id
stringlengths
8
13
source_dataset
stringclasses
1 value
cwe
stringclasses
84 values
language
stringclasses
2 values
vulnerable_code
stringlengths
27
234k
secure_code
stringlengths
15
235k
url
stringlengths
45
48
repository
stringclasses
266 values
commit_hash
stringlengths
6
81
timestamp
stringclasses
1 value
cvss_score
stringclasses
1 value
severity
stringclasses
1 value
metadata
dict
bigvul_5
BigVul
CWE-415
c
gss_get_mic (minor_status, context_handle, qop_req, message_buffer, msg_token) OM_uint32 * minor_status; gss_ctx_id_t context_handle; gss_qop_t qop_req; gss_buffer_t message_buffer; gss_buffer_t msg_token; { OM_uint32 status; gss_union_ctx_id_t ctx; gss_mechanism mech; s...
gss_get_mic (minor_status, context_handle, qop_req, message_buffer, msg_token) OM_uint32 * minor_status; gss_ctx_id_t context_handle; gss_qop_t qop_req; gss_buffer_t message_buffer; gss_buffer_t msg_token; { OM_uint32 status; gss_union_ctx_id_t ctx; gss_mechanism mech; s...
https://www.cvedetails.com/cve/CVE-2017-11462/
krb5
56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
medium
{ "commit_message": "Preserve GSS context on init/accept failure\n\nAfter gss_init_sec_context() or gss_accept_sec_context() has created a\ncontext, don't delete the mechglue context on failures from subsequent\ncalls, even i", "cve_id": "CVE-2017-11462", "dataset_source": "BigVul" }
bigvul_13
BigVul
CWE-787
c
void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id, mojo::ScopedSharedBufferHandle handle) { DVLOG(1) << __func__ << " buffer_id: " << buffer_id; DCHECK(io_thread_checker_.CalledOnValidThread()); DCHECK(handle.is_valid()); base::SharedMemoryHandle memory_handle; ...
void VideoCaptureImpl::OnBufferCreated(int32_t buffer_id, mojo::ScopedSharedBufferHandle handle) { DVLOG(1) << __func__ << " buffer_id: " << buffer_id; DCHECK(io_thread_checker_.CalledOnValidThread()); DCHECK(handle.is_valid()); base::SharedMemoryHandle memory_handle; ...
https://www.cvedetails.com/cve/CVE-2018-6063/
Chrome
673ce95d481ea9368c4d4d43ac756ba1d6d9e608
medium
{ "commit_message": "Correct mojo::WrapSharedMemoryHandle usage\n\nFixes some incorrect uses of mojo::WrapSharedMemoryHandle which\nwere assuming that the call actually has any control over the memory\nprotection applied to a", "cve_id": "CVE-2018-6063", "dataset_source": "BigVul" }
bigvul_37
BigVul
CWE-125
c
frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2) { register const struct ip6_frag *dp; register const struct ip6_hdr *ip6; dp = (const struct ip6_frag *)bp; ip6 = (const struct ip6_hdr *)bp2; ND_TCHECK(dp->ip6f_offlg); if (ndo->ndo_vflag) { ND_PRINT((ndo, "fra...
frag6_print(netdissect_options *ndo, register const u_char *bp, register const u_char *bp2) { register const struct ip6_frag *dp; register const struct ip6_hdr *ip6; dp = (const struct ip6_frag *)bp; ip6 = (const struct ip6_hdr *)bp2; ND_TCHECK(*dp); if (ndo->ndo_vflag) { ND_PRINT((ndo, "frag (0x%08x:%...
https://www.cvedetails.com/cve/CVE-2017-13031/
tcpdump
2d669862df7cd17f539129049f6fb70d17174125
medium
{ "commit_message": "CVE-2017-13031/Check for the presence of the entire IPv6 fragment header.\n\nThis fixes a buffer over-read discovered by Bhargava Shastry,\nSecT/TU Berlin.\n\nAdd a test using the capture file supplied by ", "cve_id": "CVE-2017-13031", "dataset_source": "BigVul" }
bigvul_69
BigVul
CWE-119
c
EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const { RefPtr<EntrySyncCallbackHelper> helper = EntrySyncCallbackHelper::create(); m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchro...
EntrySync* EntrySync::copyTo(DirectoryEntrySync* parent, const String& name, ExceptionState& exceptionState) const { EntrySyncCallbackHelper* helper = EntrySyncCallbackHelper::create(); m_fileSystem->copy(this, parent, name, helper->successCallback(), helper->errorCallback(), DOMFileSystemBase::Synchronous); ...
https://www.cvedetails.com/cve/CVE-2013-0917/
Chrome
02c8303512ebed345011f7b545e2f418799be2f0
medium
{ "commit_message": "Oilpan: Ship Oilpan for SyncCallbackHelper, CreateFileResult and CallbackWrapper in filesystem/\n\nThese are leftovers when we shipped Oilpan for filesystem/ once.\n\nBUG=340522\n\nReview URL: https://coder", "cve_id": "CVE-2013-0917", "dataset_source": "BigVul" }
bigvul_70
BigVul
CWE-119
c
ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl( ScriptState* scriptState, mojom::blink::WebBluetoothGATTQueryQuantity quantity, String servicesUUID) { if (!connected()) { return ScriptPromise::rejectWithDOMException( scriptState, DOMException::create(NetworkError, kGAT...
ScriptPromise BluetoothRemoteGATTServer::getPrimaryServicesImpl( ScriptState* scriptState, mojom::blink::WebBluetoothGATTQueryQuantity quantity, String servicesUUID) { if (!connected()) { return ScriptPromise::rejectWithDOMException( scriptState, DOMException::create(NetworkError, kGAT...
https://www.cvedetails.com/cve/CVE-2015-1215/
Chrome
2bceda4948deeaed0a5a99305d0d488eb952f64f
medium
{ "commit_message": "Allow serialization of empty bluetooth uuids.\n\nThis change allows the passing WTF::Optional<String> types as\nbluetooth.mojom.UUID optional parameter without needing to ensure the passed\nobject isn't e", "cve_id": "CVE-2015-1215", "dataset_source": "BigVul" }
bigvul_91
BigVul
CWE-190
c
static void common_hrtimer_rearm(struct k_itimer *timr) { struct hrtimer *timer = &timr->it.real.timer; if (!timr->it_interval) return; timr->it_overrun += (unsigned int) hrtimer_forward(timer, timer->base->get_time(), timr->it_interval); hrtimer_restart(timer); }
static void common_hrtimer_rearm(struct k_itimer *timr) { struct hrtimer *timer = &timr->it.real.timer; if (!timr->it_interval) return; timr->it_overrun += hrtimer_forward(timer, timer->base->get_time(), timr->it_interval); hrtimer_restart(timer); }
https://www.cvedetails.com/cve/CVE-2018-12896/
linux
78c9c4dfbf8c04883941445a195276bb4bb92c76
medium
{ "commit_message": "posix-timers: Sanitize overrun handling\n\nThe posix timer overrun handling is broken because the forwarding functions\ncan return a huge number of overruns which does not fit in an int. As a\nconsequence", "cve_id": "CVE-2018-12896", "dataset_source": "BigVul" }
bigvul_114
BigVul
CWE-89
c
char *curl_easy_unescape(CURL *handle, const char *string, int length, int *olen) { int alloc = (length?length:(int)strlen(string))+1; char *ns = malloc(alloc); unsigned char in; int strindex=0; unsigned long hex; CURLcode res; if(!ns) return NULL; while(--alloc >...
char *curl_easy_unescape(CURL *handle, const char *string, int length, CURLcode Curl_urldecode(struct SessionHandle *data, const char *string, size_t length, char **ostring, size_t *olen, bool reject_ctrl) { size_t alloc = (length?length:strlen(...
https://www.cvedetails.com/cve/CVE-2012-0036/
curl
75ca568fa1c19de4c5358fed246686de8467c238
medium
{ "commit_message": "URL sanitize: reject URLs containing bad data\n\nProtocols (IMAP, POP3 and SMTP) that use the path part of a URL in a\ndecoded manner now use the new Curl_urldecode() function to reject URLs\nwith embedde", "cve_id": "CVE-2012-0036", "dataset_source": "BigVul" }
bigvul_120
BigVul
CWE-400
c
static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = 0U; while (y...
static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y, written; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = written ...
https://www.cvedetails.com/cve/CVE-2019-12973/
openjpeg
8ee335227bbcaf1614124046aa25e53d67b11ec3
medium
{ "commit_message": "convertbmp: detect invalid file dimensions early\n\nwidth/length dimensions read from bmp headers are not necessarily\nvalid. For instance they may have been maliciously set to very large\nvalues with the", "cve_id": "CVE-2019-12973", "dataset_source": "BigVul" }
bigvul_125
BigVul
CWE-119
c
const char* Chapters::Display::GetCountry() const { return m_country; }
const char* Chapters::Display::GetCountry() const
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
04839626ed859623901ebd3a5fd483982186b59d
medium
{ "commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_192
BigVul
CWE-119
c
nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd_writeargs *args) { unsigned int len, hdr, dlen; struct kvec *head = rqstp->rq_arg.head; int v; p = decode_fh(p, &args->fh); if (!p) return 0; p++; /* beginoffset */ args->offset = ntohl(*p++); /* offset */ p++; /* totalcount *...
nfssvc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd_writeargs *args) { unsigned int len, hdr, dlen; struct kvec *head = rqstp->rq_arg.head; int v; p = decode_fh(p, &args->fh); if (!p) return 0; p++; /* beginoffset */ args->offset = ntohl(*p++); /* offset */ p++; /* totalcount *...
https://www.cvedetails.com/cve/CVE-2017-7895/
linux
13bf9fbff0e5e099e2b6f003a0ab8ae145436309
medium
{ "commit_message": "nfsd: stricter decoding of write-like NFSv2/v3 ops\n\nThe NFSv2/v3 code does not systematically check whether we decode past\nthe end of the buffer. This generally appears to be harmless, but there\nare ", "cve_id": "CVE-2017-7895", "dataset_source": "BigVul" }
bigvul_196
BigVul
CWE-284
c
static void mntput_no_expire(struct mount *mnt) { rcu_read_lock(); mnt_add_count(mnt, -1); if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */ rcu_read_unlock(); return; } lock_mount_hash(); if (mnt_get_count(mnt)) { rcu_read_unlock(); unlock_mount_hash(); return; } if (unlikely(mnt->mnt.mnt_fl...
static void mntput_no_expire(struct mount *mnt) { rcu_read_lock(); mnt_add_count(mnt, -1); if (likely(mnt->mnt_ns)) { /* shouldn't be the last one */ rcu_read_unlock(); return; } lock_mount_hash(); if (mnt_get_count(mnt)) { rcu_read_unlock(); unlock_mount_hash(); return; } if (unlikely(mnt->mnt.mnt_fl...
https://www.cvedetails.com/cve/CVE-2014-9717/
linux
ce07d891a0891d3c0d0c2d73d577490486b809e1
medium
{ "commit_message": "mnt: Honor MNT_LOCKED when detaching mounts\n\nModify umount(MNT_DETACH) to keep mounts in the hash table that are\nlocked to their parent mounts, when the parent is lazily unmounted.\n\nIn mntput_no_expir", "cve_id": "CVE-2014-9717", "dataset_source": "BigVul" }
bigvul_198
BigVul
CWE-119
c
void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pAudioBuffer; EAS_I32 k; EAS_I32 b1; EAS_I32 b2; EAS_I32 z1; EAS_I32 z2; EAS_I32 acc0; EAS_I32 acc1; EAS_I32 numSamples; /* initialize some local variables */ numSamples = pWTIntFrame...
void WT_VoiceFilter (S_FILTER_CONTROL *pFilter, S_WT_INT_FRAME *pWTIntFrame) { EAS_PCM *pAudioBuffer; EAS_I32 k; EAS_I32 b1; EAS_I32 b2; EAS_I32 z1; EAS_I32 z2; EAS_I32 acc0; EAS_I32 acc1; EAS_I32 numSamples; /* initialize some local variables */ numSamples = pWTIntFrame...
https://www.cvedetails.com/cve/CVE-2016-0838/
Android
3ac044334c3ff6a61cb4238ff3ddaf17c7efcf49
medium
{ "commit_message": "Sonivox: sanity check numSamples.\n\nBug: 26366256\nChange-Id: I066888c25035ea4c60c88f316db4508dc4dab6bc\n", "cve_id": "CVE-2016-0838", "dataset_source": "BigVul" }
bigvul_201
BigVul
CWE-119
c
void EncoderTest::InitializeConfig() { const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0); ASSERT_EQ(VPX_CODEC_OK, res); }
void EncoderTest::InitializeConfig() { const vpx_codec_err_t res = codec_->DefaultEncoderConfig(&cfg_, 0); dec_cfg_ = vpx_codec_dec_cfg_t(); ASSERT_EQ(VPX_CODEC_OK, res); }
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
5a9753fca56f0eeb9f61e342b2fccffc364f9426
medium
{ "commit_message": "Merge Conflict Fix CL to lmp-mr1-release for ag/849478\n\nDO NOT MERGE - libvpx: Pull from upstream\n\nCurrent HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06\n\nBUG=23452792\n\nChange-Id: Ic78176fc369e0bacc71", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_210
BigVul
CWE-617
c
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
https://www.cvedetails.com/cve/CVE-2017-13658/
ImageMagick
e5c063a1007506ba69e97a35effcdef944421c89
medium
{ "commit_message": "https://github.com/ImageMagick/ImageMagick/issues/598", "cve_id": "CVE-2017-13658", "dataset_source": "BigVul" }
bigvul_259
BigVul
CWE-20
c
OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp, OMX_IN OMX_INDEXTYPE paramIndex, OMX_IN OMX_PTR paramData) { (void)hComp; OMX_ERRORTYPE eRet = OMX_ErrorNone; if (m_state == OMX_StateInvalid) { DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State"); return ...
OMX_ERRORTYPE omx_venc::set_parameter(OMX_IN OMX_HANDLETYPE hComp, OMX_IN OMX_INDEXTYPE paramIndex, OMX_IN OMX_PTR paramData) { (void)hComp; OMX_ERRORTYPE eRet = OMX_ErrorNone; if (m_state == OMX_StateInvalid) { DEBUG_PRINT_ERROR("ERROR: Set Param in Invalid State"); return ...
https://www.cvedetails.com/cve/CVE-2016-2480/
Android
560ccdb509a7b86186fac0fce1b25bd9a3e6a6e8
medium
{ "commit_message": "DO NOT MERGE mm-video-v4l2: vidc: validate omx param/config data\n\nCheck the sanity of config/param strcuture objects\npassed to get/set _ config()/parameter() methods.\n\nBug: 27533317\nSecurity Vulnerabi", "cve_id": "CVE-2016-2480", "dataset_source": "BigVul" }
bigvul_264
BigVul
CWE-264
c
void bnep_net_setup(struct net_device *dev) { memset(dev->broadcast, 0xff, ETH_ALEN); dev->addr_len = ETH_ALEN; ether_setup(dev); dev->netdev_ops = &bnep_netdev_ops; dev->watchdog_timeo = HZ * 2; }
void bnep_net_setup(struct net_device *dev) { memset(dev->broadcast, 0xff, ETH_ALEN); dev->addr_len = ETH_ALEN; ether_setup(dev); dev->priv_flags &= ~IFF_TX_SKB_SHARING; dev->netdev_ops = &bnep_netdev_ops; dev->watchdog_timeo = HZ * 2; }
https://www.cvedetails.com/cve/CVE-2011-4112/
linux
550fd08c2cebad61c548def135f67aba284c6162
medium
{ "commit_message": "net: Audit drivers to identify those needing IFF_TX_SKB_SHARING cleared\n\nAfter the last patch, We are left in a state in which only drivers calling\nether_setup have IFF_TX_SKB_SHARING set (we assume t", "cve_id": "CVE-2011-4112", "dataset_source": "BigVul" }
bigvul_292
BigVul
CWE-787
c
horizontalDifference16(unsigned short *ip, int n, int stride, unsigned short *wp, uint16 *From14) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; /* assumption is unsigned pixel values */ #undef CLAMP #define CLAMP(v) From14[(v) >> 2] mask = CODE_MASK; if (n >= stride) { if (stride == 3) { ...
horizontalDifference16(unsigned short *ip, int n, int stride, unsigned short *wp, uint16 *From14) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; /* assumption is unsigned pixel values */ #undef CLAMP #define CLAMP(v) From14[(v) >> 2] mask = CODE_MASK; if (n >= stride) { if (stride == 3) { ...
https://www.cvedetails.com/cve/CVE-2016-9537/
libtiff
83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f
medium
{ "commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan", "cve_id": "CVE-2016-9537", "dataset_source": "BigVul" }
bigvul_314
BigVul
CWE-189
cpp
void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) { int i, j; Guchar *inp, *tmp_line; switch (colorSpace->getMode()) { case csIndexed: case csSeparation: tmp_line = (Guchar *) gmalloc (length * nComps2); for (i = 0; i < length; i++) { for (j = 0; j < nComps2; j++...
void GfxImageColorMap::getRGBLine(Guchar *in, unsigned int *out, int length) { int i, j; Guchar *inp, *tmp_line; switch (colorSpace->getMode()) { case csIndexed: case csSeparation: tmp_line = (Guchar *) gmallocn (length, nComps2); for (i = 0; i < length; i++) { for (j = 0; j < nComps2; j++...
https://www.cvedetails.com/cve/CVE-2009-3605/
poppler
7b2d314a61fd0e12f47c62996cb49ec0d1ba747a
medium
{ "commit_message": "", "cve_id": "CVE-2009-3605", "dataset_source": "BigVul" }
bigvul_323
BigVul
CWE-20
c
void TabContentsContainerGtk::DetachTab(TabContents* tab) { gfx::NativeView widget = tab->web_contents()->GetNativeView(); if (widget) { GtkWidget* parent = gtk_widget_get_parent(widget); if (parent) { DCHECK_EQ(parent, expanded_); gtk_container_remove(GTK_CONTAINER(expanded_), widget); } ...
void TabContentsContainerGtk::DetachTab(TabContents* tab) { void TabContentsContainerGtk::DetachTab(WebContents* tab) { gfx::NativeView widget = tab->GetNativeView(); if (widget) { GtkWidget* parent = gtk_widget_get_parent(widget); if (parent) { DCHECK_EQ(parent, expanded_); gtk_container_remo...
https://www.cvedetails.com/cve/CVE-2012-5148/
Chrome
e89cfcb9090e8c98129ae9160c513f504db74599
medium
{ "commit_message": "Remove TabContents from TabStripModelObserver::TabDetachedAt.\n\nBUG=107201\nTEST=no visible change\n\n\nReview URL: https://chromiumcodereview.appspot.com/11293205\n\ngit-svn-id: svn://svn.chromium.org/chrom", "cve_id": "CVE-2012-5148", "dataset_source": "BigVul" }
bigvul_376
BigVul
CWE-190
c
int bmp_validate(jas_stream_t *in) { int n; int i; uchar buf[2]; assert(JAS_STREAM_MAXPUTBACK >= 2); /* Read the first two characters that constitute the signature. */ if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) { return -1; } /* Put the characters read back onto the stream. */ for (i = n - 1...
int bmp_validate(jas_stream_t *in) { int n; int i; jas_uchar buf[2]; assert(JAS_STREAM_MAXPUTBACK >= 2); /* Read the first two characters that constitute the signature. */ if ((n = jas_stream_read(in, (char *) buf, 2)) < 0) { return -1; } /* Put the characters read back onto the stream. */ for (i = n...
https://www.cvedetails.com/cve/CVE-2016-9557/
jasper
d42b2388f7f8e0332c846675133acea151fc557a
medium
{ "commit_message": "The generation of the configuration file jas_config.h has been completely\nreworked in order to avoid pollution of the global namespace.\n\nSome problematic types like uchar, ulong, and friends have been", "cve_id": "CVE-2016-9557", "dataset_source": "BigVul" }
bigvul_390
BigVul
CWE-732
c
void PlatformSensorProviderAndroid::CreateSensorInternal( mojom::SensorType type, mojo::ScopedSharedBufferMapping mapping, const CreateSensorCallback& callback) { JNIEnv* env = AttachCurrentThread(); switch (type) { case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES: CreateAbsolu...
void PlatformSensorProviderAndroid::CreateSensorInternal( mojom::SensorType type, SensorReadingSharedBuffer* reading_buffer, const CreateSensorCallback& callback) { JNIEnv* env = AttachCurrentThread(); switch (type) { case mojom::SensorType::ABSOLUTE_ORIENTATION_EULER_ANGLES: CreateAbso...
https://www.cvedetails.com/cve/CVE-2018-6057/
Chrome
c0c8978849ac57e4ecd613ddc8ff7852a2054734
medium
{ "commit_message": "android: Fix sensors in device service.\n\nThis patch fixes a bug that prevented more than one sensor data\nto be available at once when using the device motion/orientation\nAPI.\n\nThe issue was introduced", "cve_id": "CVE-2018-6057", "dataset_source": "BigVul" }
bigvul_396
BigVul
CWE-787
c
horizontalDifference8(unsigned char *ip, int n, int stride, unsigned short *wp, uint16 *From8) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; #undef CLAMP #define CLAMP(v) (From8[(v)]) mask = CODE_MASK; if (n >= stride) { if (stride == 3) { r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i...
horizontalDifference8(unsigned char *ip, int n, int stride, unsigned short *wp, uint16 *From8) { register int r1, g1, b1, a1, r2, g2, b2, a2, mask; #undef CLAMP #define CLAMP(v) (From8[(v)]) mask = CODE_MASK; if (n >= stride) { if (stride == 3) { r2 = wp[0] = CLAMP(ip[0]); g2 = wp[1] = CLAMP(i...
https://www.cvedetails.com/cve/CVE-2016-9537/
libtiff
83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f
medium
{ "commit_message": "* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities\nin heap or stack allocated buffers. Reported as MSVR 35093,\nMSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal\nChauhan", "cve_id": "CVE-2016-9537", "dataset_source": "BigVul" }
bigvul_411
BigVul
CWE-200
c
static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url, AVDictionary *opts, AVDictionary *opts2, int *is_http) { HLSContext *c = s->priv_data; AVDictionary *tmp = NULL; const char *proto_name = NULL; int ret; av_dict_copy(&tmp, opts, 0); av_dict_copy(&tmp,...
static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url, AVDictionary *opts, AVDictionary *opts2, int *is_http) { HLSContext *c = s->priv_data; AVDictionary *tmp = NULL; const char *proto_name = NULL; int ret; av_dict_copy(&tmp, opts, 0); av_dict_copy(&tmp,...
https://www.cvedetails.com/cve/CVE-2017-9993/
FFmpeg
189ff4219644532bdfa7bab28dfedaee4d6d4021
medium
{ "commit_message": "avformat/hls: Check local file extensions\n\nThis reduces the attack surface of local file-system\ninformation leaking.\n\nIt prevents the existing exploit leading to an information leak. As\nwell as simila", "cve_id": "CVE-2017-9993", "dataset_source": "BigVul" }
bigvul_493
BigVul
CWE-119
c
long Cluster::GetIndex() const { return m_index; }
long Cluster::GetIndex() const Cluster::Cluster(Segment* pSegment, long idx, long long element_start /* long long element_size */) : m_pSegment(pSegment), m_element_start(element_start), m_index(idx), m_pos(element_start), m_element_size(-1 /* element_size */), m_timec...
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
04839626ed859623901ebd3a5fd483982186b59d
medium
{ "commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_540
BigVul
CWE-362
c
int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb) { struct ip_options *sopt; unsigned char *sptr, *dptr; int soffset, doffset; int optlen; __be32 daddr; memset(dopt, 0, sizeof(struct ip_options)); sopt = &(IPCB(skb)->opt); if (sopt->optlen == 0) { dopt->optlen = 0; return 0; } ...
int ip_options_echo(struct ip_options * dopt, struct sk_buff * skb) int ip_options_echo(struct ip_options *dopt, struct sk_buff *skb) { const struct ip_options *sopt; unsigned char *sptr, *dptr; int soffset, doffset; int optlen; __be32 daddr; memset(dopt, 0, sizeof(struct ip_options)); sopt = &(IPCB(skb)...
https://www.cvedetails.com/cve/CVE-2012-3552/
linux
f6d8bd051c391c1c0458a30b2a7abcd939329259
medium
{ "commit_message": "inet: add RCU protection to inet->opt\n\nWe lack proper synchronization to manipulate inet->opt ip_options\n\nProblem is ip_make_skb() calls ip_setup_cork() and\nip_setup_cork() possibly makes a copy of ip", "cve_id": "CVE-2012-3552", "dataset_source": "BigVul" }
bigvul_550
BigVul
CWE-119
c
OMX_ERRORTYPE SoftAVC::setConfig( OMX_INDEXTYPE index, const OMX_PTR _params) { switch (index) { case OMX_IndexConfigVideoIntraVOPRefresh: { OMX_CONFIG_INTRAREFRESHVOPTYPE *params = (OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params; if (params->nPortIndex != kOutputPortI...
OMX_ERRORTYPE SoftAVC::setConfig( OMX_INDEXTYPE index, const OMX_PTR _params) { switch (index) { case OMX_IndexConfigVideoIntraVOPRefresh: { OMX_CONFIG_INTRAREFRESHVOPTYPE *params = (OMX_CONFIG_INTRAREFRESHVOPTYPE *)_params; if (!isValidOMXParam(params)) { ...
https://www.cvedetails.com/cve/CVE-2016-2476/
Android
295c883fe3105b19bcd0f9e07d54c6b589fc5bff
medium
{ "commit_message": "DO NOT MERGE Verify OMX buffer sizes prior to access\n\nBug: 27207275\nChange-Id: I4412825d1ee233d993af0a67708bea54304ff62d\n", "cve_id": "CVE-2016-2476", "dataset_source": "BigVul" }
bigvul_569
BigVul
CWE-416
c
static int link_pipe(struct pipe_inode_info *ipipe, struct pipe_inode_info *opipe, size_t len, unsigned int flags) { struct pipe_buffer *ibuf, *obuf; int ret = 0, i = 0, nbuf; /* * Potential ABBA deadlock, work around it by ordering lock * grabbing by pipe info address. Otherwise two different pro...
static int link_pipe(struct pipe_inode_info *ipipe, struct pipe_inode_info *opipe, size_t len, unsigned int flags) { struct pipe_buffer *ibuf, *obuf; int ret = 0, i = 0, nbuf; /* * Potential ABBA deadlock, work around it by ordering lock * grabbing by pipe info address. Otherwise two different pro...
https://www.cvedetails.com/cve/CVE-2019-11487/
linux
6b3a707736301c2128ca85ce85fb13f60b5e350a
medium
{ "commit_message": "Merge branch 'page-refs' (page ref overflow)\n\nMerge page ref overflow branch.\n\nJann Horn reported that he can overflow the page ref count with\nsufficient memory (and a filesystem that is intentionally", "cve_id": "CVE-2019-11487", "dataset_source": "BigVul" }
bigvul_587
BigVul
CWE-200
c
int omx_venc::async_message_process (void *context, void* message) { omx_video* omx = NULL; struct venc_msg *m_sVenc_msg = NULL; OMX_BUFFERHEADERTYPE* omxhdr = NULL; struct venc_buffer *temp_buff = NULL; if (context == NULL || message == NULL) { DEBUG_PRINT_ERROR("ERROR: omx_venc::async_message_proc...
int omx_venc::async_message_process (void *context, void* message) { omx_video* omx = NULL; struct venc_msg *m_sVenc_msg = NULL; OMX_BUFFERHEADERTYPE* omxhdr = NULL; struct venc_buffer *temp_buff = NULL; if (context == NULL || message == NULL) { DEBUG_PRINT_ERROR("ERROR: omx_venc::async_message_proc...
https://www.cvedetails.com/cve/CVE-2016-3835/
Android
7558d03e6498e970b761aa44fff6b2c659202d95
medium
{ "commit_message": "DO NOT MERGE mm-video-v4l2: venc: add checks before accessing heap pointers\n\nHeap pointers do not point to user virtual addresses in case\nof secure session.\nSet them to NULL and add checks to avoid ac", "cve_id": "CVE-2016-3835", "dataset_source": "BigVul" }
bigvul_594
BigVul
CWE-134
cpp
GahpServer::Reaper(Service *,int pid,int status) { /* This should be much better.... for now, if our Gahp Server goes away for any reason, we EXCEPT. */ GahpServer *dead_server = NULL; GahpServer *next_server = NULL; GahpServersById.startIterations(); while ( GahpServersById.iterate( next_server ) != 0 ) { ...
GahpServer::Reaper(Service *,int pid,int status) { /* This should be much better.... for now, if our Gahp Server goes away for any reason, we EXCEPT. */ GahpServer *dead_server = NULL; GahpServer *next_server = NULL; GahpServersById.startIterations(); while ( GahpServersById.iterate( next_server ) != 0 ) { ...
https://www.cvedetails.com/cve/CVE-2011-4930/
htcondor
5e5571d1a431eb3c61977b6dd6ec90186ef79867
medium
{ "commit_message": "", "cve_id": "CVE-2011-4930", "dataset_source": "BigVul" }
bigvul_607
BigVul
CWE-399
c
static void sample_hbp_handler(struct perf_event *bp, int nmi, struct perf_sample_data *data, struct pt_regs *regs) { printk(KERN_INFO "%s value is changed\n", ksym_name); dump_stack(); printk(KERN_INFO "Dump stack from sample_hbp_handler\n"); }
static void sample_hbp_handler(struct perf_event *bp, int nmi, static void sample_hbp_handler(struct perf_event *bp, struct perf_sample_data *data, struct pt_regs *regs) { printk(KERN_INFO "%s value is changed\n", ksym_name); dump_stack(); printk(KERN_INFO "Dump stack from sample_hbp_handler\n...
https://www.cvedetails.com/cve/CVE-2011-2918/
linux
a8b0ca17b80e92faab46ee7179ba9e99ccb61233
medium
{ "commit_message": "perf: Remove the nmi parameter from the swevent and overflow interface\n\nThe nmi parameter indicated if we could do wakeups from the current\ncontext, if not, we would set some state and self-IPI and le", "cve_id": "CVE-2011-2918", "dataset_source": "BigVul" }
bigvul_609
BigVul
CWE-362
c
void GCInfoTable::EnsureGCInfoIndex(const GCInfo* gc_info, size_t* gc_info_index_slot) { DCHECK(gc_info); DCHECK(gc_info_index_slot); DEFINE_THREAD_SAFE_STATIC_LOCAL(Mutex, mutex, ()); MutexLocker locker(mutex); if (*gc_info_index_slot) return; int index = ++...
void GCInfoTable::EnsureGCInfoIndex(const GCInfo* gc_info, size_t* gc_info_index_slot) { DCHECK(gc_info); DCHECK(gc_info_index_slot); // Ensuring a new index involves current index adjustment as well // as potentially resizing the table, both operations that require // ...
https://www.cvedetails.com/cve/CVE-2018-6158/
Chrome
20b65d00ca3d8696430e22efad7485366f8c3a21
medium
{ "commit_message": "[oilpan] Fix GCInfoTable for multiple threads\n\nPreviously, grow and access from different threads could lead to a race\non the table backing; see bug.\n\n- Rework the table to work on an existing reserva", "cve_id": "CVE-2018-6158", "dataset_source": "BigVul" }
bigvul_635
BigVul
CWE-399
c
void unix_inflight(struct file *fp) { struct sock *s = unix_get_socket(fp); spin_lock(&unix_gc_lock); if (s) { struct unix_sock *u = unix_sk(s); if (atomic_long_inc_return(&u->inflight) == 1) { BUG_ON(!list_empty(&u->link)); list_add_tail(&u->link, &gc_inflight_list); } else { BUG_ON(list_empty(...
void unix_inflight(struct file *fp) void unix_inflight(struct user_struct *user, struct file *fp) { struct sock *s = unix_get_socket(fp); spin_lock(&unix_gc_lock); if (s) { struct unix_sock *u = unix_sk(s); if (atomic_long_inc_return(&u->inflight) == 1) { BUG_ON(!list_empty(&u->link)); list_add_tail(...
https://www.cvedetails.com/cve/CVE-2016-2550/
linux
415e3d3e90ce9e18727e8843ae343eda5a58fad6
medium
{ "commit_message": "unix: correctly track in-flight fds in sending process user_struct\n\nThe commit referenced in the Fixes tag incorrectly accounted the number\nof in-flight fds over a unix domain socket to the original o", "cve_id": "CVE-2016-2550", "dataset_source": "BigVul" }
bigvul_675
BigVul
CWE-20
c
bool IDNToUnicodeOneComponent(const base::char16* comp, size_t comp_len, base::string16* out) { DCHECK(out); if (comp_len == 0) return false; static const base::char16 kIdnPrefix[] = {'x', 'n', '-', '-'}; if ((comp_len > arraysize(kIdnPrefix))...
bool IDNToUnicodeOneComponent(const base::char16* comp, size_t comp_len, bool is_tld_ascii, base::string16* out) { DCHECK(out); if (comp_len == 0) return false; static const base::char16 kIdnPrefix[] = {'x', 'n', '-...
https://www.cvedetails.com/cve/CVE-2017-5060/
Chrome
08cb718ba7c3961c1006176c9faba0a5841ec792
medium
{ "commit_message": "Block domain labels made of Cyrillic letters that look alike Latin\n\nBlock a label made entirely of Latin-look-alike Cyrillic letters when the TLD is not an IDN (i.e. this check is ON only for TLDs lik", "cve_id": "CVE-2017-5060", "dataset_source": "BigVul" }
bigvul_700
BigVul
CWE-189
c
sg_start_req(Sg_request *srp, unsigned char *cmd) { int res; struct request *rq; Sg_fd *sfp = srp->parentfp; sg_io_hdr_t *hp = &srp->header; int dxfer_len = (int) hp->dxfer_len; int dxfer_dir = hp->dxfer_direction; unsigned int iov_count = hp->iovec_count; Sg_scatter_hold *req_schp = &srp->data; Sg_scatter_hol...
sg_start_req(Sg_request *srp, unsigned char *cmd) { int res; struct request *rq; Sg_fd *sfp = srp->parentfp; sg_io_hdr_t *hp = &srp->header; int dxfer_len = (int) hp->dxfer_len; int dxfer_dir = hp->dxfer_direction; unsigned int iov_count = hp->iovec_count; Sg_scatter_hold *req_schp = &srp->data; Sg_scatter_hol...
https://www.cvedetails.com/cve/CVE-2015-5707/
linux
fdc81f45e9f57858da6351836507fbcf1b7583ee
medium
{ "commit_message": "sg_start_req(): use import_iovec()\n\nSigned-off-by: Al Viro <viro@zeniv.linux.org.uk>", "cve_id": "CVE-2015-5707", "dataset_source": "BigVul" }
bigvul_775
BigVul
CWE-399
c
static void perf_swevent_overflow(struct perf_event *event, u64 overflow, int nmi, struct perf_sample_data *data, struct pt_regs *regs) { struct hw_perf_event *hwc = &event->hw; int throttle = 0; data->period = event->hw.last_period; if (!overflow) overflow = perf_swevent_set_period(event); ...
static void perf_swevent_overflow(struct perf_event *event, u64 overflow, struct perf_sample_data *data, struct pt_regs *regs) { struct hw_perf_event *hwc = &event->hw; int throttle = 0; data->period = event->hw.last_period; if (!overflow) overflow = perf_swevent_set_period(event); if (hwc->...
https://www.cvedetails.com/cve/CVE-2011-2918/
linux
a8b0ca17b80e92faab46ee7179ba9e99ccb61233
medium
{ "commit_message": "perf: Remove the nmi parameter from the swevent and overflow interface\n\nThe nmi parameter indicated if we could do wakeups from the current\ncontext, if not, we would set some state and self-IPI and le", "cve_id": "CVE-2011-2918", "dataset_source": "BigVul" }
bigvul_783
BigVul
CWE-119
c
static Image *ReadMIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define BZipMaxExtent(x) ((x)+((x)/100)+600) #define LZMAMaxExtent(x) ((x)+((x)/3)+128) #define ZipMaxExtent(x) ((x)+(((x)+7) >> 3)+(((x)+63) >> 6)+11) #if defined(MAGICKCORE_BZLIB_DELEGATE) bz_stream bzip_info; #endif c...
static Image *ReadMIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define BZipMaxExtent(x) ((x)+((x)/100)+600) #define LZMAMaxExtent(x) ((x)+((x)/3)+128) #define ZipMaxExtent(x) ((x)+(((x)+7) >> 3)+(((x)+63) >> 6)+11) #if defined(MAGICKCORE_BZLIB_DELEGATE) bz_stream bzip_info; #endif c...
https://www.cvedetails.com/cve/CVE-2016-10066/
ImageMagick
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
medium
{ "commit_message": "", "cve_id": "CVE-2016-10066", "dataset_source": "BigVul" }
bigvul_815
BigVul
CWE-264
c
bool ContentBrowserClient::ShouldSwapProcessesForNavigation( const GURL& current_url, const GURL& new_url) { return false; }
bool ContentBrowserClient::ShouldSwapProcessesForNavigation( SiteInstance* site_instance, const GURL& current_url, const GURL& new_url) { return false; }
https://www.cvedetails.com/cve/CVE-2013-0921/
Chrome
e9841fbdaf41b4a2baaa413f94d5c0197f9261f4
medium
{ "commit_message": "Ensure extensions and the Chrome Web Store are loaded in new BrowsingInstances.\n\nBUG=174943\nTEST=Can't post message to CWS. See bug for repro steps.\n\n\nReview URL: https://chromiumcodereview.appspot.c", "cve_id": "CVE-2013-0921", "dataset_source": "BigVul" }
bigvul_839
BigVul
CWE-399
c
bool Init(const IPC::ChannelHandle& channel_handle, PP_Module pp_module, PP_GetInterface_Func local_get_interface, const ppapi::Preferences& preferences, SyncMessageStatusReceiver* status_receiver) { dispatcher_delegate_.reset(new ProxyChannelDelegate); dispatcher...
bool Init(const IPC::ChannelHandle& channel_handle,
https://www.cvedetails.com/cve/CVE-2012-2888/
Chrome
3b0d77670a0613f409110817455d2137576b485a
medium
{ "commit_message": "Revert 143656 - Add an IPC channel between the NaCl loader process and the renderer.\nBUG=116317\nTEST=ppapi, nacl tests, manual testing for experimental IPC proxy.\nReview URL: https://chromiumcoderevie", "cve_id": "CVE-2012-2888", "dataset_source": "BigVul" }
bigvul_850
BigVul
CWE-119
c
OMX_ERRORTYPE SoftAACEncoder2::internalSetParameter( OMX_INDEXTYPE index, const OMX_PTR params) { switch (index) { case OMX_IndexParamStandardComponentRole: { const OMX_PARAM_COMPONENTROLETYPE *roleParams = (const OMX_PARAM_COMPONENTROLETYPE *)params; if (strncmp...
OMX_ERRORTYPE SoftAACEncoder2::internalSetParameter( OMX_INDEXTYPE index, const OMX_PTR params) { switch (index) { case OMX_IndexParamStandardComponentRole: { const OMX_PARAM_COMPONENTROLETYPE *roleParams = (const OMX_PARAM_COMPONENTROLETYPE *)params; if (!isValid...
https://www.cvedetails.com/cve/CVE-2016-2476/
Android
295c883fe3105b19bcd0f9e07d54c6b589fc5bff
medium
{ "commit_message": "DO NOT MERGE Verify OMX buffer sizes prior to access\n\nBug: 27207275\nChange-Id: I4412825d1ee233d993af0a67708bea54304ff62d\n", "cve_id": "CVE-2016-2476", "dataset_source": "BigVul" }
bigvul_856
BigVul
CWE-119
c
static bool blit_is_unsafe(struct CirrusVGAState *s) { /* should be the case, see cirrus_bitblt_start */ assert(s->cirrus_blt_width > 0); assert(s->cirrus_blt_height > 0); if (blit_region_is_unsafe(s, s->cirrus_blt_dstpitch, s->cirrus_blt_dstaddr & s->cirrus_addr_mask...
static bool blit_is_unsafe(struct CirrusVGAState *s) { /* should be the case, see cirrus_bitblt_start */ assert(s->cirrus_blt_width > 0); assert(s->cirrus_blt_height > 0); if (s->cirrus_blt_width > CIRRUS_BLTBUFSIZE) { return true; } if (blit_region_is_unsafe(s, s->cirrus_blt_dstpi...
https://www.cvedetails.com/cve/CVE-2014-8106/
qemu
bf25983345ca44aec3dd92c57142be45452bd38a
medium
{ "commit_message": "", "cve_id": "CVE-2014-8106", "dataset_source": "BigVul" }
bigvul_898
BigVul
CWE-416
c
void ShellSurface::CreateShellSurfaceWidget(ui::WindowShowState show_state) { DCHECK(enabled()); DCHECK(!widget_); views::Widget::InitParams params; params.type = views::Widget::InitParams::TYPE_WINDOW; params.ownership = views::Widget::InitParams::NATIVE_WIDGET_OWNS_WIDGET; params.delegate = this; param...
void ShellSurface::CreateShellSurfaceWidget(ui::WindowShowState show_state) { DCHECK(enabled()); DCHECK(!widget_); views::Widget::InitParams params; params.type = views::Widget::InitParams::TYPE_WINDOW; params.ownership = views::Widget::InitParams::NATIVE_WIDGET_OWNS_WIDGET; params.delegate = this; param...
https://www.cvedetails.com/cve/CVE-2014-3194/
Chrome
05c619eb6e7dac046afc72c0d5381856f87fb421
medium
{ "commit_message": "exo: Reduce side-effects of dynamic activation code.\n\nThis code exists for clients that need to managed their own system\nmodal dialogs. Since the addition of the remote surface API we\ncan limit the im", "cve_id": "CVE-2014-3194", "dataset_source": "BigVul" }
bigvul_932
BigVul
CWE-189
c
hstore_from_array(PG_FUNCTION_ARGS) { ArrayType *in_array = PG_GETARG_ARRAYTYPE_P(0); int ndims = ARR_NDIM(in_array); int count; int32 buflen; HStore *out; Pairs *pairs; Datum *in_datums; bool *in_nulls; int in_count; int i; Assert(ARR_ELEMTYPE(in_array) == TEXTOID); switch (ndims) ...
hstore_from_array(PG_FUNCTION_ARGS) { ArrayType *in_array = PG_GETARG_ARRAYTYPE_P(0); int ndims = ARR_NDIM(in_array); int count; int32 buflen; HStore *out; Pairs *pairs; Datum *in_datums; bool *in_nulls; int in_count; int i; Assert(ARR_ELEMTYPE(in_array) == TEXTOID); switch (ndims) ...
https://www.cvedetails.com/cve/CVE-2014-2669/
postgres
31400a673325147e1205326008e32135a78b4d8a
medium
{ "commit_message": "Predict integer overflow to avoid buffer overruns.\n\nSeveral functions, mostly type input functions, calculated an allocation\nsize such that the calculation wrapped to a small positive value when\nargum", "cve_id": "CVE-2014-2669", "dataset_source": "BigVul" }
bigvul_944
BigVul
CWE-362
c
bool TranslateInfoBarDelegate::IsTranslatableLanguageByPrefs() { Profile* profile = Profile::FromBrowserContext(GetWebContents()->GetBrowserContext()); Profile* original_profile = profile->GetOriginalProfile(); scoped_ptr<TranslatePrefs> translate_prefs( TranslateTabHelper::CreateTranslatePrefs(origi...
bool TranslateInfoBarDelegate::IsTranslatableLanguageByPrefs() { TranslateTabHelper* translate_tab_helper = TranslateTabHelper::FromWebContents(GetWebContents()); scoped_ptr<TranslatePrefs> translate_prefs( TranslateTabHelper::CreateTranslatePrefs( translate_tab_helper->GetPrefs())); Trans...
https://www.cvedetails.com/cve/CVE-2013-2906/
Chrome
603af455b5641671b18d7d7d166630341d71b63f
medium
{ "commit_message": "Remove dependency of TranslateInfobarDelegate on profile\n\nThis CL uses TranslateTabHelper instead of Profile and also cleans up\nsome unused code and irrelevant dependencies.\n\nBUG=371845\n\nReview URL: h", "cve_id": "CVE-2013-2906", "dataset_source": "BigVul" }
bigvul_954
BigVul
CWE-119
c
void assertObjectHasGCInfo(const void* payload, size_t gcInfoIndex) { ASSERT(HeapObjectHeader::fromPayload(payload)->checkHeader()); #if !defined(COMPONENT_BUILD) ASSERT(HeapObjectHeader::fromPayload(payload)->gcInfoIndex() == gcInfoIndex); #endif }
void assertObjectHasGCInfo(const void* payload, size_t gcInfoIndex) { HeapObjectHeader::fromPayload(payload)->checkHeader(); #if !defined(COMPONENT_BUILD) ASSERT(HeapObjectHeader::fromPayload(payload)->gcInfoIndex() == gcInfoIndex); #endif }
https://www.cvedetails.com/cve/CVE-2018-6094/
Chrome
0749ec24fae74ec32d0567eef0e5ec43c84dbcb9
medium
{ "commit_message": "Call HeapObjectHeader::checkHeader solely for its side-effect.\n\nThis requires changing its signature. This is a preliminary stage to making it\nprivate.\n\nBUG=633030\n\nReview-Url: https://codereview.chro", "cve_id": "CVE-2018-6094", "dataset_source": "BigVul" }
bigvul_960
BigVul
CWE-399
c
ScopedRequest(PepperDeviceEnumerationHostHelper* owner, const Delegate::EnumerateDevicesCallback& callback) : owner_(owner), callback_(callback), requested_(false), request_id_(0), sync_call_(false) { if (!owner_->document_url_.is_valid()) return; req...
ScopedRequest(PepperDeviceEnumerationHostHelper* owner, const Delegate::EnumerateDevicesCallback& callback) : owner_(owner), callback_(callback), requested_(false), request_id_(0), sync_call_(false) { if (!owner_->document_url_.is_valid()) return; req...
https://www.cvedetails.com/cve/CVE-2014-7906/
Chrome
3a2cf7d1376ae33054b878232fb38b8fbed29e31
medium
{ "commit_message": "Pepper: Access PepperMediaDeviceManager through a WeakPtr\n\nIts lifetime is scoped to the RenderFrame, and it might go away before the\nhosts that refer to it.\n\nBUG=423030\n\nReview URL: https://coderevie", "cve_id": "CVE-2014-7906", "dataset_source": "BigVul" }
bigvul_961
BigVul
CWE-362
c
VaapiVideoDecodeAccelerator::VaapiVP8Accelerator::VaapiVP8Accelerator( VaapiVideoDecodeAccelerator* vaapi_dec, VaapiWrapper* vaapi_wrapper) : vaapi_wrapper_(vaapi_wrapper), vaapi_dec_(vaapi_dec) { DCHECK(vaapi_wrapper_); DCHECK(vaapi_dec_); }
VaapiVideoDecodeAccelerator::VaapiVP8Accelerator::VaapiVP8Accelerator( VaapiVideoDecodeAccelerator* vaapi_dec, VaapiWrapper* vaapi_wrapper) : vaapi_wrapper_(vaapi_wrapper), vaapi_dec_(vaapi_dec) { DCHECK(vaapi_wrapper_); DCHECK(vaapi_dec_); DETACH_FROM_SEQUENCE(sequence_checker_); }
https://www.cvedetails.com/cve/CVE-2018-6061/
Chrome
70340ce072cee8a0bdcddb5f312d32567b2269f6
medium
{ "commit_message": "vaapi vda: Delete owned objects on worker thread in Cleanup()\n\nThis CL adds a SEQUENCE_CHECKER to Vaapi*Accelerator classes, and\nposts the destruction of those objects to the appropriate thread on\nCle", "cve_id": "CVE-2018-6061", "dataset_source": "BigVul" }
bigvul_962
BigVul
CWE-399
c
donote(struct magic_set *ms, void *vbuf, size_t offset, size_t size, int clazz, int swap, size_t align, int *flags, uint16_t *notecount) { Elf32_Nhdr nh32; Elf64_Nhdr nh64; size_t noff, doff; uint32_t namesz, descsz; unsigned char *nbuf = CAST(unsigned char *, vbuf); if (*notecount == 0) return 0; --*note...
donote(struct magic_set *ms, void *vbuf, size_t offset, size_t size, int clazz, int swap, size_t align, int *flags, uint16_t *notecount) { Elf32_Nhdr nh32; Elf64_Nhdr nh64; size_t noff, doff; uint32_t namesz, descsz; unsigned char *nbuf = CAST(unsigned char *, vbuf); if (*notecount == 0) return 0; --*note...
https://www.cvedetails.com/cve/CVE-2014-9621/
file
65437cee25199dbd385fb35901bc0011e164276c
medium
{ "commit_message": "Limit string printing to 100 chars, and add flags I forgot in the previous\ncommit.", "cve_id": "CVE-2014-9621", "dataset_source": "BigVul" }
bigvul_1004
BigVul
CWE-74
c
PS_SERIALIZER_DECODE_FUNC(php) /* {{{ */ { const char *p, *q; char *name; const char *endptr = val + vallen; zval *current; int namelen; int has_value; php_unserialize_data_t var_hash; PHP_VAR_UNSERIALIZE_INIT(var_hash); p = val; while (p < endptr) { zval **tmp; q = p; while (*q != PS_DELIM...
PS_SERIALIZER_DECODE_FUNC(php) /* {{{ */ { const char *p, *q; char *name; const char *endptr = val + vallen; zval *current; int namelen; int has_value; php_unserialize_data_t var_hash; int skip = 0; PHP_VAR_UNSERIALIZE_INIT(var_hash); p = val; while (p < endptr) { zval **tmp; q = p; skip = ...
https://www.cvedetails.com/cve/CVE-2016-7125/
php-src
8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1
medium
{ "commit_message": "Fix bug #72681 - consume data even if we're not storing them", "cve_id": "CVE-2016-7125", "dataset_source": "BigVul" }
bigvul_1011
BigVul
CWE-399
c
xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op) { int total = 0; int equal, ret; xmlXPathCompExprPtr comp; xmlXPathObjectPtr arg1, arg2; xmlNodePtr bak; xmlDocPtr bakd; int pp; int cs; CHECK_ERROR0; comp = ctxt->comp; switch (op->op) { case XP...
xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op) { int total = 0; int equal, ret; xmlXPathCompExprPtr comp; xmlXPathObjectPtr arg1, arg2; xmlNodePtr bak; xmlDocPtr bakd; int pp; int cs; CHECK_ERROR0; comp = ctxt->comp; switch (op->op) { case XP...
https://www.cvedetails.com/cve/CVE-2011-2834/
Chrome
3a766e0115e9799db766a88554b9ab12ee5bf2a4
medium
{ "commit_message": "Apply libxml fix for undefined namespaces.\n\nBUG=93472\nReview URL: http://codereview.chromium.org/7747031\n\ngit-svn-id: svn://svn.chromium.org/chrome/trunk/src@98359 0039d316-1c4b-4281-b951-d872f2087c98", "cve_id": "CVE-2011-2834", "dataset_source": "BigVul" }
bigvul_1032
BigVul
CWE-119
c
static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, unsigned int cryptlen) { struct crypto_ccm_req_priv_ctx *pctx = crypto_ccm_reqctx(req); struct crypto_aead *aead = crypto_aead_reqtfm(req); struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead); AHASH_REQUEST_ON_STACK(ahreq, ctx->ma...
static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, unsigned int cryptlen) { struct crypto_ccm_req_priv_ctx *pctx = crypto_ccm_reqctx(req); struct crypto_aead *aead = crypto_aead_reqtfm(req); struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead); AHASH_REQUEST_ON_STACK(ahreq, ctx->ma...
https://www.cvedetails.com/cve/CVE-2017-8065/
linux
3b30460c5b0ed762be75a004e924ec3f8711e032
medium
{ "commit_message": "crypto: ccm - move cbcmac input off the stack\n\nCommit f15f05b0a5de (\"crypto: ccm - switch to separate cbcmac driver\")\nrefactored the CCM driver to allow separate implementations of the\nunderlying MAC ", "cve_id": "CVE-2017-8065", "dataset_source": "BigVul" }
bigvul_1053
BigVul
CWE-190
c
static int spl_filesystem_file_read_csv(spl_filesystem_object *intern, char delimiter, char enclosure, char escape, zval *return_value TSRMLS_DC) /* {{{ */ { int ret = SUCCESS; do { ret = spl_filesystem_file_read(intern, 1 TSRMLS_CC); } while (ret == SUCCESS && !intern->u.file.current_line_len && SPL_HAS_FLAG...
static int spl_filesystem_file_read_csv(spl_filesystem_object *intern, char delimiter, char enclosure, char escape, zval *return_value TSRMLS_DC) /* {{{ */ { int ret = SUCCESS; do { ret = spl_filesystem_file_read(intern, 1 TSRMLS_CC); } while (ret == SUCCESS && !intern->u.file.current_line_len && SPL_HAS_FLA...
https://www.cvedetails.com/cve/CVE-2016-5770/
php-src
7245bff300d3fa8bacbef7897ff080a6f1c23eba?w=1
medium
{ "commit_message": "Fix bug #72262 - do not overflow int", "cve_id": "CVE-2016-5770", "dataset_source": "BigVul" }
bigvul_1063
BigVul
CWE-416
c
struct ipv6_txoptions *ipv6_update_options(struct sock *sk, struct ipv6_txoptions *opt) { if (inet_sk(sk)->is_icsk) { if (opt && !((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE)) && inet_sk(sk)->inet_daddr != LOOPBACK4_IPV6) { struct inet_connection_sock *icsk = inet_csk(sk); icsk->icsk_e...
struct ipv6_txoptions *ipv6_update_options(struct sock *sk, struct ipv6_txoptions *opt) { if (inet_sk(sk)->is_icsk) { if (opt && !((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE)) && inet_sk(sk)->inet_daddr != LOOPBACK4_IPV6) { struct inet_connection_sock *icsk = inet_csk(sk); icsk->icsk_e...
https://www.cvedetails.com/cve/CVE-2016-3841/
linux
45f6fad84cc305103b28d73482b344d7f5b76f39
medium
{ "commit_message": "ipv6: add complete rcu protection around np->opt\n\nThis patch addresses multiple problems :\n\nUDP/RAW sendmsg() need to get a stable struct ipv6_txoptions\nwhile socket is not locked : Other threads can ", "cve_id": "CVE-2016-3841", "dataset_source": "BigVul" }
bigvul_1097
BigVul
CWE-119
c
void GDataCacheMetadataMap::ScanCacheDirectory( const std::vector<FilePath>& cache_paths, GDataCache::CacheSubDirectoryType sub_dir_type, CacheMap* cache_map, ResourceIdToFilePathMap* processed_file_map) { DCHECK(cache_map); DCHECK(processed_file_map); file_util::FileEnumerator enumerator( ...
void GDataCacheMetadataMap::ScanCacheDirectory( const std::vector<FilePath>& cache_paths, GDataCache::CacheSubDirectoryType sub_dir_type, CacheMap* cache_map) { file_util::FileEnumerator enumerator( cache_paths[sub_dir_type], false, // not recursive static_cast<file_util::FileEnume...
https://www.cvedetails.com/cve/CVE-2012-2895/
Chrome
baef1ffd73db183ca50c854e1779ed7f6e5100a8
medium
{ "commit_message": "Revert 144993 - gdata: Remove invalid files in the cache directories\n\nBroke linux_chromeos_valgrind:\nhttp://build.chromium.org/p/chromium.memory.fyi/builders/Chromium%20OS%20%28valgrind%29%285%29/buil", "cve_id": "CVE-2012-2895", "dataset_source": "BigVul" }
bigvul_1109
BigVul
CWE-134
cpp
CronTab::initRegexObject() { if ( ! CronTab::regex.isInitialized() ) { const char *errptr; int erroffset; MyString pattern( CRONTAB_PARAMETER_PATTERN ) ; if ( ! CronTab::regex.compile( pattern, &errptr, &erroffset )) { MyString error = "CronTab: Failed to compile Regex - "...
CronTab::initRegexObject() { if ( ! CronTab::regex.isInitialized() ) { const char *errptr; int erroffset; MyString pattern( CRONTAB_PARAMETER_PATTERN ) ; if ( ! CronTab::regex.compile( pattern, &errptr, &erroffset )) { MyString error = "CronTab: Failed to compile Regex - "...
https://www.cvedetails.com/cve/CVE-2011-4930/
htcondor
5e5571d1a431eb3c61977b6dd6ec90186ef79867
medium
{ "commit_message": "", "cve_id": "CVE-2011-4930", "dataset_source": "BigVul" }
bigvul_1161
BigVul
CWE-119
c
void Chapters::Atom::Clear() { delete[] m_string_uid; m_string_uid = NULL; while (m_displays_count > 0) { Display& d = m_displays[--m_displays_count]; d.Clear(); } delete[] m_displays; m_displays = NULL; m_displays_size = 0; }
void Chapters::Atom::Clear()
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
04839626ed859623901ebd3a5fd483982186b59d
medium
{ "commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_1165
BigVul
CWE-399
c
static inline void constructBidiRunsForSegment(InlineBidiResolver& topResolver, BidiRunList<BidiRun>& bidiRuns, const InlineIterator& endOfRuns, VisualDirectionOverride override, bool previousLineBrokeCleanly) { ASSERT(&topResolver.runs() == &bidiRuns); ASSERT(topResolver.position() != endOfRuns); RenderObj...
static inline void constructBidiRunsForSegment(InlineBidiResolver& topResolver, BidiRunList<BidiRun>& bidiRuns, const InlineIterator& endOfRuns, VisualDirectionOverride override, bool previousLineBrokeCleanly) { ASSERT(&topResolver.runs() == &bidiRuns); ASSERT(topResolver.position() != endOfRuns); RenderObj...
https://www.cvedetails.com/cve/CVE-2013-2909/
Chrome
248a92c21c20c14b5983680c50e1d8b73fc79a2f
medium
{ "commit_message": "Update containtingIsolate to go back all the way to top isolate from current root, rather than stopping at the first isolate it finds. This works because the current root is always updated with each i", "cve_id": "CVE-2013-2909", "dataset_source": "BigVul" }
bigvul_1190
BigVul
CWE-125
c
lldp_private_8023_print(netdissect_options *ndo, const u_char *tptr, u_int tlv_len) { int subtype, hexdump = FALSE; if (tlv_len < 4) { return hexdump; } subtype = *(tptr+3); ND_PRINT((ndo, "\n\t %s Subtype (%u)", tok2str(lldp_8023_subtype_values, "unknow...
lldp_private_8023_print(netdissect_options *ndo, const u_char *tptr, u_int tlv_len) { int subtype, hexdump = FALSE; if (tlv_len < 4) { return hexdump; } subtype = *(tptr+3); ND_PRINT((ndo, "\n\t %s Subtype (%u)", tok2str(lldp_8023_subtype_values, "unknow...
https://www.cvedetails.com/cve/CVE-2017-13054/
tcpdump
e6511cc1a950fe1566b2236329d6b4bd0826cc7a
medium
{ "commit_message": "CVE-2017-13054/LLDP: add a missing length check\n\nIn lldp_private_8023_print() the case block for subtype 4 (Maximum Frame\nSize TLV, IEEE 802.3bc-2009 Section 79.3.4) did not include the length\ncheck a", "cve_id": "CVE-2017-13054", "dataset_source": "BigVul" }
bigvul_1223
BigVul
CWE-399
c
psh_glyph_find_strong_points( PSH_Glyph glyph, FT_Int dimension ) { /* a point is `strong' if it is located on a stem edge and */ /* has an `in' or `out' tangent parallel to the hint's direction */ PSH_Hint_Table table = &glyph->hint_tables[dimension]; ...
psh_glyph_find_strong_points( PSH_Glyph glyph, FT_Int dimension ) { /* a point is `strong' if it is located on a stem edge and */ /* has an `in' or `out' tangent parallel to the hint's direction */ PSH_Hint_Table table = &glyph->hint_tables[dimension]; ...
https://www.cvedetails.com/cve/CVE-2010-2498/
savannah
8d22746c9e5af80ff4304aef440986403a5072e2
medium
{ "commit_message": "", "cve_id": "CVE-2010-2498", "dataset_source": "BigVul" }
bigvul_1244
BigVul
CWE-476
c
ip6t_do_table(struct sk_buff *skb, const struct nf_hook_state *state, struct xt_table *table) { unsigned int hook = state->hook; static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long)))); /* Initializing verdict to NF_DROP keeps gcc happy. */ unsigned int verdict = NF_DROP; const...
ip6t_do_table(struct sk_buff *skb, const struct nf_hook_state *state, struct xt_table *table) { unsigned int hook = state->hook; static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long)))); /* Initializing verdict to NF_DROP keeps gcc happy. */ unsigned int verdict = NF_DROP; const...
https://www.cvedetails.com/cve/CVE-2018-1065/
linux
57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
medium
{ "commit_message": "netfilter: add back stackpointer size checks\n\nThe rationale for removing the check is only correct for rulesets\ngenerated by ip(6)tables.\n\nIn iptables, a jump can only occur to a user-defined chain, i", "cve_id": "CVE-2018-1065", "dataset_source": "BigVul" }
bigvul_1245
BigVul
CWE-119
c
static av_cold int xpm_decode_close(AVCodecContext *avctx) { XPMDecContext *x = avctx->priv_data; av_freep(&x->pixels); return 0; }
static av_cold int xpm_decode_close(AVCodecContext *avctx) { XPMDecContext *x = avctx->priv_data; av_freep(&x->pixels); av_freep(&x->buf); x->buf_size = 0; return 0; }
https://www.cvedetails.com/cve/CVE-2017-9990/
FFmpeg
cb243972b121b1ae6b60a78ff55a0506c69f3879
medium
{ "commit_message": "avcodec/xpmdec: Fix multiple pointer/memory issues\n\nMost of these were found through code review in response to\nfixing 1466/clusterfuzz-testcase-minimized-5961584419536896\nThere is thus no testcase fo", "cve_id": "CVE-2017-9990", "dataset_source": "BigVul" }
bigvul_1280
BigVul
CWE-119
c
static int apparmor_setprocattr(struct task_struct *task, char *name, void *value, size_t size) { struct common_audit_data sa; struct apparmor_audit_data aad = {0,}; char *command, *args = value; size_t arg_size; int error; if (size == 0) return -EINVAL; /* args points to a PAGE_SIZE buffer, AppAr...
static int apparmor_setprocattr(struct task_struct *task, char *name, void *value, size_t size) { struct common_audit_data sa; struct apparmor_audit_data aad = {0,}; char *command, *largs = NULL, *args = value; size_t arg_size; int error; if (size == 0) return -EINVAL; /* task can only write its ...
https://www.cvedetails.com/cve/CVE-2016-6187/
linux
30a46a4647fd1df9cf52e43bf467f0d9265096ca
medium
{ "commit_message": "apparmor: fix oops, validate buffer size in apparmor_setprocattr()\n\nWhen proc_pid_attr_write() was changed to use memdup_user apparmor's\n(interface violating) assumption that the setprocattr buffer wa", "cve_id": "CVE-2016-6187", "dataset_source": "BigVul" }
bigvul_1300
BigVul
CWE-119
c
PHPAPI int php_var_unserialize(UNSERIALIZE_PARAMETER) { const unsigned char *cursor, *limit, *marker, *start; zval **rval_ref; limit = max; cursor = *p; if (YYCURSOR >= YYLIMIT) { return 0; } if (var_hash && cursor[0] != 'R') { var_push(var_hash, rval); } start = cursor; #line 495 "ext/standard/...
PHPAPI int php_var_unserialize(UNSERIALIZE_PARAMETER) { const unsigned char *cursor, *limit, *marker, *start; zval **rval_ref; limit = max; cursor = *p; if (YYCURSOR >= YYLIMIT) { return 0; } if (var_hash && cursor[0] != 'R') { var_push(var_hash, rval); } start = cursor; #line 496 "ext/standard/...
https://www.cvedetails.com/cve/CVE-2016-7411/
php-src
6a7cc8ff85827fa9ac715b3a83c2d9147f33cd43?w=1
medium
{ "commit_message": "Fix bug #73052 - Memory Corruption in During Deserialized-object Destruction", "cve_id": "CVE-2016-7411", "dataset_source": "BigVul" }
bigvul_1339
BigVul
CWE-20
cpp
SchedulerObject::_continue(std::string key, std::string &/*reason*/, std::string &text) { PROC_ID id = getProcByString(key.c_str()); if (id.cluster < 0 || id.proc < 0) { dprintf(D_FULLDEBUG, "Remove: Failed to parse id: %s\n", key.c_str()); text = "Invalid Id"; ...
SchedulerObject::_continue(std::string key, std::string &/*reason*/, std::string &text) { PROC_ID id = getProcByString(key.c_str()); if (id.cluster <= 0 || id.proc < 0) { dprintf(D_FULLDEBUG, "Remove: Failed to parse id: %s\n", key.c_str()); text = "Invalid Id"; ...
https://www.cvedetails.com/cve/CVE-2012-4462/
htcondor
8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
medium
{ "commit_message": "", "cve_id": "CVE-2012-4462", "dataset_source": "BigVul" }
bigvul_1357
BigVul
CWE-119
c
void DataReductionProxySettings::InitPrefMembers() { DCHECK(thread_checker_.CalledOnValidThread()); spdy_proxy_auth_enabled_.Init( prefs::kDataSaverEnabled, GetOriginalProfilePrefs(), base::Bind(&DataReductionProxySettings::OnProxyEnabledPrefChange, base::Unretained(this))); }
void DataReductionProxySettings::InitPrefMembers() {
https://www.cvedetails.com/cve/CVE-2016-5199/
Chrome
c995d4fe5e96f4d6d4a88b7867279b08e72d2579
medium
{ "commit_message": "Move IsDataSaverEnabledByUser to be a static method and use it\n\nThis method now officially becomes the source of truth that\neverything in the code base eventually calls into to determine whether\nor no", "cve_id": "CVE-2016-5199", "dataset_source": "BigVul" }
bigvul_1418
BigVul
CWE-264
c
int touch(const char *path) { return touch_file(path, false, USEC_INFINITY, UID_INVALID, GID_INVALID, 0); }
int touch(const char *path) { return touch_file(path, false, USEC_INFINITY, UID_INVALID, GID_INVALID, MODE_INVALID); }
https://www.cvedetails.com/cve/CVE-2016-10156/
systemd
ee735086f8670be1591fa9593e80dd60163a7a2f
medium
{ "commit_message": "util-lib: use MODE_INVALID as invalid value for mode_t everywhere", "cve_id": "CVE-2016-10156", "dataset_source": "BigVul" }
bigvul_1419
BigVul
CWE-200
c
void free_bprm(struct linux_binprm *bprm) { free_arg_pages(bprm); if (bprm->cred) { mutex_unlock(&current->signal->cred_guard_mutex); abort_creds(bprm->cred); } kfree(bprm); }
void free_bprm(struct linux_binprm *bprm) { free_arg_pages(bprm); if (bprm->cred) { mutex_unlock(&current->signal->cred_guard_mutex); abort_creds(bprm->cred); } /* If a binfmt changed the interp, free it. */ if (bprm->interp != bprm->filename) kfree(bprm->interp); kfree(bprm); }
https://www.cvedetails.com/cve/CVE-2012-4530/
linux
b66c5984017533316fd1951770302649baf1aa33
medium
{ "commit_message": "exec: do not leave bprm->interp on stack\n\nIf a series of scripts are executed, each triggering module loading via\nunprintable bytes in the script header, kernel stack contents can leak\ninto the comman", "cve_id": "CVE-2012-4530", "dataset_source": "BigVul" }
bigvul_1429
BigVul
CWE-200
c
status_t OMXNodeInstance::emptyBuffer( OMX::buffer_id buffer, OMX_U32 rangeOffset, OMX_U32 rangeLength, OMX_U32 flags, OMX_TICKS timestamp, int fenceFd) { Mutex::Autolock autoLock(mLock); OMX_BUFFERHEADERTYPE *header = findBufferHeader(buffer, kPortIndexInput); if (header == N...
status_t OMXNodeInstance::emptyBuffer( OMX::buffer_id buffer, OMX_U32 rangeOffset, OMX_U32 rangeLength, OMX_U32 flags, OMX_TICKS timestamp, int fenceFd) { Mutex::Autolock autoLock(mLock); // no emptybuffer if using input surface if (getGraphicBufferSource() != NULL) { an...
https://www.cvedetails.com/cve/CVE-2016-6720/
Android
0f177948ae2640bfe4d70f8e4248e106406b3b0a
medium
{ "commit_message": "DO NOT MERGE: IOMX: work against metadata buffer spoofing\n\n- Prohibit direct set/getParam/Settings for extensions meant for\n OMXNodeInstance alone. This disallows enabling metadata mode\n without the", "cve_id": "CVE-2016-6720", "dataset_source": "BigVul" }
bigvul_1445
BigVul
CWE-362
c
static struct btrfs_dir_item *btrfs_match_dir_item_name(struct btrfs_root *root, struct btrfs_path *path, const char *name, int name_len) { struct btrfs_dir_item *dir_item; unsigned long name_ptr; u32 total_len; u32 cur = 0; u32 this_len; struct extent_buffer *leaf; leaf = path->nodes[0]; ...
static struct btrfs_dir_item *btrfs_match_dir_item_name(struct btrfs_root *root, struct btrfs_dir_item *btrfs_match_dir_item_name(struct btrfs_root *root, struct btrfs_path *path, const char *name, int name_len) { struct btrfs_dir_item *dir_item; unsigned long name_ptr; u32 total_len; u32 cur = 0; ...
https://www.cvedetails.com/cve/CVE-2014-9710/
linux
5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
medium
{ "commit_message": "Btrfs: make xattr replace operations atomic\n\nReplacing a xattr consists of doing a lookup for its existing value, delete\nthe current value from the respective leaf, release the search path and then\nfi", "cve_id": "CVE-2014-9710", "dataset_source": "BigVul" }
bigvul_1499
BigVul
CWE-20
c
static int ax25_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) { struct sock *sk = sock->sk; struct sk_buff *skb; int copied; int err = 0; lock_sock(sk); /* * This works for seqpacket too. The receiver has ordered the * queue for us! We do one quick check first...
static int ax25_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) { struct sock *sk = sock->sk; struct sk_buff *skb; int copied; int err = 0; lock_sock(sk); /* * This works for seqpacket too. The receiver has ordered the * queue for us! We do one quick check first...
https://www.cvedetails.com/cve/CVE-2013-7271/
linux
f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
medium
{ "commit_message": "net: rework recvmsg handler msg_name and msg_namelen logic\n\nThis patch now always passes msg->msg_namelen as 0. recvmsg handlers must\nset msg_namelen to the proper size <= sizeof(struct sockaddr_stora", "cve_id": "CVE-2013-7271", "dataset_source": "BigVul" }
bigvul_1508
BigVul
CWE-399
c
content::WebUIDataSource* CreateOobeUIDataSource( const base::DictionaryValue& localized_strings, const std::string& display_type) { content::WebUIDataSource* source = content::WebUIDataSource::Create(chrome::kChromeUIOobeHost); source->AddLocalizedStrings(localized_strings); source->SetJsonPath(kSt...
content::WebUIDataSource* CreateOobeUIDataSource( const base::DictionaryValue& localized_strings, const std::string& display_type) { content::WebUIDataSource* source = content::WebUIDataSource::Create(chrome::kChromeUIOobeHost); source->AddLocalizedStrings(localized_strings); source->SetJsonPath(kSt...
https://www.cvedetails.com/cve/CVE-2013-6663/
Chrome
fb5dce12f0462056fc9f66967b0f7b2b7bcd88f5
medium
{ "commit_message": "One polymer_config.js to rule them all.\n\nR=michaelpg@chromium.org,fukino@chromium.org,mfoltz@chromium.org\nBUG=425626\n\nReview URL: https://codereview.chromium.org/1224783005\n\nCr-Commit-Position: refs/h", "cve_id": "CVE-2013-6663", "dataset_source": "BigVul" }
bigvul_1536
BigVul
CWE-120
c
LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff) { const char* str; unsigned int retval; size_t tmpretval; if(!file) return 0; str = openmpt_module_get_instrument_name(file->mod,qual-1); if(!str){ if(buff){ *buff = '\0'; } return 0; } tmpr...
LIBOPENMPT_MODPLUG_API unsigned int ModPlug_InstrumentName(ModPlugFile* file, unsigned int qual, char* buff) { const char* str; char buf[32]; if(!file) return 0; str = openmpt_module_get_instrument_name(file->mod,qual-1); memset(buf,0,32); if(str){ strncpy(buf,str,31); openmpt_free_string(str); } if(b...
https://www.cvedetails.com/cve/CVE-2019-17113/
openmpt
927688ddab43c2b203569de79407a899e734fabe
medium
{ "commit_message": "[Fix] libmodplug: C API: Limit the length of strings copied to the output buffer of ModPlug_InstrumentName() and ModPlug_SampleName() to 32 bytes (including terminating null) as is done by original li", "cve_id": "CVE-2019-17113", "dataset_source": "BigVul" }
bigvul_1574
BigVul
CWE-20
c
ssize_t nbd_wr_syncv(QIOChannel *ioc, struct iovec *iov, size_t niov, size_t length, bool do_read) { ssize_t done = 0; Error *local_err = NULL; struct iovec *local_iov = g_new(struct iovec, niov); struct iovec *local_iov...
ssize_t nbd_wr_syncv(QIOChannel *ioc, struct iovec *iov, size_t niov, size_t length, bool do_read) { ssize_t done = 0; Error *local_err = NULL; struct iovec *local_iov = g_new(struct iovec, niov); struct iovec *local_iov...
https://www.cvedetails.com/cve/CVE-2017-7539/
qemu
ff82911cd3f69f028f2537825c9720ff78bc3f19
medium
{ "commit_message": "", "cve_id": "CVE-2017-7539", "dataset_source": "BigVul" }
bigvul_1578
BigVul
CWE-416
c
void fe_netjoin_init(void) { settings_add_bool("misc", "hide_netsplit_quits", TRUE); settings_add_int("misc", "netjoin_max_nicks", 10); join_tag = -1; printing_joins = FALSE; read_settings(); signal_add("setup changed", (SIGNAL_FUNC) read_settings); }
void fe_netjoin_init(void) { settings_add_bool("misc", "hide_netsplit_quits", TRUE); settings_add_int("misc", "netjoin_max_nicks", 10); join_tag = -1; printing_joins = FALSE; read_settings(); signal_add("setup changed", (SIGNAL_FUNC) read_settings); signal_add("server disconnected", (SIGNAL_FUNC) sig_serv...
https://www.cvedetails.com/cve/CVE-2017-7191/
irssi
77b2631c78461965bc9a7414aae206b5c514e1b3
medium
{ "commit_message": "Merge branch 'netjoin-timeout' into 'master'\n\nfe-netjoin: remove irc servers on \"server disconnected\" signal\n\nCloses #7\n\nSee merge request !10", "cve_id": "CVE-2017-7191", "dataset_source": "BigVul" }
bigvul_1596
BigVul
CWE-119
c
png_write_find_filter(png_structp png_ptr, png_row_infop row_info) { png_bytep best_row; #ifdef PNG_WRITE_FILTER_SUPPORTED png_bytep prev_row, row_buf; png_uint_32 mins, bpp; png_byte filter_to_do = png_ptr->do_filter; png_uint_32 row_bytes = row_info->rowbytes; #ifdef PNG_WRITE_WEIGHTED_FILTER_SUPPOR...
png_write_find_filter(png_structp png_ptr, png_row_infop row_info) { png_bytep best_row; #ifdef PNG_WRITE_FILTER_SUPPORTED png_bytep prev_row, row_buf; png_uint_32 mins, bpp; png_byte filter_to_do = png_ptr->do_filter; png_uint_32 row_bytes = row_info->rowbytes; png_debug(1, "in png_write_find_f...
https://www.cvedetails.com/cve/CVE-2015-8126/
Chrome
7f3d85b096f66870a15b37c2f40b219b2e292693
medium
{ "commit_message": "third_party/libpng: update to 1.2.54\n\nTBR=darin@chromium.org\nBUG=560291\n\nReview URL: https://codereview.chromium.org/1467263003\n\nCr-Commit-Position: refs/heads/master@{#362298}", "cve_id": "CVE-2015-8126", "dataset_source": "BigVul" }
bigvul_1621
BigVul
CWE-119
c
const Chapters::Display* Chapters::Atom::GetDisplay(int index) const { if (index < 0) return NULL; if (index >= m_displays_count) return NULL; return m_displays + index; }
const Chapters::Display* Chapters::Atom::GetDisplay(int index) const
https://www.cvedetails.com/cve/CVE-2016-1621/
Android
04839626ed859623901ebd3a5fd483982186b59d
medium
{ "commit_message": "libwebm: Pull from upstream\n\nRolling mkvparser from upstream. Primarily for fixing a bug on parsing\nfailures with certain Opus WebM files.\n\nUpstream commit hash of this pull: 574045edd4ecbeb802ee3f1d2", "cve_id": "CVE-2016-1621", "dataset_source": "BigVul" }
bigvul_1622
BigVul
CWE-269
c
static void skel(const char *homedir, uid_t u, gid_t g) { char *fname; if (arg_zsh) { if (asprintf(&fname, "%s/.zshrc", homedir) == -1) errExit("asprintf"); struct stat s; if (stat(fname, &s) == 0) return; if (stat("/etc/skel/.zshrc", &s) == 0) { if (is_link("/etc/skel/.zshrc")) { fprintf(stde...
static void skel(const char *homedir, uid_t u, gid_t g) { char *fname; if (arg_zsh) { if (asprintf(&fname, "%s/.zshrc", homedir) == -1) errExit("asprintf"); struct stat s; if (stat(fname, &s) == 0) return; if (is_link(fname)) { // stat on dangling symlinks fails, try again using lstat fprintf(stder...
https://www.cvedetails.com/cve/CVE-2017-5940/
firejail
903fd8a0789ca3cc3c21d84cd0282481515592ef
medium
{ "commit_message": "security fix", "cve_id": "CVE-2017-5940", "dataset_source": "BigVul" }
bigvul_1657
BigVul
CWE-119
c
void buffer_slow_realign(struct buffer *buf) { /* two possible cases : * - the buffer is in one contiguous block, we move it in-place * - the buffer is in two blocks, we move it via the swap_buffer */ if (buf->i) { int block1 = buf->i; int block2 ...
void buffer_slow_realign(struct buffer *buf) { int block1 = buf->o; int block2 = 0; /* process output data in two steps to cover wrapping */ if (block1 > buf->p - buf->data) { block2 = buf->p - buf->data; block1 -= block2; } memcpy(swap_buffer + ...
https://www.cvedetails.com/cve/CVE-2015-3281/
haproxy
7ec765568883b2d4e5a2796adbeb492a22ec9bd4
medium
{ "commit_message": "", "cve_id": "CVE-2015-3281", "dataset_source": "BigVul" }
bigvul_1677
BigVul
CWE-20
c
Response PageHandler::SetDownloadBehavior(const std::string& behavior, Maybe<std::string> download_path) { WebContentsImpl* web_contents = GetWebContents(); if (!web_contents) return Response::InternalError(); if (behavior == Page::SetDownloadBehavior::BehaviorEn...
Response PageHandler::SetDownloadBehavior(const std::string& behavior, Maybe<std::string> download_path) { if (!allow_set_download_behavior_) return Response::Error("Not allowed."); WebContentsImpl* web_contents = GetWebContents(); if (!web_contents) return R...
https://www.cvedetails.com/cve/CVE-2018-18344/
Chrome
c71d8045ce0592cf3f4290744ab57b23c1d1b4c6
medium
{ "commit_message": "[DevTools] Do not allow Page.setDownloadBehavior for extensions\n\nBug: 866426\nChange-Id: I71b672978e1a8ec779ede49da16b21198567d3a4\nReviewed-on: https://chromium-review.googlesource.com/c/1270007\nCommit", "cve_id": "CVE-2018-18344", "dataset_source": "BigVul" }
bigvul_1703
BigVul
CWE-285
c
RenderFrameHostManager::GetSiteInstanceForNavigationRequest( const NavigationRequest& request) { SiteInstance* current_site_instance = render_frame_host_->GetSiteInstance(); bool no_renderer_swap_allowed = false; bool was_server_redirect = request.navigation_handle() && request.na...
RenderFrameHostManager::GetSiteInstanceForNavigationRequest( const NavigationRequest& request) { SiteInstance* current_site_instance = render_frame_host_->GetSiteInstance(); bool no_renderer_swap_allowed = false; bool was_server_redirect = request.navigation_handle() && request.na...
https://www.cvedetails.com/cve/CVE-2018-16073/
Chrome
0bb3f5c715eb66bb5c1fb05fd81d902ca57f33ca
medium
{ "commit_message": "Use unique processes for data URLs on restore.\n\nData URLs are usually put into the process that created them, but this\ninfo is not tracked after a tab restore. Ensure that they do not end up\nin the p", "cve_id": "CVE-2018-16073", "dataset_source": "BigVul" }
bigvul_1708
BigVul
CWE-20
c
AccessType GetExtensionAccess(const Extension* extension, const GURL& url, int tab_id) { bool allowed_script = IsAllowedScript(extension, url, tab_id); bool allowed_capture = extension->permissions_data()->CanCaptureVisiblePage( url, tab...
AccessType GetExtensionAccess(const Extension* extension, const GURL& url, int tab_id) { bool allowed_script = IsAllowedScript(extension, url, tab_id); bool allowed_capture = extension->permissions_data()->CanCaptureVisiblePage( url, tab...
https://www.cvedetails.com/cve/CVE-2019-5838/
Chrome
0660e08731fd42076d7242068e9eaed1482b14d5
medium
{ "commit_message": "Call CanCaptureVisiblePage in page capture API.\n\nCurrently the pageCapture permission allows access\nto arbitrary local files and chrome:// pages which\ncan be a security concern. In order to address th", "cve_id": "CVE-2019-5838", "dataset_source": "BigVul" }
bigvul_1745
BigVul
CWE-264
c
int regset_tls_set(struct task_struct *target, const struct user_regset *regset, unsigned int pos, unsigned int count, const void *kbuf, const void __user *ubuf) { struct user_desc infobuf[GDT_ENTRY_TLS_ENTRIES]; const struct user_desc *info; if (pos >= GDT_ENTRY_TLS_ENTRIES * sizeof(struct user_desc...
int regset_tls_set(struct task_struct *target, const struct user_regset *regset, unsigned int pos, unsigned int count, const void *kbuf, const void __user *ubuf) { struct user_desc infobuf[GDT_ENTRY_TLS_ENTRIES]; const struct user_desc *info; int i; if (pos >= GDT_ENTRY_TLS_ENTRIES * sizeof(struct u...
https://www.cvedetails.com/cve/CVE-2014-8133/
linux
41bdc78544b8a93a9c6814b8bbbfef966272abbe
medium
{ "commit_message": "x86/tls: Validate TLS entries to protect espfix\n\nInstalling a 16-bit RW data segment into the GDT defeats espfix.\nAFAICT this will not affect glibc, Wine, or dosemu at all.\n\nSigned-off-by: Andy Lutomi", "cve_id": "CVE-2014-8133", "dataset_source": "BigVul" }
bigvul_1768
BigVul
CWE-125
c
cisco_autorp_print(netdissect_options *ndo, register const u_char *bp, register u_int len) { int type; int numrps; int hold; ND_TCHECK(bp[0]); ND_PRINT((ndo, " auto-rp ")); type = bp[0]; switch (type) { case 0x11: ND_PRINT((ndo, "candidate-advert")); break; case 0x12: ND_PRINT((...
cisco_autorp_print(netdissect_options *ndo, register const u_char *bp, register u_int len) { int type; int numrps; int hold; if (len < 8) goto trunc; ND_TCHECK(bp[0]); ND_PRINT((ndo, " auto-rp ")); type = bp[0]; switch (type) { case 0x11: ND_PRINT((ndo, "candidate-advert")); bre...
https://www.cvedetails.com/cve/CVE-2017-13030/
tcpdump
5dc1860d8267b1e0cb78c9ffa2a40bea2fdb3ddc
medium
{ "commit_message": "CVE-2017-13030/PIM: Redo bounds checks and add length checks.\n\nUse ND_TCHECK macros to do bounds checking, and add length checks before\nthe bounds checks.\n\nAdd a bounds check that the review process f", "cve_id": "CVE-2017-13030", "dataset_source": "BigVul" }
bigvul_1769
BigVul
CWE-125
c
l2tp_proxy_auth_type_print(netdissect_options *ndo, const u_char *dat) { const uint16_t *ptr = (const uint16_t *)dat; ND_PRINT((ndo, "%s", tok2str(l2tp_authentype2str, "AuthType-#%u", EXTRACT_16BITS(ptr)))); }
l2tp_proxy_auth_type_print(netdissect_options *ndo, const u_char *dat) l2tp_proxy_auth_type_print(netdissect_options *ndo, const u_char *dat, u_int length) { const uint16_t *ptr = (const uint16_t *)dat; if (length < 2) { ND_PRINT((ndo, "AVP too short")); return; } ND_PRINT((ndo, "%s", tok2str(l2tp_authenty...
https://www.cvedetails.com/cve/CVE-2017-13006/
tcpdump
cc4a7391c616be7a64ed65742ef9ed3f106eb165
medium
{ "commit_message": "CVE-2017-13006/L2TP: Check whether an AVP's content exceeds the AVP length.\n\nIt's not good enough to check whether all the data specified by the AVP\nlength was captured - you also have to check whethe", "cve_id": "CVE-2017-13006", "dataset_source": "BigVul" }
bigvul_1779
BigVul
CWE-200
c
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
https://www.cvedetails.com/cve/CVE-2017-13143/
ImageMagick
51b0ae01709adc1e4a9245e158ef17b85a110960
medium
{ "commit_message": "https://github.com/ImageMagick/ImageMagick/issues/362", "cve_id": "CVE-2017-13143", "dataset_source": "BigVul" }
bigvul_1785
BigVul
CWE-119
c
void WT_VoiceGain (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame) { EAS_I32 *pMixBuffer; EAS_PCM *pInputBuffer; EAS_I32 gain; EAS_I32 gainIncrement; EAS_I32 tmp0; EAS_I32 tmp1; EAS_I32 tmp2; EAS_I32 numSamples; #if (NUM_OUTPUT_CHANNELS == 2) EAS_I32 gainLeft, gainRight; #endif ...
void WT_VoiceGain (S_WT_VOICE *pWTVoice, S_WT_INT_FRAME *pWTIntFrame) { EAS_I32 *pMixBuffer; EAS_PCM *pInputBuffer; EAS_I32 gain; EAS_I32 gainIncrement; EAS_I32 tmp0; EAS_I32 tmp1; EAS_I32 tmp2; EAS_I32 numSamples; #if (NUM_OUTPUT_CHANNELS == 2) EAS_I32 gainLeft, gainRight; #endif ...
https://www.cvedetails.com/cve/CVE-2016-0838/
Android
24d7c408c52143bce7b49de82f3913fd8d1219cf
medium
{ "commit_message": "Sonivox: add SafetyNet log.\n\nBug: 26366256\nChange-Id: Ief72e01b7cc6d87a015105af847a99d3d9b03cb0\n", "cve_id": "CVE-2016-0838", "dataset_source": "BigVul" }
bigvul_1802
BigVul
CWE-200
c
int Visualizer_command(effect_handle_t self, uint32_t cmdCode, uint32_t cmdSize, void *pCmdData, uint32_t *replySize, void *pReplyData) { VisualizerContext * pContext = (VisualizerContext *)self; int retsize; if (pContext == NULL || pContext->mState == VISUALIZER_STATE_UNINITIALIZED) { return -EINVAL; } swit...
int Visualizer_command(effect_handle_t self, uint32_t cmdCode, uint32_t cmdSize, void *pCmdData, uint32_t *replySize, void *pReplyData) { VisualizerContext * pContext = (VisualizerContext *)self; int retsize; if (pContext == NULL || pContext->mState == VISUALIZER_STATE_UNINITIALIZED) { return -EINVAL; } swit...
https://www.cvedetails.com/cve/CVE-2017-0396/
Android
557bd7bfe6c4895faee09e46fc9b5304a956c8b7
medium
{ "commit_message": "Visualizer: Check capture size and latency parameters\n\nBug: 31781965\nChange-Id: I1c439a0d0f6aa0057b3c651499f28426e1e1f5e4\n(cherry picked from commit 9a2732ba0a8d609ab040d2c1ddee28577ead9772)\n", "cve_id": "CVE-2017-0396", "dataset_source": "BigVul" }
bigvul_1813
BigVul
CWE-119
c
void GDataCache::Pin(const std::string& resource_id, const std::string& md5, FileOperationType file_operation_type, base::PlatformFileError* error) { AssertOnSequencedWorkerPool(); DCHECK(error); FilePath source_path; FilePath dest_path; FilePath...
void GDataCache::Pin(const std::string& resource_id, const std::string& md5, FileOperationType file_operation_type, base::PlatformFileError* error) { AssertOnSequencedWorkerPool(); DCHECK(error); FilePath source_path; FilePath dest_path; FilePath...
https://www.cvedetails.com/cve/CVE-2012-2895/
Chrome
baef1ffd73db183ca50c854e1779ed7f6e5100a8
medium
{ "commit_message": "Revert 144993 - gdata: Remove invalid files in the cache directories\n\nBroke linux_chromeos_valgrind:\nhttp://build.chromium.org/p/chromium.memory.fyi/builders/Chromium%20OS%20%28valgrind%29%285%29/buil", "cve_id": "CVE-2012-2895", "dataset_source": "BigVul" }
bigvul_1821
BigVul
CWE-284
c
int socket_accept(int fd, uint16_t port) { #ifdef WIN32 int addr_len; #else socklen_t addr_len; #endif int result; struct sockaddr_in addr; memset(&addr, 0, sizeof(addr)); addr.sin_family = AF_INET; addr.sin_addr.s_addr = htonl(INADDR_ANY); addr.sin_port = htons(port); addr_len = sizeof(addr); result ...
int socket_accept(int fd, uint16_t port) { #ifdef WIN32 int addr_len; #else socklen_t addr_len; #endif int result; struct sockaddr_in addr; memset(&addr, 0, sizeof(addr)); addr.sin_family = AF_INET; addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); addr.sin_port = htons(port); addr_len = sizeof(addr); re...
https://www.cvedetails.com/cve/CVE-2016-5104/
libimobiledevice
df1f5c4d70d0c19ad40072f5246ca457e7f9849e
medium
{ "commit_message": "common: [security fix] Make sure sockets only listen locally", "cve_id": "CVE-2016-5104", "dataset_source": "BigVul" }
bigvul_1831
BigVul
CWE-20
c
EncodedJSValue JSC_HOST_CALL jsTestObjPrototypeFunctionConvert2(ExecState* exec) { JSValue thisValue = exec->hostThisValue(); if (!thisValue.inherits(&JSTestObj::s_info)) return throwVMTypeError(exec); JSTestObj* castedThis = jsCast<JSTestObj*>(asObject(thisValue)); ASSERT_GC_OBJECT_INHERITS(ca...
EncodedJSValue JSC_HOST_CALL jsTestObjPrototypeFunctionConvert2(ExecState* exec) { JSValue thisValue = exec->hostThisValue(); if (!thisValue.inherits(&JSTestObj::s_info)) return throwVMTypeError(exec); JSTestObj* castedThis = jsCast<JSTestObj*>(asObject(thisValue)); ASSERT_GC_OBJECT_INHERITS(ca...
https://www.cvedetails.com/cve/CVE-2011-2350/
Chrome
b944f670bb7a8a919daac497a4ea0536c954c201
medium
{ "commit_message": "[JSC] Implement a helper method createNotEnoughArgumentsError()\nhttps://bugs.webkit.org/show_bug.cgi?id=85102\n\nReviewed by Geoffrey Garen.\n\nIn bug 84787, kbr@ requested to avoid hard-coding\ncreateType", "cve_id": "CVE-2011-2350", "dataset_source": "BigVul" }
bigvul_1847
BigVul
CWE-125
c
static int piv_match_card_continued(sc_card_t *card) { int i; int type = -1; piv_private_data_t *priv = NULL; int saved_type = card->type; /* Since we send an APDU, the card's logout function may be called... * however it may be in dirty memory */ card->ops->logout = NULL; /* piv_match_card may be called wi...
static int piv_match_card_continued(sc_card_t *card) { int i; int type = -1; piv_private_data_t *priv = NULL; int saved_type = card->type; /* Since we send an APDU, the card's logout function may be called... * however it may be in dirty memory */ card->ops->logout = NULL; /* piv_match_card may be called wi...
https://www.cvedetails.com/cve/CVE-2018-16427/
OpenSC
8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
medium
{ "commit_message": "fixed out of bounds reads\n\nThanks to Eric Sesterhenn from X41 D-SEC GmbH\nfor reporting and suggesting security fixes.", "cve_id": "CVE-2018-16427", "dataset_source": "BigVul" }
bigvul_1880
BigVul
CWE-415
c
read_gif(Gif_Reader *grr, int read_flags, const char* landmark, Gif_ReadErrorHandler handler) { Gif_Stream *gfs; Gif_Image *gfi; Gif_Context gfc; int unknown_block_type = 0; if (gifgetc(grr) != 'G' || gifgetc(grr) != 'I' || gifgetc(grr) != 'F') return 0; (void)gifgetc(grr); (void)gifget...
read_gif(Gif_Reader *grr, int read_flags, const char* landmark, Gif_ReadErrorHandler handler) { Gif_Stream *gfs; Gif_Image *gfi; Gif_Context gfc; int unknown_block_type = 0; if (gifgetc(grr) != 'G' || gifgetc(grr) != 'I' || gifgetc(grr) != 'F') return 0; (void)gifgetc(grr); (void)gifget...
https://www.cvedetails.com/cve/CVE-2017-18120/
gifsicle
118a46090c50829dc543179019e6140e1235f909
medium
{ "commit_message": "gif_read: Set last_name = NULL unconditionally.\n\nWith a non-malicious GIF, last_name is set to NULL when a name\nextension is followed by an image. Reported in #117, via\nDebian, via a KAIST fuzzing pro", "cve_id": "CVE-2017-18120", "dataset_source": "BigVul" }
bigvul_1893
BigVul
CWE-119
c
exsltCryptoRc4DecryptFunction (xmlXPathParserContextPtr ctxt, int nargs) { int key_len = 0, key_size = 0; int str_len = 0, bin_len = 0, ret_len = 0; xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin = NULL, *ret = NULL; xsltTransformContextPtr tctxt = NULL; if (nargs != 2) { xmlXPathSet...
exsltCryptoRc4DecryptFunction (xmlXPathParserContextPtr ctxt, int nargs) { int key_len = 0; int str_len = 0, bin_len = 0, ret_len = 0; xmlChar *key = NULL, *str = NULL, *padkey = NULL, *bin = NULL, *ret = NULL; xsltTransformContextPtr tctxt = NULL; if (nargs != 2) { xmlXPathSetArityError (ct...
https://www.cvedetails.com/cve/CVE-2016-1683/
Chrome
96dbafe288dbe2f0cc45fa3c39daf6d0c37acbab
medium
{ "commit_message": "Roll libxslt to 891681e3e948f31732229f53cb6db7215f740fc7\n\nBUG=583156,583171\n\nReview URL: https://codereview.chromium.org/1853083002\n\nCr-Commit-Position: refs/heads/master@{#385338}", "cve_id": "CVE-2016-1683", "dataset_source": "BigVul" }
bigvul_1895
BigVul
CWE-310
c
int SSL_library_init(void) { #ifndef OPENSSL_NO_DES EVP_add_cipher(EVP_des_cbc()); EVP_add_cipher(EVP_des_ede3_cbc()); #endif #ifndef OPENSSL_NO_IDEA EVP_add_cipher(EVP_idea_cbc()); #endif #ifndef OPENSSL_NO_RC4 EVP_add_cipher(EVP_rc4()); #if !defined(OPENSSL_NO_MD5) && (defined(__x86_64) || defined(__x86_64__)) ...
int SSL_library_init(void) { #ifndef OPENSSL_NO_DES EVP_add_cipher(EVP_des_cbc()); EVP_add_cipher(EVP_des_ede3_cbc()); #endif #ifndef OPENSSL_NO_IDEA EVP_add_cipher(EVP_idea_cbc()); #endif #ifndef OPENSSL_NO_RC4 EVP_add_cipher(EVP_rc4()); #if !defined(OPENSSL_NO_MD5) && (defined(__x86_64) || defined(__x86_64__)) ...
https://www.cvedetails.com/cve/CVE-2012-2686/
openssl
125093b59f3c2a2d33785b5563d929d0472f1721
medium
{ "commit_message": "", "cve_id": "CVE-2012-2686", "dataset_source": "BigVul" }
bigvul_1950
BigVul
CWE-399
c
handle_associated_event(struct cpu_hw_events *cpuc, int idx, struct perf_sample_data *data, struct pt_regs *regs) { struct perf_event *event = cpuc->events[idx]; struct hw_perf_event *hwc = &event->hw; mipspmu_event_update(event, hwc, idx); data->period = event->hw.last_period; if (!mipspmu_event_set_period(eve...
handle_associated_event(struct cpu_hw_events *cpuc, int idx, struct perf_sample_data *data, struct pt_regs *regs) { struct perf_event *event = cpuc->events[idx]; struct hw_perf_event *hwc = &event->hw; mipspmu_event_update(event, hwc, idx); data->period = event->hw.last_period; if (!mipspmu_event_set_period(eve...
https://www.cvedetails.com/cve/CVE-2011-2918/
linux
a8b0ca17b80e92faab46ee7179ba9e99ccb61233
medium
{ "commit_message": "perf: Remove the nmi parameter from the swevent and overflow interface\n\nThe nmi parameter indicated if we could do wakeups from the current\ncontext, if not, we would set some state and self-IPI and le", "cve_id": "CVE-2011-2918", "dataset_source": "BigVul" }
bigvul_1978
BigVul
CWE-20
c
int __glXDispSwap_CreateContext(__GLXclientState *cl, GLbyte *pc) { xGLXCreateContextReq *req = (xGLXCreateContextReq *) pc; __GLX_DECLARE_SWAP_VARIABLES; __GLX_SWAP_SHORT(&req->length); __GLX_SWAP_INT(&req->context); __GLX_SWAP_INT(&req->visual); return __glXDisp_CreateContext(cl, pc); ...
int __glXDispSwap_CreateContext(__GLXclientState *cl, GLbyte *pc) { ClientPtr client = cl->client; xGLXCreateContextReq *req = (xGLXCreateContextReq *) pc; __GLX_DECLARE_SWAP_VARIABLES; REQUEST_SIZE_MATCH(xGLXCreateContextReq); __GLX_SWAP_SHORT(&req->length); __GLX_SWAP_INT(&req->context...
https://www.cvedetails.com/cve/CVE-2010-4818/
xserver
6c69235a9dfc52e4b4e47630ff4bab1a820eb543
medium
{ "commit_message": "", "cve_id": "CVE-2010-4818", "dataset_source": "BigVul" }
bigvul_1982
BigVul
CWE-189
c
struct xt_table_info *xt_alloc_table_info(unsigned int size) { struct xt_table_info *info = NULL; size_t sz = sizeof(*info) + size; /* Pedantry: prevent them from hitting BUG() in vmalloc.c --RR */ if ((SMP_ALIGN(size) >> PAGE_SHIFT) + 2 > totalram_pages) return NULL; if (sz <= (PAGE_SIZE << PAGE_ALLOC_C...
struct xt_table_info *xt_alloc_table_info(unsigned int size) { struct xt_table_info *info = NULL; size_t sz = sizeof(*info) + size; if (sz < sizeof(*info)) return NULL; /* Pedantry: prevent them from hitting BUG() in vmalloc.c --RR */ if ((SMP_ALIGN(size) >> PAGE_SHIFT) + 2 > totalram_pages) return NUL...
https://www.cvedetails.com/cve/CVE-2016-3135/
linux
d157bd761585605b7882935ffb86286919f62ea1
medium
{ "commit_message": "netfilter: x_tables: check for size overflow\n\nBen Hawkes says:\n integer overflow in xt_alloc_table_info, which on 32-bit systems can\n lead to small structure allocation and a copy_from_user based heap", "cve_id": "CVE-2016-3135", "dataset_source": "BigVul" }
bigvul_1987
BigVul
CWE-264
c
static int kvm_vm_ioctl_assign_device(struct kvm *kvm, struct kvm_assigned_pci_dev *assigned_dev) { int r = 0, idx; struct kvm_assigned_dev_kernel *match; struct pci_dev *dev; if (!(assigned_dev->flags & KVM_DEV_ASSIGN_ENABLE_IOMMU)) return -EINVAL; mutex_lock(&kvm->lock); idx = srcu_read_lo...
static int kvm_vm_ioctl_assign_device(struct kvm *kvm, struct kvm_assigned_pci_dev *assigned_dev) { int r = 0, idx; struct kvm_assigned_dev_kernel *match; struct pci_dev *dev; u8 header_type; if (!(assigned_dev->flags & KVM_DEV_ASSIGN_ENABLE_IOMMU)) return -EINVAL; mutex_lock(&kvm->lock); i...
https://www.cvedetails.com/cve/CVE-2011-4347/
linux
c4e7f9022e506c6635a5037713c37118e23193e4
medium
{ "commit_message": "KVM: Device assignment permission checks\n\n(cherry picked from commit 3d27e23b17010c668db311140b17bbbb70c78fb9)\n\nOnly allow KVM device assignment to attach to devices which:\n\n - Are not bridges\n - Have", "cve_id": "CVE-2011-4347", "dataset_source": "BigVul" }
bigvul_2005
BigVul
CWE-119
c
static Image *ReadWMFImage(const ImageInfo *image_info,ExceptionInfo *exception) { double bounding_height, bounding_width, image_height, image_height_inch, image_width, image_width_inch, resolution_y, resolution_x, units_per_inch; float wmf_width, wmf_height; Image ...
static Image *ReadWMFImage(const ImageInfo *image_info,ExceptionInfo *exception) { double bounding_height, bounding_width, image_height, image_height_inch, image_width, image_width_inch, resolution_y, resolution_x, units_per_inch; float wmf_width, wmf_height; Image ...
https://www.cvedetails.com/cve/CVE-2016-10066/
ImageMagick
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
medium
{ "commit_message": "", "cve_id": "CVE-2016-10066", "dataset_source": "BigVul" }
bigvul_2021
BigVul
CWE-190
c
static void controloptions (lua_State *L, int opt, const char **fmt, Header *h) { switch (opt) { case ' ': return; /* ignore white spaces */ case '>': h->endian = BIG; return; case '<': h->endian = LITTLE; return; case '!': { int a = getnum(L, fmt, MAXALIGN); ...
static void controloptions (lua_State *L, int opt, const char **fmt, Header *h) { switch (opt) { case ' ': return; /* ignore white spaces */ case '>': h->endian = BIG; return; case '<': h->endian = LITTLE; return; case '!': { int a = getnum(fmt, MAXALIGN); ...
https://www.cvedetails.com/cve/CVE-2018-11219/
redis
1eb08bcd4634ae42ec45e8284923ac048beaa4c3
medium
{ "commit_message": "Security: update Lua struct package for security.\n\nDuring an auditing Apple found that the \"struct\" Lua package\nwe ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains\na security prob", "cve_id": "CVE-2018-11219", "dataset_source": "BigVul" }
bigvul_2039
BigVul
CWE-20
c
static int remove_bond(const bt_bdaddr_t *bd_addr) { /* sanity check */ if (interface_ready() == FALSE) return BT_STATUS_NOT_READY; return btif_dm_remove_bond(bd_addr); }
static int remove_bond(const bt_bdaddr_t *bd_addr) { if (is_restricted_mode() && !btif_storage_is_restricted_device(bd_addr)) return BT_STATUS_SUCCESS; /* sanity check */ if (interface_ready() == FALSE) return BT_STATUS_NOT_READY; return btif_dm_remove_bond(bd_addr); }
https://www.cvedetails.com/cve/CVE-2016-3760/
Android
37c88107679d36c419572732b4af6e18bb2f7dce
medium
{ "commit_message": "Add guest mode functionality (2/3)\n\nAdd a flag to enable() to start Bluetooth in restricted\nmode. In restricted mode, all devices that are paired during\nrestricted mode are deleted upon leaving restri", "cve_id": "CVE-2016-3760", "dataset_source": "BigVul" }