func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
struct mm_struct *mm_for_maps(struct task_struct *task) { struct mm_struct *mm; if (mutex_lock_killable(&task->cred_guard_mutex)) return NULL; mm = get_task_mm(task); if (mm && mm != current->mm && !ptrace_may_access(task, PTRACE_MODE_READ)) { mmput(mm); mm = NULL; } mutex_unlock(&task->cred_guard_mute...
0
[ "CWE-20", "CWE-362", "CWE-416" ]
linux
86acdca1b63e6890540fa19495cfc708beff3d8b
129,547,494,529,284,340,000,000,000,000,000,000,000
17
fix autofs/afs/etc. magic mountpoint breakage We end up trying to kfree() nd.last.name on open("/mnt/tmp", O_CREAT) if /mnt/tmp is an autofs direct mount. The reason is that nd.last_type is bogus here; we want LAST_BIND for everything of that kind and we get LAST_NORM left over from finding parent directory. So make...
int blkid_partition_set_type(blkid_partition par, int type) { par->type = type; return 0; }
0
[]
util-linux
50d1594c2e6142a3b51d2143c74027480df082e0
270,504,767,877,140,440,000,000,000,000,000,000,000
5
libblkid: avoid non-empty recursion in EBR This is extension to the patch 7164a1c34d18831ac61c6744ad14ce916d389b3f. We also need to detect non-empty recursion in the EBR chain. It's possible to create standard valid logical partitions and in the last one points back to the EBR chain. In this case all offsets will be ...
shortpath_for_partial( char_u **fnamep, char_u **bufp, int *fnamelen) { int sepcount, len, tflen; char_u *p; char_u *pbuf, *tfname; int hasTilde; // Count up the path separators from the RHS.. so we know which part // of the path to return. sepcount = 0; for (p = *fnamep;...
0
[ "CWE-823", "CWE-703" ]
vim
5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
91,639,414,591,749,070,000,000,000,000,000,000,000
71
patch 8.2.4418: crash when using special multi-byte character Problem: Crash when using special multi-byte character. Solution: Don't use isalpha() for an arbitrary character.
struct tty_struct *tty_init_dev(struct tty_driver *driver, int idx, int first_ok) { struct tty_struct *tty; int retval; /* Check if pty master is being opened multiple times */ if (driver->subtype == PTY_TYPE_MASTER && (driver->flags & TTY_DRIVER_DEVPTS_MEM) && !first_ok) { return ERR_PTR(-EIO); } /...
0
[ "CWE-703" ]
linux
c290f8358acaeffd8e0c551ddcc24d1206143376
581,604,091,808,194,000,000,000,000,000,000,000
58
TTY: drop driver reference in tty_open fail path When tty_driver_lookup_tty fails in tty_open, we forget to drop a reference to the tty driver. This was added by commit 4a2b5fddd5 (Move tty lookup/reopen to caller). Fix that by adding tty_driver_kref_put to the fail path. I will refactor the code later. This is for ...
xfs_bmapi_update_map( struct xfs_bmbt_irec **map, xfs_fileoff_t *bno, xfs_filblks_t *len, xfs_fileoff_t obno, xfs_fileoff_t end, int *n, int flags) { xfs_bmbt_irec_t *mval = *map; ASSERT((flags & XFS_BMAPI_ENTIRE) || ((mval->br_startoff + mval->br_blockcount) <= end)); ASSERT((flags & XFS_BMA...
0
[]
linux
2c4306f719b083d17df2963bc761777576b8ad1b
218,379,992,714,306,000,000,000,000,000,000,000,000
50
xfs: set format back to extents if xfs_bmap_extents_to_btree If xfs_bmap_extents_to_btree fails in a mode where we call xfs_iroot_realloc(-1) to de-allocate the root, set the format back to extents. Otherwise we can assume we can dereference ifp->if_broot based on the XFS_DINODE_FMT_BTREE format, and crash. Bugzilla...
static void stbi__tga_read_rgb16(stbi__context *s, stbi_uc* out) { stbi__uint16 px = (stbi__uint16)stbi__get16le(s); stbi__uint16 fiveBitMask = 31; // we have 3 channels with 5bits each int r = (px >> 10) & fiveBitMask; int g = (px >> 5) & fiveBitMask; int b = px & fiveBitMask; // Note that this sa...
0
[ "CWE-787" ]
stb
5ba0baaa269b3fd681828e0e3b3ac0f1472eaf40
268,628,128,105,298,200,000,000,000,000,000,000,000
18
stb_image: Reject fractional JPEG component subsampling ratios The component resamplers are not written to support this and I've never seen it happen in a real (non-crafted) JPEG file so I'm fine rejecting this as outright corrupt. Fixes issue #1178.
inbound_topictime (server *serv, char *chan, char *nick, time_t stamp, const message_tags_data *tags_data) { char *tim = ctime (&stamp); session *sess = find_channel (serv, chan); if (!sess) sess = serv->server_session; tim[24] = 0; /* get rid of the \n */ EMIT_SIGNAL_TIMESTAMP (XP_TE_TOPICDATE, sess, c...
0
[ "CWE-22" ]
hexchat
4e061a43b3453a9856d34250c3913175c45afe9d
67,692,530,169,368,630,000,000,000,000,000,000,000
13
Clean up handling CAP LS
ast_error(struct compiling *c, const node *n, const char *errmsg, ...) { PyObject *value, *errstr, *loc, *tmp; va_list va; va_start(va, errmsg); errstr = PyUnicode_FromFormatV(errmsg, va); va_end(va); if (!errstr) { return 0; } loc = PyErr_ProgramTextObject(c->c_filename, LINENO...
0
[ "CWE-125" ]
cpython
a4d78362397fc3bced6ea80fbc7b5f4827aec55e
295,965,485,146,715,440,000,000,000,000,000,000,000
30
bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
void free_vfsmnt(struct vfsmount *mnt) { kfree(mnt->mnt_devname); kmem_cache_free(mnt_cache, mnt); }
0
[ "CWE-269" ]
linux-2.6
ee6f958291e2a768fd727e7a67badfff0b67711a
27,819,382,331,903,354,000,000,000,000,000,000,000
5
check privileges before setting mount propagation There's a missing check for CAP_SYS_ADMIN in do_change_type(). Signed-off-by: Miklos Szeredi <mszeredi@suse.cz> Cc: Al Viro <viro@zeniv.linux.org.uk> Cc: Christoph Hellwig <hch@lst.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torva...
static inline int security_socket_getsockopt(struct socket *sock, int level, int optname) { return 0; }
0
[]
linux-2.6
ee18d64c1f632043a02e6f5ba5e045bb26a5465f
339,584,043,740,584,300,000,000,000,000,000,000,000
5
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] Add a keyctl to install a process's session keyring onto its parent. This replaces the parent's session keyring. Because the COW credential code does not permit one process to change another process's credentials directly, the change is...
ogs_sbi_request_t *ogs_sbi_build_request(ogs_sbi_message_t *message) { ogs_sbi_request_t *request = NULL; ogs_assert(message); request = ogs_sbi_request_new(); ogs_expect_or_return_val(request, NULL); ogs_expect_or_return_val(message->h.method, NULL); request->h.method = ogs_strdup(message->h...
0
[ "CWE-476", "CWE-787" ]
open5gs
d919b2744cd05abae043490f0a3dd1946c1ccb8c
121,178,023,650,760,330,000,000,000,000,000,000,000
190
[AMF] fix the memory problem (#1247) 1. memory corruption - Overflow num_of_part in SBI message 2. null pointer dereference - n2InfoContent->ngap_ie_type
lyp_check_edit_attr(struct ly_ctx *ctx, struct lyd_attr *attr, struct lyd_node *parent, int *editbits) { struct lyd_attr *last = NULL; int bits = 0; /* 0x01 - insert attribute present * 0x02 - insert is relative (before or after) * 0x04 - value attribute present * 0x08 - key attribute presen...
0
[ "CWE-787" ]
libyang
f6d684ade99dd37b21babaa8a856f64faa1e2e0d
173,327,425,604,411,270,000,000,000,000,000,000,000
98
parser BUGFIX long identity name buffer overflow STRING_OVERFLOW (CWE-120)
void Monitor::update_mon_metadata(int from, Metadata&& m) { // NOTE: this is now for legacy (kraken or jewel) mons only. pending_metadata[from] = std::move(m); MonitorDBStore::TransactionRef t = paxos->get_pending_transaction(); bufferlist bl; ::encode(pending_metadata, bl); t->put(MONITOR_STORE_PREFIX, "l...
0
[ "CWE-287", "CWE-284" ]
ceph
5ead97120e07054d80623dada90a5cc764c28468
142,348,583,834,072,810,000,000,000,000,000,000,000
11
auth/cephx: add authorizer challenge Allow the accepting side of a connection to reject an initial authorizer with a random challenge. The connecting side then has to respond with an updated authorizer proving they are able to decrypt the service's challenge and that the new authorizer was produced for this specific ...
void JBIG2MMRDecoder::skipTo(unsigned int length) { int n = str->discardChars(length - nBytesRead); nBytesRead += n; byteCounter += n; }
0
[ "CWE-476", "CWE-190" ]
poppler
27354e9d9696ee2bc063910a6c9a6b27c5184a52
245,909,794,126,869,700,000,000,000,000,000,000,000
6
JBIG2Stream: Fix crash on broken file https://github.com/jeffssh/CVE-2021-30860 Thanks to David Warren for the heads up
int JPXStream::getChars(int nChars, unsigned char *buffer) { if (unlikely(priv->inited == false)) { init(); } for (int i = 0; i < nChars; ++i) { const int c = doGetChar(priv); if (likely(c != EOF)) buffer[i] = c; else return i; } return nChars; }
0
[ "CWE-125" ]
poppler
89a5367d49b2556a2635dbb6d48d6a6b182a2c6c
123,198,541,907,388,760,000,000,000,000,000,000,000
10
JPEG2000Stream: fail gracefully if not all components have the same WxH I think this is just a mistake, or at least the only file we have with this scenario is a fuzzed one
void SSL_set_shutdown(SSL *s, int mode) { s->shutdown = mode; }
0
[ "CWE-310" ]
openssl
56f1acf5ef8a432992497a04792ff4b3b2c6f286
100,091,310,450,541,280,000,000,000,000,000,000,000
4
Disable SSLv2 default build, default negotiation and weak ciphers. SSLv2 is by default disabled at build-time. Builds that are not configured with "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the version-flexible SSLv23_method() will need to explicitly ca...
run_startup_files () { #if defined (JOB_CONTROL) int old_job_control; #endif int sourced_login, run_by_ssh; /* get the rshd/sshd case out of the way first. */ if (interactive_shell == 0 && no_rc == 0 && login_shell == 0 && act_like_sh == 0 && command_execution_string) { #ifdef SSH_SOURCE_BASHRC ...
0
[ "CWE-273", "CWE-787" ]
bash
951bdaad7a18cc0dc1036bba86b18b90874d39ff
21,049,415,436,869,251,000,000,000,000,000,000,000
131
commit bash-20190628 snapshot
static void cdrom_mmc3_profile(struct cdrom_device_info *cdi) { struct packet_command cgc; char buffer[32]; int ret, mmc3_profile; init_cdrom_command(&cgc, buffer, sizeof(buffer), CGC_DATA_READ); cgc.cmd[0] = GPCMD_GET_CONFIGURATION; cgc.cmd[1] = 0; cgc.cmd[2] = cgc.cmd[3] = 0; /* Starting Feature Number */ ...
0
[ "CWE-119", "CWE-787" ]
linux
9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
288,037,853,070,493,250,000,000,000,000,000,000,000
21
cdrom: information leak in cdrom_ioctl_media_changed() This cast is wrong. "cdi->capacity" is an int and "arg" is an unsigned long. The way the check is written now, if one of the high 32 bits is set then we could read outside the info->slots[] array. This bug is pretty old and it predates git. Reviewed-by: Christ...
static void fast_forward_char_pair_sse2_compare(struct sljit_compiler *compiler, PCRE2_UCHAR char1, PCRE2_UCHAR char2, sljit_u32 bit, sljit_s32 dst_ind, sljit_s32 cmp1_ind, sljit_s32 cmp2_ind, sljit_s32 tmp_ind) { sljit_u8 instruction[4]; instruction[0] = 0x66; instruction[1] = 0x0f; if (char1 == char2 || bit != 0) ...
0
[ "CWE-125" ]
php-src
8947fd9e9fdce87cd6c59817b1db58e789538fe9
283,756,984,602,291,620,000,000,000,000,000,000,000
53
Fix #78338: Array cross-border reading in PCRE We backport r1092 from pcre2.
arch_get_unmapped_area(struct file *filp, unsigned long addr, unsigned long len, unsigned long pgoff, unsigned long flags) { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; struct vm_unmapped_area_info info; unsigned long begin, end; if (flags & MAP_FIXED) return addr; find_start_end(flags, ...
1
[ "CWE-119" ]
linux
1be7107fbe18eed3e319a6c3e83c78254b693acb
118,450,408,525,831,480,000,000,000,000,000,000,000
36
mm: larger stack guard gap, between vmas Stack guard page is a useful feature to reduce a risk of stack smashing into a different mapping. We have been using a single page gap which is sufficient to prevent having stack adjacent to a different mapping. But this seems to be insufficient in the light of the stack usage ...
read_system_page (Bit_Chain *dat, int64_t size_comp, int64_t size_uncomp, int64_t repeat_count) { int i; int error = 0; int64_t pesize; // Pre RS encoded size int64_t block_count; // Number of RS encoded blocks int64_t page_size; long pedata_size; BITCODE_RC *rsdata; // RS encoded...
0
[ "CWE-787" ]
libredwg
45d2a290c65ed691be0901ba2b2ef51044e07a16
56,514,946,148,474,110,000,000,000,000,000,000,000
79
decode_r2007: fix for invalid section size See GH #350. With fuzzing section->data_size might not fit section_page->uncomp_size.
static void fourinsix(struct sockaddr_storage *v6) { struct sockaddr_storage v4; if (v6ready == 0 || STORAGE_FAMILY(*v6) != AF_INET6 || IN6_IS_ADDR_V4MAPPED(&STORAGE_SIN_ADDR6_NF_CONST(*v6)) == 0) { return; } memset(&v4, 0, sizeof v4); STORAGE_FAMILY(v4) = AF_INET; memcpy(&STORA...
0
[ "CWE-434" ]
pure-ftpd
37ad222868e52271905b94afea4fc780d83294b4
7,682,625,026,022,711,000,000,000,000,000,000,000
17
Initialize the max upload file size when quotas are enabled Due to an unwanted check, files causing the quota to be exceeded were deleted after the upload, but not during the upload. The bug was introduced in 2009 in version 1.0.23 Spotted by @DroidTest, thanks!
int vnc_display_disable_login(DisplayState *ds) { VncDisplay *vs = ds ? (VncDisplay *)ds->opaque : vnc_display; if (!vs) { return -1; } if (vs->password) { g_free(vs->password); } vs->password = NULL; if (vs->auth == VNC_AUTH_NONE) { vs->auth = VNC_AUTH_VNC; } ...
0
[ "CWE-125" ]
qemu
9f64916da20eea67121d544698676295bbb105a7
234,460,861,243,630,200,000,000,000,000,000,000,000
19
pixman/vnc: use pixman images in vnc. The vnc code uses *three* DisplaySurfaces: First is the surface of the actual QemuConsole, usually the guest screen, but could also be a text console (monitor/serial reachable via Ctrl-Alt-<nr> keys). This is left as-is. Second is the current server's view of the screen content...
pdf14_create_compositor(gx_device * dev, gx_device * * pcdev, const gs_composite_t * pct, gs_gstate * pgs, gs_memory_t * mem, gx_device *cdev) { pdf14_device *p14dev = (pdf14_device *)dev; if (gs_is_pdf14trans_compositor(pct)) { const gs_pdf14trans_t * pdf14pct = (const gs_pdf14trans_t *...
0
[ "CWE-416" ]
ghostpdl
90fd0c7ca3efc1ddff64a86f4104b13b3ac969eb
209,835,271,155,774,300,000,000,000,000,000,000,000
34
Bug 697456. Dont create new ctx when pdf14 device reenabled This bug had yet another weird case where the user created a file that pushed the pdf14 device twice. We were in that case, creating a new ctx and blowing away the original one with out proper clean up. To avoid, only create a new one when we need it.
static void utf7_encode(FILE *sfd,long ch) { putc(base64[(ch>>18)&0x3f],sfd); putc(base64[(ch>>12)&0x3f],sfd); putc(base64[(ch>>6)&0x3f],sfd); putc(base64[ch&0x3f],sfd); }
0
[ "CWE-416" ]
fontforge
048a91e2682c1a8936ae34dbc7bd70291ec05410
10,400,436,269,032,889,000,000,000,000,000,000,000
7
Fix for #4084 Use-after-free (heap) in the SFD_GetFontMetaData() function Fix for #4086 NULL pointer dereference in the SFDGetSpiros() function Fix for #4088 NULL pointer dereference in the SFD_AssignLookups() function Add empty sf->fontname string if it isn't set, fixing #4089 #4090 and many other potential issues (...
MONGO_EXPORT gridfs_offset gridfile_get_contentlength( gridfile *gfile ) { bson_iterator it; bson_find( &it, gfile->meta, "length" ); if( bson_iterator_type( &it ) == BSON_INT ) return ( gridfs_offset )bson_iterator_int( &it ); else return ( gridfs_offset )bson_iterator_long( &it ); }
0
[ "CWE-190" ]
mongo-c-driver-legacy
1a1f5e26a4309480d88598913f9eebf9e9cba8ca
66,217,323,986,732,520,000,000,000,000,000,000,000
10
don't mix up int and size_t (first pass to fix that)
virtual Item *in_predicate_to_in_subs_transformer(THD *thd, uchar *arg) { return this; }
0
[ "CWE-617" ]
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
281,284,898,195,094,700,000,000,000,000,000,000,000
2
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
irc_server_create_buffer (struct t_irc_server *server) { char buffer_name[256], charset_modifier[256]; struct t_gui_buffer *ptr_buffer_for_merge; ptr_buffer_for_merge = NULL; switch (weechat_config_integer (irc_config_look_server_buffer)) { case IRC_CONFIG_LOOK_SERVER_BUFFER_MERGE_WITH_...
0
[ "CWE-20" ]
weechat
c265cad1c95b84abfd4e8d861f25926ef13b5d91
331,549,926,097,939,900,000,000,000,000,000,000,000
58
Fix verification of SSL certificates by calling gnutls verify callback (patch #7459)
int timer_reduce(struct timer_list *timer, unsigned long expires) { return __mod_timer(timer, expires, MOD_TIMER_REDUCE); }
0
[ "CWE-200", "CWE-330" ]
linux
f227e3ec3b5cad859ad15666874405e8c1bbc1d4
334,641,326,413,409,120,000,000,000,000,000,000,000
4
random32: update the net random state on interrupt and activity This modifies the first 32 bits out of the 128 bits of a random CPU's net_rand_state on interrupt or CPU activity to complicate remote observations that could lead to guessing the network RNG's internal state. Note that depending on some network devices'...
static void vhost_scsi_free_evt(struct vhost_scsi *vs, struct vhost_scsi_evt *evt) { vs->vs_events_nr--; kfree(evt); }
0
[ "CWE-200", "CWE-119" ]
linux
59c816c1f24df0204e01851431d3bab3eb76719c
50,523,673,604,191,910,000,000,000,000,000,000,000
5
vhost/scsi: potential memory corruption This code in vhost_scsi_make_tpg() is confusing because we limit "tpgt" to UINT_MAX but the data type of "tpg->tport_tpgt" and that is a u16. I looked at the context and it turns out that in vhost_scsi_set_endpoint(), "tpg->tport_tpgt" is used as an offset into the vs_tpg[] arr...
ReadNextFunctionHandle(mat_t *mat, matvar_t *matvar) { int err; size_t nelems = 1; err = SafeMulDims(matvar, &nelems); matvar->data_size = sizeof(matvar_t *); err |= SafeMul(&matvar->nbytes, nelems, matvar->data_size); if ( err ) return 0; matvar->data = malloc(matvar->nbytes); ...
0
[ "CWE-190", "CWE-401" ]
matio
5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606
30,236,150,576,142,420,000,000,000,000,000,000,000
24
Fix integer addition overflow As reported by https://github.com/tbeu/matio/issues/121
**/ T& operator()(const unsigned int x, const unsigned int y, const unsigned int z, const unsigned int c, const ulongT wh, const ulongT whd=0) { cimg::unused(wh,whd); return (*this)(x,y,z,c);
0
[ "CWE-125" ]
CImg
10af1e8c1ad2a58a0a3342a856bae63e8f257abb
151,421,008,646,563,500,000,000,000,000,000,000,000
5
Fix other issues in 'CImg<T>::load_bmp()'.
int ssl3_write_pending(SSL *s, int type, const unsigned char *buf, unsigned int len) { int i; SSL3_BUFFER *wb = &(s->s3->wbuf); /* XXXX */ if ((s->s3->wpend_tot > (int)len) || ((s->s3->wpend_buf != buf) && !(s->mode & SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER)) ...
0
[ "CWE-17" ]
openssl
77c77f0a1b9f15b869ca3342186dfbedd1119d0e
275,526,522,545,930,300,000,000,000,000,000,000,000
45
Multiblock corrupted pointer fix OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This feature only applies on 64 bit x86 architecture platforms that support AES NI instructions. A defect in the implementation of "multiblock" can cause OpenSSL's internal write buffer to become incorrectly set to NULL...
save_image (const gchar *filename, gint32 image_ID, gint32 drawable_ID, GError **error) { g_message ("Saving not implemented yet"); return FALSE; }
0
[ "CWE-787" ]
gimp
48ec15890e1751dede061f6d1f469b6508c13439
312,416,511,491,547,100,000,000,000,000,000,000,000
9
file-psp: fix for bogus input data. Fixes bug #639203
static __cold int io_sq_offload_create(struct io_ring_ctx *ctx, struct io_uring_params *p) { int ret; /* Retain compatibility with failing for an invalid attach attempt */ if ((ctx->flags & (IORING_SETUP_ATTACH_WQ | IORING_SETUP_SQPOLL)) == IORING_SETUP_ATTACH_WQ) { struct fd f; f = fdget(p->wq...
0
[ "CWE-416" ]
linux
e677edbcabee849bfdd43f1602bccbecf736a646
109,152,554,091,015,780,000,000,000,000,000,000,000
89
io_uring: fix race between timeout flush and removal io_flush_timeouts() assumes the timeout isn't in progress of triggering or being removed/canceled, so it unconditionally removes it from the timeout list and attempts to cancel it. Leave it on the list and let the normal timeout cancelation take care of it. Cc: st...
static int php_iconv_stream_filter_append_bucket( php_iconv_stream_filter *self, php_stream *stream, php_stream_filter *filter, php_stream_bucket_brigade *buckets_out, const char *ps, size_t buf_len, size_t *consumed, int persistent) { php_stream_bucket *new_bucket; char *out_buf = NULL; size_t out_buf_siz...
0
[ "CWE-125" ]
php-src
7cf7148a8f8f4f55fb04de2a517d740bb6253eac
5,608,409,767,806,426,000,000,000,000,000,000,000
208
Fix bug #78069 - Out-of-bounds read in iconv.c:_php_iconv_mime_decode() due to integer overflow
PHP_FUNCTION(imagecreate) { long x_size, y_size; gdImagePtr im; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ll", &x_size, &y_size) == FAILURE) { return; } if (x_size <= 0 || y_size <= 0 || x_size >= INT_MAX || y_size >= INT_MAX) { php_error_docref(NULL TSRMLS_CC, E_WARNING, "Invalid image dimension...
0
[ "CWE-703", "CWE-189" ]
php-src
2938329ce19cb8c4197dec146c3ec887c6f61d01
43,696,924,350,741,490,000,000,000,000,000,000,000
22
Fixed bug #66356 (Heap Overflow Vulnerability in imagecrop()) And also fixed the bug: arguments are altered after some calls
*/ int register_netdev(struct net_device *dev) { int err; if (rtnl_lock_killable()) return -EINTR; err = register_netdevice(dev); rtnl_unlock(); return err;
0
[ "CWE-416" ]
linux
a4270d6795b0580287453ea55974d948393e66ef
268,682,229,120,321,500,000,000,000,000,000,000,000
10
net-gro: fix use-after-free read in napi_gro_frags() If a network driver provides to napi_gro_frags() an skb with a page fragment of exactly 14 bytes, the call to gro_pull_from_frag0() will 'consume' the fragment by calling skb_frag_unref(skb, 0), and the page might be freed and reused. Reading eth->h_proto at the en...
static void sas_discover_domain(struct work_struct *work) { struct domain_device *dev; int error = 0; struct sas_discovery_event *ev = to_sas_discovery_event(work); struct asd_sas_port *port = ev->port; clear_bit(DISCE_DISCOVER_DOMAIN, &port->disc.pending); if (port->port_dev) return; error = sas_get_port_d...
0
[ "CWE-476" ]
linux
f70267f379b5e5e11bdc5d72a56bf17e5feed01f
314,542,690,833,052,880,000,000,000,000,000,000,000
60
scsi: libsas: stop discovering if oob mode is disconnected The discovering of sas port is driven by workqueue in libsas. When libsas is processing port events or phy events in workqueue, new events may rise up and change the state of some structures such as asd_sas_phy. This may cause some problems such as follows: ...
nautilus_file_set_permissions (NautilusFile *file, guint32 new_permissions, NautilusFileOperationCallback callback, gpointer callback_data) { GFileInfo *info; GError *error; if (!nautilus_file_can_set_permissions (file)) { /* Claim that something changed even if the permission chang...
0
[]
nautilus
7632a3e13874a2c5e8988428ca913620a25df983
21,244,677,630,862,138,000,000,000,000,000,000,000
35
Check for trusted desktop file launchers. 2009-02-24 Alexander Larsson <alexl@redhat.com> * libnautilus-private/nautilus-directory-async.c: Check for trusted desktop file launchers. * libnautilus-private/nautilus-file-private.h: * libnautilus-private/nautilus-file.c: * libnautilus-...
TEST_F(QueryPlannerTest, IntersectElemMatch) { params.options = QueryPlannerParams::NO_TABLE_SCAN | QueryPlannerParams::INDEX_INTERSECTION; addIndex(BSON("a.b" << 1)); addIndex(BSON("a.c" << 1)); runQuery(fromjson("{a : {$elemMatch: {b:1, c:1}}}")); assertSolutionExists( "{fetch: {filter: {a...
0
[]
mongo
ee97c0699fd55b498310996ee002328e533681a3
320,964,980,053,163,160,000,000,000,000,000,000,000
11
SERVER-36993 Fix crash due to incorrect $or pushdown for indexed $expr.
static bool io_register_op_must_quiesce(int op) { switch (op) { case IORING_REGISTER_BUFFERS: case IORING_UNREGISTER_BUFFERS: case IORING_REGISTER_FILES: case IORING_UNREGISTER_FILES: case IORING_REGISTER_FILES_UPDATE: case IORING_REGISTER_PROBE: case IORING_REGISTER_PERSONALITY: case IORING_UNREGISTER_PERSON...
0
[ "CWE-125" ]
linux
89c2b3b74918200e46699338d7bcc19b1ea12110
78,795,314,303,364,820,000,000,000,000,000,000,000
22
io_uring: reexpand under-reexpanded iters [ 74.211232] BUG: KASAN: stack-out-of-bounds in iov_iter_revert+0x809/0x900 [ 74.212778] Read of size 8 at addr ffff888025dc78b8 by task syz-executor.0/828 [ 74.214756] CPU: 0 PID: 828 Comm: syz-executor.0 Not tainted 5.14.0-rc3-next-20210730 #1 [ 74.216525] Hardware n...
Formattable::setDouble(double d) { dispose(); fType = kDouble; fValue.fDouble = d; }
0
[ "CWE-190" ]
icu
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
25,138,677,024,186,845,000,000,000,000,000,000,000
6
ICU-20246 Fixing another integer overflow in number parsing.
int PCS2ITU(register const cmsUInt16Number In[], register cmsUInt16Number Out[], register void* Cargo) { cmsCIELab Lab; cmsLabEncoded2Float(&Lab, In); cmsDesaturateLab(&Lab, 85, -85, 125, -75); // This function does the necessary gamut remapping Lab2ITU(&Lab, Out); return TRUE; UTILS_UNUSED_PARA...
0
[]
Little-CMS
06d4557477e7ab3330a24d69af4c67adcac9acdf
22,665,857,770,647,160,000,000,000,000,000,000,000
11
utils/jpgicc/jpgicc.c: Fix fprintf parameter number
WandExport void DrawSetClipUnits(DrawingWand *wand, const ClipPathUnits clip_units) { assert(wand != (DrawingWand *) NULL); assert(wand->signature == MagickWandSignature); if (wand->debug != MagickFalse) (void) LogMagickEvent(WandEvent,GetMagickModule(),"%s",wand->name); if ((wand->filter_off != MagickFal...
0
[ "CWE-476" ]
ImageMagick
6ad5fc3c9b652eec27fc0b1a0817159f8547d5d9
96,223,194,873,559,200,000,000,000,000,000,000,000
27
https://github.com/ImageMagick/ImageMagick/issues/716
void Type_Measurement_Free(struct _cms_typehandler_struct* self, void* Ptr) { _cmsFree(self ->ContextID, Ptr); }
0
[]
Little-CMS
41d222df1bc6188131a8f46c32eab0a4d4cdf1b6
71,578,073,363,457,140,000,000,000,000,000,000,000
4
Memory squeezing fix: lcms2 cmsPipeline construction When creating a new pipeline, lcms would often try to allocate a stage and pass it to cmsPipelineInsertStage without checking whether the allocation succeeded. cmsPipelineInsertStage would then assert (or crash) if it had not. The fix here is to change cmsPipelineI...
bool extract_sockaddr(char *url, char **sockaddr_url, char **sockaddr_port) { char *url_begin, *url_end, *ipv6_begin, *ipv6_end, *port_start = NULL; char url_address[256], port[6]; int url_len, port_len = 0; *sockaddr_url = url; url_begin = strstr(url, "//"); if (!url_begin) url_begin = url; else url_begin ...
0
[ "CWE-119", "CWE-787" ]
cgminer
e1c5050734123973b99d181c45e74b2cbb00272e
24,800,190,001,463,534,000,000,000,000,000,000,000
49
Do some random sanity checking for stratum message parsing
day_to_ns(VALUE d) { return f_mul(d, day_in_nanoseconds); }
0
[]
date
3959accef8da5c128f8a8e2fd54e932a4fb253b0
86,547,987,986,076,430,000,000,000,000,000,000,000
4
Add length limit option for methods that parses date strings `Date.parse` now raises an ArgumentError when a given date string is longer than 128. You can configure the limit by giving `limit` keyword arguments like `Date.parse(str, limit: 1000)`. If you pass `limit: nil`, the limit is disabled. Not only `Date.parse`...
rx_queue_count(struct mlx5_rxq_data *rxq) { struct rxq_zip *zip = &rxq->zip; volatile struct mlx5_cqe *cqe; const unsigned int cqe_n = (1 << rxq->cqe_n); const unsigned int sges_n = (1 << rxq->sges_n); const unsigned int elts_n = (1 << rxq->elts_n); const unsigned int strd_n = RTE_BIT32(rxq->log_strd_num); const...
0
[]
dpdk
60b254e3923d007bcadbb8d410f95ad89a2f13fa
326,442,329,643,772,130,000,000,000,000,000,000,000
36
net/mlx5: fix Rx queue recovery mechanism The local variables are getting inconsistent in data receiving routines after queue error recovery. Receive queue consumer index is getting wrong, need to reset one to the size of the queue (as RQ was fully replenished in recovery procedure). In MPRQ case, also the local cons...
static int ZEND_FASTCALL ZEND_RETURN_SPEC_CONST_HANDLER(ZEND_OPCODE_HANDLER_ARGS) { zend_op *opline = EX(opline); zval *retval_ptr; zval **retval_ptr_ptr; if (EG(active_op_array)->return_reference == ZEND_RETURN_REF) { if (IS_CONST == IS_CONST || IS_CONST == IS_TMP_VAR) { /* Not supposed to happen, but we'...
0
[]
php-src
ce96fd6b0761d98353761bf78d5bfb55291179fd
219,177,505,469,514,800,000,000,000,000,000,000,000
79
- fix #39863, do not accept paths with NULL in them. See http://news.php.net/php.internals/50191, trunk will have the patch later (adding a macro and/or changing (some) APIs. Patch by Rasmus
ins_down( int startcol) // when TRUE move to Insstart.col { pos_T tpos; linenr_T old_topline = curwin->w_topline; #ifdef FEAT_DIFF int old_topfill = curwin->w_topfill; #endif undisplay_dollar(); tpos = curwin->w_cursor; if (cursor_down(1L, TRUE) == OK) { if (startcol) coladvance...
0
[]
vim
98a336dd497d3422e7efeef9f24cc9e25aeb8a49
139,517,121,434,861,620,000,000,000,000,000,000,000
29
patch 8.2.0133: invalid memory access with search command Problem: Invalid memory access with search command. Solution: When :normal runs out of characters in bracketed paste mode break out of the loop.(closes #5511)
inline uint8_t* WireFormatLite::WriteDoubleToArray( int field_number, const RepeatedField<double>& value, uint8_t* target) { return WritePrimitiveToArray(field_number, value, WriteDoubleToArray, target); }
0
[ "CWE-703" ]
protobuf
d1635e1496f51e0d5653d856211e8821bc47adc4
317,329,573,506,816,280,000,000,000,000,000,000,000
4
Apply patch
int ldb_match_msg(struct ldb_context *ldb, const struct ldb_message *msg, const struct ldb_parse_tree *tree, struct ldb_dn *base, enum ldb_scope scope) { bool matched; int ret; if ( ! ldb_match_scope(ldb, base, msg->dn, scope) ) { return 0; } ret = ldb_match_message(ldb, msg, tree, scope, &matc...
0
[ "CWE-189" ]
samba
ec504dbf69636a554add1f3d5703dd6c3ad450b8
53,112,552,518,686,830,000,000,000,000,000,000,000
21
CVE-2015-3223: lib: ldb: Cope with canonicalise_fn returning string "", length 0. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11325 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Ralph Boehme <slow@samba.org>
static int pfkey_send_migrate(const struct xfrm_selector *sel, u8 dir, u8 type, const struct xfrm_migrate *m, int num_bundles, const struct xfrm_kmaddress *k) { int i; int sasize_sel; int size = 0; int size_pol = 0; struct sk_buff *skb; struct sadb_msg *hdr; struct sadb_x_policy *pol; const st...
0
[]
linux
096f41d3a8fcbb8dde7f71379b1ca85fe213eded
208,678,437,282,559,600,000,000,000,000,000,000,000
109
af_key: Fix sadb_x_ipsecrequest parsing The parsing of sadb_x_ipsecrequest is broken in a number of ways. First of all we're not verifying sadb_x_ipsecrequest_len. This is needed when the structure carries addresses at the end. Worse we don't even look at the length when we parse those optional addresses. The migra...
irc_server_strcasecmp (struct t_irc_server *server, const char *string1, const char *string2) { int casemapping, rc; casemapping = (server) ? server->casemapping : IRC_SERVER_CASEMAPPING_RFC1459; switch (casemapping) { case IRC_SERVER_CASEMAPPING_RFC1459: rc =...
0
[ "CWE-120", "CWE-787" ]
weechat
40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
308,558,232,004,930,800,000,000,000,000,000,000,000
23
irc: fix crash when a new message 005 is received with longer nick prefixes Thanks to Stuart Nevans Locke for reporting the issue.
static struct mobj *alloc_ta_mem(size_t size) { #ifdef CFG_PAGED_USER_TA return mobj_paged_alloc(size); #else struct mobj *mobj = mobj_mm_alloc(mobj_sec_ddr, size, &tee_mm_sec_ddr); if (mobj) { size_t granularity = BIT(tee_mm_sec_ddr.shift); /* Round up to allocation granularity size */ memset(mobj_get_va(mo...
0
[ "CWE-703", "CWE-189" ]
optee_os
7e768f8a473409215fe3fff8f6e31f8a3a0103c6
253,440,491,689,457,600,000,000,000,000,000,000,000
16
core: clear the entire TA area Previously we cleared (memset to zero) the size corresponding to code and data segments, however the allocation for the TA is made on the granularity of the memory pool, meaning that we did not clear all memory and because of that we could potentially leak code and data of a previous loa...
static void hci_le_enh_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb) { struct hci_ev_le_enh_conn_complete *ev = (void *) skb->data; BT_DBG("%s status 0x%2.2x", hdev->name, ev->status); le_conn_complete_evt(hdev, ev->status, &ev->bdaddr, ev->bdaddr_type, ev->role, le16_to_cpu(ev->handle...
0
[ "CWE-290" ]
linux
3ca44c16b0dcc764b641ee4ac226909f5c421aa3
14,138,004,541,417,597,000,000,000,000,000,000,000
13
Bluetooth: Consolidate encryption handling in hci_encrypt_cfm This makes hci_encrypt_cfm calls hci_connect_cfm in case the connection state is BT_CONFIG so callers don't have to check the state. Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
STATIC SV* S__make_exactf_invlist(pTHX_ RExC_state_t *pRExC_state, regnode *node) { dVAR; const U8 * s = (U8*)STRING(node); SSize_t bytelen = STR_LEN(node); UV uc; /* Start out big enough for 2 separate code points */ SV* invlist = _new_invlist(4); PERL_ARGS_ASSERT__MAKE_EXACTF_INVLIST; ...
0
[ "CWE-190", "CWE-787" ]
perl5
897d1f7fd515b828e4b198d8b8bef76c6faf03ed
192,264,483,499,872,000,000,000,000,000,000,000,000
163
regcomp.c: Prevent integer overflow from nested regex quantifiers. (CVE-2020-10543) On 32bit systems the size calculations for nested regular expression quantifiers could overflow causing heap memory corruption. Fixes: Perl/perl5-security#125 (cherry picked from commit bfd31397db5dc1a5c5d3e0a1f753a4f89a736e71)
new_label(codegen_scope *s) { return s->lastlabel = s->pc; }
0
[ "CWE-415", "CWE-122" ]
mruby
38b164ace7d6ae1c367883a3d67d7f559783faad
38,663,038,145,576,404,000,000,000,000,000,000,000
4
codegen.c: fix a bug in `gen_values()`. - Fix limit handling that fails 15 arguments method calls. - Fix too early argument packing in arrays.
static int lstat_cache(struct cache_def *cache, const char *name, int len, int track_flags, int prefix_len_stat_func) { int flags; (void)lstat_cache_matchlen(cache, name, len, &flags, track_flags, prefix_len_stat_func); return flags; }
0
[ "CWE-59", "CWE-61" ]
git
684dd4c2b414bcf648505e74498a608f28de4592
117,855,778,376,140,780,000,000,000,000,000,000,000
8
checkout: fix bug that makes checkout follow symlinks in leading path Before checking out a file, we have to confirm that all of its leading components are real existing directories. And to reduce the number of lstat() calls in this process, we cache the last leading path known to contain only directories. However, wh...
u32toutf16 (c, s) u_bits32_t c; unsigned short *s; { int l; l = 0; if (c < 0x0d800) { s[0] = (unsigned short) (c & 0xFFFF); l = 1; } else if (c >= 0x0e000 && c <= 0x010ffff) { c -= 0x010000; s[0] = (unsigned short)((c >> 10) + 0xd800); s[1] = (unsigned short)...
0
[]
bash
863d31ae775d56b785dc5b0105b6d251515d81d5
262,168,089,615,348,660,000,000,000,000,000,000,000
22
commit bash-20120224 snapshot
char *uuid_string(char *buf, char *end, const u8 *addr, struct printf_spec spec, const char *fmt) { char uuid[UUID_STRING_LEN + 1]; char *p = uuid; int i; const u8 *index = uuid_index; bool uc = false; switch (*(++fmt)) { case 'L': uc = true; /* fall-through */ case 'l': index = guid_index; break; ...
0
[ "CWE-200" ]
linux
ad67b74d2469d9b82aaa572d76474c95bc484d57
283,773,767,375,054,360,000,000,000,000,000,000,000
39
printk: hash addresses printed with %p Currently there exist approximately 14 000 places in the kernel where addresses are being printed using an unadorned %p. This potentially leaks sensitive information regarding the Kernel layout in memory. Many of these calls are stale, instead of fixing every call lets hash the a...
QPDFObjectHandle::newDictionary( std::map<std::string, QPDFObjectHandle> const& items) { return QPDFObjectHandle(new QPDF_Dictionary(items)); }
0
[ "CWE-835" ]
qpdf
afe0242b263a9e1a8d51dd81e42ab6de2e5127eb
144,714,869,544,243,730,000,000,000,000,000,000,000
5
Handle object ID 0 (fixes #99) This is CVE-2017-9208. The QPDF library uses object ID 0 internally as a sentinel to represent a direct object, but prior to this fix, was not blocking handling of 0 0 obj or 0 0 R as a special case. Creating an object in the file with 0 0 obj could cause various infinite loops. The PDF...
static void ieee80211_if_setup(struct net_device *dev) { ether_setup(dev); dev->priv_flags &= ~IFF_TX_SKB_SHARING; dev->netdev_ops = &ieee80211_dataif_ops; dev->destructor = free_netdev; }
0
[ "CWE-703", "CWE-264" ]
linux
550fd08c2cebad61c548def135f67aba284c6162
45,203,907,469,150,390,000,000,000,000,000,000,000
7
net: Audit drivers to identify those needing IFF_TX_SKB_SHARING cleared After the last patch, We are left in a state in which only drivers calling ether_setup have IFF_TX_SKB_SHARING set (we assume that drivers touching real hardware call ether_setup for their net_devices and don't hold any state in their skbs. There...
xsltCompilePatternInternal(const xmlChar *pattern, xmlDocPtr doc, xmlNodePtr node, xsltStylesheetPtr style, xsltTransformContextPtr runtime, int novar) { xsltParserContextPtr ctxt = NULL; xsltCompMatchPtr element, first = NULL, previous = NULL; int current, start, end, level, j; if (pa...
0
[ "CWE-125" ]
libxslt
fe5a4fa33eb85bce3253ed3742b1ea6c4b59b41b
211,834,788,753,963,000,000,000,000,000,000,000,000
157
Fix some case of pattern parsing errors We could accidentally hit an off by one string array access due to improper loop exit when parsing patterns
void clear() { if (ctx_pktlen_) { EVP_CIPHER_CTX_cleanup(ctx_pktlen_); EVP_CIPHER_CTX_free(ctx_pktlen_); ctx_pktlen_ = nullptr; } if (ctx_main_) { EVP_CIPHER_CTX_cleanup(ctx_main_); EVP_CIPHER_CTX_free(ctx_main_); ctx_main_ = nullptr; } if (polykey_) { EVP...
0
[ "CWE-78" ]
ssh2
f763271f41320e71d5cbee02ea5bc6a2ded3ca21
89,015,908,398,044,900,000,000,000,000,000,000,000
22
examples,lib,test: switch to code rewrite For more information see: https://github.com/mscdex/ssh2/issues/935
R_API const char *r_bin_entry_type_string(int etype) { switch (etype) { case R_BIN_ENTRY_TYPE_PROGRAM: return "program"; case R_BIN_ENTRY_TYPE_MAIN: return "main"; case R_BIN_ENTRY_TYPE_INIT: return "init"; case R_BIN_ENTRY_TYPE_FINI: return "fini"; case R_BIN_ENTRY_TYPE_TLS: return "tls"; } return NU...
0
[ "CWE-125" ]
radare2
d31c4d3cbdbe01ea3ded16a584de94149ecd31d9
308,515,168,518,012,200,000,000,000,000,000,000,000
15
Fix #8748 - Fix oobread on string search
static CURLcode add_per_transfer(struct per_transfer **per) { struct per_transfer *p; p = calloc(sizeof(struct per_transfer), 1); if(!p) return CURLE_OUT_OF_MEMORY; if(!transfers) /* first entry */ transfersl = transfers = p; else { /* make the last node point to the new node */ transfersl...
0
[]
curl
8c7ee9083d0d719d0a77ab20d9cc2ae84eeea7f3
328,244,282,498,540,030,000,000,000,000,000,000,000
21
post_per_transfer: remove the updated file name When --remove-on-error is used with --no-clobber, it might have an updated file name to remove. Bug: https://curl.se/docs/CVE-2022-27778.html CVE-2022-27778 Reported-by: Harry Sintonen Closes #8824
static bool torture_smb2_notify_close(struct torture_context *torture, struct smb2_tree *tree1) { bool ret = true; NTSTATUS status; union smb_notify notify; union smb_open io; struct smb2_handle h1; struct smb2_request *req; smb2_deltree(tree1, BASEDIR_CNC); smb2_util_rmdir(tree1, BASEDIR_CNC); torture_c...
0
[ "CWE-266" ]
samba
22528b76ed6eb6251fdf01875aaa955480e7663d
226,565,731,282,711,470,000,000,000,000,000,000,000
64
s4: torture: Add smb2.notify.handle-permissions test. Add knownfail entry. CVE-2020-14318 BUG: https://bugzilla.samba.org/show_bug.cgi?id=14434 Signed-off-by: Jeremy Allison <jra@samba.org>
queue_list(int option, uschar **list, int count) { int i; int subcount; int now = (int)time(NULL); void *reset_point; queue_filename * qf = NULL; uschar subdirs[64]; /* If given a list of messages, build a chain containing their ids. */ if (count > 0) { queue_filename *last = NULL; for (i = 0; i < count; i++) ...
0
[ "CWE-78" ]
exim
7ea1237c783e380d7bdb86c90b13d8203c7ecf26
214,918,504,861,464,950,000,000,000,000,000,000,000
148
Events: raise msg:fail:internal & msg:complete for -Mrm. Bug 2310
static int console_puts(CharDriverState *chr, const uint8_t *buf, int len) { QemuConsole *s = chr->opaque; int i; s->update_x0 = s->width * FONT_WIDTH; s->update_y0 = s->height * FONT_HEIGHT; s->update_x1 = 0; s->update_y1 = 0; console_show_cursor(s, 0); for(i = 0; i < len; i++) { ...
0
[ "CWE-416" ]
qemu
a4afa548fc6dd9842ed86639b4d37d4d1c4ad480
23,398,522,601,132,030,000,000,000,000,000,000,000
21
char: move front end handlers in CharBackend Since the hanlders are associated with a CharBackend, rather than the CharDriverState, it is more appropriate to store in CharBackend. This avoids the handler copy dance in qemu_chr_fe_set_handlers() then mux_chr_update_read_handler(), by storing the CharBackend pointer dir...
Status AddOrExecuteNode(core::RefCountPtr<KernelAndDevice> kernel, EagerOperation* op, TensorHandle** retvals) { EagerExecutor& executor = op->Executor(); EagerContext& ctx = op->EagerContext(); GraphCollector* graph_collector = nullptr; if (ctx.ShouldStoreGraphs()) { graph_collector...
0
[ "CWE-476", "CWE-475" ]
tensorflow
a5b89cd68c02329d793356bda85d079e9e69b4e7
224,361,629,604,453,220,000,000,000,000,000,000,000
69
Fix empty resource handle vulnerability. Some ops that attempt to extract a resource handle from user input can lead to nullptr dereferences. This returns an error in such a case. PiperOrigin-RevId: 445571938
void free_pgtables(struct mmu_gather *tlb, struct vm_area_struct *vma, unsigned long floor, unsigned long ceiling) { while (vma) { struct vm_area_struct *next = vma->vm_next; unsigned long addr = vma->vm_start; /* * Hide vma from rmap and truncate_pagecache before freeing * pgtables */ unlink_anon_...
0
[ "CWE-119" ]
linux
1be7107fbe18eed3e319a6c3e83c78254b693acb
103,921,405,653,675,000,000,000,000,000,000,000,000
34
mm: larger stack guard gap, between vmas Stack guard page is a useful feature to reduce a risk of stack smashing into a different mapping. We have been using a single page gap which is sufficient to prevent having stack adjacent to a different mapping. But this seems to be insufficient in the light of the stack usage ...
bfuThreadEnd(J9HookInterface** vmHooks, UDATA eventNum, void* eventData, void* userData) { J9VMThread* vmThread = ((J9VMThreadDestroyEvent*)eventData)->vmThread; HANDLE event = (HANDLE) vmThread->sidecarEvent; if (event) { CloseHandle(event); vmThread->sidecarEvent = NULL; } }
0
[ "CWE-119" ]
openj9
0971f22d88f42cf7332364ad7430e9bd8681c970
28,256,047,249,742,580,000,000,000,000,000,000,000
10
Clean up jio_snprintf and jio_vfprintf Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659 Signed-off-by: Peter Bain <peter_bain@ca.ibm.com>
zsetstackprotect(i_ctx_t *i_ctx_p) { os_ptr op = osp; ref *ep = oparray_find(i_ctx_p); check_type(*op, t_boolean); if (ep == 0) return_error(gs_error_rangecheck); ep->value.opproc = (op->value.boolval ? oparray_cleanup : oparray_no_cleanup); pop(1); return 0; }
0
[]
ghostpdl
b575e1ec42cc86f6a58c603f2a88fcc2af699cc8
52,255,046,458,146,920,000,000,000,000,000,000,000
13
Bug 699668: handle stack overflow during error handling When handling a Postscript error, we push the object throwing the error onto the operand stack for the error handling procedure to access - we were not checking the available stack before doing so, thus causing a crash. Basically, if we get a stack overflow when...
GF_Err svhd_box_read(GF_Box *s, GF_BitStream *bs) { GF_SphericalVideoInfoBox *ptr = (GF_SphericalVideoInfoBox *)s; if ((u32)ptr->size >= (u32)0xFFFFFFFF) { GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Invalid size %llu in svhd box\n", ptr->size)); return GF_ISOM_INVALID_FILE; } ptr->string = gf_malloc(si...
0
[ "CWE-787" ]
gpac
77510778516803b7f7402d7423c6d6bef50254c3
338,266,827,642,087,350,000,000,000,000,000,000,000
13
fixed #2255
//! Access to pixel value with Dirichlet boundary conditions for the coordinate (\c pos) \const. T atN(const int pos, const int x, const int y, const int z, const int c, const T& out_value) const { return (pos<0 || pos>=width())?out_value:(*this)(pos,x,y,z,c);
0
[ "CWE-119", "CWE-787" ]
CImg
ac8003393569aba51048c9d67e1491559877b1d1
256,825,182,147,862,800,000,000,000,000,000,000,000
3
.
TEST_P(JSITest, RuntimeTest) { auto v = rt.evaluateJavaScript(std::make_unique<StringBuffer>("1"), ""); EXPECT_EQ(v.getNumber(), 1); rt.evaluateJavaScript(std::make_unique<StringBuffer>("x = 1"), ""); EXPECT_EQ(rt.global().getProperty(rt, "x").getNumber(), 1); }
0
[ "CWE-843", "CWE-125" ]
hermes
fe52854cdf6725c2eaa9e125995da76e6ceb27da
188,986,993,291,325,430,000,000,000,000,000,000,000
7
[CVE-2020-1911] Look up HostObject computed properties on the right object in the prototype chain. Summary: The change in the hermes repository fixes the security vulnerability CVE-2020-1911. This vulnerability only affects applications which allow evaluation of uncontrolled, untrusted JavaScript code not shipped wit...
static void reloc_gpu_flush(struct reloc_cache *cache) { GEM_BUG_ON(cache->rq_size >= cache->rq->batch->obj->base.size / sizeof(u32)); cache->rq_cmd[cache->rq_size] = MI_BATCH_BUFFER_END; i915_gem_object_unpin_map(cache->rq->batch->obj); i915_gem_chipset_flush(cache->rq->i915); i915_request_add(cache->rq); cache...
0
[ "CWE-20" ]
linux
594cc251fdd0d231d342d88b2fdff4bc42fb0690
292,838,649,982,946,800,000,000,000,000,000,000,000
10
make 'user_access_begin()' do 'access_ok()' Originally, the rule used to be that you'd have to do access_ok() separately, and then user_access_begin() before actually doing the direct (optimized) user access. But experience has shown that people then decide not to do access_ok() at all, and instead rely on it being i...
static void __exit vmx_exit(void) { free_page((unsigned long)vmx_msr_bitmap_legacy); free_page((unsigned long)vmx_msr_bitmap_longmode); free_page((unsigned long)vmx_io_bitmap_b); free_page((unsigned long)vmx_io_bitmap_a); kvm_exit(); }
0
[ "CWE-400" ]
linux-2.6
9581d442b9058d3699b4be568b6e5eae38a41493
249,301,687,782,990,740,000,000,000,000,000,000,000
9
KVM: Fix fs/gs reload oops with invalid ldt kvm reloads the host's fs and gs blindly, however the underlying segment descriptors may be invalid due to the user modifying the ldt after loading them. Fix by using the safe accessors (loadsegment() and load_gs_index()) instead of home grown unsafe versions. This is CVE-...
static inline struct xfrm_user_sec_ctx *pfkey_sadb2xfrm_user_sec_ctx(const struct sadb_x_sec_ctx *sec_ctx) { struct xfrm_user_sec_ctx *uctx = NULL; int ctx_size = sec_ctx->sadb_x_ctx_len; uctx = kmalloc((sizeof(*uctx)+ctx_size), GFP_KERNEL); if (!uctx) return NULL; uctx->len = pfkey_sec_ctx_len(sec_ctx); uct...
0
[ "CWE-20", "CWE-269" ]
linux
f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
247,270,638,925,864,400,000,000,000,000,000,000,000
20
net: rework recvmsg handler msg_name and msg_namelen logic This patch now always passes msg->msg_namelen as 0. recvmsg handlers must set msg_namelen to the proper size <= sizeof(struct sockaddr_storage) to return msg_name to the user. This prevents numerous uninitialized memory leaks we had in the recvmsg handlers an...
e1000e_read_ext_rx_descr(E1000ECore *core, uint8_t *desc, hwaddr *buff_addr) { union e1000_rx_desc_extended *d = (union e1000_rx_desc_extended *) desc; *buff_addr = le64_to_cpu(d->read.buffer_addr); }
0
[ "CWE-835" ]
qemu
4154c7e03fa55b4cf52509a83d50d6c09d743b77
146,591,598,677,450,300,000,000,000,000,000,000,000
5
net: e1000e: fix an infinite loop issue This issue is like the issue in e1000 network card addressed in this commit: e1000: eliminate infinite loops on out-of-bounds transfer start. Signed-off-by: Li Qiang <liqiang6-s@360.cn> Reviewed-by: Dmitry Fleytman <dmitry@daynix.com> Signed-off-by: Jason Wang <jasowang@redhat....
sv_viins_modestr (value) const char *value; { if (value && *value) { FREE (_rl_vi_ins_mode_str); _rl_vi_ins_mode_str = (char *)xmalloc (2 * strlen (value) + 1); rl_translate_keyseq (value, _rl_vi_ins_mode_str, &_rl_vi_ins_modestr_len); _rl_vi_ins_mode_str[_rl_vi_ins_modestr_len] = '\0...
0
[]
bash
955543877583837c85470f7fb8a97b7aa8d45e6c
332,050,845,633,440,250,000,000,000,000,000,000,000
27
bash-4.4-rc2 release
void do_copy_file(struct st_command *command) { int error; static DYNAMIC_STRING ds_from_file; static DYNAMIC_STRING ds_to_file; const struct command_arg copy_file_args[] = { { "from_file", ARG_STRING, TRUE, &ds_from_file, "Filename to copy from" }, { "to_file", ARG_STRING, TRUE, &ds_to_file, "Filename ...
0
[]
server
01b39b7b0730102b88d8ea43ec719a75e9316a1e
107,763,961,908,082,850,000,000,000,000,000,000,000
25
mysqltest: don't eat new lines in --exec pass them through as is
struct sock *sk_alloc(struct net *net, int family, gfp_t priority, struct proto *prot) { struct sock *sk; sk = sk_prot_alloc(prot, priority | __GFP_ZERO, family); if (sk) { sk->sk_family = family; /* * See comment in struct sock definition to understand * why we need sk_prot_creator -acme */ ...
0
[ "CWE-284", "CWE-264" ]
linux
3e10986d1d698140747fcfc2761ec9cb64c1d582
20,413,334,506,518,680,000,000,000,000,000,000,000
23
net: guard tcp_set_keepalive() to tcp sockets Its possible to use RAW sockets to get a crash in tcp_set_keepalive() / sk_reset_timer() Fix is to make sure socket is a SOCK_STREAM one. Reported-by: Dave Jones <davej@redhat.com> Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@da...
gdm_session_reset (GdmSession *self) { if (self->priv->user_verifier_interface != NULL) { gdm_dbus_user_verifier_emit_reset (self->priv->user_verifier_interface); } do_reset (self); }
0
[]
gdm
5ac224602f1d603aac5eaa72e1760d3e33a26f0a
104,021,718,596,877,020,000,000,000,000,000,000,000
8
session: disconnect signals from worker proxy when conversation is freed We don't want an outstanding reference on the worker proxy to lead to signal handlers getting dispatched after the conversation is freed. https://bugzilla.gnome.org/show_bug.cgi?id=758032
gnutls_handshake (gnutls_session_t session) { int ret; if ((ret = _gnutls_handshake_hash_init (session)) < 0) { gnutls_assert (); return ret; } if (session->security_parameters.entity == GNUTLS_CLIENT) { ret = _gnutls_handshake_client (session); } else { ret = _gnut...
0
[ "CWE-189" ]
gnutls
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
95,372,876,226,441,160,000,000,000,000,000,000,000
46
Fix GNUTLS-SA-2008-1 security vulnerabilities. See http://www.gnu.org/software/gnutls/security.html for updates.
struct asn1_data *asn1_init(TALLOC_CTX *mem_ctx) { struct asn1_data *ret = talloc_zero(mem_ctx, struct asn1_data); if (ret == NULL) { DEBUG(0,("asn1_init failed! out of memory\n")); } return ret; }
0
[ "CWE-399" ]
samba
9d989c9dd7a5b92d0c5d65287935471b83b6e884
52,597,110,707,779,870,000,000,000,000,000,000,000
8
CVE-2015-7540: lib: util: Check *every* asn1 return call and early return. BUG: https://bugzilla.samba.org/show_bug.cgi?id=9187 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <Volker.Lendecke@SerNet.DE> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Fri Sep...
static BYTE get_bmf_bpp(UINT32 bmf, BOOL* pValid) { if (pValid) *pValid = TRUE; switch (bmf) { case 1: return 1; case 3: return 8; case 4: return 16; case 5: return 24; case 6: return 32; default: WLog_WARN(TAG, "Invalid bmf %" PRIu32, bmf); if (pValid) *pValid = FALSE; retu...
0
[ "CWE-125" ]
FreeRDP
b8beb55913471952f92770c90c372139d78c16c0
138,189,390,021,173,400,000,000,000,000,000,000,000
23
Fixed OOB read in update_read_cache_bitmap_v3_order CVE-2020-11096 thanks @antonio-morales for finding this.
mrb_closure_new(mrb_state *mrb, const mrb_irep *irep) { struct RProc *p = mrb_proc_new(mrb, irep); closure_setup(mrb, p); return p; }
0
[ "CWE-476", "CWE-190" ]
mruby
f5e10c5a79a17939af763b1dcf5232ce47e24a34
131,137,726,325,720,640,000,000,000,000,000,000,000
7
proc.c: add `mrb_state` argument to `mrb_proc_copy()`. The function may invoke the garbage collection and it requires `mrb_state` to run.
void AuthorizationManagerImpl::_invalidateUserCache_inlock() { _updateCacheGeneration_inlock(); for (stdx::unordered_map<UserName, User*>::iterator it = _userCache.begin(); it != _userCache.end(); ++it) { fassert(17266, it->second != internalSecurity.user); it->second->invalida...
0
[ "CWE-613" ]
mongo
6dfb92b1299de04677d0bd2230e89a52eb01003c
141,883,593,254,408,500,000,000,000,000,000,000,000
13
SERVER-38984 Validate unique User ID on UserCache hit (cherry picked from commit e55d6e2292e5dbe2f97153251d8193d1cc89f5d7)
ebews_set_anniversary (ESoapMessage *message, EContact *contact) { }
0
[ "CWE-295" ]
evolution-ews
915226eca9454b8b3e5adb6f2fff9698451778de
266,360,229,752,519,030,000,000,000,000,000,000,000
5
I#27 - SSL Certificates are not validated This depends on https://gitlab.gnome.org/GNOME/evolution-data-server/commit/6672b8236139bd6ef41ecb915f4c72e2a052dba5 too. Closes https://gitlab.gnome.org/GNOME/evolution-ews/issues/27
void __inet6_csk_dst_store(struct sock *sk, struct dst_entry *dst, const struct in6_addr *daddr, const struct in6_addr *saddr) { __ip6_dst_store(sk, dst, daddr, saddr); }
0
[ "CWE-416", "CWE-284", "CWE-264" ]
linux
45f6fad84cc305103b28d73482b344d7f5b76f39
54,993,790,996,427,390,000,000,000,000,000,000,000
6
ipv6: add complete rcu protection around np->opt This patch addresses multiple problems : UDP/RAW sendmsg() need to get a stable struct ipv6_txoptions while socket is not locked : Other threads can change np->opt concurrently. Dmitry posted a syzkaller (http://github.com/google/syzkaller) program desmonstrating use-a...
static int cmp_name(const void *name, const void *sym) { return strcmp(name, kernel_symbol_name(sym)); }
0
[ "CWE-362", "CWE-347" ]
linux
0c18f29aae7ce3dadd26d8ee3505d07cc982df75
324,707,863,653,229,240,000,000,000,000,000,000,000
4
module: limit enabling module.sig_enforce Irrespective as to whether CONFIG_MODULE_SIG is configured, specifying "module.sig_enforce=1" on the boot command line sets "sig_enforce". Only allow "sig_enforce" to be set when CONFIG_MODULE_SIG is configured. This patch makes the presence of /sys/module/module/parameters/s...
camel_pop3_store_cache_has (CamelPOP3Store *store, const gchar *uid) { CamelStream *stream; gboolean uid_is_cached; g_return_val_if_fail (CAMEL_IS_POP3_STORE (store), FALSE); g_return_val_if_fail (uid != NULL, FALSE); stream = camel_pop3_store_cache_get (store, uid, NULL); uid_is_cac...
0
[ "CWE-74" ]
evolution-data-server
ba82be72cfd427b5d72ff21f929b3a6d8529c4df
212,745,253,923,680,370,000,000,000,000,000,000,000
15
I#226 - CVE-2020-14928: Response Injection via STARTTLS in SMTP and POP3 Closes https://gitlab.gnome.org/GNOME/evolution-data-server/-/issues/226
setup_rt_frame(int sig, struct k_sigaction *ka, siginfo_t *info, sigset_t *set, struct pt_regs *regs) { int usig = signr_convert(sig); int ret; /* Set up the stack frame */ if (is_ia32) { if (ka->sa.sa_flags & SA_SIGINFO) ret = ia32_setup_rt_frame(usig, ka, info, set, regs); else ret = ia32_setup...
0
[ "CWE-400" ]
linux-stable-rt
bcf6b1d78c0bde228929c388978ed3af9a623463
114,993,035,677,060,600,000,000,000,000,000,000,000
22
signal/x86: Delay calling signals in atomic On x86_64 we must disable preemption before we enable interrupts for stack faults, int3 and debugging, because the current task is using a per CPU debug stack defined by the IST. If we schedule out, another task can come in and use the same stack and cause the stack to be co...
CtPtr ProtocolV2::write(const std::string &desc, CONTINUATION_TYPE<ProtocolV2> &next, F &frame) { ceph::bufferlist bl; try { bl = frame.get_buffer(session_stream_handlers); } catch (ceph::crypto::onwire::TxHandlerError &e) { ldout(cct, 1) << __func__ << " " ...
0
[ "CWE-323" ]
ceph
20b7bb685c5ea74c651ca1ea547ac66b0fee7035
259,904,580,120,779,650,000,000,000,000,000,000,000
12
msg/async/ProtocolV2: avoid AES-GCM nonce reuse vulnerabilities The secure mode uses AES-128-GCM with 96-bit nonces consisting of a 32-bit counter followed by a 64-bit salt. The counter is incremented after processing each frame, the salt is fixed for the duration of the session. Both are initialized from the sessio...
void jslReset() { jslSeekTo(0); }
0
[ "CWE-787" ]
Espruino
bed844f109b6c222816740555068de2e101e8018
251,099,230,912,361,700,000,000,000,000,000,000,000
3
remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426)
void makeNullEqualityBounds(const IndexEntry& index, bool isHashed, OrderedIntervalList* oil, IndexBoundsBuilder::BoundsTightness* tightnessOut) { // An equality to null predicate cannot be covered because the index does not disting...
0
[ "CWE-754" ]
mongo
f8f55e1825ee5c7bdb3208fc7c5b54321d172732
317,160,364,427,720,500,000,000,000,000,000,000,000
17
SERVER-44377 generate correct plan for indexed inequalities to null
ossl_asn1_tag(VALUE obj) { VALUE tag; tag = ossl_asn1_get_tag(obj); if(NIL_P(tag)) ossl_raise(eASN1Error, "tag number not specified"); return NUM2INT(tag); }
0
[ "CWE-119" ]
openssl
1648afef33c1d97fb203c82291b8a61269e85d3b
105,653,701,329,750,840,000,000,000,000,000,000,000
10
asn1: fix out-of-bounds read in decoding constructed objects OpenSSL::ASN1.{decode,decode_all,traverse} have a bug of out-of-bounds read. int_ossl_asn1_decode0_cons() does not give the correct available length to ossl_asn1_decode() when decoding the inner components of a constructed object. This can cause out-of-bound...