func stringlengths 0 484k | target int64 0 1 | cwe list | project stringlengths 2 29 | commit_id stringlengths 40 40 | hash float64 1,215,700,430,453,689,100,000,000B 340,281,914,521,452,260,000,000,000,000B | size int64 1 24k | message stringlengths 0 13.3k |
|---|---|---|---|---|---|---|---|
read_connections (NMAGConfSettings *settings)
{
NMAGConfSettingsPrivate *priv = NMA_GCONF_SETTINGS_GET_PRIVATE (settings);
GSList *dir_list;
GSList *iter;
dir_list = nm_gconf_get_all_connections (priv->client);
if (!dir_list)
return;
for (iter = dir_list; iter; iter = iter->next) {
char *dir = (char *) iter... | 1 | [
"CWE-200"
] | network-manager-applet | 8627880e07c8345f69ed639325280c7f62a8f894 | 190,055,981,073,339,570,000,000,000,000,000,000,000 | 20 | editor: prevent any registration of objects on the system bus
D-Bus access-control is name-based; so requests for a specific name
are allowed/denied based on the rules in /etc/dbus-1/system.d. But
apparently apps still get a non-named service on the bus, and if we
register *any* object even though we don't have a nam... |
dispose (GObject *object)
{
NMAGConfSettingsPrivate *priv = NMA_GCONF_SETTINGS_GET_PRIVATE (object);
if (priv->disposed)
return;
priv->disposed = TRUE;
g_hash_table_destroy (priv->pending_changes);
if (priv->read_connections_id) {
g_source_remove (priv->read_connections_id);
priv->read_connections_id = 0... | 1 | [
"CWE-200"
] | network-manager-applet | 56d87fcb86acb5359558e0a2ee702cfc0c3391f2 | 173,104,310,666,530,200,000,000,000,000,000,000,000 | 26 | applet: fix dbus connection refcounting after 8627880e07c8345f69ed639325280c7f62a8f894 |
add_connection_real (NMAGConfSettings *self, NMAGConfConnection *connection)
{
NMAGConfSettingsPrivate *priv = NMA_GCONF_SETTINGS_GET_PRIVATE (self);
g_return_if_fail (connection != NULL);
priv->connections = g_slist_prepend (priv->connections, connection);
g_signal_connect (connection, "new-secrets-requested",
... | 1 | [
"CWE-200"
] | network-manager-applet | 56d87fcb86acb5359558e0a2ee702cfc0c3391f2 | 137,957,941,458,855,410,000,000,000,000,000,000,000 | 23 | applet: fix dbus connection refcounting after 8627880e07c8345f69ed639325280c7f62a8f894 |
nma_gconf_connection_new (GConfClient *client, const char *conf_dir)
{
NMConnection *connection;
NMAGConfConnection *gconf_connection;
g_return_val_if_fail (GCONF_IS_CLIENT (client), NULL);
g_return_val_if_fail (conf_dir != NULL, NULL);
/* retrieve GConf data */
connection = nm_gconf_read_connection (client, co... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 258,525,374,362,735,340,000,000,000,000,000,000,000 | 20 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
nma_gconf_connection_changed (NMAGConfConnection *self)
{
NMAGConfConnectionPrivate *priv;
GHashTable *settings;
NMConnection *wrapped_connection;
NMConnection *gconf_connection;
GHashTable *new_settings;
GError *error = NULL;
g_return_val_if_fail (NMA_IS_GCONF_CONNECTION (self), FALSE);
priv = NMA_GCONF_CONN... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 196,886,284,970,420,630,000,000,000,000,000,000,000 | 71 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
utils_fill_connection_certs (NMConnection *connection)
{
NMSetting8021x *s_8021x;
const char *filename;
GError *error = NULL;
gboolean need_client_cert = TRUE;
g_return_if_fail (connection != NULL);
s_8021x = NM_SETTING_802_1X (nm_connection_get_setting (connection, NM_TYPE_SETTING_802_1X));
if (!s_8021x)
re... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 107,178,332,972,783,100,000,000,000,000,000,000,000 | 55 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
update_connection (NMConnectionList *list,
NMConnectionEditor *editor,
NMExportedConnection *original,
NMConnection *modified,
ConnectionUpdatedFn callback,
gpointer user_data)
{
NMConnectionScope original_scope;
Connection... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 69,344,125,097,621,190,000,000,000,000,000,000,000 | 72 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
add_connection (NMConnectionList *self,
NMConnectionEditor *editor,
NMConnection *connection,
ConnectionAddedFn callback,
gpointer user_data)
{
NMExportedConnection *exported = NULL;
NMConnectionScope scope;
gboolean success = FALSE;
scope = nm_connec... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 164,502,455,550,204,190,000,000,000,000,000,000,000 | 71 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
read_one_cert (ReadFromGConfInfo *info,
const char *setting_name,
const char *key)
{
char *value = NULL;
if (!nm_gconf_get_string_helper (info->client, info->dir, key, setting_name, &value))
return;
g_object_set_data_full (G_OBJECT (info->connection),
key, v... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 57,641,357,943,977,500,000,000,000,000,000,000,000 | 13 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
read_applet_private_values_from_gconf (NMSetting *setting,
ReadFromGConfInfo *info)
{
if (NM_IS_SETTING_802_1X (setting)) {
const char *setting_name = nm_setting_get_name (setting);
gboolean value;
if (nm_gconf_get_bool_helper (info->client, info->dir,
... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 237,410,975,103,383,960,000,000,000,000,000,000,000 | 36 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
get_8021x_secrets_cb (GtkDialog *dialog,
gint response,
gpointer user_data)
{
NM8021xInfo *info = user_data;
NMAGConfConnection *gconf_connection;
NMConnection *connection = NULL;
NMSetting *setting;
GHashTable *settings_hash;
GHashTable *secrets;
GError *err = NULL;
/* Got a user response, clear... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 20,392,142,445,402,345,000,000,000,000,000,000,000 | 82 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
add_one_setting (GHashTable *settings,
NMConnection *connection,
NMSetting *setting,
GError **error)
{
GHashTable *secrets;
g_return_val_if_fail (settings != NULL, FALSE);
g_return_val_if_fail (connection != NULL, FALSE);
g_return_val_if_fail (setting != NULL, FAL... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 283,746,707,249,343,980,000,000,000,000,000,000,000 | 27 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
get_settings (NMExportedConnection *exported)
{
NMConnection *connection;
GHashTable *settings;
connection = nm_exported_connection_get_connection (exported);
utils_fill_connection_certs (connection);
settings = nm_connection_to_hash (connection);
utils_clear_filled_connection_certs (connection);
return setti... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 81,869,905,497,253,220,000,000,000,000,000,000,000 | 13 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
constructor (GType type,
guint n_construct_params,
GObjectConstructParam *construct_params)
{
GObject *object;
NMAGConfConnectionPrivate *priv;
NMConnection *connection;
GError *error = NULL;
object = G_OBJECT_CLASS (nma_gconf_connection_parent_class)->constructor (type, n_construct_params, construct_pa... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 92,523,945,177,845,830,000,000,000,000,000,000,000 | 48 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
nm_gconf_read_connection (GConfClient *client,
const char *dir)
{
ReadFromGConfInfo info;
GSList *list;
GError *err = NULL;
list = gconf_client_all_dirs (client, dir, &err);
if (err) {
g_warning ("Error while reading connection: %s", err->message);
g_error_free (err);
return NULL;
... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 197,370,786,329,335,370,000,000,000,000,000,000,000 | 29 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
edit_done_cb (NMConnectionEditor *editor, gint response, GError *error, gpointer user_data)
{
EditConnectionInfo *info = (EditConnectionInfo *) user_data;
const char *message = _("An unknown error ocurred.");
g_hash_table_remove (info->list->editors, info->original_connection);
if (response == GTK_RESPONSE_NONE) ... | 1 | [
"CWE-310"
] | network-manager-applet | 4020594dfbf566f1852f0acb36ad631a9e73a82b | 130,618,747,488,396,050,000,000,000,000,000,000,000 | 36 | core: fix CA cert mishandling after cert file deletion (deb #560067) (rh #546793)
If a connection was created with a CA certificate, but the user later
moved or deleted that CA certificate, the applet would simply provide the
connection to NetworkManager without any CA certificate. This could cause
NM to connect to t... |
static int ohci_queue_iso_receive_dualbuffer(struct fw_iso_context *base,
struct fw_iso_packet *packet,
struct fw_iso_buffer *buffer,
unsigned long payload)
{
struct iso_context *ctx = container_of(base, struct iso_context, base);
struct db_descriptor *db = NULL;
struct descriptor *d;
... | 1 | [
"CWE-399"
] | linux-2.6 | 8c0c0cc2d9f4c523fde04bdfe41e4380dec8ee54 | 56,033,067,427,024,540,000,000,000,000,000,000,000 | 79 | firewire: ohci: handle receive packets with a data length of zero
Queueing to receive an ISO packet with a payload length of zero
silently does nothing in dualbuffer mode, and crashes the kernel in
packet-per-buffer mode. Return an error in dualbuffer mode, because
the DMA controller won't let us do what we want, and... |
static int ohci_queue_iso_receive_packet_per_buffer(struct fw_iso_context *base,
struct fw_iso_packet *packet,
struct fw_iso_buffer *buffer,
unsigned long payload)
{
struct iso_context *ctx = container_of(base, struct iso_context, base);
struct descriptor *d = NULL, *pd = NULL;
struct fw_iso_packet *p... | 1 | [
"CWE-399"
] | linux-2.6 | 8c0c0cc2d9f4c523fde04bdfe41e4380dec8ee54 | 99,766,993,200,932,650,000,000,000,000,000,000,000 | 76 | firewire: ohci: handle receive packets with a data length of zero
Queueing to receive an ISO packet with a payload length of zero
silently does nothing in dualbuffer mode, and crashes the kernel in
packet-per-buffer mode. Return an error in dualbuffer mode, because
the DMA controller won't let us do what we want, and... |
activate_parameters_install_free (ActivateParametersInstall *parameters_install)
{
if (parameters_install->slot_info) {
g_object_remove_weak_pointer (G_OBJECT (parameters_install->slot_info), (gpointer *)¶meters_install->slot_info);
}
if (parameters_install->parent_window) {
g_object_remove_weak_pointer (G_O... | 1 | [] | nautilus | 7632a3e13874a2c5e8988428ca913620a25df983 | 209,005,000,117,092,340,000,000,000,000,000,000,000 | 12 | Check for trusted desktop file launchers.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-directory-async.c:
Check for trusted desktop file launchers.
* libnautilus-private/nautilus-file-private.h:
* libnautilus-private/nautilus-file.c:
* libnautilus-... |
link_info_done (NautilusDirectory *directory,
NautilusFile *file,
const char *uri,
const char *name,
const char *icon,
gboolean is_launcher,
gboolean is_foreign)
{
file->details->link_info_is_up_to_date = TRUE;
nautilus_file_set_display_name (file, name, name, TRUE);
file->details->got_link_info = TR... | 1 | [] | nautilus | 7632a3e13874a2c5e8988428ca913620a25df983 | 242,951,921,570,172,700,000,000,000,000,000,000,000 | 28 | Check for trusted desktop file launchers.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-directory-async.c:
Check for trusted desktop file launchers.
* libnautilus-private/nautilus-file-private.h:
* libnautilus-private/nautilus-file.c:
* libnautilus-... |
nautilus_file_set_display_name (NautilusFile *file,
const char *display_name,
const char *edit_name,
gboolean custom)
{
gboolean changed;
if (display_name == NULL || *display_name == 0) {
return FALSE;
}
if (!custom && file->details->got_custom_display_name) {
return FALSE;
}
if (custom && dis... | 1 | [] | nautilus | 7632a3e13874a2c5e8988428ca913620a25df983 | 36,011,517,159,863,600,000,000,000,000,000,000,000 | 61 | Check for trusted desktop file launchers.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-directory-async.c:
Check for trusted desktop file launchers.
* libnautilus-private/nautilus-file-private.h:
* libnautilus-private/nautilus-file.c:
* libnautilus-... |
activate_files (ActivateParameters *parameters)
{
NautilusWindowInfo *window_info;
NautilusWindowOpenFlags flags;
NautilusFile *file;
GList *launch_desktop_files;
GList *launch_files;
GList *launch_in_terminal_files;
GList *open_in_app_files;
GList *open_in_app_parameters;
GList *unhandled_open_in_app_files;
... | 1 | [] | nautilus | 7632a3e13874a2c5e8988428ca913620a25df983 | 311,219,075,900,851,730,000,000,000,000,000,000,000 | 232 | Check for trusted desktop file launchers.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-directory-async.c:
Check for trusted desktop file launchers.
* libnautilus-private/nautilus-file-private.h:
* libnautilus-private/nautilus-file.c:
* libnautilus-... |
nautilus_file_clear_info (NautilusFile *file)
{
file->details->got_file_info = FALSE;
if (file->details->get_info_error) {
g_error_free (file->details->get_info_error);
file->details->get_info_error = NULL;
}
/* Reset to default type, which might be other than unknown for
special kinds of files like the des... | 1 | [] | nautilus | 7632a3e13874a2c5e8988428ca913620a25df983 | 230,672,749,510,001,500,000,000,000,000,000,000,000 | 66 | Check for trusted desktop file launchers.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-directory-async.c:
Check for trusted desktop file launchers.
* libnautilus-private/nautilus-file-private.h:
* libnautilus-private/nautilus-file.c:
* libnautilus-... |
mark_trusted_callback (NautilusFile *file,
GFile *result_location,
GError *error,
gpointer callback_data)
{
ActivateParametersDesktop *parameters;
parameters = callback_data;
if (error) {
eel_show_error_dialog (_("Unable to mark launcher trusted (executable)"),
... | 1 | [] | nautilus | ca2fd475297946f163c32dcea897f25da892b89d | 259,051,940,915,963,100,000,000,000,000,000,000,000 | 16 | Add nautilus_file_mark_desktop_file_trusted(), this now adds a #! line if
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-file-operations.c:
* libnautilus-private/nautilus-file-operations.h:
Add nautilus_file_mark_desktop_file_trusted(), this now
adds a #! line if th... |
untrusted_launcher_response_callback (GtkDialog *dialog,
int response_id,
ActivateParametersDesktop *parameters)
{
GdkScreen *screen;
char *uri;
gboolean free_params;
free_params = TRUE;
switch (response_id) {
case RESPONSE_RUN:
screen = gtk_widget_get_screen (GTK_WIDGET (parameters->paren... | 1 | [] | nautilus | ca2fd475297946f163c32dcea897f25da892b89d | 12,852,336,747,372,898,000,000,000,000,000,000,000 | 37 | Add nautilus_file_mark_desktop_file_trusted(), this now adds a #! line if
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-file-operations.c:
* libnautilus-private/nautilus-file-operations.h:
Add nautilus_file_mark_desktop_file_trusted(), this now
adds a #! line if th... |
finish_startup (NautilusApplication *application)
{
GList *drives;
/* initialize nautilus modules */
nautilus_module_setup ();
/* attach menu-provider module callback */
menu_provider_init_callback ();
/* Initialize the desktop link monitor singleton */
nautilus_desktop_link_monitor_get ();
/* Watch for mo... | 1 | [] | nautilus | 1e1c916f5537eb5e4144950f291f4a3962fc2395 | 97,009,948,731,994,360,000,000,000,000,000,000,000 | 42 | Add "interactive" argument to nautilus_file_mark_desktop_file_trusted.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-file-operations.c:
* libnautilus-private/nautilus-file-operations.h:
* libnautilus-private/nautilus-mime-actions.c:
Add "interactive" ... |
mark_trusted_job (GIOSchedulerJob *io_job,
GCancellable *cancellable,
gpointer user_data)
{
MarkTrustedJob *job = user_data;
CommonJob *common;
char *contents, *new_contents;
gsize length, new_length;
GError *error;
guint32 current;
int response;
GFileInfo *info;
common = (CommonJob *)job;
common->i... | 1 | [] | nautilus | 1e1c916f5537eb5e4144950f291f4a3962fc2395 | 93,816,849,436,748,860,000,000,000,000,000,000,000 | 151 | Add "interactive" argument to nautilus_file_mark_desktop_file_trusted.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-file-operations.c:
* libnautilus-private/nautilus-file-operations.h:
* libnautilus-private/nautilus-mime-actions.c:
Add "interactive" ... |
untrusted_launcher_response_callback (GtkDialog *dialog,
int response_id,
ActivateParametersDesktop *parameters)
{
GdkScreen *screen;
char *uri;
GFile *file;
switch (response_id) {
case RESPONSE_RUN:
screen = gtk_widget_get_screen (GTK_WIDGET (parameters->parent_window));
uri = nautilus_f... | 1 | [] | nautilus | 1e1c916f5537eb5e4144950f291f4a3962fc2395 | 280,535,660,110,794,430,000,000,000,000,000,000,000 | 34 | Add "interactive" argument to nautilus_file_mark_desktop_file_trusted.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-file-operations.c:
* libnautilus-private/nautilus-file-operations.h:
* libnautilus-private/nautilus-mime-actions.c:
Add "interactive" ... |
nautilus_application_startup (NautilusApplication *application,
gboolean kill_shell,
gboolean no_default_window,
gboolean no_desktop,
gboolean browser_window,
const char *geometry,
char **urls)
{
UniqueMessageData *message;
/* Check the user's ~/.nautilus direct... | 1 | [] | nautilus | 1e1c916f5537eb5e4144950f291f4a3962fc2395 | 46,398,737,534,363,160,000,000,000,000,000,000,000 | 81 | Add "interactive" argument to nautilus_file_mark_desktop_file_trusted.
2009-02-24 Alexander Larsson <alexl@redhat.com>
* libnautilus-private/nautilus-file-operations.c:
* libnautilus-private/nautilus-file-operations.h:
* libnautilus-private/nautilus-mime-actions.c:
Add "interactive" ... |
copy_job_done (gpointer user_data)
{
CopyMoveJob *job;
job = user_data;
if (job->done_callback) {
job->done_callback (job->debuting_files, job->done_callback_data);
}
eel_g_object_list_free (job->files);
if (job->destination) {
g_object_unref (job->destination);
}
g_hash_table_unref (job->debuting_files);... | 1 | [] | nautilus | a0f7bb5f2e9af8ecb463b13da834fa8559b0a481 | 167,717,794,138,903,520,000,000,000,000,000,000,000 | 21 | Use $XDG_DATA_HOME/.converted-launchers as marker for one-time desktop
2009-02-25 Alexander Larsson <alexl@redhat.com>
* src/nautilus-application.c:
Use $XDG_DATA_HOME/.converted-launchers as marker for
one-time desktop file trust operation.
* libnautilus-private/nautilus-file-utilities.[ch]:
Ad... |
mark_desktop_files_trusted (void)
{
char *user_dir, *do_once_file;
GFile *f, *c;
GFileEnumerator *e;
GFileInfo *info;
const char *name;
int fd;
user_dir = nautilus_get_user_directory ();
do_once_file = g_build_filename (user_dir, "converted-launchers", NULL);
g_free (user_dir);
if (g_file_test (do_once_fil... | 1 | [] | nautilus | a0f7bb5f2e9af8ecb463b13da834fa8559b0a481 | 329,345,661,402,451,840,000,000,000,000,000,000,000 | 52 | Use $XDG_DATA_HOME/.converted-launchers as marker for one-time desktop
2009-02-25 Alexander Larsson <alexl@redhat.com>
* src/nautilus-application.c:
Use $XDG_DATA_HOME/.converted-launchers as marker for
one-time desktop file trust operation.
* libnautilus-private/nautilus-file-utilities.[ch]:
Ad... |
nautilus_file_operations_copy (GList *files,
GArray *relative_item_points,
GFile *target_dir,
GtkWindow *parent_window,
NautilusCopyCallback done_callback,
gpointer done_callback_data)
{
CopyMoveJob *job;
job = op_job_new (CopyMoveJob, parent_window);
job->done_cal... | 1 | [] | nautilus | a0f7bb5f2e9af8ecb463b13da834fa8559b0a481 | 242,621,355,176,398,350,000,000,000,000,000,000,000 | 29 | Use $XDG_DATA_HOME/.converted-launchers as marker for one-time desktop
2009-02-25 Alexander Larsson <alexl@redhat.com>
* src/nautilus-application.c:
Use $XDG_DATA_HOME/.converted-launchers as marker for
one-time desktop file trust operation.
* libnautilus-private/nautilus-file-utilities.[ch]:
Ad... |
mark_trusted_job (GIOSchedulerJob *io_job,
GCancellable *cancellable,
gpointer user_data)
{
MarkTrustedJob *job = user_data;
CommonJob *common;
char *contents, *new_contents;
gsize length, new_length;
GError *error;
guint32 current;
int response;
GFileInfo *info;
common = (CommonJob *)job;
common->i... | 1 | [] | nautilus | a0f7bb5f2e9af8ecb463b13da834fa8559b0a481 | 262,902,604,970,857,600,000,000,000,000,000,000,000 | 164 | Use $XDG_DATA_HOME/.converted-launchers as marker for one-time desktop
2009-02-25 Alexander Larsson <alexl@redhat.com>
* src/nautilus-application.c:
Use $XDG_DATA_HOME/.converted-launchers as marker for
one-time desktop file trust operation.
* libnautilus-private/nautilus-file-utilities.[ch]:
Ad... |
copy_move_file (CopyMoveJob *copy_job,
GFile *src,
GFile *dest_dir,
gboolean same_fs,
gboolean unique_names,
char **dest_fs_type,
SourceInfo *source_info,
TransferInfo *transfer_info,
GHashTable *debuting_files,
GdkPoint *position,
gboolean overwrite,
gboolean *skipped_file,
gboolean readonly_so... | 1 | [] | nautilus | a0f7bb5f2e9af8ecb463b13da834fa8559b0a481 | 227,469,512,264,489,660,000,000,000,000,000,000,000 | 422 | Use $XDG_DATA_HOME/.converted-launchers as marker for one-time desktop
2009-02-25 Alexander Larsson <alexl@redhat.com>
* src/nautilus-application.c:
Use $XDG_DATA_HOME/.converted-launchers as marker for
one-time desktop file trust operation.
* libnautilus-private/nautilus-file-utilities.[ch]:
Ad... |
copy_job (GIOSchedulerJob *io_job,
GCancellable *cancellable,
gpointer user_data)
{
CopyMoveJob *job;
CommonJob *common;
SourceInfo source_info;
TransferInfo transfer_info;
char *dest_fs_id;
GFile *dest;
job = user_data;
common = &job->common;
common->io_job = io_job;
dest_fs_id = NULL;
nautilus_pr... | 1 | [] | nautilus | a0f7bb5f2e9af8ecb463b13da834fa8559b0a481 | 200,161,684,359,004,300,000,000,000,000,000,000,000 | 63 | Use $XDG_DATA_HOME/.converted-launchers as marker for one-time desktop
2009-02-25 Alexander Larsson <alexl@redhat.com>
* src/nautilus-application.c:
Use $XDG_DATA_HOME/.converted-launchers as marker for
one-time desktop file trust operation.
* libnautilus-private/nautilus-file-utilities.[ch]:
Ad... |
is_link_trusted (NautilusFile *file,
gboolean is_launcher)
{
gboolean res;
if (!is_launcher) {
return TRUE;
}
if (nautilus_file_can_execute (file)) {
return TRUE;
}
res = FALSE;
if (nautilus_file_is_local (file)) {
const char * const * data_dirs;
char *uri, *path;
int i;
data_dirs = g_... | 1 | [] | nautilus | a0f7bb5f2e9af8ecb463b13da834fa8559b0a481 | 264,597,378,473,483,760,000,000,000,000,000,000,000 | 42 | Use $XDG_DATA_HOME/.converted-launchers as marker for one-time desktop
2009-02-25 Alexander Larsson <alexl@redhat.com>
* src/nautilus-application.c:
Use $XDG_DATA_HOME/.converted-launchers as marker for
one-time desktop file trust operation.
* libnautilus-private/nautilus-file-utilities.[ch]:
Ad... |
nautilus_link_get_link_info_given_file_contents (const char *file_contents,
int link_file_size,
const char *file_uri,
char **uri,
char **name,
char **icon,
gboolean *is_launcher,
gboolean *is_foreign)
{
GKeyFile *key_file;
char *type;... | 1 | [] | nautilus | 6d1d33567cea0590ed1ad00506718f6d591ba95f | 309,260,120,543,232,400,000,000,000,000,000,000,000 | 57 | Bug 573991 – Nautilus does not recognize some .desktop files as
2009-03-04 Alexander Larsson <alexl@redhat.com>
Bug 573991 – Nautilus does not recognize some .desktop files as launchers
* libnautilus-private/nautilus-link.c:
(nautilus_link_get_link_info_given_file_contents):
Don't try to sniff th... |
is_link_data (const char *file_contents, int file_size)
{
char *mimetype;
gboolean res;
mimetype = g_content_type_guess (NULL, file_contents, file_size, NULL);
res = is_link_mime_type (mimetype);
g_free (mimetype);
return res;
} | 1 | [] | nautilus | 6d1d33567cea0590ed1ad00506718f6d591ba95f | 288,340,764,789,772,060,000,000,000,000,000,000,000 | 10 | Bug 573991 – Nautilus does not recognize some .desktop files as
2009-03-04 Alexander Larsson <alexl@redhat.com>
Bug 573991 – Nautilus does not recognize some .desktop files as launchers
* libnautilus-private/nautilus-link.c:
(nautilus_link_get_link_info_given_file_contents):
Don't try to sniff th... |
static int fuse_ioctl_copy_user(struct page **pages, struct iovec *iov,
unsigned int nr_segs, size_t bytes, bool to_user)
{
struct iov_iter ii;
int page_idx = 0;
if (!bytes)
return 0;
iov_iter_init(&ii, iov, nr_segs, bytes, 0);
while (iov_iter_count(&ii)) {
struct page *page = pages[page_idx++];
size_t... | 1 | [] | linux-2.6 | 0bd87182d3ab18a32a8e9175d3f68754c58e3432 | 275,150,731,278,663,340,000,000,000,000,000,000,000 | 42 | fuse: fix kunmap in fuse_ioctl_copy_user
Looks like another victim of the confusing kmap() vs kmap_atomic() API
differences.
Reported-by: Todor Gyumyushev <yodor1@gmail.com>
Signed-off-by: Jens Axboe <jens.axboe@oracle.com>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
Cc: Tejun Heo <tj@kernel.org>
Cc: stable@kern... |
int main(int argc, char *argv[])
{
int opt;
char *line;
progname = basename(argv[0]);
#if POSIXLY_CORRECT
cmd_line_options = POSIXLY_CMD_LINE_OPTIONS;
#else
if (getenv(POSIXLY_CORRECT_STR))
posixly_correct = 1;
if (!posixly_correct)
cmd_line_options = CMD_LINE_OPTIONS;
else
cmd_line_options = POSIXLY_CMD... | 1 | [] | acl | 63451a06b7484d220750ed8574d3ee84e156daf5 | 16,273,504,960,447,625,000,000,000,000,000,000,000 | 156 | Make sure that getfacl -R only calls stat(2) on symlinks when it needs to
This fixes http://oss.sgi.com/bugzilla/show_bug.cgi?id=790
"getfacl follows symlinks, even without -L". |
int unlzw(in, out)
int in, out; /* input and output file descriptors */
{
REG2 char_type *stackp;
REG3 code_int code;
REG4 int finchar;
REG5 code_int oldcode;
REG6 code_int incode;
REG7 long inbits;
REG8 long posbits;
REG9 int outpo... | 1 | [
"CWE-189"
] | gzip | a3db5806d012082b9e25cc36d09f19cd736a468f | 125,645,676,816,388,480,000,000,000,000,000,000,000 | 189 | gzip -d: do not clobber stack for valid input on x86_64
* unlzw.c (unlzw): Avoid integer overflow.
Aki Helin reported the segfault along with an input to trigger the bug.
* NEWS (Bug fixes): Mention it. |
_hb_ot_layout_init (hb_face_t *face)
{
hb_ot_layout_t *layout = &face->ot_layout;
layout->gdef_blob = Sanitizer<GDEF>::sanitize (hb_face_get_table (face, HB_OT_TAG_GDEF));
layout->gdef = &Sanitizer<GDEF>::lock_instance (layout->gdef_blob);
layout->gsub_blob = Sanitizer<GSUB>::sanitize (hb_face_get_table (face... | 1 | [
"CWE-119"
] | pango | 797d46714d27f147277fdd5346648d838c68fb8c | 247,815,931,182,614,300,000,000,000,000,000,000,000 | 13 | [HB/GDEF] Fix bug in building synthetic GDEF table |
hb_ot_layout_build_glyph_classes (hb_face_t *face,
uint16_t num_total_glyphs,
hb_codepoint_t *glyphs,
unsigned char *klasses,
uint16_t count)
{
if (HB_OBJECT_IS_INERT (face))
return;
hb_ot_layout_t *layout = &face->ot_layout;
if (HB_UNLIKELY (!count || !glyphs || ... | 1 | [
"CWE-119"
] | pango | 797d46714d27f147277fdd5346648d838c68fb8c | 13,171,715,166,689,818,000,000,000,000,000,000,000 | 22 | [HB/GDEF] Fix bug in building synthetic GDEF table |
static int usb_host_handle_control(USBHostDevice *s, USBPacket *p)
{
struct usbdevfs_urb *urb;
AsyncURB *aurb;
int ret, value, index;
/*
* Process certain standard device requests.
* These are infrequent and are processed synchronously.
*/
value = le16_to_cpu(s->ctrl.req.wValue);
... | 1 | [
"CWE-119"
] | qemu | babd03fde68093482528010a5435c14ce9128e3f | 312,416,163,750,000,940,000,000,000,000,000,000,000 | 73 | usb-linux.c: fix buffer overflow
In usb-linux.c:usb_host_handle_control, we pass a 1024-byte buffer and
length to the kernel. However, the length was provided by the caller
of dev->handle_packet, and is not checked, so the kernel might provide
too much data and overflow our buffer.
For example, hw/usb-uhci.c could s... |
gs_manager_create_window_for_monitor (GSManager *manager,
GdkScreen *screen,
int monitor)
{
GSWindow *window;
GdkRectangle rect;
gdk_screen_get_monitor_geometry (screen, monitor, &rect);
gs_debug ("Cr... | 1 | [] | gnome-screensaver | 2f597ea9f1f363277fd4dfc109fa41bbc6225aca | 304,491,975,580,879,030,000,000,000,000,000,000,000 | 26 | Fix adding monitors
Make sure to show windows that are added. And fix an off by one bug. |
on_screen_monitors_changed (GdkScreen *screen,
GSManager *manager)
{
GSList *l;
int n_monitors;
int n_windows;
int i;
n_monitors = gdk_screen_get_n_monitors (screen);
n_windows = g_slist_length (manager->priv->windows);
gs... | 1 | [] | gnome-screensaver | 2f597ea9f1f363277fd4dfc109fa41bbc6225aca | 105,982,173,161,305,000,000,000,000,000,000,000,000 | 36 | Fix adding monitors
Make sure to show windows that are added. And fix an off by one bug. |
gs_manager_finalize (GObject *object)
{
GSManager *manager;
g_return_if_fail (object != NULL);
g_return_if_fail (GS_IS_MANAGER (object));
manager = GS_MANAGER (object);
g_return_if_fail (manager->priv != NULL);
if (manager->priv->bg_notify_id != 0) {
g... | 1 | [] | gnome-screensaver | f6d3defdc7080a540d7f8df15dc309a9364ae668 | 340,204,079,059,999,640,000,000,000,000,000,000,000 | 50 | Create or remove windows as number of monitors changes due to randr 1.2
2008-08-20 William Jon McCann <jmccann@redhat.com>
* src/gs-manager.c (gs_manager_create_window_for_monitor),
(on_screen_monitors_changed), (gs_manager_destroy_windows),
(gs_manager_finalize), (gs_manager_create_windows_for_screen):
Create ... |
on_screen_monitors_changed (GdkScreen *screen,
GSManager *manager)
{
gs_debug ("Monitors changed for screen %d: num=%d",
gdk_screen_get_number (screen),
gdk_screen_get_n_monitors (screen));
} | 1 | [] | gnome-screensaver | f6d3defdc7080a540d7f8df15dc309a9364ae668 | 325,565,446,186,664,230,000,000,000,000,000,000,000 | 7 | Create or remove windows as number of monitors changes due to randr 1.2
2008-08-20 William Jon McCann <jmccann@redhat.com>
* src/gs-manager.c (gs_manager_create_window_for_monitor),
(on_screen_monitors_changed), (gs_manager_destroy_windows),
(gs_manager_finalize), (gs_manager_create_windows_for_screen):
Create ... |
gs_manager_create_windows_for_screen (GSManager *manager,
GdkScreen *screen)
{
GSWindow *window;
int n_monitors;
int i;
g_return_if_fail (manager != NULL);
g_return_if_fail (GS_IS_MANAGER (manager));
g_return_if_fail (GDK... | 1 | [] | gnome-screensaver | f6d3defdc7080a540d7f8df15dc309a9364ae668 | 143,321,559,131,040,370,000,000,000,000,000,000,000 | 37 | Create or remove windows as number of monitors changes due to randr 1.2
2008-08-20 William Jon McCann <jmccann@redhat.com>
* src/gs-manager.c (gs_manager_create_window_for_monitor),
(on_screen_monitors_changed), (gs_manager_destroy_windows),
(gs_manager_finalize), (gs_manager_create_windows_for_screen):
Create ... |
gs_manager_destroy_windows (GSManager *manager)
{
GdkDisplay *display;
GSList *l;
int n_screens;
int i;
g_return_if_fail (manager != NULL);
g_return_if_fail (GS_IS_MANAGER (manager));
if (manager->priv->windows == NULL) {
... | 1 | [] | gnome-screensaver | f6d3defdc7080a540d7f8df15dc309a9364ae668 | 123,569,059,232,976,350,000,000,000,000,000,000,000 | 30 | Create or remove windows as number of monitors changes due to randr 1.2
2008-08-20 William Jon McCann <jmccann@redhat.com>
* src/gs-manager.c (gs_manager_create_window_for_monitor),
(on_screen_monitors_changed), (gs_manager_destroy_windows),
(gs_manager_finalize), (gs_manager_create_windows_for_screen):
Create ... |
auto_configure_outputs (GsdXrandrManager *manager, guint32 timestamp)
{
/* FMQ: implement */
} | 1 | [] | gnome-settings-daemon | be513b3c7d80d0b7013d79ce46d7eeca929705cc | 80,906,546,337,861,210,000,000,000,000,000,000,000 | 4 | Implement autoconfiguration of the outputs
This is similar in spirit to 'xrandr --auto', but we disfavor selecting clone modes.
Instead, we lay out the outputs left-to-right.
Signed-off-by: Federico Mena Quintero <federico@novell.com> |
on_screen_monitors_changed (GdkScreen *screen,
GSManager *manager)
{
GSList *l;
int n_monitors;
int n_windows;
int i;
n_monitors = gdk_screen_get_n_monitors (screen);
n_windows = g_slist_length (manager->priv->windows);
gs... | 1 | [] | gnome-screensaver | a5f66339be6719c2b8fc478a1d5fc6545297d950 | 250,530,700,843,920,860,000,000,000,000,000,000,000 | 40 | Ensure keyboard grab and unlock dialog exist after monitor removal
gnome-screensaver currently doesn't deal with monitors getting
removed properly. If the unlock dialog is on the removed monitor
then the unlock dialog and its associated keyboard grab are not
moved to an existing monitor when the monitor removal is pr... |
gs_window_destroy (GSWindow *window)
{
g_return_if_fail (GS_IS_WINDOW (window));
gtk_widget_destroy (GTK_WIDGET (window));
} | 1 | [] | gnome-screensaver | a5f66339be6719c2b8fc478a1d5fc6545297d950 | 2,440,459,080,582,544,200,000,000,000,000,000,000 | 6 | Ensure keyboard grab and unlock dialog exist after monitor removal
gnome-screensaver currently doesn't deal with monitors getting
removed properly. If the unlock dialog is on the removed monitor
then the unlock dialog and its associated keyboard grab are not
moved to an existing monitor when the monitor removal is pr... |
static NTSTATUS smb_set_file_unix_link(connection_struct *conn,
struct smb_request *req,
const char *pdata,
int total_data,
const struct smb_filename *smb_fname)
{
char *link_target = NULL;
const char *newname = smb_fname->base_name;
NTSTATUS status = NT_STATUS_OK;
TALLOC... | 1 | [
"CWE-22"
] | samba | bd269443e311d96ef495a9db47d1b95eb83bb8f4 | 50,610,553,973,009,060,000,000,000,000,000,000,000 | 74 | Fix bug 7104 - "wide links" and "unix extensions" are incompatible.
Change parameter "wide links" to default to "no".
Ensure "wide links = no" if "unix extensions = yes" on a share.
Fix man pages to refect this.
Remove "within share" checks for a UNIX symlink set - even if
widelinks = no. The server will not follow t... |
connection_struct *make_connection_snum(struct smbd_server_connection *sconn,
int snum, user_struct *vuser,
DATA_BLOB password,
const char *pdev,
NTSTATUS *pstatus)
{
connection_struct *conn;
struct smb_filename *smb_fname_cpath = NULL;
fstring dev;
int ret;
char addr[INET6_ADDRSTRLEN];
bool o... | 1 | [
"CWE-22"
] | samba | bd269443e311d96ef495a9db47d1b95eb83bb8f4 | 322,712,926,393,091,500,000,000,000,000,000,000,000 | 437 | Fix bug 7104 - "wide links" and "unix extensions" are incompatible.
Change parameter "wide links" to default to "no".
Ensure "wide links = no" if "unix extensions = yes" on a share.
Fix man pages to refect this.
Remove "within share" checks for a UNIX symlink set - even if
widelinks = no. The server will not follow t... |
NTSTATUS check_reduced_name(connection_struct *conn, const char *fname)
{
#ifdef REALPATH_TAKES_NULL
bool free_resolved_name = True;
#else
char resolved_name_buf[PATH_MAX+1];
bool free_resolved_name = False;
#endif
char *resolved_name = NULL;
char *p = NULL;
DEBUG(3,("check_reduced_name [%s] [%s]\n", fnam... | 1 | [
"CWE-22"
] | samba | bd269443e311d96ef495a9db47d1b95eb83bb8f4 | 58,312,061,691,157,570,000,000,000,000,000,000,000 | 174 | Fix bug 7104 - "wide links" and "unix extensions" are incompatible.
Change parameter "wide links" to default to "no".
Ensure "wide links = no" if "unix extensions = yes" on a share.
Fix man pages to refect this.
Remove "within share" checks for a UNIX symlink set - even if
widelinks = no. The server will not follow t... |
on_screen_monitors_changed (GdkScreen *screen,
GSManager *manager)
{
GSList *l;
int n_monitors;
int n_windows;
int i;
n_monitors = gdk_screen_get_n_monitors (screen);
n_windows = g_slist_length (manager->priv->windows);
gs... | 1 | [] | gnome-screensaver | d4dcbd65a2df3c093c4e3a74bbbc75383eb9eadb | 235,433,697,533,199,930,000,000,000,000,000,000,000 | 53 | Update which monitor the unlock dialog is on when layout changes
Before we were moving the grabs but not the unlock dialog.
Everything needs to be in lock step, otherwise:
1) The unlock dialog won't get focus and will fail to work generally
2) Assumptions in the code about the two being in lock-step will
prove incorr... |
gs_window_destroy (GSWindow *window)
{
g_return_if_fail (GS_IS_WINDOW (window));
if (window->priv->lock_pid > 0) {
gs_window_dialog_finish (window);
}
remove_popup_dialog_idle (window);
remove_command_watches (window);
remove_watchdog_timer (window);
... | 1 | [] | gnome-screensaver | 271ae93d7b140b8ba40d77f9e4ce894e5fd1b554 | 204,978,094,285,079,640,000,000,000,000,000,000,000 | 21 | Make gs_window_cancel_unlock_request synchronous
This way we know the cancel has finished before moving
on in the code.
Part of fix for
https://bugzilla.gnome.org/show_bug.cgi?id=609789 |
gs_window_cancel_unlock_request (GSWindow *window)
{
/* FIXME: This is a bit of a hammer approach...
* Maybe we should send a delete-event to
* the plug?
*/
g_return_if_fail (GS_IS_WINDOW (window));
if (window->priv->lock_socket == NULL) {
return;
}
if (w... | 1 | [] | gnome-screensaver | 271ae93d7b140b8ba40d77f9e4ce894e5fd1b554 | 240,512,421,900,230,300,000,000,000,000,000,000,000 | 16 | Make gs_window_cancel_unlock_request synchronous
This way we know the cancel has finished before moving
on in the code.
Part of fix for
https://bugzilla.gnome.org/show_bug.cgi?id=609789 |
gs_grab_get_mouse (GSGrab *grab,
GdkWindow *window,
GdkScreen *screen,
gboolean hide_cursor)
{
GdkGrabStatus status;
GdkCursor *cursor;
g_return_val_if_fail (window != NULL, FALSE);
g_return_val_if_fail (screen != NULL, FA... | 1 | [] | gnome-screensaver | f93a22c175090cf02e80bc3ee676b53f1251f685 | 138,739,027,667,141,330,000,000,000,000,000,000,000 | 28 | Nullify grab window variables when windows are destroyed
If we don't do this then there is a time period where the
grab window variables contain dangling pointers which can
cause crashes.
Part of fix for
https://bugzilla.gnome.org/show_bug.cgi?id=609789 |
gs_grab_keyboard_reset (GSGrab *grab)
{
grab->priv->keyboard_grab_window = NULL;
grab->priv->keyboard_grab_screen = NULL;
} | 1 | [] | gnome-screensaver | f93a22c175090cf02e80bc3ee676b53f1251f685 | 157,438,576,911,378,710,000,000,000,000,000,000,000 | 5 | Nullify grab window variables when windows are destroyed
If we don't do this then there is a time period where the
grab window variables contain dangling pointers which can
cause crashes.
Part of fix for
https://bugzilla.gnome.org/show_bug.cgi?id=609789 |
gs_grab_get_keyboard (GSGrab *grab,
GdkWindow *window,
GdkScreen *screen)
{
GdkGrabStatus status;
g_return_val_if_fail (window != NULL, FALSE);
g_return_val_if_fail (screen != NULL, FALSE);
gs_debug ("Grabbing keyboard widget=%X", (guint32... | 1 | [] | gnome-screensaver | f93a22c175090cf02e80bc3ee676b53f1251f685 | 326,224,807,181,770,500,000,000,000,000,000,000,000 | 21 | Nullify grab window variables when windows are destroyed
If we don't do this then there is a time period where the
grab window variables contain dangling pointers which can
cause crashes.
Part of fix for
https://bugzilla.gnome.org/show_bug.cgi?id=609789 |
gs_grab_mouse_reset (GSGrab *grab)
{
grab->priv->mouse_grab_window = NULL;
grab->priv->mouse_grab_screen = NULL;
} | 1 | [] | gnome-screensaver | f93a22c175090cf02e80bc3ee676b53f1251f685 | 592,836,106,538,194,600,000,000,000,000,000,000 | 5 | Nullify grab window variables when windows are destroyed
If we don't do this then there is a time period where the
grab window variables contain dangling pointers which can
cause crashes.
Part of fix for
https://bugzilla.gnome.org/show_bug.cgi?id=609789 |
listener_ref_entry_has_connection (gpointer key,
gpointer value,
gpointer user_data)
{
GSListenerRefEntry *entry;
const char *connection;
gboolean matches;
entry = (GSListenerRefEntry *)value;
... | 1 | [] | gnome-screensaver | 284c9924969a49dbf2d5fae1d680d3310c4df4a3 | 73,300,824,911,810,030,000,000,000,000,000,000,000 | 25 | Remove session inhibitors if the originator falls of the bus
This fixes a problem where totem leaves inhibitors behind, see
bug 600488. |
listener_ref_entry_remove_for_connection (GSListener *listener,
int entry_type,
const char *connection)
{
gboolean removed;
guint n_removed;
GHashTable *hash;
hash = get_hash_for_entr... | 1 | [] | gnome-screensaver | 284c9924969a49dbf2d5fae1d680d3310c4df4a3 | 261,259,337,663,707,600,000,000,000,000,000,000,000 | 17 | Remove session inhibitors if the originator falls of the bus
This fixes a problem where totem leaves inhibitors behind, see
bug 600488. |
lock_command_watch (GIOChannel *source,
GIOCondition condition,
GSWindow *window)
{
gboolean finished = FALSE;
g_return_val_if_fail (GS_IS_WINDOW (window), FALSE);
if (condition & G_IO_IN) {
GIOStatus status;
GError... | 1 | [
"CWE-362"
] | gnome-screensaver | ab08cc93f2dc6223c8c00bfa1ca4f2d89069dbe0 | 241,026,682,006,305,570,000,000,000,000,000,000,000 | 83 | Work around x errors by asking dialog to die on cancel
Basically, what is happening is that gnome-screensaver-dialog exits after the
5th failed attempt at unlocking the screen, but before the shake animation
finishes. If the timing is slightly unlucky, this results in gnome-screensaver
accessing X resources that have ... |
popup_dialog_idle (GSWindow *window)
{
gboolean result;
char *tmp;
GString *command;
gs_debug ("Popping up dialog");
tmp = g_build_filename (LIBEXECDIR, "gnome-screensaver-dialog", NULL);
command = g_string_new (tmp);
g_free (tmp);
if (is_logout_e... | 1 | [
"CWE-362"
] | gnome-screensaver | ab08cc93f2dc6223c8c00bfa1ca4f2d89069dbe0 | 130,513,780,586,757,320,000,000,000,000,000,000,000 | 55 | Work around x errors by asking dialog to die on cancel
Basically, what is happening is that gnome-screensaver-dialog exits after the
5th failed attempt at unlocking the screen, but before the shake animation
finishes. If the timing is slightly unlucky, this results in gnome-screensaver
accessing X resources that have ... |
shake_dialog (GSWindow *window)
{
int i;
guint left;
guint right;
for (i = 0; i < 9; i++) {
if (i % 2 == 0) {
left = 30;
right = 0;
} else {
left = 0;
right ... | 1 | [
"CWE-362"
] | gnome-screensaver | ab08cc93f2dc6223c8c00bfa1ca4f2d89069dbe0 | 249,706,257,296,498,300,000,000,000,000,000,000,000 | 31 | Work around x errors by asking dialog to die on cancel
Basically, what is happening is that gnome-screensaver-dialog exits after the
5th failed attempt at unlocking the screen, but before the shake animation
finishes. If the timing is slightly unlucky, this results in gnome-screensaver
accessing X resources that have ... |
auth_check_idle (GSLockPlug *plug)
{
gboolean res;
gboolean again;
static guint loop_counter = 0;
again = TRUE;
res = do_auth_check (plug);
if (res) {
again = FALSE;
g_idle_add ((GSourceFunc)quit_response_ok, NULL);
} else... | 1 | [
"CWE-362"
] | gnome-screensaver | ab08cc93f2dc6223c8c00bfa1ca4f2d89069dbe0 | 140,846,670,974,514,850,000,000,000,000,000,000,000 | 27 | Work around x errors by asking dialog to die on cancel
Basically, what is happening is that gnome-screensaver-dialog exits after the
5th failed attempt at unlocking the screen, but before the shake animation
finishes. If the timing is slightly unlucky, this results in gnome-screensaver
accessing X resources that have ... |
static int futex_lock_pi(u32 __user *uaddr, int fshared,
int detect, ktime_t *time, int trylock)
{
struct hrtimer_sleeper timeout, *to = NULL;
struct futex_hash_bucket *hb;
struct futex_q q;
int res, ret;
if (refill_pi_state_cache())
return -ENOMEM;
if (time) {
to = &timeout;
hrtimer_init_on_stack(&to... | 1 | [] | linux-2.6 | 5ecb01cfdf96c5f465192bdb2a4fd4a61a24c6cc | 229,495,631,557,006,200,000,000,000,000,000,000,000 | 119 | futex_lock_pi() key refcnt fix
This fixes a futex key reference count bug in futex_lock_pi(),
where a key's reference count is incremented twice but decremented
only once, causing the backing object to not be released.
If the futex is created in a temporary file in an ext3 file system,
this bug causes the file's inod... |
static int encode_to_private_key_info(gnutls_x509_privkey_t pkey,
gnutls_datum_t * der,
ASN1_TYPE * pkey_info)
{
int result;
size_t size;
opaque *data = NULL;
opaque null = 0;
if (pkey->pk_algorithm != GNUTLS_PK_RSA) {
gnutls_assert();
return GNUTLS_E_UNIMPLEMENTED_FEATURE;
... | 1 | [] | gnutls | 112d537da5f3500f14316db26d18c37d678a5e0e | 147,219,100,289,513,080,000,000,000,000,000,000,000 | 134 | some changes for 64bit machines. |
int gnutls_x509_crt_get_serial(gnutls_x509_crt_t cert, void *result,
size_t * result_size)
{
int ret;
if (cert == NULL) {
gnutls_assert();
return GNUTLS_E_INVALID_REQUEST;
}
if ((ret =
asn1_read_value(cert->cert, "tbsCertificate.serialNumber", result,
result_size)) < 0) {
gnutls_ass... | 1 | [] | gnutls | 112d537da5f3500f14316db26d18c37d678a5e0e | 196,126,434,502,391,000,000,000,000,000,000,000,000 | 19 | some changes for 64bit machines. |
_gnutls_asn1_get_structure_xml(ASN1_TYPE structure,
gnutls_datum_t * res, int detail)
{
node_asn *p, *root;
int k, indent = 0, len, len2, len3;
opaque tmp[1024];
char nname[256];
int ret;
gnutls_string str;
if (res == NULL || structure == NULL) {
gnutls_assert();
return GNUTLS_E... | 1 | [] | gnutls | 112d537da5f3500f14316db26d18c37d678a5e0e | 186,047,149,305,633,670,000,000,000,000,000,000,000 | 383 | some changes for 64bit machines. |
int mszip_decompress(struct mszip_stream *zip, off_t out_bytes) {
/* for the bit buffer */
register unsigned int bit_buffer;
register int bits_left;
unsigned char *i_ptr, *i_end;
int i, ret, state, error;
/* easy answers */
if (!zip || (out_bytes < 0)) return CL_ENULLARG;
if (zip->error) return zip->e... | 1 | [] | clamav-devel | 158c35e81a25ea5fda55a2a7f62ea9fec2e883d9 | 286,001,574,084,344,600,000,000,000,000,000,000,000 | 79 | libclamav/mspack.c: improve unpacking of malformed cabinets (bb#1826) |
int lzx_decompress(struct lzx_stream *lzx, off_t out_bytes) {
/* bitstream reading and huffman variables */
register unsigned int bit_buffer;
register int bits_left, i=0;
register unsigned short sym;
unsigned char *i_ptr, *i_end;
int match_length, length_footer, extra, verbatim_bits, bytes_todo;
int this... | 1 | [] | clamav-devel | 158c35e81a25ea5fda55a2a7f62ea9fec2e883d9 | 114,945,764,076,337,520,000,000,000,000,000,000,000 | 428 | libclamav/mspack.c: improve unpacking of malformed cabinets (bb#1826) |
int qtm_decompress(struct qtm_stream *qtm, off_t out_bytes) {
unsigned int frame_start, frame_end, window_posn, match_offset, range;
unsigned char *window, *i_ptr, *i_end, *runsrc, *rundest;
int i, j, selector, extra, sym, match_length, ret;
unsigned short H, L, C, symf;
register unsigned int bit_buffer;
r... | 1 | [
"CWE-20"
] | clamav-devel | 224fee54dd6cd8933d7007331ec2bfca0398d4b4 | 7,293,124,244,714,633,000,000,000,000,000,000,000 | 169 | libclamav/mspack.c: fix Quantum decompressor (bb#1771) |
struct key *find_keyring_by_name(const char *name, bool skip_perm_check)
{
struct key *keyring;
int bucket;
keyring = ERR_PTR(-EINVAL);
if (!name)
goto error;
bucket = keyring_hash(name);
read_lock(&keyring_name_lock);
if (keyring_name_hash[bucket].next) {
/* search this hash bucket for a keyring with a ... | 1 | [
"CWE-362"
] | linux-2.6 | cea7daa3589d6b550546a8c8963599f7c1a3ae5c | 16,621,305,839,720,120,000,000,000,000,000,000,000 | 48 | KEYS: find_keyring_by_name() can gain access to a freed keyring
find_keyring_by_name() can gain access to a keyring that has had its reference
count reduced to zero, and is thus ready to be freed. This then allows the
dead keyring to be brought back into use whilst it is being destroyed.
The following timeline illus... |
static int do_sync(unsigned int num_qd, struct gfs2_quota_data **qda)
{
struct gfs2_sbd *sdp = (*qda)->qd_gl->gl_sbd;
struct gfs2_inode *ip = GFS2_I(sdp->sd_quota_inode);
unsigned int data_blocks, ind_blocks;
struct gfs2_holder *ghs, i_gh;
unsigned int qx, x;
struct gfs2_quota_data *qd;
loff_t offset;
unsigned ... | 1 | [
"CWE-399"
] | linux-2.6 | 7e619bc3e6252dc746f64ac3b486e784822e9533 | 18,619,989,573,510,160,000,000,000,000,000,000,000 | 102 | GFS2: Fix writing to non-page aligned gfs2_quota structures
This is the upstream fix for this bug. This patch differs
from the RHEL5 fix (Red Hat bz #555754) which simply writes to the 8-byte
value field of the quota. In upstream quota code, we're
required to write the entire quota (88 bytes) which can be split
across... |
static int gfs2_adjust_quota(struct gfs2_inode *ip, loff_t loc,
s64 change, struct gfs2_quota_data *qd,
struct fs_disk_quota *fdq)
{
struct inode *inode = &ip->i_inode;
struct address_space *mapping = inode->i_mapping;
unsigned long index = loc >> PAGE_CACHE_SHIFT;
unsigned offset = loc & (PAGE_CACH... | 1 | [
"CWE-399"
] | linux-2.6 | 7e619bc3e6252dc746f64ac3b486e784822e9533 | 59,470,795,693,199,750,000,000,000,000,000,000,000 | 94 | GFS2: Fix writing to non-page aligned gfs2_quota structures
This is the upstream fix for this bug. This patch differs
from the RHEL5 fix (Red Hat bz #555754) which simply writes to the 8-byte
value field of the quota. In upstream quota code, we're
required to write the entire quota (88 bytes) which can be split
across... |
void chain_reply(struct smb_request *req)
{
size_t smblen = smb_len(req->inbuf);
size_t already_used, length_needed;
uint8_t chain_cmd;
uint32_t chain_offset; /* uint32_t to avoid overflow */
uint8_t wct;
uint16_t *vwv;
uint16_t buflen;
uint8_t *buf;
if (IVAL(req->outbuf, smb_rcls) != 0) {
fixup_chain_erro... | 1 | [] | samba | 25452a2268ac7013da28125f3df22085139af12d | 285,756,523,219,705,400,000,000,000,000,000,000,000 | 240 | s3: Fix a NULL pointer dereference
Found by Laurent Gaffie <laurent.gaffie@gmail.com>.
Thanks!
Volker |
static void reply_sesssetup_and_X_spnego(struct smb_request *req)
{
const uint8 *p;
DATA_BLOB blob1;
size_t bufrem;
char *tmp;
const char *native_os;
const char *native_lanman;
const char *primary_domain;
const char *p2;
uint16 data_blob_len = SVAL(req->vwv+7, 0);
enum remote_arch_types ra_type = get_remote_a... | 1 | [
"CWE-119"
] | samba | 9280051bfba337458722fb157f3082f93cbd9f2b | 328,722,533,825,058,300,000,000,000,000,000,000,000 | 180 | s3: Fix an uninitialized variable read
Found by Laurent Gaffie <laurent.gaffie@gmail.com>
Thanks for that,
Volker
Fix bug #7254 (An uninitialized variable read could cause an smbd crash). |
void chain_reply(struct smb_request *req)
{
size_t smblen = smb_len(req->inbuf);
size_t already_used, length_needed;
uint8_t chain_cmd;
uint32_t chain_offset; /* uint32_t to avoid overflow */
uint8_t wct;
uint16_t *vwv;
uint16_t buflen;
uint8_t *buf;
if (IVAL(req->outbuf, smb_rcls) != 0) {
fixup_chain_erro... | 1 | [] | samba | c116652a3050a8549b722ae8ab5f9a2bf9a33b9f | 193,845,603,418,617,400,000,000,000,000,000,000,000 | 224 | In chain_reply, copy the subrequests' error to the main request |
_gnutls_x509_oid2mac_algorithm (const char *oid)
{
gnutls_mac_algorithm_t ret = 0;
GNUTLS_HASH_LOOP (if (strcmp (oid, p->oid) == 0)
{
ret = p->id; break;}
);
if (ret == 0)
return GNUTLS_MAC_UNKNOWN;
return ret;
} | 1 | [
"CWE-310"
] | gnutls | 34d87a7c3f12794a3ec2305cd2fdbae152bf2a76 | 42,633,597,698,949,330,000,000,000,000,000,000,000 | 13 | (_gnutls_x509_oid2mac_algorithm): Don't crash trying to strcmp the
NULL OID value in the hash_algorithms array, which happens when the
input OID doesn't match our OIDs for SHA1, MD5, MD2 or RIPEMD160.
Reported by satyakumar <satyam_kkd@hyd.hellosoft.com>. |
cli_pdf(const char *dir, cli_ctx *ctx, off_t offset)
{
off_t size; /* total number of bytes in the file */
off_t bytesleft, trailerlength;
char *buf; /* start of memory mapped area */
const char *p, *q, *trailerstart;
const char *xrefstart; /* cross reference table */
/*size_t xreflength;*/
int printed_predictor... | 1 | [] | clamav-devel | f0eb394501ec21b9fe67f36cbf5db788711d4236 | 9,558,431,477,193,906,000,000,000,000,000,000,000 | 442 | bb #2016. |
int cli_pdf(const char *dir, cli_ctx *ctx, off_t offset)
{
struct pdf_struct pdf;
fmap_t *map = *ctx->fmap;
size_t size = map->len - offset;
off_t versize = size > 1032 ? 1032 : size;
off_t map_off, bytesleft;
long xref;
const char *pdfver, *start, *eofmap, *q, *eof;
int rc;
unsigned... | 1 | [] | clamav-devel | f0eb394501ec21b9fe67f36cbf5db788711d4236 | 177,816,760,801,689,420,000,000,000,000,000,000,000 | 120 | bb #2016. |
retrieve_url (struct url * orig_parsed, const char *origurl, char **file,
char **newloc, const char *refurl, int *dt, bool recursive,
struct iri *iri, bool register_status)
{
uerr_t result;
char *url;
bool location_changed;
bool iri_fallbacked = 0;
int dummy;
char *mynewloc, *pro... | 1 | [
"CWE-20"
] | wget | 3e25a9817f47fbb8660cc6a3b2f3eea239526c6c | 308,507,981,451,037,930,000,000,000,000,000,000,000 | 265 | Introduce --trust-server-names. Close CVE-2010-2252. |
print_help (void)
{
/* We split the help text this way to ease translation of individual
entries. */
static const char *help[] = {
"\n",
N_("\
Mandatory arguments to long options are mandatory for short options too.\n\n"),
N_("\
Startup:\n"),
N_("\
-V, --version display the versio... | 1 | [
"CWE-20"
] | wget | 3e25a9817f47fbb8660cc6a3b2f3eea239526c6c | 231,552,610,299,097,700,000,000,000,000,000,000,000 | 308 | Introduce --trust-server-names. Close CVE-2010-2252. |
http_loop (struct url *u, char **newloc, char **local_file, const char *referer,
int *dt, struct url *proxy, struct iri *iri)
{
int count;
bool got_head = false; /* used for time-stamping and filename detection */
bool time_came_from_head = false;
bool got_name = false;
char *tms;
const c... | 1 | [
"CWE-20"
] | wget | 3e25a9817f47fbb8660cc6a3b2f3eea239526c6c | 123,054,588,746,694,250,000,000,000,000,000,000,000 | 542 | Introduce --trust-server-names. Close CVE-2010-2252. |
ftp_loop (struct url *u, char **local_file, int *dt, struct url *proxy,
bool recursive, bool glob)
{
ccon con; /* FTP connection */
uerr_t res;
*dt = 0;
xzero (con);
con.csock = -1;
con.st = ON_YOUR_OWN;
con.rs = ST_UNIX;
con.id = NULL;
con.proxy = proxy;
/* If the... | 1 | [
"CWE-20"
] | wget | 3e25a9817f47fbb8660cc6a3b2f3eea239526c6c | 173,197,912,256,458,500,000,000,000,000,000,000,000 | 95 | Introduce --trust-server-names. Close CVE-2010-2252. |
static noinline_for_stack int ethtool_get_rxnfc(struct net_device *dev,
void __user *useraddr)
{
struct ethtool_rxnfc info;
const struct ethtool_ops *ops = dev->ethtool_ops;
int ret;
void *rule_buf = NULL;
if (!ops->get_rxnfc)
return -EOPNOTSUPP;
if (copy_from_user(&info, useraddr, sizeof(info)))
retu... | 1 | [
"CWE-190"
] | linux-2.6 | db048b69037e7fa6a7d9e95a1271a50dc08ae233 | 256,352,693,318,403,330,000,000,000,000,000,000,000 | 44 | ethtool: Fix potential kernel buffer overflow in ETHTOOL_GRXCLSRLALL
On a 32-bit machine, info.rule_cnt >= 0x40000000 leads to integer
overflow and the buffer may be smaller than needed. Since
ETHTOOL_GRXCLSRLALL is unprivileged, this can presumably be used for at
least denial of service.
Signed-off-by: Ben Hutching... |
void Server::msgQueryUsers(ServerUser *uSource, MumbleProto::QueryUsers &msg) {
MSG_SETUP(ServerUser::Authenticated);
MumbleProto::QueryUsers reply;
for (int i=0;i<msg.ids_size();++i) {
int id = msg.ids(i);
if (id >= 0) {
const QString &name = getUserName(id);
if (! name.isEmpty()) {
reply.add_ids(id... | 1 | [
"CWE-20"
] | mumble | 6b33dda344f89e5a039b7d79eb43925040654242 | 196,009,093,498,939,000,000,000,000,000,000,000,000 | 28 | Don't crash on long usernames |
int Server::authenticate(QString &name, const QString &pw, const QStringList &emails, const QString &certhash, bool bStrongCert, const QList<QSslCertificate> &certs) {
int res = -2;
emit authenticateSig(res, name, certs, certhash, bStrongCert, pw);
if (res != -2) {
// External authentication handled it. Ignore c... | 1 | [
"CWE-20"
] | mumble | 6b33dda344f89e5a039b7d79eb43925040654242 | 80,257,356,580,533,810,000,000,000,000,000,000,000 | 105 | Don't crash on long usernames |
int Server::getUserID(const QString &name) {
if (qhUserIDCache.contains(name))
return qhUserIDCache.value(name);
int id = -2;
emit nameToIdSig(id, name);
if (id != -2) {
qhUserIDCache.insert(name, id);
qhUserNameCache.insert(id, name);
return id;
}
TransactionHolder th;
QSqlQuery &query = *th.qsqQuery;
... | 1 | [
"CWE-20"
] | mumble | 6b33dda344f89e5a039b7d79eb43925040654242 | 176,557,232,937,900,040,000,000,000,000,000,000,000 | 24 | Don't crash on long usernames |
vte_sequence_handler_window_manipulation (VteTerminal *terminal, GValueArray *params)
{
GdkScreen *gscreen;
VteScreen *screen;
GValue *value;
GtkWidget *widget;
char buf[128];
long param, arg1, arg2;
gint width, height;
guint i;
widget = &terminal->widget;
screen = terminal->pvt->screen;
for (i = 0; ((para... | 1 | [] | vte | 58bc3a942f198a1a8788553ca72c19d7c1702b74 | 142,489,256,848,579,330,000,000,000,000,000,000,000 | 201 | fix bug #548272
svn path=/trunk/; revision=2365 |
vte_sequence_handler_window_manipulation (VteTerminal *terminal, GValueArray *params)
{
GdkScreen *gscreen;
VteScreen *screen;
GValue *value;
GtkWidget *widget;
char buf[128];
long param, arg1, arg2;
gint width, height;
guint i;
GtkAllocation allocation;
widget = &terminal->widget;
screen = terminal->pvt->s... | 1 | [] | vte | 8b971a7b2c59902914ecbbc3915c45dd21530a91 | 112,569,028,621,208,800,000,000,000,000,000,000,000 | 220 | Fix terminal title reporting
Fixed CVE-2003-0070 again.
See also http://marc.info/?l=bugtraq&m=104612710031920&w=2 .
(cherry picked from commit 6042c75b5a6daa0e499e61c8e07242d890d38ff1) |
main( int argc,
char* argv[] )
{
int old_ptsize, orig_ptsize, file;
int first_glyph = 0;
int XisSetup = 0;
char* execname;
int option;
int file_loaded;
grEvent event;
execname = ft_basename( argv[0] );
while ( 1 )
{
option = getopt( argc... | 1 | [
"CWE-120"
] | freetype2-demos | b995299b73ba4cd259f221f500d4e63095508bec | 237,280,854,367,069,740,000,000,000,000,000,000,000 | 249 | Fix Savannah bug #30054.
* src/ftdiff.c, src/ftgrid.c, src/ftmulti.c, src/ftstring.c,
src/ftview.c: Use precision for `%s' where appropriate to avoid
buffer overflows. |
write_header( FT_Error error_code )
{
FT_Face face;
const char* basename;
const char* format;
error = FTC_Manager_LookupFace( handle->cache_manager,
handle->scaler.face_id, &face );
if ( error )
Fatal( "can't access font file" );
if ( !stat... | 1 | [
"CWE-120"
] | freetype2-demos | b995299b73ba4cd259f221f500d4e63095508bec | 51,136,699,242,632,680,000,000,000,000,000,000,000 | 78 | Fix Savannah bug #30054.
* src/ftdiff.c, src/ftgrid.c, src/ftmulti.c, src/ftstring.c,
src/ftview.c: Use precision for `%s' where appropriate to avoid
buffer overflows. |
write_header( FT_Error error_code )
{
FT_Face face;
const char* basename;
error = FTC_Manager_LookupFace( handle->cache_manager,
handle->scaler.face_id, &face );
if ( error )
PanicZ( "can't access font file" );
if ( !status.header )
{
... | 1 | [
"CWE-120"
] | freetype2-demos | b995299b73ba4cd259f221f500d4e63095508bec | 311,184,877,056,379,570,000,000,000,000,000,000,000 | 48 | Fix Savannah bug #30054.
* src/ftdiff.c, src/ftgrid.c, src/ftmulti.c, src/ftstring.c,
src/ftview.c: Use precision for `%s' where appropriate to avoid
buffer overflows. |
write_header( FT_Error error_code )
{
FT_Face face;
const char* basename;
const char* format;
error = FTC_Manager_LookupFace( handle->cache_manager,
handle->scaler.face_id, &face );
if ( error )
Fatal( "can't access font file" );
if ( !sta... | 1 | [
"CWE-120"
] | freetype2-demos | b995299b73ba4cd259f221f500d4e63095508bec | 69,731,635,452,952,740,000,000,000,000,000,000,000 | 98 | Fix Savannah bug #30054.
* src/ftdiff.c, src/ftgrid.c, src/ftmulti.c, src/ftstring.c,
src/ftview.c: Use precision for `%s' where appropriate to avoid
buffer overflows. |
write_message( RenderState state )
{
ADisplay adisplay = (ADisplay)state->display.disp;
if ( state->message == NULL )
{
FontFace face = &state->faces[state->face_index];
int idx, total;
idx = face->index;
total = 1;
while ( total + state->face_index < state->... | 1 | [
"CWE-120"
] | freetype2-demos | b995299b73ba4cd259f221f500d4e63095508bec | 316,756,505,032,776,100,000,000,000,000,000,000,000 | 35 | Fix Savannah bug #30054.
* src/ftdiff.c, src/ftgrid.c, src/ftmulti.c, src/ftstring.c,
src/ftview.c: Use precision for `%s' where appropriate to avoid
buffer overflows. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.