idx
int64
func_before
string
Vulnerability Classification
string
vul
int64
func_after
string
patch
string
CWE ID
string
lines_before
string
lines_after
string
6,900
size_t mptsas_config_manufacturing_4(MPTSASState *s, uint8_t **data, int address) { /* All zeros */ return MPTSAS_CONFIG_PACK(4, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x05, "*l*b*b*b*b*b*b*w*s56*l*l*l*l*l*l" "*b*b*w*b*b*w*l*l"); }
DoS
0
size_t mptsas_config_manufacturing_4(MPTSASState *s, uint8_t **data, int address) { /* All zeros */ return MPTSAS_CONFIG_PACK(4, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x05, "*l*b*b*b*b*b*b*w*s56*l*l*l*l*l*l" "*b*b*w*b*b*w*l*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,901
size_t mptsas_config_manufacturing_5(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(5, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x02, "q*b*b*w*l*l", s->sas_addr); }
DoS
0
size_t mptsas_config_manufacturing_5(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(5, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x02, "q*b*b*w*l*l", s->sas_addr); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,902
size_t mptsas_config_manufacturing_6(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(6, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
DoS
0
size_t mptsas_config_manufacturing_6(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(6, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,903
size_t mptsas_config_manufacturing_8(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(8, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
DoS
0
size_t mptsas_config_manufacturing_8(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK(8, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, "*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,904
static size_t mptsas_config_pack(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret / 4 < 256 && (ret % 4) == 0); stb_p(*data + 1, ret / 4); } return ret; }
DoS
0
static size_t mptsas_config_pack(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret / 4 < 256 && (ret % 4) == 0); stb_p(*data + 1, ret / 4); } return ret; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,905
static size_t mptsas_config_pack_ext(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret < 65536 && (ret % 4) == 0); stw_le_p(*data + 4, ret / 4); } return ret; }
DoS
0
static size_t mptsas_config_pack_ext(uint8_t **data, const char *fmt, ...) { va_list ap; size_t ret; va_start(ap, fmt); ret = vpack(data, fmt, ap); va_end(ap); if (data) { assert(ret < 65536 && (ret % 4) == 0); stw_le_p(*data + 4, ret / 4); } return ret; }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,906
size_t mptsas_config_phy_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_phy_addr_get(s, address); if (i < 0) { trace_mptsas_config_sas_phy(s, address, i, phy_handle, dev_handle, 1); return i; } (void) mptsas_phy_get_dev...
DoS
0
size_t mptsas_config_phy_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_phy_addr_get(s, address); if (i < 0) { trace_mptsas_config_sas_phy(s, address, i, phy_handle, dev_handle, 1); return i; } (void) mptsas_phy_get_dev...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,907
size_t mptsas_config_sas_device_0(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, d...
DoS
0
size_t mptsas_config_sas_device_0(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, d...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,908
size_t mptsas_config_sas_device_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, d...
DoS
0
size_t mptsas_config_sas_device_1(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, d...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,909
size_t mptsas_config_sas_device_2(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, d...
DoS
0
size_t mptsas_config_sas_device_2(MPTSASState *s, uint8_t **data, int address) { int phy_handle = -1; int dev_handle = -1; int i = mptsas_device_addr_get(s, address); SCSIDevice *dev = mptsas_phy_get_device(s, i, &phy_handle, &dev_handle); trace_mptsas_config_sas_device(s, address, i, phy_handle, d...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,910
size_t mptsas_config_sas_io_unit_0(MPTSASState *s, uint8_t **data, int address) { size_t size = MPTSAS_CONFIG_PACK_EXT(0, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x04, "*w*wb*b*w" repl(MPTSAS_NUM_PORTS, "*s16"), ...
DoS
0
size_t mptsas_config_sas_io_unit_0(MPTSASState *s, uint8_t **data, int address) { size_t size = MPTSAS_CONFIG_PACK_EXT(0, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x04, "*w*wb*b*w" repl(MPTSAS_NUM_PORTS, "*s16"), ...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,911
size_t mptsas_config_sas_io_unit_2(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(2, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*b*b*w*w*w*b*b*w"); }
DoS
0
size_t mptsas_config_sas_io_unit_2(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(2, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*b*b*w*w*w*b*b*w"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,912
size_t mptsas_config_sas_io_unit_3(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(3, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*l*l*l*l*l*l*l*l*l"); }
DoS
0
size_t mptsas_config_sas_io_unit_3(MPTSASState *s, uint8_t **data, int address) { return MPTSAS_CONFIG_PACK_EXT(3, MPI_CONFIG_EXTPAGETYPE_SAS_IO_UNIT, 0x06, "*l*l*l*l*l*l*l*l*l"); }
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,913
static int mptsas_device_addr_get(MPTSASState *s, int address) { uint32_t handle, i; uint32_t form = address >> MPI_SAS_PHY_PGAD_FORM_SHIFT; if (form == MPI_SAS_DEVICE_PGAD_FORM_GET_NEXT_HANDLE) { handle = address & MPI_SAS_DEVICE_PGAD_GNH_HANDLE_MASK; do { if (handle == 65535) {...
DoS
0
static int mptsas_device_addr_get(MPTSASState *s, int address) { uint32_t handle, i; uint32_t form = address >> MPI_SAS_PHY_PGAD_FORM_SHIFT; if (form == MPI_SAS_DEVICE_PGAD_FORM_GET_NEXT_HANDLE) { handle = address & MPI_SAS_DEVICE_PGAD_GNH_HANDLE_MASK; do { if (handle == 65535) {...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,914
static const MPTSASConfigPage *mptsas_find_config_page(int type, int number) { const MPTSASConfigPage *page; int i; for (i = 0; i < ARRAY_SIZE(mptsas_config_pages); i++) { page = &mptsas_config_pages[i]; if (page->type == type && page->number == number) { return page; } ...
DoS
0
static const MPTSASConfigPage *mptsas_find_config_page(int type, int number) { const MPTSASConfigPage *page; int i; for (i = 0; i < ARRAY_SIZE(mptsas_config_pages); i++) { page = &mptsas_config_pages[i]; if (page->type == type && page->number == number) { return page; } ...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,915
static int mptsas_phy_addr_get(MPTSASState *s, int address) { int i; if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 0) { i = address & 255; } else if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 1) { i = address & 65535; } else { return -EINVAL; } if (i >= MPTSAS_NUM_PO...
DoS
0
static int mptsas_phy_addr_get(MPTSASState *s, int address) { int i; if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 0) { i = address & 255; } else if ((address >> MPI_SAS_PHY_PGAD_FORM_SHIFT) == 1) { i = address & 65535; } else { return -EINVAL; } if (i >= MPTSAS_NUM_PO...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,916
static SCSIDevice *mptsas_phy_get_device(MPTSASState *s, int i, int *phy_handle, int *dev_handle) { SCSIDevice *d = scsi_device_find(&s->bus, 0, i, 0); if (phy_handle) { *phy_handle = i + 1; } if (dev_handle) { *dev_handle = d ? i + 1 + MPTSAS_NU...
DoS
0
static SCSIDevice *mptsas_phy_get_device(MPTSASState *s, int i, int *phy_handle, int *dev_handle) { SCSIDevice *d = scsi_device_find(&s->bus, 0, i, 0); if (phy_handle) { *phy_handle = i + 1; } if (dev_handle) { *dev_handle = d ? i + 1 + MPTSAS_NU...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,917
void mptsas_process_config(MPTSASState *s, MPIMsgConfig *req) { PCIDevice *pci = PCI_DEVICE(s); MPIMsgConfigReply reply; const MPTSASConfigPage *page; size_t length; uint8_t type; uint8_t *data = NULL; uint32_t flags_and_length; uint32_t dmalen; uint64_t pa; mptsas_fix_config_e...
DoS
0
void mptsas_process_config(MPTSASState *s, MPIMsgConfig *req) { PCIDevice *pci = PCI_DEVICE(s); MPIMsgConfigReply reply; const MPTSASConfigPage *page; size_t length; uint8_t type; uint8_t *data = NULL; uint32_t flags_and_length; uint32_t dmalen; uint64_t pa; mptsas_fix_config_e...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,918
static size_t vfill(uint8_t *data, size_t size, const char *fmt, va_list ap) { size_t ofs; PackValue val; const char *p; ofs = 0; p = fmt; while (*p) { memset(&val, 0, sizeof(val)); switch (*p) { case '*': p++; break; case 'b': cas...
DoS
0
static size_t vfill(uint8_t *data, size_t size, const char *fmt, va_list ap) { size_t ofs; PackValue val; const char *p; ofs = 0; p = fmt; while (*p) { memset(&val, 0, sizeof(val)); switch (*p) { case '*': p++; break; case 'b': cas...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,919
static size_t vpack(uint8_t **p_data, const char *fmt, va_list ap1) { size_t size = 0; uint8_t *data = NULL; if (p_data) { va_list ap2; va_copy(ap2, ap1); size = vfill(NULL, 0, fmt, ap2); *p_data = data = g_malloc(size); va_end(ap2); } return vfill(data, siz...
DoS
0
static size_t vpack(uint8_t **p_data, const char *fmt, va_list ap1) { size_t size = 0; uint8_t *data = NULL; if (p_data) { va_list ap2; va_copy(ap2, ap1); size = vfill(NULL, 0, fmt, ap2); *p_data = data = g_malloc(size); va_end(ap2); } return vfill(data, siz...
@@ -203,7 +203,7 @@ size_t mptsas_config_manufacturing_1(MPTSASState *s, uint8_t **data, int address { /* VPD - all zeros */ return MPTSAS_CONFIG_PACK(1, MPI_CONFIG_PAGETYPE_MANUFACTURING, 0x00, - "s256"); + "*s256"); } static @@ -328,7 +328,7 @@ ...
CWE-20
null
null
6,920
pvscsi_ring_pop_req_descr(PVSCSIRingInfo *mgr) { uint32_t ready_ptr = RS_GET_FIELD(mgr, reqProdIdx); if (ready_ptr != mgr->consumed_ptr) { uint32_t next_ready_ptr = mgr->consumed_ptr++ & mgr->txr_len_mask; uint32_t next_ready_page = next_ready_ptr / PVSCSI_MAX_NUM_REQ_EN...
DoS
0
pvscsi_ring_pop_req_descr(PVSCSIRingInfo *mgr) { uint32_t ready_ptr = RS_GET_FIELD(mgr, reqProdIdx); if (ready_ptr != mgr->consumed_ptr) { uint32_t next_ready_ptr = mgr->consumed_ptr++ & mgr->txr_len_mask; uint32_t next_ready_page = next_ready_ptr / PVSCSI_MAX_NUM_REQ_EN...
@@ -40,6 +40,8 @@ #define PVSCSI_MAX_DEVS (64) #define PVSCSI_MSIX_NUM_VECTORS (1) +#define PVSCSI_MAX_SG_ELEM 2048 + #define PVSCSI_MAX_CMD_DATA_WORDS \ (sizeof(PVSCSICmdDescSetupRings)/sizeof(uint32_t)) @@ -628,17 +630,16 @@ pvscsi_queue_pending_descriptor(PVSCSI...
CWE-399
null
null
6,921
append_dir_structure (const struct url *u, struct growable *dest) { char *pathel, *next; int cut = opt.cut_dirs; /* Go through the path components, de-URL-quote them, and quote them (if necessary) as file names. */ pathel = u->path; for (; (next = strchr (pathel, '/')) != NULL; pathel = next + 1) ...
null
0
append_dir_structure (const struct url *u, struct growable *dest) { char *pathel, *next; int cut = opt.cut_dirs; /* Go through the path components, de-URL-quote them, and quote them (if necessary) as file names. */ pathel = u->path; for (; (next = strchr (pathel, '/')) != NULL; pathel = next + 1) ...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,922
append_null (struct growable *dest) { GROW (dest, 1); *TAIL (dest) = 0; }
null
0
append_null (struct growable *dest) { GROW (dest, 1); *TAIL (dest) = 0; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,923
append_string (const char *str, struct growable *dest) { int l = strlen (str); if (l) { GROW (dest, l); memcpy (TAIL (dest), str, l); TAIL_INCR (dest, l); } append_null (dest); }
null
0
append_string (const char *str, struct growable *dest) { int l = strlen (str); if (l) { GROW (dest, l); memcpy (TAIL (dest), str, l); TAIL_INCR (dest, l); } append_null (dest); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,924
append_uri_pathel (const char *b, const char *e, bool escaped, struct growable *dest) { const char *p; int quoted, outlen; int mask; if (opt.restrict_files_os == restrict_unix) mask = filechr_not_unix; else if (opt.restrict_files_os == restrict_vms) mask = filechr_not_vms; else ...
null
0
append_uri_pathel (const char *b, const char *e, bool escaped, struct growable *dest) { const char *p; int quoted, outlen; int mask; if (opt.restrict_files_os == restrict_unix) mask = filechr_not_unix; else if (opt.restrict_files_os == restrict_vms) mask = filechr_not_vms; else ...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,925
are_urls_equal (const char *u1, const char *u2) { const char *p, *q; int pp, qq; char ch1, ch2; assert(u1 && u2); p = u1; q = u2; while (*p && *q && (pp = getchar_from_escaped_string (p, &ch1)) && (qq = getchar_from_escaped_string (q, &ch2)) && (c_tolower(ch1) == c_tolower(ch2...
null
0
are_urls_equal (const char *u1, const char *u2) { const char *p, *q; int pp, qq; char ch1, ch2; assert(u1 && u2); p = u1; q = u2; while (*p && *q && (pp = getchar_from_escaped_string (p, &ch1)) && (qq = getchar_from_escaped_string (q, &ch2)) && (c_tolower(ch1) == c_tolower(ch2...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,926
char_needs_escaping (const char *p) { if (*p == '%') { if (c_isxdigit (*(p + 1)) && c_isxdigit (*(p + 2))) return false; else /* Garbled %.. sequence: encode `%'. */ return true; } else if (URL_UNSAFE_CHAR (*p) && !URL_RESERVED_CHAR (*p)) return true; else retur...
null
0
char_needs_escaping (const char *p) { if (*p == '%') { if (c_isxdigit (*(p + 1)) && c_isxdigit (*(p + 2))) return false; else /* Garbled %.. sequence: encode `%'. */ return true; } else if (URL_UNSAFE_CHAR (*p) && !URL_RESERVED_CHAR (*p)) return true; else retur...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,927
convert_fname (char *fname) { char *converted_fname = fname; const char *from_encoding = opt.encoding_remote; const char *to_encoding = opt.locale; iconv_t cd; size_t len, done, inlen, outlen; char *s; const char *orig_fname = fname; /* Defaults for remote and local encodings. */ if (!from_encoding)...
null
0
convert_fname (char *fname) { char *converted_fname = fname; const char *from_encoding = opt.encoding_remote; const char *to_encoding = opt.locale; iconv_t cd; size_t len, done, inlen, outlen; char *s; const char *orig_fname = fname; /* Defaults for remote and local encodings. */ if (!from_encoding)...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,928
full_path_write (const struct url *url, char *where) { #define FROB(el, chr) do { \ char *f_el = url->el; \ if (f_el) { \ int l = strlen (f_el); \ *where++ = chr; \ memcpy (whe...
null
0
full_path_write (const struct url *url, char *where) { #define FROB(el, chr) do { \ char *f_el = url->el; \ if (f_el) { \ int l = strlen (f_el); \ *where++ = chr; \ memcpy (whe...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,929
getchar_from_escaped_string (const char *str, char *c) { const char *p = str; assert (str && *str); assert (c); if (p[0] == '%') { if (!c_isxdigit(p[1]) || !c_isxdigit(p[2])) { *c = '%'; return 1; } else { if (p[2] == 0) return ...
null
0
getchar_from_escaped_string (const char *str, char *c) { const char *p = str; assert (str && *str); assert (c); if (p[0] == '%') { if (!c_isxdigit(p[1]) || !c_isxdigit(p[2])) { *c = '%'; return 1; } else { if (p[2] == 0) return ...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,930
init_seps (enum url_scheme scheme) { static char seps[8] = ":/"; char *p = seps + 2; int flags = supported_schemes[scheme].flags; if (flags & scm_has_params) *p++ = ';'; if (flags & scm_has_query) *p++ = '?'; if (flags & scm_has_fragment) *p++ = '#'; *p = '\0'; return seps; }
null
0
init_seps (enum url_scheme scheme) { static char seps[8] = ":/"; char *p = seps + 2; int flags = supported_schemes[scheme].flags; if (flags & scm_has_params) *p++ = ';'; if (flags & scm_has_query) *p++ = '?'; if (flags & scm_has_fragment) *p++ = '#'; *p = '\0'; return seps; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,931
lowercase_str (char *str) { bool changed = false; for (; *str; str++) if (c_isupper (*str)) { changed = true; *str = c_tolower (*str); } return changed; }
null
0
lowercase_str (char *str) { bool changed = false; for (; *str; str++) if (c_isupper (*str)) { changed = true; *str = c_tolower (*str); } return changed; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,932
mkalldirs (const char *path) { const char *p; char *t; struct stat st; int res; p = path + strlen (path); for (; *p != '/' && p != path; p--) ; /* Don't create if it's just a file. */ if ((p == path) && (*p != '/')) return 0; t = strdupdelim (path, p); /* Check whether the directory exis...
null
0
mkalldirs (const char *path) { const char *p; char *t; struct stat st; int res; p = path + strlen (path); for (; *p != '/' && p != path; p--) ; /* Don't create if it's just a file. */ if ((p == path) && (*p != '/')) return 0; t = strdupdelim (path, p); /* Check whether the directory exis...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,933
path_simplify (enum url_scheme scheme, char *path) { char *h = path; /* hare */ char *t = path; /* tortoise */ char *beg = path; char *end = strchr (path, '\0'); while (h < end) { /* Hare should be at the beginning of a path element. */ if (h[0] == '.' && (h[1] ==...
null
0
path_simplify (enum url_scheme scheme, char *path) { char *h = path; /* hare */ char *t = path; /* tortoise */ char *beg = path; char *end = strchr (path, '\0'); while (h < end) { /* Hare should be at the beginning of a path element. */ if (h[0] == '.' && (h[1] ==...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,934
ps (char *path) { char *copy = xstrdup (path); path_simplify (copy); return copy; }
null
0
ps (char *path) { char *copy = xstrdup (path); path_simplify (copy); return copy; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,935
rewrite_shorthand_url (const char *url) { const char *p; char *ret; if (url_scheme (url) != SCHEME_INVALID) return NULL; /* Look for a ':' or '/'. The former signifies NcFTP syntax, the latter Netscape. */ p = strpbrk (url, ":/"); if (p == url) return NULL; /* If we're looking at "://", ...
null
0
rewrite_shorthand_url (const char *url) { const char *p; char *ret; if (url_scheme (url) != SCHEME_INVALID) return NULL; /* Look for a ':' or '/'. The former signifies NcFTP syntax, the latter Netscape. */ p = strpbrk (url, ":/"); if (p == url) return NULL; /* If we're looking at "://", ...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,936
scheme_disable (enum url_scheme scheme) { supported_schemes[scheme].flags |= scm_disabled; }
null
0
scheme_disable (enum url_scheme scheme) { supported_schemes[scheme].flags |= scm_disabled; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,937
scheme_leading_string (enum url_scheme scheme) { return supported_schemes[scheme].leading_string; }
null
0
scheme_leading_string (enum url_scheme scheme) { return supported_schemes[scheme].leading_string; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,938
schemes_are_similar_p (enum url_scheme a, enum url_scheme b) { if (a == b) return true; #ifdef HAVE_SSL if ((a == SCHEME_HTTP && b == SCHEME_HTTPS) || (a == SCHEME_HTTPS && b == SCHEME_HTTP)) return true; #endif return false; }
null
0
schemes_are_similar_p (enum url_scheme a, enum url_scheme b) { if (a == b) return true; #ifdef HAVE_SSL if ((a == SCHEME_HTTP && b == SCHEME_HTTPS) || (a == SCHEME_HTTPS && b == SCHEME_HTTP)) return true; #endif return false; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,939
split_path (const char *path, char **dir, char **file) { char *last_slash = strrchr (path, '/'); if (!last_slash) { *dir = xstrdup (""); *file = xstrdup (path); } else { *dir = strdupdelim (path, last_slash); *file = xstrdup (last_slash + 1); } url_unescape (*dir); url_...
null
0
split_path (const char *path, char **dir, char **file) { char *last_slash = strrchr (path, '/'); if (!last_slash) { *dir = xstrdup (""); *file = xstrdup (path); } else { *dir = strdupdelim (path, last_slash); *file = xstrdup (last_slash + 1); } url_unescape (*dir); url_...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,940
strpbrk_or_eos (const char *s, const char *accept) { char *p = strpbrk (s, accept); if (!p) p = strchr (s, '\0'); return p; }
null
0
strpbrk_or_eos (const char *s, const char *accept) { char *p = strpbrk (s, accept); if (!p) p = strchr (s, '\0'); return p; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,941
sync_path (struct url *u) { char *newpath, *efile, *edir; xfree (u->path); /* u->dir and u->file are not escaped. URL-escape them before reassembling them into u->path. That way, if they contain separators like '?' or even if u->file contains slashes, the path will be correctly assembled. (u->...
null
0
sync_path (struct url *u) { char *newpath, *efile, *edir; xfree (u->path); /* u->dir and u->file are not escaped. URL-escape them before reassembling them into u->path. That way, if they contain separators like '?' or even if u->file contains slashes, the path will be correctly assembled. (u->...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,942
test_append_uri_pathel(void) { unsigned i; static const struct { const char *original_url; const char *input; bool escaped; const char *expected_result; } test_array[] = { { "http://www.yoyodyne.com/path/", "somepage.html", false, "http://www.yoyodyne.com/path/somepage.html" }, }; for (i ...
null
0
test_append_uri_pathel(void) { unsigned i; static const struct { const char *original_url; const char *input; bool escaped; const char *expected_result; } test_array[] = { { "http://www.yoyodyne.com/path/", "somepage.html", false, "http://www.yoyodyne.com/path/somepage.html" }, }; for (i ...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,943
test_path_simplify (void) { static const struct { const char *test, *result; enum url_scheme scheme; bool should_modify; } tests[] = { { "", "", SCHEME_HTTP, false }, { ".", "", SCHEME_HTTP, true }, { "./", ...
null
0
test_path_simplify (void) { static const struct { const char *test, *result; enum url_scheme scheme; bool should_modify; } tests[] = { { "", "", SCHEME_HTTP, false }, { ".", "", SCHEME_HTTP, true }, { "./", ...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,944
unescape_single_char (char *str, char chr) { const char c1 = XNUM_TO_DIGIT (chr >> 4); const char c2 = XNUM_TO_DIGIT (chr & 0xf); char *h = str; /* hare */ char *t = str; /* tortoise */ for (; *h; h++, t++) { if (h[0] == '%' && h[1] == c1 && h[2] == c2) { ...
null
0
unescape_single_char (char *str, char chr) { const char c1 = XNUM_TO_DIGIT (chr >> 4); const char c2 = XNUM_TO_DIGIT (chr & 0xf); char *h = str; /* hare */ char *t = str; /* tortoise */ for (; *h; h++, t++) { if (h[0] == '%' && h[1] == c1 && h[2] == c2) { ...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,945
uri_merge (const char *base, const char *link) { int linklength; const char *end; char *merge; if (url_has_scheme (link)) return xstrdup (link); /* We may not examine BASE past END. */ end = path_end (base); linklength = strlen (link); if (!*link) { /* Empty LINK points back to BASE, qu...
null
0
uri_merge (const char *base, const char *link) { int linklength; const char *end; char *merge; if (url_has_scheme (link)) return xstrdup (link); /* We may not examine BASE past END. */ end = path_end (base); linklength = strlen (link); if (!*link) { /* Empty LINK points back to BASE, qu...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,946
url_escape (const char *s) { return url_escape_1 (s, urlchr_unsafe, false); }
null
0
url_escape (const char *s) { return url_escape_1 (s, urlchr_unsafe, false); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,947
url_escape_1 (const char *s, unsigned char mask, bool allow_passthrough) { const char *p1; char *p2, *newstr; int newlen; int addition = 0; for (p1 = s; *p1; p1++) if (urlchr_test (*p1, mask)) addition += 2; /* Two more characters (hex digits) */ if (!addition) return allow_passth...
null
0
url_escape_1 (const char *s, unsigned char mask, bool allow_passthrough) { const char *p1; char *p2, *newstr; int newlen; int addition = 0; for (p1 = s; *p1; p1++) if (urlchr_test (*p1, mask)) addition += 2; /* Two more characters (hex digits) */ if (!addition) return allow_passth...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,948
url_escape_allow_passthrough (const char *s) { return url_escape_1 (s, urlchr_unsafe, true); }
null
0
url_escape_allow_passthrough (const char *s) { return url_escape_1 (s, urlchr_unsafe, true); }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,949
url_escape_dir (const char *dir) { char *newdir = url_escape_1 (dir, urlchr_unsafe | urlchr_reserved, 1); if (newdir == dir) return (char *)dir; unescape_single_char (newdir, '/'); return newdir; }
null
0
url_escape_dir (const char *dir) { char *newdir = url_escape_1 (dir, urlchr_unsafe | urlchr_reserved, 1); if (newdir == dir) return (char *)dir; unescape_single_char (newdir, '/'); return newdir; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,950
url_free (struct url *url) { if (url) { if (url->idn_allocated) { idn2_free (url->host); /* A dummy if !defined(ENABLE_IRI) */ url->host = NULL; } else xfree (url->host); xfree (url->path); xfree (url->url); xfree (url->params); xfree (url->...
null
0
url_free (struct url *url) { if (url) { if (url->idn_allocated) { idn2_free (url->host); /* A dummy if !defined(ENABLE_IRI) */ url->host = NULL; } else xfree (url->host); xfree (url->path); xfree (url->url); xfree (url->params); xfree (url->...
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,951
url_full_path (const struct url *url) { int length = full_path_length (url); char *full_path = xmalloc (length + 1); full_path_write (url, full_path); full_path[length] = '\0'; return full_path; }
null
0
url_full_path (const struct url *url) { int length = full_path_length (url); char *full_path = xmalloc (length + 1); full_path_write (url, full_path); full_path[length] = '\0'; return full_path; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,952
url_has_scheme (const char *url) { const char *p = url; /* The first char must be a scheme char. */ if (!*p || !SCHEME_CHAR (*p)) return false; ++p; /* Followed by 0 or more scheme chars. */ while (*p && SCHEME_CHAR (*p)) ++p; /* Terminated by ':'. */ return *p == ':'; }
null
0
url_has_scheme (const char *url) { const char *p = url; /* The first char must be a scheme char. */ if (!*p || !SCHEME_CHAR (*p)) return false; ++p; /* Followed by 0 or more scheme chars. */ while (*p && SCHEME_CHAR (*p)) ++p; /* Terminated by ':'. */ return *p == ':'; }
@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) url_unescape (u->host); host_modified = true; + /* check for invalid control characters in host name */ + for (p = u->host; *p; p++) + { + if (c_iscntrl(*p)) + { + ...
CWE-93
null
null
6,953
pvscsi_log2(uint32_t input) { int log = 0; assert(input > 0); while (input >> ++log) { } return log; }
DoS
0
pvscsi_log2(uint32_t input) { int log = 0; assert(input > 0); while (input >> ++log) { } return log; }
@@ -152,7 +152,7 @@ pvscsi_log2(uint32_t input) return log; } -static int +static void pvscsi_ring_init_data(PVSCSIRingInfo *m, PVSCSICmdDescSetupRings *ri) { int i; @@ -160,10 +160,6 @@ pvscsi_ring_init_data(PVSCSIRingInfo *m, PVSCSICmdDescSetupRings *ri) uint32_t req_ring_size, cmp_ring_size; ...
CWE-125
null
null
6,954
static bool name_is_illegal(const char *name) { return !*name || strchr(name, '/') != NULL; return !*name || strchr(name, '/') != NULL; }
Dir. Trav.
0
static bool name_is_illegal(const char *name) { return !*name || strchr(name, '/') != NULL; return !*name || strchr(name, '/') != NULL; }
@@ -1010,6 +1010,7 @@ static void v9fs_attach(void *opaque) goto out; } err += offset; + memcpy(&s->root_qid, &qid, sizeof(qid)); trace_v9fs_attach_return(pdu->tag, pdu->id, qid.type, qid.version, qid.path); /* @@ -1261,6 +1262,14 @@ static bool name_is_ille...
CWE-22
null
null
6,955
static int stat_to_v9stat(V9fsPDU *pdu, V9fsPath *name, const struct stat *stbuf, V9fsStat *v9stat) { int err; const char *str; memset(v9stat, 0, sizeof(*v9stat)); stat_to_qid(stbuf, &v9stat->qid); v9stat->mode = stat_to_v9mode(stbuf); v9...
Dir. Trav.
0
static int stat_to_v9stat(V9fsPDU *pdu, V9fsPath *name, const struct stat *stbuf, V9fsStat *v9stat) { int err; const char *str; memset(v9stat, 0, sizeof(*v9stat)); stat_to_qid(stbuf, &v9stat->qid); v9stat->mode = stat_to_v9mode(stbuf); v9...
@@ -1010,6 +1010,7 @@ static void v9fs_attach(void *opaque) goto out; } err += offset; + memcpy(&s->root_qid, &qid, sizeof(qid)); trace_v9fs_attach_return(pdu->tag, pdu->id, qid.type, qid.version, qid.path); /* @@ -1261,6 +1262,14 @@ static bool name_is_ille...
CWE-22
null
null
6,956
static void v9fs_fix_path(V9fsPath *dst, V9fsPath *src, int len) { V9fsPath str; v9fs_path_init(&str); v9fs_path_copy(&str, dst); v9fs_string_sprintf((V9fsString *)dst, "%s%s", src->data, str.data+len); v9fs_path_free(&str); /* +1 to include terminating NULL */ dst->size++; }
Dir. Trav.
0
static void v9fs_fix_path(V9fsPath *dst, V9fsPath *src, int len) { V9fsPath str; v9fs_path_init(&str); v9fs_path_copy(&str, dst); v9fs_string_sprintf((V9fsString *)dst, "%s%s", src->data, str.data+len); v9fs_path_free(&str); /* +1 to include terminating NULL */ dst->size++; }
@@ -1010,6 +1010,7 @@ static void v9fs_attach(void *opaque) goto out; } err += offset; + memcpy(&s->root_qid, &qid, sizeof(qid)); trace_v9fs_attach_return(pdu->tag, pdu->id, qid.type, qid.version, qid.path); /* @@ -1261,6 +1262,14 @@ static bool name_is_ille...
CWE-22
null
null
6,957
void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) { /* * We need to be idempotent because, unfortunately, free() also calls * cleanup(), so the natural call sequence new(), init(), cleanup(), free() * calls cleanup() for the same object twice! Thus we must zero the * pointers below after they're...
DoS
0
void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) { /* * We need to be idempotent because, unfortunately, free() also calls * cleanup(), so the natural call sequence new(), init(), cleanup(), free() * calls cleanup() for the same object twice! Thus we must zero the * pointers below after they're...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,958
static int check_cert(X509_STORE_CTX *ctx) { X509_CRL *crl = NULL, *dcrl = NULL; X509 *x; int ok, cnum; unsigned int last_reasons; cnum = ctx->error_depth; x = sk_X509_value(ctx->chain, cnum); ctx->current_cert = x; ctx->current_issuer = NULL; ctx->current_crl_score = 0; ctx->cur...
DoS
0
static int check_cert(X509_STORE_CTX *ctx) { X509_CRL *crl = NULL, *dcrl = NULL; X509 *x; int ok, cnum; unsigned int last_reasons; cnum = ctx->error_depth; x = sk_X509_value(ctx->chain, cnum); ctx->current_cert = x; ctx->current_issuer = NULL; ctx->current_crl_score = 0; ctx->cur...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,959
static int check_chain_extensions(X509_STORE_CTX *ctx) { #ifdef OPENSSL_NO_CHAIN_VERIFY return 1; #else int i, ok = 0, must_be_ca, plen = 0; X509 *x; int (*cb) (int xok, X509_STORE_CTX *xctx); int proxy_path_length = 0; int purpose; int allow_proxy_certs; cb = ctx->verify_cb; /*- ...
DoS
0
static int check_chain_extensions(X509_STORE_CTX *ctx) { #ifdef OPENSSL_NO_CHAIN_VERIFY return 1; #else int i, ok = 0, must_be_ca, plen = 0; X509 *x; int (*cb) (int xok, X509_STORE_CTX *xctx); int proxy_path_length = 0; int purpose; int allow_proxy_certs; cb = ctx->verify_cb; /*- ...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,960
static int check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) { X509 *issuer = NULL; EVP_PKEY *ikey = NULL; int ok = 0, chnum, cnum; cnum = ctx->error_depth; chnum = sk_X509_num(ctx->chain) - 1; /* if we have an alternative CRL issuer cert use that */ if (ctx->current_issuer) issuer = ctx...
DoS
0
static int check_crl(X509_STORE_CTX *ctx, X509_CRL *crl) { X509 *issuer = NULL; EVP_PKEY *ikey = NULL; int ok = 0, chnum, cnum; cnum = ctx->error_depth; chnum = sk_X509_num(ctx->chain) - 1; /* if we have an alternative CRL issuer cert use that */ if (ctx->current_issuer) issuer = ctx...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,961
static int check_hosts(X509 *x, X509_VERIFY_PARAM_ID *id) { int i; int n = sk_OPENSSL_STRING_num(id->hosts); char *name; if (id->peername != NULL) { OPENSSL_free(id->peername); id->peername = NULL; } for (i = 0; i < n; ++i) { name = sk_OPENSSL_STRING_value(id->hosts, i);...
DoS
0
static int check_hosts(X509 *x, X509_VERIFY_PARAM_ID *id) { int i; int n = sk_OPENSSL_STRING_num(id->hosts); char *name; if (id->peername != NULL) { OPENSSL_free(id->peername); id->peername = NULL; } for (i = 0; i < n; ++i) { name = sk_OPENSSL_STRING_value(id->hosts, i);...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,962
static int check_id(X509_STORE_CTX *ctx) { X509_VERIFY_PARAM *vpm = ctx->param; X509_VERIFY_PARAM_ID *id = vpm->id; X509 *x = ctx->cert; if (id->hosts && check_hosts(x, id) <= 0) { if (!check_id_error(ctx, X509_V_ERR_HOSTNAME_MISMATCH)) return 0; } if (id->email && X509_check...
DoS
0
static int check_id(X509_STORE_CTX *ctx) { X509_VERIFY_PARAM *vpm = ctx->param; X509_VERIFY_PARAM_ID *id = vpm->id; X509 *x = ctx->cert; if (id->hosts && check_hosts(x, id) <= 0) { if (!check_id_error(ctx, X509_V_ERR_HOSTNAME_MISMATCH)) return 0; } if (id->email && X509_check...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,963
static int check_id_error(X509_STORE_CTX *ctx, int errcode) { ctx->error = errcode; ctx->current_cert = ctx->cert; ctx->error_depth = 0; return ctx->verify_cb(0, ctx); }
DoS
0
static int check_id_error(X509_STORE_CTX *ctx, int errcode) { ctx->error = errcode; ctx->current_cert = ctx->cert; ctx->error_depth = 0; return ctx->verify_cb(0, ctx); }
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,964
static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer) { int ret; ret = X509_check_issued(issuer, x); if (ret == X509_V_OK) return 1; /* If we haven't asked for issuer errors don't set ctx */ if (!(ctx->param->flags & X509_V_FLAG_CB_ISSUER_CHECK)) return 0; ctx->err...
DoS
0
static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer) { int ret; ret = X509_check_issued(issuer, x); if (ret == X509_V_OK) return 1; /* If we haven't asked for issuer errors don't set ctx */ if (!(ctx->param->flags & X509_V_FLAG_CB_ISSUER_CHECK)) return 0; ctx->err...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,965
static int check_policy(X509_STORE_CTX *ctx) { int ret; if (ctx->parent) return 1; ret = X509_policy_check(&ctx->tree, &ctx->explicit_policy, ctx->chain, ctx->param->policies, ctx->param->flags); if (ret == 0) { X509err(X509_F_CHECK_POLICY, ERR_R_MALLOC_FAILUR...
DoS
0
static int check_policy(X509_STORE_CTX *ctx) { int ret; if (ctx->parent) return 1; ret = X509_policy_check(&ctx->tree, &ctx->explicit_policy, ctx->chain, ctx->param->policies, ctx->param->flags); if (ret == 0) { X509err(X509_F_CHECK_POLICY, ERR_R_MALLOC_FAILUR...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,966
static X509 *lookup_cert_match(X509_STORE_CTX *ctx, X509 *x) { STACK_OF(X509) *certs; X509 *xtmp = NULL; int i; /* Lookup all certs with matching subject name */ certs = ctx->lookup_certs(ctx, X509_get_subject_name(x)); if (certs == NULL) return NULL; /* Look for exact match */ f...
DoS
0
static X509 *lookup_cert_match(X509_STORE_CTX *ctx, X509 *x) { STACK_OF(X509) *certs; X509 *xtmp = NULL; int i; /* Lookup all certs with matching subject name */ certs = ctx->lookup_certs(ctx, X509_get_subject_name(x)); if (certs == NULL) return NULL; /* Look for exact match */ f...
@@ -1124,10 +1124,10 @@ static int get_crl_sk(X509_STORE_CTX *ctx, X509_CRL **pcrl, X509_CRL **pdcrl, crl = sk_X509_CRL_value(crls, i); reasons = *preasons; crl_score = get_crl_score(ctx, &crl_issuer, &reasons, crl, x); - if (crl_score < best_score) + if (crl_score < best_score ...
CWE-476
null
null
6,967
vcard7816_file_system_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { /* TODO: if we want to support a virtual file system card, we do it here. * It would probably be a pkcs #15 card type */ *response = vcard_make_response( VCARD...
DoS
0
vcard7816_file_system_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { /* TODO: if we want to support a virtual file system card, we do it here. * It would probably be a pkcs #15 card type */ *response = vcard_make_response( VCARD...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,968
vcard_apdu_set_class(VCardAPDU *apdu) { apdu->a_channel = 0; apdu->a_secure_messaging = 0; apdu->a_type = apdu->a_cla & 0xf0; apdu->a_gen_type = VCARD_7816_ISO; /* parse the class tables 8 & 9 of the 7816-4 Part 4 spec */ switch (apdu->a_type) { /* we only support the basic types */ ...
DoS
0
vcard_apdu_set_class(VCardAPDU *apdu) { apdu->a_channel = 0; apdu->a_secure_messaging = 0; apdu->a_type = apdu->a_cla & 0xf0; apdu->a_gen_type = VCARD_7816_ISO; /* parse the class tables 8 & 9 of the 7816-4 Part 4 spec */ switch (apdu->a_type) { /* we only support the basic types */ ...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,969
vcard_apdu_set_length(VCardAPDU *apdu) { int L, Le; /* process according to table 5 of the 7816-4 Part 4 spec. * variable names match the variables in the spec */ L = apdu->a_len-4; /* fixed APDU header */ apdu->a_Lc = 0; apdu->a_Le = 0; apdu->a_body = NULL; switch (L) { case 0: ...
DoS
0
vcard_apdu_set_length(VCardAPDU *apdu) { int L, Le; /* process according to table 5 of the 7816-4 Part 4 spec. * variable names match the variables in the spec */ L = apdu->a_len-4; /* fixed APDU header */ apdu->a_Lc = 0; apdu->a_Le = 0; apdu->a_body = NULL; switch (L) { case 0: ...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,970
vcard_init_buffer_response(VCard *card, unsigned char *buf, int len) { VCardResponse *response; VCardBufferResponse *buffer_response; buffer_response = vcard_get_buffer_response(card); if (buffer_response) { vcard_set_buffer_response(card, NULL); vcard_buffer_response_delete(buffer_resp...
DoS
0
vcard_init_buffer_response(VCard *card, unsigned char *buf, int len) { VCardResponse *response; VCardBufferResponse *buffer_response; buffer_response = vcard_get_buffer_response(card); if (buffer_response) { vcard_set_buffer_response(card, NULL); vcard_buffer_response_delete(buffer_resp...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,971
vcard_make_response(vcard_7816_status_t status) { VCardResponse *response; switch (status) { /* known 7816 response codes */ case VCARD7816_STATUS_SUCCESS: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_SUCCESS); case VCARD7816_STATUS_WARNING: return VCARD_RE...
DoS
0
vcard_make_response(vcard_7816_status_t status) { VCardResponse *response; switch (status) { /* known 7816 response codes */ case VCARD7816_STATUS_SUCCESS: return VCARD_RESPONSE_GET_STATIC( VCARD7816_STATUS_SUCCESS); case VCARD7816_STATUS_WARNING: return VCARD_RE...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,972
vcard_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { VCardStatus status; VCardBufferResponse *buffer_response; /* first handle any PTS commands, which aren't really APDU's */ if (apdu->a_type == VCARD_7816_PTS) { /* the PTS responses aren't really responses either */ ...
DoS
0
vcard_process_apdu(VCard *card, VCardAPDU *apdu, VCardResponse **response) { VCardStatus status; VCardBufferResponse *buffer_response; /* first handle any PTS commands, which aren't really APDU's */ if (apdu->a_type == VCARD_7816_PTS) { /* the PTS responses aren't really responses either */ ...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,973
vcard_response_delete(VCardResponse *response) { if (response == NULL) { return; } switch (response->b_type) { case VCARD_MALLOC: /* everything was malloc'ed */ g_free(response->b_data); g_free(response); break; case VCARD_MALLOC_DATA: /* only the data...
DoS
0
vcard_response_delete(VCardResponse *response) { if (response == NULL) { return; } switch (response->b_type) { case VCARD_MALLOC: /* everything was malloc'ed */ g_free(response->b_data); g_free(response); break; case VCARD_MALLOC_DATA: /* only the data...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,974
vcard_response_new_bytes(VCard *card, unsigned char *buf, int len, int Le, unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; if (len > Le) { return vcard_init_buffer_response(card, buf, len); } new_response = vcard_response_new_data(buf, len); if ...
DoS
0
vcard_response_new_bytes(VCard *card, unsigned char *buf, int len, int Le, unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; if (len > Le) { return vcard_init_buffer_response(card, buf, len); } new_response = vcard_response_new_data(buf, len); if ...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,975
vcard_response_new_data(unsigned char *buf, int len) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = g_malloc(len + 2); memcpy(new_response->b_data, buf, len); new_response->b_total_len = len+2; new_response->b_len = len; new_response->b_type = ...
DoS
0
vcard_response_new_data(unsigned char *buf, int len) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = g_malloc(len + 2); memcpy(new_response->b_data, buf, len); new_response->b_total_len = len+2; new_response->b_len = len; new_response->b_type = ...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,976
vcard_response_new_status(vcard_7816_status_t status) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard_response_set_st...
DoS
0
vcard_response_new_status(vcard_7816_status_t status) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard_response_set_st...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,977
vcard_response_new_status_bytes(unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard...
DoS
0
vcard_response_new_status_bytes(unsigned char sw1, unsigned char sw2) { VCardResponse *new_response; new_response = g_new(VCardResponse, 1); new_response->b_data = &new_response->b_sw1; new_response->b_len = 0; new_response->b_total_len = 2; new_response->b_type = VCARD_MALLOC_STRUCT; vcard...
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,978
vcard_response_set_status_bytes(VCardResponse *response, unsigned char sw1, unsigned char sw2) { response->b_status = sw1 << 8 | sw2; response->b_sw1 = sw1; response->b_sw2 = sw2; response->b_data[response->b_len] = sw1; response->b_data[response->b_len+1] = sw2; }
DoS
0
vcard_response_set_status_bytes(VCardResponse *response, unsigned char sw1, unsigned char sw2) { response->b_status = sw1 << 8 | sw2; response->b_sw1 = sw1; response->b_sw2 = sw2; response->b_data[response->b_len] = sw1; response->b_data[response->b_len+1] = sw2; }
@@ -341,12 +341,12 @@ vcard_apdu_new(unsigned char *raw_apdu, int len, vcard_7816_status_t *status) new_apdu->a_len = len; *status = vcard_apdu_set_class(new_apdu); if (*status != VCARD7816_STATUS_SUCCESS) { - g_free(new_apdu); + vcard_apdu_delete(new_apdu); return NULL; } ...
CWE-772
null
null
6,979
static NOINLINE void attach_option( struct option_set **opt_list, const struct dhcp_optflag *optflag, char *buffer, int length, bool dhcpv6) { IF_NOT_UDHCPC6(bool dhcpv6 = 0;) struct option_set *existing; char *allocated = NULL; if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_BIN) { const char *end; ...
+Info
0
static NOINLINE void attach_option( struct option_set **opt_list, const struct dhcp_optflag *optflag, char *buffer, int length, bool dhcpv6) { IF_NOT_UDHCPC6(bool dhcpv6 = 0;) struct option_set *existing; char *allocated = NULL; if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_BIN) { const char *end; ...
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,980
void FAST_FUNC udhcp_add_binary_option(struct dhcp_packet *packet, uint8_t *addopt) { unsigned len; uint8_t *optionptr = packet->options; unsigned end = udhcp_end_option(optionptr); len = OPT_DATA + addopt[OPT_LEN]; /* end position + (option code/length + addopt length) + end option */ if (end + len + 1 >= DHCP_...
+Info
0
void FAST_FUNC udhcp_add_binary_option(struct dhcp_packet *packet, uint8_t *addopt) { unsigned len; uint8_t *optionptr = packet->options; unsigned end = udhcp_end_option(optionptr); len = OPT_DATA + addopt[OPT_LEN]; /* end position + (option code/length + addopt length) + end option */ if (end + len + 1 >= DHCP_...
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,981
void FAST_FUNC udhcp_add_simple_option(struct dhcp_packet *packet, uint8_t code, uint32_t data) { const struct dhcp_optflag *dh; for (dh = dhcp_optflags; dh->code; dh++) { if (dh->code == code) { uint8_t option[6], len; option[OPT_CODE] = code; len = dhcp_option_lengths[dh->flags & OPTION_TYPE_MASK]; ...
+Info
0
void FAST_FUNC udhcp_add_simple_option(struct dhcp_packet *packet, uint8_t code, uint32_t data) { const struct dhcp_optflag *dh; for (dh = dhcp_optflags; dh->code; dh++) { if (dh->code == code) { uint8_t option[6], len; option[OPT_CODE] = code; len = dhcp_option_lengths[dh->flags & OPTION_TYPE_MASK]; ...
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,982
int FAST_FUNC udhcp_end_option(uint8_t *optionptr) { int i = 0; while (optionptr[i] != DHCP_END) { if (optionptr[i] != DHCP_PADDING) i += optionptr[i + OPT_LEN] + OPT_DATA-1; i++; } return i; }
+Info
0
int FAST_FUNC udhcp_end_option(uint8_t *optionptr) { int i = 0; while (optionptr[i] != DHCP_END) { if (optionptr[i] != DHCP_PADDING) i += optionptr[i + OPT_LEN] + OPT_DATA-1; i++; } return i; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,983
struct option_set* FAST_FUNC udhcp_find_option(struct option_set *opt_list, uint8_t code) { while (opt_list && opt_list->data[OPT_CODE] < code) opt_list = opt_list->next; if (opt_list && opt_list->data[OPT_CODE] == code) return opt_list; return NULL; }
+Info
0
struct option_set* FAST_FUNC udhcp_find_option(struct option_set *opt_list, uint8_t code) { while (opt_list && opt_list->data[OPT_CODE] < code) opt_list = opt_list->next; if (opt_list && opt_list->data[OPT_CODE] == code) return opt_list; return NULL; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,984
int FAST_FUNC udhcp_str2nip(const char *str, void *arg) { len_and_sockaddr *lsa; lsa = host_and_af2sockaddr(str, 0, AF_INET); if (!lsa) return 0; /* arg maybe unaligned */ move_to_unaligned32((uint32_t*)arg, lsa->u.sin.sin_addr.s_addr); free(lsa); return 1; }
+Info
0
int FAST_FUNC udhcp_str2nip(const char *str, void *arg) { len_and_sockaddr *lsa; lsa = host_and_af2sockaddr(str, 0, AF_INET); if (!lsa) return 0; /* arg maybe unaligned */ move_to_unaligned32((uint32_t*)arg, lsa->u.sin.sin_addr.s_addr); free(lsa); return 1; }
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,985
int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg, const struct dhcp_optflag *optflags, const char *option_strings, bool dhcpv6) { struct option_set **opt_list = arg; char *opt; char *str; const struct dhcp_optflag *optflag; struct dhcp_optflag userdef_optflag; unsigned optcode; int retval; /*...
+Info
0
int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg, const struct dhcp_optflag *optflags, const char *option_strings, bool dhcpv6) { struct option_set **opt_list = arg; char *opt; char *str; const struct dhcp_optflag *optflag; struct dhcp_optflag userdef_optflag; unsigned optcode; int retval; /*...
@@ -302,7 +302,7 @@ uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code) { uint8_t *r = udhcp_get_option(packet, code); if (r) { - if (r[-1] != 4) + if (r[-OPT_DATA + OPT_LEN] != 4) r = NULL; } return r;
CWE-125
null
null
6,986
static void add_client_options(struct dhcp_packet *packet) { int i, end, len; udhcp_add_simple_option(packet, DHCP_MAX_SIZE, htons(IP_UDP_DHCP_SIZE)); /* Add a "param req" option with the list of options we'd like to have * from stubborn DHCP servers. Pull the data from the struct in common.c. * No bounds chec...
+Info
0
static void add_client_options(struct dhcp_packet *packet) { int i, end, len; udhcp_add_simple_option(packet, DHCP_MAX_SIZE, htons(IP_UDP_DHCP_SIZE)); /* Add a "param req" option with the list of options we'd like to have * from stubborn DHCP servers. Pull the data from the struct in common.c. * No bounds chec...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,987
static uint8_t* alloc_dhcp_option(int code, const char *str, int extra) { uint8_t *storage; int len = strnlen(str, 255); storage = xzalloc(len + extra + OPT_DATA); storage[OPT_CODE] = code; storage[OPT_LEN] = len + extra; memcpy(storage + extra + OPT_DATA, str, len); return storage; }
+Info
0
static uint8_t* alloc_dhcp_option(int code, const char *str, int extra) { uint8_t *storage; int len = strnlen(str, 255); storage = xzalloc(len + extra + OPT_DATA); storage[OPT_CODE] = code; storage[OPT_LEN] = len + extra; memcpy(storage + extra + OPT_DATA, str, len); return storage; }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,988
static int bcast_or_ucast(struct dhcp_packet *packet, uint32_t ciaddr, uint32_t server) { if (server) return udhcp_send_kernel_packet(packet, ciaddr, CLIENT_PORT, server, SERVER_PORT); return raw_bcast_from_client_config_ifindex(packet, ciaddr); }
+Info
0
static int bcast_or_ucast(struct dhcp_packet *packet, uint32_t ciaddr, uint32_t server) { if (server) return udhcp_send_kernel_packet(packet, ciaddr, CLIENT_PORT, server, SERVER_PORT); return raw_bcast_from_client_config_ifindex(packet, ciaddr); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,989
static void change_listen_mode(int new_mode) { log1("entering listen mode: %s", new_mode != LISTEN_NONE ? (new_mode == LISTEN_KERNEL ? "kernel" : "raw") : "none" ); listen_mode = new_mode; if (sockfd >= 0) { close(sockfd); sockfd = -1; } if (new_mode == LISTEN_KERNEL) sockfd = udhcp_listen_socket(/...
+Info
0
static void change_listen_mode(int new_mode) { log1("entering listen mode: %s", new_mode != LISTEN_NONE ? (new_mode == LISTEN_KERNEL ? "kernel" : "raw") : "none" ); listen_mode = new_mode; if (sockfd >= 0) { close(sockfd); sockfd = -1; } if (new_mode == LISTEN_KERNEL) sockfd = udhcp_listen_socket(/...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,990
static void client_background(void) { bb_daemonize(0); logmode &= ~LOGMODE_STDIO; /* rewrite pidfile, as our pid is different now */ write_pidfile(client_config.pidfile); }
+Info
0
static void client_background(void) { bb_daemonize(0); logmode &= ~LOGMODE_STDIO; /* rewrite pidfile, as our pid is different now */ write_pidfile(client_config.pidfile); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,991
static int good_hostname(const char *name) { for (;;) { name = valid_domain_label(name); if (!name) return 0; if (!name[0]) return 1; name++; if (*name == '\0') return 1; // We allow trailing dot too } }
+Info
0
static int good_hostname(const char *name) { for (;;) { name = valid_domain_label(name); if (!name) return 0; if (!name[0]) return 1; name++; if (*name == '\0') return 1; // We allow trailing dot too } }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,992
static void init_packet(struct dhcp_packet *packet, char type) { uint16_t secs; /* Fill in: op, htype, hlen, cookie fields; message type option: */ udhcp_init_header(packet, type); packet->xid = random_xid(); client_config.last_secs = monotonic_sec(); if (client_config.first_secs == 0) client_config.first_se...
+Info
0
static void init_packet(struct dhcp_packet *packet, char type) { uint16_t secs; /* Fill in: op, htype, hlen, cookie fields; message type option: */ udhcp_init_header(packet, type); packet->xid = random_xid(); client_config.last_secs = monotonic_sec(); if (client_config.first_secs == 0) client_config.first_se...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,993
static int mton(uint32_t mask) { int i = 0; mask = ntohl(mask); /* 111110000-like bit pattern */ while (mask) { i++; mask <<= 1; } return i; }
+Info
0
static int mton(uint32_t mask) { int i = 0; mask = ntohl(mask); /* 111110000-like bit pattern */ while (mask) { i++; mask <<= 1; } return i; }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,994
static void perform_renew(void) { bb_error_msg("performing DHCP renew"); switch (state) { case BOUND: change_listen_mode(LISTEN_KERNEL); case RENEWING: case REBINDING: state = RENEW_REQUESTED; break; case RENEW_REQUESTED: /* impatient are we? fine, square 1 */ udhcp_run_script(NULL, "deconfig"); case REQ...
+Info
0
static void perform_renew(void) { bb_error_msg("performing DHCP renew"); switch (state) { case BOUND: change_listen_mode(LISTEN_KERNEL); case RENEWING: case REBINDING: state = RENEW_REQUESTED; break; case RENEW_REQUESTED: /* impatient are we? fine, square 1 */ udhcp_run_script(NULL, "deconfig"); case REQ...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,995
static int raw_bcast_from_client_config_ifindex(struct dhcp_packet *packet, uint32_t src_nip) { return udhcp_send_raw_packet(packet, /*src*/ src_nip, CLIENT_PORT, /*dst*/ INADDR_BROADCAST, SERVER_PORT, MAC_BCAST_ADDR, client_config.ifindex); }
+Info
0
static int raw_bcast_from_client_config_ifindex(struct dhcp_packet *packet, uint32_t src_nip) { return udhcp_send_raw_packet(packet, /*src*/ src_nip, CLIENT_PORT, /*dst*/ INADDR_BROADCAST, SERVER_PORT, MAC_BCAST_ADDR, client_config.ifindex); }
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,996
static NOINLINE int send_decline(/*uint32_t xid,*/ uint32_t server, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDECLINE); #if 0 /* RFC 2131 says DHCPDECLINE's x...
+Info
0
static NOINLINE int send_decline(/*uint32_t xid,*/ uint32_t server, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDECLINE); #if 0 /* RFC 2131 says DHCPDECLINE's x...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,997
static NOINLINE int send_discover(uint32_t xid, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr fields, * random xid field (we override it below), * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDISCOVER); packet.xid = xid; if (r...
+Info
0
static NOINLINE int send_discover(uint32_t xid, uint32_t requested) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr fields, * random xid field (we override it below), * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPDISCOVER); packet.xid = xid; if (r...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,998
int send_release(uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPRELEASE); /* DHCPRELEASE uses ciaddr, not "requested ip", to store IP being released ...
+Info
0
int send_release(uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; /* Fill in: op, htype, hlen, cookie, chaddr, random xid fields, * client-id option (unless -C), message type option: */ init_packet(&packet, DHCPRELEASE); /* DHCPRELEASE uses ciaddr, not "requested ip", to store IP being released ...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null
6,999
static NOINLINE int send_renew(uint32_t xid, uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; struct in_addr temp_addr; /* * RFC 2131 4.3.2 DHCPREQUEST message * ... * DHCPREQUEST generated during RENEWING state: * * 'server identifier' MUST NOT be filled in, 'requested IP address' * option MUST ...
+Info
0
static NOINLINE int send_renew(uint32_t xid, uint32_t server, uint32_t ciaddr) { struct dhcp_packet packet; struct in_addr temp_addr; /* * RFC 2131 4.3.2 DHCPREQUEST message * ... * DHCPREQUEST generated during RENEWING state: * * 'server identifier' MUST NOT be filled in, 'requested IP address' * option MUST ...
@@ -531,7 +531,7 @@ static char **fill_envp(struct dhcp_packet *packet) temp = udhcp_get_option(packet, code); *curr = xmalloc_optname_optval(temp, &dhcp_optflags[i], opt_name); putenv(*curr++); - if (code == DHCP_SUBNET) { + if (code == DHCP_SUBNET && temp[-OPT_DATA + OPT_LEN] == 4) { /* Subnet option: ...
CWE-125
null
null