain_length() (CVE-2020-14394) The loop condition in xhci_ring_chain_length() is under control of the guest, and additionally the code does not check for failed DMA transfers (e.g. if reaching the end of the RAM), so the loop there could run for a very long time or eve...
effaf5a240e03020f4ae953e10b764622c3e87cc
https://gitlab.com/qemu-project/qemu/-/commit/effaf5a240e03020f4ae953e10b764622c3e87cc
hw/usb/hcd-xhci.c
xhci_alloc_streams
null
null
null
static void xhci_alloc_streams(XHCIEPContext *epctx, dma_addr_t base) { assert(epctx->pstreams == NULL); epctx->nr_pstreams = 2 << epctx->max_pstreams; epctx->pstreams = xhci_alloc_stream_contexts(epctx->nr_pstreams, base); }
static void xhci_alloc_streams(XHCIEPContext *VAR_0, dma_addr_t VAR_1) { assert(VAR_0->pstreams == NULL); VAR_0->nr_pstreams = 2 << VAR_0->max_pstreams; VAR_0->pstreams = xhci_alloc_stream_contexts(VAR_0->nr_pstreams, VAR_1); }
qemu-project/qemu/effaf5a240e03020f4ae953e10b764622c3e87cc/hcd-xhci.c/non_vul/45.json
null
null
false
CVE-2019-19242
['CWE-476']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
sqlite
Fix a problem that comes up when using generated columns that evaluate to a constant in an index and then making use of that index in a join. FossilOrigin-Name: 8b12e95fec7ce6e0de82a04ca3dfcf1a8e62e233b7382aa28a8a9be6e862b1af
57f7ece78410a8aae86aa4625fb7556897db384c
https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c
src/expr.c
sqlite3ExprIsTableConstant
null
null
null
int sqlite3ExprIsTableConstant(Expr *p, int iCur){ return exprIsConst(p, 3, iCur); }
int sqlite3ExprIsTableConstant(Expr *VAR_0, int VAR_1){ return exprIsConst(VAR_0, 3, VAR_1); }
sqlite/57f7ece78410a8aae86aa4625fb7556897db384c/expr.c/non_vul/92.json
null
null
false
CVE-2015-5069
['CWE-200']
AV:N/AC:L/Au:S/C:P/I:N/A:N
0
wesnoth
Disallow inclusion of .pbl files from WML (bug #23504) Note that this will also cause Lua wesnoth.have_file() to return false on .pbl files.
f8914468182e8d0a1551b430c0879ba236fe4d6d
https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d
src/filesystem.cpp
create_directory_if_missing_recursive
null
null
null
bool create_directory_if_missing_recursive(const std::string& dirname) { DBG_FS<<"creating recursive directory: "<<dirname<<'\n'; if (is_directory(dirname) == false && dirname.empty() == false) { std::string tmp_dirname = dirname; // remove trailing slashes or backslashes while ((tmp_dirname[tmp_dirname.size()...
bool create_directory_if_missing_recursive(const std::string& VAR_0) { VAR_1<<"creating recursive directory: "<<VAR_0<<'\n'; if (is_directory(VAR_0) == false && VAR_0.empty() == false) { std::string VAR_2 = VAR_0; /* COMMENT_0 */ while ((VAR_2[VAR_2.size()-1] == '/' || VAR_2[VAR_2.size()-1] == '\\') && ...
wesnoth/f8914468182e8d0a1551b430c0879ba236fe4d6d/filesystem.cpp/non_vul/6.json
null
null
false
CVE-2018-18883
['CWE-476']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
xen-project/xen
x86/vvmx: Disallow the use of VT-x instructions when nested virt is disabled c/s ac6a4500b "vvmx: set vmxon_region_pa of vcpu out of VMX operation to an invalid address" was a real bugfix as described, but has a very subtle bug which results in all VT-x instructions being usable by a guest. The toolstack constructs a...
35cd5ba367515ffbd274ca529c5e946447f4ba48
https://github.com/xen-project/xen/commit/35cd5ba367515ffbd274ca529c5e946447f4ba48
xen/arch/x86/hvm/vmx/vvmx.c
load_vvmcs_host_state
null
null
null
static void load_vvmcs_host_state(struct vcpu *v) { int i, rc; u64 r; u32 control; for ( i = 0; i < ARRAY_SIZE(vmcs_h2g_field); i++ ) { r = get_vvmcs(v, vmcs_h2g_field[i].host_field); __vmwrite(vmcs_h2g_field[i].guest_field, r); } rc = hvm_set_cr0(get_vvmcs(v, HOST_CR0), 1)...
static void load_vvmcs_host_state(struct vcpu *VAR_0) { int VAR_1, VAR_2; u64 VAR_3; u32 VAR_4; for ( VAR_1 = 0; VAR_1 < ARRAY_SIZE(VAR_5); VAR_1++ ) { VAR_3 = get_vvmcs(VAR_0, VAR_5[VAR_1].host_field); __vmwrite(VAR_5[VAR_1].guest_field, VAR_3); } VAR_2 = hvm_set_cr0(get_v...
xen-project/xen/35cd5ba367515ffbd274ca529c5e946447f4ba48/vvmx.c/non_vul/51.json
null
null
false
CVE-2022-0480
['CWE-770']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
torvalds/linux
User can create file locks for each open file and force kernel to allocate small but long-living objects per each open file. It makes sense to account for these objects to limit the host's memory consumption from inside the memcg-limited container. Link: https://lkml.kernel.org/r/b009f4c7-f0ab-c0ec-8e83-918f47d677da@...
0f12156dff2862ac54235fc72703f18770769042
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=0f12156dff2862ac54235fc72703f18770769042
fs/locks.c
posix_same_owner
null
null
null
static int posix_same_owner(struct file_lock *fl1, struct file_lock *fl2) { return fl1->fl_owner == fl2->fl_owner; }
static int posix_same_owner(struct file_lock *VAR_0, struct file_lock *VAR_1) { return VAR_0->fl_owner == VAR_1->fl_owner; }
torvalds/linux/0f12156dff2862ac54235fc72703f18770769042/locks.c/non_vul/30.json
null
null
false
CVE-2010-4157
['CWE-190']
AV:L/AC:H/Au:N/C:C/I:C/A:C
0
torvalds/linux
gdth_ioctl_alloc() takes the size variable as an int. copy_from_user() takes the size variable as an unsigned long. gen.data_len and gen.sense_len are unsigned longs. On x86_64 longs are 64 bit and ints are 32 bit. We could pass in a very large number and the allocation would truncate the size to 32 bits and allocate ...
f63ae56e4e97fb12053590e41a4fa59e7daa74a4
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=f63ae56e4e97fb12053590e41a4fa59e7daa74a4
drivers/scsi/gdth.c
gdth_internal_cache_cmd
null
null
null
static int gdth_internal_cache_cmd(gdth_ha_str *ha, Scsi_Cmnd *scp) { u8 t; gdth_inq_data inq; gdth_rdcap_data rdc; gdth_sense_data sd; gdth_modep_data mpd; struct gdth_cmndinfo *cmndinfo = gdth_cmnd_priv(scp); t = scp->device->id; TRACE(("gdth_internal_cache_cmd() cmd 0x%x hdrive %d\n...
static int gdth_internal_cache_cmd(gdth_ha_str *VAR_0, Scsi_Cmnd *VAR_1) { u8 VAR_2; gdth_inq_data VAR_3; gdth_rdcap_data VAR_4; gdth_sense_data VAR_5; gdth_modep_data VAR_6; struct gdth_cmndinfo *VAR_7 = gdth_cmnd_priv(VAR_1); VAR_2 = VAR_1->device->id; TRACE(("gdth_internal_cache_cmd...
torvalds/linux/f63ae56e4e97fb12053590e41a4fa59e7daa74a4/gdth.c/non_vul/5.json
null
null
false
CVE-2012-0789
['CWE-399']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
php/php-src
- Fixed bug #53502 (strtotime with timezone memory leak). - Fixed bug #52062 (large timestamps with DateTime::getTimestamp and DateTime::setTimestamp). - Fixed bug #51994 (date_parse_from_format is parsing invalid date using 'yz' format). - Fixed bug #51223 (Seg fault while creating (by unserialization) DatePerio...
4c9fad8b362a7d2b6a94b4961e4b2dc037b2766d
https://github.com/php/php-src/commit/4c9fad8b362a7d2b6a94b4961e4b2dc037b2766d
ext/date/lib/parse_date.c
timelib_meridian_with_check
null
null
null
static timelib_sll timelib_meridian_with_check(char **ptr, timelib_sll h) { timelib_sll retval = 0; while (!strchr("AaPp", **ptr)) { ++*ptr; } if (**ptr == 'a' || **ptr == 'A') { if (h == 12) { retval = -12; } } else if (h != 12) { retval = 12; } ++*ptr; if (**ptr == '.') { ++*ptr; if (**ptr != ...
static timelib_sll timelib_meridian_with_check(char **VAR_0, timelib_sll VAR_1) { timelib_sll VAR_2 = 0; while (!strchr("AaPp", **VAR_0)) { ++*VAR_0; } if (**VAR_0 == 'a' || **VAR_0 == 'A') { if (VAR_1 == 12) { VAR_2 = -12; } } else if (VAR_1 != 12) { VAR_2 = 12; } ++*VAR_0; if (**VAR_0 == '.') { ...
php/php-src/4c9fad8b362a7d2b6a94b4961e4b2dc037b2766d/parse_date.c/non_vul/21.json
null
null
false
CVE-2022-3566
['CWE-362']
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
torvalds/linux
setsockopt(IPV6_ADDRFORM) and tcp_v6_connect() change icsk->icsk_af_ops under lock_sock(), but tcp_(get|set)sockopt() read it locklessly. To avoid load/store tearing, we need to add READ_ONCE() and WRITE_ONCE() for the reads and writes. Thanks to Eric Dumazet for providing the syzbot report: BUG: KCSAN: data-race in...
f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
net/ipv4/tcp.c
tcp_inq_hint
null
null
null
static int tcp_inq_hint(struct sock *sk) { const struct tcp_sock *tp = tcp_sk(sk); u32 copied_seq = READ_ONCE(tp->copied_seq); u32 rcv_nxt = READ_ONCE(tp->rcv_nxt); int inq; inq = rcv_nxt - copied_seq; if (unlikely(inq < 0 || copied_seq != READ_ONCE(tp->copied_seq))) { lock_sock(sk); inq = tp->rcv_nxt - tp->...
static int tcp_inq_hint(struct sock *VAR_0) { const struct tcp_sock *VAR_1 = tcp_sk(VAR_0); u32 VAR_2 = READ_ONCE(VAR_1->copied_seq); u32 VAR_3 = READ_ONCE(VAR_1->rcv_nxt); int VAR_4; VAR_4 = VAR_3 - VAR_2; if (unlikely(VAR_4 < 0 || VAR_2 != READ_ONCE(VAR_1->copied_seq))) { lock_sock(VAR_0); VAR_4 = VAR_1->r...
torvalds/linux/f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57/tcp.c/non_vul/39.json
null
null
false
CVE-2023-0414
['CWE-404']
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
wireshark
eap: tweak conversation tracking to avoid breaking pinfo horribly Looks like conversation_set_conv_addr_port_endpoints() from 66b441f3d is designed with this use case in mind. This should resolve issue #18622
a8b16d74e1946c4d32bd6b880ab13b7850cc70be
https://gitlab.com/wireshark/wireshark/-/commit/a8b16d74e1946c4d32bd6b880ab13b7850cc70be
epan/dissectors/packet-eap.c
dissect_eap_mschapv2
null
null
null
static void dissect_eap_mschapv2(proto_tree *eap_tree, tvbuff_t *tvb, packet_info *pinfo, int offset, gint size) { proto_item *item; gint left = size; gint ms_len; guint8 value_size; guint8 opcode; /* OpCode (1 byte), MS-CHAPv2-ID (1 byte), MS-Length (2 bytes), ...
static void dissect_eap_mschapv2(proto_tree *VAR_0, tvbuff_t *VAR_1, packet_info *VAR_2, int VAR_3, gint VAR_4) { proto_item *VAR_5; gint VAR_6 = VAR_4; gint VAR_7; guint8 VAR_8; guint8 VAR_9; /* COMMENT_0 */ VAR_9 = tvb_get_guint8(VAR_1, VAR_3); proto_tree_...
wireshark/a8b16d74e1946c4d32bd6b880ab13b7850cc70be/packet-eap.c/non_vul/10.json
null
null
false
CVE-2015-7972
['CWE-399']
AV:L/AC:L/Au:N/C:N/I:N/A:P
0
xen-project/xen
libxl: adjust PoD target by memory fudge, too PoD guests need to balloon at least as far as required by PoD, or risk crashing. Currently they don't necessarily know what the right value is, because our memory accounting is (at the very least) confusing. Apply the memory limit fudge factor to the in-hypervisor PoD me...
e294a0c3af9f4443dc692b180fb1771b1cb075e8
https://github.com/xen-project/xen/commit/e294a0c3af9f4443dc692b180fb1771b1cb075e8
tools/libxl/libxl.c
libxl_string_list_length
null
null
null
int libxl_string_list_length(const libxl_string_list *psl) { int i = 0; if (*psl) while ((*psl)[i]) i++; return i; }
int libxl_string_list_length(const libxl_string_list *VAR_0) { int VAR_1 = 0; if (*VAR_0) while ((*VAR_0)[VAR_1]) VAR_1++; return VAR_1; }
xen-project/xen/e294a0c3af9f4443dc692b180fb1771b1cb075e8/libxl.c/non_vul/50.json
null
null
false
CVE-2023-5377
['CWE-125']
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
gpac
fixed #2606
8e9d6b38c036a97020c462ad48e1132e0ddc57ce
https://github.com/gpac/gpac/commit/8e9d6b38c036a97020c462ad48e1132e0ddc57ce
src/isomedia/box_code_base.c
esds_box_write
null
null
null
GF_Err esds_box_write(GF_Box *s, GF_BitStream *bs) { GF_Err e; u8 *enc_desc; u32 descSize = 0; GF_ESDBox *ptr = (GF_ESDBox *)s; //make sure we write with no ESID and no OCRESID if (ptr->desc) { ptr->desc->ESID = 0; ptr->desc->OCRESID = 0; } e = gf_isom_full_box_write(s, bs); if (e) return...
GF_Err esds_box_write(GF_Box *VAR_0, GF_BitStream *VAR_1) { GF_Err VAR_2; u8 *VAR_3; u32 VAR_4 = 0; GF_ESDBox *VAR_5 = (GF_ESDBox *)VAR_0; /* COMMENT_0 */ if (VAR_5->desc) { VAR_5->desc->ESID = 0; VAR_5->desc->OCRESID = 0; } VAR_2 = gf_isom_full_box_write(VAR_0, VAR_1); if (VAR_2) return ...
gpac/8e9d6b38c036a97020c462ad48e1132e0ddc57ce/box_code_base.c/non_vul/447.json
null
null
false
CVE-2011-0523
['CWE-264']
AV:L/AC:M/Au:N/C:P/I:N/A:N
0
gypsy
Fixes part of 33431
40101707cddb319481133b2a137294b6b669bd16
http://cgit.freedesktop.org/gypsy/commit/?id=40101707cddb319481133b2a137294b6b669bd16
src/gypsy-server.c
gypsy_server_error_quark
null
null
null
GQuark gypsy_server_error_quark (void) { static GQuark quark = 0; if (quark == 0) { quark = g_quark_from_static_string ("gypsy-server-error-quark"); } return quark; }
GQuark gypsy_server_error_quark (void) { static GQuark VAR_0 = 0; if (VAR_0 == 0) { VAR_0 = g_quark_from_static_string ("gypsy-server-error-quark"); } return VAR_0; }
gypsy/40101707cddb319481133b2a137294b6b669bd16/gypsy-server.c/non_vul/3.json
null
null
false
CVE-2019-19012
['CWE-190', 'CWE-125']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
kkos/oniguruma
fix #164: Integer overflow related to reg->dmax in search_in_range()
0463e21432515631a9bc925ce5eb95b097c73719
https://github.com/kkos/oniguruma/commit/0463e21432515631a9bc925ce5eb95b097c73719
src/regexec.c
onig_region_copy
null
null
null
extern void onig_region_copy(OnigRegion* to, OnigRegion* from) { #define RREGC_SIZE (sizeof(int) * from->num_regs) int i; if (to == from) return; if (to->allocated == 0) { if (from->num_regs > 0) { to->beg = (int* )xmalloc(RREGC_SIZE); if (IS_NULL(to->beg)) return; to->end = (int* )xmall...
extern void onig_region_copy(OnigRegion* VAR_0, OnigRegion* VAR_1) { #define VAR_2 (sizeof(int) * from->num_regs) int VAR_3; if (VAR_0 == VAR_1) return; if (VAR_0->allocated == 0) { if (VAR_1->num_regs > 0) { VAR_0->beg = (int* )xmalloc(VAR_2); if (IS_NULL(VAR_0->beg)) return; VAR_0->end...
kkos/oniguruma/0463e21432515631a9bc925ce5eb95b097c73719/regexec.c/non_vul/69.json
null
null
false
CVE-2018-1000115
['CWE-400']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
memcached
disable UDP port by default As reported, UDP amplification attacks have started to use insecure internet-exposed memcached instances. UDP used to be a lot more popular as a transport for memcached many years ago, but I'm not aware of many recent users. Ten years ago, the TCP connection overhead from many clients was ...
dbb7a8af90054bf4ef51f5814ef7ceb17d83d974
https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974
memcached.c
process_stats_conns
null
null
null
static void process_stats_conns(ADD_STAT add_stats, void *c) { int i; char key_str[STAT_KEY_LEN]; char val_str[STAT_VAL_LEN]; char conn_name[MAXPATHLEN + sizeof("unix:") + sizeof("65535")]; int klen = 0, vlen = 0; assert(add_stats); for (i = 0; i < max_fds; i++) { if (conns[i]) { ...
static void process_stats_conns(ADD_STAT VAR_0, void *VAR_1) { int VAR_2; char VAR_3[VAR_4]; char VAR_5[VAR_6]; char VAR_7[VAR_8 + sizeof("unix:") + sizeof("65535")]; int VAR_9 = 0, VAR_10 = 0; assert(VAR_0); for (VAR_2 = 0; VAR_2 < VAR_11; VAR_2++) { if (VAR_12[VAR_2]) { ...
memcached/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974/memcached.c/non_vul/6.json
null
null
false
CVE-2016-7031
['CWE-254', 'CWE-200']
AV:N/AC:M/Au:N/C:P/I:N/A:N
0
ceph
13207: Rados Gateway: Anonymous user is able to read bucket with authenticated read ACL Signed-off-by: root <rahul.1aggarwal@gmail.com>
99ba6610a8f437604cadf68cbe9969def893e870
https://github.com/ceph/ceph/commit/99ba6610a8f437604cadf68cbe9969def893e870
src/rgw/rgw_op.cc
RGWGetACLs::execute
null
null
null
void RGWGetACLs::execute() { stringstream ss; RGWAccessControlPolicy *acl = (!s->object.empty() ? s->object_acl : s->bucket_acl); RGWAccessControlPolicy_S3 *s3policy = static_cast<RGWAccessControlPolicy_S3 *>(acl); s3policy->to_xml(ss); acls = ss.str(); }
void RGWGetACLs::execute() { stringstream VAR_0; RGWAccessControlPolicy *VAR_1 = (!VAR_2->object.empty() ? VAR_2->object_acl : VAR_2->bucket_acl); RGWAccessControlPolicy_S3 *VAR_3 = VAR_4<RGWAccessControlPolicy_S3 *>(VAR_1); VAR_3->to_xml(VAR_0); VAR_5 = VAR_0.str(); }
ceph/99ba6610a8f437604cadf68cbe9969def893e870/rgw_op.cc/non_vul/91.json
null
null
false
CVE-2016-1636
['CWE-264']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
chromium
Fix SRI bypass by loading same resource twice in same origin. This fixes a bug where the memory cache was bypassing subresource integrity checks when a resource is loaded for a second time in the same origin. The resource in the memory cache was correctly storing that an integrity check had already been done so whene ...
0979e9712439b056355af462d68fe5c6d9ee5466
https://chromium.googlesource.com/chromium/src/+/0979e9712439b056355af462d68fe5c6d9ee5466
third_party/WebKit/Source/core/dom/PendingScript.cpp
PendingScript::PendingScript
null
null
null
PendingScript::PendingScript() : m_watchingForLoad(false) , m_startingPosition(TextPosition::belowRangePosition()) , m_integrityFailure(false) { }
PendingScript::PendingScript() : m_watchingForLoad(false) , m_startingPosition(TextPosition::belowRangePosition()) , m_integrityFailure(false) { }
chromium/0979e9712439b056355af462d68fe5c6d9ee5466/PendingScript.cpp/non_vul/2.json
null
null
false
CVE-2014-4014
['CWE-264']
AV:L/AC:H/Au:N/C:C/I:C/A:C
0
torvalds/linux
fs,userns: Change inode_capable to capable_wrt_inode_uidgid The kernel has no concept of capabilities with respect to inodes; inodes exist independently of namespaces. For example, inode_capable(inode, CAP_LINUX_IMMUTABLE) would be nonsense. This patch changes inode_capable to check for uid and gid mappings and rena...
23adbe12ef7d3d4195e80800ab36b37bee28cd03
https://github.com/torvalds/linux/commit/23adbe12ef7d3d4195e80800ab36b37bee28cd03
fs/namei.c
kern_path_mountpoint
null
null
null
int kern_path_mountpoint(int dfd, const char *name, struct path *path, unsigned int flags) { struct filename s = {.name = name}; return filename_mountpoint(dfd, &s, path, flags); }
int kern_path_mountpoint(int VAR_0, const char *VAR_1, struct path *path, unsigned int VAR_2) { struct filename VAR_3 = {.name = VAR_1}; return filename_mountpoint(VAR_0, &VAR_3, path, VAR_2); }
torvalds/linux/23adbe12ef7d3d4195e80800ab36b37bee28cd03/namei.c/non_vul/33.json
null
null
false
CVE-2016-5128
['CWE-254']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
chromium
Make sure api interceptors don't change the store target w/o storing BUG=chromium:619166 R=verwaest@chromium.org Review-Url: https://codereview.chromium.org/2082633002 Cr-Commit-Position: refs/heads/master@{#37152}
2c8ca9ad09281d4138ae363566051e45afd0838c
https://chromium.googlesource.com/v8/v8/+/2c8ca9ad09281d4138ae363566051e45afd0838c
src/objects.cc
PropertyKeyToArrayLength
null
null
null
bool PropertyKeyToArrayLength(Handle<Object> value, uint32_t* length) { DCHECK(value->IsNumber() || value->IsName()); if (value->ToArrayLength(length)) return true; if (value->IsString()) return String::cast(*value)->AsArrayIndex(length); return false; }
bool PropertyKeyToArrayLength(Handle<Object> VAR_0, uint32_t* VAR_1) { DCHECK(VAR_0->IsNumber() || VAR_0->IsName()); if (VAR_0->ToArrayLength(VAR_1)) return true; if (VAR_0->IsString()) return String::cast(*VAR_0)->AsArrayIndex(VAR_1); return false; }
chromium/2c8ca9ad09281d4138ae363566051e45afd0838c/objects.cc/non_vul/610.json
null
null
false
CVE-2016-2449
['CWE-264']
AV:N/AC:M/Au:N/C:C/I:C/A:C
0
android
Camera3Device: Validate template ID Validate template ID before creating a default request. Bug: 26866110 Bug: 27568958 Change-Id: Ifda457024f1d5c2b1382f189c1a8d5fda852d30d
b04aee833c5cfb6b31b8558350feb14bb1a0f353
https://android.googlesource.com/platform/frameworks/av/+/b04aee833c5cfb6b31b8558350feb14bb1a0f353
services/camera/libcameraservice/device3/Camera3Device.cpp
Camera3Device::setStreamingRequest
null
null
null
status_t Camera3Device::setStreamingRequest(const CameraMetadata &request, int64_t* /*lastFrameNumber*/) { ATRACE_CALL(); List<const CameraMetadata> requests; requests.push_back(request); return setStreamingRequestList(requests, /*lastFrameNumber*/NULL); }
status_t Camera3Device::setStreamingRequest(const CameraMetadata &VAR_0, int64_t* /* COMMENT_0 */) { ATRACE_CALL(); List<const CameraMetadata> VAR_1; VAR_1.push_back(VAR_0); return setStreamingRequestList(VAR_1, /* COMMENT_0 */NULL); }
android/b04aee833c5cfb6b31b8558350feb14bb1a0f353/Camera3Device.cpp/non_vul/67.json
null
null
false
CVE-2018-11357
['CWE-20']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
wireshark
tvbuff: make tvb_bytes_exist fail with negative values tvb_generic_clone_offset_len uses tvb_bytes_exist to check that the requested tvb data is actually available. It did not expect negative values, that would result in an overly large memory allocation. Bug: 14678 Change-Id: Ie80095a381e55ca5dbbd5c9d835243549d0b212...
ab8a33ef083b9732c89117747a83a905a676faf6
https://github.com/wireshark/wireshark/commit/ab8a33ef083b9732c89117747a83a905a676faf6
epan/tvbuff.c
tvb_format_stringzpad
null
null
null
gchar * tvb_format_stringzpad(tvbuff_t *tvb, const gint offset, const gint size) { const guint8 *ptr, *p; gint len; gint stringlen; len = (size > 0) ? size : 0; ptr = ensure_contiguous(tvb, offset, size); for (p = ptr, stringlen = 0; stringlen < len && *p != '\0'; p++, stringlen++) ; return...
gchar * tvb_format_stringzpad(tvbuff_t *VAR_0, const gint VAR_1, const gint VAR_2) { const guint8 *VAR_3, *VAR_4; gint VAR_5; gint VAR_6; VAR_5 = (VAR_2 > 0) ? VAR_2 : 0; VAR_3 = ensure_contiguous(VAR_0, VAR_1, VAR_2); for (VAR_4 = VAR_3, VAR_6 = 0; VAR_6 < VAR_5 && *VAR_4 != '\0'; VAR_4++, VA...
wireshark/ab8a33ef083b9732c89117747a83a905a676faf6/tvbuff.c/non_vul/87.json
null
null
false
CVE-2016-2109
['CWE-399']
AV:N/AC:L/Au:N/C:N/I:N/A:C
0
openssl
Harden ASN.1 BIO handling of large amounts of data. If the ASN.1 BIO is presented with a large length field read it in chunks of increasing size checking for EOF on each read. This prevents small files allocating excessive amounts of data. CVE-2016-2109 Thanks to Brian Carpenter for reporting this issue. Reviewed-...
c62981390d6cf9e3d612c489b8b77c2913b25807
https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807
crypto/asn1/a_d2i_fp.c
ASN1_item_d2i_fp
null
null
null
void *ASN1_item_d2i_fp(const ASN1_ITEM *it, FILE *in, void *x) { BIO *b; char *ret; if ((b = BIO_new(BIO_s_file())) == NULL) { ASN1err(ASN1_F_ASN1_ITEM_D2I_FP, ERR_R_BUF_LIB); return (NULL); } BIO_set_fp(b, in, BIO_NOCLOSE); ret = ASN1_item_d2i_bio(it, b, x); BIO_free(b); ...
void *ASN1_item_d2i_fp(const ASN1_ITEM *VAR_0, FILE *VAR_1, void *VAR_2) { BIO *VAR_3; char *VAR_4; if ((VAR_3 = BIO_new(BIO_s_file())) == NULL) { ASN1err(VAR_5, VAR_6); return (NULL); } BIO_set_fp(VAR_3, VAR_1, VAR_7); VAR_4 = ASN1_item_d2i_bio(VAR_0, VAR_3, VAR_2); BIO_fre...
openssl/c62981390d6cf9e3d612c489b8b77c2913b25807/a_d2i_fp.c/non_vul/1.json
null
null
false
CVE-2023-26545
['CWE-415']
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
torvalds/linux
net: mpls: fix stale pointer if allocation fails during device rename lianhui reports that when MPLS fails to register the sysctl table under new location (during device rename) the old pointers won't get overwritten and may be freed again (double free). Handle this gracefully. The best option would be unregistering ...
fda6c89fe3d9aca073495a664e1d5aea28cd4377
https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377
net/mpls/af_mpls.c
mpls_netconf_fill_devconf
null
null
null
static int mpls_netconf_fill_devconf(struct sk_buff *skb, struct mpls_dev *mdev, u32 portid, u32 seq, int event, unsigned int flags, int type) { struct nlmsghdr *nlh; struct netconfmsg *ncm; bool all = false; nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct netconfmsg), flags); if (!nl...
static int mpls_netconf_fill_devconf(struct sk_buff *VAR_0, struct mpls_dev *VAR_1, u32 VAR_2, u32 VAR_3, int VAR_4, unsigned int VAR_5, int VAR_6) { struct nlmsghdr *VAR_7; struct netconfmsg *VAR_8; bool VAR_9 = false; VAR_7 = nlmsg_put(VAR_0, VAR_2, VAR_3, VAR_4, sizeof(struct netconfmsg), ...
torvalds/linux/fda6c89fe3d9aca073495a664e1d5aea28cd4377/af_mpls.c/non_vul/63.json
null
null
false
CVE-2015-6779
['CWE-264']
AV:N/AC:M/Au:N/C:N/I:P/A:N
0
chromium
This patch implements a mechanism for more granular link URL permissions (filtering on scheme/host). This fixes the bug that allowed PDFs to have working links to any "chrome://" URLs. BUG=528505,226927 Review URL: https://codereview.chromium.org/1362433002 Cr-Commit-Position: refs/heads/master@{#351705}
1eefa26e1795192c5a347a1e1e7a99e88c47f9c4
https://chromium.googlesource.com/chromium/src/+/1eefa26e1795192c5a347a1e1e7a99e88c47f9c4
content/browser/child_process_security_policy_impl.cc
ChildProcessSecurityPolicyImpl::GrantPermissionsForFileSystem
null
null
null
void ChildProcessSecurityPolicyImpl::GrantPermissionsForFileSystem( int child_id, const std::string& filesystem_id, int permission) { base::AutoLock lock(lock_); SecurityStateMap::iterator state = security_state_.find(child_id); if (state == security_state_.end()) return; state->second->GrantPe...
void ChildProcessSecurityPolicyImpl::GrantPermissionsForFileSystem( int VAR_0, const std::string& VAR_1, int VAR_2) { base::AutoLock lock(lock_); SecurityStateMap::iterator VAR_3 = VAR_4.find(VAR_0); if (VAR_3 == VAR_4.end()) return; VAR_3->second->GrantPermissionsForFileSystem(VAR_1, VAR_2); }
chromium/1eefa26e1795192c5a347a1e1e7a99e88c47f9c4/child_process_security_policy_impl.cc/non_vul/55.json
null
null
false
CVE-2010-2943
['CWE-200']
AV:N/AC:L/Au:N/C:P/I:P/A:N
0
torvalds/linux
The block number comes from bulkstat based inode lookups to shortcut the mapping calculations. We ar enot able to trust anything from bulkstat, so drop the block number as well so that the correct lookups and mappings are always done. Signed-off-by: Dave Chinner <dchinner@redhat.com> Reviewed-by: Christoph Hellwig <hc...
7b6259e7a83647948fa33a736cc832310c8d85aa
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=7b6259e7a83647948fa33a736cc832310c8d85aa
fs/xfs/xfs_log_recover.c
xlog_recover
null
null
null
int xlog_recover( xlog_t *log) { xfs_daddr_t head_blk, tail_blk; int error; /* find the tail of the log */ if ((error = xlog_find_tail(log, &head_blk, &tail_blk))) return error; if (tail_blk != head_blk) { /* There used to be a comment here: * * disallow recovery on read-only mounts. note -- mount ...
int xlog_recover( xlog_t *VAR_0) { xfs_daddr_t VAR_1, VAR_2; int VAR_3; /* COMMENT_0 */ if ((VAR_3 = xlog_find_tail(VAR_0, &VAR_1, &VAR_2))) return VAR_3; if (VAR_2 != VAR_1) { /* COMMENT_1 */ ...
torvalds/linux/7b6259e7a83647948fa33a736cc832310c8d85aa/xfs_log_recover.c/non_vul/12.json
null
null
false
CVE-2011-2761
['CWE-399']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
chromium
Fix even more crashes. To help identify remaining crashes now and in the future, I have made the GetWidget methods on WidgetDelegate pure virtual. This will cause classes that don't define them to fail compile instead of crashing at run time. http://crbug.com/86119 TEST=none Review URL: http://codereview.chromium.org/...
080440cebdc80def86dd88356e5922946cc11a79
https://github.com/chromium/chromium/commit/080440cebdc80def86dd88356e5922946cc11a79
views/widget/widget.cc
Widget::Close
null
null
null
void Widget::Close() { if (widget_closed_) { // It appears we can hit this code path if you close a modal dialog then // close the last browser before the destructor is hit, which triggers // invoking Close again. return; } bool can_close = true; if (non_client_view_) can_close = non_client...
void Widget::Close() { if (VAR_0) { /* COMMENT_0 */ /* COMMENT_1 */ /* COMMENT_2 */ return; } bool VAR_1 = true; if (VAR_2) VAR_1 = VAR_2->CanClose(); if (VAR_1) { SaveWindowPosition(); VAR_3->Close(); VAR_0 = true; } }
chromium/080440cebdc80def86dd88356e5922946cc11a79/widget.cc/non_vul/111.json
null
null
false
CVE-2014-9626
['CWE-704', 'CWE-191', 'CWE-120']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
videolan/vlc
demux: mp4: fix buffer overflow in parsing of string boxes. We ensure that pbox->i_size is never smaller than 8 to avoid an integer underflow in the third argument of the subsequent call to memcpy. We also make sure no truncation occurs when passing values derived from the 64 bit integer p_box->i_size to arguments of ...
2e7c7091a61aa5d07e7997b393d821e91f593c39
https://github.com/videolan/vlc/commit/2e7c7091a61aa5d07e7997b393d821e91f593c39
modules/demux/mp4/libmp4.c
MP4_ReadBox_trun
null
null
null
static int MP4_ReadBox_trun( stream_t *p_stream, MP4_Box_t *p_box ) { MP4_READBOX_ENTER( MP4_Box_data_trun_t ); MP4_GETVERSIONFLAGS( p_box->data.p_trun ); MP4_GET4BYTES( p_box->data.p_trun->i_sample_count ); if( p_box->data.p_trun->i_flags & MP4_TRUN_DATA_OFFSET ) MP4_GET4BYTES( p_box->data....
static int MP4_ReadBox_trun( stream_t *VAR_0, MP4_Box_t *VAR_1 ) { MP4_READBOX_ENTER( VAR_2 ); MP4_GETVERSIONFLAGS( VAR_1->data.p_trun ); MP4_GET4BYTES( VAR_1->data.p_trun->i_sample_count ); if( VAR_1->data.p_trun->i_flags & VAR_3 ) MP4_GET4BYTES( VAR_1->data.p_trun->i_data_offset ); if(...
videolan/vlc/2e7c7091a61aa5d07e7997b393d821e91f593c39/libmp4.c/non_vul/125.json
null
null
false
CVE-2023-26123
['CWE-79']
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
raysan5/raylib
ADDED: Security check for `emscripten_run_script()` #2954
b436c8d7e5346a241b00511a11585936895d959d
https://github.com/raysan5/raylib/commit/b436c8d7e5346a241b00511a11585936895d959d
src/rcore.c
GetMonitorHeight
null
null
null
int GetMonitorHeight(int monitor) { #if defined(PLATFORM_DESKTOP) int monitorCount; GLFWmonitor **monitors = glfwGetMonitors(&monitorCount); if ((monitor >= 0) && (monitor < monitorCount)) { const GLFWvidmode *mode = glfwGetVideoMode(monitors[monitor]); if (mode) return mode->height; ...
int GetMonitorHeight(int VAR_0) { #if defined(VAR_1) int VAR_2; GLFWmonitor **VAR_3 = glfwGetMonitors(&VAR_2); if ((VAR_0 >= 0) && (VAR_0 < VAR_2)) { const GLFWvidmode *VAR_4 = glfwGetVideoMode(VAR_3[VAR_0]); if (VAR_4) return VAR_4->height; else TRACELOG(VAR_5, "GLFW: Failed t...
raysan5/raylib/b436c8d7e5346a241b00511a11585936895d959d/rcore.c/non_vul/94.json
null
null
false
CVE-2012-2763
['CWE-120']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
GNOME/gimp
script-fu: Bug #679215: Fixed potential buffer overflow in readstr_upto() Cherry picked from commit 76155d79df8d497d9a5994029247387e222da9e9. gimp-2-6 is no longer maintained. But we might as well commit this for the benefit of EL/LTS distros. This patch hasn't even been compiled, so YMMV. Enjoy.
744f7a4a2b5acb8b531a6f5dd8744ebb95348fc2
https://github.com/GNOME/gimp/commit/744f7a4a2b5acb8b531a6f5dd8744ebb95348fc2
plug-ins/script-fu/tinyscheme/scheme.c
gensym
null
null
null
INTERFACE pointer gensym(scheme *sc) { pointer x; char name[40]; for(; sc->gensym_cnt<LONG_MAX; sc->gensym_cnt++) { sprintf(name,"gensym-%ld",sc->gensym_cnt); /* first check oblist */ x = oblist_find_by_name(sc, name); if (x != sc->NIL) { continue...
INTERFACE VAR_0 gensym(scheme *VAR_1) { pointer VAR_2; char VAR_3[40]; for(; VAR_1->gensym_cnt<VAR_4; VAR_1->gensym_cnt++) { sprintf(VAR_3,"gensym-%ld",VAR_1->gensym_cnt); /* COMMENT_0 */ VAR_2 = oblist_find_by_name(VAR_1, VAR_3); if (VAR_2 != VAR_1->NIL) { ...
null
null
null
false
CVE-2017-5029
['CWE-787']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
GNOME/libxslt
Check for integer overflow in xsltAddTextString Limit buffer size in xsltAddTextString to INT_MAX. The issue can be exploited to trigger an out of bounds write on 64-bit systems. Originally reported to Chromium: https://crbug.com/676623
08ab2774b870de1c7b5a48693df75e8154addae5
https://github.com/GNOME/libxslt/commit/08ab2774b870de1c7b5a48693df75e8154addae5
libxslt/transform.c
templPush
null
null
null
static int templPush(xsltTransformContextPtr ctxt, xsltTemplatePtr value) { if (ctxt->templMax == 0) { ctxt->templMax = 4; ctxt->templTab = (xsltTemplatePtr *) xmlMalloc(ctxt->templMax * sizeof(ctxt->templTab[0])); if (ctxt->templTab == N...
static int templPush(xsltTransformContextPtr VAR_0, xsltTemplatePtr VAR_1) { if (VAR_0->templMax == 0) { VAR_0->templMax = 4; VAR_0->templTab = (xsltTemplatePtr *) xmlMalloc(VAR_0->templMax * sizeof(VAR_0->templTab[0])); if (VAR_0->templT...
GNOME/libxslt/08ab2774b870de1c7b5a48693df75e8154addae5/transform.c/non_vul/23.json
null
null
false
CVE-2023-29939
['CWE-125']
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
llvm/llvm-project
[mlir][spirv] Fix crash in spirv-lower-abi-attributes ... when the are no SPIR-V env attributes. Fixes: https://github.com/llvm/llvm-project/issues/59983 Reviewed By: antiagainst Differential Revision: https://reviews.llvm.org/D141695
466aa585c6dfb096bf9a7ad9bcbc6ce8cc7abff1
https://github.com/llvm/llvm-project/commit/466aa585c6dfb096bf9a7ad9bcbc6ce8cc7abff1
mlir/lib/Dialect/SPIRV/Transforms/LowerABIAttributesPass.cpp
ProcessInterfaceVarABI::matchAndRewrite
null
null
null
LogicalResult ProcessInterfaceVarABI::matchAndRewrite( spirv::FuncOp funcOp, OpAdaptor adaptor, ConversionPatternRewriter &rewriter) const { if (!funcOp->getAttrOfType<spirv::EntryPointABIAttr>( spirv::getEntryPointABIAttrName())) { // TODO: Non-entry point functions are not handled. return ...
LogicalResult ProcessInterfaceVarABI::matchAndRewrite( spirv::FuncOp VAR_0, OpAdaptor VAR_1, ConversionPatternRewriter &VAR_2) const { if (!VAR_0->getAttrOfType<spirv::EntryPointABIAttr>( spirv::getEntryPointABIAttrName())) { /* COMMENT_0 */ return failure(); } TypeConverter::SignatureCo...
llvm/llvm-project/466aa585c6dfb096bf9a7ad9bcbc6ce8cc7abff1/LowerABIAttributesPass.cpp/non_vul/3.json
null
null
false
CVE-2020-10232
['CWE-787']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
sleuthkit
Fix stack buffer overflow in yaffsfs_istat Prevent a stack buffer overflow in yaffsfs_istat by increasing the buffer size to the size required by tsk_fs_time_to_str.
459ae818fc8dae717549810150de4d191ce158f1
https://github.com/sleuthkit/sleuthkit/commit/459ae818fc8dae717549810150de4d191ce158f1
tsk/fs/yaffs.cpp
yaffsfs_get_default_attr_type
null
null
null
static TSK_FS_ATTR_TYPE_ENUM yaffsfs_get_default_attr_type(const TSK_FS_FILE * /*a_file*/) { return TSK_FS_ATTR_TYPE_DEFAULT; }
static TSK_FS_ATTR_TYPE_ENUM yaffsfs_get_default_attr_type(const TSK_FS_FILE * /* COMMENT_0 */) { return VAR_0; }
sleuthkit/459ae818fc8dae717549810150de4d191ce158f1/yaffs.cpp/non_vul/27.json
null
null
false
CVE-2023-1393
['CWE-416']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
xorg/xserver
ZDI-CAN-19866/CVE-2023-1393 If a client explicitly destroys the compositor overlay window (aka COW), we would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later. Make sure to clear the CompScreen pointer to the COW when the latter gets destroyed explicitly b...
26ef545b3502f61ca722a7a3373507e88ef64110
https://cgit.freedesktop.org/xorg/xserver/commit/?id=26ef545b3502f61ca722a7a3373507e88ef64110
composite/compwindow.c
compRealizeWindow
null
null
null
Bool compRealizeWindow(WindowPtr pWin) { ScreenPtr pScreen = pWin->drawable.pScreen; CompScreenPtr cs = GetCompScreen(pScreen); Bool ret = TRUE; pScreen->RealizeWindow = cs->RealizeWindow; compCheckRedirect(pWin); if (!(*pScreen->RealizeWindow) (pWin)) ret = FALSE; cs->RealizeWindow...
Bool compRealizeWindow(WindowPtr VAR_0) { ScreenPtr VAR_1 = VAR_0->drawable.pScreen; CompScreenPtr VAR_2 = GetCompScreen(VAR_1); Bool VAR_3 = TRUE; VAR_1->RealizeWindow = VAR_2->RealizeWindow; compCheckRedirect(VAR_0); if (!(*VAR_1->RealizeWindow) (VAR_0)) VAR_3 = FALSE; VAR_2->Real...
xorg/xserver/26ef545b3502f61ca722a7a3373507e88ef64110/compwindow.c/non_vul/12.json
null
null
false
CVE-2016-10249
['CWE-190']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
jasper-software/jasper
Fixed an integer overflow problem.
988f8365f7d8ad8073b6786e433d34c553ecf568
https://github.com/jasper-software/jasper/commit/988f8365f7d8ad8073b6786e433d34c553ecf568
src/libjasper/base/jas_malloc.c
jas_set_max_mem_usage
null
null
null
void jas_set_max_mem_usage(size_t max_mem) { jas_max_mem = max_mem; }
void jas_set_max_mem_usage(size_t VAR_0) { VAR_1 = VAR_0; }
jasper-software/jasper/988f8365f7d8ad8073b6786e433d34c553ecf568/jas_malloc.c/non_vul/0.json
null
null
false
CVE-2020-15569
['CWE-416']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
milkytracker/MilkyTracker
Fix use-after-free in PlayerGeneric destructor
7afd55c42ad80d01a339197a2d8b5461d214edaf
https://github.com/milkytracker/MilkyTracker/commit/7afd55c42ad80d01a339197a2d8b5461d214edaf
src/milkyplay/PlayerGeneric.cpp
PlayerGeneric::lastPattern
null
null
null
void PlayerGeneric::lastPattern() { if (player) player->lastPattern(); }
void PlayerGeneric::lastPattern() { if (VAR_0) VAR_0->lastPattern(); }
milkytracker/MilkyTracker/7afd55c42ad80d01a339197a2d8b5461d214edaf/PlayerGeneric.cpp/non_vul/29.json
null
null
false
CVE-2020-12845
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
cherokee/webserver
Guard empty input in get_authorization to resolve CVE-2020-12845
5855ac91381d39bbbf11e1c301a738606dc9b1e0
https://github.com/cherokee/webserver/commit/5855ac91381d39bbbf11e1c301a738606dc9b1e0
cherokee/connection.c
cherokee_connection_build_local_directory_userdir
null
null
null
ret_t cherokee_connection_build_local_directory_userdir (cherokee_connection_t *conn, cherokee_virtual_server_t *vsrv) { ret_t ret; struct passwd pwd; char tmp[1024]; /* Default: it is inside the UserDir in home */ ret = cherokee_getpwnam (...
ret_t cherokee_connection_build_local_directory_userdir (cherokee_connection_t *VAR_0, cherokee_virtual_server_t *VAR_1) { ret_t VAR_2; struct passwd VAR_3; char VAR_4[1024]; /* COMMENT_0 */ VAR_2 = cherokee_getpwnam (VAR_0->userdir.buf,...
cherokee/webserver/5855ac91381d39bbbf11e1c301a738606dc9b1e0/connection.c/non_vul/22.json
null
null
false
CVE-2016-9573
['CWE-476', 'CWE-125']
AV:N/AC:M/Au:N/C:P/I:N/A:P
0
szukw000/openjpeg
Changes for issues #863 and #862
7b28bd2b723df6be09fe7791eba33147c1c47d0d
https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
src/lib/openjp2/j2k.c
opj_j2k_read_qcc
null
null
null
static OPJ_BOOL opj_j2k_read_qcc( opj_j2k_t *p_j2k, OPJ_BYTE * p_header_data, OPJ_UINT32 p_header_size, opj_event_mgr_t * p_manager ) { OPJ_UINT32 l_num_comp,l_comp_n...
static OPJ_BOOL opj_j2k_read_qcc( opj_j2k_t *VAR_0, OPJ_BYTE * VAR_1, OPJ_UINT32 VAR_2, opj_event_mgr_t * VAR_3 ) { OPJ_UINT32 VAR_4,VAR_5; /* COMMENT_0 */ ...
szukw000/openjpeg/7b28bd2b723df6be09fe7791eba33147c1c47d0d/j2k.c/non_vul/111.json
null
null
false
CVE-2021-24031
['CWE-276']
AV:L/AC:L/Au:N/C:P/I:N/A:N
0
facebook/zstd
[programs] set chmod 600 after opening destination file This resolves a race condition where zstd or unzstd may expose read permissions beyond the original file allowed. Mode 600 is used temporarily during the compression and decompression write stage and the new file inherits the original file’s mode at the end. Fi...
3968160a916a759c3d3418da533e1b4f8b795343
https://github.com/facebook/zstd/commit/3968160a916a759c3d3418da533e1b4f8b795343
programs/fileio.c
FIO_zstdErrorHelp
null
null
null
static void FIO_zstdErrorHelp(FIO_prefs_t* const prefs, dRess_t* ress, size_t err, char const* srcFileName) { ZSTD_frameHeader header; /* Help message only for one specific error */ if (ZSTD_getErrorCode(err) != ZSTD_error_frameParameter_windowTooLarge) return; /* Try to decode the frame heade...
static void FIO_zstdErrorHelp(FIO_prefs_t* const VAR_0, dRess_t* VAR_1, size_t VAR_2, char const* VAR_3) { ZSTD_frameHeader VAR_4; /* COMMENT_0 */ if (ZSTD_getErrorCode(VAR_2) != VAR_5) return; /* COMMENT_1 */ VAR_2 = ZSTD_getFrameHeader(&VAR_4, VAR_1->srcBuffer, VAR_1->srcBufferLoaded); ...
facebook/zstd/3968160a916a759c3d3418da533e1b4f8b795343/fileio.c/non_vul/58.json
null
null
false
CVE-2020-25212
['CWE-367', 'CWE-787']
AV:L/AC:M/Au:N/C:P/I:P/A:P
0
torvalds/linux
Move the buffer size check to decode_attr_security_label() before memcpy() Only call memcpy() if the buffer is large enough Fixes: aa9c2669626c ("NFS: Client implementation of Labeled-NFS") Signed-off-by: Jeffrey Mitchell <jeffrey.mitchell@starlab.io> [Trond: clean up duplicate test of label->len != 0] Signed-off-by: ...
b4487b93545214a9db8cbf32e86411677b0cca21
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=b4487b93545214a9db8cbf32e86411677b0cca21
fs/nfs/nfs4proc.c
nfs4_label_init_security
null
null
null
static inline struct nfs4_label * nfs4_label_init_security(struct inode *dir, struct dentry *dentry, struct iattr *sattr, struct nfs4_label *label) { int err; if (label == NULL) return NULL; if (nfs_server_capable(dir, NFS_CAP_SECURITY_LABEL) == 0) return NULL; err = security_dentry_init_security(dentry, sa...
static inline struct nfs4_label * nfs4_label_init_security(struct inode *VAR_0, struct dentry *dentry, struct iattr *VAR_1, struct nfs4_label *VAR_2) { int VAR_3; if (VAR_2 == NULL) return NULL; if (nfs_server_capable(VAR_0, VAR_4) == 0) return NULL; VAR_3 = security_dentry_init_security(dentry, VAR_1->ia_m...
torvalds/linux/b4487b93545214a9db8cbf32e86411677b0cca21/nfs4proc.c/non_vul/301.json
null
null
false
CVE-2013-2918
['CWE-399']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
chromium
Avoid collapsing anonymous block children already being destroyed When normalizing a block with anonymous blocks for first-letter, before content, and contained text, a collapsing anonymous block cascade is triggered that attempts to collapse the contained text's anonymous block within its destruction method. To avoid...
1b7ff2a8799dd3f0365b3c3358c97fe99a4287dc
https://github.com/chromium/chromium/commit/1b7ff2a8799dd3f0365b3c3358c97fe99a4287dc
third_party/WebKit/Source/core/rendering/RenderBlock.cpp
RenderBlock::addOverflowFromChildren
null
null
null
void RenderBlock::addOverflowFromChildren() { if (!hasColumns()) { if (childrenInline()) addOverflowFromInlineChildren(); else addOverflowFromBlockChildren(); } else { ColumnInfo* colInfo = columnInfo(); if (columnCount(colInfo)) { LayoutRect l...
void RenderBlock::addOverflowFromChildren() { if (!hasColumns()) { if (childrenInline()) addOverflowFromInlineChildren(); else addOverflowFromBlockChildren(); } else { ColumnInfo* VAR_0 = columnInfo(); if (columnCount(VAR_0)) { LayoutRect VAR_1...
chromium/1b7ff2a8799dd3f0365b3c3358c97fe99a4287dc/RenderBlock.cpp/non_vul/190.json
null
null
false
CVE-2023-50428
['CWE-Other']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
bitcoin
Apply -datacarriersize to all datacarrying
f2c0396cd434797c76eecc1180c5f4ba98aee246
https://github.com/bitcoin/bitcoin/commit/f2c0396cd434797c76eecc1180c5f4ba98aee246
src/validation.cpp
ChainstateManager::GetPruneRange
null
null
null
std::pair<int, int> ChainstateManager::GetPruneRange(const Chainstate& chainstate, int last_height_can_prune) { if (chainstate.m_chain.Height() <= 0) { return {0, 0}; } int prune_start{0}; if (this->GetAll().size() > 1 && m_snapshot_chainstate.get() == &chainstate) { // Leave the blocks...
std::pair<int, int> ChainstateManager::GetPruneRange(const Chainstate& VAR_0, int VAR_1) { if (VAR_0.m_chain.Height() <= 0) { return {0, 0}; } int VAR_2{0}; if (this->GetAll().size() > 1 && VAR_3.get() == &VAR_0) { /* COMMENT_0 */ /* COMMENT_1 */ VAR_2 = *Assert(GetSnaps...
bitcoin/f2c0396cd434797c76eecc1180c5f4ba98aee246/validation.cpp/non_vul/105.json
null
null
false
CVE-2021-44924
['CWE-835']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
gpac
fixed #1959
e2acb1511d1e69115141ea3080afd1cce6a15497
https://github.com/gpac/gpac/commit/e2acb1511d1e69115141ea3080afd1cce6a15497
src/media_tools/av_parsers.c
gf_media_aom_probe_annexb
null
null
null
Bool gf_media_aom_probe_annexb(GF_BitStream *bs) { Bool res = GF_TRUE; u64 init_pos = gf_bs_get_position(bs); u64 sz = gf_av1_leb128_read(bs, NULL); if (!sz) res = GF_FALSE; while (sz > 0) { u8 Leb128Bytes = 0; u64 frame_unit_size = gf_av1_leb128_read(bs, &Leb128Bytes); if (!frame_unit_size) { res = GF_F...
Bool gf_media_aom_probe_annexb(GF_BitStream *VAR_0) { Bool VAR_1 = VAR_2; u64 VAR_3 = gf_bs_get_position(VAR_0); u64 VAR_4 = gf_av1_leb128_read(VAR_0, NULL); if (!VAR_4) VAR_1 = VAR_5; while (VAR_4 > 0) { u8 VAR_6 = 0; u64 VAR_7 = gf_av1_leb128_read(VAR_0, &VAR_6); if (!VAR_7) { VAR_1 = VAR_5; break; ...
gpac/e2acb1511d1e69115141ea3080afd1cce6a15497/av_parsers.c/non_vul/176.json
null
null
false