func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
static void zmalloc_default_oom(size_t size) { fprintf(stderr, "zmalloc: Out of memory trying to allocate %zu bytes\n", size); fflush(stderr); abort(); }
0
[ "CWE-190" ]
redis
d32f2e9999ce003bad0bd2c3bca29f64dcce4433
174,911,523,117,203,820,000,000,000,000,000,000,000
6
Fix integer overflow (CVE-2021-21309). (#8522) On 32-bit systems, setting the proto-max-bulk-len config parameter to a high value may result with integer overflow and a subsequent heap overflow when parsing an input bulk (CVE-2021-21309). This fix has two parts: Set a reasonable limit to the config parameter. A...
void kvm_inject_pit_timer_irqs(struct kvm_vcpu *vcpu) { struct kvm_pit *pit = vcpu->kvm->arch.vpit; struct kvm *kvm = vcpu->kvm; struct kvm_kpit_state *ps; if (pit) { int inject = 0; ps = &pit->pit_state; /* Try to inject pending interrupts when * last one has been acked. */ spin_lock(&ps->inject_lo...
0
[ "CWE-119", "CWE-787" ]
linux
ee73f656a604d5aa9df86a97102e4e462dd79924
332,895,183,187,107,230,000,000,000,000,000,000,000
23
KVM: PIT: control word is write-only PIT control word (address 0x43) is write-only, reads are undefined. Cc: stable@kernel.org Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
static uint get_table_structure(char *table, char *db, char *table_type, char *ignore_flag) { my_bool init=0, delayed, write_data, complete_insert; my_ulonglong num_fields; char *result_table, *opt_quoted_table; const char *insert_option; char name_buff[NAME_LEN+3...
1
[]
mysql-server
d982e717aba67227ec40761a21a4211db91aa0e2
103,776,134,934,436,430,000,000,000,000,000,000,000
557
Bug#27510150: MYSQLDUMP FAILS FOR SPECIFIC --WHERE CLAUSES Description: Mysqldump utility fails for specific clauses used with the option, 'where'. Analysis:- Method, "fix_identifier_with_newline()" that prefixes all occurrences of newline char ('\n') in incoming buffer does not verify the size of the buffer. The buf...
impl_permission_manager_test (EphyPermissionManager *manager, const char *host, const char *type) { g_return_val_if_fail (type != NULL && type[0] != '\0', EPHY_PERMISSION_DEFAULT); return (EphyPermission)0; }
0
[]
epiphany
3e0f7dea754381c5ad11a06ccc62eb153382b498
107,683,667,263,055,270,000,000,000,000,000,000,000
8
Report broken certs through the padlock icon This uses a new feature in libsoup that reports through a SoupMessageFlag whether the message is talking to a server that has a trusted server. Bug #600663
g_NPP_Write(NPP instance, NPStream *stream, int32_t offset, int32_t len, void *buf) { if (instance == NULL) return -1; if (plugin_funcs.write == NULL) return -1; if (stream == NULL) return -1; D(bugiI("NPP_Write instance=%p, stream=%p, offset=%d, len=%d, buf=%p\n", instance, stream, offset, len, buf)); ...
0
[ "CWE-264" ]
nspluginwrapper
7e4ab8e1189846041f955e6c83f72bc1624e7a98
269,875,007,106,104,050,000,000,000,000,000,000,000
16
Support all the new variables added
mem_cgroup_get_reclaim_stat_from_page(struct page *page) { struct page_cgroup *pc; struct mem_cgroup_per_zone *mz; if (mem_cgroup_disabled()) return NULL; pc = lookup_page_cgroup(page); if (!PageCgroupUsed(pc)) return NULL; /* Ensure pc->mem_cgroup is visible after reading PCG_USED. */ smp_rmb(); mz = pag...
0
[ "CWE-264" ]
linux-2.6
1a5a9906d4e8d1976b701f889d8f35d54b928f25
139,688,894,130,493,760,000,000,000,000,000,000,000
16
mm: thp: fix pmd_bad() triggering in code paths holding mmap_sem read mode In some cases it may happen that pmd_none_or_clear_bad() is called with the mmap_sem hold in read mode. In those cases the huge page faults can allocate hugepmds under pmd_none_or_clear_bad() and that can trigger a false positive from pmd_bad(...
static int hidinput_query_battery_capacity(struct hid_device *dev) { u8 *buf; int ret; buf = kmalloc(4, GFP_KERNEL); if (!buf) return -ENOMEM; ret = hid_hw_raw_request(dev, dev->battery_report_id, buf, 4, dev->battery_report_type, HID_REQ_GET_REPORT); if (ret < 2) { kfree(buf); return -ENODATA; } ...
0
[ "CWE-787" ]
linux
35556bed836f8dc07ac55f69c8d17dce3e7f0e25
83,596,453,438,055,910,000,000,000,000,000,000,000
20
HID: core: Sanitize event code and type when mapping input When calling into hid_map_usage(), the passed event code is blindly stored as is, even if it doesn't fit in the associated bitmap. This event code can come from a variety of sources, including devices masquerading as input devices, only a bit more "programmab...
static inline bool __meminit early_page_uninitialised(unsigned long pfn) { int nid = early_pfn_to_nid(pfn); if (node_online(nid) && pfn >= NODE_DATA(nid)->first_deferred_pfn) return true; return false; }
0
[]
linux
400e22499dd92613821374c8c6c88c7225359980
155,523,940,680,914,970,000,000,000,000,000,000,000
9
mm: don't warn about allocations which stall for too long Commit 63f53dea0c98 ("mm: warn about allocations which stall for too long") was a great step for reducing possibility of silent hang up problem caused by memory allocation stalls. But this commit reverts it, for it is possible to trigger OOM lockup and/or soft...
static inline unsigned char get_pixel_color(int n, size_t row) { return (n & (1 << (nstripes - 1 - row))) ? '\xc0' : '\x40'; }
1
[ "CWE-787" ]
qpdf
d71f05ca07eb5c7cfa4d6d23e5c1f2a800f52e8e
259,344,529,268,765,200,000,000,000,000,000,000,000
4
Fix sign and conversion warnings (major) This makes all integer type conversions that have potential data loss explicit with calls that do range checks and raise an exception. After this commit, qpdf builds with no warnings when -Wsign-conversion -Wconversion is used with gcc or clang or when -W3 -Wd4800 is used with ...
MagickPrivate void XFileBrowserWidget(Display *display,XWindows *windows, const char *action,char *reply) { #define CancelButtonText "Cancel" #define DirectoryText "Directory:" #define FilenameText "File name:" #define GrabButtonText "Grab" #define FormatButtonText "Format" #define HomeButtonText "Home" #define...
1
[]
ImageMagick
17619a5e3a2c8f1e6296a9d38a10d8da97da8fd9
162,977,621,883,560,550,000,000,000,000,000,000,000
1,202
https://github.com/ImageMagick/ImageMagick/issues/3334
Item_func_ifnull::real_op() { DBUG_ASSERT(fixed == 1); double value= args[0]->val_real(); if (!args[0]->null_value) { null_value=0; return value; } value= args[1]->val_real(); if ((null_value=args[1]->null_value)) return 0.0; return value; }
0
[ "CWE-617" ]
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
323,896,477,683,745,760,000,000,000,000,000,000,000
14
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
do_setup (GdmSessionWorker *worker) { GError *error; gboolean res; error = NULL; res = gdm_session_worker_initialize_pam (worker, worker->priv->service, (const char **) worker->priv->exten...
0
[ "CWE-362" ]
gdm
dcdbaaa04012541ad2813cf83559d91d52f208b9
72,950,057,497,797,440,000,000,000,000,000,000,000
25
session-worker: Don't switch back VTs until session is fully exited There's a race condition on shutdown where the session worker is switching VTs back to the initial VT at the same time as the session exit is being processed. This means that manager may try to start a login screen (because of the VT switch) when aut...
static void arc_emac_set_rx_mode(struct net_device *ndev) { struct arc_emac_priv *priv = netdev_priv(ndev); if (ndev->flags & IFF_PROMISC) { arc_reg_or(priv, R_CTRL, PROM_MASK); } else { arc_reg_clr(priv, R_CTRL, PROM_MASK); if (ndev->flags & IFF_ALLMULTI) { arc_reg_set(priv, R_LAFL, ~0); arc_reg_set(p...
0
[ "CWE-362" ]
linux
c278c253f3d992c6994d08aa0efb2b6806ca396f
242,429,746,390,492,440,000,000,000,000,000,000,000
27
net: arc_emac: fix koops caused by sk_buff free There is a race between arc_emac_tx() and arc_emac_tx_clean(). sk_buff got freed by arc_emac_tx_clean() while arc_emac_tx() submitting sk_buff. In order to free sk_buff arc_emac_tx_clean() checks: if ((info & FOR_EMAC) || !txbd->data) break; ... dev_...
static int vxlan_nl2flag(struct vxlan_config *conf, struct nlattr *tb[], int attrtype, unsigned long mask, bool changelink, bool changelink_supported, struct netlink_ext_ack *extack) { unsigned long flags; if (!tb[attrtype]) return 0; if (changelink && !changelink_supported) { vxlan_flag_attr_er...
0
[]
net
6c8991f41546c3c472503dff1ea9daaddf9331c2
253,309,002,586,065,450,000,000,000,000,000,000,000
26
net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup ipv6_stub uses the ip6_dst_lookup function to allow other modules to perform IPv6 lookups. However, this function skips the XFRM layer entirely. All users of ipv6_stub->ip6_dst_lookup use ip_route_output_flow (via the ip_route_output_key and ip_route_o...
_dbus_validate_member (const DBusString *str, int start, int len) { const unsigned char *s; const unsigned char *end; const unsigned char *member; _dbus_assert (start >= 0); _dbus_assert (len >= 0); _dbus_assert (start <= _dbus_st...
0
[ "CWE-20" ]
dbus
7b10b46c5c8658449783ce45f1273dd35c353bce
328,065,107,448,287,330,000,000,000,000,000,000,000
46
Bug 17803: Panic from dbus_signature_validate * dbus/dbus-marshal-validate.c: Ensure we validate a basic type before calling is_basic on it. * dbus-marshal-validate-util.c: Test.
static inline u8 l2cap_get_auth_type(struct l2cap_chan *chan) { switch (chan->chan_type) { case L2CAP_CHAN_RAW: switch (chan->sec_level) { case BT_SECURITY_HIGH: case BT_SECURITY_FIPS: return HCI_AT_DEDICATED_BONDING_MITM; case BT_SECURITY_MEDIUM: return HCI_AT_DEDICATED_BONDING; default: return HC...
0
[ "CWE-787" ]
linux
e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3
64,611,403,381,245,610,000,000,000,000,000,000,000
50
Bluetooth: Properly check L2CAP config option output buffer length Validate the output buffer length for L2CAP config requests and responses to avoid overflowing the stack buffer used for building the option blocks. Cc: stable@vger.kernel.org Signed-off-by: Ben Seri <ben@armis.com> Signed-off-by: Marcel Holtmann <mar...
static void enable_unsafe_renegotiation(gnutls_priority_t c) { c->sr = SR_UNSAFE; }
0
[ "CWE-310" ]
gnutls
21f89efad7014a5ee0debd4cd3d59e27774b29e6
211,096,531,644,668,670,000,000,000,000,000,000,000
4
handshake: add FALLBACK_SCSV priority option This allows clients to enable the TLS_FALLBACK_SCSV mechanism during the handshake, as defined in RFC7507.
static gint msg_data_find(struct message_data *a, struct message_data *b) { if (a->fid == b->fid && a->frame == b->frame && a->msg_id == b->msg_id && a->smb_level == b->smb_level && a->is_request == b->is_request) { return 0; } return 1; }
0
[ "CWE-770" ]
wireshark
b7a0650e061b5418ab4a8f72c6e4b00317aff623
91,122,263,574,742,820,000,000,000,000,000,000,000
11
MS-WSP: Don't allocate huge amounts of memory. Add a couple of memory allocation sanity checks, one of which fixes #17331.
static char *linetoken(FILE *stream) { int ch, idx; while ((ch = fgetc(stream)) == ' ' || ch == '\t' ); idx = 0; while (ch != EOF && ch != lineterm && idx < MAX_NAME) { ident[idx++] = ch; ch = fgetc(stream); } /* while */ ungetc(ch, stream); ident[idx] = 0; ...
1
[]
evince
efadec4ffcdde3373f6f4ca0eaac98dc963c4fd5
127,373,773,716,473,140,000,000,000,000,000,000,000
19
dvi: Another fix for buffer overwrite in dvi-backend https://bugzilla.gnome.org/show_bug.cgi?id=643882
virSecurityDeviceLabelDefParseXML(virSecurityDeviceLabelDefPtr **seclabels_rtn, size_t *nseclabels_rtn, xmlXPathContextPtr ctxt, unsigned int flags) { VIR_XPATH_NODE_AUTORESTORE(ctxt); virSecurityDeviceLabelDef...
0
[ "CWE-212" ]
libvirt
a5b064bf4b17a9884d7d361733737fb614ad8979
36,384,644,019,019,034,000,000,000,000,000,000,000
87
conf: Don't format http cookies unless VIR_DOMAIN_DEF_FORMAT_SECURE is used Starting with 3b076391befc3fe72deb0c244ac6c2b4c100b410 (v6.1.0-122-g3b076391be) we support http cookies. Since they may contain somewhat sensitive information we should not format them into the XML unless VIR_DOMAIN_DEF_FORMAT_SECURE is assert...
static int srp_tmr_to_tcm(int fn) { switch (fn) { case SRP_TSK_ABORT_TASK: return TMR_ABORT_TASK; case SRP_TSK_ABORT_TASK_SET: return TMR_ABORT_TASK_SET; case SRP_TSK_CLEAR_TASK_SET: return TMR_CLEAR_TASK_SET; case SRP_TSK_LUN_RESET: return TMR_LUN_RESET; case SRP_TSK_CLEAR_ACA: return TMR_CLEAR_ACA; d...
0
[ "CWE-200", "CWE-476" ]
linux
51093254bf879bc9ce96590400a87897c7498463
143,154,480,695,754,570,000,000,000,000,000,000,000
17
IB/srpt: Simplify srpt_handle_tsk_mgmt() Let the target core check task existence instead of the SRP target driver. Additionally, let the target core check the validity of the task management request instead of the ib_srpt driver. This patch fixes the following kernel crash: BUG: unable to handle kernel NULL pointer...
str_frozen_check(VALUE s) { if (OBJ_FROZEN(s)) { rb_raise(rb_eRuntimeError, "string frozen"); } }
0
[ "CWE-119" ]
ruby
1c2ef610358af33f9ded3086aa2d70aac03dcac5
333,305,999,144,152,820,000,000,000,000,000,000,000
6
* string.c (rb_str_justify): CVE-2009-4124. Fixes a bug reported by Emmanouel Kellinis <Emmanouel.Kellinis AT kpmg.co.uk>, KPMG London; Patch by nobu. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@26038 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
dwg_paper_space_object (Dwg_Data *dwg) { Dwg_Object_Ref *psref = dwg_paper_space_ref (dwg); Dwg_Object_BLOCK_CONTROL *ctrl; if (psref && psref->obj && psref->obj->type == DWG_TYPE_BLOCK_HEADER) return psref->obj; ctrl = dwg_block_control (dwg); if (ctrl && ctrl->paper_space && ctrl->paper_space->obj) ...
0
[ "CWE-787" ]
libredwg
ecf5183d8b3b286afe2a30021353b7116e0208dd
112,577,199,836,337,280,000,000,000,000,000,000,000
16
dwg_section_wtype: fix fuzzing overflow with illegal and overlong section names. Fixes GH #349, #352 section names cannot be longer than 24
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPICTOp 0x98 #define PictVer...
0
[ "CWE-252" ]
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
58,722,874,922,381,620,000,000,000,000,000,000,000
449
https://github.com/ImageMagick/ImageMagick/issues/1199
static inline void __skb_set_sw_hash(struct sk_buff *skb, __u32 hash, bool is_l4) { __skb_set_hash(skb, hash, true, is_l4);
0
[ "CWE-20" ]
linux
2b16f048729bf35e6c28a40cbfad07239f9dcd90
114,335,209,156,634,260,000,000,000,000,000,000,000
4
net: create skb_gso_validate_mac_len() If you take a GSO skb, and split it into packets, will the MAC length (L2 + L3 + L4 headers + payload) of those packets be small enough to fit within a given length? Move skb_gso_mac_seglen() to skbuff.h with other related functions like skb_gso_network_seglen() so we can use it...
Item_return_date_time(THD *thd, const char *name_arg, uint length_arg, enum_field_types field_type_arg, uint dec_arg= 0): Item_partition_func_safe_string(thd, name_arg, length_arg, &my_charset_bin), date_time_field_type(field_type_arg) { decimals= dec_arg; }
0
[ "CWE-617" ]
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
320,087,167,001,433,600,000,000,000,000,000,000,000
5
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
int dlpar_acquire_drc(u32 drc_index) { int dr_status, rc; rc = rtas_call(rtas_token("get-sensor-state"), 2, 2, &dr_status, DR_ENTITY_SENSE, drc_index); if (rc || dr_status != DR_ENTITY_UNUSABLE) return -1; rc = rtas_set_indicator(ALLOCATION_STATE, drc_index, ALLOC_USABLE); if (rc) return rc; rc = ...
0
[ "CWE-476" ]
linux
efa9ace68e487ddd29c2b4d6dd23242158f1f607
16,482,626,441,416,672,000,000,000,000,000,000,000
21
powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property() In dlpar_parse_cc_property(), 'prop->name' is allocated by kstrdup(). kstrdup() may return NULL, so it should be checked and handle error. And prop should be freed if 'prop->name' is NULL. Signed-off-by: Gen Zhang <blackgod016574@gmail.com> Signe...
static void build_xref(char *msgid, char *buf, size_t size, int body_only) { struct xref_rock xrock = { buf, size }; snprintf(buf, size, "%s%s", body_only ? "" : "Xref: ", config_servername); duplicate_find(msgid, &xref_cb, &xrock); }
0
[ "CWE-119" ]
cyrus-imapd
0f8f026699829b65733c3081657b24e2174f4f4d
105,222,744,148,603,920,000,000,000,000,000,000,000
7
CVE-2011-3208 - fix buffer overflow in nntpd
void assertResult(int expectedResult, const BSONObj& spec) { intrusive_ptr<ExpressionContextForTest> expCtx(new ExpressionContextForTest()); BSONObj specObj = BSON("" << spec); BSONElement specElement = specObj.firstElement(); VariablesParseState vps = expCtx->variablesParseState; ...
0
[ "CWE-835" ]
mongo
0a076417d1d7fba3632b73349a1fd29a83e68816
58,101,029,326,356,520,000,000,000,000,000,000,000
9
SERVER-38070 fix infinite loop in agg expression
_nc_retrace_int(int code) { T((T_RETURN("%d"), code)); return code; }
0
[]
ncurses
790a85dbd4a81d5f5d8dd02a44d84f01512ef443
146,091,281,061,030,250,000,000,000,000,000,000,000
5
ncurses 6.2 - patch 20200531 + correct configure version-check/warnng for g++ to allow for 10.x + re-enable "bel" in konsole-base (report by Nia Huang) + add linux-s entry (patch by Alexandre Montaron). + drop long-obsolete convert_configure.pl + add test/test_parm.c, for checking tparm changes. + improve parameter-ch...
virNodeDeviceCapSCSIDefFormat(virBufferPtr buf, const virNodeDevCapData *data) { virBufferAsprintf(buf, "<host>%d</host>\n", data->scsi.host); virBufferAsprintf(buf, "<bus>%d</bus>\n", data->scsi.bus); virBufferAsprintf(buf, "<target>%d</target>\n", data->...
0
[ "CWE-119" ]
libvirt
4c4d0e2da07b5a035b26a0ff13ec27070f7c7b1a
162,604,784,477,687,630,000,000,000,000,000,000,000
12
conf: Fix segfault when parsing mdev types Commit f1b0890 introduced a potential crash due to incorrect operator precedence when accessing an element from a pointer to an array. Backtrace below: #0 virNodeDeviceGetMdevTypesCaps (sysfspath=0x7fff801661e0 "/sys/devices/pci0000:00/0000:00:02.0", mdev_types=0x7fff801...
void handler::ha_release_auto_increment() { DBUG_ENTER("ha_release_auto_increment"); DBUG_ASSERT(table_share->tmp_table != NO_TMP_TABLE || m_lock_type != F_UNLCK || (!next_insert_id && !insert_id_for_cur_row)); release_auto_increment(); insert_id_for_cur_row= 0; auto_inc_interval_f...
0
[ "CWE-416" ]
server
af810407f78b7f792a9bb8c47c8c532eb3b3a758
25,080,681,977,565,336,000,000,000,000,000,000,000
21
MDEV-28098 incorrect key in "dup value" error after long unique reset errkey after using it, so that it wouldn't affect the next error message in the next statement
static double mp_complex_conj(_cimg_math_parser& mp) { const double real = _mp_arg(2), imag = _mp_arg(3); double *ptrd = &_mp_arg(1) + 1; ptrd[0] = real; ptrd[1] = -imag; return cimg::type<double>::nan(); }
0
[ "CWE-770" ]
cimg
619cb58dd90b4e03ac68286c70ed98acbefd1c90
214,368,592,413,833,600,000,000,000,000,000,000,000
7
CImg<>::load_bmp() and CImg<>::load_pandore(): Check that dimensions encoded in file does not exceed file size.
inline void Slice(const tflite::SliceParams& op_params, const RuntimeShape& input_shape, const T* input_data, const RuntimeShape& output_shape, T* output_data) { SequentialTensorWriter<T> writer(input_data, output_data); return Slice(op_params, input_shape, output_shape, &writer)...
0
[ "CWE-476", "CWE-369" ]
tensorflow
15691e456c7dc9bd6be203b09765b063bf4a380c
330,470,015,524,464,970,000,000,000,000,000,000,000
6
Prevent dereferencing of null pointers in TFLite's `add.cc`. PiperOrigin-RevId: 387244946 Change-Id: I56094233327fbd8439b92e1dbb1262176e00eeb9
static int r_bin_dwarf_init_die(RBinDwarfDIE *die) { if (!die) { return -EINVAL; } die->attr_values = calloc (sizeof (RBinDwarfAttrValue), 8); if (!die->attr_values) { return -ENOMEM; } die->capacity = 8; die->length = 0; return 0; }
0
[ "CWE-119", "CWE-125" ]
radare2
d37d2b858ac47f2f108034be0bcecadaddfbc8b3
20,370,446,414,565,339,000,000,000,000,000,000,000
12
Fix #10465 - Avoid string on low addresses (workaround) for corrupted dwarf (#10478)
template<typename T1, typename T2, typename T3, typename T4, typename T5, typename T6, typename T7> inline void swap(T1& a1, T1& b1, T2& a2, T2& b2, T3& a3, T3& b3, T4& a4, T4& b4, T5& a5, T5& b5, T6& a6, T6& b6, T7& a7, T7& b7) { cimg::swap(a1,b1,a2,b2,a3,b3,a4,b4,a5,b5,a6,b6); cimg:...
0
[ "CWE-125" ]
CImg
10af1e8c1ad2a58a0a3342a856bae63e8f257abb
340,202,050,820,771,740,000,000,000,000,000,000,000
4
Fix other issues in 'CImg<T>::load_bmp()'.
rpmsg_sg_init(struct scatterlist *sg, void *cpu_addr, unsigned int len) { if (is_vmalloc_addr(cpu_addr)) { sg_init_table(sg, 1); sg_set_page(sg, vmalloc_to_page(cpu_addr), len, offset_in_page(cpu_addr)); } else { WARN_ON(!virt_addr_valid(cpu_addr)); sg_init_one(sg, cpu_addr, len); } }
0
[ "CWE-415" ]
linux
1680939e9ecf7764fba8689cfb3429c2fe2bb23c
236,814,153,133,131,320,000,000,000,000,000,000,000
11
rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() vch will be free in virtio_rpmsg_release_device() when rpmsg_ctrldev_register_device() fails. There is no need to call kfree() again. Fixes: c486682ae1e2 ("rpmsg: virtio: Register the rpmsg_char device") Signed-off-by: Hangyu Hua <hbh25y@gmail.com...
static int svm_hardware_enable(void *garbage) { struct svm_cpu_data *sd; uint64_t efer; struct desc_ptr gdt_descr; struct desc_struct *gdt; int me = raw_smp_processor_id(); rdmsrl(MSR_EFER, efer); if (efer & EFER_SVME) return -EBUSY; if (!has_svm()) { printk(KERN_ERR "svm_hardware_enable: err EOPNOTSUPP ...
0
[ "CWE-400" ]
linux-2.6
9581d442b9058d3699b4be568b6e5eae38a41493
21,733,307,716,095,124,000,000,000,000,000,000,000
42
KVM: Fix fs/gs reload oops with invalid ldt kvm reloads the host's fs and gs blindly, however the underlying segment descriptors may be invalid due to the user modifying the ldt after loading them. Fix by using the safe accessors (loadsegment() and load_gs_index()) instead of home grown unsafe versions. This is CVE-...
void change_file_owner_to_parent(connection_struct *conn, const char *inherit_from_dir, files_struct *fsp) { struct smb_filename *smb_fname_parent; int ret; smb_fname_parent = synthetic_smb_fname(talloc_tos(), inherit_from_dir, NULL, NULL, 0); if (smb_fname_parent == NULL) { return;...
0
[ "CWE-835" ]
samba
10c3e3923022485c720f322ca4f0aca5d7501310
311,949,792,876,273,660,000,000,000,000,000,000,000
55
s3: smbd: Don't loop infinitely on bad-symlink resolution. In the FILE_OPEN_IF case we have O_CREAT, but not O_EXCL. Previously we went into a loop trying first ~(O_CREAT|O_EXCL), and if that returned ENOENT try (O_CREAT|O_EXCL). We kept looping indefinately until we got an error, or the file was created or opened. T...
static int kvm_ioctl_create_device(struct kvm *kvm, struct kvm_create_device *cd) { struct kvm_device_ops *ops = NULL; struct kvm_device *dev; bool test = cd->flags & KVM_CREATE_DEVICE_TEST; int ret; if (cd->type >= ARRAY_SIZE(kvm_device_ops_table)) return -ENODEV; ops = kvm_device_ops_table[cd->type];...
1
[ "CWE-416", "CWE-362" ]
linux
cfa39381173d5f969daf43582c95ad679189cbc9
213,282,364,006,884,100,000,000,000,000,000,000,000
51
kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) kvm_ioctl_create_device() does the following: 1. creates a device that holds a reference to the VM object (with a borrowed reference, the VM's refcount has not been bumped yet) 2. initializes the device 3. transfers the reference to the device t...
static int ZEND_FASTCALL ZEND_UNSET_DIM_SPEC_VAR_VAR_HANDLER(ZEND_OPCODE_HANDLER_ARGS) { zend_op *opline = EX(opline); zend_free_op free_op1, free_op2; zval **container = _get_zval_ptr_ptr_var(&opline->op1, EX(Ts), &free_op1 TSRMLS_CC); zval *offset = _get_zval_ptr_var(&opline->op2, EX(Ts), &free_op2 TSRMLS_CC); ...
0
[]
php-src
ce96fd6b0761d98353761bf78d5bfb55291179fd
282,486,573,066,273,870,000,000,000,000,000,000,000
90
- fix #39863, do not accept paths with NULL in them. See http://news.php.net/php.internals/50191, trunk will have the patch later (adding a macro and/or changing (some) APIs. Patch by Rasmus
check_cedit(void) { int n; if (*p_cedit == NUL) cedit_key = -1; else { n = string_to_key(p_cedit, FALSE); if (vim_isprintc(n)) return e_invalid_argument; cedit_key = n; } return NULL; }
0
[ "CWE-122", "CWE-787" ]
vim
85b6747abc15a7a81086db31289cf1b8b17e6cb1
209,833,978,907,603,900,000,000,000,000,000,000,000
15
patch 8.2.4214: illegal memory access with large 'tabstop' in Ex mode Problem: Illegal memory access with large 'tabstop' in Ex mode. Solution: Allocate enough memory.
dfaoptimize (struct dfa *d) { size_t i; if (!MBS_SUPPORT || !using_utf8()) return; for (i = 0; i < d->tindex; ++i) { switch(d->tokens[i]) { case ANYCHAR: /* Lowered. */ abort (); case MBCSET: /* Requires multi-byte algorithm. */ ret...
0
[ "CWE-189" ]
grep
cbbc1a45b9f843c811905c97c90a5d31f8e6c189
145,143,775,329,670,500,000,000,000,000,000,000,000
25
grep: fix some core dumps with long lines etc. These problems mostly occur because the code attempts to stuff sizes into int or into unsigned int; this doesn't work on most 64-bit hosts and the errors can lead to core dumps. * NEWS: Document this. * src/dfa.c (token): Typedef to ptrdiff_t, since the enum's range could...
UINT rdpgfx_read_point16(wStream* s, RDPGFX_POINT16* pt16) { if (Stream_GetRemainingLength(s) < 4) { WLog_ERR(TAG, "not enough data!"); return ERROR_INVALID_DATA; } Stream_Read_UINT16(s, pt16->x); /* x (2 bytes) */ Stream_Read_UINT16(s, pt16->y); /* y (2 bytes) */ return CHANNEL_RC_OK; }
0
[ "CWE-190" ]
FreeRDP
40393700642ad38437982e8a3afc34ff33ccf28e
140,340,059,713,873,570,000,000,000,000,000,000,000
12
Fixed input sanitation in rdpgfx_recv_solid_fill_pdu The input rectangle must be checked for plausibility. Thanks to Sunglin and HuanGMz of the Knownsec 404 security team and pangzi of pwnzen
hugetlb_get_unmapped_area(struct file *file, unsigned long addr, unsigned long len, unsigned long pgoff, unsigned long flags) { struct hstate *h = hstate_file(file); struct mm_struct *mm = current->mm; struct vm_area_struct *vma; unsigned long task_size = TASK_SIZE; if (test_thread_flag(TIF_32BIT)) task_size ...
1
[ "CWE-119" ]
linux
1be7107fbe18eed3e319a6c3e83c78254b693acb
329,330,308,593,772,580,000,000,000,000,000,000,000
36
mm: larger stack guard gap, between vmas Stack guard page is a useful feature to reduce a risk of stack smashing into a different mapping. We have been using a single page gap which is sufficient to prevent having stack adjacent to a different mapping. But this seems to be insufficient in the light of the stack usage ...
date_s_xmlschema(int argc, VALUE *argv, VALUE klass) { VALUE str, sg; rb_scan_args(argc, argv, "02", &str, &sg); switch (argc) { case 0: str = rb_str_new2("-4712-01-01"); case 1: sg = INT2FIX(DEFAULT_SG); } { VALUE hash = date_s__xmlschema(klass, str); return d_new_by_frags(klass,...
1
[]
date
3959accef8da5c128f8a8e2fd54e932a4fb253b0
115,890,751,631,592,720,000,000,000,000,000,000,000
18
Add length limit option for methods that parses date strings `Date.parse` now raises an ArgumentError when a given date string is longer than 128. You can configure the limit by giving `limit` keyword arguments like `Date.parse(str, limit: 1000)`. If you pass `limit: nil`, the limit is disabled. Not only `Date.parse`...
AP_DECLARE(int) ap_update_child_status_from_server(ap_sb_handle_t *sbh, int status, conn_rec *c, server_rec *s) { if (!sbh || (sbh->child_num < 0)) return -1; return update_child_status_internal(sbh->child_num, sbh->thread_num, ...
0
[ "CWE-476" ]
httpd
fa7b2a5250e54363b3a6c8ac3aaa7de4e8da9b2e
133,909,992,576,688,870,000,000,000,000,000,000,000
9
Merge r1878092 from trunk: Fix a NULL pointer dereference * server/scoreboard.c (ap_increment_counts): In certain cases like certain invalid requests r->method might be NULL here. r->method_number defaults to M_GET and hence is M_GET in these cases. Submitted by: rpluem Reviewed by: covener, ylavic, jfclere gi...
static void epsf_gencode(GVJ_t * job, node_t * n) { obj_state_t *obj = job->obj; epsf_t *desc; int doMap = (obj->url || obj->explicit_tooltip); desc = (epsf_t *) (ND_shape_info(n)); if (!desc) return; if (doMap && !(job->flags & EMIT_CLUSTERS_LAST)) gvrender_begin_anchor(job, obj->u...
0
[ "CWE-120" ]
graphviz
784411ca3655c80da0f6025ab20634b2a6ff696b
164,135,295,299,288,100,000,000,000,000,000,000,000
30
fix: out-of-bounds write on invalid label When the label for a node cannot be parsed (due to it being malformed), it falls back on the symbol name of the node itself. I.e. the default label the node would have had if it had no label attribute at all. However, this is applied by dynamically altering the node's label to...
void gfs2_quota_cleanup(struct gfs2_sbd *sdp) { struct list_head *head = &sdp->sd_quota_list; struct gfs2_quota_data *qd; unsigned int x; spin_lock(&qd_lru_lock); while (!list_empty(head)) { qd = list_entry(head->prev, struct gfs2_quota_data, qd_list); if (atomic_read(&qd->qd_count) > 1 || (atomic_read...
0
[ "CWE-399" ]
linux-2.6
7e619bc3e6252dc746f64ac3b486e784822e9533
16,651,190,888,038,492,000,000,000,000,000,000,000
51
GFS2: Fix writing to non-page aligned gfs2_quota structures This is the upstream fix for this bug. This patch differs from the RHEL5 fix (Red Hat bz #555754) which simply writes to the 8-byte value field of the quota. In upstream quota code, we're required to write the entire quota (88 bytes) which can be split across...
static uint16_t nvme_get_feature_timestamp(NvmeCtrl *n, NvmeRequest *req) { uint64_t timestamp = nvme_get_timestamp(n); return nvme_c2h(n, (uint8_t *)&timestamp, sizeof(timestamp), req); }
0
[]
qemu
736b01642d85be832385063f278fe7cd4ffb5221
170,894,446,092,025,440,000,000,000,000,000,000,000
6
hw/nvme: fix CVE-2021-3929 This fixes CVE-2021-3929 "locally" by denying DMA to the iomem of the device itself. This still allows DMA to MMIO regions of other devices (e.g. doing P2P DMA to the controller memory buffer of another NVMe device). Fixes: CVE-2021-3929 Reported-by: Qiuhao Li <Qiuhao.Li@outlook.com> Review...
void do_write_file(struct st_command *command) { do_write_file_command(command, FALSE); }
0
[ "CWE-284", "CWE-295" ]
mysql-server
3bd5589e1a5a93f9c224badf983cd65c45215390
59,545,940,779,632,300,000,000,000,000,000,000,000
4
WL#6791 : Redefine client --ssl option to imply enforced encryption # Changed the meaning of the --ssl=1 option of all client binaries to mean force ssl, not try ssl and fail over to eunecrypted # Added a new MYSQL_OPT_SSL_ENFORCE mysql_options() option to specify that an ssl connection is required. # Added a new macr...
router_get_runningrouters_hash(const char *s, char *digest) { return router_get_hash_impl(s, strlen(s), digest, "network-status","\ndirectory-signature", '\n', DIGEST_SHA1); }
0
[ "CWE-399" ]
tor
57e35ad3d91724882c345ac709666a551a977f0f
309,244,801,409,716,350,000,000,000,000,000,000,000
6
Avoid possible segfault when handling networkstatus vote with bad flavor Fix for 6530; fix on 0.2.2.6-alpha.
void vp7_decode_mvs(VP8Context *s, VP8Macroblock *mb, int mb_x, int mb_y, int layout) { VP8Macroblock *mb_edge[12]; enum { CNT_ZERO, CNT_NEAREST, CNT_NEAR }; enum { VP8_EDGE_TOP, VP8_EDGE_LEFT, VP8_EDGE_TOPLEFT }; int idx = CNT_ZERO; VP56mv near_mv[3]; uint8_t cnt[3] = { 0 };...
0
[ "CWE-119", "CWE-787" ]
FFmpeg
6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef
256,445,019,649,412,350,000,000,000,000,000,000,000
89
avcodec/webp: Always set pix_fmt Fixes: out of array access Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632 Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Reviewed-by: "Ronald S. Bultje" <rsbult...
void CLASS foveon_dp_load_raw() { #ifdef LIBRAW_LIBRARY_BUILD if(!image) throw LIBRAW_EXCEPTION_IO_CORRUPT; #endif unsigned c, roff[4], row, col, diff; ushort huff[512], vpred[2][2], hpred[2]; fseek (ifp, 8, SEEK_CUR); foveon_huff (huff); roff[0] = 48; FORC3 roff[c+1] = -(-(roff[c] + get4()) & -16); ...
0
[ "CWE-369", "CWE-704" ]
LibRaw
9f26ce37f5be86ea11bfc6831366558650b1f6ff
328,493,655,557,920,540,000,000,000,000,000,000,000
30
SA81000: LibRaw 0.18.8
int tipc_nl_node_dump_link(struct sk_buff *skb, struct netlink_callback *cb) { struct net *net = sock_net(skb->sk); struct nlattr **attrs = genl_dumpit_info(cb)->attrs; struct nlattr *link[TIPC_NLA_LINK_MAX + 1]; struct tipc_net *tn = net_generic(net, tipc_net_id); struct tipc_node *node; struct tipc_nl_msg msg; ...
0
[]
linux
0217ed2848e8538bcf9172d97ed2eeb4a26041bb
200,687,478,918,726,070,000,000,000,000,000,000,000
90
tipc: better validate user input in tipc_nl_retrieve_key() Before calling tipc_aead_key_size(ptr), we need to ensure we have enough data to dereference ptr->keylen. We probably also want to make sure tipc_aead_key_size() wont overflow with malicious ptr->keylen values. Syzbot reported: BUG: KMSAN: uninit-value in _...
int cli_matchmeta(cli_ctx *ctx, const char *fname, size_t fsizec, size_t fsizer, int encrypted, unsigned int filepos, int res1, void *res2) { const struct cli_cdb *cdb; unsigned int viruses_found = 0; int ret = CL_CLEAN; cli_dbgmsg("CDBNAME:%s:%llu:%s:%llu:%llu:%d:%u:%u:%p\n", cli_ftname(cli_get_...
0
[]
clamav-devel
167c0079292814ec5523d0b97a9e1b002bf8819b
295,328,636,666,345,420,000,000,000,000,000,000,000
61
fix 0.99.3 false negative of virus Pdf.Exploit.CVE_2016_1046-1.
get_real_name (const char *name, const char *gecos) { char *locale_string, *part_before_comma, *capitalized_login_name, *real_name; if (gecos == NULL) { return NULL; } locale_string = eel_str_strip_substring_and_after (gecos, ","); if (!g_utf8_validate (locale_string, -1, NULL)) { part_before_comma = g_local...
0
[]
nautilus
7632a3e13874a2c5e8988428ca913620a25df983
195,824,255,090,614,500,000,000,000,000,000,000,000
45
Check for trusted desktop file launchers. 2009-02-24 Alexander Larsson <alexl@redhat.com> * libnautilus-private/nautilus-directory-async.c: Check for trusted desktop file launchers. * libnautilus-private/nautilus-file-private.h: * libnautilus-private/nautilus-file.c: * libnautilus-...
htmlParseComment(htmlParserCtxtPtr ctxt) { xmlChar *buf = NULL; int len; int size = HTML_PARSER_BUFFER_SIZE; int q, ql; int r, rl; int cur, l; xmlParserInputState state; /* * Check that there is a comment right here. */ if ((RAW != '<') || (NXT(1) != '!') || (NXT(2...
1
[ "CWE-119" ]
libxml2
e724879d964d774df9b7969fc846605aa1bac54c
330,234,725,374,202,500,000,000,000,000,000,000,000
74
Fix parsing short unclosed comment uninitialized access For https://bugzilla.gnome.org/show_bug.cgi?id=746048 The HTML parser was too optimistic when processing comments and didn't check for the end of the stream on the first 2 characters
_cupsSNMPRead(int fd, /* I - SNMP socket file descriptor */ cups_snmp_t *packet, /* I - SNMP packet buffer */ double timeout) /* I - Timeout in seconds */ { unsigned char buffer[CUPS_SNMP_MAX_PACKET]; /* Data packet */ ssize_t bytes; /* Number of bytes received */ socklen...
0
[ "CWE-120" ]
cups
f24e6cf6a39300ad0c3726a41a4aab51ad54c109
131,689,902,096,561,400,000,000,000,000,000,000,000
106
Fix multiple security/disclosure issues: - CVE-2019-8696 and CVE-2019-8675: Fixed SNMP buffer overflows (rdar://51685251) - Fixed IPP buffer overflow (rdar://50035411) - Fixed memory disclosure issue in the scheduler (rdar://51373853) - Fixed DoS issues in the scheduler (rdar://51373929)
stop_all_other_conversations (GdmSession *self, GdmSessionConversation *conversation_to_keep, gboolean now) { GHashTableIter iter; gpointer key, value; if (self->priv->conversations == NULL) { ...
0
[]
gdm
5ac224602f1d603aac5eaa72e1760d3e33a26f0a
259,350,754,607,174,200,000,000,000,000,000,000,000
53
session: disconnect signals from worker proxy when conversation is freed We don't want an outstanding reference on the worker proxy to lead to signal handlers getting dispatched after the conversation is freed. https://bugzilla.gnome.org/show_bug.cgi?id=758032
static int drbg_fini_hash_kernel(struct drbg_state *drbg) { struct sdesc *sdesc = (struct sdesc *)drbg->priv_data; if (sdesc) { crypto_free_shash(sdesc->shash.tfm); kzfree(sdesc); } drbg->priv_data = NULL; return 0; }
0
[ "CWE-476" ]
linux
8fded5925d0a733c46f8d0b5edd1c9b315882b1d
108,718,495,148,080,460,000,000,000,000,000,000,000
10
crypto: drbg - Convert to new rng interface This patch converts the DRBG implementation to the new low-level rng interface. This allows us to get rid of struct drbg_gen by using the new RNG API instead. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Acked-by: Stephan Mueller <smueller@chronox.de>
int nghttp2_should_send_window_update(int32_t local_window_size, int32_t recv_window_size) { return recv_window_size > 0 && recv_window_size >= local_window_size / 2; }
0
[ "CWE-707" ]
nghttp2
336a98feb0d56b9ac54e12736b18785c27f75090
283,254,248,171,763,200,000,000,000,000,000,000,000
4
Implement max settings option
int phar_verify_signature(php_stream *fp, size_t end_of_phar, php_uint32 sig_type, char *sig, int sig_len, char *fname, char **signature, int *signature_len, char **error) /* {{{ */ { int read_size, len; zend_off_t read_len; unsigned char buf[1024]; php_stream_rewind(fp); switch (sig_type) { case PHAR_SIG_OPEN...
1
[ "CWE-119", "CWE-787" ]
php-src
0bfb970f43acd1e81d11be1154805f86655f15d5
254,520,604,440,096,230,000,000,000,000,000,000,000
273
Fix bug #72928 - Out of bound when verify signature of zip phar in phar_parse_zipfile (cherry picked from commit 19484ab77466f99c78fc0e677f7e03da0584d6a2)
int64 GetMemoryLimitInBytes() override { return std::numeric_limits<int64>::max(); }
0
[ "CWE-476", "CWE-703" ]
tensorflow
6972f9dfe325636b3db4e0bc517ee22a159365c0
33,740,872,612,261,063,000,000,000,000,000,000,000
3
Add missing valuidation to FusedBatchNorm. PiperOrigin-RevId: 372460336 Change-Id: Ic8c4e4de67c58a741bd87f2e182bed07247d1126
SPL_METHOD(MultipleIterator, key) { spl_SplObjectStorage *intern; intern = Z_SPLOBJSTORAGE_P(getThis()); if (zend_parse_parameters_none() == FAILURE) { return; } spl_multiple_iterator_get_all(intern, SPL_MULTIPLE_ITERATOR_GET_ALL_KEY, return_value); }
0
[ "CWE-119", "CWE-787" ]
php-src
61cdd1255d5b9c8453be71aacbbf682796ac77d4
218,842,457,031,898,760,000,000,000,000,000,000,000
11
Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key
agent_readkey (ctrl_t ctrl, int fromcard, const char *hexkeygrip, unsigned char **r_pubkey) { gpg_error_t err; membuf_t data; size_t len; unsigned char *buf; char line[ASSUAN_LINELENGTH]; struct default_inq_parm_s dfltparm; memset (&dfltparm, 0, sizeof dfltparm); dfltparm.ctrl = ctrl; ...
0
[ "CWE-20" ]
gnupg
2183683bd633818dd031b090b5530951de76f392
38,597,741,065,183,106,000,000,000,000,000,000,000
46
Use inline functions to convert buffer data to scalars. * common/host2net.h (buf16_to_ulong, buf16_to_uint): New. (buf16_to_ushort, buf16_to_u16): New. (buf32_to_size_t, buf32_to_ulong, buf32_to_uint, buf32_to_u32): New. -- Commit 91b826a38880fd8a989318585eb502582636ddd8 was not enough to avoid all sign extension on ...
void ConnectionManagerImpl::handleCodecError(absl::string_view error) { ENVOY_CONN_LOG(debug, "dispatch error: {}", read_callbacks_->connection(), error); read_callbacks_->connection().streamInfo().setResponseCodeDetails( absl::StrCat("codec error: ", error)); read_callbacks_->connection().streamInfo().setR...
0
[ "CWE-400" ]
envoy
0e49a495826ea9e29134c1bd54fdeb31a034f40c
52,266,358,578,575,950,000,000,000,000,000,000,000
12
http/2: add stats and stream flush timeout (#139) This commit adds a new stream flush timeout to guard against a remote server that does not open window once an entire stream has been buffered for flushing. Additional stats have also been added to better understand the codecs view of active streams as well as amount o...
HGraph* HGraphBuilder::CreateGraph() { graph_ = new(zone()) HGraph(info()); if (FLAG_hydrogen_stats) HStatistics::Instance()->Initialize(info()); { HPhase phase("H_Block building"); current_block_ = graph()->entry_block(); Scope* scope = info()->scope(); if (scope->HasIllegalRedeclaration()) { ...
0
[]
node
fd80a31e0697d6317ce8c2d289575399f4e06d21
100,533,818,759,086,670,000,000,000,000,000,000,000
79
deps: backport 5f836c from v8 upstream Original commit message: Fix Hydrogen bounds check elimination When combining bounds checks, they must all be moved before the first load/store that they are guarding. BUG=chromium:344186 LOG=y R=svenpanne@chromium.org Review URL: https://coderevie...
static int compat_table_info(const struct xt_table_info *info, struct xt_table_info *newinfo) { struct arpt_entry *iter; void *loc_cpu_entry; int ret; if (!newinfo || !info) return -EINVAL; /* we dont care about newinfo->entries[] */ memcpy(newinfo, info, offsetof(struct xt_table_info, entries)); new...
0
[ "CWE-200" ]
linux-2.6
42eab94fff18cb1091d3501cd284d6bd6cc9c143
45,830,580,893,746,700,000,000,000,000,000,000,000
22
netfilter: arp_tables: fix infoleak to userspace Structures ipt_replace, compat_ipt_replace, and xt_get_revision are copied from userspace. Fields of these structs that are zero-terminated strings are not checked. When they are used as argument to a format string containing "%s" in request_module(), some sensitive i...
void SshIo::SshImpl::writeRemote(const byte* data, size_t size, long from, long to) { if (protocol_ == pSftp) throw Error(kerErrorMessage, "not support SFTP write access."); //printf("ssh update size=%ld from=%ld to=%ld\n", (long)size, from, to); assert(isMalloced_); std::strin...
0
[ "CWE-190" ]
exiv2
c73d1e27198a389ce7caf52ac30f8e2120acdafd
172,915,916,437,163,670,000,000,000,000,000,000,000
53
Avoid negative integer overflow when `filesize < io_->tell()`. This fixes #791.
Value ExpressionSetIsSubset::evaluate(const Document& root) const { const Value lhs = vpOperand[0]->evaluate(root); const Value rhs = vpOperand[1]->evaluate(root); uassert(17046, str::stream() << "both operands of $setIsSubset must be arrays. First " << "argument is of...
0
[ "CWE-835" ]
mongo
0a076417d1d7fba3632b73349a1fd29a83e68816
110,581,119,347,402,630,000,000,000,000,000,000,000
18
SERVER-38070 fix infinite loop in agg expression
static struct timing_generator *dce80_timing_generator_create( struct dc_context *ctx, uint32_t instance, const struct dce110_timing_generator_offsets *offsets) { struct dce110_timing_generator *tg110 = kzalloc(sizeof(struct dce110_timing_generator), GFP_KERNEL); if (!tg110) return NULL; dce80_timing_gen...
0
[ "CWE-400", "CWE-703", "CWE-401" ]
linux
055e547478a11a6360c7ce05e2afc3e366968a12
317,934,530,012,857,170,000,000,000,000,000,000,000
14
drm/amd/display: memory leak In dcn*_clock_source_create when dcn20_clk_src_construct fails allocated clk_src needs release. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
handle_signal(unsigned long sig, struct k_sigaction *ka, siginfo_t *info, sigset_t *oldset, struct pt_regs * regs) { int ret; /* Set up the stack frame */ if (ka->sa.sa_flags & SA_SIGINFO) ret = setup_rt_frame(sig, ka, info, oldset, regs); else ret = setup_frame(sig, ka, oldset, regs); if (ret == 0) {...
0
[]
linux-2.6
ee18d64c1f632043a02e6f5ba5e045bb26a5465f
173,912,273,178,984,100,000,000,000,000,000,000,000
22
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] Add a keyctl to install a process's session keyring onto its parent. This replaces the parent's session keyring. Because the COW credential code does not permit one process to change another process's credentials directly, the change is...
struct fpm_scoreboard_proc_s *fpm_scoreboard_proc_acquire(struct fpm_scoreboard_s *scoreboard, int child_index, int nohang) /* {{{ */ { struct fpm_scoreboard_proc_s *proc; proc = fpm_scoreboard_proc_get(scoreboard, child_index); if (!proc) { return NULL; } if (!fpm_spinlock(&proc->lock, nohang)) { return NUL...
0
[ "CWE-787" ]
php-src
fadb1f8c1d08ae62b4f0a16917040fde57a3b93b
117,728,055,952,749,790,000,000,000,000,000,000,000
15
Fix bug #81026 (PHP-FPM oob R/W in root process leading to priv escalation) The main change is to store scoreboard procs directly to the variable sized array rather than indirectly through the pointer. Signed-off-by: Stanislav Malyshev <stas@php.net>
static struct sock *udp_get_idx(struct seq_file *seq, loff_t pos) { struct sock *sk = udp_get_first(seq); if (sk) while (pos && (sk = udp_get_next(seq, sk)) != NULL) --pos; return pos ? NULL : sk; }
0
[]
linux-2.6
32c1da70810017a98aa6c431a5494a302b6b9a30
229,982,021,387,065,700,000,000,000,000,000,000,000
9
[UDP]: Randomize port selection. This patch causes UDP port allocation to be randomized like TCP. The earlier code would always choose same port (ie first empty list). Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
bgp_attr_as4_aggregator (struct bgp_attr_parser_args *args, as_t *as4_aggregator_as, struct in_addr *as4_aggregator_addr) { struct peer *const peer = args->peer; struct attr *const attr = args->attr; const bgp_size_t length = args->length; if (length != 8) { zlog (peer->l...
0
[]
quagga
8794e8d229dc9fe29ea31424883433d4880ef408
146,211,019,617,987,060,000,000,000,000,000,000,000
24
bgpd: Fix regression in args consolidation, total should be inited from args * bgp_attr.c: (bgp_attr_unknown) total should be initialised from the args.
Elf64_Shdr const *PackLinuxElf64::elf_find_section_type( unsigned const type ) const { Elf64_Shdr const *shdr = shdri; int j = e_shnum; for (; 0 <=--j; ++shdr) { if (type==get_te32(&shdr->sh_type)) { return shdr; } } return 0; }
0
[ "CWE-476" ]
upx
ef336dbcc6dc8344482f8cf6c909ae96c3286317
16,868,327,926,478,270,000,000,000,000,000,000,000
13
Protect against bad crafted input. https://github.com/upx/upx/issues/128 modified: p_lx_elf.cpp
bool IsValidStrideCompactRowMajorData(int64_t* shape_arr, int64_t* stride_arr, int ndim) { if (ndim >= 1 && stride_arr[ndim - 1] != 1) { return false; } for (int i = ndim - 2; i >= 0; --i) { if (stride_arr[i] != shape_arr[i + 1] * stride_arr[i + 1]) { return fal...
0
[ "CWE-20", "CWE-476", "CWE-908" ]
tensorflow
22e07fb204386768e5bcbea563641ea11f96ceb8
146,269,294,639,356,070,000,000,000,000,000,000,000
12
Fix multiple vulnerabilities in `tf.experimental.dlpack.to_dlpack`. We have a use after free caused by memory coruption, a segmentation fault caused by memory corruption, several memory leaks and an undefined behavior when taking the reference of a nullptr. PiperOrigin-RevId: 332568894 Change-Id: Ife0fc05e103b3532509...
void DcmSCP::notifySENDProgress(const unsigned long byteCount) { DCMNET_TRACE("Bytes sent: " << byteCount); }
0
[ "CWE-264" ]
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
255,860,272,753,701,300,000,000,000,000,000,000,000
4
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
void ImportEPUB::ReadManifestItemElement(QXmlStreamReader *opf_reader) { QString id = opf_reader->attributes().value("", "id").toString(); QString href = opf_reader->attributes().value("", "href").toString(); QString type = opf_reader->attributes().value("", "media-type").toString(); QString propertie...
0
[ "CWE-22" ]
Sigil
04e2f280cc4a0766bedcc7b9eb56449ceecc2ad4
181,472,077,261,786,800,000,000,000,000,000,000,000
49
further harden against malicious epubs and produce error message
static inline void add_offset_pair(zval *result, char *str, int len, int offset, char *name) { zval *match_pair; ALLOC_ZVAL(match_pair); array_init(match_pair); INIT_PZVAL(match_pair); /* Add (match, offset) to the return value */ add_next_index_stringl(match_pair, str, len, 1); add_next_index_long(match_pair,...
1
[]
php-src
03964892c054d0c736414c10b3edc7a40318b975
245,912,582,882,633,100,000,000,000,000,000,000,000
18
Fix bug #70345 (Multiple vulnerabilities related to PCRE functions)
TRIO_PUBLIC int trio_printf TRIO_VARGS2((format, va_alist), TRIO_CONST char* format, TRIO_VA_DECL) { int status; va_list args; assert(VALID(format)); TRIO_VA_START(args, format); status = TrioFormat(stdout, 0, TrioOutStreamFile, format, args, NULL, NULL); TRIO_VA_END(args); return status; }
0
[ "CWE-190", "CWE-125" ]
FreeRDP
05cd9ea2290d23931f615c1b004d4b2e69074e27
240,903,785,403,262,170,000,000,000,000,000,000,000
12
Fixed TrioParse and trio_length limts. CVE-2020-4030 thanks to @antonio-morales for finding this.
origin_remote_matches (OstreeRepo *repo, const char *remote_name, const char *url, const char *main_ref, gboolean gpg_verify, const char *collection_id) { g_autofree char *real_url = NULL; g_autofre...
0
[ "CWE-668" ]
flatpak
cd2142888fc4c199723a0dfca1f15ea8788a5483
222,428,426,215,882,560,000,000,000,000,000,000,000
58
Don't expose /proc when running apply_extra As shown by CVE-2019-5736, it is sometimes possible for the sandbox app to access outside files using /proc/self/exe. This is not typically an issue for flatpak as the sandbox runs as the user which has no permissions to e.g. modify the host files. However, when installing ...
PackLinuxElf64ppcle::~PackLinuxElf64ppcle() { }
0
[ "CWE-476" ]
upx
ef336dbcc6dc8344482f8cf6c909ae96c3286317
130,148,209,435,141,590,000,000,000,000,000,000,000
3
Protect against bad crafted input. https://github.com/upx/upx/issues/128 modified: p_lx_elf.cpp
static int SRP_Verify_N_and_g(const BIGNUM *N, const BIGNUM *g) { BN_CTX *bn_ctx = BN_CTX_new(); BIGNUM *p = BN_new(); BIGNUM *r = BN_new(); int ret = g != NULL && N != NULL && bn_ctx != NULL && BN_is_odd(N) && BN_is_prime(N,SRP_NUMBER_ITERATIONS_FOR_PRIME,NULL,bn_ctx,NULL) && p != NULL && BN_rshift1(p, N) &...
0
[]
openssl
edc032b5e3f3ebb1006a9c89e0ae00504f47966f
181,919,925,247,499,100,000,000,000,000,000,000,000
27
Add SRP support.
sha1_handle_first_client_response (DBusAuth *auth, const DBusString *data) { /* We haven't sent a challenge yet, we're expecting a desired * username from the client. */ DBusString tmp; DBusString tmp2; dbus_bool_t retval = FALSE; DBusError error = DBUS_ERROR_I...
1
[ "CWE-59" ]
dbus
47b1a4c41004bf494b87370987b222c934b19016
12,067,234,396,677,446,000,000,000,000,000,000,000
162
auth: Reject DBUS_COOKIE_SHA1 for users other than the server owner The DBUS_COOKIE_SHA1 authentication mechanism aims to prove ownership of a shared home directory by having the server write a secret "cookie" into a .dbus-keyrings subdirectory of the desired identity's home directory with 0700 permissions, and having...
parser_emit_cbc_push_number (parser_context_t *context_p, /**< context */ bool is_negative_number) /**< sign is negative */ { uint16_t value = context_p->lit_object.index; uint16_t lit_value = PARSER_INVALID_LITERAL_INDEX; if (context_p->last_cbc_opcode != PARSER_CBC_UNAVAILABLE) {...
0
[ "CWE-416" ]
jerryscript
3bcd48f72d4af01d1304b754ef19fe1a02c96049
38,085,292,512,559,280,000,000,000,000,000,000,000
65
Improve parse_identifier (#4691) Ascii string length is no longer computed during string allocation. JerryScript-DCO-1.0-Signed-off-by: Daniel Batiz batizjob@gmail.com
int cap_task_setioprio(struct task_struct *p, int ioprio) { return cap_safe_nice(p); }
0
[ "CWE-264" ]
linux
259e5e6c75a910f3b5e656151dc602f53f9d7548
149,243,793,457,941,900,000,000,000,000,000,000,000
4
Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs With this change, calling prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) disables privilege granting operations at execve-time. For example, a process will not be able to execute a setuid binary to change their uid or gid if this bit is set. The same is t...
static int treo_attach(struct usb_serial *serial) { struct usb_serial_port *swap_port; /* Only do this endpoint hack for the Handspring devices with * interrupt in endpoints, which for now are the Treo devices. */ if (!((le16_to_cpu(serial->dev->descriptor.idVendor) == HANDSPRING_VENDOR_ID) || (le16_to_cp...
1
[ "CWE-476", "CWE-703" ]
linux
cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
168,323,757,430,524,630,000,000,000,000,000,000,000
50
USB: visor: fix null-deref at probe Fix null-pointer dereference at probe should a (malicious) Treo device lack the expected endpoints. Specifically, the Treo port-setup hack was dereferencing the bulk-in and interrupt-in urbs without first making sure they had been allocated by core. Fixes: 1da177e4c3f4 ("Linux-2.6...
void region16_print(const REGION16* region) { const RECTANGLE_16* rects; UINT32 nbRects, i; int currentBandY = -1; rects = region16_rects(region, &nbRects); WLog_DBG(TAG, "nrects=%"PRIu32"", nbRects); for (i = 0; i < nbRects; i++, rects++) { if (rects->top != currentBandY) { currentBandY = rects->top; ...
0
[ "CWE-401" ]
FreeRDP
9fee4ae076b1ec97b97efb79ece08d1dab4df29a
8,564,372,628,131,661,000,000,000,000,000,000,000
20
Fixed #5645: realloc return handling
gather_termleader(void) { int i; int len = 0; #ifdef FEAT_GUI if (gui.in_use) termleader[len++] = CSI; // the GUI codes are not in termcodes[] #endif #ifdef FEAT_TERMRESPONSE if (check_for_codes || *T_CRS != NUL) termleader[len++] = DCS; // the termcode response starts with DCS ...
0
[ "CWE-125", "CWE-787" ]
vim
e178af5a586ea023622d460779fdcabbbfac0908
264,959,741,649,594,600,000,000,000,000,000,000,000
25
patch 8.2.5160: accessing invalid memory after changing terminal size Problem: Accessing invalid memory after changing terminal size. Solution: Adjust cmdline_row and msg_row to the value of Rows.
void PeerListWidget::displayToggleColumnsMenu(const QPoint&) { QMenu hideshowColumn(this); hideshowColumn.setTitle(tr("Column visibility")); QList<QAction*> actions; for (int i = 0; i < PeerListDelegate::IP_HIDDEN; ++i) { if ((i == PeerListDelegate::COUNTRY) && !Preferences::instance()->resolveP...
0
[ "CWE-20", "CWE-79" ]
qBittorrent
6ca3e4f094da0a0017cb2d483ec1db6176bb0b16
174,044,310,831,329,580,000,000,000,000,000,000,000
39
Add Utils::String::toHtmlEscaped
static u64 compute_guest_tsc(struct kvm_vcpu *vcpu, s64 kernel_ns) { u64 tsc = pvclock_scale_delta(kernel_ns-vcpu->arch.last_tsc_nsec, vcpu->kvm->arch.virtual_tsc_mult, vcpu->kvm->arch.virtual_tsc_shift); tsc += vcpu->arch.last_tsc_write; return tsc; }
0
[ "CWE-200" ]
kvm
831d9d02f9522e739825a51a11e3bc5aa531a905
158,094,150,696,418,130,000,000,000,000,000,000,000
8
KVM: x86: fix information leak to userland Structures kvm_vcpu_events, kvm_debugregs, kvm_pit_state2 and kvm_clock_data are copied to userland with some padding and reserved fields unitialized. It leads to leaking of contents of kernel stack memory. We have to initialize them to zero. In patch v1 Jan Kiszka suggest...
prepareAcceleratedURL(ConnStateData * conn, const Http1::RequestParserPointer &hp) { int vhost = conn->port->vhost; int vport = conn->port->vport; static char ipbuf[MAX_IPSTRLEN]; /* BUG: Squid cannot deal with '*' URLs (RFC2616 5.1.2) */ static const SBuf cache_object("cache_object://"); if (...
0
[ "CWE-444" ]
squid
fd68382860633aca92065e6c343cfd1b12b126e7
12,604,947,198,250,145,000,000,000,000,000,000,000
106
Improve Transfer-Encoding handling (#702) Reject messages containing Transfer-Encoding header with coding other than chunked or identity. Squid does not support other codings. For simplicity and security sake, also reject messages where Transfer-Encoding contains unnecessary complex values that are technically equiva...
static MagickBooleanType ReadDCMPixels(Image *image,DCMInfo *info, DCMStreamInfo *stream_info,MagickBooleanType first_segment, ExceptionInfo *exception) { int byte, index; MagickBooleanType status; PixelPacket pixel; register ssize_t i, x; register Quantum *q; ssize_t ...
0
[ "CWE-20", "CWE-252" ]
ImageMagick
6b6bff054d569a77973f2140c0e86366e6168a6c
263,209,798,976,031,370,000,000,000,000,000,000,000
168
https://github.com/ImageMagick/ImageMagick/issues/1199
compare_keys_by_id(const void *a, const void *b) { const Key *c = (const Key *) a; const Key *d = (const Key *) b; if (c->id < d->id) { return -1; } else if (c->id > d->id) { return +1; } else { return 0; } }
0
[ "CWE-59" ]
chrony
e18903a6b56341481a2e08469c0602010bf7bfe3
283,366,478,290,392,300,000,000,000,000,000,000,000
14
switch to new util file functions Replace all fopen(), rename(), and unlink() calls with the new util functions.
int SaveEXRImageToFile(const EXRImage *exr_image, const EXRHeader *exr_header, const char *filename, const char **err) { if (exr_image == NULL || filename == NULL || exr_header->compression_type < 0) { tinyexr::SetErrorMessage("Invalid argument for SaveEXRImageToFile", err); retur...
0
[ "CWE-20", "CWE-190" ]
tinyexr
a685e3332f61cd4e59324bf3f669d36973d64270
153,623,393,625,513,420,000,000,000,000,000,000,000
56
Make line_no with too large value(2**20) invalid. Fixes #124
cdp_decode(struct lldpd *cfg, char *frame, int s, struct lldpd_hardware *hardware, struct lldpd_chassis **newchassis, struct lldpd_port **newport) { struct lldpd_chassis *chassis; struct lldpd_port *port; struct lldpd_mgmt *mgmt; struct in_addr addr; #if 0 u_int16_t cksum; #endif u_int8_t *software = NULL...
0
[ "CWE-617", "CWE-703" ]
lldpd
9221b5c249f9e4843f77c7f888d5705348d179c0
81,913,992,854,605,855,000,000,000,000,000,000,000
330
protocols: don't use assert on paths that can be reached Malformed packets should not make lldpd crash. Ensure we can handle them by not using assert() in this part.
DLLIMPORT cfg_t *cfg_gettsec(cfg_t *cfg, const char *name, const char *title) { return cfg_opt_gettsec(cfg_getopt(cfg, name), title); }
0
[]
libconfuse
d73777c2c3566fb2647727bb56d9a2295b81669b
287,293,291,434,719,130,000,000,000,000,000,000,000
4
Fix #163: unterminated username used with getpwnam() Signed-off-by: Joachim Wiberg <troglobit@gmail.com>
TEST_P(SslSocketTest, ClientAuthMultipleCAs) { const std::string server_ctx_yaml = R"EOF( common_tls_context: tls_certificates: certificate_chain: filename: "{{ test_rundir }}/test/extensions/transport_sockets/tls/test_data/unittest_cert.pem" private_key: filename: "{{ test_rundir }}...
0
[ "CWE-362", "CWE-295" ]
envoy
e9f936d85dc1edc34fabd0a1725ec180f2316353
200,781,096,389,422,470,000,000,000,000,000,000,000
82
CVE-2022-21654 tls allows re-use when some cert validation settings have changed Signed-off-by: Yan Avlasov <yavlasov@google.com>