id stringlengths 8 13 | source_dataset stringclasses 1
value | cwe stringclasses 84
values | language stringclasses 2
values | vulnerable_code stringlengths 27 234k | secure_code stringlengths 15 235k | url stringlengths 45 48 | repository stringclasses 266
values | commit_hash stringlengths 6 81 | timestamp stringclasses 1
value | cvss_score stringclasses 1
value | severity stringclasses 1
value | metadata dict |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
bigvul_5 | BigVul | CWE-415 | c | gss_get_mic (minor_status,
context_handle,
qop_req,
message_buffer,
msg_token)
OM_uint32 * minor_status;
gss_ctx_id_t context_handle;
gss_qop_t qop_req;
gss_buffer_t message_buffer;
gss_buffer_t msg_token;
{
OM_uint32 status;
gss_union_ctx_id_t ctx;
gss_mechanism mech;
s... | gss_get_mic (minor_status,
context_handle,
qop_req,
message_buffer,
msg_token)
OM_uint32 * minor_status;
gss_ctx_id_t context_handle;
gss_qop_t qop_req;
gss_buffer_t message_buffer;
gss_buffer_t msg_token;
{
OM_uint32 status;
gss_union_ctx_id_t ctx;
gss_mechanism mech;
s... | https://www.cvedetails.com/cve/CVE-2017-11462/ | krb5 | 56f7b1bc95a2a3eeb420e069e7655fb181ade5cf | medium | {
"commit_message": "Preserve GSS context on init/accept failure\n\nAfter gss_init_sec_context() or gss_accept_sec_context() has created a\ncontext, don't delete the mechglue context on failures from subsequent\ncalls, even i",
"cve_id": "CVE-2017-11462",
"dataset_source": "BigVul"
} | ||
bigvul_13 | BigVul | CWE-787 | c | void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id,
mojo::ScopedSharedBufferHandle handle) {
DVLOG(1) << __func__ << " buffer_id: " << buffer_id;
DCHECK(io_thread_checker_.CalledOnValidThread());
DCHECK(handle.is_valid());
base::SharedMemoryHandle memory_handle;
... | void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id,
mojo::ScopedSharedBufferHandle handle) {
DVLOG(1) << __func__ << " buffer_id: " << buffer_id;
DCHECK(io_thread_checker_.CalledOnValidThread());
DCHECK(handle.is_valid());
base::SharedMemoryHandle memory_handle;
... | https://www.cvedetails.com/cve/CVE-2018-6063/ | Chrome | 673ce95d481ea9368c4d4d43ac756ba1d6d9e608 | medium | {
"commit_message": "Correct mojo::WrapSharedMemoryHandle usage\n\nFixes some incorrect uses of mojo::WrapSharedMemoryHandle which\nwere assuming that the call actually has any control over the memory\nprotection applied to a",
"cve_id": "CVE-2018-6063",
"dataset_source": "BigVul"
} | ||
bigvul_37 | BigVul | CWE-125 | c | frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2)
{
register const struct ip6_frag *dp;
register const struct ip6_hdr *ip6;
dp = (const struct ip6_frag *)bp;
ip6 = (const struct ip6_hdr *)bp2;
ND_TCHECK(dp->ip6f_offlg);
if (ndo->ndo_vflag) {
ND_PRINT((ndo, "fra... | frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2)
{
register const struct ip6_frag *dp;
register const struct ip6_hdr *ip6;
dp = (const struct ip6_frag *)bp;
ip6 = (const struct ip6_hdr *)bp2;
ND_TCHECK(*dp);
if (ndo->ndo_vflag) {
ND_PRINT((ndo, "frag (0x%08x:%... | https://www.cvedetails.com/cve/CVE-2017-13031/ | tcpdump | 2d669862df7cd17f539129049f6fb70d17174125 | medium | {
"commit_message": "CVE-2017-13031/Check for the presence of the entire IPv6 fragment header.\n\nThis fixes a buffer over-read discovered by Bhargava Shastry,\nSecT/TU Berlin.\n\nAdd a test using the capture file supplied by ",
"cve_id": "CVE-2017-13031",
"dataset_source": "BigVul"
} | ||
bigvul_69 | BigVul | CWE-119 | c | EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const
{
RefPtr<EntrySyncCallbackHelper> helper = EntrySyncCallbackHelper::create();
m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchro... | EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const
{
EntrySyncCallbackHelper* helper = EntrySyncCallbackHelper::create();
m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchronous);
... | https://www.cvedetails.com/cve/CVE-2013-0917/ | Chrome | 02c8303512ebed345011f7b545e2f418799be2f0 | medium | {
"commit_message": "Oilpan: Ship Oilpan for SyncCallbackHelper, CreateFileResult and CallbackWrapper in filesystem/\n\nThese are leftovers when we shipped Oilpan for filesystem/ once.\n\nBUG=340522\n\nReview URL: https://coder",
"cve_id": "CVE-2013-0917",
"dataset_source": "BigVul"
} | ||
bigvul_70 | BigVul | CWE-119 | c | ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl(
ScriptState* scriptState,
mojom::blink::WebBluetoothGATTQueryQuantity quantity,
String servicesUUID) {
if (!connected()) {
return ScriptPromise::rejectWithDOMException(
scriptState,
DOMException::create(NetworkError, kGAT... | ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl(
ScriptState* scriptState,
mojom::blink::WebBluetoothGATTQueryQuantity quantity,
String servicesUUID) {
if (!connected()) {
return ScriptPromise::rejectWithDOMException(
scriptState,
DOMException::create(NetworkError, kGAT... | https://www.cvedetails.com/cve/CVE-2015-1215/ | Chrome | 2bceda4948deeaed0a5a99305d0d488eb952f64f | medium | {
"commit_message": "Allow serialization of empty bluetooth uuids.\n\nThis change allows the passing WTF::Optional<String> types as\nbluetooth.mojom.UUID optional parameter without needing to ensure the passed\nobject isn't e",
"cve_id": "CVE-2015-1215",
"dataset_source": "BigVul"
} | ||
bigvul_91 | BigVul | CWE-190 | c | static void common_hrtimer_rearm(struct k_itimer *timr)
{
struct hrtimer *timer = &timr->it.real.timer;
if (!timr->it_interval)
return;
timr->it_overrun += (unsigned int) hrtimer_forward(timer,
timer->base->get_time(),
timr->it_interval);
hrtimer_restart(timer);
} | static void common_hrtimer_rearm(struct k_itimer *timr)
{
struct hrtimer *timer = &timr->it.real.timer;
if (!timr->it_interval)
return;
timr->it_overrun += hrtimer_forward(timer, timer->base->get_time(),
timr->it_interval);
hrtimer_restart(timer);
} | https://www.cvedetails.com/cve/CVE-2018-12896/ | linux | 78c9c4dfbf8c04883941445a195276bb4bb92c76 | medium | {
"commit_message": "posix-timers: Sanitize overrun handling\n\nThe posix timer overrun handling is broken because the forwarding functions\ncan return a huge number of overruns which does not fit in an int. As a\nconsequence",
"cve_id": "CVE-2018-12896",
"dataset_source": "BigVul"
} | ||
bigvul_114 | BigVul | CWE-89 | c | char *curl_easy_unescape(CURL *handle, const char *string, int length,
int *olen)
{
int alloc = (length?length:(int)strlen(string))+1;
char *ns = malloc(alloc);
unsigned char in;
int strindex=0;
unsigned long hex;
CURLcode res;
if(!ns)
return NULL;
while(--alloc >... | char *curl_easy_unescape(CURL *handle, const char *string, int length,
CURLcode Curl_urldecode(struct SessionHandle *data,
const char *string, size_t length,
char **ostring, size_t *olen,
bool reject_ctrl)
{
size_t alloc = (length?length:strlen(... | https://www.cvedetails.com/cve/CVE-2012-0036/ | curl | 75ca568fa1c19de4c5358fed246686de8467c238 | medium | {
"commit_message": "URL sanitize: reject URLs containing bad data\n\nProtocols (IMAP, POP3 and SMTP) that use the path part of a URL in a\ndecoded manner now use the new Curl_urldecode() function to reject URLs\nwith embedde",
"cve_id": "CVE-2012-0036",
"dataset_source": "BigVul"
} | ||
bigvul_120 | BigVul | CWE-400 | c | static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = 0U;
while (y... | static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y, written;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = written ... | https://www.cvedetails.com/cve/CVE-2019-12973/ | openjpeg | 8ee335227bbcaf1614124046aa25e53d67b11ec3 | medium | {
"commit_message": "convertbmp: detect invalid file dimensions early\n\nwidth/length dimensions read from bmp headers are not necessarily\nvalid. For instance they may have been maliciously set to very large\nvalues with the",
"cve_id": "CVE-2019-12973",
"dataset_source": "BigVul"
} | ||
bigvul_125 | BigVul | CWE-119 | c | const char* Chapters::Display::GetCountry() const
{
return m_country;
} | const char* Chapters::Display::GetCountry() const | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 04839626ed859623901ebd3a5fd483982186b59d | medium | {
"commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_192 | BigVul | CWE-119 | c | nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,
struct nfsd_writeargs *args)
{
unsigned int len, hdr, dlen;
struct kvec *head = rqstp->rq_arg.head;
int v;
p = decode_fh(p, &args->fh);
if (!p)
return 0;
p++; /* beginoffset */
args->offset = ntohl(*p++); /* offset */
p++; /* totalcount *... | nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,
struct nfsd_writeargs *args)
{
unsigned int len, hdr, dlen;
struct kvec *head = rqstp->rq_arg.head;
int v;
p = decode_fh(p, &args->fh);
if (!p)
return 0;
p++; /* beginoffset */
args->offset = ntohl(*p++); /* offset */
p++; /* totalcount *... | https://www.cvedetails.com/cve/CVE-2017-7895/ | linux | 13bf9fbff0e5e099e2b6f003a0ab8ae145436309 | medium | {
"commit_message": "nfsd: stricter decoding of write-like NFSv2/v3 ops\n\nThe NFSv2/v3 code does not systematically check whether we decode past\nthe end of the buffer. This generally appears to be harmless, but there\nare ",
"cve_id": "CVE-2017-7895",
"dataset_source": "BigVul"
} | ||
bigvul_196 | BigVul | CWE-284 | c | static void mntput_no_expire(struct mount *mnt)
{
rcu_read_lock();
mnt_add_count(mnt, -1);
if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */
rcu_read_unlock();
return;
}
lock_mount_hash();
if (mnt_get_count(mnt)) {
rcu_read_unlock();
unlock_mount_hash();
return;
}
if (unlikely(mnt->mnt.mnt_fl... | static void mntput_no_expire(struct mount *mnt)
{
rcu_read_lock();
mnt_add_count(mnt, -1);
if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */
rcu_read_unlock();
return;
}
lock_mount_hash();
if (mnt_get_count(mnt)) {
rcu_read_unlock();
unlock_mount_hash();
return;
}
if (unlikely(mnt->mnt.mnt_fl... | https://www.cvedetails.com/cve/CVE-2014-9717/ | linux | ce07d891a0891d3c0d0c2d73d577490486b809e1 | medium | {
"commit_message": "mnt: Honor MNT_LOCKED when detaching mounts\n\nModify umount(MNT_DETACH) to keep mounts in the hash table that are\nlocked to their parent mounts, when the parent is lazily unmounted.\n\nIn mntput_no_expir",
"cve_id": "CVE-2014-9717",
"dataset_source": "BigVul"
} | ||
bigvul_198 | BigVul | CWE-119 | c | void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pAudioBuffer;
EAS_I32 k;
EAS_I32 b1;
EAS_I32 b2;
EAS_I32 z1;
EAS_I32 z2;
EAS_I32 acc0;
EAS_I32 acc1;
EAS_I32 numSamples;
/* initialize some local variables */
numSamples = pWTIntFrame... | void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_PCM *pAudioBuffer;
EAS_I32 k;
EAS_I32 b1;
EAS_I32 b2;
EAS_I32 z1;
EAS_I32 z2;
EAS_I32 acc0;
EAS_I32 acc1;
EAS_I32 numSamples;
/* initialize some local variables */
numSamples = pWTIntFrame... | https://www.cvedetails.com/cve/CVE-2016-0838/ | Android | 3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49 | medium | {
"commit_message": "Sonivox: sanity check numSamples.\n\nBug: 26366256\nChange-Id: I066888c25035ea4c60c88f316db4508dc4dab6bc\n",
"cve_id": "CVE-2016-0838",
"dataset_source": "BigVul"
} | ||
bigvul_201 | BigVul | CWE-119 | c | void EncoderTest::InitializeConfig() {
const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);
ASSERT_EQ(VPX_CODEC_OK, res);
} | void EncoderTest::InitializeConfig() {
const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0);
dec_cfg_ = vpx_codec_dec_cfg_t();
ASSERT_EQ(VPX_CODEC_OK, res);
} | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 5a9753fca56f0eeb9f61e342b2fccffc364f9426 | medium | {
"commit_message": "Merge Conflict Fix CL to lmp-mr1-release for ag/849478\n\nDO NOT MERGE - libvpx: Pull from upstream\n\nCurrent HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06\n\nBUG=23452792\n\nChange-Id: Ic78176fc369e0bacc71",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_210 | BigVul | CWE-617 | c | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | https://www.cvedetails.com/cve/CVE-2017-13658/ | ImageMagick | e5c063a1007506ba69e97a35effcdef944421c89 | medium | {
"commit_message": "https://github.com/ImageMagick/ImageMagick/issues/598",
"cve_id": "CVE-2017-13658",
"dataset_source": "BigVul"
} | ||
bigvul_259 | BigVul | CWE-20 | c | OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,
OMX_IN OMX_INDEXTYPE paramIndex,
OMX_IN OMX_PTR paramData)
{
(void)hComp;
OMX_ERRORTYPE eRet = OMX_ErrorNone;
if (m_state == OMX_StateInvalid) {
DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State");
return ... | OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp,
OMX_IN OMX_INDEXTYPE paramIndex,
OMX_IN OMX_PTR paramData)
{
(void)hComp;
OMX_ERRORTYPE eRet = OMX_ErrorNone;
if (m_state == OMX_StateInvalid) {
DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State");
return ... | https://www.cvedetails.com/cve/CVE-2016-2480/ | Android | 560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8 | medium | {
"commit_message": "DO NOT MERGE mm-video-v4l2: vidc: validate omx param/config data\n\nCheck the sanity of config/param strcuture objects\npassed to get/set _ config()/parameter() methods.\n\nBug: 27533317\nSecurity Vulnerabi",
"cve_id": "CVE-2016-2480",
"dataset_source": "BigVul"
} | ||
bigvul_264 | BigVul | CWE-264 | c | void bnep_net_setup(struct net_device *dev)
{
memset(dev->broadcast, 0xff, ETH_ALEN);
dev->addr_len = ETH_ALEN;
ether_setup(dev);
dev->netdev_ops = &bnep_netdev_ops;
dev->watchdog_timeo = HZ * 2;
} | void bnep_net_setup(struct net_device *dev)
{
memset(dev->broadcast, 0xff, ETH_ALEN);
dev->addr_len = ETH_ALEN;
ether_setup(dev);
dev->priv_flags &= ~IFF_TX_SKB_SHARING;
dev->netdev_ops = &bnep_netdev_ops;
dev->watchdog_timeo = HZ * 2;
} | https://www.cvedetails.com/cve/CVE-2011-4112/ | linux | 550fd08c2cebad61c548def135f67aba284c6162 | medium | {
"commit_message": "net: Audit drivers to identify those needing IFF_TX_SKB_SHARING cleared\n\nAfter the last patch, We are left in a state in which only drivers calling\nether_setup have IFF_TX_SKB_SHARING set (we assume t",
"cve_id": "CVE-2011-4112",
"dataset_source": "BigVul"
} | ||
bigvul_292 | BigVul | CWE-787 | c | horizontalDifference16(unsigned short *ip, int n, int stride,
unsigned short *wp, uint16 *From14)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
/* assumption is unsigned pixel values */
#undef CLAMP
#define CLAMP(v) From14[(v) >> 2]
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
... | horizontalDifference16(unsigned short *ip, int n, int stride,
unsigned short *wp, uint16 *From14)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
/* assumption is unsigned pixel values */
#undef CLAMP
#define CLAMP(v) From14[(v) >> 2]
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
... | https://www.cvedetails.com/cve/CVE-2016-9537/ | libtiff | 83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f | medium | {
"commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan",
"cve_id": "CVE-2016-9537",
"dataset_source": "BigVul"
} | ||
bigvul_314 | BigVul | CWE-189 | cpp | void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) {
int i, j;
Guchar *inp, *tmp_line;
switch (colorSpace->getMode()) {
case csIndexed:
case csSeparation:
tmp_line = (Guchar *) gmalloc (length * nComps2);
for (i = 0; i < length; i++) {
for (j = 0; j < nComps2; j++... | void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) {
int i, j;
Guchar *inp, *tmp_line;
switch (colorSpace->getMode()) {
case csIndexed:
case csSeparation:
tmp_line = (Guchar *) gmallocn (length, nComps2);
for (i = 0; i < length; i++) {
for (j = 0; j < nComps2; j++... | https://www.cvedetails.com/cve/CVE-2009-3605/ | poppler | 7b2d314a61fd0e12f47c62996cb49ec0d1ba747a | medium | {
"commit_message": "",
"cve_id": "CVE-2009-3605",
"dataset_source": "BigVul"
} | ||
bigvul_323 | BigVul | CWE-20 | c | void TabContentsContainerGtk::DetachTab(TabContents* tab) {
gfx::NativeView widget = tab->web_contents()->GetNativeView();
if (widget) {
GtkWidget* parent = gtk_widget_get_parent(widget);
if (parent) {
DCHECK_EQ(parent, expanded_);
gtk_container_remove(GTK_CONTAINER(expanded_), widget);
}
... | void TabContentsContainerGtk::DetachTab(TabContents* tab) {
void TabContentsContainerGtk::DetachTab(WebContents* tab) {
gfx::NativeView widget = tab->GetNativeView();
if (widget) {
GtkWidget* parent = gtk_widget_get_parent(widget);
if (parent) {
DCHECK_EQ(parent, expanded_);
gtk_container_remo... | https://www.cvedetails.com/cve/CVE-2012-5148/ | Chrome | e89cfcb9090e8c98129ae9160c513f504db74599 | medium | {
"commit_message": "Remove TabContents from TabStripModelObserver::TabDetachedAt.\n\nBUG=107201\nTEST=no visible change\n\n\nReview URL: https://chromiumcodereview.appspot.com/11293205\n\ngit-svn-id: svn://svn.chromium.org/chrom",
"cve_id": "CVE-2012-5148",
"dataset_source": "BigVul"
} | ||
bigvul_376 | BigVul | CWE-190 | c | int bmp_validate(jas_stream_t *in)
{
int n;
int i;
uchar buf[2];
assert(JAS_STREAM_MAXPUTBACK >= 2);
/* Read the first two characters that constitute the signature. */
if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) {
return -1;
}
/* Put the characters read back onto the stream. */
for (i = n - 1... | int bmp_validate(jas_stream_t *in)
{
int n;
int i;
jas_uchar buf[2];
assert(JAS_STREAM_MAXPUTBACK >= 2);
/* Read the first two characters that constitute the signature. */
if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) {
return -1;
}
/* Put the characters read back onto the stream. */
for (i = n... | https://www.cvedetails.com/cve/CVE-2016-9557/ | jasper | d42b2388f7f8e0332c846675133acea151fc557a | medium | {
"commit_message": "The generation of the configuration file jas_config.h has been completely\nreworked in order to avoid pollution of the global namespace.\n\nSome problematic types like uchar, ulong, and friends have been",
"cve_id": "CVE-2016-9557",
"dataset_source": "BigVul"
} | ||
bigvul_390 | BigVul | CWE-732 | c | void PlatformSensorProviderAndroid::CreateSensorInternal(
mojom::SensorType type,
mojo::ScopedSharedBufferMapping mapping,
const CreateSensorCallback& callback) {
JNIEnv* env = AttachCurrentThread();
switch (type) {
case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES:
CreateAbsolu... | void PlatformSensorProviderAndroid::CreateSensorInternal(
mojom::SensorType type,
SensorReadingSharedBuffer* reading_buffer,
const CreateSensorCallback& callback) {
JNIEnv* env = AttachCurrentThread();
switch (type) {
case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES:
CreateAbso... | https://www.cvedetails.com/cve/CVE-2018-6057/ | Chrome | c0c8978849ac57e4ecd613ddc8ff7852a2054734 | medium | {
"commit_message": "android: Fix sensors in device service.\n\nThis patch fixes a bug that prevented more than one sensor data\nto be available at once when using the device motion/orientation\nAPI.\n\nThe issue was introduced",
"cve_id": "CVE-2018-6057",
"dataset_source": "BigVul"
} | ||
bigvul_396 | BigVul | CWE-787 | c | horizontalDifference8(unsigned char *ip, int n, int stride,
unsigned short *wp, uint16 *From8)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
#undef CLAMP
#define CLAMP(v) (From8[(v)])
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i... | horizontalDifference8(unsigned char *ip, int n, int stride,
unsigned short *wp, uint16 *From8)
{
register int r1, g1, b1, a1, r2, g2, b2, a2, mask;
#undef CLAMP
#define CLAMP(v) (From8[(v)])
mask = CODE_MASK;
if (n >= stride) {
if (stride == 3) {
r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i... | https://www.cvedetails.com/cve/CVE-2016-9537/ | libtiff | 83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f | medium | {
"commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan",
"cve_id": "CVE-2016-9537",
"dataset_source": "BigVul"
} | ||
bigvul_411 | BigVul | CWE-200 | c | static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url,
AVDictionary *opts, AVDictionary *opts2, int *is_http)
{
HLSContext *c = s->priv_data;
AVDictionary *tmp = NULL;
const char *proto_name = NULL;
int ret;
av_dict_copy(&tmp, opts, 0);
av_dict_copy(&tmp,... | static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url,
AVDictionary *opts, AVDictionary *opts2, int *is_http)
{
HLSContext *c = s->priv_data;
AVDictionary *tmp = NULL;
const char *proto_name = NULL;
int ret;
av_dict_copy(&tmp, opts, 0);
av_dict_copy(&tmp,... | https://www.cvedetails.com/cve/CVE-2017-9993/ | FFmpeg | 189ff4219644532bdfa7bab28dfedaee4d6d4021 | medium | {
"commit_message": "avformat/hls: Check local file extensions\n\nThis reduces the attack surface of local file-system\ninformation leaking.\n\nIt prevents the existing exploit leading to an information leak. As\nwell as simila",
"cve_id": "CVE-2017-9993",
"dataset_source": "BigVul"
} | ||
bigvul_493 | BigVul | CWE-119 | c | long Cluster::GetIndex() const
{
return m_index;
} | long Cluster::GetIndex() const
Cluster::Cluster(Segment* pSegment, long idx, long long element_start
/* long long element_size */)
: m_pSegment(pSegment),
m_element_start(element_start),
m_index(idx),
m_pos(element_start),
m_element_size(-1 /* element_size */),
m_timec... | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 04839626ed859623901ebd3a5fd483982186b59d | medium | {
"commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_540 | BigVul | CWE-362 | c | int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb)
{
struct ip_options *sopt;
unsigned char *sptr, *dptr;
int soffset, doffset;
int optlen;
__be32 daddr;
memset(dopt, 0, sizeof(struct ip_options));
sopt = &(IPCB(skb)->opt);
if (sopt->optlen == 0) {
dopt->optlen = 0;
return 0;
}
... | int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb)
int ip_options_echo(struct ip_options *dopt, struct sk_buff *skb)
{
const struct ip_options *sopt;
unsigned char *sptr, *dptr;
int soffset, doffset;
int optlen;
__be32 daddr;
memset(dopt, 0, sizeof(struct ip_options));
sopt = &(IPCB(skb)... | https://www.cvedetails.com/cve/CVE-2012-3552/ | linux | f6d8bd051c391c1c0458a30b2a7abcd939329259 | medium | {
"commit_message": "inet: add RCU protection to inet->opt\n\nWe lack proper synchronization to manipulate inet->opt ip_options\n\nProblem is ip_make_skb() calls ip_setup_cork() and\nip_setup_cork() possibly makes a copy of ip",
"cve_id": "CVE-2012-3552",
"dataset_source": "BigVul"
} | ||
bigvul_550 | BigVul | CWE-119 | c | OMX_ERRORTYPE SoftAVC::setConfig(
OMX_INDEXTYPE index, const OMX_PTR _params) {
switch (index) {
case OMX_IndexConfigVideoIntraVOPRefresh:
{
OMX_CONFIG_INTRAREFRESHVOPTYPE *params =
(OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params;
if (params->nPortIndex != kOutputPortI... | OMX_ERRORTYPE SoftAVC::setConfig(
OMX_INDEXTYPE index, const OMX_PTR _params) {
switch (index) {
case OMX_IndexConfigVideoIntraVOPRefresh:
{
OMX_CONFIG_INTRAREFRESHVOPTYPE *params =
(OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params;
if (!isValidOMXParam(params)) {
... | https://www.cvedetails.com/cve/CVE-2016-2476/ | Android | 295c883fe3105b19bcd0f9e07d54c6b589fc5bff | medium | {
"commit_message": "DO NOT MERGE Verify OMX buffer sizes prior to access\n\nBug: 27207275\nChange-Id: I4412825d1ee233d993af0a67708bea54304ff62d\n",
"cve_id": "CVE-2016-2476",
"dataset_source": "BigVul"
} | ||
bigvul_569 | BigVul | CWE-416 | c | static int link_pipe(struct pipe_inode_info *ipipe,
struct pipe_inode_info *opipe,
size_t len, unsigned int flags)
{
struct pipe_buffer *ibuf, *obuf;
int ret = 0, i = 0, nbuf;
/*
* Potential ABBA deadlock, work around it by ordering lock
* grabbing by pipe info address. Otherwise two different pro... | static int link_pipe(struct pipe_inode_info *ipipe,
struct pipe_inode_info *opipe,
size_t len, unsigned int flags)
{
struct pipe_buffer *ibuf, *obuf;
int ret = 0, i = 0, nbuf;
/*
* Potential ABBA deadlock, work around it by ordering lock
* grabbing by pipe info address. Otherwise two different pro... | https://www.cvedetails.com/cve/CVE-2019-11487/ | linux | 6b3a707736301c2128ca85ce85fb13f60b5e350a | medium | {
"commit_message": "Merge branch 'page-refs' (page ref overflow)\n\nMerge page ref overflow branch.\n\nJann Horn reported that he can overflow the page ref count with\nsufficient memory (and a filesystem that is intentionally",
"cve_id": "CVE-2019-11487",
"dataset_source": "BigVul"
} | ||
bigvul_587 | BigVul | CWE-200 | c | int omx_venc::async_message_process (void *context, void* message)
{
omx_video* omx = NULL;
struct venc_msg *m_sVenc_msg = NULL;
OMX_BUFFERHEADERTYPE* omxhdr = NULL;
struct venc_buffer *temp_buff = NULL;
if (context == NULL || message == NULL) {
DEBUG_PRINT_ERROR("ERROR: omx_venc::async_message_proc... | int omx_venc::async_message_process (void *context, void* message)
{
omx_video* omx = NULL;
struct venc_msg *m_sVenc_msg = NULL;
OMX_BUFFERHEADERTYPE* omxhdr = NULL;
struct venc_buffer *temp_buff = NULL;
if (context == NULL || message == NULL) {
DEBUG_PRINT_ERROR("ERROR: omx_venc::async_message_proc... | https://www.cvedetails.com/cve/CVE-2016-3835/ | Android | 7558d03e6498e970b761aa44fff6b2c659202d95 | medium | {
"commit_message": "DO NOT MERGE mm-video-v4l2: venc: add checks before accessing heap pointers\n\nHeap pointers do not point to user virtual addresses in case\nof secure session.\nSet them to NULL and add checks to avoid ac",
"cve_id": "CVE-2016-3835",
"dataset_source": "BigVul"
} | ||
bigvul_594 | BigVul | CWE-134 | cpp | GahpServer::Reaper(Service *,int pid,int status)
{
/* This should be much better.... for now, if our Gahp Server
goes away for any reason, we EXCEPT. */
GahpServer *dead_server = NULL;
GahpServer *next_server = NULL;
GahpServersById.startIterations();
while ( GahpServersById.iterate( next_server ) != 0 ) {
... | GahpServer::Reaper(Service *,int pid,int status)
{
/* This should be much better.... for now, if our Gahp Server
goes away for any reason, we EXCEPT. */
GahpServer *dead_server = NULL;
GahpServer *next_server = NULL;
GahpServersById.startIterations();
while ( GahpServersById.iterate( next_server ) != 0 ) {
... | https://www.cvedetails.com/cve/CVE-2011-4930/ | htcondor | 5e5571d1a431eb3c61977b6dd6ec90186ef79867 | medium | {
"commit_message": "",
"cve_id": "CVE-2011-4930",
"dataset_source": "BigVul"
} | ||
bigvul_607 | BigVul | CWE-399 | c | static void sample_hbp_handler(struct perf_event *bp, int nmi,
struct perf_sample_data *data,
struct pt_regs *regs)
{
printk(KERN_INFO "%s value is changed\n", ksym_name);
dump_stack();
printk(KERN_INFO "Dump stack from sample_hbp_handler\n");
} | static void sample_hbp_handler(struct perf_event *bp, int nmi,
static void sample_hbp_handler(struct perf_event *bp,
struct perf_sample_data *data,
struct pt_regs *regs)
{
printk(KERN_INFO "%s value is changed\n", ksym_name);
dump_stack();
printk(KERN_INFO "Dump stack from sample_hbp_handler\n... | https://www.cvedetails.com/cve/CVE-2011-2918/ | linux | a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | medium | {
"commit_message": "perf: Remove the nmi parameter from the swevent and overflow interface\n\nThe nmi parameter indicated if we could do wakeups from the current\ncontext, if not, we would set some state and self-IPI and le",
"cve_id": "CVE-2011-2918",
"dataset_source": "BigVul"
} | ||
bigvul_609 | BigVul | CWE-362 | c | void GCInfoTable::EnsureGCInfoIndex(const GCInfo* gc_info,
size_t* gc_info_index_slot) {
DCHECK(gc_info);
DCHECK(gc_info_index_slot);
DEFINE_THREAD_SAFE_STATIC_LOCAL(Mutex, mutex, ());
MutexLocker locker(mutex);
if (*gc_info_index_slot)
return;
int index = ++... | void GCInfoTable::EnsureGCInfoIndex(const GCInfo* gc_info,
size_t* gc_info_index_slot) {
DCHECK(gc_info);
DCHECK(gc_info_index_slot);
// Ensuring a new index involves current index adjustment as well
// as potentially resizing the table, both operations that require
// ... | https://www.cvedetails.com/cve/CVE-2018-6158/ | Chrome | 20b65d00ca3d8696430e22efad7485366f8c3a21 | medium | {
"commit_message": "[oilpan] Fix GCInfoTable for multiple threads\n\nPreviously, grow and access from different threads could lead to a race\non the table backing; see bug.\n\n- Rework the table to work on an existing reserva",
"cve_id": "CVE-2018-6158",
"dataset_source": "BigVul"
} | ||
bigvul_635 | BigVul | CWE-399 | c | void unix_inflight(struct file *fp)
{
struct sock *s = unix_get_socket(fp);
spin_lock(&unix_gc_lock);
if (s) {
struct unix_sock *u = unix_sk(s);
if (atomic_long_inc_return(&u->inflight) == 1) {
BUG_ON(!list_empty(&u->link));
list_add_tail(&u->link, &gc_inflight_list);
} else {
BUG_ON(list_empty(... | void unix_inflight(struct file *fp)
void unix_inflight(struct user_struct *user, struct file *fp)
{
struct sock *s = unix_get_socket(fp);
spin_lock(&unix_gc_lock);
if (s) {
struct unix_sock *u = unix_sk(s);
if (atomic_long_inc_return(&u->inflight) == 1) {
BUG_ON(!list_empty(&u->link));
list_add_tail(... | https://www.cvedetails.com/cve/CVE-2016-2550/ | linux | 415e3d3e90ce9e18727e8843ae343eda5a58fad6 | medium | {
"commit_message": "unix: correctly track in-flight fds in sending process user_struct\n\nThe commit referenced in the Fixes tag incorrectly accounted the number\nof in-flight fds over a unix domain socket to the original o",
"cve_id": "CVE-2016-2550",
"dataset_source": "BigVul"
} | ||
bigvul_675 | BigVul | CWE-20 | c | bool IDNToUnicodeOneComponent(const base::char16* comp,
size_t comp_len,
base::string16* out) {
DCHECK(out);
if (comp_len == 0)
return false;
static const base::char16 kIdnPrefix[] = {'x', 'n', '-', '-'};
if ((comp_len > arraysize(kIdnPrefix))... | bool IDNToUnicodeOneComponent(const base::char16* comp,
size_t comp_len,
bool is_tld_ascii,
base::string16* out) {
DCHECK(out);
if (comp_len == 0)
return false;
static const base::char16 kIdnPrefix[] = {'x', 'n', '-... | https://www.cvedetails.com/cve/CVE-2017-5060/ | Chrome | 08cb718ba7c3961c1006176c9faba0a5841ec792 | medium | {
"commit_message": "Block domain labels made of Cyrillic letters that look alike Latin\n\nBlock a label made entirely of Latin-look-alike Cyrillic letters when the TLD is not an IDN (i.e. this check is ON only for TLDs lik",
"cve_id": "CVE-2017-5060",
"dataset_source": "BigVul"
} | ||
bigvul_700 | BigVul | CWE-189 | c | sg_start_req(Sg_request *srp, unsigned char *cmd)
{
int res;
struct request *rq;
Sg_fd *sfp = srp->parentfp;
sg_io_hdr_t *hp = &srp->header;
int dxfer_len = (int) hp->dxfer_len;
int dxfer_dir = hp->dxfer_direction;
unsigned int iov_count = hp->iovec_count;
Sg_scatter_hold *req_schp = &srp->data;
Sg_scatter_hol... | sg_start_req(Sg_request *srp, unsigned char *cmd)
{
int res;
struct request *rq;
Sg_fd *sfp = srp->parentfp;
sg_io_hdr_t *hp = &srp->header;
int dxfer_len = (int) hp->dxfer_len;
int dxfer_dir = hp->dxfer_direction;
unsigned int iov_count = hp->iovec_count;
Sg_scatter_hold *req_schp = &srp->data;
Sg_scatter_hol... | https://www.cvedetails.com/cve/CVE-2015-5707/ | linux | fdc81f45e9f57858da6351836507fbcf1b7583ee | medium | {
"commit_message": "sg_start_req(): use import_iovec()\n\nSigned-off-by: Al Viro <viro@zeniv.linux.org.uk>",
"cve_id": "CVE-2015-5707",
"dataset_source": "BigVul"
} | ||
bigvul_775 | BigVul | CWE-399 | c | static void perf_swevent_overflow(struct perf_event *event, u64 overflow,
int nmi, struct perf_sample_data *data,
struct pt_regs *regs)
{
struct hw_perf_event *hwc = &event->hw;
int throttle = 0;
data->period = event->hw.last_period;
if (!overflow)
overflow = perf_swevent_set_period(event);
... | static void perf_swevent_overflow(struct perf_event *event, u64 overflow,
struct perf_sample_data *data,
struct pt_regs *regs)
{
struct hw_perf_event *hwc = &event->hw;
int throttle = 0;
data->period = event->hw.last_period;
if (!overflow)
overflow = perf_swevent_set_period(event);
if (hwc->... | https://www.cvedetails.com/cve/CVE-2011-2918/ | linux | a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | medium | {
"commit_message": "perf: Remove the nmi parameter from the swevent and overflow interface\n\nThe nmi parameter indicated if we could do wakeups from the current\ncontext, if not, we would set some state and self-IPI and le",
"cve_id": "CVE-2011-2918",
"dataset_source": "BigVul"
} | ||
bigvul_783 | BigVul | CWE-119 | c | static Image *ReadMIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define BZipMaxExtent(x) ((x)+((x)/100)+600)
#define LZMAMaxExtent(x) ((x)+((x)/3)+128)
#define ZipMaxExtent(x) ((x)+(((x)+7) >> 3)+(((x)+63) >> 6)+11)
#if defined(MAGICKCORE_BZLIB_DELEGATE)
bz_stream
bzip_info;
#endif
c... | static Image *ReadMIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define BZipMaxExtent(x) ((x)+((x)/100)+600)
#define LZMAMaxExtent(x) ((x)+((x)/3)+128)
#define ZipMaxExtent(x) ((x)+(((x)+7) >> 3)+(((x)+63) >> 6)+11)
#if defined(MAGICKCORE_BZLIB_DELEGATE)
bz_stream
bzip_info;
#endif
c... | https://www.cvedetails.com/cve/CVE-2016-10066/ | ImageMagick | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | medium | {
"commit_message": "",
"cve_id": "CVE-2016-10066",
"dataset_source": "BigVul"
} | ||
bigvul_815 | BigVul | CWE-264 | c | bool ContentBrowserClient::ShouldSwapProcessesForNavigation(
const GURL& current_url,
const GURL& new_url) {
return false;
} | bool ContentBrowserClient::ShouldSwapProcessesForNavigation(
SiteInstance* site_instance,
const GURL& current_url,
const GURL& new_url) {
return false;
} | https://www.cvedetails.com/cve/CVE-2013-0921/ | Chrome | e9841fbdaf41b4a2baaa413f94d5c0197f9261f4 | medium | {
"commit_message": "Ensure extensions and the Chrome Web Store are loaded in new BrowsingInstances.\n\nBUG=174943\nTEST=Can't post message to CWS. See bug for repro steps.\n\n\nReview URL: https://chromiumcodereview.appspot.c",
"cve_id": "CVE-2013-0921",
"dataset_source": "BigVul"
} | ||
bigvul_839 | BigVul | CWE-399 | c | bool Init(const IPC::ChannelHandle& channel_handle,
PP_Module pp_module,
PP_GetInterface_Func local_get_interface,
const ppapi::Preferences& preferences,
SyncMessageStatusReceiver* status_receiver) {
dispatcher_delegate_.reset(new ProxyChannelDelegate);
dispatcher... | bool Init(const IPC::ChannelHandle& channel_handle, | https://www.cvedetails.com/cve/CVE-2012-2888/ | Chrome | 3b0d77670a0613f409110817455d2137576b485a | medium | {
"commit_message": "Revert 143656 - Add an IPC channel between the NaCl loader process and the renderer.\nBUG=116317\nTEST=ppapi, nacl tests, manual testing for experimental IPC proxy.\nReview URL: https://chromiumcoderevie",
"cve_id": "CVE-2012-2888",
"dataset_source": "BigVul"
} | ||
bigvul_850 | BigVul | CWE-119 | c | OMX_ERRORTYPE SoftAACEncoder2::internalSetParameter(
OMX_INDEXTYPE index, const OMX_PTR params) {
switch (index) {
case OMX_IndexParamStandardComponentRole:
{
const OMX_PARAM_COMPONENTROLETYPE *roleParams =
(const OMX_PARAM_COMPONENTROLETYPE *)params;
if (strncmp... | OMX_ERRORTYPE SoftAACEncoder2::internalSetParameter(
OMX_INDEXTYPE index, const OMX_PTR params) {
switch (index) {
case OMX_IndexParamStandardComponentRole:
{
const OMX_PARAM_COMPONENTROLETYPE *roleParams =
(const OMX_PARAM_COMPONENTROLETYPE *)params;
if (!isValid... | https://www.cvedetails.com/cve/CVE-2016-2476/ | Android | 295c883fe3105b19bcd0f9e07d54c6b589fc5bff | medium | {
"commit_message": "DO NOT MERGE Verify OMX buffer sizes prior to access\n\nBug: 27207275\nChange-Id: I4412825d1ee233d993af0a67708bea54304ff62d\n",
"cve_id": "CVE-2016-2476",
"dataset_source": "BigVul"
} | ||
bigvul_856 | BigVul | CWE-119 | c | static bool blit_is_unsafe(struct CirrusVGAState *s)
{
/* should be the case, see cirrus_bitblt_start */
assert(s->cirrus_blt_width > 0);
assert(s->cirrus_blt_height > 0);
if (blit_region_is_unsafe(s, s->cirrus_blt_dstpitch,
s->cirrus_blt_dstaddr & s->cirrus_addr_mask... | static bool blit_is_unsafe(struct CirrusVGAState *s)
{
/* should be the case, see cirrus_bitblt_start */
assert(s->cirrus_blt_width > 0);
assert(s->cirrus_blt_height > 0);
if (s->cirrus_blt_width > CIRRUS_BLTBUFSIZE) {
return true;
}
if (blit_region_is_unsafe(s, s->cirrus_blt_dstpi... | https://www.cvedetails.com/cve/CVE-2014-8106/ | qemu | bf25983345ca44aec3dd92c57142be45452bd38a | medium | {
"commit_message": "",
"cve_id": "CVE-2014-8106",
"dataset_source": "BigVul"
} | ||
bigvul_898 | BigVul | CWE-416 | c | void ShellSurface::CreateShellSurfaceWidget(ui::WindowShowState show_state) {
DCHECK(enabled());
DCHECK(!widget_);
views::Widget::InitParams params;
params.type = views::Widget::InitParams::TYPE_WINDOW;
params.ownership = views::Widget::InitParams::NATIVE_WIDGET_OWNS_WIDGET;
params.delegate = this;
param... | void ShellSurface::CreateShellSurfaceWidget(ui::WindowShowState show_state) {
DCHECK(enabled());
DCHECK(!widget_);
views::Widget::InitParams params;
params.type = views::Widget::InitParams::TYPE_WINDOW;
params.ownership = views::Widget::InitParams::NATIVE_WIDGET_OWNS_WIDGET;
params.delegate = this;
param... | https://www.cvedetails.com/cve/CVE-2014-3194/ | Chrome | 05c619eb6e7dac046afc72c0d5381856f87fb421 | medium | {
"commit_message": "exo: Reduce side-effects of dynamic activation code.\n\nThis code exists for clients that need to managed their own system\nmodal dialogs. Since the addition of the remote surface API we\ncan limit the im",
"cve_id": "CVE-2014-3194",
"dataset_source": "BigVul"
} | ||
bigvul_932 | BigVul | CWE-189 | c | hstore_from_array(PG_FUNCTION_ARGS)
{
ArrayType *in_array = PG_GETARG_ARRAYTYPE_P(0);
int ndims = ARR_NDIM(in_array);
int count;
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *in_datums;
bool *in_nulls;
int in_count;
int i;
Assert(ARR_ELEMTYPE(in_array) == TEXTOID);
switch (ndims)
... | hstore_from_array(PG_FUNCTION_ARGS)
{
ArrayType *in_array = PG_GETARG_ARRAYTYPE_P(0);
int ndims = ARR_NDIM(in_array);
int count;
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *in_datums;
bool *in_nulls;
int in_count;
int i;
Assert(ARR_ELEMTYPE(in_array) == TEXTOID);
switch (ndims)
... | https://www.cvedetails.com/cve/CVE-2014-2669/ | postgres | 31400a673325147e1205326008e32135a78b4d8a | medium | {
"commit_message": "Predict integer overflow to avoid buffer overruns.\n\nSeveral functions, mostly type input functions, calculated an allocation\nsize such that the calculation wrapped to a small positive value when\nargum",
"cve_id": "CVE-2014-2669",
"dataset_source": "BigVul"
} | ||
bigvul_944 | BigVul | CWE-362 | c | bool TranslateInfoBarDelegate::IsTranslatableLanguageByPrefs() {
Profile* profile =
Profile::FromBrowserContext(GetWebContents()->GetBrowserContext());
Profile* original_profile = profile->GetOriginalProfile();
scoped_ptr<TranslatePrefs> translate_prefs(
TranslateTabHelper::CreateTranslatePrefs(origi... | bool TranslateInfoBarDelegate::IsTranslatableLanguageByPrefs() {
TranslateTabHelper* translate_tab_helper =
TranslateTabHelper::FromWebContents(GetWebContents());
scoped_ptr<TranslatePrefs> translate_prefs(
TranslateTabHelper::CreateTranslatePrefs(
translate_tab_helper->GetPrefs()));
Trans... | https://www.cvedetails.com/cve/CVE-2013-2906/ | Chrome | 603af455b5641671b18d7d7d166630341d71b63f | medium | {
"commit_message": "Remove dependency of TranslateInfobarDelegate on profile\n\nThis CL uses TranslateTabHelper instead of Profile and also cleans up\nsome unused code and irrelevant dependencies.\n\nBUG=371845\n\nReview URL: h",
"cve_id": "CVE-2013-2906",
"dataset_source": "BigVul"
} | ||
bigvul_954 | BigVul | CWE-119 | c | void assertObjectHasGCInfo(const void* payload, size_t gcInfoIndex) {
ASSERT(HeapObjectHeader::fromPayload(payload)->checkHeader());
#if !defined(COMPONENT_BUILD)
ASSERT(HeapObjectHeader::fromPayload(payload)->gcInfoIndex() == gcInfoIndex);
#endif
} | void assertObjectHasGCInfo(const void* payload, size_t gcInfoIndex) {
HeapObjectHeader::fromPayload(payload)->checkHeader();
#if !defined(COMPONENT_BUILD)
ASSERT(HeapObjectHeader::fromPayload(payload)->gcInfoIndex() == gcInfoIndex);
#endif
} | https://www.cvedetails.com/cve/CVE-2018-6094/ | Chrome | 0749ec24fae74ec32d0567eef0e5ec43c84dbcb9 | medium | {
"commit_message": "Call HeapObjectHeader::checkHeader solely for its side-effect.\n\nThis requires changing its signature. This is a preliminary stage to making it\nprivate.\n\nBUG=633030\n\nReview-Url: https://codereview.chro",
"cve_id": "CVE-2018-6094",
"dataset_source": "BigVul"
} | ||
bigvul_960 | BigVul | CWE-399 | c | ScopedRequest(PepperDeviceEnumerationHostHelper* owner,
const Delegate::EnumerateDevicesCallback& callback)
: owner_(owner),
callback_(callback),
requested_(false),
request_id_(0),
sync_call_(false) {
if (!owner_->document_url_.is_valid())
return;
req... | ScopedRequest(PepperDeviceEnumerationHostHelper* owner,
const Delegate::EnumerateDevicesCallback& callback)
: owner_(owner),
callback_(callback),
requested_(false),
request_id_(0),
sync_call_(false) {
if (!owner_->document_url_.is_valid())
return;
req... | https://www.cvedetails.com/cve/CVE-2014-7906/ | Chrome | 3a2cf7d1376ae33054b878232fb38b8fbed29e31 | medium | {
"commit_message": "Pepper: Access PepperMediaDeviceManager through a WeakPtr\n\nIts lifetime is scoped to the RenderFrame, and it might go away before the\nhosts that refer to it.\n\nBUG=423030\n\nReview URL: https://coderevie",
"cve_id": "CVE-2014-7906",
"dataset_source": "BigVul"
} | ||
bigvul_961 | BigVul | CWE-362 | c | VaapiVideoDecodeAccelerator::VaapiVP8Accelerator::VaapiVP8Accelerator(
VaapiVideoDecodeAccelerator* vaapi_dec,
VaapiWrapper* vaapi_wrapper)
: vaapi_wrapper_(vaapi_wrapper), vaapi_dec_(vaapi_dec) {
DCHECK(vaapi_wrapper_);
DCHECK(vaapi_dec_);
} | VaapiVideoDecodeAccelerator::VaapiVP8Accelerator::VaapiVP8Accelerator(
VaapiVideoDecodeAccelerator* vaapi_dec,
VaapiWrapper* vaapi_wrapper)
: vaapi_wrapper_(vaapi_wrapper), vaapi_dec_(vaapi_dec) {
DCHECK(vaapi_wrapper_);
DCHECK(vaapi_dec_);
DETACH_FROM_SEQUENCE(sequence_checker_);
} | https://www.cvedetails.com/cve/CVE-2018-6061/ | Chrome | 70340ce072cee8a0bdcddb5f312d32567b2269f6 | medium | {
"commit_message": "vaapi vda: Delete owned objects on worker thread in Cleanup()\n\nThis CL adds a SEQUENCE_CHECKER to Vaapi*Accelerator classes, and\nposts the destruction of those objects to the appropriate thread on\nCle",
"cve_id": "CVE-2018-6061",
"dataset_source": "BigVul"
} | ||
bigvul_962 | BigVul | CWE-399 | c | donote(struct magic_set *ms, void *vbuf, size_t offset, size_t size,
int clazz, int swap, size_t align, int *flags, uint16_t *notecount)
{
Elf32_Nhdr nh32;
Elf64_Nhdr nh64;
size_t noff, doff;
uint32_t namesz, descsz;
unsigned char *nbuf = CAST(unsigned char *, vbuf);
if (*notecount == 0)
return 0;
--*note... | donote(struct magic_set *ms, void *vbuf, size_t offset, size_t size,
int clazz, int swap, size_t align, int *flags, uint16_t *notecount)
{
Elf32_Nhdr nh32;
Elf64_Nhdr nh64;
size_t noff, doff;
uint32_t namesz, descsz;
unsigned char *nbuf = CAST(unsigned char *, vbuf);
if (*notecount == 0)
return 0;
--*note... | https://www.cvedetails.com/cve/CVE-2014-9621/ | file | 65437cee25199dbd385fb35901bc0011e164276c | medium | {
"commit_message": "Limit string printing to 100 chars, and add flags I forgot in the previous\ncommit.",
"cve_id": "CVE-2014-9621",
"dataset_source": "BigVul"
} | ||
bigvul_1004 | BigVul | CWE-74 | c | PS_SERIALIZER_DECODE_FUNC(php) /* {{{ */
{
const char *p, *q;
char *name;
const char *endptr = val + vallen;
zval *current;
int namelen;
int has_value;
php_unserialize_data_t var_hash;
PHP_VAR_UNSERIALIZE_INIT(var_hash);
p = val;
while (p < endptr) {
zval **tmp;
q = p;
while (*q != PS_DELIM... | PS_SERIALIZER_DECODE_FUNC(php) /* {{{ */
{
const char *p, *q;
char *name;
const char *endptr = val + vallen;
zval *current;
int namelen;
int has_value;
php_unserialize_data_t var_hash;
int skip = 0;
PHP_VAR_UNSERIALIZE_INIT(var_hash);
p = val;
while (p < endptr) {
zval **tmp;
q = p;
skip = ... | https://www.cvedetails.com/cve/CVE-2016-7125/ | php-src | 8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 | medium | {
"commit_message": "Fix bug #72681 - consume data even if we're not storing them",
"cve_id": "CVE-2016-7125",
"dataset_source": "BigVul"
} | ||
bigvul_1011 | BigVul | CWE-399 | c | xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op)
{
int total = 0;
int equal, ret;
xmlXPathCompExprPtr comp;
xmlXPathObjectPtr arg1, arg2;
xmlNodePtr bak;
xmlDocPtr bakd;
int pp;
int cs;
CHECK_ERROR0;
comp = ctxt->comp;
switch (op->op) {
case XP... | xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op)
{
int total = 0;
int equal, ret;
xmlXPathCompExprPtr comp;
xmlXPathObjectPtr arg1, arg2;
xmlNodePtr bak;
xmlDocPtr bakd;
int pp;
int cs;
CHECK_ERROR0;
comp = ctxt->comp;
switch (op->op) {
case XP... | https://www.cvedetails.com/cve/CVE-2011-2834/ | Chrome | 3a766e0115e9799db766a88554b9ab12ee5bf2a4 | medium | {
"commit_message": "Apply libxml fix for undefined namespaces.\n\nBUG=93472\nReview URL: http://codereview.chromium.org/7747031\n\ngit-svn-id: svn://svn.chromium.org/chrome/trunk/src@98359 0039d316-1c4b-4281-b951-d872f2087c98",
"cve_id": "CVE-2011-2834",
"dataset_source": "BigVul"
} | ||
bigvul_1032 | BigVul | CWE-119 | c | static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain,
unsigned int cryptlen)
{
struct crypto_ccm_req_priv_ctx *pctx = crypto_ccm_reqctx(req);
struct crypto_aead *aead = crypto_aead_reqtfm(req);
struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead);
AHASH_REQUEST_ON_STACK(ahreq, ctx->ma... | static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain,
unsigned int cryptlen)
{
struct crypto_ccm_req_priv_ctx *pctx = crypto_ccm_reqctx(req);
struct crypto_aead *aead = crypto_aead_reqtfm(req);
struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead);
AHASH_REQUEST_ON_STACK(ahreq, ctx->ma... | https://www.cvedetails.com/cve/CVE-2017-8065/ | linux | 3b30460c5b0ed762be75a004e924ec3f8711e032 | medium | {
"commit_message": "crypto: ccm - move cbcmac input off the stack\n\nCommit f15f05b0a5de (\"crypto: ccm - switch to separate cbcmac driver\")\nrefactored the CCM driver to allow separate implementations of the\nunderlying MAC ",
"cve_id": "CVE-2017-8065",
"dataset_source": "BigVul"
} | ||
bigvul_1053 | BigVul | CWE-190 | c | static int spl_filesystem_file_read_csv(spl_filesystem_object *intern, char delimiter, char enclosure, char escape, zval *return_value TSRMLS_DC) /* {{{ */
{
int ret = SUCCESS;
do {
ret = spl_filesystem_file_read(intern, 1 TSRMLS_CC);
} while (ret == SUCCESS && !intern->u.file.current_line_len && SPL_HAS_FLAG... | static int spl_filesystem_file_read_csv(spl_filesystem_object *intern, char delimiter, char enclosure, char escape, zval *return_value TSRMLS_DC) /* {{{ */
{
int ret = SUCCESS;
do {
ret = spl_filesystem_file_read(intern, 1 TSRMLS_CC);
} while (ret == SUCCESS && !intern->u.file.current_line_len && SPL_HAS_FLA... | https://www.cvedetails.com/cve/CVE-2016-5770/ | php-src | 7245bff300d3fa8bacbef7897ff080a6f1c23eba?w=1 | medium | {
"commit_message": "Fix bug #72262 - do not overflow int",
"cve_id": "CVE-2016-5770",
"dataset_source": "BigVul"
} | ||
bigvul_1063 | BigVul | CWE-416 | c | struct ipv6_txoptions *ipv6_update_options(struct sock *sk,
struct ipv6_txoptions *opt)
{
if (inet_sk(sk)->is_icsk) {
if (opt &&
!((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE)) &&
inet_sk(sk)->inet_daddr != LOOPBACK4_IPV6) {
struct inet_connection_sock *icsk = inet_csk(sk);
icsk->icsk_e... | struct ipv6_txoptions *ipv6_update_options(struct sock *sk,
struct ipv6_txoptions *opt)
{
if (inet_sk(sk)->is_icsk) {
if (opt &&
!((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE)) &&
inet_sk(sk)->inet_daddr != LOOPBACK4_IPV6) {
struct inet_connection_sock *icsk = inet_csk(sk);
icsk->icsk_e... | https://www.cvedetails.com/cve/CVE-2016-3841/ | linux | 45f6fad84cc305103b28d73482b344d7f5b76f39 | medium | {
"commit_message": "ipv6: add complete rcu protection around np->opt\n\nThis patch addresses multiple problems :\n\nUDP/RAW sendmsg() need to get a stable struct ipv6_txoptions\nwhile socket is not locked : Other threads can ",
"cve_id": "CVE-2016-3841",
"dataset_source": "BigVul"
} | ||
bigvul_1097 | BigVul | CWE-119 | c | void GDataCacheMetadataMap::ScanCacheDirectory(
const std::vector<FilePath>& cache_paths,
GDataCache::CacheSubDirectoryType sub_dir_type,
CacheMap* cache_map,
ResourceIdToFilePathMap* processed_file_map) {
DCHECK(cache_map);
DCHECK(processed_file_map);
file_util::FileEnumerator enumerator(
... | void GDataCacheMetadataMap::ScanCacheDirectory(
const std::vector<FilePath>& cache_paths,
GDataCache::CacheSubDirectoryType sub_dir_type,
CacheMap* cache_map) {
file_util::FileEnumerator enumerator(
cache_paths[sub_dir_type],
false, // not recursive
static_cast<file_util::FileEnume... | https://www.cvedetails.com/cve/CVE-2012-2895/ | Chrome | baef1ffd73db183ca50c854e1779ed7f6e5100a8 | medium | {
"commit_message": "Revert 144993 - gdata: Remove invalid files in the cache directories\n\nBroke linux_chromeos_valgrind:\nhttp://build.chromium.org/p/chromium.memory.fyi/builders/Chromium%20OS%20%28valgrind%29%285%29/buil",
"cve_id": "CVE-2012-2895",
"dataset_source": "BigVul"
} | ||
bigvul_1109 | BigVul | CWE-134 | cpp | CronTab::initRegexObject() {
if ( ! CronTab::regex.isInitialized() ) {
const char *errptr;
int erroffset;
MyString pattern( CRONTAB_PARAMETER_PATTERN ) ;
if ( ! CronTab::regex.compile( pattern, &errptr, &erroffset )) {
MyString error = "CronTab: Failed to compile Regex - "... | CronTab::initRegexObject() {
if ( ! CronTab::regex.isInitialized() ) {
const char *errptr;
int erroffset;
MyString pattern( CRONTAB_PARAMETER_PATTERN ) ;
if ( ! CronTab::regex.compile( pattern, &errptr, &erroffset )) {
MyString error = "CronTab: Failed to compile Regex - "... | https://www.cvedetails.com/cve/CVE-2011-4930/ | htcondor | 5e5571d1a431eb3c61977b6dd6ec90186ef79867 | medium | {
"commit_message": "",
"cve_id": "CVE-2011-4930",
"dataset_source": "BigVul"
} | ||
bigvul_1161 | BigVul | CWE-119 | c | void Chapters::Atom::Clear()
{
delete[] m_string_uid;
m_string_uid = NULL;
while (m_displays_count > 0)
{
Display& d = m_displays[--m_displays_count];
d.Clear();
}
delete[] m_displays;
m_displays = NULL;
m_displays_size = 0;
} | void Chapters::Atom::Clear() | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 04839626ed859623901ebd3a5fd483982186b59d | medium | {
"commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_1165 | BigVul | CWE-399 | c | static inline void constructBidiRunsForSegment(InlineBidiResolver& topResolver, BidiRunList<BidiRun>& bidiRuns, const InlineIterator& endOfRuns, VisualDirectionOverride override, bool previousLineBrokeCleanly)
{
ASSERT(&topResolver.runs() == &bidiRuns);
ASSERT(topResolver.position() != endOfRuns);
RenderObj... | static inline void constructBidiRunsForSegment(InlineBidiResolver& topResolver, BidiRunList<BidiRun>& bidiRuns, const InlineIterator& endOfRuns, VisualDirectionOverride override, bool previousLineBrokeCleanly)
{
ASSERT(&topResolver.runs() == &bidiRuns);
ASSERT(topResolver.position() != endOfRuns);
RenderObj... | https://www.cvedetails.com/cve/CVE-2013-2909/ | Chrome | 248a92c21c20c14b5983680c50e1d8b73fc79a2f | medium | {
"commit_message": "Update containtingIsolate to go back all the way to top isolate from current root, rather than stopping at the first isolate it finds. This works because the current root is always updated with each i",
"cve_id": "CVE-2013-2909",
"dataset_source": "BigVul"
} | ||
bigvul_1190 | BigVul | CWE-125 | c | lldp_private_8023_print(netdissect_options *ndo,
const u_char *tptr, u_int tlv_len)
{
int subtype, hexdump = FALSE;
if (tlv_len < 4) {
return hexdump;
}
subtype = *(tptr+3);
ND_PRINT((ndo, "\n\t %s Subtype (%u)",
tok2str(lldp_8023_subtype_values, "unknow... | lldp_private_8023_print(netdissect_options *ndo,
const u_char *tptr, u_int tlv_len)
{
int subtype, hexdump = FALSE;
if (tlv_len < 4) {
return hexdump;
}
subtype = *(tptr+3);
ND_PRINT((ndo, "\n\t %s Subtype (%u)",
tok2str(lldp_8023_subtype_values, "unknow... | https://www.cvedetails.com/cve/CVE-2017-13054/ | tcpdump | e6511cc1a950fe1566b2236329d6b4bd0826cc7a | medium | {
"commit_message": "CVE-2017-13054/LLDP: add a missing length check\n\nIn lldp_private_8023_print() the case block for subtype 4 (Maximum Frame\nSize TLV, IEEE 802.3bc-2009 Section 79.3.4) did not include the length\ncheck a",
"cve_id": "CVE-2017-13054",
"dataset_source": "BigVul"
} | ||
bigvul_1223 | BigVul | CWE-399 | c | psh_glyph_find_strong_points( PSH_Glyph glyph,
FT_Int dimension )
{
/* a point is `strong' if it is located on a stem edge and */
/* has an `in' or `out' tangent parallel to the hint's direction */
PSH_Hint_Table table = &glyph->hint_tables[dimension];
... | psh_glyph_find_strong_points( PSH_Glyph glyph,
FT_Int dimension )
{
/* a point is `strong' if it is located on a stem edge and */
/* has an `in' or `out' tangent parallel to the hint's direction */
PSH_Hint_Table table = &glyph->hint_tables[dimension];
... | https://www.cvedetails.com/cve/CVE-2010-2498/ | savannah | 8d22746c9e5af80ff4304aef440986403a5072e2 | medium | {
"commit_message": "",
"cve_id": "CVE-2010-2498",
"dataset_source": "BigVul"
} | ||
bigvul_1244 | BigVul | CWE-476 | c | ip6t_do_table(struct sk_buff *skb,
const struct nf_hook_state *state,
struct xt_table *table)
{
unsigned int hook = state->hook;
static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long))));
/* Initializing verdict to NF_DROP keeps gcc happy. */
unsigned int verdict = NF_DROP;
const... | ip6t_do_table(struct sk_buff *skb,
const struct nf_hook_state *state,
struct xt_table *table)
{
unsigned int hook = state->hook;
static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long))));
/* Initializing verdict to NF_DROP keeps gcc happy. */
unsigned int verdict = NF_DROP;
const... | https://www.cvedetails.com/cve/CVE-2018-1065/ | linux | 57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 | medium | {
"commit_message": "netfilter: add back stackpointer size checks\n\nThe rationale for removing the check is only correct for rulesets\ngenerated by ip(6)tables.\n\nIn iptables, a jump can only occur to a user-defined chain, i",
"cve_id": "CVE-2018-1065",
"dataset_source": "BigVul"
} | ||
bigvul_1245 | BigVul | CWE-119 | c | static av_cold int xpm_decode_close(AVCodecContext *avctx)
{
XPMDecContext *x = avctx->priv_data;
av_freep(&x->pixels);
return 0;
} | static av_cold int xpm_decode_close(AVCodecContext *avctx)
{
XPMDecContext *x = avctx->priv_data;
av_freep(&x->pixels);
av_freep(&x->buf);
x->buf_size = 0;
return 0;
} | https://www.cvedetails.com/cve/CVE-2017-9990/ | FFmpeg | cb243972b121b1ae6b60a78ff55a0506c69f3879 | medium | {
"commit_message": "avcodec/xpmdec: Fix multiple pointer/memory issues\n\nMost of these were found through code review in response to\nfixing 1466/clusterfuzz-testcase-minimized-5961584419536896\nThere is thus no testcase fo",
"cve_id": "CVE-2017-9990",
"dataset_source": "BigVul"
} | ||
bigvul_1280 | BigVul | CWE-119 | c | static int apparmor_setprocattr(struct task_struct *task, char *name,
void *value, size_t size)
{
struct common_audit_data sa;
struct apparmor_audit_data aad = {0,};
char *command, *args = value;
size_t arg_size;
int error;
if (size == 0)
return -EINVAL;
/* args points to a PAGE_SIZE buffer, AppAr... | static int apparmor_setprocattr(struct task_struct *task, char *name,
void *value, size_t size)
{
struct common_audit_data sa;
struct apparmor_audit_data aad = {0,};
char *command, *largs = NULL, *args = value;
size_t arg_size;
int error;
if (size == 0)
return -EINVAL;
/* task can only write its ... | https://www.cvedetails.com/cve/CVE-2016-6187/ | linux | 30a46a4647fd1df9cf52e43bf467f0d9265096ca | medium | {
"commit_message": "apparmor: fix oops, validate buffer size in apparmor_setprocattr()\n\nWhen proc_pid_attr_write() was changed to use memdup_user apparmor's\n(interface violating) assumption that the setprocattr buffer wa",
"cve_id": "CVE-2016-6187",
"dataset_source": "BigVul"
} | ||
bigvul_1300 | BigVul | CWE-119 | c | PHPAPI int php_var_unserialize(UNSERIALIZE_PARAMETER)
{
const unsigned char *cursor, *limit, *marker, *start;
zval **rval_ref;
limit = max;
cursor = *p;
if (YYCURSOR >= YYLIMIT) {
return 0;
}
if (var_hash && cursor[0] != 'R') {
var_push(var_hash, rval);
}
start = cursor;
#line 495 "ext/standard/... | PHPAPI int php_var_unserialize(UNSERIALIZE_PARAMETER)
{
const unsigned char *cursor, *limit, *marker, *start;
zval **rval_ref;
limit = max;
cursor = *p;
if (YYCURSOR >= YYLIMIT) {
return 0;
}
if (var_hash && cursor[0] != 'R') {
var_push(var_hash, rval);
}
start = cursor;
#line 496 "ext/standard/... | https://www.cvedetails.com/cve/CVE-2016-7411/ | php-src | 6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1 | medium | {
"commit_message": "Fix bug #73052 - Memory Corruption in During Deserialized-object Destruction",
"cve_id": "CVE-2016-7411",
"dataset_source": "BigVul"
} | ||
bigvul_1339 | BigVul | CWE-20 | cpp | SchedulerObject::_continue(std::string key, std::string &/*reason*/, std::string &text)
{
PROC_ID id = getProcByString(key.c_str());
if (id.cluster < 0 || id.proc < 0) {
dprintf(D_FULLDEBUG, "Remove: Failed to parse id: %s\n", key.c_str());
text = "Invalid Id";
... | SchedulerObject::_continue(std::string key, std::string &/*reason*/, std::string &text)
{
PROC_ID id = getProcByString(key.c_str());
if (id.cluster <= 0 || id.proc < 0) {
dprintf(D_FULLDEBUG, "Remove: Failed to parse id: %s\n", key.c_str());
text = "Invalid Id";
... | https://www.cvedetails.com/cve/CVE-2012-4462/ | htcondor | 8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84 | medium | {
"commit_message": "",
"cve_id": "CVE-2012-4462",
"dataset_source": "BigVul"
} | ||
bigvul_1357 | BigVul | CWE-119 | c | void DataReductionProxySettings::InitPrefMembers() {
DCHECK(thread_checker_.CalledOnValidThread());
spdy_proxy_auth_enabled_.Init(
prefs::kDataSaverEnabled, GetOriginalProfilePrefs(),
base::Bind(&DataReductionProxySettings::OnProxyEnabledPrefChange,
base::Unretained(this)));
} | void DataReductionProxySettings::InitPrefMembers() { | https://www.cvedetails.com/cve/CVE-2016-5199/ | Chrome | c995d4fe5e96f4d6d4a88b7867279b08e72d2579 | medium | {
"commit_message": "Move IsDataSaverEnabledByUser to be a static method and use it\n\nThis method now officially becomes the source of truth that\neverything in the code base eventually calls into to determine whether\nor no",
"cve_id": "CVE-2016-5199",
"dataset_source": "BigVul"
} | ||
bigvul_1418 | BigVul | CWE-264 | c | int touch(const char *path) {
return touch_file(path, false, USEC_INFINITY, UID_INVALID, GID_INVALID, 0);
} | int touch(const char *path) {
return touch_file(path, false, USEC_INFINITY, UID_INVALID, GID_INVALID, MODE_INVALID);
} | https://www.cvedetails.com/cve/CVE-2016-10156/ | systemd | ee735086f8670be1591fa9593e80dd60163a7a2f | medium | {
"commit_message": "util-lib: use MODE_INVALID as invalid value for mode_t everywhere",
"cve_id": "CVE-2016-10156",
"dataset_source": "BigVul"
} | ||
bigvul_1419 | BigVul | CWE-200 | c | void free_bprm(struct linux_binprm *bprm)
{
free_arg_pages(bprm);
if (bprm->cred) {
mutex_unlock(¤t->signal->cred_guard_mutex);
abort_creds(bprm->cred);
}
kfree(bprm);
} | void free_bprm(struct linux_binprm *bprm)
{
free_arg_pages(bprm);
if (bprm->cred) {
mutex_unlock(¤t->signal->cred_guard_mutex);
abort_creds(bprm->cred);
}
/* If a binfmt changed the interp, free it. */
if (bprm->interp != bprm->filename)
kfree(bprm->interp);
kfree(bprm);
} | https://www.cvedetails.com/cve/CVE-2012-4530/ | linux | b66c5984017533316fd1951770302649baf1aa33 | medium | {
"commit_message": "exec: do not leave bprm->interp on stack\n\nIf a series of scripts are executed, each triggering module loading via\nunprintable bytes in the script header, kernel stack contents can leak\ninto the comman",
"cve_id": "CVE-2012-4530",
"dataset_source": "BigVul"
} | ||
bigvul_1429 | BigVul | CWE-200 | c | status_t OMXNodeInstance::emptyBuffer(
OMX::buffer_id buffer,
OMX_U32 rangeOffset, OMX_U32 rangeLength,
OMX_U32 flags, OMX_TICKS timestamp, int fenceFd) {
Mutex::Autolock autoLock(mLock);
OMX_BUFFERHEADERTYPE *header = findBufferHeader(buffer, kPortIndexInput);
if (header == N... | status_t OMXNodeInstance::emptyBuffer(
OMX::buffer_id buffer,
OMX_U32 rangeOffset, OMX_U32 rangeLength,
OMX_U32 flags, OMX_TICKS timestamp, int fenceFd) {
Mutex::Autolock autoLock(mLock);
// no emptybuffer if using input surface
if (getGraphicBufferSource() != NULL) {
an... | https://www.cvedetails.com/cve/CVE-2016-6720/ | Android | 0f177948ae2640bfe4d70f8e4248e106406b3b0a | medium | {
"commit_message": "DO NOT MERGE: IOMX: work against metadata buffer spoofing\n\n- Prohibit direct set/getParam/Settings for extensions meant for\n OMXNodeInstance alone. This disallows enabling metadata mode\n without the",
"cve_id": "CVE-2016-6720",
"dataset_source": "BigVul"
} | ||
bigvul_1445 | BigVul | CWE-362 | c | static struct btrfs_dir_item *btrfs_match_dir_item_name(struct btrfs_root *root,
struct btrfs_path *path,
const char *name, int name_len)
{
struct btrfs_dir_item *dir_item;
unsigned long name_ptr;
u32 total_len;
u32 cur = 0;
u32 this_len;
struct extent_buffer *leaf;
leaf = path->nodes[0];
... | static struct btrfs_dir_item *btrfs_match_dir_item_name(struct btrfs_root *root,
struct btrfs_dir_item *btrfs_match_dir_item_name(struct btrfs_root *root,
struct btrfs_path *path,
const char *name, int name_len)
{
struct btrfs_dir_item *dir_item;
unsigned long name_ptr;
u32 total_len;
u32 cur = 0;
... | https://www.cvedetails.com/cve/CVE-2014-9710/ | linux | 5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 | medium | {
"commit_message": "Btrfs: make xattr replace operations atomic\n\nReplacing a xattr consists of doing a lookup for its existing value, delete\nthe current value from the respective leaf, release the search path and then\nfi",
"cve_id": "CVE-2014-9710",
"dataset_source": "BigVul"
} | ||
bigvul_1499 | BigVul | CWE-20 | c | static int ax25_recvmsg(struct kiocb *iocb, struct socket *sock,
struct msghdr *msg, size_t size, int flags)
{
struct sock *sk = sock->sk;
struct sk_buff *skb;
int copied;
int err = 0;
lock_sock(sk);
/*
* This works for seqpacket too. The receiver has ordered the
* queue for us! We do one quick check first... | static int ax25_recvmsg(struct kiocb *iocb, struct socket *sock,
struct msghdr *msg, size_t size, int flags)
{
struct sock *sk = sock->sk;
struct sk_buff *skb;
int copied;
int err = 0;
lock_sock(sk);
/*
* This works for seqpacket too. The receiver has ordered the
* queue for us! We do one quick check first... | https://www.cvedetails.com/cve/CVE-2013-7271/ | linux | f3d3342602f8bcbf37d7c46641cb9bca7618eb1c | medium | {
"commit_message": "net: rework recvmsg handler msg_name and msg_namelen logic\n\nThis patch now always passes msg->msg_namelen as 0. recvmsg handlers must\nset msg_namelen to the proper size <= sizeof(struct sockaddr_stora",
"cve_id": "CVE-2013-7271",
"dataset_source": "BigVul"
} | ||
bigvul_1508 | BigVul | CWE-399 | c | content::WebUIDataSource* CreateOobeUIDataSource(
const base::DictionaryValue& localized_strings,
const std::string& display_type) {
content::WebUIDataSource* source =
content::WebUIDataSource::Create(chrome::kChromeUIOobeHost);
source->AddLocalizedStrings(localized_strings);
source->SetJsonPath(kSt... | content::WebUIDataSource* CreateOobeUIDataSource(
const base::DictionaryValue& localized_strings,
const std::string& display_type) {
content::WebUIDataSource* source =
content::WebUIDataSource::Create(chrome::kChromeUIOobeHost);
source->AddLocalizedStrings(localized_strings);
source->SetJsonPath(kSt... | https://www.cvedetails.com/cve/CVE-2013-6663/ | Chrome | fb5dce12f0462056fc9f66967b0f7b2b7bcd88f5 | medium | {
"commit_message": "One polymer_config.js to rule them all.\n\nR=michaelpg@chromium.org,fukino@chromium.org,mfoltz@chromium.org\nBUG=425626\n\nReview URL: https://codereview.chromium.org/1224783005\n\nCr-Commit-Position: refs/h",
"cve_id": "CVE-2013-6663",
"dataset_source": "BigVul"
} | ||
bigvul_1536 | BigVul | CWE-120 | c | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
unsigned int retval;
size_t tmpretval;
if(!file) return 0;
str = openmpt_module_get_instrument_name(file->mod,qual-1);
if(!str){
if(buff){
*buff = '\0';
}
return 0;
}
tmpr... | LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff)
{
const char* str;
char buf[32];
if(!file) return 0;
str = openmpt_module_get_instrument_name(file->mod,qual-1);
memset(buf,0,32);
if(str){
strncpy(buf,str,31);
openmpt_free_string(str);
}
if(b... | https://www.cvedetails.com/cve/CVE-2019-17113/ | openmpt | 927688ddab43c2b203569de79407a899e734fabe | medium | {
"commit_message": "[Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original li",
"cve_id": "CVE-2019-17113",
"dataset_source": "BigVul"
} | ||
bigvul_1574 | BigVul | CWE-20 | c | ssize_t nbd_wr_syncv(QIOChannel *ioc,
struct iovec *iov,
size_t niov,
size_t length,
bool do_read)
{
ssize_t done = 0;
Error *local_err = NULL;
struct iovec *local_iov = g_new(struct iovec, niov);
struct iovec *local_iov... | ssize_t nbd_wr_syncv(QIOChannel *ioc,
struct iovec *iov,
size_t niov,
size_t length,
bool do_read)
{
ssize_t done = 0;
Error *local_err = NULL;
struct iovec *local_iov = g_new(struct iovec, niov);
struct iovec *local_iov... | https://www.cvedetails.com/cve/CVE-2017-7539/ | qemu | ff82911cd3f69f028f2537825c9720ff78bc3f19 | medium | {
"commit_message": "",
"cve_id": "CVE-2017-7539",
"dataset_source": "BigVul"
} | ||
bigvul_1578 | BigVul | CWE-416 | c | void fe_netjoin_init(void)
{
settings_add_bool("misc", "hide_netsplit_quits", TRUE);
settings_add_int("misc", "netjoin_max_nicks", 10);
join_tag = -1;
printing_joins = FALSE;
read_settings();
signal_add("setup changed", (SIGNAL_FUNC) read_settings);
} | void fe_netjoin_init(void)
{
settings_add_bool("misc", "hide_netsplit_quits", TRUE);
settings_add_int("misc", "netjoin_max_nicks", 10);
join_tag = -1;
printing_joins = FALSE;
read_settings();
signal_add("setup changed", (SIGNAL_FUNC) read_settings);
signal_add("server disconnected", (SIGNAL_FUNC) sig_serv... | https://www.cvedetails.com/cve/CVE-2017-7191/ | irssi | 77b2631c78461965bc9a7414aae206b5c514e1b3 | medium | {
"commit_message": "Merge branch 'netjoin-timeout' into 'master'\n\nfe-netjoin: remove irc servers on \"server disconnected\" signal\n\nCloses #7\n\nSee merge request !10",
"cve_id": "CVE-2017-7191",
"dataset_source": "BigVul"
} | ||
bigvul_1596 | BigVul | CWE-119 | c | png_write_find_filter(png_structp png_ptr, png_row_infop row_info)
{
png_bytep best_row;
#ifdef PNG_WRITE_FILTER_SUPPORTED
png_bytep prev_row, row_buf;
png_uint_32 mins, bpp;
png_byte filter_to_do = png_ptr->do_filter;
png_uint_32 row_bytes = row_info->rowbytes;
#ifdef PNG_WRITE_WEIGHTED_FILTER_SUPPOR... | png_write_find_filter(png_structp png_ptr, png_row_infop row_info)
{
png_bytep best_row;
#ifdef PNG_WRITE_FILTER_SUPPORTED
png_bytep prev_row, row_buf;
png_uint_32 mins, bpp;
png_byte filter_to_do = png_ptr->do_filter;
png_uint_32 row_bytes = row_info->rowbytes;
png_debug(1, "in png_write_find_f... | https://www.cvedetails.com/cve/CVE-2015-8126/ | Chrome | 7f3d85b096f66870a15b37c2f40b219b2e292693 | medium | {
"commit_message": "third_party/libpng: update to 1.2.54\n\nTBR=darin@chromium.org\nBUG=560291\n\nReview URL: https://codereview.chromium.org/1467263003\n\nCr-Commit-Position: refs/heads/master@{#362298}",
"cve_id": "CVE-2015-8126",
"dataset_source": "BigVul"
} | ||
bigvul_1621 | BigVul | CWE-119 | c | const Chapters::Display* Chapters::Atom::GetDisplay(int index) const
{
if (index < 0)
return NULL;
if (index >= m_displays_count)
return NULL;
return m_displays + index;
} | const Chapters::Display* Chapters::Atom::GetDisplay(int index) const | https://www.cvedetails.com/cve/CVE-2016-1621/ | Android | 04839626ed859623901ebd3a5fd483982186b59d | medium | {
"commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2",
"cve_id": "CVE-2016-1621",
"dataset_source": "BigVul"
} | ||
bigvul_1622 | BigVul | CWE-269 | c | static void skel(const char *homedir, uid_t u, gid_t g) {
char *fname;
if (arg_zsh) {
if (asprintf(&fname, "%s/.zshrc", homedir) == -1)
errExit("asprintf");
struct stat s;
if (stat(fname, &s) == 0)
return;
if (stat("/etc/skel/.zshrc", &s) == 0) {
if (is_link("/etc/skel/.zshrc")) {
fprintf(stde... | static void skel(const char *homedir, uid_t u, gid_t g) {
char *fname;
if (arg_zsh) {
if (asprintf(&fname, "%s/.zshrc", homedir) == -1)
errExit("asprintf");
struct stat s;
if (stat(fname, &s) == 0)
return;
if (is_link(fname)) { // stat on dangling symlinks fails, try again using lstat
fprintf(stder... | https://www.cvedetails.com/cve/CVE-2017-5940/ | firejail | 903fd8a0789ca3cc3c21d84cd0282481515592ef | medium | {
"commit_message": "security fix",
"cve_id": "CVE-2017-5940",
"dataset_source": "BigVul"
} | ||
bigvul_1657 | BigVul | CWE-119 | c | void buffer_slow_realign(struct buffer *buf)
{
/* two possible cases :
* - the buffer is in one contiguous block, we move it in-place
* - the buffer is in two blocks, we move it via the swap_buffer
*/
if (buf->i) {
int block1 = buf->i;
int block2 ... | void buffer_slow_realign(struct buffer *buf)
{
int block1 = buf->o;
int block2 = 0;
/* process output data in two steps to cover wrapping */
if (block1 > buf->p - buf->data) {
block2 = buf->p - buf->data;
block1 -= block2;
}
memcpy(swap_buffer + ... | https://www.cvedetails.com/cve/CVE-2015-3281/ | haproxy | 7ec765568883b2d4e5a2796adbeb492a22ec9bd4 | medium | {
"commit_message": "",
"cve_id": "CVE-2015-3281",
"dataset_source": "BigVul"
} | ||
bigvul_1677 | BigVul | CWE-20 | c | Response PageHandler::SetDownloadBehavior(const std::string& behavior,
Maybe<std::string> download_path) {
WebContentsImpl* web_contents = GetWebContents();
if (!web_contents)
return Response::InternalError();
if (behavior == Page::SetDownloadBehavior::BehaviorEn... | Response PageHandler::SetDownloadBehavior(const std::string& behavior,
Maybe<std::string> download_path) {
if (!allow_set_download_behavior_)
return Response::Error("Not allowed.");
WebContentsImpl* web_contents = GetWebContents();
if (!web_contents)
return R... | https://www.cvedetails.com/cve/CVE-2018-18344/ | Chrome | c71d8045ce0592cf3f4290744ab57b23c1d1b4c6 | medium | {
"commit_message": "[DevTools] Do not allow Page.setDownloadBehavior for extensions\n\nBug: 866426\nChange-Id: I71b672978e1a8ec779ede49da16b21198567d3a4\nReviewed-on: https://chromium-review.googlesource.com/c/1270007\nCommit",
"cve_id": "CVE-2018-18344",
"dataset_source": "BigVul"
} | ||
bigvul_1703 | BigVul | CWE-285 | c | RenderFrameHostManager::GetSiteInstanceForNavigationRequest(
const NavigationRequest& request) {
SiteInstance* current_site_instance = render_frame_host_->GetSiteInstance();
bool no_renderer_swap_allowed = false;
bool was_server_redirect = request.navigation_handle() &&
request.na... | RenderFrameHostManager::GetSiteInstanceForNavigationRequest(
const NavigationRequest& request) {
SiteInstance* current_site_instance = render_frame_host_->GetSiteInstance();
bool no_renderer_swap_allowed = false;
bool was_server_redirect = request.navigation_handle() &&
request.na... | https://www.cvedetails.com/cve/CVE-2018-16073/ | Chrome | 0bb3f5c715eb66bb5c1fb05fd81d902ca57f33ca | medium | {
"commit_message": "Use unique processes for data URLs on restore.\n\nData URLs are usually put into the process that created them, but this\ninfo is not tracked after a tab restore. Ensure that they do not end up\nin the p",
"cve_id": "CVE-2018-16073",
"dataset_source": "BigVul"
} | ||
bigvul_1708 | BigVul | CWE-20 | c | AccessType GetExtensionAccess(const Extension* extension,
const GURL& url,
int tab_id) {
bool allowed_script = IsAllowedScript(extension, url, tab_id);
bool allowed_capture = extension->permissions_data()->CanCaptureVisiblePage(
url, tab... | AccessType GetExtensionAccess(const Extension* extension,
const GURL& url,
int tab_id) {
bool allowed_script = IsAllowedScript(extension, url, tab_id);
bool allowed_capture = extension->permissions_data()->CanCaptureVisiblePage(
url, tab... | https://www.cvedetails.com/cve/CVE-2019-5838/ | Chrome | 0660e08731fd42076d7242068e9eaed1482b14d5 | medium | {
"commit_message": "Call CanCaptureVisiblePage in page capture API.\n\nCurrently the pageCapture permission allows access\nto arbitrary local files and chrome:// pages which\ncan be a security concern. In order to address th",
"cve_id": "CVE-2019-5838",
"dataset_source": "BigVul"
} | ||
bigvul_1745 | BigVul | CWE-264 | c | int regset_tls_set(struct task_struct *target, const struct user_regset *regset,
unsigned int pos, unsigned int count,
const void *kbuf, const void __user *ubuf)
{
struct user_desc infobuf[GDT_ENTRY_TLS_ENTRIES];
const struct user_desc *info;
if (pos >= GDT_ENTRY_TLS_ENTRIES * sizeof(struct user_desc... | int regset_tls_set(struct task_struct *target, const struct user_regset *regset,
unsigned int pos, unsigned int count,
const void *kbuf, const void __user *ubuf)
{
struct user_desc infobuf[GDT_ENTRY_TLS_ENTRIES];
const struct user_desc *info;
int i;
if (pos >= GDT_ENTRY_TLS_ENTRIES * sizeof(struct u... | https://www.cvedetails.com/cve/CVE-2014-8133/ | linux | 41bdc78544b8a93a9c6814b8bbbfef966272abbe | medium | {
"commit_message": "x86/tls: Validate TLS entries to protect espfix\n\nInstalling a 16-bit RW data segment into the GDT defeats espfix.\nAFAICT this will not affect glibc, Wine, or dosemu at all.\n\nSigned-off-by: Andy Lutomi",
"cve_id": "CVE-2014-8133",
"dataset_source": "BigVul"
} | ||
bigvul_1768 | BigVul | CWE-125 | c | cisco_autorp_print(netdissect_options *ndo,
register const u_char *bp, register u_int len)
{
int type;
int numrps;
int hold;
ND_TCHECK(bp[0]);
ND_PRINT((ndo, " auto-rp "));
type = bp[0];
switch (type) {
case 0x11:
ND_PRINT((ndo, "candidate-advert"));
break;
case 0x12:
ND_PRINT((... | cisco_autorp_print(netdissect_options *ndo,
register const u_char *bp, register u_int len)
{
int type;
int numrps;
int hold;
if (len < 8)
goto trunc;
ND_TCHECK(bp[0]);
ND_PRINT((ndo, " auto-rp "));
type = bp[0];
switch (type) {
case 0x11:
ND_PRINT((ndo, "candidate-advert"));
bre... | https://www.cvedetails.com/cve/CVE-2017-13030/ | tcpdump | 5dc1860d8267b1e0cb78c9ffa2a40bea2fdb3ddc | medium | {
"commit_message": "CVE-2017-13030/PIM: Redo bounds checks and add length checks.\n\nUse ND_TCHECK macros to do bounds checking, and add length checks before\nthe bounds checks.\n\nAdd a bounds check that the review process f",
"cve_id": "CVE-2017-13030",
"dataset_source": "BigVul"
} | ||
bigvul_1769 | BigVul | CWE-125 | c | l2tp_proxy_auth_type_print(netdissect_options *ndo, const u_char *dat)
{
const uint16_t *ptr = (const uint16_t *)dat;
ND_PRINT((ndo, "%s", tok2str(l2tp_authentype2str,
"AuthType-#%u", EXTRACT_16BITS(ptr))));
} | l2tp_proxy_auth_type_print(netdissect_options *ndo, const u_char *dat)
l2tp_proxy_auth_type_print(netdissect_options *ndo, const u_char *dat, u_int length)
{
const uint16_t *ptr = (const uint16_t *)dat;
if (length < 2) {
ND_PRINT((ndo, "AVP too short"));
return;
}
ND_PRINT((ndo, "%s", tok2str(l2tp_authenty... | https://www.cvedetails.com/cve/CVE-2017-13006/ | tcpdump | cc4a7391c616be7a64ed65742ef9ed3f106eb165 | medium | {
"commit_message": "CVE-2017-13006/L2TP: Check whether an AVP's content exceeds the AVP length.\n\nIt's not good enough to check whether all the data specified by the AVP\nlength was captured - you also have to check whethe",
"cve_id": "CVE-2017-13006",
"dataset_source": "BigVul"
} | ||
bigvul_1779 | BigVul | CWE-200 | c | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | https://www.cvedetails.com/cve/CVE-2017-13143/ | ImageMagick | 51b0ae01709adc1e4a9245e158ef17b85a110960 | medium | {
"commit_message": "https://github.com/ImageMagick/ImageMagick/issues/362",
"cve_id": "CVE-2017-13143",
"dataset_source": "BigVul"
} | ||
bigvul_1785 | BigVul | CWE-119 | c | void WT_VoiceGain (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_I32 *pMixBuffer;
EAS_PCM *pInputBuffer;
EAS_I32 gain;
EAS_I32 gainIncrement;
EAS_I32 tmp0;
EAS_I32 tmp1;
EAS_I32 tmp2;
EAS_I32 numSamples;
#if (NUM_OUTPUT_CHANNELS == 2)
EAS_I32 gainLeft, gainRight;
#endif
... | void WT_VoiceGain (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame)
{
EAS_I32 *pMixBuffer;
EAS_PCM *pInputBuffer;
EAS_I32 gain;
EAS_I32 gainIncrement;
EAS_I32 tmp0;
EAS_I32 tmp1;
EAS_I32 tmp2;
EAS_I32 numSamples;
#if (NUM_OUTPUT_CHANNELS == 2)
EAS_I32 gainLeft, gainRight;
#endif
... | https://www.cvedetails.com/cve/CVE-2016-0838/ | Android | 24d7c408c52143bce7b49de82f3913fd8d1219cf | medium | {
"commit_message": "Sonivox: add SafetyNet log.\n\nBug: 26366256\nChange-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0\n",
"cve_id": "CVE-2016-0838",
"dataset_source": "BigVul"
} | ||
bigvul_1802 | BigVul | CWE-200 | c | int Visualizer_command(effect_handle_t self, uint32_t cmdCode, uint32_t cmdSize,
void *pCmdData, uint32_t *replySize, void *pReplyData) {
VisualizerContext * pContext = (VisualizerContext *)self;
int retsize;
if (pContext == NULL || pContext->mState == VISUALIZER_STATE_UNINITIALIZED) {
return -EINVAL;
}
swit... | int Visualizer_command(effect_handle_t self, uint32_t cmdCode, uint32_t cmdSize,
void *pCmdData, uint32_t *replySize, void *pReplyData) {
VisualizerContext * pContext = (VisualizerContext *)self;
int retsize;
if (pContext == NULL || pContext->mState == VISUALIZER_STATE_UNINITIALIZED) {
return -EINVAL;
}
swit... | https://www.cvedetails.com/cve/CVE-2017-0396/ | Android | 557bd7bfe6c4895faee09e46fc9b5304a956c8b7 | medium | {
"commit_message": "Visualizer: Check capture size and latency parameters\n\nBug: 31781965\nChange-Id: I1c439a0d0f6aa0057b3c651499f28426e1e1f5e4\n(cherry picked from commit 9a2732ba0a8d609ab040d2c1ddee28577ead9772)\n",
"cve_id": "CVE-2017-0396",
"dataset_source": "BigVul"
} | ||
bigvul_1813 | BigVul | CWE-119 | c | void GDataCache::Pin(const std::string& resource_id,
const std::string& md5,
FileOperationType file_operation_type,
base::PlatformFileError* error) {
AssertOnSequencedWorkerPool();
DCHECK(error);
FilePath source_path;
FilePath dest_path;
FilePath... | void GDataCache::Pin(const std::string& resource_id,
const std::string& md5,
FileOperationType file_operation_type,
base::PlatformFileError* error) {
AssertOnSequencedWorkerPool();
DCHECK(error);
FilePath source_path;
FilePath dest_path;
FilePath... | https://www.cvedetails.com/cve/CVE-2012-2895/ | Chrome | baef1ffd73db183ca50c854e1779ed7f6e5100a8 | medium | {
"commit_message": "Revert 144993 - gdata: Remove invalid files in the cache directories\n\nBroke linux_chromeos_valgrind:\nhttp://build.chromium.org/p/chromium.memory.fyi/builders/Chromium%20OS%20%28valgrind%29%285%29/buil",
"cve_id": "CVE-2012-2895",
"dataset_source": "BigVul"
} | ||
bigvul_1821 | BigVul | CWE-284 | c | int socket_accept(int fd, uint16_t port)
{
#ifdef WIN32
int addr_len;
#else
socklen_t addr_len;
#endif
int result;
struct sockaddr_in addr;
memset(&addr, 0, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_addr.s_addr = htonl(INADDR_ANY);
addr.sin_port = htons(port);
addr_len = sizeof(addr);
result ... | int socket_accept(int fd, uint16_t port)
{
#ifdef WIN32
int addr_len;
#else
socklen_t addr_len;
#endif
int result;
struct sockaddr_in addr;
memset(&addr, 0, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
addr.sin_port = htons(port);
addr_len = sizeof(addr);
re... | https://www.cvedetails.com/cve/CVE-2016-5104/ | libimobiledevice | df1f5c4d70d0c19ad40072f5246ca457e7f9849e | medium | {
"commit_message": "common: [security fix] Make sure sockets only listen locally",
"cve_id": "CVE-2016-5104",
"dataset_source": "BigVul"
} | ||
bigvul_1831 | BigVul | CWE-20 | c | EncodedJSValue JSC_HOST_CALL jsTestObjPrototypeFunctionConvert2(ExecState* exec)
{
JSValue thisValue = exec->hostThisValue();
if (!thisValue.inherits(&JSTestObj::s_info))
return throwVMTypeError(exec);
JSTestObj* castedThis = jsCast<JSTestObj*>(asObject(thisValue));
ASSERT_GC_OBJECT_INHERITS(ca... | EncodedJSValue JSC_HOST_CALL jsTestObjPrototypeFunctionConvert2(ExecState* exec)
{
JSValue thisValue = exec->hostThisValue();
if (!thisValue.inherits(&JSTestObj::s_info))
return throwVMTypeError(exec);
JSTestObj* castedThis = jsCast<JSTestObj*>(asObject(thisValue));
ASSERT_GC_OBJECT_INHERITS(ca... | https://www.cvedetails.com/cve/CVE-2011-2350/ | Chrome | b944f670bb7a8a919daac497a4ea0536c954c201 | medium | {
"commit_message": "[JSC] Implement a helper method createNotEnoughArgumentsError()\nhttps://bugs.webkit.org/show_bug.cgi?id=85102\n\nReviewed by Geoffrey Garen.\n\nIn bug 84787, kbr@ requested to avoid hard-coding\ncreateType",
"cve_id": "CVE-2011-2350",
"dataset_source": "BigVul"
} | ||
bigvul_1847 | BigVul | CWE-125 | c | static int piv_match_card_continued(sc_card_t *card)
{
int i;
int type = -1;
piv_private_data_t *priv = NULL;
int saved_type = card->type;
/* Since we send an APDU, the card's logout function may be called...
* however it may be in dirty memory */
card->ops->logout = NULL;
/* piv_match_card may be called wi... | static int piv_match_card_continued(sc_card_t *card)
{
int i;
int type = -1;
piv_private_data_t *priv = NULL;
int saved_type = card->type;
/* Since we send an APDU, the card's logout function may be called...
* however it may be in dirty memory */
card->ops->logout = NULL;
/* piv_match_card may be called wi... | https://www.cvedetails.com/cve/CVE-2018-16427/ | OpenSC | 8fe377e93b4b56060e5bbfb6f3142ceaeca744fa | medium | {
"commit_message": "fixed out of bounds reads\n\nThanks to Eric Sesterhenn from X41 D-SEC GmbH\nfor reporting and suggesting security fixes.",
"cve_id": "CVE-2018-16427",
"dataset_source": "BigVul"
} | ||
bigvul_1880 | BigVul | CWE-415 | c | read_gif(Gif_Reader *grr, int read_flags,
const char* landmark, Gif_ReadErrorHandler handler)
{
Gif_Stream *gfs;
Gif_Image *gfi;
Gif_Context gfc;
int unknown_block_type = 0;
if (gifgetc(grr) != 'G' ||
gifgetc(grr) != 'I' ||
gifgetc(grr) != 'F')
return 0;
(void)gifgetc(grr);
(void)gifget... | read_gif(Gif_Reader *grr, int read_flags,
const char* landmark, Gif_ReadErrorHandler handler)
{
Gif_Stream *gfs;
Gif_Image *gfi;
Gif_Context gfc;
int unknown_block_type = 0;
if (gifgetc(grr) != 'G' ||
gifgetc(grr) != 'I' ||
gifgetc(grr) != 'F')
return 0;
(void)gifgetc(grr);
(void)gifget... | https://www.cvedetails.com/cve/CVE-2017-18120/ | gifsicle | 118a46090c50829dc543179019e6140e1235f909 | medium | {
"commit_message": "gif_read: Set last_name = NULL unconditionally.\n\nWith a non-malicious GIF, last_name is set to NULL when a name\nextension is followed by an image. Reported in #117, via\nDebian, via a KAIST fuzzing pro",
"cve_id": "CVE-2017-18120",
"dataset_source": "BigVul"
} | ||
bigvul_1893 | BigVul | CWE-119 | c | exsltCryptoRc4DecryptFunction (xmlXPathParserContextPtr ctxt, int nargs) {
int key_len = 0, key_size = 0;
int str_len = 0, bin_len = 0, ret_len = 0;
xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin =
NULL, *ret = NULL;
xsltTransformContextPtr tctxt = NULL;
if (nargs != 2) {
xmlXPathSet... | exsltCryptoRc4DecryptFunction (xmlXPathParserContextPtr ctxt, int nargs) {
int key_len = 0;
int str_len = 0, bin_len = 0, ret_len = 0;
xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin =
NULL, *ret = NULL;
xsltTransformContextPtr tctxt = NULL;
if (nargs != 2) {
xmlXPathSetArityError (ct... | https://www.cvedetails.com/cve/CVE-2016-1683/ | Chrome | 96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab | medium | {
"commit_message": "Roll libxslt to 891681e3e948f31732229f53cb6db7215f740fc7\n\nBUG=583156,583171\n\nReview URL: https://codereview.chromium.org/1853083002\n\nCr-Commit-Position: refs/heads/master@{#385338}",
"cve_id": "CVE-2016-1683",
"dataset_source": "BigVul"
} | ||
bigvul_1895 | BigVul | CWE-310 | c | int SSL_library_init(void)
{
#ifndef OPENSSL_NO_DES
EVP_add_cipher(EVP_des_cbc());
EVP_add_cipher(EVP_des_ede3_cbc());
#endif
#ifndef OPENSSL_NO_IDEA
EVP_add_cipher(EVP_idea_cbc());
#endif
#ifndef OPENSSL_NO_RC4
EVP_add_cipher(EVP_rc4());
#if !defined(OPENSSL_NO_MD5) && (defined(__x86_64) || defined(__x86_64__))
... | int SSL_library_init(void)
{
#ifndef OPENSSL_NO_DES
EVP_add_cipher(EVP_des_cbc());
EVP_add_cipher(EVP_des_ede3_cbc());
#endif
#ifndef OPENSSL_NO_IDEA
EVP_add_cipher(EVP_idea_cbc());
#endif
#ifndef OPENSSL_NO_RC4
EVP_add_cipher(EVP_rc4());
#if !defined(OPENSSL_NO_MD5) && (defined(__x86_64) || defined(__x86_64__))
... | https://www.cvedetails.com/cve/CVE-2012-2686/ | openssl | 125093b59f3c2a2d33785b5563d929d0472f1721 | medium | {
"commit_message": "",
"cve_id": "CVE-2012-2686",
"dataset_source": "BigVul"
} | ||
bigvul_1950 | BigVul | CWE-399 | c | handle_associated_event(struct cpu_hw_events *cpuc,
int idx, struct perf_sample_data *data, struct pt_regs *regs)
{
struct perf_event *event = cpuc->events[idx];
struct hw_perf_event *hwc = &event->hw;
mipspmu_event_update(event, hwc, idx);
data->period = event->hw.last_period;
if (!mipspmu_event_set_period(eve... | handle_associated_event(struct cpu_hw_events *cpuc,
int idx, struct perf_sample_data *data, struct pt_regs *regs)
{
struct perf_event *event = cpuc->events[idx];
struct hw_perf_event *hwc = &event->hw;
mipspmu_event_update(event, hwc, idx);
data->period = event->hw.last_period;
if (!mipspmu_event_set_period(eve... | https://www.cvedetails.com/cve/CVE-2011-2918/ | linux | a8b0ca17b80e92faab46ee7179ba9e99ccb61233 | medium | {
"commit_message": "perf: Remove the nmi parameter from the swevent and overflow interface\n\nThe nmi parameter indicated if we could do wakeups from the current\ncontext, if not, we would set some state and self-IPI and le",
"cve_id": "CVE-2011-2918",
"dataset_source": "BigVul"
} | ||
bigvul_1978 | BigVul | CWE-20 | c | int __glXDispSwap_CreateContext(__GLXclientState *cl, GLbyte *pc)
{
xGLXCreateContextReq *req = (xGLXCreateContextReq *) pc;
__GLX_DECLARE_SWAP_VARIABLES;
__GLX_SWAP_SHORT(&req->length);
__GLX_SWAP_INT(&req->context);
__GLX_SWAP_INT(&req->visual);
return __glXDisp_CreateContext(cl, pc);
... | int __glXDispSwap_CreateContext(__GLXclientState *cl, GLbyte *pc)
{
ClientPtr client = cl->client;
xGLXCreateContextReq *req = (xGLXCreateContextReq *) pc;
__GLX_DECLARE_SWAP_VARIABLES;
REQUEST_SIZE_MATCH(xGLXCreateContextReq);
__GLX_SWAP_SHORT(&req->length);
__GLX_SWAP_INT(&req->context... | https://www.cvedetails.com/cve/CVE-2010-4818/ | xserver | 6c69235a9dfc52e4b4e47630ff4bab1a820eb543 | medium | {
"commit_message": "",
"cve_id": "CVE-2010-4818",
"dataset_source": "BigVul"
} | ||
bigvul_1982 | BigVul | CWE-189 | c | struct xt_table_info *xt_alloc_table_info(unsigned int size)
{
struct xt_table_info *info = NULL;
size_t sz = sizeof(*info) + size;
/* Pedantry: prevent them from hitting BUG() in vmalloc.c --RR */
if ((SMP_ALIGN(size) >> PAGE_SHIFT) + 2 > totalram_pages)
return NULL;
if (sz <= (PAGE_SIZE << PAGE_ALLOC_C... | struct xt_table_info *xt_alloc_table_info(unsigned int size)
{
struct xt_table_info *info = NULL;
size_t sz = sizeof(*info) + size;
if (sz < sizeof(*info))
return NULL;
/* Pedantry: prevent them from hitting BUG() in vmalloc.c --RR */
if ((SMP_ALIGN(size) >> PAGE_SHIFT) + 2 > totalram_pages)
return NUL... | https://www.cvedetails.com/cve/CVE-2016-3135/ | linux | d157bd761585605b7882935ffb86286919f62ea1 | medium | {
"commit_message": "netfilter: x_tables: check for size overflow\n\nBen Hawkes says:\n integer overflow in xt_alloc_table_info, which on 32-bit systems can\n lead to small structure allocation and a copy_from_user based heap",
"cve_id": "CVE-2016-3135",
"dataset_source": "BigVul"
} | ||
bigvul_1987 | BigVul | CWE-264 | c | static int kvm_vm_ioctl_assign_device(struct kvm *kvm,
struct kvm_assigned_pci_dev *assigned_dev)
{
int r = 0, idx;
struct kvm_assigned_dev_kernel *match;
struct pci_dev *dev;
if (!(assigned_dev->flags & KVM_DEV_ASSIGN_ENABLE_IOMMU))
return -EINVAL;
mutex_lock(&kvm->lock);
idx = srcu_read_lo... | static int kvm_vm_ioctl_assign_device(struct kvm *kvm,
struct kvm_assigned_pci_dev *assigned_dev)
{
int r = 0, idx;
struct kvm_assigned_dev_kernel *match;
struct pci_dev *dev;
u8 header_type;
if (!(assigned_dev->flags & KVM_DEV_ASSIGN_ENABLE_IOMMU))
return -EINVAL;
mutex_lock(&kvm->lock);
i... | https://www.cvedetails.com/cve/CVE-2011-4347/ | linux | c4e7f9022e506c6635a5037713c37118e23193e4 | medium | {
"commit_message": "KVM: Device assignment permission checks\n\n(cherry picked from commit 3d27e23b17010c668db311140b17bbbb70c78fb9)\n\nOnly allow KVM device assignment to attach to devices which:\n\n - Are not bridges\n - Have",
"cve_id": "CVE-2011-4347",
"dataset_source": "BigVul"
} | ||
bigvul_2005 | BigVul | CWE-119 | c | static Image *ReadWMFImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
double
bounding_height,
bounding_width,
image_height,
image_height_inch,
image_width,
image_width_inch,
resolution_y,
resolution_x,
units_per_inch;
float
wmf_width,
wmf_height;
Image
... | static Image *ReadWMFImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
double
bounding_height,
bounding_width,
image_height,
image_height_inch,
image_width,
image_width_inch,
resolution_y,
resolution_x,
units_per_inch;
float
wmf_width,
wmf_height;
Image
... | https://www.cvedetails.com/cve/CVE-2016-10066/ | ImageMagick | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | medium | {
"commit_message": "",
"cve_id": "CVE-2016-10066",
"dataset_source": "BigVul"
} | ||
bigvul_2021 | BigVul | CWE-190 | c | static void controloptions (lua_State *L, int opt, const char **fmt,
Header *h) {
switch (opt) {
case ' ': return; /* ignore white spaces */
case '>': h->endian = BIG; return;
case '<': h->endian = LITTLE; return;
case '!': {
int a = getnum(L, fmt, MAXALIGN);
... | static void controloptions (lua_State *L, int opt, const char **fmt,
Header *h) {
switch (opt) {
case ' ': return; /* ignore white spaces */
case '>': h->endian = BIG; return;
case '<': h->endian = LITTLE; return;
case '!': {
int a = getnum(fmt, MAXALIGN);
... | https://www.cvedetails.com/cve/CVE-2018-11219/ | redis | 1eb08bcd4634ae42ec45e8284923ac048beaa4c3 | medium | {
"commit_message": "Security: update Lua struct package for security.\n\nDuring an auditing Apple found that the \"struct\" Lua package\nwe ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains\na security prob",
"cve_id": "CVE-2018-11219",
"dataset_source": "BigVul"
} | ||
bigvul_2039 | BigVul | CWE-20 | c | static int remove_bond(const bt_bdaddr_t *bd_addr)
{
/* sanity check */
if (interface_ready() == FALSE)
return BT_STATUS_NOT_READY;
return btif_dm_remove_bond(bd_addr);
} | static int remove_bond(const bt_bdaddr_t *bd_addr)
{
if (is_restricted_mode() && !btif_storage_is_restricted_device(bd_addr))
return BT_STATUS_SUCCESS;
/* sanity check */
if (interface_ready() == FALSE)
return BT_STATUS_NOT_READY;
return btif_dm_remove_bond(bd_addr);
} | https://www.cvedetails.com/cve/CVE-2016-3760/ | Android | 37c88107679d36c419572732b4af6e18bb2f7dce | medium | {
"commit_message": "Add guest mode functionality (2/3)\n\nAdd a flag to enable() to start Bluetooth in restricted\nmode. In restricted mode, all devices that are paired during\nrestricted mode are deleted upon leaving restri",
"cve_id": "CVE-2016-3760",
"dataset_source": "BigVul"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.