cve_id
stringlengths
13
16
cwe_ids
stringclasses
400 values
cvss_vector
stringclasses
256 values
cvss_is_v3
float64
0
1
repo_name
stringlengths
3
45
commit_msg
stringlengths
3
19.3k
commit_hash
stringlengths
7
40
git_url
stringlengths
56
159
file_path
stringlengths
4
100
func_name
stringlengths
1
127
func_before
stringlengths
10
83k
abstract_func_before
stringlengths
10
68.1k
func_graph_path_before
stringlengths
38
127
func
stringlengths
8
83.3k
abstract_func
stringlengths
8
68.4k
func_graph_path
stringlengths
35
126
diff_func
stringlengths
77
14.5k
diff_line_info
stringlengths
42
5.91k
is_vul
bool
2 classes
CVE-2021-29579
['CWE-787']
AV:L/AC:L/Au:N/C:P/I:P/A:P
0
tensorflow
Prevent heap OOB error in `MaxPoolGrad` PiperOrigin-RevId: 372424854 Change-Id: Idac0f23867ad8b0601cafbaaa52d5e64269e63a7
a74768f8e4efbda4def9f16ee7e13cf3922ac5f7
https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7
tensorflow/core/kernels/maxpooling_op.cc
MaxPoolingNoMaskV2Op
null
null
null
explicit MaxPoolingNoMaskV2Op(OpKernelConstruction* context) : OpKernel(context) { string data_format; OP_REQUIRES_OK(context, context->GetAttr("data_format", &data_format)); OP_REQUIRES(context, FormatFromString(data_format, &data_format_), errors::InvalidArgument("Invalid data format...
explicit MaxPoolingNoMaskV2Op(OpKernelConstruction* VAR_0) : OpKernel(VAR_0) { string VAR_1; OP_REQUIRES_OK(VAR_0, VAR_0->GetAttr("data_format", &VAR_1)); OP_REQUIRES(VAR_0, FormatFromString(VAR_1, &VAR_2), errors::InvalidArgument("Invalid data format")); if (VAR_0->num_inputs() ==...
null
null
null
false
CVE-2021-31258
['CWE-476']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
gpac
fixed #1706
ebfa346eff05049718f7b80041093b4c5581c24e
https://github.com/gpac/gpac/commit/ebfa346eff05049718f7b80041093b4c5581c24e
src/isomedia/isom_read.c
gf_isom_disable_odf_conversion
null
null
null
GF_EXPORT void gf_isom_disable_odf_conversion(GF_ISOFile *movie, Bool disable) { if (movie) movie->disable_odf_translate = disable; }
GF_EXPORT VAR_0 gf_isom_disable_odf_conversion(GF_ISOFile *VAR_1, Bool VAR_2) { if (VAR_1) VAR_1->disable_odf_translate = VAR_2; }
null
null
null
false
CVE-2016-6494
['CWE-200']
AV:L/AC:L/Au:N/C:P/I:N/A:N
0
mongodb/mongo
SERVER-25335 avoid group and other permissions when creating .dbshell history file
035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
src/mongo/shell/linenoise.cpp
setDisplayAttribute
null
null
null
static void setDisplayAttribute(bool enhancedDisplay) { #ifdef _WIN32 if (enhancedDisplay) { CONSOLE_SCREEN_BUFFER_INFO inf; GetConsoleScreenBufferInfo(console_out, &inf); oldDisplayAttribute = inf.wAttributes; BYTE oldLowByte = oldDisplayAttribute & 0xFF; BYTE newLowByte; ...
static void setDisplayAttribute(bool VAR_0) { #ifdef VAR_1 if (VAR_0) { CONSOLE_SCREEN_BUFFER_INFO VAR_2; GetConsoleScreenBufferInfo(VAR_3, &VAR_2); VAR_4 = VAR_2.wAttributes; BYTE VAR_5 = VAR_4 & 0xFF; BYTE VAR_6; switch (VAR_5) { case 0x07: ...
mongodb/mongo/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0/linenoise.cpp/non_vul/4.json
null
null
false
CVE-2019-19815
['CWE-476']
AV:N/AC:M/Au:N/C:N/I:N/A:C
0
torvalds/linux
f2fs: support swap file w/ DIO Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6
https://github.com/torvalds/linux/commit/4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6
include/trace/events/f2fs.h
set_inode_flag
null
null
null
static inline void set_inode_flag(struct inode *inode, int flag) { if (!test_bit(flag, &F2FS_I(inode)->flags)) set_bit(flag, &F2FS_I(inode)->flags); __mark_inode_dirty_flag(inode, flag, true); }
static inline void set_inode_flag(struct inode *inode, int VAR_0) { if (!test_bit(VAR_0, &F2FS_I(inode)->flags)) set_bit(VAR_0, &F2FS_I(inode)->flags); __mark_inode_dirty_flag(inode, VAR_0, true); }
torvalds/linux/4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6/f2fs.h/non_vul/141.json
null
null
false
CVE-2023-4751
['CWE-122']
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
vim
patch 9.0.1331: illegal memory access when using :ball in Visual mode Problem: Illegal memory access when using :ball in Visual mode. Solution: Stop Visual mode when using :ball. (Pavel Mayorov, closes #11923)
e1121b139480f53d1b06f84f3e4574048108fa0b
https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b
src/buffer.c
get_winopts
null
null
null
void get_winopts(buf_T *buf) { wininfo_T *wip; clear_winopt(&curwin->w_onebuf_opt); #ifdef FEAT_FOLDING clearFolding(curwin); #endif wip = find_wininfo(buf, TRUE, TRUE); if (wip != NULL && wip->wi_win != NULL && wip->wi_win != curwin && wip->wi_win->w_buffer == buf) { // The buffer is cu...
void get_winopts(buf_T *VAR_0) { wininfo_T *VAR_1; clear_winopt(&VAR_2->w_onebuf_opt); #ifdef VAR_3 clearFolding(VAR_2); #endif VAR_1 = find_wininfo(VAR_0, TRUE, TRUE); if (VAR_1 != NULL && VAR_1->wi_win != NULL && VAR_1->wi_win != VAR_2 && VAR_1->wi_win->w_buffer == VAR_0) { /* COMMENT_...
vim/e1121b139480f53d1b06f84f3e4574048108fa0b/buffer.c/non_vul/11.json
null
null
false
CVE-2012-2383
['CWE-189']
AV:L/AC:L/Au:N/C:N/I:N/A:C
0
torvalds/linux
drm/i915: fix integer overflow in i915_gem_execbuffer2() On 32-bit systems, a large args->buffer_count from userspace via ioctl may overflow the allocation size, leading to out-of-bounds access. This vulnerability was introduced in commit 8408c282 ("drm/i915: First try a normal large kmalloc for the temporary exec bu...
ed8cd3b2cd61004cab85380c52b1817aca1ca49b
https://github.com/torvalds/linux/commit/ed8cd3b2cd61004cab85380c52b1817aca1ca49b
drivers/gpu/drm/i915/i915_gem_execbuffer.c
i915_gem_object_set_to_gpu_domain
null
null
null
static void i915_gem_object_set_to_gpu_domain(struct drm_i915_gem_object *obj, struct intel_ring_buffer *ring, struct change_domains *cd) { uint32_t invalidate_domains = 0, flush_domains = 0; /* * If the object isn't moving to a new write domain, * let the object stay in multiple read domains */ i...
static void i915_gem_object_set_to_gpu_domain(struct drm_i915_gem_object *VAR_0, struct intel_ring_buffer *VAR_1, struct change_domains *VAR_2) { uint32_t VAR_3 = 0, VAR_4 = 0; /* COMMENT_0 */ if ...
torvalds/linux/ed8cd3b2cd61004cab85380c52b1817aca1ca49b/i915_gem_execbuffer.c/non_vul/12.json
null
null
false
CVE-2018-5702
['CWE-Other']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
transmission
mitigate dns rebinding attacks against daemon
cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84
https://github.com/transmission/transmission/commit/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84
libtransmission/session.c
tr_sessionGetDeleteSource
null
null
null
bool tr_sessionGetDeleteSource(tr_session const* session) { TR_ASSERT(tr_isSession(session)); return session->deleteSourceTorrent; }
bool tr_sessionGetDeleteSource(tr_session const* VAR_0) { TR_ASSERT(tr_isSession(VAR_0)); return VAR_0->deleteSourceTorrent; }
transmission/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84/session.c/non_vul/95.json
null
null
false
CVE-2011-4131
['CWE-189']
AV:A/AC:H/Au:N/C:N/I:N/A:C
0
torvalds/linux
NFSv4: include bitmap in nfsv4 get acl data The NFSv4 bitmap size is unbounded: a server can return an arbitrary sized bitmap in an FATTR4_WORD0_ACL request. Replace using the nfs4_fattr_bitmap_maxsz as a guess to the maximum bitmask returned by a server with the inclusion of the bitmap (xdr length plus bitmasks) and...
bf118a342f10dafe44b14451a1392c3254629a1f
https://github.com/torvalds/linux/commit/bf118a342f10dafe44b14451a1392c3254629a1f
fs/nfs/nfs4xdr.c
encode_claim_previous
null
null
null
static inline void encode_claim_previous(struct xdr_stream *xdr, fmode_t type) { __be32 *p; p = reserve_space(xdr, 4); *p = cpu_to_be32(NFS4_OPEN_CLAIM_PREVIOUS); encode_delegation_type(xdr, type); }
static inline void encode_claim_previous(struct xdr_stream *VAR_0, fmode_t VAR_1) { __be32 *VAR_2; VAR_2 = reserve_space(VAR_0, 4); *VAR_2 = cpu_to_be32(VAR_3); encode_delegation_type(VAR_0, VAR_1); }
torvalds/linux/bf118a342f10dafe44b14451a1392c3254629a1f/nfs4xdr.c/non_vul/174.json
null
null
false
CVE-2014-7928
['CWE-19']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
chromium
Fix for 435073: CHECK failure in CHECK(p->IsSmi()) failed. The bug was an error when copying arrays in crankshaft. If it's a holey smi array, the copy must be done as FAST_HOLEY_ELEMENTS to prevent representation changes from being inserted that deopt on encountering the hole. Also, prevent inlining array pop() and s...
3d58b82addcdc72755539631b1d5dc603a9b2135
https://chromium.googlesource.com/v8/v8/+/3d58b82addcdc72755539631b1d5dc603a9b2135
src/hydrogen.cc
HOptimizedGraphBuilder::HandleCompoundAssignment
null
null
null
void HOptimizedGraphBuilder::HandleCompoundAssignment(Assignment* expr) { Expression* target = expr->target(); VariableProxy* proxy = target->AsVariableProxy(); Property* prop = target->AsProperty(); DCHECK(proxy == NULL || prop == NULL); // We have a second position recorded in the FullCodeGenerator to have...
void HOptimizedGraphBuilder::HandleCompoundAssignment(Assignment* VAR_0) { Expression* VAR_1 = VAR_0->target(); VariableProxy* VAR_2 = VAR_1->AsVariableProxy(); Property* VAR_3 = VAR_1->AsProperty(); DCHECK(VAR_2 == NULL || VAR_3 == NULL); /* COMMENT_0 */ /* COMMENT_1 */ BinaryOperation* VAR_4 = VAR_0->b...
chromium/3d58b82addcdc72755539631b1d5dc603a9b2135/hydrogen.cc/non_vul/235.json
null
null
false
CVE-2012-1179
['CWE-264']
AV:A/AC:M/Au:S/C:N/I:N/A:C
0
torvalds/linux
mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode commit 1a5a9906d4e8d1976b701f889d8f35d54b928f25 upstream. In some cases it may happen that pmd_none_or_clear_bad() is called with the mmap_sem hold in read mode. In those cases the huge page faults can allocate hugepmds under pmd_none_or_clea...
4a1d704194a441bf83c636004a479e01360ec850
https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850
fs/proc/task_mmu.c
show_map_vma
null
null
null
static void show_map_vma(struct seq_file *m, struct vm_area_struct *vma) { struct mm_struct *mm = vma->vm_mm; struct file *file = vma->vm_file; vm_flags_t flags = vma->vm_flags; unsigned long ino = 0; unsigned long long pgoff = 0; unsigned long start, end; dev_t dev = 0; int len; if (file) { struct inode *i...
static void show_map_vma(struct seq_file *VAR_0, struct vm_area_struct *VAR_1) { struct mm_struct *VAR_2 = VAR_1->vm_mm; struct file *file = VAR_1->vm_file; vm_flags_t VAR_3 = VAR_1->vm_flags; unsigned long VAR_4 = 0; unsigned long long VAR_5 = 0; unsigned long VAR_6, VAR_7; dev_t VAR_8 = 0; int VAR_9; if (fi...
torvalds/linux/4a1d704194a441bf83c636004a479e01360ec850/task_mmu.c/non_vul/0.json
null
null
false
CVE-2007-4997
['CWE-189']
AV:N/AC:M/Au:N/C:N/I:N/A:C
0
kernel/git/avi/kvm
Reported by Chris Evans <scarybeasts@gmail.com>: > The summary is that an evil 80211 frame can crash out a victim's > machine. It only applies to drivers using the 80211 wireless code, and > only then to certain drivers (and even then depends on a card's > firmware not dropping a dubious packet). I must confess I'm no...
04045f98e0457aba7d4e6736f37eed189c48a5f7
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=04045f98e0457aba7d4e6736f37eed189c48a5f7
net/ieee80211/ieee80211_rx.c
ieee80211_read_qos_param_element
null
null
null
static int ieee80211_read_qos_param_element(struct ieee80211_qos_parameter_info *element_param, struct ieee80211_info_element *info_element) { int ret = 0; u16 size = sizeof(struct ieee80211_qos_parameter_info) - 2; if ((info_element == NULL) || (element_param == NULL)) return -1; if (info_ele...
static int ieee80211_read_qos_param_element(struct ieee80211_qos_parameter_info *VAR_0, struct ieee80211_info_element *VAR_1) { int VAR_2 = 0; u16 VAR_3 = sizeof(struct ieee80211_qos_parameter_info) - 2; if ((VAR_1 == NULL) || (VAR_0 == NULL)) return -1; if (VAR_1->id == VAR_4 && VAR_1->len ==...
kernel/git/avi/kvm/04045f98e0457aba7d4e6736f37eed189c48a5f7/ieee80211_rx.c/non_vul/2.json
null
null
false
CVE-2023-48945
['CWE-787']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
openlink/virtuoso-opensource
Fixed issue with missing cast on return type (fixes #1172) The return type from searched case as well as control expression cannot be predicted as it can be any type, so we have to cast explicitly to column type.
a7de776fdf7518d74522168f1c0960241f18e110
https://github.com/openlink/virtuoso-opensource/commit/a7de776fdf7518d74522168f1c0960241f18e110
libsrc/Wi/sqlvec.c
sslr_set_member
null
null
null
dk_set_t sslr_set_member (dk_set_t ssls, state_slot_t * param) { if (!param) return NULL; DO_SET (state_slot_t *, ssl, &ssls) if (ssl && ssl->ssl_index == param->ssl_index) return iter; END_DO_SET (); return NULL; }
dk_set_t sslr_set_member (dk_set_t VAR_0, state_slot_t * VAR_1) { if (!VAR_1) return NULL; VAR_2 (state_slot_t *, VAR_3, &VAR_0) if (VAR_3 && VAR_3->ssl_index == VAR_1->ssl_index) return VAR_4; END_DO_SET (); return NULL; }
openlink/virtuoso-opensource/a7de776fdf7518d74522168f1c0960241f18e110/sqlvec.c/non_vul/113.json
null
null
false
CVE-2020-13645
['CWE-295']
AV:N/AC:L/Au:N/C:P/I:P/A:N
0
GNOME/glib-networking
Return bad identity error if identity is unset When the server-identity property of GTlsClientConnection is unset, the documentation sasy we need to fail the certificate verification with G_TLS_CERTIFICATE_BAD_IDENTITY. This is important because otherwise, it's easy for applications to fail to specify server identity....
dbc8d69f58b07f6ed091aa123e5d40a53573a5fc
https://github.com/GNOME/glib-networking/commit/dbc8d69f58b07f6ed091aa123e5d40a53573a5fc
tls/base/gtlsconnection-base.c
g_tls_connection_base_condition_check
null
null
null
static GIOCondition g_tls_connection_base_condition_check (GDatagramBased *datagram_based, GIOCondition condition) { GTlsConnectionBase *tls = G_TLS_CONNECTION_BASE (datagram_based); return g_tls_connection_base_check (tls, condition) ? condition : 0; }
static GIOCondition g_tls_connection_base_condition_check (GDatagramBased *VAR_0, GIOCondition VAR_1) { GTlsConnectionBase *VAR_2 = G_TLS_CONNECTION_BASE (VAR_0); return g_tls_connection_base_check (VAR_2, VAR_1) ? VAR_1 : 0; }
GNOME/glib-networking/dbc8d69f58b07f6ed091aa123e5d40a53573a5fc/gtlsconnection-base.c/non_vul/75.json
null
null
false
CVE-2014-2672
['CWE-362']
AV:N/AC:M/Au:N/C:N/I:N/A:C
0
torvalds/linux
ath9k: protect tid->sched check We check tid->sched without a lock taken on ath_tx_aggr_sleep(). That is race condition which can result of doing list_del(&tid->list) twice (second time with poisoned list node) and cause crash like shown below: [424271.637220] BUG: unable to handle kernel paging request at 00100104 [...
21f8aaee0c62708654988ce092838aa7df4d25d8
https://github.com/torvalds/linux/commit/21f8aaee0c62708654988ce092838aa7df4d25d8
drivers/net/wireless/ath/ath9k/xmit.c
ath_tx_complete
null
null
null
static void ath_tx_complete(struct ath_softc *sc, struct sk_buff *skb, int tx_flags, struct ath_txq *txq) { struct ieee80211_tx_info *tx_info = IEEE80211_SKB_CB(skb); struct ath_common *common = ath9k_hw_common(sc->sc_ah); struct ieee80211_hdr * hdr = (struct ieee80211_hdr *)skb->data; int padpos, padsize; ...
static void ath_tx_complete(struct ath_softc *VAR_0, struct sk_buff *VAR_1, int VAR_2, struct ath_txq *VAR_3) { struct ieee80211_tx_info *VAR_4 = IEEE80211_SKB_CB(VAR_1); struct ath_common *VAR_5 = ath9k_hw_common(VAR_0->sc_ah); struct ieee80211_hdr * VAR_6 = (struct ieee80211_hdr *)VAR_1->data; int VAR_7, V...
torvalds/linux/21f8aaee0c62708654988ce092838aa7df4d25d8/xmit.c/non_vul/34.json
null
null
false
CVE-2018-10675
['CWE-416']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
torvalds/linux
mm/mempolicy: fix use after free when calling get_mempolicy I hit a use after free issue when executing trinity and repoduced it with KASAN enabled. The related call trace is as follows. BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766 Read of size 2 by task syz-executor1/798 ...
73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
mm/mempolicy.c
do_migrate_pages
null
null
null
int do_migrate_pages(struct mm_struct *mm, const nodemask_t *from, const nodemask_t *to, int flags) { int busy = 0; int err; nodemask_t tmp; err = migrate_prep(); if (err) return err; down_read(&mm->mmap_sem); /* * Find a 'source' bit set in 'tmp' whose corresponding 'dest' * bit in 'to' is not a...
int do_migrate_pages(struct mm_struct *VAR_0, const nodemask_t *VAR_1, const nodemask_t *VAR_2, int VAR_3) { int VAR_4 = 0; int VAR_5; nodemask_t VAR_6; VAR_5 = migrate_prep(); if (VAR_5) return VAR_5; down_read(&VAR_0->mmap_sem); /* COMMENT_0 */ ...
torvalds/linux/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99/mempolicy.c/non_vul/2.json
null
null
false
CVE-2020-19752
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
kohler/gifsicle
Avoid problems with colormapless GIFs (#140)
eb9e083dcc0050996d79de2076ddc76011ad2f10
https://github.com/kohler/gifsicle/commit/eb9e083dcc0050996d79de2076ddc76011ad2f10
src/support.c
parse_rectangle
null
null
null
int parse_rectangle(Clp_Parser *clp, const char *arg, int complain, void *thunk) { const char *input_arg = arg; char *val; int x = position_x = strtol(arg, &val, 10); (void)thunk; if (*val == ',') { int y = position_y = strtol(val + 1, &val, 10); if (*val == '-' && parse_position(clp, val + 1, 0, 0))...
int parse_rectangle(Clp_Parser *VAR_0, const char *VAR_1, int VAR_2, void *VAR_3) { const char *VAR_4 = VAR_1; char *VAR_5; int VAR_6 = VAR_7 = strtol(VAR_1, &VAR_5, 10); (void)VAR_3; if (*VAR_5 == ',') { int VAR_8 = VAR_9 = strtol(VAR_5 + 1, &VAR_5, 10); if (*VAR_5 == '-' && parse_position(VAR_0, VA...
kohler/gifsicle/eb9e083dcc0050996d79de2076ddc76011ad2f10/support.c/non_vul/6.json
null
null
false
CVE-2021-3331
['CWE-Other']
AV:N/AC:L/Au:N/C:C/I:C/A:C
0
winscp
Bug 1943: Prevent loading session settings that can lead to remote code execution from handled URLs https://winscp.net/tracker/1943 (cherry picked from commit ec584f5189a856cd79509f754722a6898045c5e0) Source commit: 0f4be408b3f01132b00682da72d925d6c4ee649b
faa96e8144e6925a380f94a97aa382c9427f688d
https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688d
source/windows/ConsoleRunner.cpp
TConsoleRunner::SynchronizeControllerTooManyDirectories
null
null
null
void __fastcall TConsoleRunner::SynchronizeControllerTooManyDirectories( TSynchronizeController * /*Sender*/, int & MaxDirectories) { if (Aborted()) { Abort(); } if (MaxDirectories < GUIConfiguration->MaxWatchDirectories) { MaxDirectories = GUIConfiguration->MaxWatchDirectories; } else { ...
void __fastcall TConsoleRunner::SynchronizeControllerTooManyDirectories( TSynchronizeController * /* COMMENT_0 */, int & VAR_0) { if (Aborted()) { Abort(); } if (VAR_0 < VAR_1->MaxWatchDirectories) { VAR_0 = VAR_1->MaxWatchDirectories; } else { VAR_0 *= 2; } }
winscp/faa96e8144e6925a380f94a97aa382c9427f688d/ConsoleRunner.cpp/non_vul/76.json
null
null
false
CVE-2020-26759
['CWE-120']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
mymarilyn/clickhouse-driver
Fix malformed read/write in BufferedReader read_strings and read affected
3e990547e064b8fca916b23a0f7d6fe8c63c7f6b
https://github.com/mymarilyn/clickhouse-driver/commit/3e990547e064b8fca916b23a0f7d6fe8c63c7f6b
clickhouse_driver/columns/stringcolumn.c
PyThread_tss_delete
null
null
null
static CYTHON_INLINE void PyThread_tss_delete(Py_tss_t *key) { PyThread_delete_key(*key); *key = Py_tss_NEEDS_INIT; }
static CYTHON_INLINE VAR_0 PyThread_tss_delete(Py_tss_t *VAR_1) { PyThread_delete_key(*VAR_1); *VAR_1 = VAR_2; }
null
null
null
false
CVE-2021-4156
['CWE-125']
AV:N/AC:M/Au:N/C:P/I:N/A:P
0
libsndfile
flac: Fix improper buffer reusing
4c30646abf7834e406f7e2429c70bc254e18beab
https://github.com/libsndfile/libsndfile/commit/4c30646abf7834e406f7e2429c70bc254e18beab
src/flac.c
f2flac24_clip_array
null
null
null
static void f2flac24_clip_array (const float *src, int32_t *dest, int count, int normalize) { float normfact, scaled_value ; normfact = normalize ? (8.0 * 0x100000) : 1.0 ; while (--count >= 0) { scaled_value = src [count] * normfact ; if (CPU_CLIPS_POSITIVE == 0 && scaled_value >= (1.0 * 0x7FFFFF)) { dest [co...
static void f2flac24_clip_array (const float *VAR_0, int32_t *VAR_1, int VAR_2, int VAR_3) { float VAR_4, VAR_5 ; VAR_4 = VAR_3 ? (8.0 * 0x100000) : 1.0 ; while (--VAR_2 >= 0) { VAR_5 = VAR_0 [VAR_2] * VAR_4 ; if (VAR_6 == 0 && VAR_5 >= (1.0 * 0x7FFFFF)) { VAR_1 [VAR_2] = 0x7FFFFF ; continue ; } ; if ...
libsndfile/4c30646abf7834e406f7e2429c70bc254e18beab/flac.c/non_vul/0.json
null
null
false
CVE-2021-44733
['CWE-362']
AV:L/AC:M/Au:N/C:P/I:P/A:P
0
torvalds/linux
Since the tee subsystem does not keep a strong reference to its idle shared memory buffers, it races with other threads that try to destroy a shared memory through a close of its dma-buf fd or by unmapping the memory. In tee_shm_get_from_id() when a lookup in teedev->idr has been successful, it is possible that the te...
dfd0743f1d9ea76931510ed150334d571fbab49d
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?h=dfd0743f1d9ea76931510ed150334d571fbab49d
drivers/tee/tee_shm.c
tee_shm_register
struct tee_shm *tee_shm_register(struct tee_context *ctx, unsigned long addr, size_t length, u32 flags) { struct tee_device *teedev = ctx->teedev; const u32 req_user_flags = TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED; const u32 req_kernel_flags = TEE_SHM_DMA_BUF | TEE_SHM_KERNEL_MAPPED; struct tee_shm *shm; void *...
struct tee_shm *tee_shm_register(struct tee_context *VAR_0, unsigned long VAR_1, size_t VAR_2, u32 VAR_3) { struct tee_device *VAR_4 = VAR_0->teedev; const u32 VAR_5 = VAR_6 | VAR_7; const u32 VAR_8 = VAR_6 | VAR_9; struct tee_shm *VAR_10; void *VAR_11; int VAR_12; int VAR_13; unsigned long VAR_14; if (V...
torvalds/linux/dfd0743f1d9ea76931510ed150334d571fbab49d/tee_shm.c/vul/before/2.json
struct tee_shm *tee_shm_register(struct tee_context *ctx, unsigned long addr, size_t length, u32 flags) { struct tee_device *teedev = ctx->teedev; const u32 req_user_flags = TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED; const u32 req_kernel_flags = TEE_SHM_DMA_BUF | TEE_SHM_KERNEL_MAPPED; struct tee_shm *shm; void *...
struct tee_shm *tee_shm_register(struct tee_context *VAR_0, unsigned long VAR_1, size_t VAR_2, u32 VAR_3) { struct tee_device *VAR_4 = VAR_0->teedev; const u32 VAR_5 = VAR_6 | VAR_7; const u32 VAR_8 = VAR_6 | VAR_9; struct tee_shm *VAR_10; void *VAR_11; int VAR_12; int VAR_13; unsigned long VAR_14; if (V...
torvalds/linux/dfd0743f1d9ea76931510ed150334d571fbab49d/tee_shm.c/vul/after/2.json
--- func_before +++ func_after @@ -30,6 +30,7 @@ goto err; } + refcount_set(&shm->refcount, 1); shm->flags = flags | TEE_SHM_REGISTER; shm->ctx = ctx; shm->id = -1; @@ -90,22 +91,6 @@ goto err; } - if (flags & TEE_SHM_DMA_BUF) { - DEFINE_DMA_BUF_EXPORT_INFO(exp_info); - - exp_info.ops = &tee_shm_d...
{'deleted_lines': ['\tif (flags & TEE_SHM_DMA_BUF) {', '\t\tDEFINE_DMA_BUF_EXPORT_INFO(exp_info);', '', '\t\texp_info.ops = &tee_shm_dma_buf_ops;', '\t\texp_info.size = shm->size;', '\t\texp_info.flags = O_RDWR;', '\t\texp_info.priv = shm;', '', '\t\tshm->dmabuf = dma_buf_export(&exp_info);', '\t\tif (IS_ERR(shm->dmabu...
true
CVE-2023-5520
['CWE-125']
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
gpac
ac3dmx: add remain size check (fixes #2627)
5692dc729491805e0e5f55c21d50ba1e6b19e88e
https://github.com/gpac/gpac/commit/5692dc729491805e0e5f55c21d50ba1e6b19e88e
src/filters/reframe_ac3.c
ac3dmx_process_event
null
null
null
static Bool ac3dmx_process_event(GF_Filter *filter, const GF_FilterEvent *evt) { u32 i; GF_FilterEvent fevt; GF_AC3DmxCtx *ctx = gf_filter_get_udta(filter); switch (evt->base.type) { case GF_FEVT_PLAY: if (!ctx->is_playing) { ctx->is_playing = GF_TRUE; ctx->cts = 0; } if (! ctx->is_file) { return G...
static Bool ac3dmx_process_event(GF_Filter *VAR_0, const GF_FilterEvent *VAR_1) { u32 VAR_2; GF_FilterEvent VAR_3; GF_AC3DmxCtx *VAR_4 = gf_filter_get_udta(VAR_0); switch (VAR_1->base.type) { case VAR_5: if (!VAR_4->is_playing) { VAR_4->is_playing = VAR_6; VAR_4->cts = 0; } if (! VAR_4->is_file) { ...
gpac/5692dc729491805e0e5f55c21d50ba1e6b19e88e/reframe_ac3.c/non_vul/1.json
null
null
false
CVE-2022-38266
['CWE-369']
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
DanBloomberg/leptonica
Issue 26393: morphapp_fuzzer: Divide-by-zero in blockconvLow * Removed the code that allowed divide by zero for tiny pix * Ditto for 4 other block convolution functions.
f062b42c0ea8dddebdc6a152fd16152de215d614
https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614
src/convolve.c
blocksumLow
null
null
null
static void blocksumLow(l_uint32 *datad, l_int32 w, l_int32 h, l_int32 wpl, l_uint32 *dataa, l_int32 wpla, l_int32 wc, l_int32 hc) { l_int32 i, j, imax, imin, jmax, jmin; l_int32 wn, hn, fwc, fhc, wmwc, hmhc; l...
static void blocksumLow(l_uint32 *VAR_0, l_int32 VAR_1, l_int32 VAR_2, l_int32 VAR_3, l_uint32 *VAR_4, l_int32 VAR_5, l_int32 VAR_6, l_int32 VAR_7) { l_int32 VAR_8, VAR_9, VAR_10, VAR_11, VAR_12, VAR_13; l_int32 ...
DanBloomberg/leptonica/f062b42c0ea8dddebdc6a152fd16152de215d614/convolve.c/non_vul/20.json
null
null
false
CVE-2021-41035
['CWE-440', 'CWE-250']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
eclipse-openj9/openj9
Throw IAE when an InterfaceHandle thunk finds a non-public method The interface dispatch implemented by InterfaceHandle is supposed to throw IllegalAccessError (IAE) when the dispatched callee is not public, just like the dispatch performed by invokeinterface.
c6e0d9296ff9a3084965d83e207403de373c0bad
https://github.com/eclipse-openj9/openj9/commit/c6e0d9296ff9a3084965d83e207403de373c0bad
runtime/compiler/env/VMJ9.cpp
TR_J9SharedCacheVM::getClassFromSignature
null
null
null
TR_OpaqueClassBlock * TR_J9SharedCacheVM::getClassFromSignature(const char * sig, int32_t sigLength, TR_OpaqueMethodBlock * method, bool isVettedForAOT) { TR_OpaqueClassBlock* j9class = TR_J9VM::getClassFromSignature(sig, sigLength, method, true); bool validated = false; TR::Compilation* comp = TR::comp(); ...
TR_OpaqueClassBlock * TR_J9SharedCacheVM::getClassFromSignature(const char * VAR_0, int32_t VAR_1, TR_OpaqueMethodBlock * VAR_2, bool VAR_3) { TR_OpaqueClassBlock* VAR_4 = TR_J9VM::getClassFromSignature(VAR_0, VAR_1, VAR_2, true); bool VAR_5 = false; TR::Compilation* VAR_6 = TR::comp(); if (VAR_4) ...
eclipse-openj9/openj9/c6e0d9296ff9a3084965d83e207403de373c0bad/VMJ9.cpp/non_vul/241.json
null
null
false
CVE-2018-18443
['CWE-772']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
AcademySoftwareFoundation/openexr
Fix #350 - memory leak on exit This fixes CVE-2018-18443, the last thread pool provider set into the pool was not being correctly cleaned up at shutdown of the thread pool. Signed-off-by: Kimball Thurston <kdt3rd@gmail.com>
adbc1900cb9d25fcc4df008d4008b781cf2fa4f8
https://github.com/AcademySoftwareFoundation/openexr/commit/adbc1900cb9d25fcc4df008d4008b781cf2fa4f8
IlmBase/IlmThread/IlmThreadPool.cpp
TaskGroup::finishOneTask
null
null
null
void TaskGroup::finishOneTask () { _data->removeTask (); }
void TaskGroup::finishOneTask () { VAR_0->removeTask (); }
AcademySoftwareFoundation/openexr/adbc1900cb9d25fcc4df008d4008b781cf2fa4f8/IlmThreadPool.cpp/non_vul/25.json
null
null
false
CVE-2022-2196
['CWE-1188']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
torvalds/linux
According to Intel's document on Indirect Branch Restricted Speculation, "Enabling IBRS does not prevent software from controlling the predicted targets of indirect branches of unrelated software executed later at the same predictor mode (for example, between two different user applications, or two different virtual ma...
2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
arch/x86/kvm/vmx/nested.c
prepare_vmx_msr_autostore_list
null
null
null
static void prepare_vmx_msr_autostore_list(struct kvm_vcpu *vcpu, u32 msr_index) { struct vcpu_vmx *vmx = to_vmx(vcpu); struct vmx_msrs *autostore = &vmx->msr_autostore.guest; bool in_vmcs12_store_list; int msr_autostore_slot; bool in_autostore_list; int last; msr_autostore_slot = vmx_find_loadstore_msr...
static void prepare_vmx_msr_autostore_list(struct kvm_vcpu *VAR_0, u32 VAR_1) { struct vcpu_vmx *VAR_2 = to_vmx(VAR_0); struct vmx_msrs *VAR_3 = &VAR_2->msr_autostore.guest; bool VAR_4; int VAR_5; bool VAR_6; int VAR_7; VAR_5 = vmx_find_loadstore_msr_slot(VAR_3, VAR_1); VAR_6 = VAR_5 >= 0; VAR_4 = nes...
torvalds/linux/2e7eab81425ad6c875f2ed47c0ce01e78afc38a5/nested.c/non_vul/45.json
null
null
false
CVE-2009-2698
['CWE-476']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
torvalds/linux
UDP tracks corking status through the pending variable. The IP layer also tracks it through the socket write queue. It is possible for the two to get out of sync when MSG_PROBE is used. This patch changes UDP to check the write queue to ensure that the two stay in sync. Signed-off-by: Herbert Xu <herbert@gondor.apa...
1e0c14f49d6b393179f423abbac47f85618d3d46
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46
net/ipv4/udp.c
udp4_format_sock
null
null
null
static void udp4_format_sock(struct sock *sp, char *tmpbuf, int bucket) { struct inet_sock *inet = inet_sk(sp); __be32 dest = inet->daddr; __be32 src = inet->rcv_saddr; __u16 destp = ntohs(inet->dport); __u16 srcp = ntohs(inet->sport); sprintf(tmpbuf, "%4d: %08X:%04X %08X:%04X" " %02X %08X:%08X %02X:%08lX...
static void udp4_format_sock(struct sock *VAR_0, char *VAR_1, int VAR_2) { struct inet_sock *VAR_3 = inet_sk(VAR_0); __be32 VAR_4 = VAR_3->daddr; __be32 VAR_5 = VAR_3->rcv_saddr; __u16 VAR_6 = ntohs(VAR_3->dport); __u16 VAR_7 = ntohs(VAR_3->sport); sprintf(VAR_1, "%4d: %08X:%04X %08X:%04X" " %02X %08X:%08...
torvalds/linux/1e0c14f49d6b393179f423abbac47f85618d3d46/udp.c/non_vul/6.json
null
null
false
CVE-2017-6903
['CWE-Other']
AV:N/AC:M/Au:N/C:C/I:C/A:C
0
JACoders/OpenJK
Shared: Merge ioquake/ioq3@376267d534476a875d8b9228149c4ee18b74a4fd Don't load .pk3s as .dlls, and don't load user config files from .pk3s.
8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7
https://github.com/JACoders/OpenJK/commit/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7
codemp/qcommon/files.cpp
FS_Read
null
null
null
int FS_Read( void *buffer, int len, fileHandle_t f ) { int block, remaining; int read; byte *buf; int tries; FS_AssertInitialised(); if ( !f ) { return 0; } buf = (byte *)buffer; fs_readCount += len; if (fsh[f].zipFile == qfalse) { remaining = len; tries = 0; while (remaining) { block = rema...
int FS_Read( void *VAR_0, int VAR_1, fileHandle_t VAR_2 ) { int VAR_3, VAR_4; int VAR_5; byte *VAR_6; int VAR_7; FS_AssertInitialised(); if ( !VAR_2 ) { return 0; } VAR_6 = (byte *)VAR_0; VAR_8 += VAR_1; if (VAR_9[VAR_2].zipFile == VAR_10) { VAR_4 = VAR_1; VAR_7 = 0; while (VAR_4) { VAR_3 = ...
JACoders/OpenJK/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7/files.cpp/non_vul/40.json
null
null
false
CVE-2013-10006
['CWE-208']
AV:A/AC:H/Au:S/C:P/I:N/A:N
0
Ziftr/primecoin
Make RPC password resistant to timing attacks Fixes issue#2838; this is a tweaked version of pull#2845 that should not leak the length of the password and is more generic, in case we run into other situations where we need timing-attack-resistant comparisons.
cdb3441b5cd2c1bae49fae671dc4a496f7c96322
https://github.com/Ziftr/primecoin/commit/cdb3441b5cd2c1bae49fae671dc4a496f7c96322
src/bitcoinrpc.cpp
write
null
null
null
std::streamsize write(const char* s, std::streamsize n) { handshake(ssl::stream_base::client); // HTTPS clients write first if (fUseSSL) return asio::write(stream, asio::buffer(s, n)); return asio::write(stream.next_layer(), asio::buffer(s, n)); }
std::streamsize write(const char* VAR_0, std::streamsize VAR_1) { handshake(ssl::stream_base::client); /* COMMENT_0 */ if (VAR_2) return asio::write(VAR_3, asio::buffer(VAR_0, VAR_1)); return asio::write(VAR_3.next_layer(), asio::buffer(VAR_0, VAR_1)); }
Ziftr/primecoin/cdb3441b5cd2c1bae49fae671dc4a496f7c96322/bitcoinrpc.cpp/non_vul/21.json
null
null
false
CVE-2017-17499
['CWE-416']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
ImageMagick
Added missing return to avoid use after free.
8c35502217c1879cb8257c617007282eee3fe1cc
https://github.com/ImageMagick/ImageMagick/commit/8c35502217c1879cb8257c617007282eee3fe1cc
Magick++/lib/Image.cpp
Magick::Image::waveletDenoise
null
null
null
void Magick::Image::waveletDenoise(const double threshold_, const double softness_) { MagickCore::Image *newImage; GetPPException; newImage=WaveletDenoiseImage(constImage(),threshold_,softness_, exceptionInfo); replaceImage(newImage); ThrowImageException; }
void Magick::Image::waveletDenoise(const double VAR_0, const double VAR_1) { MagickCore::Image *VAR_2; VAR_3; VAR_2=WaveletDenoiseImage(constImage(),VAR_0,VAR_1, VAR_4); replaceImage(VAR_2); VAR_5; }
ImageMagick/8c35502217c1879cb8257c617007282eee3fe1cc/Image.cpp/non_vul/304.json
null
null
false
CVE-2018-17338
['CWE-787']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
kermitt2/pdfalto
Fix heap buffer overflow. see #29
23d01be8dfe792e54d9a2f34f4118d2947eea80b
https://github.com/kermitt2/pdfalto/commit/23d01be8dfe792e54d9a2f34f4118d2947eea80b
src/XmlAltoOutputDev.cc
TextPage::restoreState
null
null
null
void TextPage::restoreState(GfxState *state) { if(!idStack.empty()) { idCur = idStack.top(); idStack.pop(); } }
void TextPage::restoreState(GfxState *VAR_0) { if(!VAR_1.empty()) { VAR_2 = VAR_1.top(); VAR_1.pop(); } }
kermitt2/pdfalto/23d01be8dfe792e54d9a2f34f4118d2947eea80b/XmlAltoOutputDev.cc/non_vul/115.json
null
null
false
CVE-2018-9261
['CWE-834']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
wireshark
NBAP: avoid linking a DCH-ID to itself Otherwise it can create an infinite loop, leading to a buffer overflow. Also add explicit cheks on the buffer usage and set its maximum size to 128 instead of 32 per ASN.1 description. Bug: 14471 Change-Id: I18d26369cf3d1cf2a32c86a972c78ea9f6f7a503 Reviewed-on: https://code.wire...
66bc372716e04d6a8afdf6712583c9b5d11fee55
https://github.com/wireshark/wireshark/commit/66bc372716e04d6a8afdf6712583c9b5d11fee55
epan/dissectors/packet-nbap.c
dissect_nbap_UL_Code_InformationModify_ModifyItem_RL_ReconfPrepTDD
null
null
null
static int dissect_nbap_UL_Code_InformationModify_ModifyItem_RL_ReconfPrepTDD(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) { offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index, ett_nbap_UL_Code_InformationModify_Modify...
static int dissect_nbap_UL_Code_InformationModify_ModifyItem_RL_ReconfPrepTDD(tvbuff_t *VAR_0 _U_, int VAR_1 _U_, asn1_ctx_t *VAR_2 _U_, proto_tree *VAR_3 _U_, int VAR_4 _U_) { VAR_1 = dissect_per_sequence(VAR_0, VAR_1, VAR_2, VAR_3, VAR_4, VAR_5, VAR_6); return VAR_1; }
null
null
null
false
CVE-2019-6706
['CWE-416']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
lua
Fixed bug in 'lua_upvaluejoin' Bug-fix: joining an upvalue with itself could cause a use-after-free crash.
89aee84cbc9224f638f3b7951b306d2ee8ecb71e
https://github.com/lua/lua/commit/89aee84cbc9224f638f3b7951b306d2ee8ecb71e
lapi.c
lua_pushlstring
null
null
null
LUA_API const char *lua_pushlstring (lua_State *L, const char *s, size_t len) { TString *ts; lua_lock(L); ts = (len == 0) ? luaS_new(L, "") : luaS_newlstr(L, s, len); setsvalue2s(L, L->top, ts); api_incr_top(L); luaC_checkGC(L); lua_unlock(L); return getstr(ts); }
LUA_API const VAR_0 *lua_pushlstring (lua_State *VAR_1, const char *VAR_2, size_t VAR_3) { TString *VAR_4; lua_lock(VAR_1); VAR_4 = (VAR_3 == 0) ? luaS_new(VAR_1, "") : luaS_newlstr(VAR_1, VAR_2, VAR_3); setsvalue2s(VAR_1, VAR_1->top, VAR_4); api_incr_top(VAR_1); luaC_checkGC(VAR_1); lua_unlock(VAR_1); ...
null
null
null
false
CVE-2021-4155
['CWE-131']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
torvalds/linux
The old ALLOCSP/FREESP ioctls in XFS can be used to preallocate space at the end of files, just like fallocate and RESVSP. Make the behavior consistent with the other ioctls. Reported-by: Kirill Tkhai <ktkhai@virtuozzo.com> Signed-off-by: Darrick J. Wong <djwong@kernel.org> Signed-off-by: Darrick J. Wong <darrick.won...
983d8e60f50806f90534cc5373d0ce867e5aaf79
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=983d8e60f50806f90534cc5373d0ce867e5aaf79
fs/xfs/xfs_ioctl.c
xfs_bulkstat_fmt
null
null
null
static int xfs_bulkstat_fmt( struct xfs_ibulk *breq, const struct xfs_bulkstat *bstat) { if (copy_to_user(breq->ubuffer, bstat, sizeof(struct xfs_bulkstat))) return -EFAULT; return xfs_ibulk_advance(breq, sizeof(struct xfs_bulkstat)); }
static int xfs_bulkstat_fmt( struct xfs_ibulk *VAR_0, const struct xfs_bulkstat *VAR_1) { if (copy_to_user(VAR_0->ubuffer, VAR_1, sizeof(struct xfs_bulkstat))) return -VAR_2; return xfs_ibulk_advance(VAR_0, sizeof(struct xfs_bulkstat)); }
torvalds/linux/983d8e60f50806f90534cc5373d0ce867e5aaf79/xfs_ioctl.c/non_vul/17.json
null
null
false
CVE-2018-16149
['CWE-347']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
igrr/axtls-8266
Apply CVE fixes for X509 parsing Apply patches developed by Sze Yiu which correct a vulnerability in X509 parsing. See CVE-2018-16150 and CVE-2018-16149 for more info.
5efe2947ab45e81d84b5f707c51d1c64be52f36c
https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c
ssl/x509.c
x509_verify
int x509_verify(const CA_CERT_CTX *ca_cert_ctx, const X509_CTX *cert, int *pathLenConstraint) { int ret = X509_OK, i = 0; bigint *cert_sig; X509_CTX *next_cert = NULL; BI_CTX *ctx = NULL; bigint *mod = NULL, *expn = NULL; int match_ca_cert = 0; struct timeval tv; uint8_t is_sel...
int x509_verify(const CA_CERT_CTX *VAR_0, const X509_CTX *VAR_1, int *VAR_2) { int VAR_3 = VAR_4, VAR_5 = 0; bigint *VAR_6; X509_CTX *VAR_7 = NULL; BI_CTX *VAR_8 = NULL; bigint *VAR_9 = NULL, *VAR_10 = NULL; int VAR_11 = 0; struct timeval VAR_12; uint8_t VAR_13 = 0; if (VA...
igrr/axtls-8266/5efe2947ab45e81d84b5f707c51d1c64be52f36c/x509.c/vul/before/0.json
int x509_verify(const CA_CERT_CTX *ca_cert_ctx, const X509_CTX *cert, int *pathLenConstraint) { int ret = X509_OK, i = 0; bigint *cert_sig; X509_CTX *next_cert = NULL; BI_CTX *ctx = NULL; bigint *mod = NULL, *expn = NULL; int match_ca_cert = 0; struct timeval tv; uint8_t is_sel...
int x509_verify(const CA_CERT_CTX *VAR_0, const X509_CTX *VAR_1, int *VAR_2) { int VAR_3 = VAR_4, VAR_5 = 0; bigint *VAR_6; X509_CTX *VAR_7 = NULL; BI_CTX *VAR_8 = NULL; bigint *VAR_9 = NULL, *VAR_10 = NULL; int VAR_11 = 0; struct timeval VAR_12; uint8_t VAR_13 = 0; if (VA...
igrr/axtls-8266/5efe2947ab45e81d84b5f707c51d1c64be52f36c/x509.c/vul/after/0.json
--- func_before +++ func_after @@ -132,7 +132,7 @@ } /* check the signature */ - cert_sig = sig_verify(ctx, cert->signature, cert->sig_len, + cert_sig = sig_verify(ctx, cert->signature, cert->sig_len, cert->sig_type, bi_clone(ctx, mod), bi_clone(ctx, expn)); if (cert_s...
{'deleted_lines': [' cert_sig = sig_verify(ctx, cert->signature, cert->sig_len, '], 'added_lines': [' cert_sig = sig_verify(ctx, cert->signature, cert->sig_len, cert->sig_type,']}
true
CVE-2020-1917
['CWE-787', 'CWE-190', 'CWE-125']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
facebook/hhvm
security fixes https://hhvm.com/blog/2021/02/25/security-update.html
08193b7f0cd3910256e00d599f0f3eb2519c44ca
https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca
hphp/zend/zend-string.cpp
string_bin2hex
null
null
null
char *string_bin2hex(const char *input, int len, char* result) { static char hexconvtab[] = "0123456789abcdef"; assert(input); if (len == 0) { return nullptr; } int i, j; for (i = j = 0; i < len; i++) { result[j++] = hexconvtab[(unsigned char)input[i] >> 4]; result[j++] = hexconvtab[(unsigned ...
char *string_bin2hex(const char *VAR_0, int VAR_1, char* VAR_2) { static char VAR_3[] = "0123456789abcdef"; assert(VAR_0); if (VAR_1 == 0) { return nullptr; } int VAR_4, VAR_5; for (VAR_4 = VAR_5 = 0; VAR_4 < VAR_1; VAR_4++) { VAR_2[VAR_5++] = VAR_3[(unsigned char)VAR_0[VAR_4] >> 4]; VAR_2[VAR...
facebook/hhvm/08193b7f0cd3910256e00d599f0f3eb2519c44ca/zend-string.cpp/non_vul/0.json
null
null
false
CVE-2010-1084
['CWE-119']
AV:N/AC:M/Au:N/C:N/I:N/A:C
0
torvalds/linux
When creating a high number of Bluetooth sockets (L2CAP, SCO and RFCOMM) it is possible to scribble repeatedly on arbitrary pages of memory. Ensure that the content of these sysfs files is always less than one page. Even if this means truncating. The files in question are scheduled to be moved over to debugfs in the fu...
101545f6fef4a0a3ea8daf0b5b880df2c6a92a69
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=101545f6fef4a0a3ea8daf0b5b880df2c6a92a69
net/bluetooth/l2cap.c
l2cap_connect_req
null
null
null
static inline int l2cap_connect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data) { struct l2cap_chan_list *list = &conn->chan_list; struct l2cap_conn_req *req = (struct l2cap_conn_req *) data; struct l2cap_conn_rsp rsp; struct sock *sk, *parent; int result, status = L2CAP_CS_NO_INFO; u16 dcid = ...
static inline int l2cap_connect_req(struct l2cap_conn *VAR_0, struct l2cap_cmd_hdr *VAR_1, u8 *VAR_2) { struct l2cap_chan_list *VAR_3 = &VAR_0->chan_list; struct l2cap_conn_req *VAR_4 = (struct l2cap_conn_req *) VAR_2; struct l2cap_conn_rsp VAR_5; struct sock *VAR_6, *VAR_7; int VAR_8, VAR_9 = VAR_10; u16 VAR_11...
torvalds/linux/101545f6fef4a0a3ea8daf0b5b880df2c6a92a69/l2cap.c/non_vul/4.json
null
null
false
CVE-2013-4118
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
FreeRDP
security: add a NULL pointer check to fix a server crash.
7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7
https://github.com/FreeRDP/FreeRDP/commit/7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7
libfreerdp/core/rdp.c
rdp_send_channel_data
null
null
null
int rdp_send_channel_data(rdpRdp* rdp, int channel_id, BYTE* data, int size) { return freerdp_channel_send(rdp, channel_id, data, size); }
int rdp_send_channel_data(rdpRdp* VAR_0, int VAR_1, BYTE* VAR_2, int VAR_3) { return freerdp_channel_send(VAR_0, VAR_1, VAR_2, VAR_3); }
FreeRDP/7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7/rdp.c/non_vul/9.json
null
null
false
CVE-2017-9217
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
systemd
resolved: bugfix of null pointer p->question dereferencing (#6020) See https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1621396
a924f43f30f9c4acaf70618dd2a055f8b0f166be
https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be
src/resolve/resolved-dns-packet.c
dns_packet_read_uint8
null
null
null
int dns_packet_read_uint8(DnsPacket *p, uint8_t *ret, size_t *start) { const void *d; int r; assert(p); r = dns_packet_read(p, sizeof(uint8_t), &d, start); if (r < 0) return r; *ret = ((uint8_t*) d)[0]; return 0; }
int dns_packet_read_uint8(DnsPacket *VAR_0, uint8_t *VAR_1, size_t *VAR_2) { const void *VAR_3; int VAR_4; assert(VAR_0); VAR_4 = dns_packet_read(VAR_0, sizeof(uint8_t), &VAR_3, VAR_2); if (VAR_4 < 0) return VAR_4; *VAR_1 = ((uint8_t*) VAR_3)[0]; ...
systemd/a924f43f30f9c4acaf70618dd2a055f8b0f166be/resolved-dns-packet.c/non_vul/27.json
null
null
false
CVE-2019-18680
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:C
0
torvalds/linux
net: rds: Fix NULL ptr use in rds_tcp_kill_sock After the commit c4e97b06cfdc ("net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock()."), it introduced null-ptr-deref in rds_tcp_kill_sock as below: BUG: KASAN: null-ptr-deref on address 0000000000000020 Read of size 8 by task kworker/u16:10/91...
91573ae4aed0a49660abdad4d42f2a0db995ee5e
https://github.com/torvalds/linux/commit/91573ae4aed0a49660abdad4d42f2a0db995ee5e
net/rds/tcp.c
rds_tcp_accept_work
null
null
null
void rds_tcp_accept_work(struct sock *sk) { struct net *net = sock_net(sk); struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid); queue_work(rds_wq, &rtn->rds_tcp_accept_w); }
void rds_tcp_accept_work(struct sock *VAR_0) { struct net *net = sock_net(VAR_0); struct rds_tcp_net *VAR_1 = net_generic(net, VAR_2); queue_work(VAR_3, &VAR_1->rds_tcp_accept_w); }
torvalds/linux/91573ae4aed0a49660abdad4d42f2a0db995ee5e/tcp.c/non_vul/14.json
null
null
false
CVE-2023-32269
['CWE-416']
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
torvalds/linux
netrom: Fix use-after-free caused by accept on already connected socket If you call listen() and accept() on an already connect()ed AF_NETROM socket, accept() can successfully connect. This is because when the peer socket sends data to sendmsg, the skb with its own sk stored in the connected socket's sk->sk_receive_qu...
611792920925fb088ddccbe2783c7f92fdfb6b64
https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64
net/netrom/af_netrom.c
nr_find_peer
null
null
null
static struct sock *nr_find_peer(unsigned char index, unsigned char id, ax25_address *dest) { struct sock *s; spin_lock_bh(&nr_list_lock); sk_for_each(s, &nr_list) { struct nr_sock *nr = nr_sk(s); if (nr->your_index == index && nr->your_id == id && !ax25cmp(&nr->dest_addr, dest)) { sock_hold(s); g...
static struct sock *nr_find_peer(unsigned char VAR_0, unsigned char VAR_1, ax25_address *VAR_2) { struct sock *VAR_3; spin_lock_bh(&VAR_4); sk_for_each(VAR_3, &VAR_5) { struct nr_sock *VAR_6 = nr_sk(VAR_3); if (VAR_6->your_index == VAR_0 && VAR_6->your_id == VAR_1 && !ax25cmp(&VAR_6->dest_addr, VAR_2)) ...
torvalds/linux/611792920925fb088ddccbe2783c7f92fdfb6b64/af_netrom.c/non_vul/17.json
null
null
false
CVE-2010-4653
['CWE-190']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
poppler
mapLen = (code + 256) & ~255; can wrap and you end up with mapLen < code that is not what you wanted
cad66a7d25abdb6aa15f3aa94a35737b119b2659
http://cgit.freedesktop.org/poppler/poppler/commit/?id=cad66a7d25abdb6aa15f3aa94a35737b119b2659
poppler/CharCodeToUnicode.cc
CharCodeToUnicodeCache::CharCodeToUnicodeCache
null
null
null
CharCodeToUnicodeCache::CharCodeToUnicodeCache(int sizeA) { int i; size = sizeA; cache = (CharCodeToUnicode **)gmallocn(size, sizeof(CharCodeToUnicode *)); for (i = 0; i < size; ++i) { cache[i] = NULL; } }
CharCodeToUnicodeCache::CharCodeToUnicodeCache(int VAR_0) { int VAR_1; VAR_2 = VAR_0; VAR_3 = (CharCodeToUnicode **)gmallocn(VAR_2, sizeof(CharCodeToUnicode *)); for (VAR_1 = 0; VAR_1 < VAR_2; ++VAR_1) { VAR_3[VAR_1] = NULL; } }
poppler/cad66a7d25abdb6aa15f3aa94a35737b119b2659/CharCodeToUnicode.cc/non_vul/17.json
null
null
false
CVE-2018-16062
['CWE-125']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
elfutils
libdw, readelf: Make sure there is enough data to read full aranges header. dwarf_getaranges didn't check if there was enough data left to read both the address and segment size. readelf didn't check there was enough data left to read the segment size. https://sourceware.org/bugzilla/show_bug.cgi?id=23541 Signed-of...
29e31978ba51c1051743a503ee325b5ebc03d7e9
https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9
src/readelf.c
dwarf_encoding_string
null
null
null
static const char * dwarf_encoding_string (unsigned int code) { static const char *const known[] = { #define DWARF_ONE_KNOWN_DW_ATE(NAME, CODE) [CODE] = #NAME, DWARF_ALL_KNOWN_DW_ATE #undef DWARF_ONE_KNOWN_DW_ATE }; if (likely (code < sizeof (known) / sizeof (known[0]))) return known[code]; re...
static const char * dwarf_encoding_string (unsigned int VAR_0) { static const char *const VAR_1[] = { #define DWARF_ONE_KNOWN_DW_ATE(VAR_2, VAR_3) [VAR_3] = #NAME, VAR_4 #undef VAR_5 }; if (likely (VAR_0 < sizeof (known) / sizeof (known[0]))) return known[VAR_0]; return NULL; }
elfutils/29e31978ba51c1051743a503ee325b5ebc03d7e9/readelf.c/non_vul/20.json
null
null
false
CVE-2020-16599
['CWE-476']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
binutils-gdb
PR25842, Null pointer dereference in nm-new PR 25842 * elf.c (_bfd_elf_get_symbol_version_string): Don't segfault on NULL nodename.
8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
bfd/elf.c
elfcore_write_ppc_tm_cgpr
null
null
null
char * elfcore_write_ppc_tm_cgpr (bfd *abfd, char *buf, int *bufsiz, const void *ppc_tm_cgpr, int size) { char *note_name = "LINUX"; return elfcore_write_note (abfd, buf, bufsiz, note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size); }
char * elfcore_write_ppc_tm_cgpr (bfd *VAR_0, char *VAR_1, int *VAR_2, const void *VAR_3, int VAR_4) { char *VAR_5 = "LINUX"; return elfcore_write_note (VAR_0, VAR_1, VAR_2, VAR_5, VAR_6, VAR_3, VAR_4); }
binutils-gdb/8d55d10ac0d112c586eaceb92e75bd9b80aadcc4/elf.c/non_vul/60.json
null
null
false
CVE-2016-4344
['CWE-190']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
php/php-src
Fix bug #71637: Multiple Heap Overflow due to integer overflows
9cabc99fcef0f12b472e40811beab4eb2ef17e1b
https://github.com/php/php-src/commit/9cabc99fcef0f12b472e40811beab4eb2ef17e1b
ext/xml/xml.c
xml_utf8_decode
null
null
null
PHP_XML_API zend_string *xml_utf8_decode(const XML_Char *s, size_t len, const XML_Char *encoding) { size_t pos = 0; unsigned int c; char (*decoder)(unsigned short) = NULL; xml_encoding *enc = xml_get_encoding(encoding); zend_string *str; if (enc) { decoder = enc->decoding_function; } if (decoder == NULL) { ...
PHP_XML_API VAR_0 *xml_utf8_decode(const XML_Char *VAR_1, size_t VAR_2, const XML_Char *VAR_3) { size_t VAR_4 = 0; unsigned int VAR_5; char (*VAR_6)(unsigned short) = NULL; xml_encoding *VAR_7 = xml_get_encoding(VAR_3); zend_string *VAR_8; if (VAR_7) { VAR_6 = VAR_7->decoding_function; } if (VAR_6 == NULL) ...
null
null
null
false
CVE-2019-17343
['CWE-667']
AV:L/AC:L/Au:N/C:P/I:P/A:P
0
xen-project/xen
xen: Make coherent PV IOMMU discipline In order for a PV domain to set up DMA from a passed-through device to one of its pages, the page must be mapped in the IOMMU. On the other hand, before a PV page may be used as a "special" page type (such as a pagetable or descriptor table), it _must not_ be writable in the IOM...
fe21b78ef99a1b505cfb6d3789ede9591609dd70
https://github.com/xen-project/xen/commit/fe21b78ef99a1b505cfb6d3789ede9591609dd70
xen/arch/x86/mm/p2m.c
p2m_reset_altp2m
null
null
null
static void p2m_reset_altp2m(struct domain *d, unsigned int idx, enum altp2m_reset_type reset_type) { struct p2m_domain *p2m; ASSERT(idx < MAX_ALTP2M); p2m = d->arch.altp2m_p2m[idx]; p2m_lock(p2m); p2m_flush_table_locked(p2m); if ( reset_type == ALTP2M_DEACTIVATE...
static void p2m_reset_altp2m(struct domain *VAR_0, unsigned int VAR_1, enum altp2m_reset_type VAR_2) { struct p2m_domain *VAR_3; ASSERT(VAR_1 < VAR_4); VAR_3 = VAR_0->arch.altp2m_p2m[VAR_1]; p2m_lock(VAR_3); p2m_flush_table_locked(VAR_3); if ( VAR_2 == VAR_5 ) ...
xen-project/xen/fe21b78ef99a1b505cfb6d3789ede9591609dd70/p2m.c/non_vul/30.json
null
null
false
CVE-2018-5702
['CWE-Other']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
transmission
mitigate dns rebinding attacks against daemon
cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84
https://github.com/transmission/transmission/commit/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84
libtransmission/rpc-server.c
extract_parts_from_multipart
null
null
null
static void extract_parts_from_multipart(struct evkeyvalq const* headers, struct evbuffer* body, tr_ptrArray* setme_parts) { char const* content_type = evhttp_find_header(headers, "Content-Type"); char const* in = (char const*)evbuffer_pullup(body, -1); size_t inlen = evbuffer_get_length(body); char co...
static void extract_parts_from_multipart(struct evkeyvalq const* VAR_0, struct evbuffer* VAR_1, tr_ptrArray* VAR_2) { char const* VAR_3 = evhttp_find_header(VAR_0, "Content-Type"); char const* VAR_4 = (char const*)evbuffer_pullup(VAR_1, -1); size_t VAR_5 = evbuffer_get_length(VAR_1); char const* VAR_6 ...
transmission/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84/rpc-server.c/non_vul/38.json
null
null
false
CVE-2020-27795
['CWE-908']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
radareorg/radare2
Fix segfault in adf (#16230)
4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
libr/core/cmd_anal.c
cmd_anal_info
null
null
null
static void cmd_anal_info(RCore *core, const char *input) { switch (input[0]) { case '?': r_core_cmd_help (core, help_msg_ai); break; case ' ': cmd_address_info (core, input, 0); break; case 'i': // "aii" // global imports if (input[1]) { if (input[1] == ' ') { if (!core->anal->imports) { co...
static void cmd_anal_info(RCore *VAR_0, const char *VAR_1) { switch (VAR_1[0]) { case '?': r_core_cmd_help (VAR_0, VAR_2); break; case ' ': cmd_address_info (VAR_0, VAR_1, 0); break; case 'i': /* COMMENT_0 */ /* COMMENT_1 */ if (VAR_1[1]) { if (VAR_1[1] == ' ') { if (!VAR_0->anal->imports) { ...
radareorg/radare2/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22/cmd_anal.c/non_vul/40.json
null
null
false
CVE-2022-2206
['CWE-125']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
vim
patch 8.2.5160: accessing invalid memory after changing terminal size Problem: Accessing invalid memory after changing terminal size. Solution: Adjust cmdline_row and msg_row to the value of Rows.
e178af5a586ea023622d460779fdcabbbfac0908
https://github.com/vim/vim/commit/e178af5a586ea023622d460779fdcabbbfac0908
src/term.c
term_replace_bs_del_keycode
null
null
null
void term_replace_bs_del_keycode(char_u *ta_buf, int ta_len, int len) { int i; int c; for (i = ta_len; i < ta_len + len; ++i) { if (ta_buf[i] == CSI && len - i > 2) { c = TERMCAP2KEY(ta_buf[i + 1], ta_buf[i + 2]); if (c == K_DEL || c == K_KDEL || c == K_BS) { mch_memmove(ta_buf + i...
void term_replace_bs_del_keycode(char_u *VAR_0, int VAR_1, int VAR_2) { int VAR_3; int VAR_4; for (VAR_3 = VAR_1; VAR_3 < VAR_1 + VAR_2; ++VAR_3) { if (VAR_0[VAR_3] == VAR_5 && VAR_2 - VAR_3 > 2) { VAR_4 = TERMCAP2KEY(VAR_0[VAR_3 + 1], VAR_0[VAR_3 + 2]); if (VAR_4 == VAR_6 || VAR_4 == VAR...
vim/e178af5a586ea023622d460779fdcabbbfac0908/term.c/non_vul/32.json
null
null
false
CVE-2022-1043
['CWE-416']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
torvalds/linux
io_uring: fix xa_alloc_cycle() error return value check We currently check for ret != 0 to indicate error, but '1' is a valid return and just indicates that the allocation succeeded with a wrap. Correct the check to be for < 0, like it was before the xarray conversion. Cc: stable@vger.kernel.org Fixes: 61cf93700fe6 (...
a30f895ad3239f45012e860d4f94c1a388b36d14
https://github.com/torvalds/linux/commit/a30f895ad3239f45012e860d4f94c1a388b36d14
fs/io_uring.c
io_uring_cancel_generic
null
null
null
static void io_uring_cancel_generic(bool cancel_all, struct io_sq_data *sqd) { struct io_uring_task *tctx = current->io_uring; struct io_ring_ctx *ctx; s64 inflight; DEFINE_WAIT(wait); WARN_ON_ONCE(sqd && sqd->thread != current); if (!current->io_uring) return; if (tctx->io_wq) io_wq_exit_start(tctx->io_wq...
static void io_uring_cancel_generic(bool VAR_0, struct io_sq_data *VAR_1) { struct io_uring_task *VAR_2 = VAR_3->io_uring; struct io_ring_ctx *VAR_4; s64 VAR_5; DEFINE_WAIT(VAR_6); WARN_ON_ONCE(VAR_1 && VAR_1->thread != VAR_3); if (!VAR_3->io_uring) return; if (VAR_2->io_wq) io_wq_exit_start(VAR_2->io_wq);...
torvalds/linux/a30f895ad3239f45012e860d4f94c1a388b36d14/io_uring.c/non_vul/22.json
null
null
false
CVE-2021-4300
['CWE-284']
AV:N/AC:L/Au:S/C:P/I:P/A:P
0
ghostlander/Halcyon
Block Verification Vulnerability Eliminated Fixed a critical vulnerability allowing to accept a proof-of-work block containing one or more coin stake transactions in addition to a valid coin base. Output values of such coin stakes were out of control.
0675b25ae9cc10b5fdc8ea3a32c642979762d45e
https://github.com/ghostlander/Halcyon/commit/0675b25ae9cc10b5fdc8ea3a32c642979762d45e
src/main.cpp
GetTransaction
null
null
null
bool GetTransaction(const uint256 &hash, CTransaction &tx, uint256 &hashBlock) { { LOCK(cs_main); { LOCK(mempool.cs); if (mempool.exists(hash)) { tx = mempool.lookup(hash); return true; } } CTxDB txdb("r"...
bool GetTransaction(const uint256 &VAR_0, CTransaction &VAR_1, uint256 &VAR_2) { { LOCK(VAR_3); { LOCK(VAR_4.cs); if (VAR_4.exists(VAR_0)) { VAR_1 = VAR_4.lookup(VAR_0); return true; } } CTxDB VAR_5("r");...
ghostlander/Halcyon/0675b25ae9cc10b5fdc8ea3a32c642979762d45e/main.cpp/non_vul/60.json
null
null
false
CVE-2017-14169
['CWE-20']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
ffmpeg
avformat/mxfdec: Fix Sign error in mxf_read_primer_pack() Fixes: 20170829B.mxf Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com> Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad
https://github.com/FFmpeg/FFmpeg/commit/9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad
libavformat/mxfdec.c
mxf_read_packet
null
null
null
static int mxf_read_packet(AVFormatContext *s, AVPacket *pkt) { MXFContext *mxf = s->priv_data; int ret, size; int64_t ret64, pos, next_pos; AVStream *st; MXFIndexTable *t; int edit_units; if (mxf->op != OPAtom) return mxf_read_packet_old(s, pkt); // If we have no streams then ...
static int mxf_read_packet(AVFormatContext *VAR_0, AVPacket *VAR_1) { MXFContext *VAR_2 = VAR_0->priv_data; int VAR_3, VAR_4; int64_t VAR_5, VAR_6, VAR_7; AVStream *VAR_8; MXFIndexTable *VAR_9; int VAR_10; if (VAR_2->op != VAR_11) return mxf_read_packet_old(VAR_0, VAR_1); /* CO...
ffmpeg/9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad/mxfdec.c/non_vul/39.json
null
null
false
CVE-2016-1568
['CWE-416']
AV:L/AC:M/Au:N/C:C/I:C/A:C
0
qemu
ide: ahci: reset ncq object to unused on error When processing NCQ commands, AHCI device emulation prepares a NCQ transfer object; To which an aio control block(aiocb) object is assigned in 'execute_ncq_command'. In case, when the NCQ command is invalid, the 'aiocb' object is not assigned, and NCQ transfer object is l...
4ab0359a8ae182a7ac5c99609667273167703fab
https://github.com/qemu/qemu/commit/4ab0359a8ae182a7ac5c99609667273167703fab
hw/ide/ahci.c
ahci_map_clb_address
null
null
null
static bool ahci_map_clb_address(AHCIDevice *ad) { AHCIPortRegs *pr = &ad->port_regs; ad->cur_cmd = NULL; map_page(ad->hba->as, &ad->lst, ((uint64_t)pr->lst_addr_hi << 32) | pr->lst_addr, 1024); return ad->lst != NULL; }
static bool ahci_map_clb_address(AHCIDevice *VAR_0) { AHCIPortRegs *VAR_1 = &VAR_0->port_regs; VAR_0->cur_cmd = NULL; map_page(VAR_0->hba->as, &VAR_0->lst, ((uint64_t)VAR_1->lst_addr_hi << 32) | VAR_1->lst_addr, 1024); return VAR_0->lst != NULL; }
qemu/4ab0359a8ae182a7ac5c99609667273167703fab/ahci.c/non_vul/5.json
null
null
false
CVE-2014-0791
['CWE-189']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
FreeRDP
Fix possible integer overflow in license_read_scope_list()
e2745807c4c3e0a590c0f69a9b655dc74ebaa03e
https://github.com/FreeRDP/FreeRDP/commit/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e
libfreerdp/core/license.c
license_read_product_info
null
null
null
BOOL license_read_product_info(wStream* s, PRODUCT_INFO* productInfo) { if (Stream_GetRemainingLength(s) < 8) return FALSE; Stream_Read_UINT32(s, productInfo->dwVersion); /* dwVersion (4 bytes) */ Stream_Read_UINT32(s, productInfo->cbCompanyName); /* cbCompanyName (4 bytes) */ if (Stream_GetRemainingLength(s) ...
BOOL license_read_product_info(wStream* VAR_0, PRODUCT_INFO* VAR_1) { if (Stream_GetRemainingLength(VAR_0) < 8) return FALSE; Stream_Read_UINT32(VAR_0, VAR_1->dwVersion); /* COMMENT_0 */ Stream_Read_UINT32(VAR_0, VAR_1->cbCompanyName); /* COMMENT_1 */ if (Stream_GetRemainingLength(VAR_0) < VAR_1->cbCompanyName...
FreeRDP/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e/license.c/non_vul/14.json
null
null
false
CVE-2016-9372
['CWE-20', 'CWE-399']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
wireshark
Profinet I/O: Sanity check number of I/O objects Can prevent really long loops from fuzz testing. Bug: 12851 Change-Id: I85e00af2c4753ce4c5bcb650a7df188d7f679c9a Reviewed-on: https://code.wireshark.org/review/18136 Petri-Dish: Michael Mann <mmann78@netscape.net> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wires...
4127e3930ef663114567002001f44e01eba8a250
https://github.com/wireshark/wireshark/commit/4127e3930ef663114567002001f44e01eba8a250
plugins/profinet/packet-pn-rtc-one.c
dissect_PNIO_IOCS
null
null
null
static int dissect_PNIO_IOCS(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree, guint8 *drep _U_, int hfindex, guint16 slotNr, guint16 subSlotNr, const int **fields) { if (tree) { guint8 u8IOxS; proto_item *ioxs_item; u8IOxS = tvb_get_guint8(tvb, offset);...
static int dissect_PNIO_IOCS(tvbuff_t *VAR_0, int VAR_1, packet_info *VAR_2 _U_, proto_tree *VAR_3, guint8 *VAR_4 _U_, int VAR_5, guint16 VAR_6, guint16 VAR_7, const int **VAR_8) { if (VAR_3) { guint8 VAR_9; proto_item *VAR_10; VAR_9 = tvb_get_guint8(VAR_0, VAR_1); ...
null
null
null
false
CVE-2012-2797
['CWE-Other']
AV:N/AC:L/Au:N/C:C/I:C/A:C
0
ffmpeg
mp3on4: allocate a large enough frame. Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
cca9528524c7a4b91451f4322bd50849af5d057e
http://git.videolan.org/?p=ffmpeg.git;a=commit;h=cca9528524c7a4b91451f4322bd50849af5d057e
libavcodec/mpegaudiodec.c
decode_init_mp3on4
null
null
null
static int decode_init_mp3on4(AVCodecContext * avctx) { MP3On4DecodeContext *s = avctx->priv_data; MPEG4AudioConfig cfg; int i; if ((avctx->extradata_size < 2) || (avctx->extradata == NULL)) { av_log(avctx, AV_LOG_ERROR, "Codec extradata missing or too short.\n"); return AVERROR_INVALID...
static int decode_init_mp3on4(AVCodecContext * VAR_0) { MP3On4DecodeContext *VAR_1 = VAR_0->priv_data; MPEG4AudioConfig VAR_2; int VAR_3; if ((VAR_0->extradata_size < 2) || (VAR_0->extradata == NULL)) { av_log(VAR_0, VAR_4, "Codec extradata missing or too short.\n"); return VAR_5; }...
ffmpeg/cca9528524c7a4b91451f4322bd50849af5d057e/mpegaudiodec.c/non_vul/4.json
null
null
false
CVE-2023-24808
['CWE-835']
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
michaelrsweet/pdfio
Fix denial-of-service attack when reading corrupt PDF files.
4f10021e7ee527c1aa24853e2947e38e154d9ccb
https://github.com/michaelrsweet/pdfio/commit/4f10021e7ee527c1aa24853e2947e38e154d9ccb
pdfio-file.c
pdfioFileSetCreator
null
null
null
void pdfioFileSetCreator(pdfio_file_t *pdf, // I - PDF file const char *value)// I - Value { if (pdf && pdf->info_obj) pdfioDictSetString(pdf->info_obj->value.value.dict, "Creator", pdfioStringCreate(pdf, value)); }
void pdfioFileSetCreator(pdfio_file_t *VAR_0, /* COMMENT_0 */ const char *VAR_1)/* COMMENT_1 */ { if (VAR_0 && VAR_0->info_obj) pdfioDictSetString(VAR_0->info_obj->value.value.dict, "Creator", pdfioStringCreate(VAR_0, VAR_1)); }
michaelrsweet/pdfio/4f10021e7ee527c1aa24853e2947e38e154d9ccb/pdfio-file.c/non_vul/20.json
null
null
false
CVE-2021-46914
['CWE-Other']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
torvalds/linux
commit debb9df311582c83fe369baa35fa4b92e8a9c58a upstream. pci_disable_device() called in __ixgbe_shutdown() decreases dev->enable_cnt by 1. pci_enable_device_mem() which increases dev->enable_cnt by 1, was removed from ixgbe_resume() in commit 6f82b2558735 ("ixgbe: use generic power management"). This caused unbalance...
be07581aacae7cd0a073afae8e8862032f794309
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=be07581aacae7cd0a073afae8e8862032f794309
drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
ixgbe_fwd_del
null
null
null
static void ixgbe_fwd_del(struct net_device *pdev, void *priv) { struct ixgbe_fwd_adapter *accel = priv; struct ixgbe_adapter *adapter = netdev_priv(pdev); unsigned int rxbase = accel->rx_base_queue; unsigned int i; /* delete unicast filter associated with offloaded interface */ ixgbe_del_mac_filter(adapter, acc...
static void ixgbe_fwd_del(struct net_device *VAR_0, void *VAR_1) { struct ixgbe_fwd_adapter *VAR_2 = VAR_1; struct ixgbe_adapter *VAR_3 = netdev_priv(VAR_0); unsigned int VAR_4 = VAR_2->rx_base_queue; unsigned int VAR_5; /* COMMENT_0 */ ixgbe_del_mac_filter(VAR_3, VAR_2->netdev->dev_addr, VMDQ_P(VAR_2->p...
torvalds/linux/be07581aacae7cd0a073afae8e8862032f794309/ixgbe_main.c/non_vul/59.json
null
null
false
CVE-2015-8543
['CWE-Other']
AV:L/AC:M/Au:N/C:C/I:C/A:C
0
torvalds/linux
net: add validation for the socket syscall protocol argument 郭永刚 reported that one could simply crash the kernel as root by using a simple program: int socket_fd; struct sockaddr_in addr; addr.sin_port = 0; addr.sin_addr.s_addr = INADDR_ANY; addr.sin_family = 10; socket_fd = socket(10,3,0x40000000); connect(s...
79462ad02e861803b3840cc782248c7359451cd9
https://github.com/torvalds/linux/commit/79462ad02e861803b3840cc782248c7359451cd9
net/ax25/af_ax25.c
ax25_info_open
null
null
null
static int ax25_info_open(struct inode *inode, struct file *file) { return seq_open(file, &ax25_info_seqops); }
static int ax25_info_open(struct inode *inode, struct file *file) { return seq_open(file, &VAR_0); }
torvalds/linux/79462ad02e861803b3840cc782248c7359451cd9/af_ax25.c/non_vul/15.json
null
null
false
CVE-2013-6623
['CWE-119']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
chromium
[SVG] Resources should be laid out in dependecy order. We're currently laying out resources in tree order, while they are (conceptually) forming a DAG - and this disconnect results in complicated logic and an extra layout pass attempting to re-validate nodes that might have been invalidated by the resource layout. Thi...
a4e53f62f8a1d500a1950d123600bd47214c06d8
https://github.com/chromium/chromium/commit/a4e53f62f8a1d500a1950d123600bd47214c06d8
third_party/WebKit/Source/core/svg/SVGElement.cpp
SVGElement::hasFocusEventListeners
null
null
null
bool SVGElement::hasFocusEventListeners() const { return hasEventListeners(eventNames().focusinEvent) || hasEventListeners(eventNames().focusoutEvent); }
bool SVGElement::hasFocusEventListeners() const { return hasEventListeners(eventNames().focusinEvent) || hasEventListeners(eventNames().focusoutEvent); }
chromium/a4e53f62f8a1d500a1950d123600bd47214c06d8/SVGElement.cpp/non_vul/29.json
null
null
false
CVE-2021-46345
['CWE-617']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
jerryscript-project/jerryscript
Fix invalid assertion CESU8-UTF8 buffer copy The UTF8 buffer size can be smaller then the CESU8 string's size so the UTF8 output is may truncated. Therefore we cannot ensure that the CESU8 buffer is read until the end. This patch fixes #4920. JerryScript-DCO-1.0-Signed-off-by: Robert Fancsik robert.fancsik@h-lab.eu
e54c980de52416e41296545e7f5b210a53b31d12
https://github.com/jerryscript-project/jerryscript/commit/e54c980de52416e41296545e7f5b210a53b31d12
jerry-core/lit/lit-strings.c
convert_code_point_to_low_surrogate
null
null
null
static ecma_char_t convert_code_point_to_low_surrogate (lit_code_point_t code_point) /**< code point, should be > 0xFFFF */ { JERRY_ASSERT (code_point > LIT_UTF16_CODE_UNIT_MAX); ecma_char_t code_unit_bits; code_unit_bits = (ecma_char_t) (code_point & LIT_UTF16_LAST_10_BITS_MASK); return (ecma_char_t) (LIT_UT...
static ecma_char_t convert_code_point_to_low_surrogate (lit_code_point_t VAR_0) /* COMMENT_0 */ { JERRY_ASSERT (VAR_0 > VAR_1); ecma_char_t VAR_2; VAR_2 = (ecma_char_t) (VAR_0 & VAR_3); return (ecma_char_t) (VAR_4 | VAR_2); }
jerryscript-project/jerryscript/e54c980de52416e41296545e7f5b210a53b31d12/lit-strings.c/non_vul/9.json
null
null
false
CVE-2022-3358
['CWE-476']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
openssl
Fix usage of custom EVP_CIPHER objects If a custom EVP_CIPHER object has been passed to EVP_CipherInit() then it should be used in preference to a fetched cipher. We also fix a possible NULL pointer deref in the same code for digests. If the custom cipher passed to EVP_CipherInit() happens to use NID_undef (which s...
5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
crypto/evp/digest.c
EVP_MD_CTX_gettable_params
null
null
null
const OSSL_PARAM *EVP_MD_CTX_gettable_params(EVP_MD_CTX *ctx) { EVP_PKEY_CTX *pctx; void *provctx; if (ctx == NULL) return NULL; /* If we have a pctx then we should try that first */ pctx = ctx->pctx; if (pctx != NULL && (pctx->operation == EVP_PKEY_OP_VERIFYCTX ...
const OSSL_PARAM *EVP_MD_CTX_gettable_params(EVP_MD_CTX *VAR_0) { EVP_PKEY_CTX *VAR_1; void *VAR_2; if (VAR_0 == NULL) return NULL; /* COMMENT_0 */ VAR_1 = VAR_0->pctx; if (VAR_1 != NULL && (VAR_1->operation == VAR_3 || VAR_1->operation == VAR_4) ...
openssl/5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b/digest.c/non_vul/20.json
null
null
false
CVE-2017-18202
['CWE-416']
AV:L/AC:M/Au:N/C:C/I:C/A:C
0
torvalds/linux
mm, oom_reaper: gather each vma to prevent leaking TLB entry tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory space. In this case, tlb->fullmm is true. Some archs like arm64 doesn't flush TLB when tlb->fullmm is true: commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")...
687cb0884a714ff484d038e9190edc874edcf146
https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146
mm/oom_kill.c
wake_oom_reaper
null
null
null
static void wake_oom_reaper(struct task_struct *tsk) { /* tsk is already queued? */ if (tsk == oom_reaper_list || tsk->oom_reaper_list) return; get_task_struct(tsk); spin_lock(&oom_reaper_lock); tsk->oom_reaper_list = oom_reaper_list; oom_reaper_list = tsk; spin_unlock(&oom_reaper_lock); trace_wake_reaper(t...
static void wake_oom_reaper(struct task_struct *VAR_0) { /* COMMENT_0 */ if (VAR_0 == VAR_1 || VAR_0->oom_reaper_list) return; get_task_struct(VAR_0); spin_lock(&VAR_2); VAR_0->oom_reaper_list = VAR_1; VAR_1 = VAR_0; spin_unlock(&VAR_2); trace_wake_reaper(VAR_0->pid); wake_up(&VAR_3); }
torvalds/linux/687cb0884a714ff484d038e9190edc874edcf146/oom_kill.c/non_vul/5.json
null
null
false
CVE-2013-3735
['CWE-20']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
php/php-src
fix bug #64660 - yyparse can return 2, not only 1
fb58e69a84f4fde603a630d2c9df2fa3be16d846
https://github.com/php/php-src/commit/fb58e69a84f4fde603a630d2c9df2fa3be16d846
Zend/zend_language_scanner.c
encoding_filter_script_to_intermediate
null
null
null
static size_t encoding_filter_script_to_intermediate(unsigned char **to, size_t *to_length, const unsigned char *from, size_t from_length TSRMLS_DC) { return zend_multibyte_encoding_converter(to, to_length, from, from_length, zend_multibyte_encoding_utf8, LANG_SCNG(script_encoding) TSRMLS_CC); }
static size_t encoding_filter_script_to_intermediate(unsigned char **VAR_0, size_t *VAR_1, const unsigned char *VAR_2, size_t VAR_3 TSRMLS_DC) { return zend_multibyte_encoding_converter(VAR_0, VAR_1, VAR_2, VAR_3, VAR_4, LANG_SCNG(VAR_5) VAR_6); }
null
null
null
false
CVE-2022-0319
['CWE-125']
AV:N/AC:M/Au:N/C:P/I:N/A:N
0
vim
patch 8.2.4154: ml_get error when exchanging windows in Visual mode Problem: ml_get error when exchanging windows in Visual mode. Solution: Correct end of Visual area when entering another buffer.
05b27615481e72e3b338bb12990fb3e0c2ecc2a9
https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9
src/window.c
frame_append
null
null
null
static void frame_append(frame_T *after, frame_T *frp) { frp->fr_next = after->fr_next; after->fr_next = frp; if (frp->fr_next != NULL) frp->fr_next->fr_prev = frp; frp->fr_prev = after; }
static void frame_append(frame_T *VAR_0, frame_T *VAR_1) { VAR_1->fr_next = VAR_0->fr_next; VAR_0->fr_next = VAR_1; if (VAR_1->fr_next != NULL) VAR_1->fr_next->fr_prev = VAR_1; VAR_1->fr_prev = VAR_0; }
vim/05b27615481e72e3b338bb12990fb3e0c2ecc2a9/window.c/non_vul/89.json
null
null
false
CVE-2022-1920
['CWE-190', 'CWE-787']
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
gstreamer
blocksize + WAVPACK4_HEADER_SIZE might overflow gsize, which then results in allocating a very small buffer. Into that buffer blocksize data is memcpy'd later which then causes out of bound writes and can potentially lead to anything from crashes to remote code execution. Thanks to Adam Doupe for analyzing and reporti...
cf887f1b8e228bff6e19829e6d03995d70ad739d
https://cgit.freedesktop.org/gstreamer/gstreamer/commit/?id=cf887f1b8e228bff6e19829e6d03995d70ad739d
subprojects/gst-plugins-good/gst/matroska/matroska-demux.c
gst_matroska_demux_parse_tracks
null
null
null
static GstFlowReturn gst_matroska_demux_parse_tracks (GstMatroskaDemux * demux, GstEbmlRead * ebml) { GstFlowReturn ret = GST_FLOW_OK; guint32 id; guint64 ebml_offset = ebml->offset; DEBUG_ELEMENT_START (demux, ebml, "Tracks"); if ((ret = gst_ebml_read_master (ebml, &id)) != GST_FLOW_OK) { DEBUG_ELEMENT...
static GstFlowReturn gst_matroska_demux_parse_tracks (GstMatroskaDemux * VAR_0, GstEbmlRead * VAR_1) { GstFlowReturn VAR_2 = VAR_3; guint32 VAR_4; guint64 VAR_5 = VAR_1->offset; DEBUG_ELEMENT_START (VAR_0, VAR_1, "Tracks"); if ((VAR_2 = gst_ebml_read_master (VAR_1, &VAR_4)) != VAR_3) { DEBUG_ELEMENT_STO...
gstreamer/cf887f1b8e228bff6e19829e6d03995d70ad739d/matroska-demux.c/non_vul/32.json
null
null
false
CVE-2022-2553
['CWE-287']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
ClusterLabs/booth
Revert "Refactor: main: substitute is_auth_req macro" This reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c. authfile != authkey Signed-off-by: Jan Friesse <jfriesse@redhat.com>
35bf0b7b048d715f671eb68974fb6b4af6528c67
https://github.com/ClusterLabs/booth/commit/35bf0b7b048d715f671eb68974fb6b4af6528c67
src/main.c
set_procfs_val
null
null
null
static int set_procfs_val(const char *path, const char *val) { int rc = -1; FILE *fp = fopen(path, "w"); if (fp) { if (fprintf(fp, "%s", val) > 0) rc = 0; fclose(fp); } return rc; }
static int set_procfs_val(const char *VAR_0, const char *VAR_1) { int VAR_2 = -1; FILE *VAR_3 = fopen(VAR_0, "w"); if (VAR_3) { if (fprintf(VAR_3, "%s", VAR_1) > 0) VAR_2 = 0; fclose(VAR_3); } return VAR_2; }
ClusterLabs/booth/35bf0b7b048d715f671eb68974fb6b4af6528c67/main.c/non_vul/20.json
null
null
false
CVE-2017-7185
['CWE-416']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
cesanta/mongoose-os
Fix crash in multipart handling Close cesanta/dev#6974 PUBLISHED_FROM=4d4e4a46eceba10aec8dacb7f8f58bd078c92307
042eb437973a202d00589b13d628181c6de5cf5b
https://github.com/cesanta/mongoose-os/commit/042eb437973a202d00589b13d628181c6de5cf5b
mongoose/mongoose.c
mg_set_cipher_list
null
null
null
static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *ctx, const char *cl) { return (SSL_CTX_set_cipher_list(ctx, cl ? cl : mg_s_cipher_list) == 1 ? MG_SSL_OK : MG_SSL_ERROR); }
static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *VAR_0, const char *VAR_1) { return (SSL_CTX_set_cipher_list(VAR_0, VAR_1 ? VAR_1 : VAR_2) == 1 ? VAR_3 : VAR_4); }
cesanta/mongoose-os/042eb437973a202d00589b13d628181c6de5cf5b/mongoose.c/non_vul/442.json
null
null
false
CVE-2023-49298
['CWE-639']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
openzfs/zfs
dnode_is_dirty: check dnode and its data for dirtiness Over its history this the dirty dnode test has been changed between checking for a dnodes being on `os_dirty_dnodes` (`dn_dirty_link`) and `dn_dirty_record`. de198f2d9 Fix lseek(SEEK_DATA/SEEK_HOLE) mmap consistency 2531ce372 Revert "Report holes when there a...
c7fadf230f26be750feddaebda95e5cc66896107
https://github.com/openzfs/zfs/commit/c7fadf230f26be750feddaebda95e5cc66896107
module/zfs/dnode.c
dnode_partial_zero
null
null
null
static void dnode_partial_zero(dnode_t *dn, uint64_t off, uint64_t blkoff, uint64_t len, dmu_tx_t *tx) { dmu_buf_impl_t *db; int res; rw_enter(&dn->dn_struct_rwlock, RW_READER); res = dbuf_hold_impl(dn, 0, dbuf_whichblock(dn, 0, off), TRUE, FALSE, FTAG, &db); rw_exit(&dn->dn_struct_rwlock); if (res == 0...
static void dnode_partial_zero(dnode_t *VAR_0, uint64_t VAR_1, uint64_t VAR_2, uint64_t VAR_3, dmu_tx_t *VAR_4) { dmu_buf_impl_t *VAR_5; int VAR_6; rw_enter(&VAR_0->dn_struct_rwlock, VAR_7); VAR_6 = dbuf_hold_impl(VAR_0, 0, dbuf_whichblock(VAR_0, 0, VAR_1), TRUE, FALSE, VAR_8, &VAR_5); rw_exit(&VAR_0->dn...
openzfs/zfs/c7fadf230f26be750feddaebda95e5cc66896107/dnode.c/non_vul/34.json
null
null
false
CVE-2016-10070
['CWE-125']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
ImageMagick
https://github.com/ImageMagick/ImageMagick/issues/131
a6240a163cb787909703d9fc649cf861f60ddd7c
https://github.com/ImageMagick/ImageMagick/commit/a6240a163cb787909703d9fc649cf861f60ddd7c
coders/mat.c
DecompressBlock
null
null
null
static Image *DecompressBlock(Image *orig, MagickOffsetType Size, ImageInfo *clone_info, ExceptionInfo *exception) { Image *image2; void *CacheBlock, *DecompressBlock; z_stream zip_info; FILE *mat_file; size_t magick_size; size_t extent; int file; int status; if(clone_info==NULL) return NULL; if(clone_info->file...
static Image *DecompressBlock(Image *VAR_0, MagickOffsetType VAR_1, ImageInfo *VAR_2, ExceptionInfo *VAR_3) { Image *VAR_4; void *VAR_5, *VAR_6; z_stream VAR_7; FILE *VAR_8; size_t VAR_9; size_t VAR_10; int VAR_11; int VAR_12; if(VAR_2==NULL) return NULL; if(VAR_2->file) /* COMMENT_0 */ { fclose(VAR_2->...
ImageMagick/a6240a163cb787909703d9fc649cf861f60ddd7c/mat.c/non_vul/1.json
null
null
false
CVE-2016-10165
['CWE-125']
AV:N/AC:M/Au:N/C:P/I:N/A:P
0
mm2/Little-CMS
Added an extra check to MLU bounds Thanks to Ibrahim el-sayed for spotting the bug
5ca71a7bc18b6897ab21d815d15e218e204581e2
https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2
src/cmstypes.c
Type_DateTime_Write
null
null
null
static cmsBool Type_DateTime_Write(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, void* Ptr, cmsUInt32Number nItems) { struct tm * DateTime = (struct tm*) Ptr; cmsDateTimeNumber timestamp; _cmsEncodeDateTimeNumber(&timestamp, DateTime); if (!io ->Write(io, sizeof(cmsDateTimeNumber), &timestam...
static cmsBool Type_DateTime_Write(struct _cms_typehandler_struct* VAR_0, cmsIOHANDLER* VAR_1, void* VAR_2, cmsUInt32Number VAR_3) { struct tm * VAR_4 = (struct tm*) VAR_2; cmsDateTimeNumber VAR_5; _cmsEncodeDateTimeNumber(&VAR_5, VAR_4); if (!VAR_1 ->Write(VAR_1, sizeof(cmsDateTimeNumber), &VAR_5)) r...
mm2/Little-CMS/5ca71a7bc18b6897ab21d815d15e218e204581e2/cmstypes.c/non_vul/7.json
null
null
false
CVE-2020-35518
['CWE-203']
AV:N/AC:L/Au:N/C:P/I:N/A:N
0
389ds/389-ds-base
Issue 4480 - Unexpected info returned to ldap request (#4491) Bug description: If the bind entry does not exist, the bind result info reports that 'No such entry'. It should not give any information if the target entry exists or not Fix description: Does not return any additional information d...
cc0f69283abc082488824702dae485b8eae938bc
https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc
ldap/servers/slapd/result.c
log_referral
null
null
null
static void log_referral(Operation *op) { int internal_op; internal_op = operation_is_flag_set(op, OP_FLAG_INTERNAL); if (!internal_op) { slapi_log_access(LDAP_DEBUG_STATS2, "conn=%" PRIu64 " op=%d REFERRAL\n", op->o_connid, op->o_opid); } else { if (config_get...
static void log_referral(Operation *VAR_0) { int VAR_1; VAR_1 = operation_is_flag_set(VAR_0, VAR_2); if (!VAR_1) { slapi_log_access(VAR_3, "conn=%" VAR_4 " op=%d REFERRAL\n", VAR_0->o_connid, VAR_0->o_opid); } else { if (config_get_accesslog_level() & VAR_3) { ...
389ds/389-ds-base/cc0f69283abc082488824702dae485b8eae938bc/result.c/non_vul/12.json
null
null
false
CVE-2015-3288
['CWE-20']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
torvalds/linux
mm: avoid setting up anonymous pages into file mapping Reading page fault handler code I've noticed that under right circumstances kernel would map anonymous pages into file mappings: if the VMA doesn't have vm_ops->fault() and the VMA wasn't fully populated on ->mmap(), kernel would handle page fault to not populated...
6b7339f4c31ad69c8e9c0b2859276e22cf72176d
https://github.com/torvalds/linux/commit/6b7339f4c31ad69c8e9c0b2859276e22cf72176d
mm/memory.c
print_bad_pte
null
null
null
static void print_bad_pte(struct vm_area_struct *vma, unsigned long addr, pte_t pte, struct page *page) { pgd_t *pgd = pgd_offset(vma->vm_mm, addr); pud_t *pud = pud_offset(pgd, addr); pmd_t *pmd = pmd_offset(pud, addr); struct address_space *mapping; pgoff_t index; static unsigned long resume; static unsig...
static void print_bad_pte(struct vm_area_struct *VAR_0, unsigned long VAR_1, pte_t VAR_2, struct page *page) { pgd_t *VAR_3 = pgd_offset(VAR_0->vm_mm, VAR_1); pud_t *VAR_4 = pud_offset(VAR_3, VAR_1); pmd_t *VAR_5 = pmd_offset(VAR_4, VAR_1); struct address_space *VAR_6; pgoff_t VAR_7; static unsigned long VAR...
torvalds/linux/6b7339f4c31ad69c8e9c0b2859276e22cf72176d/memory.c/non_vul/40.json
null
null
false
CVE-2018-11591
['CWE-476']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
espruino/Espruino
Add sanity check for debug trace print statement (fix #1420)
b6d362f6a1f2de0b3e7604848116efb509196bf4
https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4
src/jsvar.c
jsvIsNameIntBool
null
null
null
bool jsvIsNameIntBool(const JsVar *v) { return v && (v->flags&JSV_VARTYPEMASK)==JSV_NAME_INT_BOOL; }
bool jsvIsNameIntBool(const JsVar *VAR_0) { return VAR_0 && (VAR_0->flags&VAR_1)==VAR_2; }
espruino/Espruino/b6d362f6a1f2de0b3e7604848116efb509196bf4/jsvar.c/non_vul/135.json
null
null
false
CVE-2022-34967
['CWE-617']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
MonetDB
handle single rows in rel_order_by_column_exp. make sys.star (virtual function) return single row column, for row results. Solves broken query in issue #7306
d189f931497f2f700e05952b677f549266565862
https://github.com/MonetDB/MonetDB/commit/d189f931497f2f700e05952b677f549266565862
sql/backends/monet5/rel_bin.c
rel2bin_truncate
null
null
null
static stmt * rel2bin_truncate(backend *be, sql_rel *rel) { mvc *sql = be->mvc; stmt *truncate = NULL; sql_rel *tr = rel->l; sql_table *t = NULL; node *n = NULL; int restart_sequences, cascade; if (tr->op == op_basetable) t = tr->l; else assert(0/*ddl statement*/); n = rel->exps->h; restart_sequences = ...
static stmt * rel2bin_truncate(backend *VAR_0, sql_rel *VAR_1) { mvc *VAR_2 = VAR_0->mvc; stmt *VAR_3 = NULL; sql_rel *VAR_4 = VAR_1->l; sql_table *VAR_5 = NULL; node *VAR_6 = NULL; int VAR_7, VAR_8; if (VAR_4->op == VAR_9) VAR_5 = VAR_4->l; else assert(0/* COMMENT_0 */); VAR_6 = VAR_1->exps->h; VAR_7 =...
MonetDB/d189f931497f2f700e05952b677f549266565862/rel_bin.c/non_vul/75.json
null
null
false
CVE-2020-28346
['CWE-476']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
projectacrn/acrn-hypervisor
dm: virtio: check for paddr_guest2host return value paddr_guest2host can return NULL, but code paths in virtio are not checking the return value. _vq_record() initializes iov_base pointer using paddr_guest2host() but there is nothing in the flow that checks for NULL. Chane _vq_record to return -1 in case the address t...
ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681
https://github.com/projectacrn/acrn-hypervisor/commit/ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681
devicemodel/hw/pci/virtio/virtio.c
virtio_start_timer
null
null
null
static void virtio_start_timer(struct acrn_timer *timer, time_t sec, time_t nsec) { struct itimerspec ts; /* setting the interval time */ ts.it_interval.tv_sec = 0; ts.it_interval.tv_nsec = 0; /* set the delay time it will be started when timer_setting */ ts.it_value.tv_sec = sec; ts.it_value.tv_nsec = nsec; i...
static void virtio_start_timer(struct acrn_timer *VAR_0, time_t VAR_1, time_t VAR_2) { struct itimerspec VAR_3; /* COMMENT_0 */ VAR_3.it_interval.tv_sec = 0; VAR_3.it_interval.tv_nsec = 0; /* COMMENT_1 */ VAR_3.it_value.tv_sec = VAR_1; VAR_3.it_value.tv_nsec = VAR_2; if (acrn_timer_settime(VAR_0, &VAR_3) != 0)...
projectacrn/acrn-hypervisor/ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681/virtio.c/non_vul/10.json
null
null
false
CVE-2021-41141
['CWE-667']
AV:N/AC:L/Au:N/C:N/I:N/A:C
0
pjsip/pjproject
Merge pull request from GHSA-8fmx-hqw7-6gmc
1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196
pjmedia/src/pjmedia-codec/speex_codec.c
speex_get_next_frame
null
null
null
static int speex_get_next_frame(SpeexBits *bits) { static const int inband_skip_table[NB_SUBMODES] = {1, 1, 4, 4, 4, 4, 4, 4, 8, 8, 16, 16, 32, 32, 64, 64 }; static const int wb_skip_table[SB_SUBMODES] = {SB_SUBMODE_BITS+1, 36, 112, 192, 352, -1, -1, -1}; unsigned submode; unsigned nb_cou...
static int speex_get_next_frame(SpeexBits *VAR_0) { static const int VAR_1[VAR_2] = {1, 1, 4, 4, 4, 4, 4, 4, 8, 8, 16, 16, 32, 32, 64, 64 }; static const int VAR_3[VAR_4] = {VAR_5+1, 36, 112, 192, 352, -1, -1, -1}; unsigned VAR_6; unsigned VAR_7 = 0; while (speex_bits_remaining(VAR_0...
pjsip/pjproject/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196/speex_codec.c/non_vul/6.json
null
null
false
CVE-2014-9670
['CWE-189']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
freetype/freetype2
* src/pcf/pcfread (pcf_get_encodings): Add sanity checks for row and column values.
ef1eba75187adfac750f326b563fe543dd5ff4e6
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6
src/pcf/pcfread.c
pcf_get_metrics
null
null
null
static FT_Error pcf_get_metrics( FT_Stream stream, PCF_Face face ) { FT_Error error; FT_Memory memory = FT_FACE( face )->memory; FT_ULong format, size; PCF_Metric metrics = 0; FT_ULong nmetrics, i; error = pcf_seek_to_table_type( stream, ...
static FT_Error pcf_get_metrics( FT_Stream VAR_0, PCF_Face VAR_1 ) { FT_Error VAR_2; FT_Memory VAR_3 = FT_FACE( VAR_1 )->memory; FT_ULong VAR_4, VAR_5; PCF_Metric VAR_6 = 0; FT_ULong VAR_7, VAR_8; VAR_2 = pcf_seek_to_table_type( VAR_0, ...
freetype/freetype2/ef1eba75187adfac750f326b563fe543dd5ff4e6/pcfread.c/non_vul/4.json
null
null
false
CVE-2020-1915
['CWE-125']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
facebook/hermes
Handle set where internalSetter and Proxy are both true Summary: If putComputed is called on a proxy whose target's prototype is an array with a propname of 'length', then internalSetter will be true, and the receiver will be a proxy. In that case, proxy needs to win; the behavior may assert or be UB otherwise. Revi...
8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0
https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0
lib/VM/JSObject.cpp
JSObject::getPrototypeOf
null
null
null
CallResult<PseudoHandle<JSObject>> JSObject::getPrototypeOf( PseudoHandle<JSObject> selfHandle, Runtime *runtime) { if (LLVM_LIKELY(!selfHandle->isProxyObject())) { return createPseudoHandle(selfHandle->getParent(runtime)); } return JSProxy::getPrototypeOf( runtime->makeHandle(std::move(selfHan...
CallResult<PseudoHandle<JSObject>> JSObject::getPrototypeOf( PseudoHandle<JSObject> VAR_0, Runtime *VAR_1) { if (LLVM_LIKELY(!VAR_0->isProxyObject())) { return createPseudoHandle(VAR_0->getParent(VAR_1)); } return JSProxy::getPrototypeOf( VAR_1->makeHandle(std::move(VAR_0)), VAR_1); }
facebook/hermes/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0/JSObject.cpp/non_vul/24.json
null
null
false
CVE-2023-48105
['CWE-787']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
bytecodealliance/wasm-micro-runtime
Add more buf boundary checks in wasm loader
4785d91b16dd49c09a96835de2d9c7b077543fa4
https://github.com/bytecodealliance/wasm-micro-runtime/commit/4785d91b16dd49c09a96835de2d9c7b077543fa4
core/iwasm/interpreter/wasm_loader.c
wasm_loader_get_const_offset
null
null
null
static bool wasm_loader_get_const_offset(WASMLoaderContext *ctx, uint8 type, void *value, int16 *offset, char *error_buf, uint32 error_buf_size) { int8 bytes_to_increase; int16 operand_offset = 0; Const *c; /* Search existing constant */ for...
static bool wasm_loader_get_const_offset(WASMLoaderContext *VAR_0, uint8 VAR_1, void *VAR_2, int16 *VAR_3, char *VAR_4, uint32 VAR_5) { int8 VAR_6; int16 VAR_7 = 0; Const *VAR_8; /* COMMENT_0 */ for (VAR_8 = (Const *)VAR_0->const_buf; ...
bytecodealliance/wasm-micro-runtime/4785d91b16dd49c09a96835de2d9c7b077543fa4/wasm_loader.c/non_vul/36.json
null
null
false
CVE-2017-11171
['CWE-835']
AV:L/AC:L/Au:N/C:N/I:N/A:C
0
GNOME/gnome-session
[gsm] Delay the creation of the GsmXSMPClient until it really exists We used to create the GsmXSMPClient before the XSMP connection is really accepted. This can lead to some issues, though. An example is: https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting: "What is happening is that a new client (probabl...
b0dc999e0b45355314616321dbb6cb71e729fc9d
https://github.com/GNOME/gnome-session/commit/b0dc999e0b45355314616321dbb6cb71e729fc9d
gnome-session/gsm-xsmp-server.c
gsm_xsmp_server_set_client_store
null
null
null
static void gsm_xsmp_server_set_client_store (GsmXsmpServer *xsmp_server, GsmStore *store) { g_return_if_fail (GSM_IS_XSMP_SERVER (xsmp_server)); if (store != NULL) { g_object_ref (store); } if (xsmp_server->priv->client_store != N...
static void gsm_xsmp_server_set_client_store (GsmXsmpServer *VAR_0, GsmStore *VAR_1) { g_return_if_fail (GSM_IS_XSMP_SERVER (VAR_0)); if (VAR_1 != NULL) { g_object_ref (VAR_1); } if (VAR_0->priv->client_store != NULL) { ...
GNOME/gnome-session/b0dc999e0b45355314616321dbb6cb71e729fc9d/gsm-xsmp-server.c/non_vul/1.json
null
null
false
CVE-2022-1629
['CWE-126']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
vim
patch 8.2.4925: trailing backslash may cause reading past end of line Problem: Trailing backslash may cause reading past end of line. Solution: Check for NUL after backslash.
53a70289c2712808e6d4e88927e03cac01b470dd
https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
src/textobject.c
find_first_blank
null
null
null
static void find_first_blank(pos_T *posp) { int c; while (decl(posp) != -1) { c = gchar_pos(posp); if (!VIM_ISWHITE(c)) { incl(posp); break; } } }
static void find_first_blank(pos_T *VAR_0) { int VAR_1; while (decl(VAR_0) != -1) { VAR_1 = gchar_pos(VAR_0); if (!VIM_ISWHITE(VAR_1)) { incl(VAR_0); break; } } }
vim/53a70289c2712808e6d4e88927e03cac01b470dd/textobject.c/non_vul/12.json
null
null
false
CVE-2024-0210
['CWE-674']
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
wireshark
ZigBee TLV: Add a recursion check Blind attempt at fixing #19504.
98a8a9787bd9a6b15684f32f4cb760f0072f1b87
https://gitlab.com/wireshark/wireshark/-/commit/98a8a9787bd9a6b15684f32f4cb760f0072f1b87
epan/dissectors/packet-zbee-tlv.c
dissect_zbee_tlv_target_ieee_address
null
null
null
static guint dissect_zbee_tlv_target_ieee_address(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree, guint offset) { proto_tree_add_item(tree, hf_zbee_tlv_local_ieee_addr, tvb, offset, 8, ENC_LITTLE_ENDIAN); offset += 8; return offset; }
static guint dissect_zbee_tlv_target_ieee_address(tvbuff_t *VAR_0, packet_info *VAR_1 _U_, proto_tree *VAR_2, guint VAR_3) { proto_tree_add_item(VAR_2, VAR_4, VAR_0, VAR_3, 8, VAR_5); VAR_3 += 8; return VAR_3; }
null
null
null
false
CVE-2021-43057
['CWE-416']
AV:L/AC:L/Au:N/C:C/I:C/A:C
0
torvalds/linux
Jann Horn reported a problem with commit eb1231f73c4d ("selinux: clarify task subjective and objective credentials") where some LSM hooks were attempting to access the subjective credentials of a task other than the current task. Generally speaking, it is not safe to access another task's subjective credentials and do...
a3727a8bac0a9e77c70820655fd8715523ba3db7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=a3727a8bac0a9e77c70820655fd8715523ba3db7
security/selinux/hooks.c
selinux_nf_ip_exit
null
null
null
static void selinux_nf_ip_exit(void) { pr_debug("SELinux: Unregistering netfilter hooks\n"); unregister_pernet_subsys(&selinux_net_ops); }
static void selinux_nf_ip_exit(void) { pr_debug("SELinux: Unregistering netfilter hooks\n"); unregister_pernet_subsys(&VAR_0); }
torvalds/linux/a3727a8bac0a9e77c70820655fd8715523ba3db7/hooks.c/non_vul/133.json
null
null
false
CVE-2022-2959
['CWE-362', 'CWE-667']
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
torvalds/linux
pipe: Fix missing lock in pipe_resize_ring() pipe_resize_ring() needs to take the pipe->rd_wait.lock spinlock to prevent post_one_notification() from trying to insert into the ring whilst the ring is being replaced. The occupancy check must be done after the lock is taken, and the lock must be taken after the new rin...
189b0ddc245139af81198d1a3637cac74f96e13a
https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a
fs/pipe.c
pipe_ioctl
null
null
null
static long pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) { struct pipe_inode_info *pipe = filp->private_data; unsigned int count, head, tail, mask; switch (cmd) { case FIONREAD: __pipe_lock(pipe); count = 0; head = pipe->head; tail = pipe->tail; mask = pipe->ring_size - 1; while ...
static long pipe_ioctl(struct file *VAR_0, unsigned int VAR_1, unsigned long VAR_2) { struct pipe_inode_info *VAR_3 = VAR_0->private_data; unsigned int VAR_4, VAR_5, VAR_6, VAR_7; switch (VAR_1) { case VAR_8: __pipe_lock(VAR_3); VAR_4 = 0; VAR_5 = VAR_3->head; VAR_6 = VAR_3->tail; VAR_7 = VAR_3->ring_siz...
torvalds/linux/189b0ddc245139af81198d1a3637cac74f96e13a/pipe.c/non_vul/0.json
null
null
false
CVE-2018-20760
['CWE-787']
AV:N/AC:M/Au:N/C:P/I:P/A:P
0
gpac
check error code on call to gf_utf8_wcstombs (#1177)
4c1360818fc8948e9307059fba4dc47ba8ad255d
https://github.com/gpac/gpac/commit/4c1360818fc8948e9307059fba4dc47ba8ad255d
src/media_tools/text_import.c
ttxt_parse_text_box
null
null
null
void ttxt_parse_text_box(GF_MediaImporter *import, GF_XMLNode *n, GF_BoxRecord *box) { u32 i=0; GF_XMLAttribute *att; memset(box, 0, sizeof(GF_BoxRecord)); while ( (att=(GF_XMLAttribute *)gf_list_enum(n->attributes, &i))) { if (!stricmp(att->name, "top")) box->top = atoi(att->value); else if (!stricmp(att->name...
void ttxt_parse_text_box(GF_MediaImporter *VAR_0, GF_XMLNode *VAR_1, GF_BoxRecord *VAR_2) { u32 VAR_3=0; GF_XMLAttribute *VAR_4; memset(VAR_2, 0, sizeof(GF_BoxRecord)); while ( (VAR_4=(GF_XMLAttribute *)gf_list_enum(VAR_1->attributes, &VAR_3))) { if (!stricmp(VAR_4->name, "top")) VAR_2->top = atoi(VAR_4->value); ...
gpac/4c1360818fc8948e9307059fba4dc47ba8ad255d/text_import.c/non_vul/1.json
null
null
false
CVE-2017-7533
['CWE-362']
AV:L/AC:M/Au:N/C:C/I:C/A:C
0
torvalds/linux
dentry name snapshots take_dentry_name_snapshot() takes a safe snapshot of dentry name; if the name is a short one, it gets copied into caller-supplied structure, otherwise an extra reference to external name is grabbed (those are never modified). In either case the pointer to stable string is stored into the same st...
49d31c2f389acfe83417083e1208422b4091cd9e
https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e
fs/namei.c
path_to_nameidata
null
null
null
static inline void path_to_nameidata(const struct path *path, struct nameidata *nd) { if (!(nd->flags & LOOKUP_RCU)) { dput(nd->path.dentry); if (nd->path.mnt != path->mnt) mntput(nd->path.mnt); } nd->path.mnt = path->mnt; nd->path.dentry = path->dentry; }
static inline void path_to_nameidata(const struct path *path, struct nameidata *VAR_0) { if (!(VAR_0->flags & VAR_1)) { dput(VAR_0->path.dentry); if (VAR_0->path.mnt != path->mnt) mntput(VAR_0->path.mnt); } VAR_0->path.mnt = path->mnt; VAR_0->path.dentry = path->dentry; }
torvalds/linux/49d31c2f389acfe83417083e1208422b4091cd9e/namei.c/non_vul/102.json
null
null
false
CVE-2017-7501
['CWE-59']
AV:L/AC:L/Au:N/C:P/I:P/A:P
0
rpm-software-management/rpm
Don't follow symlinks on file creation (CVE-2017-7501) Open newly created files with O_EXCL to prevent symlink tricks. When reopening hardlinks for writing the actual content, use append mode instead. This is compatible with the write-only permissions but is not destructive in case we got redirected to somebody elses ...
404ef011c300207cdb1e531670384564aae04bdc
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
lib/fsm.c
fsmReadLink
null
null
null
static int fsmReadLink(const char *path, char *buf, size_t bufsize, size_t *linklen) { ssize_t llen = readlink(path, buf, bufsize - 1); int rc = RPMERR_READLINK_FAILED; if (_fsm_debug) { rpmlog(RPMLOG_DEBUG, " %8s (%s, buf, %d) %s\n", __func__, path, (int)(bufsize -1...
static int fsmReadLink(const char *VAR_0, char *VAR_1, size_t VAR_2, size_t *VAR_3) { ssize_t VAR_4 = readlink(VAR_0, VAR_1, VAR_2 - 1); int VAR_5 = VAR_6; if (VAR_7) { rpmlog(VAR_8, " %8s (%s, buf, %d) %s\n", VAR_9, VAR_0, (int)(VAR_2 -1), (VAR_4 < 0 ? strerror(VAR_...
rpm-software-management/rpm/404ef011c300207cdb1e531670384564aae04bdc/fsm.c/non_vul/19.json
null
null
false
CVE-2023-3161
['CWE-682']
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
torvalds/linux
fbcon: Check font dimension limits blit_x and blit_y are u32, so fbcon currently cannot support fonts larger than 32x32. The 32x32 case also needs shifting an unsigned int, to properly set bit 31, otherwise we get "UBSAN: shift-out-of-bounds in fbcon_set_font", as reported on: http://lore.kernel.org/all/IA1PR07MB983...
2b09d5d364986f724f17001ccfe4126b9b43a0be
https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be
drivers/video/fbdev/core/fbcon.c
fbcon_do_set_font
null
null
null
static int fbcon_do_set_font(struct vc_data *vc, int w, int h, int charcount, const u8 * data, int userfont) { struct fb_info *info = fbcon_info_from_console(vc->vc_num); struct fbcon_ops *ops = info->fbcon_par; struct fbcon_display *p = &fb_display[vc->vc_num]; int resize, ret, old_userfont, old_width, old...
static int fbcon_do_set_font(struct vc_data *VAR_0, int VAR_1, int VAR_2, int VAR_3, const u8 * VAR_4, int VAR_5) { struct fb_info *VAR_6 = fbcon_info_from_console(VAR_0->vc_num); struct fbcon_ops *VAR_7 = VAR_6->fbcon_par; struct fbcon_display *VAR_8 = &VAR_9[VAR_0->vc_num]; int VAR_10, VAR_11, VAR_12, VAR...
torvalds/linux/2b09d5d364986f724f17001ccfe4126b9b43a0be/fbcon.c/non_vul/1.json
null
null
false
CVE-2011-2723
['CWE-20']
AV:A/AC:M/Au:N/C:N/I:N/A:C
0
torvalds/linux
Currently skb_gro_header_slow unconditionally resets frag0 and frag0_len. However, when we can't pull on the skb this leaves the GRO fields in an inconsistent state. This patch fixes this by only resetting those fields after the pskb_may_pull test. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-b...
17dd759c67f21e34f2156abcf415e1f60605a188
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=17dd759c67f21e34f2156abcf415e1f60605a188
include/linux/netdevice.h
netif_subqueue_stopped
null
null
null
static inline int netif_subqueue_stopped(const struct net_device *dev, struct sk_buff *skb) { return __netif_subqueue_stopped(dev, skb_get_queue_mapping(skb)); }
static inline int netif_subqueue_stopped(const struct net_device *VAR_0, struct sk_buff *VAR_1) { return __netif_subqueue_stopped(VAR_0, skb_get_queue_mapping(VAR_1)); }
torvalds/linux/17dd759c67f21e34f2156abcf415e1f60605a188/netdevice.h/non_vul/22.json
null
null
false
CVE-2014-7899
['CWE-20']
AV:N/AC:L/Au:N/C:N/I:P/A:N
0
chromium
Simplify AreURLsInPageNavigation The first case guarantees we trust the renderer's definition of an in-page navigation if the urls before and after navigation are on the same origin. An in-page navigation is impossible cross-origin, so this single check is sufficient. BUG= Review URL: https://codereview.chromium.org...
5cfbddc9cc972f5133f26664dbf5810bb569cd04
https://github.com/chromium/chromium/commit/5cfbddc9cc972f5133f26664dbf5810bb569cd04
content/browser/frame_host/navigation_controller_impl.cc
NavigationControllerImpl::GoToIndex
null
null
null
void NavigationControllerImpl::GoToIndex(int index) { if (index < 0 || index >= static_cast<int>(entries_.size())) { NOTREACHED(); return; } if (transient_entry_index_ != -1) { if (index == transient_entry_index_) { // Nothing to do when navigating to the transient. return; } if (...
void NavigationControllerImpl::GoToIndex(int VAR_0) { if (VAR_0 < 0 || VAR_0 >= VAR_1<int>(VAR_2.size())) { NOTREACHED(); return; } if (VAR_3 != -1) { if (VAR_0 == VAR_3) { /* COMMENT_0 */ return; } if (VAR_0 > VAR_3) { /* COMMENT_1 */ VAR_0--; } } DiscardNonC...
chromium/5cfbddc9cc972f5133f26664dbf5810bb569cd04/navigation_controller_impl.cc/non_vul/76.json
null
null
false
CVE-2019-19242
['CWE-476']
AV:N/AC:M/Au:N/C:N/I:N/A:P
0
sqlite
Fix a problem that comes up when using generated columns that evaluate to a constant in an index and then making use of that index in a join. FossilOrigin-Name: 8b12e95fec7ce6e0de82a04ca3dfcf1a8e62e233b7382aa28a8a9be6e862b1af
57f7ece78410a8aae86aa4625fb7556897db384c
https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c
src/expr.c
sqlite3ExprCodeLoadIndexColumn
null
null
null
void sqlite3ExprCodeLoadIndexColumn( Parse *pParse, /* The parsing context */ Index *pIdx, /* The index whose column is to be loaded */ int iTabCur, /* Cursor pointing to a table row */ int iIdxCol, /* The column of the index to be loaded */ int regOut /* Store the index column value in this re...
void sqlite3ExprCodeLoadIndexColumn( Parse *VAR_0, /* COMMENT_0 */ Index *VAR_1, /* COMMENT_1 */ int VAR_2, /* COMMENT_2 */ int VAR_3, /* COMMENT_3 */ int VAR_4 /* COMMENT_4 */ ){ i16 VAR_5 = VAR_1->aiColumn[VAR_3]; if( VAR_5==VAR_6 ){ assert( VAR_1->aColExpr ); assert( VAR_1->aColE...
sqlite/57f7ece78410a8aae86aa4625fb7556897db384c/expr.c/non_vul/17.json
null
null
false
CVE-2019-12829
['CWE-787']
AV:N/AC:L/Au:N/C:N/I:N/A:P
0
radareorg/radare2
Fix #14303 - oob crash in RParse api usage, needs API redesign (#14307)
b282620b7a8818910c42a29b8f0855a2d13eec14
https://github.com/radareorg/radare2/commit/b282620b7a8818910c42a29b8f0855a2d13eec14
libr/parse/parse.c
r_parse_free
null
null
null
R_API void r_parse_free(RParse *p) { r_list_free (p->parsers); free (p); }
R_API void r_parse_free(RParse *VAR_0) { r_list_free (VAR_0->parsers); free (VAR_0); }
null
null
null
false
CVE-2017-0861
['CWE-416']
AV:L/AC:L/Au:N/C:P/I:P/A:P
0
torvalds/linux
Drivers can implement 'struct snd_pcm_ops.ioctl' to handle some requests from ALSA PCM core. These requests are internal purpose in kernel land. Usually common set of operations are used for it. SNDRV_PCM_IOCTL1_INFO is one of the requests. According to code comment, it has been obsoleted in the old days. We can see ...
e11f0f90a626f93899687b1cc909ee37dd6c5809
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=e11f0f90a626f93899687b1cc909ee37dd6c5809
sound/core/pcm_lib.c
snd_interval_mul
null
null
null
void snd_interval_mul(const struct snd_interval *a, const struct snd_interval *b, struct snd_interval *c) { if (a->empty || b->empty) { snd_interval_none(c); return; } c->empty = 0; c->min = mul(a->min, b->min); c->openmin = (a->openmin || b->openmin); c->max = mul(a->max, b->max); c->openmax = (a->openmax ...
void snd_interval_mul(const struct snd_interval *VAR_0, const struct snd_interval *VAR_1, struct snd_interval *VAR_2) { if (VAR_0->empty || VAR_1->empty) { snd_interval_none(VAR_2); return; } VAR_2->empty = 0; VAR_2->min = mul(VAR_0->min, VAR_1->min); VAR_2->openmin = (VAR_0->openmin || VAR_1->openmin); VAR_2...
torvalds/linux/e11f0f90a626f93899687b1cc909ee37dd6c5809/pcm_lib.c/non_vul/32.json
null
null
false
CVE-2014-9665
['CWE-119']
AV:N/AC:L/Au:N/C:P/I:P/A:P
0
freetype/freetype2
This doesn't break ABI. * include/ftimage.h (FT_Bitmap): Make `rows', `width', `num_grays', `pixel_mode', and `palette_mode' unsigned types. * src/base/ftbitmap.c: Updated. (FT_Bitmap_Copy): Fix casts. * src/cache/ftcsbits.c, src/raster/ftraster.c, src/sfnt/pngshim.c: Updated.
b3500af717010137046ec4076d1e1c0641e33727
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b3500af717010137046ec4076d1e1c0641e33727
src/raster/ftraster.c
ft_black_reset
null
null
null
static void ft_black_reset( black_PRaster raster, char* pool_base, long pool_size ) { if ( raster ) { if ( pool_base && pool_size >= (long)sizeof ( black_TWorker ) + 2048 ) { black_PWorker worker = (black_PWorker)pool_base; ...
static void ft_black_reset( black_PRaster VAR_0, char* VAR_1, long VAR_2 ) { if ( VAR_0 ) { if ( VAR_1 && VAR_2 >= (long)sizeof ( VAR_3 ) + 2048 ) { black_PWorker VAR_4 = (black_PWorker)VAR_1; VAR_0->buffer = VAR_1 +...
freetype/freetype2/b3500af717010137046ec4076d1e1c0641e33727/ftraster.c/non_vul/6.json
null
null
false
CVE-2019-20892
['CWE-415']
AV:N/AC:L/Au:S/C:N/I:N/A:P
0
net-snmp
libsnmp, USM: Introduce a reference count in struct usmStateReference This patch fixes https://sourceforge.net/p/net-snmp/bugs/2956/.
5f881d3bf24599b90d67a45cae7a3eb099cd71c9
https://github.com/net-snmp/net-snmp/commit/5f881d3bf24599b90d67a45cae7a3eb099cd71c9
snmplib/snmp_client.c
count_varbinds
null
null
null
int count_varbinds(netsnmp_variable_list * var_ptr) { int count = 0; for (; var_ptr != NULL; var_ptr = var_ptr->next_variable) count++; return count; }
int count_varbinds(netsnmp_variable_list * VAR_0) { int VAR_1 = 0; for (; VAR_0 != NULL; VAR_0 = VAR_0->next_variable) VAR_1++; return VAR_1; }
net-snmp/5f881d3bf24599b90d67a45cae7a3eb099cd71c9/snmp_client.c/non_vul/21.json
null
null
false
CVE-2020-15174
['CWE-20', 'CWE-693']
AV:N/AC:M/Au:N/C:N/I:P/A:P
0
electron
refactor: wire will-navigate up to a navigation throttle instead of OpenURL (#25108) * refactor: wire will-navigate up to a navigation throttle instead of OpenURL (#25065) * refactor: wire will-navigate up to a navigation throttle instead of OpenURL * spec: add test for x-site _top navigation * chore: old cod...
18613925610ba319da7f497b6deed85ad712c59b
https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b
shell/browser/api/electron_api_web_contents.cc
WebContents::DidFinishLoad
null
null
null
void WebContents::DidFinishLoad(content::RenderFrameHost* render_frame_host, const GURL& validated_url) { bool is_main_frame = !render_frame_host->GetParent(); int frame_process_id = render_frame_host->GetProcess()->GetID(); int frame_routing_id = render_frame_host->GetRoutingID();...
void WebContents::DidFinishLoad(content::RenderFrameHost* VAR_0, const GURL& VAR_1) { bool VAR_2 = !VAR_0->GetParent(); int VAR_3 = VAR_0->GetProcess()->GetID(); int VAR_4 = VAR_0->GetRoutingID(); auto VAR_5 = GetWeakPtr(); Emit("did-frame-finish-load", VAR_2, VAR_3, VAR...
electron/18613925610ba319da7f497b6deed85ad712c59b/electron_api_web_contents.cc/non_vul/112.json
null
null
false
CVE-2016-8576
['CWE-770']
AV:L/AC:L/Au:N/C:N/I:N/A:P
0
qemu
xhci: limit the number of link trbs we are willing to process Needed to avoid we run in circles forever in case the guest builds an endless loop with link trbs. Reported-by: Li Qiang <liqiang6-s@360.cn> Tested-by: P J P <ppandit@redhat.com> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Message-id: 1476096382-7981-...
05f43d44e4bc26611ce25fd7d726e483f73363ce
https://github.com/qemu/qemu/commit/05f43d44e4bc26611ce25fd7d726e483f73363ce
hw/usb/hcd-xhci.c
xhci_submit
null
null
null
static int xhci_submit(XHCIState *xhci, XHCITransfer *xfer, XHCIEPContext *epctx) { uint64_t mfindex; DPRINTF("xhci_submit(slotid=%d,epid=%d)\n", xfer->slotid, xfer->epid); xfer->in_xfer = epctx->type>>2; switch(epctx->type) { case ET_INTR_OUT: case ET_INTR_IN: xfer->pkts = 0; ...
static int xhci_submit(XHCIState *VAR_0, XHCITransfer *VAR_1, XHCIEPContext *VAR_2) { uint64_t VAR_3; DPRINTF("xhci_submit(slotid=%d,epid=%d)\n", VAR_1->slotid, VAR_1->epid); VAR_1->in_xfer = VAR_2->type>>2; switch(VAR_2->type) { case VAR_4: case VAR_5: VAR_1->pkts = 0; VAR_1-...
qemu/05f43d44e4bc26611ce25fd7d726e483f73363ce/hcd-xhci.c/non_vul/3.json
null
null
false
CVE-2023-4622
['CWE-416']
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
torvalds/linux
Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage() with detailed analysis and a nice repro. unix_stream_sendpage() tries to add data to the last skb in the peer's recv queue without locking the queue. If the peer's FD is passed to another socket and the socket's FD is passed to the peer, there i...
790c2f9d15b594350ae9bca7b236f2b1859de02c
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&h=790c2f9d15b594350ae9bca7b236f2b1859de02c
net/unix/af_unix.c
unix_stream_splice_read
null
null
null
static ssize_t unix_stream_splice_read(struct socket *sock, loff_t *ppos, struct pipe_inode_info *pipe, size_t size, unsigned int flags) { struct unix_stream_read_state state = { .recv_actor = unix_stream_splice_actor, .socket = sock, .pipe = pipe, .size = size, .splice_flags = flags, ...
static ssize_t unix_stream_splice_read(struct socket *VAR_0, loff_t *VAR_1, struct pipe_inode_info *VAR_2, size_t VAR_3, unsigned int VAR_4) { struct unix_stream_read_state VAR_5 = { .recv_actor = VAR_6, .socket = VAR_0, .pipe = VAR_2, .size = VAR_3, .splice_flags = VAR_4, }; if (un...
torvalds/linux/790c2f9d15b594350ae9bca7b236f2b1859de02c/af_unix.c/non_vul/49.json
null
null
false