cve_id stringlengths 13 16 | cwe_ids stringclasses 400
values | cvss_vector stringclasses 256
values | cvss_is_v3 float64 0 1 ⌀ | repo_name stringlengths 3 45 | commit_msg stringlengths 3 19.3k ⌀ | commit_hash stringlengths 7 40 | git_url stringlengths 56 159 | file_path stringlengths 4 100 | func_name stringlengths 1 127 ⌀ | func_before stringlengths 10 83k ⌀ | abstract_func_before stringlengths 10 68.1k ⌀ | func_graph_path_before stringlengths 38 127 ⌀ | func stringlengths 8 83.3k | abstract_func stringlengths 8 68.4k | func_graph_path stringlengths 35 126 ⌀ | diff_func stringlengths 77 14.5k ⌀ | diff_line_info stringlengths 42 5.91k ⌀ | is_vul bool 2
classes |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-29579 | ['CWE-787'] | AV:L/AC:L/Au:N/C:P/I:P/A:P | 0 | tensorflow | Prevent heap OOB error in `MaxPoolGrad`
PiperOrigin-RevId: 372424854
Change-Id: Idac0f23867ad8b0601cafbaaa52d5e64269e63a7 | a74768f8e4efbda4def9f16ee7e13cf3922ac5f7 | https://github.com/tensorflow/tensorflow/commit/a74768f8e4efbda4def9f16ee7e13cf3922ac5f7 | tensorflow/core/kernels/maxpooling_op.cc | MaxPoolingNoMaskV2Op | null | null | null | explicit MaxPoolingNoMaskV2Op(OpKernelConstruction* context)
: OpKernel(context) {
string data_format;
OP_REQUIRES_OK(context, context->GetAttr("data_format", &data_format));
OP_REQUIRES(context, FormatFromString(data_format, &data_format_),
errors::InvalidArgument("Invalid data format... | explicit MaxPoolingNoMaskV2Op(OpKernelConstruction* VAR_0)
: OpKernel(VAR_0) {
string VAR_1;
OP_REQUIRES_OK(VAR_0, VAR_0->GetAttr("data_format", &VAR_1));
OP_REQUIRES(VAR_0, FormatFromString(VAR_1, &VAR_2),
errors::InvalidArgument("Invalid data format"));
if (VAR_0->num_inputs() ==... | null | null | null | false |
CVE-2021-31258 | ['CWE-476'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | gpac | fixed #1706 | ebfa346eff05049718f7b80041093b4c5581c24e | https://github.com/gpac/gpac/commit/ebfa346eff05049718f7b80041093b4c5581c24e | src/isomedia/isom_read.c | gf_isom_disable_odf_conversion | null | null | null | GF_EXPORT
void gf_isom_disable_odf_conversion(GF_ISOFile *movie, Bool disable)
{
if (movie) movie->disable_odf_translate = disable;
} | GF_EXPORT
VAR_0 gf_isom_disable_odf_conversion(GF_ISOFile *VAR_1, Bool VAR_2)
{
if (VAR_1) VAR_1->disable_odf_translate = VAR_2;
} | null | null | null | false |
CVE-2016-6494 | ['CWE-200'] | AV:L/AC:L/Au:N/C:P/I:N/A:N | 0 | mongodb/mongo | SERVER-25335 avoid group and other permissions when creating .dbshell history file | 035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 | https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 | src/mongo/shell/linenoise.cpp | setDisplayAttribute | null | null | null | static void setDisplayAttribute(bool enhancedDisplay) {
#ifdef _WIN32
if (enhancedDisplay) {
CONSOLE_SCREEN_BUFFER_INFO inf;
GetConsoleScreenBufferInfo(console_out, &inf);
oldDisplayAttribute = inf.wAttributes;
BYTE oldLowByte = oldDisplayAttribute & 0xFF;
BYTE newLowByte;
... | static void setDisplayAttribute(bool VAR_0) {
#ifdef VAR_1
if (VAR_0) {
CONSOLE_SCREEN_BUFFER_INFO VAR_2;
GetConsoleScreenBufferInfo(VAR_3, &VAR_2);
VAR_4 = VAR_2.wAttributes;
BYTE VAR_5 = VAR_4 & 0xFF;
BYTE VAR_6;
switch (VAR_5) {
case 0x07:
... | mongodb/mongo/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0/linenoise.cpp/non_vul/4.json | null | null | false |
CVE-2019-19815 | ['CWE-476'] | AV:N/AC:M/Au:N/C:N/I:N/A:C | 0 | torvalds/linux | f2fs: support swap file w/ DIO
Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org> | 4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6 | https://github.com/torvalds/linux/commit/4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6 | include/trace/events/f2fs.h | set_inode_flag | null | null | null | static inline void set_inode_flag(struct inode *inode, int flag)
{
if (!test_bit(flag, &F2FS_I(inode)->flags))
set_bit(flag, &F2FS_I(inode)->flags);
__mark_inode_dirty_flag(inode, flag, true);
} | static inline void set_inode_flag(struct inode *inode, int VAR_0)
{
if (!test_bit(VAR_0, &F2FS_I(inode)->flags))
set_bit(VAR_0, &F2FS_I(inode)->flags);
__mark_inode_dirty_flag(inode, VAR_0, true);
} | torvalds/linux/4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6/f2fs.h/non_vul/141.json | null | null | false |
CVE-2023-4751 | ['CWE-122'] | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 1 | vim | patch 9.0.1331: illegal memory access when using :ball in Visual mode
Problem: Illegal memory access when using :ball in Visual mode.
Solution: Stop Visual mode when using :ball. (Pavel Mayorov, closes #11923) | e1121b139480f53d1b06f84f3e4574048108fa0b | https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b | src/buffer.c | get_winopts | null | null | null | void
get_winopts(buf_T *buf)
{
wininfo_T *wip;
clear_winopt(&curwin->w_onebuf_opt);
#ifdef FEAT_FOLDING
clearFolding(curwin);
#endif
wip = find_wininfo(buf, TRUE, TRUE);
if (wip != NULL && wip->wi_win != NULL
&& wip->wi_win != curwin && wip->wi_win->w_buffer == buf)
{
// The buffer is cu... | void
get_winopts(buf_T *VAR_0)
{
wininfo_T *VAR_1;
clear_winopt(&VAR_2->w_onebuf_opt);
#ifdef VAR_3
clearFolding(VAR_2);
#endif
VAR_1 = find_wininfo(VAR_0, TRUE, TRUE);
if (VAR_1 != NULL && VAR_1->wi_win != NULL
&& VAR_1->wi_win != VAR_2 && VAR_1->wi_win->w_buffer == VAR_0)
{
/* COMMENT_... | vim/e1121b139480f53d1b06f84f3e4574048108fa0b/buffer.c/non_vul/11.json | null | null | false |
CVE-2012-2383 | ['CWE-189'] | AV:L/AC:L/Au:N/C:N/I:N/A:C | 0 | torvalds/linux | drm/i915: fix integer overflow in i915_gem_execbuffer2()
On 32-bit systems, a large args->buffer_count from userspace via ioctl
may overflow the allocation size, leading to out-of-bounds access.
This vulnerability was introduced in commit 8408c282 ("drm/i915:
First try a normal large kmalloc for the temporary exec bu... | ed8cd3b2cd61004cab85380c52b1817aca1ca49b | https://github.com/torvalds/linux/commit/ed8cd3b2cd61004cab85380c52b1817aca1ca49b | drivers/gpu/drm/i915/i915_gem_execbuffer.c | i915_gem_object_set_to_gpu_domain | null | null | null | static void
i915_gem_object_set_to_gpu_domain(struct drm_i915_gem_object *obj,
struct intel_ring_buffer *ring,
struct change_domains *cd)
{
uint32_t invalidate_domains = 0, flush_domains = 0;
/*
* If the object isn't moving to a new write domain,
* let the object stay in multiple read domains
*/
i... | static void
i915_gem_object_set_to_gpu_domain(struct drm_i915_gem_object *VAR_0,
struct intel_ring_buffer *VAR_1,
struct change_domains *VAR_2)
{
uint32_t VAR_3 = 0, VAR_4 = 0;
/* COMMENT_0 */
if ... | torvalds/linux/ed8cd3b2cd61004cab85380c52b1817aca1ca49b/i915_gem_execbuffer.c/non_vul/12.json | null | null | false |
CVE-2018-5702 | ['CWE-Other'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | transmission | mitigate dns rebinding attacks against daemon | cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84 | https://github.com/transmission/transmission/commit/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84 | libtransmission/session.c | tr_sessionGetDeleteSource | null | null | null | bool tr_sessionGetDeleteSource(tr_session const* session)
{
TR_ASSERT(tr_isSession(session));
return session->deleteSourceTorrent;
} | bool tr_sessionGetDeleteSource(tr_session const* VAR_0)
{
TR_ASSERT(tr_isSession(VAR_0));
return VAR_0->deleteSourceTorrent;
} | transmission/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84/session.c/non_vul/95.json | null | null | false |
CVE-2011-4131 | ['CWE-189'] | AV:A/AC:H/Au:N/C:N/I:N/A:C | 0 | torvalds/linux | NFSv4: include bitmap in nfsv4 get acl data
The NFSv4 bitmap size is unbounded: a server can return an arbitrary
sized bitmap in an FATTR4_WORD0_ACL request. Replace using the
nfs4_fattr_bitmap_maxsz as a guess to the maximum bitmask returned by a server
with the inclusion of the bitmap (xdr length plus bitmasks) and... | bf118a342f10dafe44b14451a1392c3254629a1f | https://github.com/torvalds/linux/commit/bf118a342f10dafe44b14451a1392c3254629a1f | fs/nfs/nfs4xdr.c | encode_claim_previous | null | null | null | static inline void encode_claim_previous(struct xdr_stream *xdr, fmode_t type)
{
__be32 *p;
p = reserve_space(xdr, 4);
*p = cpu_to_be32(NFS4_OPEN_CLAIM_PREVIOUS);
encode_delegation_type(xdr, type);
} | static inline void encode_claim_previous(struct xdr_stream *VAR_0, fmode_t VAR_1)
{
__be32 *VAR_2;
VAR_2 = reserve_space(VAR_0, 4);
*VAR_2 = cpu_to_be32(VAR_3);
encode_delegation_type(VAR_0, VAR_1);
} | torvalds/linux/bf118a342f10dafe44b14451a1392c3254629a1f/nfs4xdr.c/non_vul/174.json | null | null | false |
CVE-2014-7928 | ['CWE-19'] | AV:N/AC:L/Au:N/C:P/I:P/A:P | 0 | chromium | Fix for 435073: CHECK failure in CHECK(p->IsSmi()) failed.
The bug was an error when copying arrays in crankshaft. If it's a holey smi
array, the copy must be done as FAST_HOLEY_ELEMENTS to prevent representation
changes from being inserted that deopt on encountering the hole.
Also, prevent inlining array pop() and s... | 3d58b82addcdc72755539631b1d5dc603a9b2135 | https://chromium.googlesource.com/v8/v8/+/3d58b82addcdc72755539631b1d5dc603a9b2135 | src/hydrogen.cc | HOptimizedGraphBuilder::HandleCompoundAssignment | null | null | null | void HOptimizedGraphBuilder::HandleCompoundAssignment(Assignment* expr) {
Expression* target = expr->target();
VariableProxy* proxy = target->AsVariableProxy();
Property* prop = target->AsProperty();
DCHECK(proxy == NULL || prop == NULL);
// We have a second position recorded in the FullCodeGenerator to have... | void HOptimizedGraphBuilder::HandleCompoundAssignment(Assignment* VAR_0) {
Expression* VAR_1 = VAR_0->target();
VariableProxy* VAR_2 = VAR_1->AsVariableProxy();
Property* VAR_3 = VAR_1->AsProperty();
DCHECK(VAR_2 == NULL || VAR_3 == NULL);
/* COMMENT_0 */
/* COMMENT_1 */
BinaryOperation* VAR_4 = VAR_0->b... | chromium/3d58b82addcdc72755539631b1d5dc603a9b2135/hydrogen.cc/non_vul/235.json | null | null | false |
CVE-2012-1179 | ['CWE-264'] | AV:A/AC:M/Au:S/C:N/I:N/A:C | 0 | torvalds/linux | mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode
commit 1a5a9906d4e8d1976b701f889d8f35d54b928f25 upstream.
In some cases it may happen that pmd_none_or_clear_bad() is called with
the mmap_sem hold in read mode. In those cases the huge page faults can
allocate hugepmds under pmd_none_or_clea... | 4a1d704194a441bf83c636004a479e01360ec850 | https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850 | fs/proc/task_mmu.c | show_map_vma | null | null | null | static void show_map_vma(struct seq_file *m, struct vm_area_struct *vma)
{
struct mm_struct *mm = vma->vm_mm;
struct file *file = vma->vm_file;
vm_flags_t flags = vma->vm_flags;
unsigned long ino = 0;
unsigned long long pgoff = 0;
unsigned long start, end;
dev_t dev = 0;
int len;
if (file) {
struct inode *i... | static void show_map_vma(struct seq_file *VAR_0, struct vm_area_struct *VAR_1)
{
struct mm_struct *VAR_2 = VAR_1->vm_mm;
struct file *file = VAR_1->vm_file;
vm_flags_t VAR_3 = VAR_1->vm_flags;
unsigned long VAR_4 = 0;
unsigned long long VAR_5 = 0;
unsigned long VAR_6, VAR_7;
dev_t VAR_8 = 0;
int VAR_9;
if (fi... | torvalds/linux/4a1d704194a441bf83c636004a479e01360ec850/task_mmu.c/non_vul/0.json | null | null | false |
CVE-2007-4997 | ['CWE-189'] | AV:N/AC:M/Au:N/C:N/I:N/A:C | 0 | kernel/git/avi/kvm | Reported by Chris Evans <scarybeasts@gmail.com>:
> The summary is that an evil 80211 frame can crash out a victim's
> machine. It only applies to drivers using the 80211 wireless code, and
> only then to certain drivers (and even then depends on a card's
> firmware not dropping a dubious packet). I must confess I'm no... | 04045f98e0457aba7d4e6736f37eed189c48a5f7 | http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=04045f98e0457aba7d4e6736f37eed189c48a5f7 | net/ieee80211/ieee80211_rx.c | ieee80211_read_qos_param_element | null | null | null | static int ieee80211_read_qos_param_element(struct ieee80211_qos_parameter_info
*element_param, struct ieee80211_info_element
*info_element)
{
int ret = 0;
u16 size = sizeof(struct ieee80211_qos_parameter_info) - 2;
if ((info_element == NULL) || (element_param == NULL))
return -1;
if (info_ele... | static int ieee80211_read_qos_param_element(struct ieee80211_qos_parameter_info
*VAR_0, struct ieee80211_info_element
*VAR_1)
{
int VAR_2 = 0;
u16 VAR_3 = sizeof(struct ieee80211_qos_parameter_info) - 2;
if ((VAR_1 == NULL) || (VAR_0 == NULL))
return -1;
if (VAR_1->id == VAR_4 && VAR_1->len ==... | kernel/git/avi/kvm/04045f98e0457aba7d4e6736f37eed189c48a5f7/ieee80211_rx.c/non_vul/2.json | null | null | false |
CVE-2023-48945 | ['CWE-787'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 1 | openlink/virtuoso-opensource | Fixed issue with missing cast on return type (fixes #1172)
The return type from searched case as well as control expression
cannot be predicted as it can be any type, so we have to cast
explicitly to column type. | a7de776fdf7518d74522168f1c0960241f18e110 | https://github.com/openlink/virtuoso-opensource/commit/a7de776fdf7518d74522168f1c0960241f18e110 | libsrc/Wi/sqlvec.c | sslr_set_member | null | null | null | dk_set_t
sslr_set_member (dk_set_t ssls, state_slot_t * param)
{
if (!param)
return NULL;
DO_SET (state_slot_t *, ssl, &ssls)
if (ssl && ssl->ssl_index == param->ssl_index)
return iter;
END_DO_SET ();
return NULL;
} | dk_set_t
sslr_set_member (dk_set_t VAR_0, state_slot_t * VAR_1)
{
if (!VAR_1)
return NULL;
VAR_2 (state_slot_t *, VAR_3, &VAR_0)
if (VAR_3 && VAR_3->ssl_index == VAR_1->ssl_index)
return VAR_4;
END_DO_SET ();
return NULL;
} | openlink/virtuoso-opensource/a7de776fdf7518d74522168f1c0960241f18e110/sqlvec.c/non_vul/113.json | null | null | false |
CVE-2020-13645 | ['CWE-295'] | AV:N/AC:L/Au:N/C:P/I:P/A:N | 0 | GNOME/glib-networking | Return bad identity error if identity is unset
When the server-identity property of GTlsClientConnection is unset, the
documentation sasy we need to fail the certificate verification with
G_TLS_CERTIFICATE_BAD_IDENTITY. This is important because otherwise,
it's easy for applications to fail to specify server identity.... | dbc8d69f58b07f6ed091aa123e5d40a53573a5fc | https://github.com/GNOME/glib-networking/commit/dbc8d69f58b07f6ed091aa123e5d40a53573a5fc | tls/base/gtlsconnection-base.c | g_tls_connection_base_condition_check | null | null | null | static GIOCondition
g_tls_connection_base_condition_check (GDatagramBased *datagram_based,
GIOCondition condition)
{
GTlsConnectionBase *tls = G_TLS_CONNECTION_BASE (datagram_based);
return g_tls_connection_base_check (tls, condition) ? condition : 0;
} | static GIOCondition
g_tls_connection_base_condition_check (GDatagramBased *VAR_0,
GIOCondition VAR_1)
{
GTlsConnectionBase *VAR_2 = G_TLS_CONNECTION_BASE (VAR_0);
return g_tls_connection_base_check (VAR_2, VAR_1) ? VAR_1 : 0;
} | GNOME/glib-networking/dbc8d69f58b07f6ed091aa123e5d40a53573a5fc/gtlsconnection-base.c/non_vul/75.json | null | null | false |
CVE-2014-2672 | ['CWE-362'] | AV:N/AC:M/Au:N/C:N/I:N/A:C | 0 | torvalds/linux | ath9k: protect tid->sched check
We check tid->sched without a lock taken on ath_tx_aggr_sleep(). That
is race condition which can result of doing list_del(&tid->list) twice
(second time with poisoned list node) and cause crash like shown below:
[424271.637220] BUG: unable to handle kernel paging request at 00100104
[... | 21f8aaee0c62708654988ce092838aa7df4d25d8 | https://github.com/torvalds/linux/commit/21f8aaee0c62708654988ce092838aa7df4d25d8 | drivers/net/wireless/ath/ath9k/xmit.c | ath_tx_complete | null | null | null | static void ath_tx_complete(struct ath_softc *sc, struct sk_buff *skb,
int tx_flags, struct ath_txq *txq)
{
struct ieee80211_tx_info *tx_info = IEEE80211_SKB_CB(skb);
struct ath_common *common = ath9k_hw_common(sc->sc_ah);
struct ieee80211_hdr * hdr = (struct ieee80211_hdr *)skb->data;
int padpos, padsize;
... | static void ath_tx_complete(struct ath_softc *VAR_0, struct sk_buff *VAR_1,
int VAR_2, struct ath_txq *VAR_3)
{
struct ieee80211_tx_info *VAR_4 = IEEE80211_SKB_CB(VAR_1);
struct ath_common *VAR_5 = ath9k_hw_common(VAR_0->sc_ah);
struct ieee80211_hdr * VAR_6 = (struct ieee80211_hdr *)VAR_1->data;
int VAR_7, V... | torvalds/linux/21f8aaee0c62708654988ce092838aa7df4d25d8/xmit.c/non_vul/34.json | null | null | false |
CVE-2018-10675 | ['CWE-416'] | AV:L/AC:L/Au:N/C:C/I:C/A:C | 0 | torvalds/linux | mm/mempolicy: fix use after free when calling get_mempolicy
I hit a use after free issue when executing trinity and repoduced it
with KASAN enabled. The related call trace is as follows.
BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766
Read of size 2 by task syz-executor1/798
... | 73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | mm/mempolicy.c | do_migrate_pages | null | null | null | int do_migrate_pages(struct mm_struct *mm, const nodemask_t *from,
const nodemask_t *to, int flags)
{
int busy = 0;
int err;
nodemask_t tmp;
err = migrate_prep();
if (err)
return err;
down_read(&mm->mmap_sem);
/*
* Find a 'source' bit set in 'tmp' whose corresponding 'dest'
* bit in 'to' is not a... | int do_migrate_pages(struct mm_struct *VAR_0, const nodemask_t *VAR_1,
const nodemask_t *VAR_2, int VAR_3)
{
int VAR_4 = 0;
int VAR_5;
nodemask_t VAR_6;
VAR_5 = migrate_prep();
if (VAR_5)
return VAR_5;
down_read(&VAR_0->mmap_sem);
/* COMMENT_0 */
... | torvalds/linux/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99/mempolicy.c/non_vul/2.json | null | null | false |
CVE-2020-19752 | ['CWE-476'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | kohler/gifsicle | Avoid problems with colormapless GIFs (#140) | eb9e083dcc0050996d79de2076ddc76011ad2f10 | https://github.com/kohler/gifsicle/commit/eb9e083dcc0050996d79de2076ddc76011ad2f10 | src/support.c | parse_rectangle | null | null | null | int
parse_rectangle(Clp_Parser *clp, const char *arg, int complain, void *thunk)
{
const char *input_arg = arg;
char *val;
int x = position_x = strtol(arg, &val, 10);
(void)thunk;
if (*val == ',') {
int y = position_y = strtol(val + 1, &val, 10);
if (*val == '-' && parse_position(clp, val + 1, 0, 0))... | int
parse_rectangle(Clp_Parser *VAR_0, const char *VAR_1, int VAR_2, void *VAR_3)
{
const char *VAR_4 = VAR_1;
char *VAR_5;
int VAR_6 = VAR_7 = strtol(VAR_1, &VAR_5, 10);
(void)VAR_3;
if (*VAR_5 == ',') {
int VAR_8 = VAR_9 = strtol(VAR_5 + 1, &VAR_5, 10);
if (*VAR_5 == '-' && parse_position(VAR_0, VA... | kohler/gifsicle/eb9e083dcc0050996d79de2076ddc76011ad2f10/support.c/non_vul/6.json | null | null | false |
CVE-2021-3331 | ['CWE-Other'] | AV:N/AC:L/Au:N/C:C/I:C/A:C | 0 | winscp | Bug 1943: Prevent loading session settings that can lead to remote code execution from handled URLs
https://winscp.net/tracker/1943
(cherry picked from commit ec584f5189a856cd79509f754722a6898045c5e0)
Source commit: 0f4be408b3f01132b00682da72d925d6c4ee649b | faa96e8144e6925a380f94a97aa382c9427f688d | https://github.com/winscp/winscp/commit/faa96e8144e6925a380f94a97aa382c9427f688d | source/windows/ConsoleRunner.cpp | TConsoleRunner::SynchronizeControllerTooManyDirectories | null | null | null | void __fastcall TConsoleRunner::SynchronizeControllerTooManyDirectories(
TSynchronizeController * /*Sender*/, int & MaxDirectories)
{
if (Aborted())
{
Abort();
}
if (MaxDirectories < GUIConfiguration->MaxWatchDirectories)
{
MaxDirectories = GUIConfiguration->MaxWatchDirectories;
}
else
{
... | void __fastcall TConsoleRunner::SynchronizeControllerTooManyDirectories(
TSynchronizeController * /* COMMENT_0 */, int & VAR_0)
{
if (Aborted())
{
Abort();
}
if (VAR_0 < VAR_1->MaxWatchDirectories)
{
VAR_0 = VAR_1->MaxWatchDirectories;
}
else
{
VAR_0 *= 2;
}
} | winscp/faa96e8144e6925a380f94a97aa382c9427f688d/ConsoleRunner.cpp/non_vul/76.json | null | null | false |
CVE-2020-26759 | ['CWE-120'] | AV:N/AC:L/Au:N/C:P/I:P/A:P | 0 | mymarilyn/clickhouse-driver | Fix malformed read/write in BufferedReader
read_strings and read affected | 3e990547e064b8fca916b23a0f7d6fe8c63c7f6b | https://github.com/mymarilyn/clickhouse-driver/commit/3e990547e064b8fca916b23a0f7d6fe8c63c7f6b | clickhouse_driver/columns/stringcolumn.c | PyThread_tss_delete | null | null | null | static CYTHON_INLINE void PyThread_tss_delete(Py_tss_t *key) {
PyThread_delete_key(*key);
*key = Py_tss_NEEDS_INIT;
} | static CYTHON_INLINE VAR_0 PyThread_tss_delete(Py_tss_t *VAR_1) {
PyThread_delete_key(*VAR_1);
*VAR_1 = VAR_2;
} | null | null | null | false |
CVE-2021-4156 | ['CWE-125'] | AV:N/AC:M/Au:N/C:P/I:N/A:P | 0 | libsndfile | flac: Fix improper buffer reusing | 4c30646abf7834e406f7e2429c70bc254e18beab | https://github.com/libsndfile/libsndfile/commit/4c30646abf7834e406f7e2429c70bc254e18beab | src/flac.c | f2flac24_clip_array | null | null | null | static void
f2flac24_clip_array (const float *src, int32_t *dest, int count, int normalize)
{ float normfact, scaled_value ;
normfact = normalize ? (8.0 * 0x100000) : 1.0 ;
while (--count >= 0)
{ scaled_value = src [count] * normfact ;
if (CPU_CLIPS_POSITIVE == 0 && scaled_value >= (1.0 * 0x7FFFFF))
{ dest [co... | static void
f2flac24_clip_array (const float *VAR_0, int32_t *VAR_1, int VAR_2, int VAR_3)
{ float VAR_4, VAR_5 ;
VAR_4 = VAR_3 ? (8.0 * 0x100000) : 1.0 ;
while (--VAR_2 >= 0)
{ VAR_5 = VAR_0 [VAR_2] * VAR_4 ;
if (VAR_6 == 0 && VAR_5 >= (1.0 * 0x7FFFFF))
{ VAR_1 [VAR_2] = 0x7FFFFF ;
continue ;
} ;
if ... | libsndfile/4c30646abf7834e406f7e2429c70bc254e18beab/flac.c/non_vul/0.json | null | null | false |
CVE-2021-44733 | ['CWE-362'] | AV:L/AC:M/Au:N/C:P/I:P/A:P | 0 | torvalds/linux | Since the tee subsystem does not keep a strong reference to its idle
shared memory buffers, it races with other threads that try to destroy a
shared memory through a close of its dma-buf fd or by unmapping the
memory.
In tee_shm_get_from_id() when a lookup in teedev->idr has been
successful, it is possible that the te... | dfd0743f1d9ea76931510ed150334d571fbab49d | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?h=dfd0743f1d9ea76931510ed150334d571fbab49d | drivers/tee/tee_shm.c | tee_shm_register | struct tee_shm *tee_shm_register(struct tee_context *ctx, unsigned long addr,
size_t length, u32 flags)
{
struct tee_device *teedev = ctx->teedev;
const u32 req_user_flags = TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED;
const u32 req_kernel_flags = TEE_SHM_DMA_BUF | TEE_SHM_KERNEL_MAPPED;
struct tee_shm *shm;
void *... | struct tee_shm *tee_shm_register(struct tee_context *VAR_0, unsigned long VAR_1,
size_t VAR_2, u32 VAR_3)
{
struct tee_device *VAR_4 = VAR_0->teedev;
const u32 VAR_5 = VAR_6 | VAR_7;
const u32 VAR_8 = VAR_6 | VAR_9;
struct tee_shm *VAR_10;
void *VAR_11;
int VAR_12;
int VAR_13;
unsigned long VAR_14;
if (V... | torvalds/linux/dfd0743f1d9ea76931510ed150334d571fbab49d/tee_shm.c/vul/before/2.json | struct tee_shm *tee_shm_register(struct tee_context *ctx, unsigned long addr,
size_t length, u32 flags)
{
struct tee_device *teedev = ctx->teedev;
const u32 req_user_flags = TEE_SHM_DMA_BUF | TEE_SHM_USER_MAPPED;
const u32 req_kernel_flags = TEE_SHM_DMA_BUF | TEE_SHM_KERNEL_MAPPED;
struct tee_shm *shm;
void *... | struct tee_shm *tee_shm_register(struct tee_context *VAR_0, unsigned long VAR_1,
size_t VAR_2, u32 VAR_3)
{
struct tee_device *VAR_4 = VAR_0->teedev;
const u32 VAR_5 = VAR_6 | VAR_7;
const u32 VAR_8 = VAR_6 | VAR_9;
struct tee_shm *VAR_10;
void *VAR_11;
int VAR_12;
int VAR_13;
unsigned long VAR_14;
if (V... | torvalds/linux/dfd0743f1d9ea76931510ed150334d571fbab49d/tee_shm.c/vul/after/2.json | --- func_before
+++ func_after
@@ -30,6 +30,7 @@
goto err;
}
+ refcount_set(&shm->refcount, 1);
shm->flags = flags | TEE_SHM_REGISTER;
shm->ctx = ctx;
shm->id = -1;
@@ -90,22 +91,6 @@
goto err;
}
- if (flags & TEE_SHM_DMA_BUF) {
- DEFINE_DMA_BUF_EXPORT_INFO(exp_info);
-
- exp_info.ops = &tee_shm_d... | {'deleted_lines': ['\tif (flags & TEE_SHM_DMA_BUF) {', '\t\tDEFINE_DMA_BUF_EXPORT_INFO(exp_info);', '', '\t\texp_info.ops = &tee_shm_dma_buf_ops;', '\t\texp_info.size = shm->size;', '\t\texp_info.flags = O_RDWR;', '\t\texp_info.priv = shm;', '', '\t\tshm->dmabuf = dma_buf_export(&exp_info);', '\t\tif (IS_ERR(shm->dmabu... | true |
CVE-2023-5520 | ['CWE-125'] | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H | 1 | gpac | ac3dmx: add remain size check (fixes #2627) | 5692dc729491805e0e5f55c21d50ba1e6b19e88e | https://github.com/gpac/gpac/commit/5692dc729491805e0e5f55c21d50ba1e6b19e88e | src/filters/reframe_ac3.c | ac3dmx_process_event | null | null | null | static Bool ac3dmx_process_event(GF_Filter *filter, const GF_FilterEvent *evt)
{
u32 i;
GF_FilterEvent fevt;
GF_AC3DmxCtx *ctx = gf_filter_get_udta(filter);
switch (evt->base.type) {
case GF_FEVT_PLAY:
if (!ctx->is_playing) {
ctx->is_playing = GF_TRUE;
ctx->cts = 0;
}
if (! ctx->is_file) {
return G... | static Bool ac3dmx_process_event(GF_Filter *VAR_0, const GF_FilterEvent *VAR_1)
{
u32 VAR_2;
GF_FilterEvent VAR_3;
GF_AC3DmxCtx *VAR_4 = gf_filter_get_udta(VAR_0);
switch (VAR_1->base.type) {
case VAR_5:
if (!VAR_4->is_playing) {
VAR_4->is_playing = VAR_6;
VAR_4->cts = 0;
}
if (! VAR_4->is_file) {
... | gpac/5692dc729491805e0e5f55c21d50ba1e6b19e88e/reframe_ac3.c/non_vul/1.json | null | null | false |
CVE-2022-38266 | ['CWE-369'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | 1 | DanBloomberg/leptonica | Issue 26393: morphapp_fuzzer: Divide-by-zero in blockconvLow
* Removed the code that allowed divide by zero for tiny pix
* Ditto for 4 other block convolution functions. | f062b42c0ea8dddebdc6a152fd16152de215d614 | https://github.com/DanBloomberg/leptonica/commit/f062b42c0ea8dddebdc6a152fd16152de215d614 | src/convolve.c | blocksumLow | null | null | null | static void
blocksumLow(l_uint32 *datad,
l_int32 w,
l_int32 h,
l_int32 wpl,
l_uint32 *dataa,
l_int32 wpla,
l_int32 wc,
l_int32 hc)
{
l_int32 i, j, imax, imin, jmax, jmin;
l_int32 wn, hn, fwc, fhc, wmwc, hmhc;
l... | static void
blocksumLow(l_uint32 *VAR_0,
l_int32 VAR_1,
l_int32 VAR_2,
l_int32 VAR_3,
l_uint32 *VAR_4,
l_int32 VAR_5,
l_int32 VAR_6,
l_int32 VAR_7)
{
l_int32 VAR_8, VAR_9, VAR_10, VAR_11, VAR_12, VAR_13;
l_int32 ... | DanBloomberg/leptonica/f062b42c0ea8dddebdc6a152fd16152de215d614/convolve.c/non_vul/20.json | null | null | false |
CVE-2021-41035 | ['CWE-440', 'CWE-250'] | AV:N/AC:L/Au:N/C:P/I:P/A:P | 0 | eclipse-openj9/openj9 | Throw IAE when an InterfaceHandle thunk finds a non-public method
The interface dispatch implemented by InterfaceHandle is supposed to
throw IllegalAccessError (IAE) when the dispatched callee is not public,
just like the dispatch performed by invokeinterface. | c6e0d9296ff9a3084965d83e207403de373c0bad | https://github.com/eclipse-openj9/openj9/commit/c6e0d9296ff9a3084965d83e207403de373c0bad | runtime/compiler/env/VMJ9.cpp | TR_J9SharedCacheVM::getClassFromSignature | null | null | null | TR_OpaqueClassBlock *
TR_J9SharedCacheVM::getClassFromSignature(const char * sig, int32_t sigLength, TR_OpaqueMethodBlock * method, bool isVettedForAOT)
{
TR_OpaqueClassBlock* j9class = TR_J9VM::getClassFromSignature(sig, sigLength, method, true);
bool validated = false;
TR::Compilation* comp = TR::comp();
... | TR_OpaqueClassBlock *
TR_J9SharedCacheVM::getClassFromSignature(const char * VAR_0, int32_t VAR_1, TR_OpaqueMethodBlock * VAR_2, bool VAR_3)
{
TR_OpaqueClassBlock* VAR_4 = TR_J9VM::getClassFromSignature(VAR_0, VAR_1, VAR_2, true);
bool VAR_5 = false;
TR::Compilation* VAR_6 = TR::comp();
if (VAR_4)
... | eclipse-openj9/openj9/c6e0d9296ff9a3084965d83e207403de373c0bad/VMJ9.cpp/non_vul/241.json | null | null | false |
CVE-2018-18443 | ['CWE-772'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | AcademySoftwareFoundation/openexr | Fix #350 - memory leak on exit
This fixes CVE-2018-18443, the last thread pool provider set into the
pool was not being correctly cleaned up at shutdown of the thread pool.
Signed-off-by: Kimball Thurston <kdt3rd@gmail.com> | adbc1900cb9d25fcc4df008d4008b781cf2fa4f8 | https://github.com/AcademySoftwareFoundation/openexr/commit/adbc1900cb9d25fcc4df008d4008b781cf2fa4f8 | IlmBase/IlmThread/IlmThreadPool.cpp | TaskGroup::finishOneTask | null | null | null | void
TaskGroup::finishOneTask ()
{
_data->removeTask ();
} | void
TaskGroup::finishOneTask ()
{
VAR_0->removeTask ();
} | AcademySoftwareFoundation/openexr/adbc1900cb9d25fcc4df008d4008b781cf2fa4f8/IlmThreadPool.cpp/non_vul/25.json | null | null | false |
CVE-2022-2196 | ['CWE-1188'] | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H | 1 | torvalds/linux | According to Intel's document on Indirect Branch Restricted
Speculation, "Enabling IBRS does not prevent software from controlling
the predicted targets of indirect branches of unrelated software
executed later at the same predictor mode (for example, between two
different user applications, or two different virtual ma... | 2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 | arch/x86/kvm/vmx/nested.c | prepare_vmx_msr_autostore_list | null | null | null | static void prepare_vmx_msr_autostore_list(struct kvm_vcpu *vcpu,
u32 msr_index)
{
struct vcpu_vmx *vmx = to_vmx(vcpu);
struct vmx_msrs *autostore = &vmx->msr_autostore.guest;
bool in_vmcs12_store_list;
int msr_autostore_slot;
bool in_autostore_list;
int last;
msr_autostore_slot = vmx_find_loadstore_msr... | static void prepare_vmx_msr_autostore_list(struct kvm_vcpu *VAR_0,
u32 VAR_1)
{
struct vcpu_vmx *VAR_2 = to_vmx(VAR_0);
struct vmx_msrs *VAR_3 = &VAR_2->msr_autostore.guest;
bool VAR_4;
int VAR_5;
bool VAR_6;
int VAR_7;
VAR_5 = vmx_find_loadstore_msr_slot(VAR_3, VAR_1);
VAR_6 = VAR_5 >= 0;
VAR_4 = nes... | torvalds/linux/2e7eab81425ad6c875f2ed47c0ce01e78afc38a5/nested.c/non_vul/45.json | null | null | false |
CVE-2009-2698 | ['CWE-476'] | AV:L/AC:L/Au:N/C:C/I:C/A:C | 0 | torvalds/linux | UDP tracks corking status through the pending variable. The
IP layer also tracks it through the socket write queue. It
is possible for the two to get out of sync when MSG_PROBE is
used.
This patch changes UDP to check the write queue to ensure
that the two stay in sync.
Signed-off-by: Herbert Xu <herbert@gondor.apa... | 1e0c14f49d6b393179f423abbac47f85618d3d46 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=1e0c14f49d6b393179f423abbac47f85618d3d46 | net/ipv4/udp.c | udp4_format_sock | null | null | null | static void udp4_format_sock(struct sock *sp, char *tmpbuf, int bucket)
{
struct inet_sock *inet = inet_sk(sp);
__be32 dest = inet->daddr;
__be32 src = inet->rcv_saddr;
__u16 destp = ntohs(inet->dport);
__u16 srcp = ntohs(inet->sport);
sprintf(tmpbuf, "%4d: %08X:%04X %08X:%04X"
" %02X %08X:%08X %02X:%08lX... | static void udp4_format_sock(struct sock *VAR_0, char *VAR_1, int VAR_2)
{
struct inet_sock *VAR_3 = inet_sk(VAR_0);
__be32 VAR_4 = VAR_3->daddr;
__be32 VAR_5 = VAR_3->rcv_saddr;
__u16 VAR_6 = ntohs(VAR_3->dport);
__u16 VAR_7 = ntohs(VAR_3->sport);
sprintf(VAR_1, "%4d: %08X:%04X %08X:%04X"
" %02X %08X:%08... | torvalds/linux/1e0c14f49d6b393179f423abbac47f85618d3d46/udp.c/non_vul/6.json | null | null | false |
CVE-2017-6903 | ['CWE-Other'] | AV:N/AC:M/Au:N/C:C/I:C/A:C | 0 | JACoders/OpenJK | Shared: Merge ioquake/ioq3@376267d534476a875d8b9228149c4ee18b74a4fd
Don't load .pk3s as .dlls, and don't load user config files from .pk3s. | 8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7 | https://github.com/JACoders/OpenJK/commit/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7 | codemp/qcommon/files.cpp | FS_Read | null | null | null | int FS_Read( void *buffer, int len, fileHandle_t f ) {
int block, remaining;
int read;
byte *buf;
int tries;
FS_AssertInitialised();
if ( !f ) {
return 0;
}
buf = (byte *)buffer;
fs_readCount += len;
if (fsh[f].zipFile == qfalse) {
remaining = len;
tries = 0;
while (remaining) {
block = rema... | int FS_Read( void *VAR_0, int VAR_1, fileHandle_t VAR_2 ) {
int VAR_3, VAR_4;
int VAR_5;
byte *VAR_6;
int VAR_7;
FS_AssertInitialised();
if ( !VAR_2 ) {
return 0;
}
VAR_6 = (byte *)VAR_0;
VAR_8 += VAR_1;
if (VAR_9[VAR_2].zipFile == VAR_10) {
VAR_4 = VAR_1;
VAR_7 = 0;
while (VAR_4) {
VAR_3 = ... | JACoders/OpenJK/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7/files.cpp/non_vul/40.json | null | null | false |
CVE-2013-10006 | ['CWE-208'] | AV:A/AC:H/Au:S/C:P/I:N/A:N | 0 | Ziftr/primecoin | Make RPC password resistant to timing attacks
Fixes issue#2838; this is a tweaked version of pull#2845 that
should not leak the length of the password and is more generic,
in case we run into other situations where we need
timing-attack-resistant comparisons. | cdb3441b5cd2c1bae49fae671dc4a496f7c96322 | https://github.com/Ziftr/primecoin/commit/cdb3441b5cd2c1bae49fae671dc4a496f7c96322 | src/bitcoinrpc.cpp | write | null | null | null | std::streamsize write(const char* s, std::streamsize n)
{
handshake(ssl::stream_base::client); // HTTPS clients write first
if (fUseSSL) return asio::write(stream, asio::buffer(s, n));
return asio::write(stream.next_layer(), asio::buffer(s, n));
} | std::streamsize write(const char* VAR_0, std::streamsize VAR_1)
{
handshake(ssl::stream_base::client); /* COMMENT_0 */
if (VAR_2) return asio::write(VAR_3, asio::buffer(VAR_0, VAR_1));
return asio::write(VAR_3.next_layer(), asio::buffer(VAR_0, VAR_1));
} | Ziftr/primecoin/cdb3441b5cd2c1bae49fae671dc4a496f7c96322/bitcoinrpc.cpp/non_vul/21.json | null | null | false |
CVE-2017-17499 | ['CWE-416'] | AV:N/AC:L/Au:N/C:P/I:P/A:P | 0 | ImageMagick | Added missing return to avoid use after free. | 8c35502217c1879cb8257c617007282eee3fe1cc | https://github.com/ImageMagick/ImageMagick/commit/8c35502217c1879cb8257c617007282eee3fe1cc | Magick++/lib/Image.cpp | Magick::Image::waveletDenoise | null | null | null | void Magick::Image::waveletDenoise(const double threshold_,
const double softness_)
{
MagickCore::Image
*newImage;
GetPPException;
newImage=WaveletDenoiseImage(constImage(),threshold_,softness_,
exceptionInfo);
replaceImage(newImage);
ThrowImageException;
} | void Magick::Image::waveletDenoise(const double VAR_0,
const double VAR_1)
{
MagickCore::Image
*VAR_2;
VAR_3;
VAR_2=WaveletDenoiseImage(constImage(),VAR_0,VAR_1,
VAR_4);
replaceImage(VAR_2);
VAR_5;
} | ImageMagick/8c35502217c1879cb8257c617007282eee3fe1cc/Image.cpp/non_vul/304.json | null | null | false |
CVE-2018-17338 | ['CWE-787'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | kermitt2/pdfalto | Fix heap buffer overflow. see #29 | 23d01be8dfe792e54d9a2f34f4118d2947eea80b | https://github.com/kermitt2/pdfalto/commit/23d01be8dfe792e54d9a2f34f4118d2947eea80b | src/XmlAltoOutputDev.cc | TextPage::restoreState | null | null | null | void TextPage::restoreState(GfxState *state) {
if(!idStack.empty()) {
idCur = idStack.top();
idStack.pop();
}
} | void TextPage::restoreState(GfxState *VAR_0) {
if(!VAR_1.empty()) {
VAR_2 = VAR_1.top();
VAR_1.pop();
}
} | kermitt2/pdfalto/23d01be8dfe792e54d9a2f34f4118d2947eea80b/XmlAltoOutputDev.cc/non_vul/115.json | null | null | false |
CVE-2018-9261 | ['CWE-834'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | wireshark | NBAP: avoid linking a DCH-ID to itself
Otherwise it can create an infinite loop, leading to a buffer overflow.
Also add explicit cheks on the buffer usage and set its maximum size to
128 instead of 32 per ASN.1 description.
Bug: 14471
Change-Id: I18d26369cf3d1cf2a32c86a972c78ea9f6f7a503
Reviewed-on: https://code.wire... | 66bc372716e04d6a8afdf6712583c9b5d11fee55 | https://github.com/wireshark/wireshark/commit/66bc372716e04d6a8afdf6712583c9b5d11fee55 | epan/dissectors/packet-nbap.c | dissect_nbap_UL_Code_InformationModify_ModifyItem_RL_ReconfPrepTDD | null | null | null | static int
dissect_nbap_UL_Code_InformationModify_ModifyItem_RL_ReconfPrepTDD(tvbuff_t *tvb _U_, int offset _U_, asn1_ctx_t *actx _U_, proto_tree *tree _U_, int hf_index _U_) {
offset = dissect_per_sequence(tvb, offset, actx, tree, hf_index,
ett_nbap_UL_Code_InformationModify_Modify... | static int
dissect_nbap_UL_Code_InformationModify_ModifyItem_RL_ReconfPrepTDD(tvbuff_t *VAR_0 _U_, int VAR_1 _U_, asn1_ctx_t *VAR_2 _U_, proto_tree *VAR_3 _U_, int VAR_4 _U_) {
VAR_1 = dissect_per_sequence(VAR_0, VAR_1, VAR_2, VAR_3, VAR_4,
VAR_5, VAR_6);
return VAR_1;
} | null | null | null | false |
CVE-2019-6706 | ['CWE-416'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | lua | Fixed bug in 'lua_upvaluejoin'
Bug-fix: joining an upvalue with itself could cause a use-after-free
crash. | 89aee84cbc9224f638f3b7951b306d2ee8ecb71e | https://github.com/lua/lua/commit/89aee84cbc9224f638f3b7951b306d2ee8ecb71e | lapi.c | lua_pushlstring | null | null | null | LUA_API const char *lua_pushlstring (lua_State *L, const char *s, size_t len) {
TString *ts;
lua_lock(L);
ts = (len == 0) ? luaS_new(L, "") : luaS_newlstr(L, s, len);
setsvalue2s(L, L->top, ts);
api_incr_top(L);
luaC_checkGC(L);
lua_unlock(L);
return getstr(ts);
} | LUA_API const VAR_0 *lua_pushlstring (lua_State *VAR_1, const char *VAR_2, size_t VAR_3) {
TString *VAR_4;
lua_lock(VAR_1);
VAR_4 = (VAR_3 == 0) ? luaS_new(VAR_1, "") : luaS_newlstr(VAR_1, VAR_2, VAR_3);
setsvalue2s(VAR_1, VAR_1->top, VAR_4);
api_incr_top(VAR_1);
luaC_checkGC(VAR_1);
lua_unlock(VAR_1);
... | null | null | null | false |
CVE-2021-4155 | ['CWE-131'] | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N | 1 | torvalds/linux | The old ALLOCSP/FREESP ioctls in XFS can be used to preallocate space at
the end of files, just like fallocate and RESVSP. Make the behavior
consistent with the other ioctls.
Reported-by: Kirill Tkhai <ktkhai@virtuozzo.com>
Signed-off-by: Darrick J. Wong <djwong@kernel.org>
Signed-off-by: Darrick J. Wong <darrick.won... | 983d8e60f50806f90534cc5373d0ce867e5aaf79 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=983d8e60f50806f90534cc5373d0ce867e5aaf79 | fs/xfs/xfs_ioctl.c | xfs_bulkstat_fmt | null | null | null | static int
xfs_bulkstat_fmt(
struct xfs_ibulk *breq,
const struct xfs_bulkstat *bstat)
{
if (copy_to_user(breq->ubuffer, bstat, sizeof(struct xfs_bulkstat)))
return -EFAULT;
return xfs_ibulk_advance(breq, sizeof(struct xfs_bulkstat));
} | static int
xfs_bulkstat_fmt(
struct xfs_ibulk *VAR_0,
const struct xfs_bulkstat *VAR_1)
{
if (copy_to_user(VAR_0->ubuffer, VAR_1, sizeof(struct xfs_bulkstat)))
return -VAR_2;
return xfs_ibulk_advance(VAR_0, sizeof(struct xfs_bulkstat));
} | torvalds/linux/983d8e60f50806f90534cc5373d0ce867e5aaf79/xfs_ioctl.c/non_vul/17.json | null | null | false |
CVE-2018-16149 | ['CWE-347'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | igrr/axtls-8266 | Apply CVE fixes for X509 parsing
Apply patches developed by Sze Yiu which correct a vulnerability in
X509 parsing. See CVE-2018-16150 and CVE-2018-16149 for more info. | 5efe2947ab45e81d84b5f707c51d1c64be52f36c | https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c | ssl/x509.c | x509_verify | int x509_verify(const CA_CERT_CTX *ca_cert_ctx, const X509_CTX *cert,
int *pathLenConstraint)
{
int ret = X509_OK, i = 0;
bigint *cert_sig;
X509_CTX *next_cert = NULL;
BI_CTX *ctx = NULL;
bigint *mod = NULL, *expn = NULL;
int match_ca_cert = 0;
struct timeval tv;
uint8_t is_sel... | int x509_verify(const CA_CERT_CTX *VAR_0, const X509_CTX *VAR_1,
int *VAR_2)
{
int VAR_3 = VAR_4, VAR_5 = 0;
bigint *VAR_6;
X509_CTX *VAR_7 = NULL;
BI_CTX *VAR_8 = NULL;
bigint *VAR_9 = NULL, *VAR_10 = NULL;
int VAR_11 = 0;
struct timeval VAR_12;
uint8_t VAR_13 = 0;
if (VA... | igrr/axtls-8266/5efe2947ab45e81d84b5f707c51d1c64be52f36c/x509.c/vul/before/0.json | int x509_verify(const CA_CERT_CTX *ca_cert_ctx, const X509_CTX *cert,
int *pathLenConstraint)
{
int ret = X509_OK, i = 0;
bigint *cert_sig;
X509_CTX *next_cert = NULL;
BI_CTX *ctx = NULL;
bigint *mod = NULL, *expn = NULL;
int match_ca_cert = 0;
struct timeval tv;
uint8_t is_sel... | int x509_verify(const CA_CERT_CTX *VAR_0, const X509_CTX *VAR_1,
int *VAR_2)
{
int VAR_3 = VAR_4, VAR_5 = 0;
bigint *VAR_6;
X509_CTX *VAR_7 = NULL;
BI_CTX *VAR_8 = NULL;
bigint *VAR_9 = NULL, *VAR_10 = NULL;
int VAR_11 = 0;
struct timeval VAR_12;
uint8_t VAR_13 = 0;
if (VA... | igrr/axtls-8266/5efe2947ab45e81d84b5f707c51d1c64be52f36c/x509.c/vul/after/0.json | --- func_before
+++ func_after
@@ -132,7 +132,7 @@
}
/* check the signature */
- cert_sig = sig_verify(ctx, cert->signature, cert->sig_len,
+ cert_sig = sig_verify(ctx, cert->signature, cert->sig_len, cert->sig_type,
bi_clone(ctx, mod), bi_clone(ctx, expn));
if (cert_s... | {'deleted_lines': [' cert_sig = sig_verify(ctx, cert->signature, cert->sig_len, '], 'added_lines': [' cert_sig = sig_verify(ctx, cert->signature, cert->sig_len, cert->sig_type,']} | true |
CVE-2020-1917 | ['CWE-787', 'CWE-190', 'CWE-125'] | AV:N/AC:L/Au:N/C:P/I:P/A:P | 0 | facebook/hhvm | security fixes
https://hhvm.com/blog/2021/02/25/security-update.html | 08193b7f0cd3910256e00d599f0f3eb2519c44ca | https://github.com/facebook/hhvm/commit/08193b7f0cd3910256e00d599f0f3eb2519c44ca | hphp/zend/zend-string.cpp | string_bin2hex | null | null | null | char *string_bin2hex(const char *input, int len, char* result) {
static char hexconvtab[] = "0123456789abcdef";
assert(input);
if (len == 0) {
return nullptr;
}
int i, j;
for (i = j = 0; i < len; i++) {
result[j++] = hexconvtab[(unsigned char)input[i] >> 4];
result[j++] = hexconvtab[(unsigned ... | char *string_bin2hex(const char *VAR_0, int VAR_1, char* VAR_2) {
static char VAR_3[] = "0123456789abcdef";
assert(VAR_0);
if (VAR_1 == 0) {
return nullptr;
}
int VAR_4, VAR_5;
for (VAR_4 = VAR_5 = 0; VAR_4 < VAR_1; VAR_4++) {
VAR_2[VAR_5++] = VAR_3[(unsigned char)VAR_0[VAR_4] >> 4];
VAR_2[VAR... | facebook/hhvm/08193b7f0cd3910256e00d599f0f3eb2519c44ca/zend-string.cpp/non_vul/0.json | null | null | false |
CVE-2010-1084 | ['CWE-119'] | AV:N/AC:M/Au:N/C:N/I:N/A:C | 0 | torvalds/linux | When creating a high number of Bluetooth sockets (L2CAP, SCO
and RFCOMM) it is possible to scribble repeatedly on arbitrary
pages of memory. Ensure that the content of these sysfs files is
always less than one page. Even if this means truncating. The
files in question are scheduled to be moved over to debugfs in
the fu... | 101545f6fef4a0a3ea8daf0b5b880df2c6a92a69 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=101545f6fef4a0a3ea8daf0b5b880df2c6a92a69 | net/bluetooth/l2cap.c | l2cap_connect_req | null | null | null | static inline int l2cap_connect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
{
struct l2cap_chan_list *list = &conn->chan_list;
struct l2cap_conn_req *req = (struct l2cap_conn_req *) data;
struct l2cap_conn_rsp rsp;
struct sock *sk, *parent;
int result, status = L2CAP_CS_NO_INFO;
u16 dcid = ... | static inline int l2cap_connect_req(struct l2cap_conn *VAR_0, struct l2cap_cmd_hdr *VAR_1, u8 *VAR_2)
{
struct l2cap_chan_list *VAR_3 = &VAR_0->chan_list;
struct l2cap_conn_req *VAR_4 = (struct l2cap_conn_req *) VAR_2;
struct l2cap_conn_rsp VAR_5;
struct sock *VAR_6, *VAR_7;
int VAR_8, VAR_9 = VAR_10;
u16 VAR_11... | torvalds/linux/101545f6fef4a0a3ea8daf0b5b880df2c6a92a69/l2cap.c/non_vul/4.json | null | null | false |
CVE-2013-4118 | ['CWE-476'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | FreeRDP | security: add a NULL pointer check to fix a server crash. | 7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7 | https://github.com/FreeRDP/FreeRDP/commit/7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7 | libfreerdp/core/rdp.c | rdp_send_channel_data | null | null | null | int rdp_send_channel_data(rdpRdp* rdp, int channel_id, BYTE* data, int size)
{
return freerdp_channel_send(rdp, channel_id, data, size);
} | int rdp_send_channel_data(rdpRdp* VAR_0, int VAR_1, BYTE* VAR_2, int VAR_3)
{
return freerdp_channel_send(VAR_0, VAR_1, VAR_2, VAR_3);
} | FreeRDP/7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7/rdp.c/non_vul/9.json | null | null | false |
CVE-2017-9217 | ['CWE-476'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | systemd | resolved: bugfix of null pointer p->question dereferencing (#6020)
See https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1621396 | a924f43f30f9c4acaf70618dd2a055f8b0f166be | https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be | src/resolve/resolved-dns-packet.c | dns_packet_read_uint8 | null | null | null | int dns_packet_read_uint8(DnsPacket *p, uint8_t *ret, size_t *start) {
const void *d;
int r;
assert(p);
r = dns_packet_read(p, sizeof(uint8_t), &d, start);
if (r < 0)
return r;
*ret = ((uint8_t*) d)[0];
return 0;
} | int dns_packet_read_uint8(DnsPacket *VAR_0, uint8_t *VAR_1, size_t *VAR_2) {
const void *VAR_3;
int VAR_4;
assert(VAR_0);
VAR_4 = dns_packet_read(VAR_0, sizeof(uint8_t), &VAR_3, VAR_2);
if (VAR_4 < 0)
return VAR_4;
*VAR_1 = ((uint8_t*) VAR_3)[0];
... | systemd/a924f43f30f9c4acaf70618dd2a055f8b0f166be/resolved-dns-packet.c/non_vul/27.json | null | null | false |
CVE-2019-18680 | ['CWE-476'] | AV:N/AC:L/Au:N/C:N/I:N/A:C | 0 | torvalds/linux | net: rds: Fix NULL ptr use in rds_tcp_kill_sock
After the commit c4e97b06cfdc ("net: rds: force to destroy
connection if t_sock is NULL in rds_tcp_kill_sock()."),
it introduced null-ptr-deref in rds_tcp_kill_sock as below:
BUG: KASAN: null-ptr-deref on address 0000000000000020
Read of size 8 by task kworker/u16:10/91... | 91573ae4aed0a49660abdad4d42f2a0db995ee5e | https://github.com/torvalds/linux/commit/91573ae4aed0a49660abdad4d42f2a0db995ee5e | net/rds/tcp.c | rds_tcp_accept_work | null | null | null | void rds_tcp_accept_work(struct sock *sk)
{
struct net *net = sock_net(sk);
struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid);
queue_work(rds_wq, &rtn->rds_tcp_accept_w);
} | void rds_tcp_accept_work(struct sock *VAR_0)
{
struct net *net = sock_net(VAR_0);
struct rds_tcp_net *VAR_1 = net_generic(net, VAR_2);
queue_work(VAR_3, &VAR_1->rds_tcp_accept_w);
} | torvalds/linux/91573ae4aed0a49660abdad4d42f2a0db995ee5e/tcp.c/non_vul/14.json | null | null | false |
CVE-2023-32269 | ['CWE-416'] | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 1 | torvalds/linux | netrom: Fix use-after-free caused by accept on already connected socket
If you call listen() and accept() on an already connect()ed
AF_NETROM socket, accept() can successfully connect.
This is because when the peer socket sends data to sendmsg,
the skb with its own sk stored in the connected socket's
sk->sk_receive_qu... | 611792920925fb088ddccbe2783c7f92fdfb6b64 | https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64 | net/netrom/af_netrom.c | nr_find_peer | null | null | null | static struct sock *nr_find_peer(unsigned char index, unsigned char id,
ax25_address *dest)
{
struct sock *s;
spin_lock_bh(&nr_list_lock);
sk_for_each(s, &nr_list) {
struct nr_sock *nr = nr_sk(s);
if (nr->your_index == index && nr->your_id == id &&
!ax25cmp(&nr->dest_addr, dest)) {
sock_hold(s);
g... | static struct sock *nr_find_peer(unsigned char VAR_0, unsigned char VAR_1,
ax25_address *VAR_2)
{
struct sock *VAR_3;
spin_lock_bh(&VAR_4);
sk_for_each(VAR_3, &VAR_5) {
struct nr_sock *VAR_6 = nr_sk(VAR_3);
if (VAR_6->your_index == VAR_0 && VAR_6->your_id == VAR_1 &&
!ax25cmp(&VAR_6->dest_addr, VAR_2)) ... | torvalds/linux/611792920925fb088ddccbe2783c7f92fdfb6b64/af_netrom.c/non_vul/17.json | null | null | false |
CVE-2010-4653 | ['CWE-190'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | poppler | mapLen = (code + 256) & ~255; can wrap and you end up with mapLen < code
that is not what you wanted
| cad66a7d25abdb6aa15f3aa94a35737b119b2659 | http://cgit.freedesktop.org/poppler/poppler/commit/?id=cad66a7d25abdb6aa15f3aa94a35737b119b2659 | poppler/CharCodeToUnicode.cc | CharCodeToUnicodeCache::CharCodeToUnicodeCache | null | null | null | CharCodeToUnicodeCache::CharCodeToUnicodeCache(int sizeA) {
int i;
size = sizeA;
cache = (CharCodeToUnicode **)gmallocn(size, sizeof(CharCodeToUnicode *));
for (i = 0; i < size; ++i) {
cache[i] = NULL;
}
} | CharCodeToUnicodeCache::CharCodeToUnicodeCache(int VAR_0) {
int VAR_1;
VAR_2 = VAR_0;
VAR_3 = (CharCodeToUnicode **)gmallocn(VAR_2, sizeof(CharCodeToUnicode *));
for (VAR_1 = 0; VAR_1 < VAR_2; ++VAR_1) {
VAR_3[VAR_1] = NULL;
}
} | poppler/cad66a7d25abdb6aa15f3aa94a35737b119b2659/CharCodeToUnicode.cc/non_vul/17.json | null | null | false |
CVE-2018-16062 | ['CWE-125'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | elfutils |
libdw, readelf: Make sure there is enough data to read full aranges header.
dwarf_getaranges didn't check if there was enough data left to read both
the address and segment size. readelf didn't check there was enough data
left to read the segment size.
https://sourceware.org/bugzilla/show_bug.cgi?id=23541
Signed-of... | 29e31978ba51c1051743a503ee325b5ebc03d7e9 | https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9 | src/readelf.c | dwarf_encoding_string | null | null | null | static const char *
dwarf_encoding_string (unsigned int code)
{
static const char *const known[] =
{
#define DWARF_ONE_KNOWN_DW_ATE(NAME, CODE) [CODE] = #NAME,
DWARF_ALL_KNOWN_DW_ATE
#undef DWARF_ONE_KNOWN_DW_ATE
};
if (likely (code < sizeof (known) / sizeof (known[0])))
return known[code];
re... | static const char *
dwarf_encoding_string (unsigned int VAR_0)
{
static const char *const VAR_1[] =
{
#define DWARF_ONE_KNOWN_DW_ATE(VAR_2, VAR_3) [VAR_3] = #NAME,
VAR_4
#undef VAR_5
};
if (likely (VAR_0 < sizeof (known) / sizeof (known[0])))
return known[VAR_0];
return NULL;
} | elfutils/29e31978ba51c1051743a503ee325b5ebc03d7e9/readelf.c/non_vul/20.json | null | null | false |
CVE-2020-16599 | ['CWE-476'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | binutils-gdb |
PR25842, Null pointer dereference in nm-new
PR 25842
* elf.c (_bfd_elf_get_symbol_version_string): Don't segfault on
NULL nodename.
| 8d55d10ac0d112c586eaceb92e75bd9b80aadcc4 | https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4 | bfd/elf.c | elfcore_write_ppc_tm_cgpr | null | null | null | char *
elfcore_write_ppc_tm_cgpr (bfd *abfd,
char *buf,
int *bufsiz,
const void *ppc_tm_cgpr,
int size)
{
char *note_name = "LINUX";
return elfcore_write_note (abfd, buf, bufsiz,
note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
} | char *
elfcore_write_ppc_tm_cgpr (bfd *VAR_0,
char *VAR_1,
int *VAR_2,
const void *VAR_3,
int VAR_4)
{
char *VAR_5 = "LINUX";
return elfcore_write_note (VAR_0, VAR_1, VAR_2,
VAR_5, VAR_6, VAR_3, VAR_4);
} | binutils-gdb/8d55d10ac0d112c586eaceb92e75bd9b80aadcc4/elf.c/non_vul/60.json | null | null | false |
CVE-2016-4344 | ['CWE-190'] | AV:N/AC:L/Au:N/C:P/I:P/A:P | 0 | php/php-src | Fix bug #71637: Multiple Heap Overflow due to integer overflows | 9cabc99fcef0f12b472e40811beab4eb2ef17e1b | https://github.com/php/php-src/commit/9cabc99fcef0f12b472e40811beab4eb2ef17e1b | ext/xml/xml.c | xml_utf8_decode | null | null | null | PHP_XML_API zend_string *xml_utf8_decode(const XML_Char *s, size_t len, const XML_Char *encoding)
{
size_t pos = 0;
unsigned int c;
char (*decoder)(unsigned short) = NULL;
xml_encoding *enc = xml_get_encoding(encoding);
zend_string *str;
if (enc) {
decoder = enc->decoding_function;
}
if (decoder == NULL) {
... | PHP_XML_API VAR_0 *xml_utf8_decode(const XML_Char *VAR_1, size_t VAR_2, const XML_Char *VAR_3)
{
size_t VAR_4 = 0;
unsigned int VAR_5;
char (*VAR_6)(unsigned short) = NULL;
xml_encoding *VAR_7 = xml_get_encoding(VAR_3);
zend_string *VAR_8;
if (VAR_7) {
VAR_6 = VAR_7->decoding_function;
}
if (VAR_6 == NULL) ... | null | null | null | false |
CVE-2019-17343 | ['CWE-667'] | AV:L/AC:L/Au:N/C:P/I:P/A:P | 0 | xen-project/xen | xen: Make coherent PV IOMMU discipline
In order for a PV domain to set up DMA from a passed-through device to
one of its pages, the page must be mapped in the IOMMU. On the other
hand, before a PV page may be used as a "special" page type (such as a
pagetable or descriptor table), it _must not_ be writable in the IOM... | fe21b78ef99a1b505cfb6d3789ede9591609dd70 | https://github.com/xen-project/xen/commit/fe21b78ef99a1b505cfb6d3789ede9591609dd70 | xen/arch/x86/mm/p2m.c | p2m_reset_altp2m | null | null | null | static void p2m_reset_altp2m(struct domain *d, unsigned int idx,
enum altp2m_reset_type reset_type)
{
struct p2m_domain *p2m;
ASSERT(idx < MAX_ALTP2M);
p2m = d->arch.altp2m_p2m[idx];
p2m_lock(p2m);
p2m_flush_table_locked(p2m);
if ( reset_type == ALTP2M_DEACTIVATE... | static void p2m_reset_altp2m(struct domain *VAR_0, unsigned int VAR_1,
enum altp2m_reset_type VAR_2)
{
struct p2m_domain *VAR_3;
ASSERT(VAR_1 < VAR_4);
VAR_3 = VAR_0->arch.altp2m_p2m[VAR_1];
p2m_lock(VAR_3);
p2m_flush_table_locked(VAR_3);
if ( VAR_2 == VAR_5 )
... | xen-project/xen/fe21b78ef99a1b505cfb6d3789ede9591609dd70/p2m.c/non_vul/30.json | null | null | false |
CVE-2018-5702 | ['CWE-Other'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | transmission | mitigate dns rebinding attacks against daemon | cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84 | https://github.com/transmission/transmission/commit/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84 | libtransmission/rpc-server.c | extract_parts_from_multipart | null | null | null | static void extract_parts_from_multipart(struct evkeyvalq const* headers, struct evbuffer* body, tr_ptrArray* setme_parts)
{
char const* content_type = evhttp_find_header(headers, "Content-Type");
char const* in = (char const*)evbuffer_pullup(body, -1);
size_t inlen = evbuffer_get_length(body);
char co... | static void extract_parts_from_multipart(struct evkeyvalq const* VAR_0, struct evbuffer* VAR_1, tr_ptrArray* VAR_2)
{
char const* VAR_3 = evhttp_find_header(VAR_0, "Content-Type");
char const* VAR_4 = (char const*)evbuffer_pullup(VAR_1, -1);
size_t VAR_5 = evbuffer_get_length(VAR_1);
char const* VAR_6 ... | transmission/cf7173df930cfa7ac1b1b0e9027c1deffd0b3c84/rpc-server.c/non_vul/38.json | null | null | false |
CVE-2020-27795 | ['CWE-908'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 1 | radareorg/radare2 | Fix segfault in adf (#16230) | 4d3811681a80f92a53e795f6a64c4b0fc2c8dd22 | https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22 | libr/core/cmd_anal.c | cmd_anal_info | null | null | null | static void cmd_anal_info(RCore *core, const char *input) {
switch (input[0]) {
case '?':
r_core_cmd_help (core, help_msg_ai);
break;
case ' ':
cmd_address_info (core, input, 0);
break;
case 'i': // "aii"
// global imports
if (input[1]) {
if (input[1] == ' ') {
if (!core->anal->imports) {
co... | static void cmd_anal_info(RCore *VAR_0, const char *VAR_1) {
switch (VAR_1[0]) {
case '?':
r_core_cmd_help (VAR_0, VAR_2);
break;
case ' ':
cmd_address_info (VAR_0, VAR_1, 0);
break;
case 'i': /* COMMENT_0 */
/* COMMENT_1 */
if (VAR_1[1]) {
if (VAR_1[1] == ' ') {
if (!VAR_0->anal->imports) {
... | radareorg/radare2/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22/cmd_anal.c/non_vul/40.json | null | null | false |
CVE-2022-2206 | ['CWE-125'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | vim | patch 8.2.5160: accessing invalid memory after changing terminal size
Problem: Accessing invalid memory after changing terminal size.
Solution: Adjust cmdline_row and msg_row to the value of Rows. | e178af5a586ea023622d460779fdcabbbfac0908 | https://github.com/vim/vim/commit/e178af5a586ea023622d460779fdcabbbfac0908 | src/term.c | term_replace_bs_del_keycode | null | null | null | void
term_replace_bs_del_keycode(char_u *ta_buf, int ta_len, int len)
{
int i;
int c;
for (i = ta_len; i < ta_len + len; ++i)
{
if (ta_buf[i] == CSI && len - i > 2)
{
c = TERMCAP2KEY(ta_buf[i + 1], ta_buf[i + 2]);
if (c == K_DEL || c == K_KDEL || c == K_BS)
{
mch_memmove(ta_buf + i... | void
term_replace_bs_del_keycode(char_u *VAR_0, int VAR_1, int VAR_2)
{
int VAR_3;
int VAR_4;
for (VAR_3 = VAR_1; VAR_3 < VAR_1 + VAR_2; ++VAR_3)
{
if (VAR_0[VAR_3] == VAR_5 && VAR_2 - VAR_3 > 2)
{
VAR_4 = TERMCAP2KEY(VAR_0[VAR_3 + 1], VAR_0[VAR_3 + 2]);
if (VAR_4 == VAR_6 || VAR_4 == VAR... | vim/e178af5a586ea023622d460779fdcabbbfac0908/term.c/non_vul/32.json | null | null | false |
CVE-2022-1043 | ['CWE-416'] | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H | 1 | torvalds/linux | io_uring: fix xa_alloc_cycle() error return value check
We currently check for ret != 0 to indicate error, but '1' is a valid
return and just indicates that the allocation succeeded with a wrap.
Correct the check to be for < 0, like it was before the xarray
conversion.
Cc: stable@vger.kernel.org
Fixes: 61cf93700fe6 (... | a30f895ad3239f45012e860d4f94c1a388b36d14 | https://github.com/torvalds/linux/commit/a30f895ad3239f45012e860d4f94c1a388b36d14 | fs/io_uring.c | io_uring_cancel_generic | null | null | null | static void io_uring_cancel_generic(bool cancel_all, struct io_sq_data *sqd)
{
struct io_uring_task *tctx = current->io_uring;
struct io_ring_ctx *ctx;
s64 inflight;
DEFINE_WAIT(wait);
WARN_ON_ONCE(sqd && sqd->thread != current);
if (!current->io_uring)
return;
if (tctx->io_wq)
io_wq_exit_start(tctx->io_wq... | static void io_uring_cancel_generic(bool VAR_0, struct io_sq_data *VAR_1)
{
struct io_uring_task *VAR_2 = VAR_3->io_uring;
struct io_ring_ctx *VAR_4;
s64 VAR_5;
DEFINE_WAIT(VAR_6);
WARN_ON_ONCE(VAR_1 && VAR_1->thread != VAR_3);
if (!VAR_3->io_uring)
return;
if (VAR_2->io_wq)
io_wq_exit_start(VAR_2->io_wq);... | torvalds/linux/a30f895ad3239f45012e860d4f94c1a388b36d14/io_uring.c/non_vul/22.json | null | null | false |
CVE-2021-4300 | ['CWE-284'] | AV:N/AC:L/Au:S/C:P/I:P/A:P | 0 | ghostlander/Halcyon | Block Verification Vulnerability Eliminated
Fixed a critical vulnerability allowing to accept a proof-of-work block
containing one or more coin stake transactions in addition to a valid
coin base. Output values of such coin stakes were out of control. | 0675b25ae9cc10b5fdc8ea3a32c642979762d45e | https://github.com/ghostlander/Halcyon/commit/0675b25ae9cc10b5fdc8ea3a32c642979762d45e | src/main.cpp | GetTransaction | null | null | null | bool GetTransaction(const uint256 &hash, CTransaction &tx, uint256 &hashBlock)
{
{
LOCK(cs_main);
{
LOCK(mempool.cs);
if (mempool.exists(hash))
{
tx = mempool.lookup(hash);
return true;
}
}
CTxDB txdb("r"... | bool GetTransaction(const uint256 &VAR_0, CTransaction &VAR_1, uint256 &VAR_2)
{
{
LOCK(VAR_3);
{
LOCK(VAR_4.cs);
if (VAR_4.exists(VAR_0))
{
VAR_1 = VAR_4.lookup(VAR_0);
return true;
}
}
CTxDB VAR_5("r");... | ghostlander/Halcyon/0675b25ae9cc10b5fdc8ea3a32c642979762d45e/main.cpp/non_vul/60.json | null | null | false |
CVE-2017-14169 | ['CWE-20'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | ffmpeg | avformat/mxfdec: Fix Sign error in mxf_read_primer_pack()
Fixes: 20170829B.mxf
Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com>
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad | https://github.com/FFmpeg/FFmpeg/commit/9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad | libavformat/mxfdec.c | mxf_read_packet | null | null | null | static int mxf_read_packet(AVFormatContext *s, AVPacket *pkt)
{
MXFContext *mxf = s->priv_data;
int ret, size;
int64_t ret64, pos, next_pos;
AVStream *st;
MXFIndexTable *t;
int edit_units;
if (mxf->op != OPAtom)
return mxf_read_packet_old(s, pkt);
// If we have no streams then ... | static int mxf_read_packet(AVFormatContext *VAR_0, AVPacket *VAR_1)
{
MXFContext *VAR_2 = VAR_0->priv_data;
int VAR_3, VAR_4;
int64_t VAR_5, VAR_6, VAR_7;
AVStream *VAR_8;
MXFIndexTable *VAR_9;
int VAR_10;
if (VAR_2->op != VAR_11)
return mxf_read_packet_old(VAR_0, VAR_1);
/* CO... | ffmpeg/9d00fb9d70ee8c0cc7002b89318c5be00f1bbdad/mxfdec.c/non_vul/39.json | null | null | false |
CVE-2016-1568 | ['CWE-416'] | AV:L/AC:M/Au:N/C:C/I:C/A:C | 0 | qemu | ide: ahci: reset ncq object to unused on error
When processing NCQ commands, AHCI device emulation prepares a
NCQ transfer object; To which an aio control block(aiocb) object
is assigned in 'execute_ncq_command'. In case, when the NCQ
command is invalid, the 'aiocb' object is not assigned, and NCQ
transfer object is l... | 4ab0359a8ae182a7ac5c99609667273167703fab | https://github.com/qemu/qemu/commit/4ab0359a8ae182a7ac5c99609667273167703fab | hw/ide/ahci.c | ahci_map_clb_address | null | null | null | static bool ahci_map_clb_address(AHCIDevice *ad)
{
AHCIPortRegs *pr = &ad->port_regs;
ad->cur_cmd = NULL;
map_page(ad->hba->as, &ad->lst,
((uint64_t)pr->lst_addr_hi << 32) | pr->lst_addr, 1024);
return ad->lst != NULL;
} | static bool ahci_map_clb_address(AHCIDevice *VAR_0)
{
AHCIPortRegs *VAR_1 = &VAR_0->port_regs;
VAR_0->cur_cmd = NULL;
map_page(VAR_0->hba->as, &VAR_0->lst,
((uint64_t)VAR_1->lst_addr_hi << 32) | VAR_1->lst_addr, 1024);
return VAR_0->lst != NULL;
} | qemu/4ab0359a8ae182a7ac5c99609667273167703fab/ahci.c/non_vul/5.json | null | null | false |
CVE-2014-0791 | ['CWE-189'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | FreeRDP | Fix possible integer overflow in license_read_scope_list() | e2745807c4c3e0a590c0f69a9b655dc74ebaa03e | https://github.com/FreeRDP/FreeRDP/commit/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e | libfreerdp/core/license.c | license_read_product_info | null | null | null | BOOL license_read_product_info(wStream* s, PRODUCT_INFO* productInfo)
{
if (Stream_GetRemainingLength(s) < 8)
return FALSE;
Stream_Read_UINT32(s, productInfo->dwVersion); /* dwVersion (4 bytes) */
Stream_Read_UINT32(s, productInfo->cbCompanyName); /* cbCompanyName (4 bytes) */
if (Stream_GetRemainingLength(s) ... | BOOL license_read_product_info(wStream* VAR_0, PRODUCT_INFO* VAR_1)
{
if (Stream_GetRemainingLength(VAR_0) < 8)
return FALSE;
Stream_Read_UINT32(VAR_0, VAR_1->dwVersion); /* COMMENT_0 */
Stream_Read_UINT32(VAR_0, VAR_1->cbCompanyName); /* COMMENT_1 */
if (Stream_GetRemainingLength(VAR_0) < VAR_1->cbCompanyName... | FreeRDP/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e/license.c/non_vul/14.json | null | null | false |
CVE-2016-9372 | ['CWE-20', 'CWE-399'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | wireshark | Profinet I/O: Sanity check number of I/O objects
Can prevent really long loops from fuzz testing.
Bug: 12851
Change-Id: I85e00af2c4753ce4c5bcb650a7df188d7f679c9a
Reviewed-on: https://code.wireshark.org/review/18136
Petri-Dish: Michael Mann <mmann78@netscape.net>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wires... | 4127e3930ef663114567002001f44e01eba8a250 | https://github.com/wireshark/wireshark/commit/4127e3930ef663114567002001f44e01eba8a250 | plugins/profinet/packet-pn-rtc-one.c | dissect_PNIO_IOCS | null | null | null | static int
dissect_PNIO_IOCS(tvbuff_t *tvb, int offset, packet_info *pinfo _U_, proto_tree *tree,
guint8 *drep _U_, int hfindex, guint16 slotNr, guint16 subSlotNr, const int **fields)
{
if (tree) {
guint8 u8IOxS;
proto_item *ioxs_item;
u8IOxS = tvb_get_guint8(tvb, offset);... | static int
dissect_PNIO_IOCS(tvbuff_t *VAR_0, int VAR_1, packet_info *VAR_2 _U_, proto_tree *VAR_3,
guint8 *VAR_4 _U_, int VAR_5, guint16 VAR_6, guint16 VAR_7, const int **VAR_8)
{
if (VAR_3) {
guint8 VAR_9;
proto_item *VAR_10;
VAR_9 = tvb_get_guint8(VAR_0, VAR_1);
... | null | null | null | false |
CVE-2012-2797 | ['CWE-Other'] | AV:N/AC:L/Au:N/C:C/I:C/A:C | 0 | ffmpeg |
mp3on4: allocate a large enough frame.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
| cca9528524c7a4b91451f4322bd50849af5d057e | http://git.videolan.org/?p=ffmpeg.git;a=commit;h=cca9528524c7a4b91451f4322bd50849af5d057e | libavcodec/mpegaudiodec.c | decode_init_mp3on4 | null | null | null | static int decode_init_mp3on4(AVCodecContext * avctx)
{
MP3On4DecodeContext *s = avctx->priv_data;
MPEG4AudioConfig cfg;
int i;
if ((avctx->extradata_size < 2) || (avctx->extradata == NULL)) {
av_log(avctx, AV_LOG_ERROR, "Codec extradata missing or too short.\n");
return AVERROR_INVALID... | static int decode_init_mp3on4(AVCodecContext * VAR_0)
{
MP3On4DecodeContext *VAR_1 = VAR_0->priv_data;
MPEG4AudioConfig VAR_2;
int VAR_3;
if ((VAR_0->extradata_size < 2) || (VAR_0->extradata == NULL)) {
av_log(VAR_0, VAR_4, "Codec extradata missing or too short.\n");
return VAR_5;
}... | ffmpeg/cca9528524c7a4b91451f4322bd50849af5d057e/mpegaudiodec.c/non_vul/4.json | null | null | false |
CVE-2023-24808 | ['CWE-835'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H | 1 | michaelrsweet/pdfio | Fix denial-of-service attack when reading corrupt PDF files. | 4f10021e7ee527c1aa24853e2947e38e154d9ccb | https://github.com/michaelrsweet/pdfio/commit/4f10021e7ee527c1aa24853e2947e38e154d9ccb | pdfio-file.c | pdfioFileSetCreator | null | null | null | void
pdfioFileSetCreator(pdfio_file_t *pdf, // I - PDF file
const char *value)// I - Value
{
if (pdf && pdf->info_obj)
pdfioDictSetString(pdf->info_obj->value.value.dict, "Creator", pdfioStringCreate(pdf, value));
} | void
pdfioFileSetCreator(pdfio_file_t *VAR_0, /* COMMENT_0 */
const char *VAR_1)/* COMMENT_1 */
{
if (VAR_0 && VAR_0->info_obj)
pdfioDictSetString(VAR_0->info_obj->value.value.dict, "Creator", pdfioStringCreate(VAR_0, VAR_1));
} | michaelrsweet/pdfio/4f10021e7ee527c1aa24853e2947e38e154d9ccb/pdfio-file.c/non_vul/20.json | null | null | false |
CVE-2021-46914 | ['CWE-Other'] | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | 1 | torvalds/linux | commit debb9df311582c83fe369baa35fa4b92e8a9c58a upstream.
pci_disable_device() called in __ixgbe_shutdown() decreases
dev->enable_cnt by 1. pci_enable_device_mem() which increases
dev->enable_cnt by 1, was removed from ixgbe_resume() in commit
6f82b2558735 ("ixgbe: use generic power management"). This caused
unbalance... | be07581aacae7cd0a073afae8e8862032f794309 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=be07581aacae7cd0a073afae8e8862032f794309 | drivers/net/ethernet/intel/ixgbe/ixgbe_main.c | ixgbe_fwd_del | null | null | null | static void ixgbe_fwd_del(struct net_device *pdev, void *priv)
{
struct ixgbe_fwd_adapter *accel = priv;
struct ixgbe_adapter *adapter = netdev_priv(pdev);
unsigned int rxbase = accel->rx_base_queue;
unsigned int i;
/* delete unicast filter associated with offloaded interface */
ixgbe_del_mac_filter(adapter, acc... | static void ixgbe_fwd_del(struct net_device *VAR_0, void *VAR_1)
{
struct ixgbe_fwd_adapter *VAR_2 = VAR_1;
struct ixgbe_adapter *VAR_3 = netdev_priv(VAR_0);
unsigned int VAR_4 = VAR_2->rx_base_queue;
unsigned int VAR_5;
/* COMMENT_0 */
ixgbe_del_mac_filter(VAR_3, VAR_2->netdev->dev_addr,
VMDQ_P(VAR_2->p... | torvalds/linux/be07581aacae7cd0a073afae8e8862032f794309/ixgbe_main.c/non_vul/59.json | null | null | false |
CVE-2015-8543 | ['CWE-Other'] | AV:L/AC:M/Au:N/C:C/I:C/A:C | 0 | torvalds/linux | net: add validation for the socket syscall protocol argument
郭永刚 reported that one could simply crash the kernel as root by
using a simple program:
int socket_fd;
struct sockaddr_in addr;
addr.sin_port = 0;
addr.sin_addr.s_addr = INADDR_ANY;
addr.sin_family = 10;
socket_fd = socket(10,3,0x40000000);
connect(s... | 79462ad02e861803b3840cc782248c7359451cd9 | https://github.com/torvalds/linux/commit/79462ad02e861803b3840cc782248c7359451cd9 | net/ax25/af_ax25.c | ax25_info_open | null | null | null | static int ax25_info_open(struct inode *inode, struct file *file)
{
return seq_open(file, &ax25_info_seqops);
} | static int ax25_info_open(struct inode *inode, struct file *file)
{
return seq_open(file, &VAR_0);
} | torvalds/linux/79462ad02e861803b3840cc782248c7359451cd9/af_ax25.c/non_vul/15.json | null | null | false |
CVE-2013-6623 | ['CWE-119'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | chromium | [SVG] Resources should be laid out in dependecy order.
We're currently laying out resources in tree order, while they are
(conceptually) forming a DAG - and this disconnect results in
complicated logic and an extra layout pass attempting to re-validate
nodes that might have been invalidated by the resource layout. Thi... | a4e53f62f8a1d500a1950d123600bd47214c06d8 | https://github.com/chromium/chromium/commit/a4e53f62f8a1d500a1950d123600bd47214c06d8 | third_party/WebKit/Source/core/svg/SVGElement.cpp | SVGElement::hasFocusEventListeners | null | null | null | bool SVGElement::hasFocusEventListeners() const
{
return hasEventListeners(eventNames().focusinEvent) || hasEventListeners(eventNames().focusoutEvent);
} | bool SVGElement::hasFocusEventListeners() const
{
return hasEventListeners(eventNames().focusinEvent) || hasEventListeners(eventNames().focusoutEvent);
} | chromium/a4e53f62f8a1d500a1950d123600bd47214c06d8/SVGElement.cpp/non_vul/29.json | null | null | false |
CVE-2021-46345 | ['CWE-617'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | jerryscript-project/jerryscript | Fix invalid assertion CESU8-UTF8 buffer copy
The UTF8 buffer size can be smaller then the CESU8 string's size so the UTF8 output is may truncated. Therefore we cannot ensure that the CESU8 buffer is read until the end.
This patch fixes #4920.
JerryScript-DCO-1.0-Signed-off-by: Robert Fancsik robert.fancsik@h-lab.eu | e54c980de52416e41296545e7f5b210a53b31d12 | https://github.com/jerryscript-project/jerryscript/commit/e54c980de52416e41296545e7f5b210a53b31d12 | jerry-core/lit/lit-strings.c | convert_code_point_to_low_surrogate | null | null | null | static ecma_char_t
convert_code_point_to_low_surrogate (lit_code_point_t code_point) /**< code point, should be > 0xFFFF */
{
JERRY_ASSERT (code_point > LIT_UTF16_CODE_UNIT_MAX);
ecma_char_t code_unit_bits;
code_unit_bits = (ecma_char_t) (code_point & LIT_UTF16_LAST_10_BITS_MASK);
return (ecma_char_t) (LIT_UT... | static ecma_char_t
convert_code_point_to_low_surrogate (lit_code_point_t VAR_0) /* COMMENT_0 */
{
JERRY_ASSERT (VAR_0 > VAR_1);
ecma_char_t VAR_2;
VAR_2 = (ecma_char_t) (VAR_0 & VAR_3);
return (ecma_char_t) (VAR_4 | VAR_2);
} | jerryscript-project/jerryscript/e54c980de52416e41296545e7f5b210a53b31d12/lit-strings.c/non_vul/9.json | null | null | false |
CVE-2022-3358 | ['CWE-476'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | 1 | openssl |
Fix usage of custom EVP_CIPHER objects
If a custom EVP_CIPHER object has been passed to EVP_CipherInit() then it
should be used in preference to a fetched cipher.
We also fix a possible NULL pointer deref in the same code for digests.
If the custom cipher passed to EVP_CipherInit() happens to use NID_undef
(which s... | 5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b | crypto/evp/digest.c | EVP_MD_CTX_gettable_params | null | null | null | const OSSL_PARAM *EVP_MD_CTX_gettable_params(EVP_MD_CTX *ctx)
{
EVP_PKEY_CTX *pctx;
void *provctx;
if (ctx == NULL)
return NULL;
/* If we have a pctx then we should try that first */
pctx = ctx->pctx;
if (pctx != NULL
&& (pctx->operation == EVP_PKEY_OP_VERIFYCTX
... | const OSSL_PARAM *EVP_MD_CTX_gettable_params(EVP_MD_CTX *VAR_0)
{
EVP_PKEY_CTX *VAR_1;
void *VAR_2;
if (VAR_0 == NULL)
return NULL;
/* COMMENT_0 */
VAR_1 = VAR_0->pctx;
if (VAR_1 != NULL
&& (VAR_1->operation == VAR_3
|| VAR_1->operation == VAR_4)
... | openssl/5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b/digest.c/non_vul/20.json | null | null | false |
CVE-2017-18202 | ['CWE-416'] | AV:L/AC:M/Au:N/C:C/I:C/A:C | 0 | torvalds/linux | mm, oom_reaper: gather each vma to prevent leaking TLB entry
tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory
space. In this case, tlb->fullmm is true. Some archs like arm64
doesn't flush TLB when tlb->fullmm is true:
commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")... | 687cb0884a714ff484d038e9190edc874edcf146 | https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146 | mm/oom_kill.c | wake_oom_reaper | null | null | null | static void wake_oom_reaper(struct task_struct *tsk)
{
/* tsk is already queued? */
if (tsk == oom_reaper_list || tsk->oom_reaper_list)
return;
get_task_struct(tsk);
spin_lock(&oom_reaper_lock);
tsk->oom_reaper_list = oom_reaper_list;
oom_reaper_list = tsk;
spin_unlock(&oom_reaper_lock);
trace_wake_reaper(t... | static void wake_oom_reaper(struct task_struct *VAR_0)
{
/* COMMENT_0 */
if (VAR_0 == VAR_1 || VAR_0->oom_reaper_list)
return;
get_task_struct(VAR_0);
spin_lock(&VAR_2);
VAR_0->oom_reaper_list = VAR_1;
VAR_1 = VAR_0;
spin_unlock(&VAR_2);
trace_wake_reaper(VAR_0->pid);
wake_up(&VAR_3);
} | torvalds/linux/687cb0884a714ff484d038e9190edc874edcf146/oom_kill.c/non_vul/5.json | null | null | false |
CVE-2013-3735 | ['CWE-20'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | php/php-src | fix bug #64660 - yyparse can return 2, not only 1 | fb58e69a84f4fde603a630d2c9df2fa3be16d846 | https://github.com/php/php-src/commit/fb58e69a84f4fde603a630d2c9df2fa3be16d846 | Zend/zend_language_scanner.c | encoding_filter_script_to_intermediate | null | null | null | static size_t encoding_filter_script_to_intermediate(unsigned char **to, size_t *to_length, const unsigned char *from, size_t from_length TSRMLS_DC)
{
return zend_multibyte_encoding_converter(to, to_length, from, from_length, zend_multibyte_encoding_utf8, LANG_SCNG(script_encoding) TSRMLS_CC);
} | static size_t encoding_filter_script_to_intermediate(unsigned char **VAR_0, size_t *VAR_1, const unsigned char *VAR_2, size_t VAR_3 TSRMLS_DC)
{
return zend_multibyte_encoding_converter(VAR_0, VAR_1, VAR_2, VAR_3, VAR_4, LANG_SCNG(VAR_5) VAR_6);
} | null | null | null | false |
CVE-2022-0319 | ['CWE-125'] | AV:N/AC:M/Au:N/C:P/I:N/A:N | 0 | vim | patch 8.2.4154: ml_get error when exchanging windows in Visual mode
Problem: ml_get error when exchanging windows in Visual mode.
Solution: Correct end of Visual area when entering another buffer. | 05b27615481e72e3b338bb12990fb3e0c2ecc2a9 | https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9 | src/window.c | frame_append | null | null | null | static void
frame_append(frame_T *after, frame_T *frp)
{
frp->fr_next = after->fr_next;
after->fr_next = frp;
if (frp->fr_next != NULL)
frp->fr_next->fr_prev = frp;
frp->fr_prev = after;
} | static void
frame_append(frame_T *VAR_0, frame_T *VAR_1)
{
VAR_1->fr_next = VAR_0->fr_next;
VAR_0->fr_next = VAR_1;
if (VAR_1->fr_next != NULL)
VAR_1->fr_next->fr_prev = VAR_1;
VAR_1->fr_prev = VAR_0;
} | vim/05b27615481e72e3b338bb12990fb3e0c2ecc2a9/window.c/non_vul/89.json | null | null | false |
CVE-2022-1920 | ['CWE-190', 'CWE-787'] | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 1 | gstreamer | blocksize + WAVPACK4_HEADER_SIZE might overflow gsize, which then
results in allocating a very small buffer. Into that buffer blocksize
data is memcpy'd later which then causes out of bound writes and can
potentially lead to anything from crashes to remote code execution.
Thanks to Adam Doupe for analyzing and reporti... | cf887f1b8e228bff6e19829e6d03995d70ad739d | https://cgit.freedesktop.org/gstreamer/gstreamer/commit/?id=cf887f1b8e228bff6e19829e6d03995d70ad739d | subprojects/gst-plugins-good/gst/matroska/matroska-demux.c | gst_matroska_demux_parse_tracks | null | null | null | static GstFlowReturn
gst_matroska_demux_parse_tracks (GstMatroskaDemux * demux, GstEbmlRead * ebml)
{
GstFlowReturn ret = GST_FLOW_OK;
guint32 id;
guint64 ebml_offset = ebml->offset;
DEBUG_ELEMENT_START (demux, ebml, "Tracks");
if ((ret = gst_ebml_read_master (ebml, &id)) != GST_FLOW_OK) {
DEBUG_ELEMENT... | static GstFlowReturn
gst_matroska_demux_parse_tracks (GstMatroskaDemux * VAR_0, GstEbmlRead * VAR_1)
{
GstFlowReturn VAR_2 = VAR_3;
guint32 VAR_4;
guint64 VAR_5 = VAR_1->offset;
DEBUG_ELEMENT_START (VAR_0, VAR_1, "Tracks");
if ((VAR_2 = gst_ebml_read_master (VAR_1, &VAR_4)) != VAR_3) {
DEBUG_ELEMENT_STO... | gstreamer/cf887f1b8e228bff6e19829e6d03995d70ad739d/matroska-demux.c/non_vul/32.json | null | null | false |
CVE-2022-2553 | ['CWE-287'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N | 1 | ClusterLabs/booth | Revert "Refactor: main: substitute is_auth_req macro"
This reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c.
authfile != authkey
Signed-off-by: Jan Friesse <jfriesse@redhat.com> | 35bf0b7b048d715f671eb68974fb6b4af6528c67 | https://github.com/ClusterLabs/booth/commit/35bf0b7b048d715f671eb68974fb6b4af6528c67 | src/main.c | set_procfs_val | null | null | null | static int set_procfs_val(const char *path, const char *val)
{
int rc = -1;
FILE *fp = fopen(path, "w");
if (fp) {
if (fprintf(fp, "%s", val) > 0)
rc = 0;
fclose(fp);
}
return rc;
} | static int set_procfs_val(const char *VAR_0, const char *VAR_1)
{
int VAR_2 = -1;
FILE *VAR_3 = fopen(VAR_0, "w");
if (VAR_3) {
if (fprintf(VAR_3, "%s", VAR_1) > 0)
VAR_2 = 0;
fclose(VAR_3);
}
return VAR_2;
} | ClusterLabs/booth/35bf0b7b048d715f671eb68974fb6b4af6528c67/main.c/non_vul/20.json | null | null | false |
CVE-2017-7185 | ['CWE-416'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | cesanta/mongoose-os | Fix crash in multipart handling
Close cesanta/dev#6974
PUBLISHED_FROM=4d4e4a46eceba10aec8dacb7f8f58bd078c92307 | 042eb437973a202d00589b13d628181c6de5cf5b | https://github.com/cesanta/mongoose-os/commit/042eb437973a202d00589b13d628181c6de5cf5b | mongoose/mongoose.c | mg_set_cipher_list | null | null | null | static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *ctx, const char *cl) {
return (SSL_CTX_set_cipher_list(ctx, cl ? cl : mg_s_cipher_list) == 1
? MG_SSL_OK
: MG_SSL_ERROR);
} | static enum mg_ssl_if_result mg_set_cipher_list(SSL_CTX *VAR_0, const char *VAR_1) {
return (SSL_CTX_set_cipher_list(VAR_0, VAR_1 ? VAR_1 : VAR_2) == 1
? VAR_3
: VAR_4);
} | cesanta/mongoose-os/042eb437973a202d00589b13d628181c6de5cf5b/mongoose.c/non_vul/442.json | null | null | false |
CVE-2023-49298 | ['CWE-639'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N | 1 | openzfs/zfs | dnode_is_dirty: check dnode and its data for dirtiness
Over its history this the dirty dnode test has been changed between
checking for a dnodes being on `os_dirty_dnodes` (`dn_dirty_link`) and
`dn_dirty_record`.
de198f2d9 Fix lseek(SEEK_DATA/SEEK_HOLE) mmap consistency
2531ce372 Revert "Report holes when there a... | c7fadf230f26be750feddaebda95e5cc66896107 | https://github.com/openzfs/zfs/commit/c7fadf230f26be750feddaebda95e5cc66896107 | module/zfs/dnode.c | dnode_partial_zero | null | null | null | static void
dnode_partial_zero(dnode_t *dn, uint64_t off, uint64_t blkoff, uint64_t len,
dmu_tx_t *tx)
{
dmu_buf_impl_t *db;
int res;
rw_enter(&dn->dn_struct_rwlock, RW_READER);
res = dbuf_hold_impl(dn, 0, dbuf_whichblock(dn, 0, off), TRUE, FALSE,
FTAG, &db);
rw_exit(&dn->dn_struct_rwlock);
if (res == 0... | static void
dnode_partial_zero(dnode_t *VAR_0, uint64_t VAR_1, uint64_t VAR_2, uint64_t VAR_3,
dmu_tx_t *VAR_4)
{
dmu_buf_impl_t *VAR_5;
int VAR_6;
rw_enter(&VAR_0->dn_struct_rwlock, VAR_7);
VAR_6 = dbuf_hold_impl(VAR_0, 0, dbuf_whichblock(VAR_0, 0, VAR_1), TRUE, FALSE,
VAR_8, &VAR_5);
rw_exit(&VAR_0->dn... | openzfs/zfs/c7fadf230f26be750feddaebda95e5cc66896107/dnode.c/non_vul/34.json | null | null | false |
CVE-2016-10070 | ['CWE-125'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | ImageMagick | https://github.com/ImageMagick/ImageMagick/issues/131 | a6240a163cb787909703d9fc649cf861f60ddd7c | https://github.com/ImageMagick/ImageMagick/commit/a6240a163cb787909703d9fc649cf861f60ddd7c | coders/mat.c | DecompressBlock | null | null | null | static Image *DecompressBlock(Image *orig, MagickOffsetType Size, ImageInfo *clone_info, ExceptionInfo *exception)
{
Image *image2;
void *CacheBlock, *DecompressBlock;
z_stream zip_info;
FILE *mat_file;
size_t magick_size;
size_t extent;
int file;
int status;
if(clone_info==NULL) return NULL;
if(clone_info->file... | static Image *DecompressBlock(Image *VAR_0, MagickOffsetType VAR_1, ImageInfo *VAR_2, ExceptionInfo *VAR_3)
{
Image *VAR_4;
void *VAR_5, *VAR_6;
z_stream VAR_7;
FILE *VAR_8;
size_t VAR_9;
size_t VAR_10;
int VAR_11;
int VAR_12;
if(VAR_2==NULL) return NULL;
if(VAR_2->file) /* COMMENT_0 */
{
fclose(VAR_2->... | ImageMagick/a6240a163cb787909703d9fc649cf861f60ddd7c/mat.c/non_vul/1.json | null | null | false |
CVE-2016-10165 | ['CWE-125'] | AV:N/AC:M/Au:N/C:P/I:N/A:P | 0 | mm2/Little-CMS | Added an extra check to MLU bounds
Thanks to Ibrahim el-sayed for spotting the bug | 5ca71a7bc18b6897ab21d815d15e218e204581e2 | https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2 | src/cmstypes.c | Type_DateTime_Write | null | null | null | static
cmsBool Type_DateTime_Write(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, void* Ptr, cmsUInt32Number nItems)
{
struct tm * DateTime = (struct tm*) Ptr;
cmsDateTimeNumber timestamp;
_cmsEncodeDateTimeNumber(×tamp, DateTime);
if (!io ->Write(io, sizeof(cmsDateTimeNumber), ×tam... | static
cmsBool Type_DateTime_Write(struct _cms_typehandler_struct* VAR_0, cmsIOHANDLER* VAR_1, void* VAR_2, cmsUInt32Number VAR_3)
{
struct tm * VAR_4 = (struct tm*) VAR_2;
cmsDateTimeNumber VAR_5;
_cmsEncodeDateTimeNumber(&VAR_5, VAR_4);
if (!VAR_1 ->Write(VAR_1, sizeof(cmsDateTimeNumber), &VAR_5)) r... | mm2/Little-CMS/5ca71a7bc18b6897ab21d815d15e218e204581e2/cmstypes.c/non_vul/7.json | null | null | false |
CVE-2020-35518 | ['CWE-203'] | AV:N/AC:L/Au:N/C:P/I:N/A:N | 0 | 389ds/389-ds-base | Issue 4480 - Unexpected info returned to ldap request (#4491)
Bug description:
If the bind entry does not exist, the bind result info
reports that 'No such entry'. It should not give any
information if the target entry exists or not
Fix description:
Does not return any additional information d... | cc0f69283abc082488824702dae485b8eae938bc | https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc | ldap/servers/slapd/result.c | log_referral | null | null | null | static void
log_referral(Operation *op)
{
int internal_op;
internal_op = operation_is_flag_set(op, OP_FLAG_INTERNAL);
if (!internal_op) {
slapi_log_access(LDAP_DEBUG_STATS2, "conn=%" PRIu64 " op=%d REFERRAL\n",
op->o_connid, op->o_opid);
} else {
if (config_get... | static void
log_referral(Operation *VAR_0)
{
int VAR_1;
VAR_1 = operation_is_flag_set(VAR_0, VAR_2);
if (!VAR_1) {
slapi_log_access(VAR_3, "conn=%" VAR_4 " op=%d REFERRAL\n",
VAR_0->o_connid, VAR_0->o_opid);
} else {
if (config_get_accesslog_level() & VAR_3) {
... | 389ds/389-ds-base/cc0f69283abc082488824702dae485b8eae938bc/result.c/non_vul/12.json | null | null | false |
CVE-2015-3288 | ['CWE-20'] | AV:L/AC:L/Au:N/C:C/I:C/A:C | 0 | torvalds/linux | mm: avoid setting up anonymous pages into file mapping
Reading page fault handler code I've noticed that under right
circumstances kernel would map anonymous pages into file mappings: if
the VMA doesn't have vm_ops->fault() and the VMA wasn't fully populated
on ->mmap(), kernel would handle page fault to not populated... | 6b7339f4c31ad69c8e9c0b2859276e22cf72176d | https://github.com/torvalds/linux/commit/6b7339f4c31ad69c8e9c0b2859276e22cf72176d | mm/memory.c | print_bad_pte | null | null | null | static void print_bad_pte(struct vm_area_struct *vma, unsigned long addr,
pte_t pte, struct page *page)
{
pgd_t *pgd = pgd_offset(vma->vm_mm, addr);
pud_t *pud = pud_offset(pgd, addr);
pmd_t *pmd = pmd_offset(pud, addr);
struct address_space *mapping;
pgoff_t index;
static unsigned long resume;
static unsig... | static void print_bad_pte(struct vm_area_struct *VAR_0, unsigned long VAR_1,
pte_t VAR_2, struct page *page)
{
pgd_t *VAR_3 = pgd_offset(VAR_0->vm_mm, VAR_1);
pud_t *VAR_4 = pud_offset(VAR_3, VAR_1);
pmd_t *VAR_5 = pmd_offset(VAR_4, VAR_1);
struct address_space *VAR_6;
pgoff_t VAR_7;
static unsigned long VAR... | torvalds/linux/6b7339f4c31ad69c8e9c0b2859276e22cf72176d/memory.c/non_vul/40.json | null | null | false |
CVE-2018-11591 | ['CWE-476'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | espruino/Espruino | Add sanity check for debug trace print statement (fix #1420) | b6d362f6a1f2de0b3e7604848116efb509196bf4 | https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4 | src/jsvar.c | jsvIsNameIntBool | null | null | null | bool jsvIsNameIntBool(const JsVar *v) { return v && (v->flags&JSV_VARTYPEMASK)==JSV_NAME_INT_BOOL; } | bool jsvIsNameIntBool(const JsVar *VAR_0) { return VAR_0 && (VAR_0->flags&VAR_1)==VAR_2; } | espruino/Espruino/b6d362f6a1f2de0b3e7604848116efb509196bf4/jsvar.c/non_vul/135.json | null | null | false |
CVE-2022-34967 | ['CWE-617'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 1 | MonetDB | handle single rows in rel_order_by_column_exp.
make sys.star (virtual function) return single row column, for row results.
Solves broken query in issue #7306 | d189f931497f2f700e05952b677f549266565862 | https://github.com/MonetDB/MonetDB/commit/d189f931497f2f700e05952b677f549266565862 | sql/backends/monet5/rel_bin.c | rel2bin_truncate | null | null | null | static stmt *
rel2bin_truncate(backend *be, sql_rel *rel)
{
mvc *sql = be->mvc;
stmt *truncate = NULL;
sql_rel *tr = rel->l;
sql_table *t = NULL;
node *n = NULL;
int restart_sequences, cascade;
if (tr->op == op_basetable)
t = tr->l;
else
assert(0/*ddl statement*/);
n = rel->exps->h;
restart_sequences = ... | static stmt *
rel2bin_truncate(backend *VAR_0, sql_rel *VAR_1)
{
mvc *VAR_2 = VAR_0->mvc;
stmt *VAR_3 = NULL;
sql_rel *VAR_4 = VAR_1->l;
sql_table *VAR_5 = NULL;
node *VAR_6 = NULL;
int VAR_7, VAR_8;
if (VAR_4->op == VAR_9)
VAR_5 = VAR_4->l;
else
assert(0/* COMMENT_0 */);
VAR_6 = VAR_1->exps->h;
VAR_7 =... | MonetDB/d189f931497f2f700e05952b677f549266565862/rel_bin.c/non_vul/75.json | null | null | false |
CVE-2020-28346 | ['CWE-476'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | projectacrn/acrn-hypervisor | dm: virtio: check for paddr_guest2host return value
paddr_guest2host can return NULL, but code paths in virtio
are not checking the return value.
_vq_record() initializes iov_base pointer using paddr_guest2host()
but there is nothing in the flow that checks for NULL.
Chane _vq_record to return -1 in case the address t... | ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681 | https://github.com/projectacrn/acrn-hypervisor/commit/ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681 | devicemodel/hw/pci/virtio/virtio.c | virtio_start_timer | null | null | null | static void
virtio_start_timer(struct acrn_timer *timer, time_t sec, time_t nsec)
{
struct itimerspec ts;
/* setting the interval time */
ts.it_interval.tv_sec = 0;
ts.it_interval.tv_nsec = 0;
/* set the delay time it will be started when timer_setting */
ts.it_value.tv_sec = sec;
ts.it_value.tv_nsec = nsec;
i... | static void
virtio_start_timer(struct acrn_timer *VAR_0, time_t VAR_1, time_t VAR_2)
{
struct itimerspec VAR_3;
/* COMMENT_0 */
VAR_3.it_interval.tv_sec = 0;
VAR_3.it_interval.tv_nsec = 0;
/* COMMENT_1 */
VAR_3.it_value.tv_sec = VAR_1;
VAR_3.it_value.tv_nsec = VAR_2;
if (acrn_timer_settime(VAR_0, &VAR_3) != 0)... | projectacrn/acrn-hypervisor/ae0ab82434509d6e75f4a2f1e1a0dd2ee3dc3681/virtio.c/non_vul/10.json | null | null | false |
CVE-2021-41141 | ['CWE-667'] | AV:N/AC:L/Au:N/C:N/I:N/A:C | 0 | pjsip/pjproject | Merge pull request from GHSA-8fmx-hqw7-6gmc | 1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196 | https://github.com/pjsip/pjproject/commit/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196 | pjmedia/src/pjmedia-codec/speex_codec.c | speex_get_next_frame | null | null | null | static int speex_get_next_frame(SpeexBits *bits)
{
static const int inband_skip_table[NB_SUBMODES] =
{1, 1, 4, 4, 4, 4, 4, 4, 8, 8, 16, 16, 32, 32, 64, 64 };
static const int wb_skip_table[SB_SUBMODES] =
{SB_SUBMODE_BITS+1, 36, 112, 192, 352, -1, -1, -1};
unsigned submode;
unsigned nb_cou... | static int speex_get_next_frame(SpeexBits *VAR_0)
{
static const int VAR_1[VAR_2] =
{1, 1, 4, 4, 4, 4, 4, 4, 8, 8, 16, 16, 32, 32, 64, 64 };
static const int VAR_3[VAR_4] =
{VAR_5+1, 36, 112, 192, 352, -1, -1, -1};
unsigned VAR_6;
unsigned VAR_7 = 0;
while (speex_bits_remaining(VAR_0... | pjsip/pjproject/1aa2c0e0fb60a1b0bf793e0d834073ffe50fb196/speex_codec.c/non_vul/6.json | null | null | false |
CVE-2014-9670 | ['CWE-189'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | freetype/freetype2 | * src/pcf/pcfread (pcf_get_encodings): Add sanity checks for row and
column values.
| ef1eba75187adfac750f326b563fe543dd5ff4e6 | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6 | src/pcf/pcfread.c | pcf_get_metrics | null | null | null | static FT_Error
pcf_get_metrics( FT_Stream stream,
PCF_Face face )
{
FT_Error error;
FT_Memory memory = FT_FACE( face )->memory;
FT_ULong format, size;
PCF_Metric metrics = 0;
FT_ULong nmetrics, i;
error = pcf_seek_to_table_type( stream,
... | static FT_Error
pcf_get_metrics( FT_Stream VAR_0,
PCF_Face VAR_1 )
{
FT_Error VAR_2;
FT_Memory VAR_3 = FT_FACE( VAR_1 )->memory;
FT_ULong VAR_4, VAR_5;
PCF_Metric VAR_6 = 0;
FT_ULong VAR_7, VAR_8;
VAR_2 = pcf_seek_to_table_type( VAR_0,
... | freetype/freetype2/ef1eba75187adfac750f326b563fe543dd5ff4e6/pcfread.c/non_vul/4.json | null | null | false |
CVE-2020-1915 | ['CWE-125'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | facebook/hermes | Handle set where internalSetter and Proxy are both true
Summary:
If putComputed is called on a proxy whose target's prototype
is an array with a propname of 'length', then internalSetter will be
true, and the receiver will be a proxy. In that case, proxy needs to
win; the behavior may assert or be UB otherwise.
Revi... | 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 | https://github.com/facebook/hermes/commit/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 | lib/VM/JSObject.cpp | JSObject::getPrototypeOf | null | null | null | CallResult<PseudoHandle<JSObject>> JSObject::getPrototypeOf(
PseudoHandle<JSObject> selfHandle,
Runtime *runtime) {
if (LLVM_LIKELY(!selfHandle->isProxyObject())) {
return createPseudoHandle(selfHandle->getParent(runtime));
}
return JSProxy::getPrototypeOf(
runtime->makeHandle(std::move(selfHan... | CallResult<PseudoHandle<JSObject>> JSObject::getPrototypeOf(
PseudoHandle<JSObject> VAR_0,
Runtime *VAR_1) {
if (LLVM_LIKELY(!VAR_0->isProxyObject())) {
return createPseudoHandle(VAR_0->getParent(VAR_1));
}
return JSProxy::getPrototypeOf(
VAR_1->makeHandle(std::move(VAR_0)), VAR_1);
} | facebook/hermes/8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0/JSObject.cpp/non_vul/24.json | null | null | false |
CVE-2023-48105 | ['CWE-787'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 1 | bytecodealliance/wasm-micro-runtime | Add more buf boundary checks in wasm loader | 4785d91b16dd49c09a96835de2d9c7b077543fa4 | https://github.com/bytecodealliance/wasm-micro-runtime/commit/4785d91b16dd49c09a96835de2d9c7b077543fa4 | core/iwasm/interpreter/wasm_loader.c | wasm_loader_get_const_offset | null | null | null | static bool
wasm_loader_get_const_offset(WASMLoaderContext *ctx, uint8 type, void *value,
int16 *offset, char *error_buf,
uint32 error_buf_size)
{
int8 bytes_to_increase;
int16 operand_offset = 0;
Const *c;
/* Search existing constant */
for... | static bool
wasm_loader_get_const_offset(WASMLoaderContext *VAR_0, uint8 VAR_1, void *VAR_2,
int16 *VAR_3, char *VAR_4,
uint32 VAR_5)
{
int8 VAR_6;
int16 VAR_7 = 0;
Const *VAR_8;
/* COMMENT_0 */
for (VAR_8 = (Const *)VAR_0->const_buf;
... | bytecodealliance/wasm-micro-runtime/4785d91b16dd49c09a96835de2d9c7b077543fa4/wasm_loader.c/non_vul/36.json | null | null | false |
CVE-2017-11171 | ['CWE-835'] | AV:L/AC:L/Au:N/C:N/I:N/A:C | 0 | GNOME/gnome-session | [gsm] Delay the creation of the GsmXSMPClient until it really exists
We used to create the GsmXSMPClient before the XSMP connection is really
accepted. This can lead to some issues, though. An example is:
https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting:
"What is happening is that a new client (probabl... | b0dc999e0b45355314616321dbb6cb71e729fc9d | https://github.com/GNOME/gnome-session/commit/b0dc999e0b45355314616321dbb6cb71e729fc9d | gnome-session/gsm-xsmp-server.c | gsm_xsmp_server_set_client_store | null | null | null | static void
gsm_xsmp_server_set_client_store (GsmXsmpServer *xsmp_server,
GsmStore *store)
{
g_return_if_fail (GSM_IS_XSMP_SERVER (xsmp_server));
if (store != NULL) {
g_object_ref (store);
}
if (xsmp_server->priv->client_store != N... | static void
gsm_xsmp_server_set_client_store (GsmXsmpServer *VAR_0,
GsmStore *VAR_1)
{
g_return_if_fail (GSM_IS_XSMP_SERVER (VAR_0));
if (VAR_1 != NULL) {
g_object_ref (VAR_1);
}
if (VAR_0->priv->client_store != NULL) {
... | GNOME/gnome-session/b0dc999e0b45355314616321dbb6cb71e729fc9d/gsm-xsmp-server.c/non_vul/1.json | null | null | false |
CVE-2022-1629 | ['CWE-126'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | vim | patch 8.2.4925: trailing backslash may cause reading past end of line
Problem: Trailing backslash may cause reading past end of line.
Solution: Check for NUL after backslash. | 53a70289c2712808e6d4e88927e03cac01b470dd | https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd | src/textobject.c | find_first_blank | null | null | null | static void
find_first_blank(pos_T *posp)
{
int c;
while (decl(posp) != -1)
{
c = gchar_pos(posp);
if (!VIM_ISWHITE(c))
{
incl(posp);
break;
}
}
} | static void
find_first_blank(pos_T *VAR_0)
{
int VAR_1;
while (decl(VAR_0) != -1)
{
VAR_1 = gchar_pos(VAR_0);
if (!VIM_ISWHITE(VAR_1))
{
incl(VAR_0);
break;
}
}
} | vim/53a70289c2712808e6d4e88927e03cac01b470dd/textobject.c/non_vul/12.json | null | null | false |
CVE-2024-0210 | ['CWE-674'] | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 1 | wireshark | ZigBee TLV: Add a recursion check
Blind attempt at fixing #19504.
| 98a8a9787bd9a6b15684f32f4cb760f0072f1b87 | https://gitlab.com/wireshark/wireshark/-/commit/98a8a9787bd9a6b15684f32f4cb760f0072f1b87 | epan/dissectors/packet-zbee-tlv.c | dissect_zbee_tlv_target_ieee_address | null | null | null | static guint
dissect_zbee_tlv_target_ieee_address(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree, guint offset)
{
proto_tree_add_item(tree, hf_zbee_tlv_local_ieee_addr, tvb, offset, 8, ENC_LITTLE_ENDIAN);
offset += 8;
return offset;
} | static guint
dissect_zbee_tlv_target_ieee_address(tvbuff_t *VAR_0, packet_info *VAR_1 _U_, proto_tree *VAR_2, guint VAR_3)
{
proto_tree_add_item(VAR_2, VAR_4, VAR_0, VAR_3, 8, VAR_5);
VAR_3 += 8;
return VAR_3;
} | null | null | null | false |
CVE-2021-43057 | ['CWE-416'] | AV:L/AC:L/Au:N/C:C/I:C/A:C | 0 | torvalds/linux | Jann Horn reported a problem with commit eb1231f73c4d ("selinux:
clarify task subjective and objective credentials") where some LSM
hooks were attempting to access the subjective credentials of a task
other than the current task. Generally speaking, it is not safe to
access another task's subjective credentials and do... | a3727a8bac0a9e77c70820655fd8715523ba3db7 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=a3727a8bac0a9e77c70820655fd8715523ba3db7 | security/selinux/hooks.c | selinux_nf_ip_exit | null | null | null | static void selinux_nf_ip_exit(void)
{
pr_debug("SELinux: Unregistering netfilter hooks\n");
unregister_pernet_subsys(&selinux_net_ops);
} | static void selinux_nf_ip_exit(void)
{
pr_debug("SELinux: Unregistering netfilter hooks\n");
unregister_pernet_subsys(&VAR_0);
} | torvalds/linux/a3727a8bac0a9e77c70820655fd8715523ba3db7/hooks.c/non_vul/133.json | null | null | false |
CVE-2022-2959 | ['CWE-362', 'CWE-667'] | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | 1 | torvalds/linux | pipe: Fix missing lock in pipe_resize_ring()
pipe_resize_ring() needs to take the pipe->rd_wait.lock spinlock to
prevent post_one_notification() from trying to insert into the ring
whilst the ring is being replaced.
The occupancy check must be done after the lock is taken, and the lock
must be taken after the new rin... | 189b0ddc245139af81198d1a3637cac74f96e13a | https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a | fs/pipe.c | pipe_ioctl | null | null | null | static long pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
{
struct pipe_inode_info *pipe = filp->private_data;
unsigned int count, head, tail, mask;
switch (cmd) {
case FIONREAD:
__pipe_lock(pipe);
count = 0;
head = pipe->head;
tail = pipe->tail;
mask = pipe->ring_size - 1;
while ... | static long pipe_ioctl(struct file *VAR_0, unsigned int VAR_1, unsigned long VAR_2)
{
struct pipe_inode_info *VAR_3 = VAR_0->private_data;
unsigned int VAR_4, VAR_5, VAR_6, VAR_7;
switch (VAR_1) {
case VAR_8:
__pipe_lock(VAR_3);
VAR_4 = 0;
VAR_5 = VAR_3->head;
VAR_6 = VAR_3->tail;
VAR_7 = VAR_3->ring_siz... | torvalds/linux/189b0ddc245139af81198d1a3637cac74f96e13a/pipe.c/non_vul/0.json | null | null | false |
CVE-2018-20760 | ['CWE-787'] | AV:N/AC:M/Au:N/C:P/I:P/A:P | 0 | gpac | check error code on call to gf_utf8_wcstombs (#1177) | 4c1360818fc8948e9307059fba4dc47ba8ad255d | https://github.com/gpac/gpac/commit/4c1360818fc8948e9307059fba4dc47ba8ad255d | src/media_tools/text_import.c | ttxt_parse_text_box | null | null | null | void ttxt_parse_text_box(GF_MediaImporter *import, GF_XMLNode *n, GF_BoxRecord *box)
{
u32 i=0;
GF_XMLAttribute *att;
memset(box, 0, sizeof(GF_BoxRecord));
while ( (att=(GF_XMLAttribute *)gf_list_enum(n->attributes, &i))) {
if (!stricmp(att->name, "top")) box->top = atoi(att->value);
else if (!stricmp(att->name... | void ttxt_parse_text_box(GF_MediaImporter *VAR_0, GF_XMLNode *VAR_1, GF_BoxRecord *VAR_2)
{
u32 VAR_3=0;
GF_XMLAttribute *VAR_4;
memset(VAR_2, 0, sizeof(GF_BoxRecord));
while ( (VAR_4=(GF_XMLAttribute *)gf_list_enum(VAR_1->attributes, &VAR_3))) {
if (!stricmp(VAR_4->name, "top")) VAR_2->top = atoi(VAR_4->value);
... | gpac/4c1360818fc8948e9307059fba4dc47ba8ad255d/text_import.c/non_vul/1.json | null | null | false |
CVE-2017-7533 | ['CWE-362'] | AV:L/AC:M/Au:N/C:C/I:C/A:C | 0 | torvalds/linux | dentry name snapshots
take_dentry_name_snapshot() takes a safe snapshot of dentry name;
if the name is a short one, it gets copied into caller-supplied
structure, otherwise an extra reference to external name is grabbed
(those are never modified). In either case the pointer to stable
string is stored into the same st... | 49d31c2f389acfe83417083e1208422b4091cd9e | https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e | fs/namei.c | path_to_nameidata | null | null | null | static inline void path_to_nameidata(const struct path *path,
struct nameidata *nd)
{
if (!(nd->flags & LOOKUP_RCU)) {
dput(nd->path.dentry);
if (nd->path.mnt != path->mnt)
mntput(nd->path.mnt);
}
nd->path.mnt = path->mnt;
nd->path.dentry = path->dentry;
} | static inline void path_to_nameidata(const struct path *path,
struct nameidata *VAR_0)
{
if (!(VAR_0->flags & VAR_1)) {
dput(VAR_0->path.dentry);
if (VAR_0->path.mnt != path->mnt)
mntput(VAR_0->path.mnt);
}
VAR_0->path.mnt = path->mnt;
VAR_0->path.dentry = path->dentry;
} | torvalds/linux/49d31c2f389acfe83417083e1208422b4091cd9e/namei.c/non_vul/102.json | null | null | false |
CVE-2017-7501 | ['CWE-59'] | AV:L/AC:L/Au:N/C:P/I:P/A:P | 0 | rpm-software-management/rpm | Don't follow symlinks on file creation (CVE-2017-7501)
Open newly created files with O_EXCL to prevent symlink tricks.
When reopening hardlinks for writing the actual content, use append
mode instead. This is compatible with the write-only permissions but
is not destructive in case we got redirected to somebody elses ... | 404ef011c300207cdb1e531670384564aae04bdc | https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc | lib/fsm.c | fsmReadLink | null | null | null | static int fsmReadLink(const char *path,
char *buf, size_t bufsize, size_t *linklen)
{
ssize_t llen = readlink(path, buf, bufsize - 1);
int rc = RPMERR_READLINK_FAILED;
if (_fsm_debug) {
rpmlog(RPMLOG_DEBUG, " %8s (%s, buf, %d) %s\n",
__func__,
path, (int)(bufsize -1... | static int fsmReadLink(const char *VAR_0,
char *VAR_1, size_t VAR_2, size_t *VAR_3)
{
ssize_t VAR_4 = readlink(VAR_0, VAR_1, VAR_2 - 1);
int VAR_5 = VAR_6;
if (VAR_7) {
rpmlog(VAR_8, " %8s (%s, buf, %d) %s\n",
VAR_9,
VAR_0, (int)(VAR_2 -1), (VAR_4 < 0 ? strerror(VAR_... | rpm-software-management/rpm/404ef011c300207cdb1e531670384564aae04bdc/fsm.c/non_vul/19.json | null | null | false |
CVE-2023-3161 | ['CWE-682'] | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | 1 | torvalds/linux | fbcon: Check font dimension limits
blit_x and blit_y are u32, so fbcon currently cannot support fonts
larger than 32x32.
The 32x32 case also needs shifting an unsigned int, to properly set bit
31, otherwise we get "UBSAN: shift-out-of-bounds in fbcon_set_font",
as reported on:
http://lore.kernel.org/all/IA1PR07MB983... | 2b09d5d364986f724f17001ccfe4126b9b43a0be | https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be | drivers/video/fbdev/core/fbcon.c | fbcon_do_set_font | null | null | null | static int fbcon_do_set_font(struct vc_data *vc, int w, int h, int charcount,
const u8 * data, int userfont)
{
struct fb_info *info = fbcon_info_from_console(vc->vc_num);
struct fbcon_ops *ops = info->fbcon_par;
struct fbcon_display *p = &fb_display[vc->vc_num];
int resize, ret, old_userfont, old_width, old... | static int fbcon_do_set_font(struct vc_data *VAR_0, int VAR_1, int VAR_2, int VAR_3,
const u8 * VAR_4, int VAR_5)
{
struct fb_info *VAR_6 = fbcon_info_from_console(VAR_0->vc_num);
struct fbcon_ops *VAR_7 = VAR_6->fbcon_par;
struct fbcon_display *VAR_8 = &VAR_9[VAR_0->vc_num];
int VAR_10, VAR_11, VAR_12, VAR... | torvalds/linux/2b09d5d364986f724f17001ccfe4126b9b43a0be/fbcon.c/non_vul/1.json | null | null | false |
CVE-2011-2723 | ['CWE-20'] | AV:A/AC:M/Au:N/C:N/I:N/A:C | 0 | torvalds/linux | Currently skb_gro_header_slow unconditionally resets frag0 and
frag0_len. However, when we can't pull on the skb this leaves
the GRO fields in an inconsistent state.
This patch fixes this by only resetting those fields after the
pskb_may_pull test.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-b... | 17dd759c67f21e34f2156abcf415e1f60605a188 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commit;h=17dd759c67f21e34f2156abcf415e1f60605a188 | include/linux/netdevice.h | netif_subqueue_stopped | null | null | null | static inline int netif_subqueue_stopped(const struct net_device *dev,
struct sk_buff *skb)
{
return __netif_subqueue_stopped(dev, skb_get_queue_mapping(skb));
} | static inline int netif_subqueue_stopped(const struct net_device *VAR_0,
struct sk_buff *VAR_1)
{
return __netif_subqueue_stopped(VAR_0, skb_get_queue_mapping(VAR_1));
} | torvalds/linux/17dd759c67f21e34f2156abcf415e1f60605a188/netdevice.h/non_vul/22.json | null | null | false |
CVE-2014-7899 | ['CWE-20'] | AV:N/AC:L/Au:N/C:N/I:P/A:N | 0 | chromium | Simplify AreURLsInPageNavigation
The first case guarantees we trust the renderer's definition of an in-page navigation if the urls before and after navigation are on the same origin. An in-page navigation is impossible cross-origin, so this single check is sufficient.
BUG=
Review URL: https://codereview.chromium.org... | 5cfbddc9cc972f5133f26664dbf5810bb569cd04 | https://github.com/chromium/chromium/commit/5cfbddc9cc972f5133f26664dbf5810bb569cd04 | content/browser/frame_host/navigation_controller_impl.cc | NavigationControllerImpl::GoToIndex | null | null | null | void NavigationControllerImpl::GoToIndex(int index) {
if (index < 0 || index >= static_cast<int>(entries_.size())) {
NOTREACHED();
return;
}
if (transient_entry_index_ != -1) {
if (index == transient_entry_index_) {
// Nothing to do when navigating to the transient.
return;
}
if (... | void NavigationControllerImpl::GoToIndex(int VAR_0) {
if (VAR_0 < 0 || VAR_0 >= VAR_1<int>(VAR_2.size())) {
NOTREACHED();
return;
}
if (VAR_3 != -1) {
if (VAR_0 == VAR_3) {
/* COMMENT_0 */
return;
}
if (VAR_0 > VAR_3) {
/* COMMENT_1 */
VAR_0--;
}
}
DiscardNonC... | chromium/5cfbddc9cc972f5133f26664dbf5810bb569cd04/navigation_controller_impl.cc/non_vul/76.json | null | null | false |
CVE-2019-19242 | ['CWE-476'] | AV:N/AC:M/Au:N/C:N/I:N/A:P | 0 | sqlite | Fix a problem that comes up when using generated columns that evaluate to a
constant in an index and then making use of that index in a join.
FossilOrigin-Name: 8b12e95fec7ce6e0de82a04ca3dfcf1a8e62e233b7382aa28a8a9be6e862b1af | 57f7ece78410a8aae86aa4625fb7556897db384c | https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c | src/expr.c | sqlite3ExprCodeLoadIndexColumn | null | null | null | void sqlite3ExprCodeLoadIndexColumn(
Parse *pParse, /* The parsing context */
Index *pIdx, /* The index whose column is to be loaded */
int iTabCur, /* Cursor pointing to a table row */
int iIdxCol, /* The column of the index to be loaded */
int regOut /* Store the index column value in this re... | void sqlite3ExprCodeLoadIndexColumn(
Parse *VAR_0, /* COMMENT_0 */
Index *VAR_1, /* COMMENT_1 */
int VAR_2, /* COMMENT_2 */
int VAR_3, /* COMMENT_3 */
int VAR_4 /* COMMENT_4 */
){
i16 VAR_5 = VAR_1->aiColumn[VAR_3];
if( VAR_5==VAR_6 ){
assert( VAR_1->aColExpr );
assert( VAR_1->aColE... | sqlite/57f7ece78410a8aae86aa4625fb7556897db384c/expr.c/non_vul/17.json | null | null | false |
CVE-2019-12829 | ['CWE-787'] | AV:N/AC:L/Au:N/C:N/I:N/A:P | 0 | radareorg/radare2 | Fix #14303 - oob crash in RParse api usage, needs API redesign (#14307) | b282620b7a8818910c42a29b8f0855a2d13eec14 | https://github.com/radareorg/radare2/commit/b282620b7a8818910c42a29b8f0855a2d13eec14 | libr/parse/parse.c | r_parse_free | null | null | null | R_API void r_parse_free(RParse *p) {
r_list_free (p->parsers);
free (p);
} | R_API void r_parse_free(RParse *VAR_0) {
r_list_free (VAR_0->parsers);
free (VAR_0);
} | null | null | null | false |
CVE-2017-0861 | ['CWE-416'] | AV:L/AC:L/Au:N/C:P/I:P/A:P | 0 | torvalds/linux | Drivers can implement 'struct snd_pcm_ops.ioctl' to handle some requests
from ALSA PCM core. These requests are internal purpose in kernel land.
Usually common set of operations are used for it.
SNDRV_PCM_IOCTL1_INFO is one of the requests. According to code comment,
it has been obsoleted in the old days.
We can see ... | e11f0f90a626f93899687b1cc909ee37dd6c5809 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=e11f0f90a626f93899687b1cc909ee37dd6c5809 | sound/core/pcm_lib.c | snd_interval_mul | null | null | null | void snd_interval_mul(const struct snd_interval *a, const struct snd_interval *b, struct snd_interval *c)
{
if (a->empty || b->empty) {
snd_interval_none(c);
return;
}
c->empty = 0;
c->min = mul(a->min, b->min);
c->openmin = (a->openmin || b->openmin);
c->max = mul(a->max, b->max);
c->openmax = (a->openmax ... | void snd_interval_mul(const struct snd_interval *VAR_0, const struct snd_interval *VAR_1, struct snd_interval *VAR_2)
{
if (VAR_0->empty || VAR_1->empty) {
snd_interval_none(VAR_2);
return;
}
VAR_2->empty = 0;
VAR_2->min = mul(VAR_0->min, VAR_1->min);
VAR_2->openmin = (VAR_0->openmin || VAR_1->openmin);
VAR_2... | torvalds/linux/e11f0f90a626f93899687b1cc909ee37dd6c5809/pcm_lib.c/non_vul/32.json | null | null | false |
CVE-2014-9665 | ['CWE-119'] | AV:N/AC:L/Au:N/C:P/I:P/A:P | 0 | freetype/freetype2 | This doesn't break ABI.
* include/ftimage.h (FT_Bitmap): Make `rows', `width', `num_grays',
`pixel_mode', and `palette_mode' unsigned types.
* src/base/ftbitmap.c: Updated.
(FT_Bitmap_Copy): Fix casts.
* src/cache/ftcsbits.c, src/raster/ftraster.c, src/sfnt/pngshim.c:
Updated.
| b3500af717010137046ec4076d1e1c0641e33727 | http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b3500af717010137046ec4076d1e1c0641e33727 | src/raster/ftraster.c | ft_black_reset | null | null | null | static void
ft_black_reset( black_PRaster raster,
char* pool_base,
long pool_size )
{
if ( raster )
{
if ( pool_base && pool_size >= (long)sizeof ( black_TWorker ) + 2048 )
{
black_PWorker worker = (black_PWorker)pool_base;
... | static void
ft_black_reset( black_PRaster VAR_0,
char* VAR_1,
long VAR_2 )
{
if ( VAR_0 )
{
if ( VAR_1 && VAR_2 >= (long)sizeof ( VAR_3 ) + 2048 )
{
black_PWorker VAR_4 = (black_PWorker)VAR_1;
VAR_0->buffer = VAR_1 +... | freetype/freetype2/b3500af717010137046ec4076d1e1c0641e33727/ftraster.c/non_vul/6.json | null | null | false |
CVE-2019-20892 | ['CWE-415'] | AV:N/AC:L/Au:S/C:N/I:N/A:P | 0 | net-snmp | libsnmp, USM: Introduce a reference count in struct usmStateReference
This patch fixes https://sourceforge.net/p/net-snmp/bugs/2956/. | 5f881d3bf24599b90d67a45cae7a3eb099cd71c9 | https://github.com/net-snmp/net-snmp/commit/5f881d3bf24599b90d67a45cae7a3eb099cd71c9 | snmplib/snmp_client.c | count_varbinds | null | null | null | int
count_varbinds(netsnmp_variable_list * var_ptr)
{
int count = 0;
for (; var_ptr != NULL; var_ptr = var_ptr->next_variable)
count++;
return count;
} | int
count_varbinds(netsnmp_variable_list * VAR_0)
{
int VAR_1 = 0;
for (; VAR_0 != NULL; VAR_0 = VAR_0->next_variable)
VAR_1++;
return VAR_1;
} | net-snmp/5f881d3bf24599b90d67a45cae7a3eb099cd71c9/snmp_client.c/non_vul/21.json | null | null | false |
CVE-2020-15174 | ['CWE-20', 'CWE-693'] | AV:N/AC:M/Au:N/C:N/I:P/A:P | 0 | electron | refactor: wire will-navigate up to a navigation throttle instead of OpenURL (#25108)
* refactor: wire will-navigate up to a navigation throttle instead of OpenURL (#25065)
* refactor: wire will-navigate up to a navigation throttle instead of OpenURL
* spec: add test for x-site _top navigation
* chore: old cod... | 18613925610ba319da7f497b6deed85ad712c59b | https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b | shell/browser/api/electron_api_web_contents.cc | WebContents::DidFinishLoad | null | null | null | void WebContents::DidFinishLoad(content::RenderFrameHost* render_frame_host,
const GURL& validated_url) {
bool is_main_frame = !render_frame_host->GetParent();
int frame_process_id = render_frame_host->GetProcess()->GetID();
int frame_routing_id = render_frame_host->GetRoutingID();... | void WebContents::DidFinishLoad(content::RenderFrameHost* VAR_0,
const GURL& VAR_1) {
bool VAR_2 = !VAR_0->GetParent();
int VAR_3 = VAR_0->GetProcess()->GetID();
int VAR_4 = VAR_0->GetRoutingID();
auto VAR_5 = GetWeakPtr();
Emit("did-frame-finish-load", VAR_2, VAR_3,
VAR... | electron/18613925610ba319da7f497b6deed85ad712c59b/electron_api_web_contents.cc/non_vul/112.json | null | null | false |
CVE-2016-8576 | ['CWE-770'] | AV:L/AC:L/Au:N/C:N/I:N/A:P | 0 | qemu | xhci: limit the number of link trbs we are willing to process
Needed to avoid we run in circles forever in case the guest builds
an endless loop with link trbs.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Tested-by: P J P <ppandit@redhat.com>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Message-id: 1476096382-7981-... | 05f43d44e4bc26611ce25fd7d726e483f73363ce | https://github.com/qemu/qemu/commit/05f43d44e4bc26611ce25fd7d726e483f73363ce | hw/usb/hcd-xhci.c | xhci_submit | null | null | null | static int xhci_submit(XHCIState *xhci, XHCITransfer *xfer, XHCIEPContext *epctx)
{
uint64_t mfindex;
DPRINTF("xhci_submit(slotid=%d,epid=%d)\n", xfer->slotid, xfer->epid);
xfer->in_xfer = epctx->type>>2;
switch(epctx->type) {
case ET_INTR_OUT:
case ET_INTR_IN:
xfer->pkts = 0;
... | static int xhci_submit(XHCIState *VAR_0, XHCITransfer *VAR_1, XHCIEPContext *VAR_2)
{
uint64_t VAR_3;
DPRINTF("xhci_submit(slotid=%d,epid=%d)\n", VAR_1->slotid, VAR_1->epid);
VAR_1->in_xfer = VAR_2->type>>2;
switch(VAR_2->type) {
case VAR_4:
case VAR_5:
VAR_1->pkts = 0;
VAR_1-... | qemu/05f43d44e4bc26611ce25fd7d726e483f73363ce/hcd-xhci.c/non_vul/3.json | null | null | false |
CVE-2023-4622 | ['CWE-416'] | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H | 1 | torvalds/linux | Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage()
with detailed analysis and a nice repro.
unix_stream_sendpage() tries to add data to the last skb in the peer's
recv queue without locking the queue.
If the peer's FD is passed to another socket and the socket's FD is
passed to the peer, there i... | 790c2f9d15b594350ae9bca7b236f2b1859de02c | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&h=790c2f9d15b594350ae9bca7b236f2b1859de02c | net/unix/af_unix.c | unix_stream_splice_read | null | null | null | static ssize_t unix_stream_splice_read(struct socket *sock, loff_t *ppos,
struct pipe_inode_info *pipe,
size_t size, unsigned int flags)
{
struct unix_stream_read_state state = {
.recv_actor = unix_stream_splice_actor,
.socket = sock,
.pipe = pipe,
.size = size,
.splice_flags = flags,
... | static ssize_t unix_stream_splice_read(struct socket *VAR_0, loff_t *VAR_1,
struct pipe_inode_info *VAR_2,
size_t VAR_3, unsigned int VAR_4)
{
struct unix_stream_read_state VAR_5 = {
.recv_actor = VAR_6,
.socket = VAR_0,
.pipe = VAR_2,
.size = VAR_3,
.splice_flags = VAR_4,
};
if (un... | torvalds/linux/790c2f9d15b594350ae9bca7b236f2b1859de02c/af_unix.c/non_vul/49.json | null | null | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.