func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
const char *v4l2_norm_to_name(v4l2_std_id id) { u32 myid = id; int i; /* HACK: ppc32 architecture doesn't have __ucmpdi2 function to handle 64 bit comparisons. So, on that architecture, with some gcc variants, compilation fails. Currently, the max value is 30bit wide. */ BUG_ON(myid != id); for (i = 0;...
0
[ "CWE-401" ]
linux
fb18802a338b36f675a388fc03d2aa504a0d0899
252,231,333,338,925,300,000,000,000,000,000,000,000
16
media: v4l: ioctl: Fix memory leak in video_usercopy When an IOCTL with argument size larger than 128 that also used array arguments were handled, two memory allocations were made but alas, only the latter one of them was released. This happened because there was only a single local variable to hold such a temporary a...
iakerb_tkt_creds_ctx(iakerb_ctx_id_t ctx, krb5_gss_cred_id_t cred, krb5_gss_name_t name, OM_uint32 time_req) { krb5_error_code code; krb5_creds creds; krb5_timestamp now; assert(cred->name != NULL); assert(cred->name->princ != NULL); ...
0
[ "CWE-18" ]
krb5
e04f0283516e80d2f93366e0d479d13c9b5c8c2a
42,035,248,858,740,880,000,000,000,000,000,000,000
44
Fix IAKERB context aliasing bugs [CVE-2015-2696] The IAKERB mechanism currently replaces its context handle with the krb5 mechanism handle upon establishment, under the assumption that most GSS functions are only called after context establishment. This assumption is incorrect, and can lead to aliasing violations for...
template<typename tc> CImg<T>& draw_point(const int x0, const int y0, const int z0, const tc *const color, const float opacity=1) { if (is_empty()) return *this; if (!color) throw CImgArgumentException(_cimg_instance "draw_point(): ...
0
[ "CWE-119", "CWE-787" ]
CImg
ac8003393569aba51048c9d67e1491559877b1d1
243,601,289,372,952,450,000,000,000,000,000,000,000
17
.
flatpak_deploy_init (FlatpakDeploy *self) { }
0
[ "CWE-668" ]
flatpak
cd2142888fc4c199723a0dfca1f15ea8788a5483
220,395,197,027,947,730,000,000,000,000,000,000,000
3
Don't expose /proc when running apply_extra As shown by CVE-2019-5736, it is sometimes possible for the sandbox app to access outside files using /proc/self/exe. This is not typically an issue for flatpak as the sandbox runs as the user which has no permissions to e.g. modify the host files. However, when installing ...
static char** read_string_array(lua_State *vm, int narg, int *len_out) { int len; char **buff; if(ntop_lua_check(vm, __FUNCTION__, narg, LUA_TTABLE)) { *len_out = 0; return(NULL); } len = lua_objlen(vm, narg); *len_out = len; buff = (char**)malloc(len*sizeof(char*)); if(!buff) { *len_out ...
0
[ "CWE-254" ]
ntopng
2e0620be3410f5e22c9aa47e261bc5a12be692c6
72,668,808,466,062,685,000,000,000,000,000,000,000
31
Added security fix to avoid escalating privileges to non-privileged users Many thanks to Dolev Farhi for reporting it
parse_subexp(Node** top, OnigToken* tok, int term, UChar** src, UChar* end, ScanEnv* env) { int r; Node *node, **headp; *top = NULL; env->parse_depth++; if (env->parse_depth > ParseDepthLimit) return ONIGERR_PARSE_DEPTH_LIMIT_OVER; r = parse_branch(&node, tok, term, src, end, env); if (r...
0
[ "CWE-476" ]
oniguruma
850bd9b0d8186eb1637722b46b12656814ab4ad2
156,143,419,138,029,850,000,000,000,000,000,000,000
49
fix #87: Read unknown address in onig_error_code_to_str()
Status AutoParallel::Optimize(Cluster* cluster, const GrapplerItem& item, GraphDef* output) { TF_RETURN_IF_ERROR(Initialize(item)); BuildGraph(output); return Status::OK(); }
0
[ "CWE-703", "CWE-908" ]
tensorflow
68867bf01239d9e1048f98cbad185bf4761bedd3
102,670,257,651,268,950,000,000,000,000,000,000,000
6
Prevent unitialized variable use in grappler. PiperOrigin-RevId: 399702928 Change-Id: Id7e75451fbff297692dfb687f60ea04b25c96b24
ins_up( int startcol) // when TRUE move to Insstart.col { pos_T tpos; linenr_T old_topline = curwin->w_topline; #ifdef FEAT_DIFF int old_topfill = curwin->w_topfill; #endif undisplay_dollar(); tpos = curwin->w_cursor; if (cursor_up(1L, TRUE) == OK) { if (startcol) coladvance(get...
0
[ "CWE-126", "CWE-787" ]
vim
e98c88c44c308edaea5994b8ad4363e65030968c
64,395,574,011,303,060,000,000,000,000,000,000,000
27
patch 9.0.0218: reading before the start of the line Problem: Reading before the start of the line. Solution: When displaying "$" check the column is not negative.
set_hunkmax (void) { if (!p_line) p_line = (char **) malloc (hunkmax * sizeof *p_line); if (!p_len) p_len = (size_t *) malloc (hunkmax * sizeof *p_len); if (!p_Char) p_Char = malloc (hunkmax * sizeof *p_Char); }
1
[ "CWE-399" ]
patch
0c08d7a902c6fdd49b704623a12d8d672ef18944
335,421,363,436,213,100,000,000,000,000,000,000,000
9
Fail when out of memory in set_hunkmax() src/pch.c (another_hunk): Call set_hunkmax() from here to make sure it is called even when falling back from plan A to plan B. (open_patch_file): No need to call set_hunkmax() anymore. src/pch.c (set_hunkmax): Fail when out of memory. Make static. src/pch.h: Remove set_hunkmax(...
c_valid_civil_p(int y, int m, int d, double sg, int *rm, int *rd, int *rjd, int *ns) { int ry; if (m < 0) m += 13; if (d < 0) { if (!c_find_ldom(y, m, sg, rjd, ns)) return 0; c_jd_to_civil(*rjd + d + 1, sg, &ry, rm, rd); if (ry != y || *rm != m) return 0; d = *rd; } c_civil_to_jd(y...
0
[]
date
3959accef8da5c128f8a8e2fd54e932a4fb253b0
308,416,194,122,185,850,000,000,000,000,000,000,000
21
Add length limit option for methods that parses date strings `Date.parse` now raises an ArgumentError when a given date string is longer than 128. You can configure the limit by giving `limit` keyword arguments like `Date.parse(str, limit: 1000)`. If you pass `limit: nil`, the limit is disabled. Not only `Date.parse`...
PJ_DEF(pj_status_t) pj_ssl_sock_start_recvfrom2 (pj_ssl_sock_t *ssock, pj_pool_t *pool, unsigned buff_size, void *readbuf[], pj_uint32_t flags) { PJ_UNUSED_ARG(ssock); PJ_UNUSED_ARG(pool); PJ_UNUSED_ARG(buff_size); PJ_UNUSED_ARG(readbuf); PJ_UNUSED_ARG(flags); return...
0
[ "CWE-362", "CWE-703" ]
pjproject
d5f95aa066f878b0aef6a64e60b61e8626e664cd
55,519,310,766,876,990,000,000,000,000,000,000,000
14
Merge pull request from GHSA-cv8x-p47p-99wr * - Avoid SSL socket parent/listener getting destroyed during handshake by increasing parent's reference count. - Add missing SSL socket close when the newly accepted SSL socket is discarded in SIP TLS transport. * - Fix silly mistake: accepted active socket created without...
static struct vrend_linked_shader_program *lookup_cs_shader_program(struct vrend_context *ctx, GLuint cs_id) { struct vrend_linked_shader_program *ent; LIST_FOR_EACH_ENTRY(ent, &ctx->sub->cs_programs, head) { if (ent->ss[PIPE_SHADER_COMPUTE...
0
[ "CWE-787" ]
virglrenderer
95e581fd181b213c2ed7cdc63f2abc03eaaa77ec
269,500,718,958,688,270,000,000,000,000,000,000,000
13
vrend: Add test to resource OOB write and fix it v2: Also check that no depth != 1 has been send when none is due Closes: #250 Signed-off-by: Gert Wollny <gert.wollny@collabora.com> Reviewed-by: Chia-I Wu <olvaffe@gmail.com>
static int vidioc_try_fmt_cap(struct file *file, void *priv, struct v4l2_format *fmt) { struct v4l2_loopback_device *dev; char buf[5]; dev = v4l2loopback_getdevice(file); if (0 == dev->ready_for_capture) { dprintk("setting fmt_cap not possible yet\n"); return -EBUSY; } if (fmt->fmt.pix.pixelformat != dev->...
0
[ "CWE-787" ]
v4l2loopback
64a216af4c09c9ba9326057d7e78994271827eff
47,846,417,826,378,810,000,000,000,000,000,000,000
21
add explicit format specifier to printf() invocations CWE-134
static int check_sock_access(struct bpf_verifier_env *env, u32 regno, int off, int size, enum bpf_access_type t) { struct bpf_reg_state *regs = cur_regs(env); struct bpf_reg_state *reg = &regs[regno]; struct bpf_insn_access_aux info; if (reg->smin_value < 0) { verbose(env, "R%d min value is negative, eit...
0
[ "CWE-703", "CWE-189" ]
linux
979d63d50c0c0f7bc537bf821e056cc9fe5abd38
300,678,287,511,038,220,000,000,000,000,000,000,000
21
bpf: prevent out of bounds speculation on pointer arithmetic Jann reported that the original commit back in b2157399cc98 ("bpf: prevent out-of-bounds speculation") was not sufficient to stop CPU from speculating out of bounds memory access: While b2157399cc98 only focussed on masking array map access for unprivileged ...
struct file_list *send_file_list(int f, int argc, char *argv[]) { static const char *lastdir; static int lastdir_len = -1; int len, dirlen; STRUCT_STAT st; char *p, *dir; struct file_list *flist; struct timeval start_tv, end_tv; int64 start_write; int use_ff_fd = 0; int disable_buffering, reenable_multiplex =...
0
[ "CWE-59" ]
rsync
962f8b90045ab331fc04c9e65f80f1a53e68243b
128,631,287,358,121,050,000,000,000,000,000,000,000
369
Complain if an inc-recursive path is not right for its dir. This ensures that a malicious sender can't use a just-sent symlink as a trasnfer path.
void CairoOutputDev::beginTransparencyGroup(GfxState * /*state*/, double * /*bbox*/, GfxColorSpace * blendingColorSpace, GBool /*isolated*/, GBool knockout, GBool forSoftMask) { /* push color space */ ColorSpaceStack* css = new Co...
0
[]
poppler
abf167af8b15e5f3b510275ce619e6fdb42edd40
12,986,880,276,537,710,000,000,000,000,000,000,000
48
Implement tiling/patterns in SplashOutputDev Fixes bug 13518
njs_generate_variable_wo_dest(njs_vm_t *vm, njs_generator_t *generator, njs_parser_node_t *node, njs_reference_type_t type, njs_variable_t **retvar) { njs_int_t ret; njs_parser_scope_t *scope; scope = njs_function_scope(node->scope); scope->dest_disable = 1; ret = njs_generate_vari...
0
[ "CWE-703", "CWE-754" ]
njs
404553896792b8f5f429dc8852d15784a59d8d3e
74,264,374,637,976,480,000,000,000,000,000,000,000
16
Fixed break instruction in a try-catch block. Previously, JUMP offset for a break instruction inside a try-catch block was not set to a correct offset during code generation when a return instruction was present in inner try-catch block. The fix is to update the JUMP offset appropriately. This closes #553 issue on G...
static int ahci_dma_prepare_buf(IDEDMA *dma, int is_write) { AHCIDevice *ad = DO_UPCAST(AHCIDevice, dma, dma); IDEState *s = &ad->port.ifs[0]; ahci_populate_sglist(ad, &s->sg, s->io_buffer_offset); s->io_buffer_size = s->sg.size; DPRINTF(ad->port_no, "len=%#x\n", s->io_buffer_size); return s->...
1
[ "CWE-399" ]
qemu
3251bdcf1c67427d964517053c3d185b46e618e8
30,651,433,325,661,710,000,000,000,000,000,000,000
11
ide: Correct handling of malformed/short PRDTs This impacts both BMDMA and AHCI HBA interfaces for IDE. Currently, we confuse the difference between a PRDT having "0 bytes" and a PRDT having "0 complete sectors." When we receive an incomplete sector, inconsistent error checking leads to an infinite loop wherein the c...
static int sctp_getsockopt_pr_streamstatus(struct sock *sk, int len, char __user *optval, int __user *optlen) { struct sctp_stream_out *streamout; struct sctp_association *asoc; struct sctp_prstatus params; int retval = -EINVAL; int policy; if (len < sizeof(params)) goto out; len = sizeof(par...
0
[ "CWE-416", "CWE-787" ]
linux
df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
218,977,113,512,326,940,000,000,000,000,000,000,000
54
sctp: do not peel off an assoc from one netns to another one Now when peeling off an association to the sock in another netns, all transports in this assoc are not to be rehashed and keep use the old key in hashtable. As a transport uses sk->net as the hash key to insert into hashtable, it would miss removing these t...
static inline int xattrs_differ(const char *fname, struct file_struct *file, stat_x *sxp) { if (preserve_xattrs) { if (!XATTR_READY(*sxp)) get_xattr(fname, sxp); if (xattr_diff(file, sxp, 0)) return 1; } return 0; }
0
[ "CWE-59" ]
rsync
e12a6c087ca1eecdb8eae5977be239c24f4dd3d9
173,685,715,853,996,240,000,000,000,000,000,000,000
11
Add parent-dir validation for --no-inc-recurse too.
static struct ip_sf_list *igmp_mcf_get_next(struct seq_file *seq, struct ip_sf_list *psf) { struct igmp_mcf_iter_state *state = igmp_mcf_seq_private(seq); psf = psf->sf_next; while (!psf) { spin_unlock_bh(&state->im->lock); state->im = state->im->next; while (!state->im) { state->dev = next_net_device_rcu(...
0
[ "CWE-362" ]
linux
23d2b94043ca8835bd1e67749020e839f396a1c2
292,729,088,899,764,630,000,000,000,000,000,000,000
27
igmp: Add ip_mc_list lock in ip_check_mc_rcu I got below panic when doing fuzz test: Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 4056 Comm: syz-executor.3 Tainted: G B 5.14.0-rc1-00195-gcff5c4254439-dirty #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9...
static int hid_scan_main(struct hid_parser *parser, struct hid_item *item) { __u32 data; int i; data = item_udata(item); switch (item->tag) { case HID_MAIN_ITEM_TAG_BEGIN_COLLECTION: hid_scan_collection(parser, data & 0xff); break; case HID_MAIN_ITEM_TAG_END_COLLECTION: break; case HID_MAIN_ITEM_TAG_INPU...
0
[ "CWE-125" ]
linux
50220dead1650609206efe91f0cc116132d59b3f
339,174,287,232,598,900,000,000,000,000,000,000,000
33
HID: core: prevent out-of-bound readings Plugging a Logitech DJ receiver with KASAN activated raises a bunch of out-of-bound readings. The fields are allocated up to MAX_USAGE, meaning that potentially, we do not have enough fields to fit the incoming values. Add checks and silence KASAN. Signed-off-by: Benjamin Tis...
ImagingConvert2(Imaging imOut, Imaging imIn) { return convert(imOut, imIn, imOut->mode, NULL, 0); }
0
[ "CWE-120" ]
Pillow
518ee3722a99d7f7d890db82a20bd81c1c0327fb
272,087,709,121,931,420,000,000,000,000,000,000,000
3
Use snprintf instead of sprintf
void Compute(OpKernelContext* ctx) override { const Tensor* inputs; const Tensor* seq_len; Tensor* log_prob = nullptr; OpOutputList decoded_indices; OpOutputList decoded_values; OpOutputList decoded_shape; OP_REQUIRES_OK(ctx, decode_helper_.ValidateInputsGenerateOutputs( ...
1
[ "CWE-617", "CWE-703" ]
tensorflow
ea3b43e98c32c97b35d52b4c66f9107452ca8fb2
4,567,149,156,074,682,700,000,000,000,000,000,000
68
Fix `tf.raw_ops.CTCGreedyDecoder` CHECK failure. PiperOrigin-RevId: 369960465 Change-Id: If0b8b3264d5a47a24ac0970ed7b81ce6b4921fae
cockpit_web_response_error (CockpitWebResponse *self, guint code, GHashTable *headers, const gchar *format, ...) { va_list var_args; gchar *reason = NULL; gchar *escaped = NULL; const gchar *message; ...
0
[ "CWE-1021" ]
cockpit
8d9bc10d8128aae03dfde62fd00075fe492ead10
246,987,058,272,131,750,000,000,000,000,000,000,000
113
common: Restrict frame embedding to same origin Declare `X-Frame-Options: sameorigin` [1] so that cockpit frames can only be embedded into pages coming from the same origin. This is similar to setting CORP in commit 2b38b8de92f9a (which applies to `<script>`, `<img>`, etc.). The main use case for embedding is to run ...
CImg<T>& xyYtoRGB(const bool use_D65=true) { return xyYtoXYZ().XYZtoRGB(use_D65); }
0
[ "CWE-770" ]
cimg
619cb58dd90b4e03ac68286c70ed98acbefd1c90
318,923,905,291,139,960,000,000,000,000,000,000,000
3
CImg<>::load_bmp() and CImg<>::load_pandore(): Check that dimensions encoded in file does not exceed file size.
bool SSL::isTLS() const { return secure_.get_connection().TLS_; }
0
[ "CWE-254" ]
mysql-server
e7061f7e5a96c66cb2e0bf46bec7f6ff35801a69
215,838,300,260,132,620,000,000,000,000,000,000,000
4
Bug #22738607: YASSL FUNCTION X509_NAME_GET_INDEX_BY_NID IS NOT WORKING AS EXPECTED.
XML_ExternalEntityParserCreate(XML_Parser oldParser, const XML_Char *context, const XML_Char *encodingName) { XML_Parser parser = oldParser; DTD *newDtd = NULL; DTD *oldDtd = _dtd; XML_StartElementHandler oldStartElementHandler = startElementHandler;...
0
[ "CWE-119" ]
libexpat
ba0f9c3b40c264b8dd392e02a7a060a8fa54f032
139,739,746,221,415,620,000,000,000,000,000,000,000
135
CVE-2015-1283 Sanity check size calculations. r=peterv, a=abillings https://sourceforge.net/p/expat/bugs/528/
directive_args(agooErr err, gqlDoc doc, gqlCobj obj, gqlField field, gqlSel sel, gqlValue result, int depth) { gqlDir d = (gqlDir)obj->ptr; const char *key = sel->name; gqlArg a; gqlValue list = gql_list_create(err, NULL); gqlValue co; struct _gqlField cf; struct _gqlCobj child = { .cla...
0
[ "CWE-703" ]
agoo
ecb72fa66f3d846b724b4fa1d7648669cebabe0c
323,048,346,253,643,570,000,000,000,000,000,000,000
32
Protect against recursive fragment in schema Really a error on the developers part but this catches the error.
static void prepare_dmar(struct dmar_drhd_rt *dmar_unit) { dev_dbg(DBG_LEVEL_IOMMU, "enable dmar uint [0x%x]", dmar_unit->drhd->reg_base_addr); dmar_setup_interrupt(dmar_unit); dmar_set_root_table(dmar_unit); dmar_enable_qi(dmar_unit); dmar_set_intr_remap_table(dmar_unit); }
0
[ "CWE-120", "CWE-787" ]
acrn-hypervisor
25c0e3817eb332660dd63d1d4522e63dcc94e79a
120,458,011,876,852,480,000,000,000,000,000,000,000
8
hv: validate input for dmar_free_irte function Malicious input 'index' may trigger buffer overflow on array 'irte_alloc_bitmap[]'. This patch validate that 'index' shall be less than 'CONFIG_MAX_IR_ENTRIES' and also remove unnecessary check on 'index' in 'ptirq_free_irte()' function with this fix. Tracked-On: ...
geoArray *geoArrayCreate(void) { geoArray *ga = zmalloc(sizeof(*ga)); /* It gets allocated on first geoArrayAppend() call. */ ga->array = NULL; ga->buckets = 0; ga->used = 0; return ga; }
0
[ "CWE-190" ]
redis
f6a40570fa63d5afdd596c78083d754081d80ae3
31,725,093,490,406,370,000,000,000,000,000,000,000
8
Fix ziplist and listpack overflows and truncations (CVE-2021-32627, CVE-2021-32628) - fix possible heap corruption in ziplist and listpack resulting by trying to allocate more than the maximum size of 4GB. - prevent ziplist (hash and zset) from reaching size of above 1GB, will be converted to HT encoding, that's n...
static int SetAltNamesFromDcert(Cert* cert, DecodedCert* decoded) { int ret = 0; cert->altNamesSz = 0; if (decoded->altNames) { ret = FlattenAltNames(cert->altNames, sizeof(cert->altNames), decoded->altNames); if (ret >= 0) { cert->altNamesSz = ret; ret =...
0
[ "CWE-125", "CWE-345" ]
wolfssl
f93083be72a3b3d956b52a7ec13f307a27b6e093
190,293,954,345,000,500,000,000,000,000,000,000,000
16
OCSP: improve handling of OCSP no check extension
Section* Binary::add_section(const Section& section) { SegmentCommand* _TEXT_segment = get_segment("__TEXT"); if (_TEXT_segment == nullptr) { LIEF_ERR("Unable to get '__TEXT' segment"); return nullptr; } return add_section(*_TEXT_segment, section); }
0
[ "CWE-703" ]
LIEF
7acf0bc4224081d4f425fcc8b2e361b95291d878
44,863,996,388,635,090,000,000,000,000,000,000,000
8
Resolve #764
*/ int dev_change_tx_queue_len(struct net_device *dev, unsigned long new_len) { unsigned int orig_len = dev->tx_queue_len; int res; if (new_len != (unsigned int)new_len) return -ERANGE; if (new_len != orig_len) { dev->tx_queue_len = new_len; res = call_netdevice_notifiers(NETDEV_CHANGE_TX_QUEUE_LEN, dev); ...
0
[ "CWE-416" ]
linux
a4270d6795b0580287453ea55974d948393e66ef
270,001,495,154,013,880,000,000,000,000,000,000,000
26
net-gro: fix use-after-free read in napi_gro_frags() If a network driver provides to napi_gro_frags() an skb with a page fragment of exactly 14 bytes, the call to gro_pull_from_frag0() will 'consume' the fragment by calling skb_frag_unref(skb, 0), and the page might be freed and reused. Reading eth->h_proto at the en...
void SSL_set_info_callback(SSL *ssl, void (*cb)(const SSL *ssl,int type,int val)) { ssl->info_callback=cb; }
0
[]
openssl
ee2ffc279417f15fef3b1073c7dc81a908991516
260,316,641,540,010,900,000,000,000,000,000,000,000
5
Add Next Protocol Negotiation.
pg_tzset(const char *name) { pg_tz_cache *tzp; struct state tzstate; char uppername[TZ_STRLEN_MAX + 1]; char canonname[TZ_STRLEN_MAX + 1]; char *p; if (strlen(name) > TZ_STRLEN_MAX) return NULL; /* not going to fit */ if (!timezone_cache) if (!init_timezone_hashtable()) return NULL; /* * Upca...
0
[ "CWE-119" ]
postgres
01824385aead50e557ca1af28640460fa9877d51
308,637,342,185,944,220,000,000,000,000,000,000,000
72
Prevent potential overruns of fixed-size buffers. Coverity identified a number of places in which it couldn't prove that a string being copied into a fixed-size buffer would fit. We believe that most, perhaps all of these are in fact safe, or are copying data that is coming from a trusted source so that any overrun i...
PosibErr<void> Config::replace(ParmStr key, ParmStr value) { Entry * entry = new Entry; entry->key = key; entry->value = value; return set(entry); }
0
[ "CWE-125" ]
aspell
80fa26c74279fced8d778351cff19d1d8f44fe4e
197,723,795,243,106,300,000,000,000,000,000,000,000
7
Fix various bugs found by OSS-Fuze.
RzAnalysisOp *op_cache_get(HtUP *cache, RzCore *core, ut64 addr) { RzAnalysisOp *op = ht_up_find(cache, addr, NULL); if (op) { return op; } op = rz_core_analysis_op(core, addr, RZ_ANALYSIS_OP_MASK_BASIC | RZ_ANALYSIS_OP_MASK_VAL); if (!ht_up_insert(cache, addr, op)) { rz_analysis_op_free(op); return NULL; }...
0
[ "CWE-703" ]
rizin
6ce71d8aa3dafe3cdb52d5d72ae8f4b95916f939
14,852,682,081,186,584,000,000,000,000,000,000,000
12
Initialize retctx,ctx before freeing the inner elements In rz_core_analysis_type_match retctx structure was initialized on the stack only after a "goto out_function", where a field of that structure was freed. When the goto path is taken, the field is not properly initialized and it cause cause a crash of Rizin or hav...
void OSD::handle_conf_change(const struct md_config_t *conf, const std::set <std::string> &changed) { if (changed.count("osd_max_backfills")) { service.local_reserver.set_max(cct->_conf->osd_max_backfills); service.remote_reserver.set_max(cct->_conf->osd_max_backfills); } if (changed.count("osd_mi...
0
[ "CWE-287", "CWE-284" ]
ceph
5ead97120e07054d80623dada90a5cc764c28468
113,910,617,770,504,750,000,000,000,000,000,000,000
83
auth/cephx: add authorizer challenge Allow the accepting side of a connection to reject an initial authorizer with a random challenge. The connecting side then has to respond with an updated authorizer proving they are able to decrypt the service's challenge and that the new authorizer was produced for this specific ...
void js_defproperty(js_State *J, int idx, const char *name, int atts) { jsR_defproperty(J, js_toobject(J, idx), name, atts, stackidx(J, -1), NULL, NULL); js_pop(J, 1); }
0
[ "CWE-476" ]
mujs
77ab465f1c394bb77f00966cd950650f3f53cb24
267,612,571,937,703,300,000,000,000,000,000,000,000
5
Fix 697401: Error when dropping extra arguments to lightweight functions.
static uint16_t alloc_irtes(struct dmar_drhd_rt *dmar_unit, const uint16_t num) { uint16_t irte_idx; uint64_t mask = (1UL << num) - 1U; uint64_t test_mask; ASSERT((bitmap_weight(num) == 1U) && (num <= 32U)); spinlock_obtain(&dmar_unit->lock); for (irte_idx = 0U; irte_idx < CONFIG_MAX_IR_ENTRIES; irte_idx += num...
0
[ "CWE-120", "CWE-787" ]
acrn-hypervisor
25c0e3817eb332660dd63d1d4522e63dcc94e79a
257,918,513,953,198,450,000,000,000,000,000,000,000
20
hv: validate input for dmar_free_irte function Malicious input 'index' may trigger buffer overflow on array 'irte_alloc_bitmap[]'. This patch validate that 'index' shall be less than 'CONFIG_MAX_IR_ENTRIES' and also remove unnecessary check on 'index' in 'ptirq_free_irte()' function with this fix. Tracked-On: ...
static char *parse_encoded_word(char *str, enum ContentEncoding *enc, char **charset, size_t *charsetlen, char **text, size_t *textlen) { static struct Regex *re = NULL; regmatch_t match[4]; size_t nmatch = 4; if (re == NULL) { re = mutt_regex_compile("=\\?" ...
0
[ "CWE-120", "CWE-119", "CWE-787" ]
neomutt
6f163e07ae68654d7ac5268cbb7565f6df79ad85
125,965,610,428,854,830,000,000,000,000,000,000,000
38
Check outbuf length in mutt_to_base64() The obuf can be overflowed in auth_cram.c, and possibly auth_gss.c. Thanks to Jeriko One for the bug report.
_pickle_Pickler___sizeof___impl(PicklerObject *self) /*[clinic end generated code: output=106edb3123f332e1 input=8cbbec9bd5540d42]*/ { Py_ssize_t res, s; res = _PyObject_SIZE(Py_TYPE(self)); if (self->memo != NULL) { res += sizeof(PyMemoTable); res += self->memo->mt_allocated * sizeof(PyMem...
0
[ "CWE-190", "CWE-369" ]
cpython
a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd
56,811,668,722,626,940,000,000,000,000,000,000,000
18
closes bpo-34656: Avoid relying on signed overflow in _pickle memos. (GH-9261)
MOBI_RET mobi_parse_rawml_opt(MOBIRawml *rawml, const MOBIData *m, bool parse_toc, bool parse_dict, bool reconstruct) { MOBI_RET ret; if (m == NULL) { debug_print("%s", "Mobi structure not initialized\n"); return MOBI_INIT_FAILED; } if (rawml == NULL) { return MOBI_INIT_FAIL...
0
[ "CWE-703", "CWE-125" ]
libmobi
fb1ab50e448ddbed746fd27ae07469bc506d838b
87,199,275,542,799,110,000,000,000,000,000,000,000
152
Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input
int enc_untrusted_sigprocmask(int how, const sigset_t *set, sigset_t *oldset) { klinux_sigset_t klinux_set; if (!TokLinuxSigset(set, &klinux_set)) { errno = EINVAL; return -1; } int klinux_how = TokLinuxSigMaskAction(how); if (klinux_how == -1) { errno = EINVAL; return -1; } MessageWrite...
0
[ "CWE-125" ]
asylo
b1d120a2c7d7446d2cc58d517e20a1b184b82200
1,062,303,577,550,947,000,000,000,000,000,000,000
39
Check for return size in enc_untrusted_read Check return size does not exceed requested. The returned result and content still cannot be trusted, but it's expected behavior when not using a secure file system. PiperOrigin-RevId: 333827386 Change-Id: I0bdec0aec9356ea333dc8c647eba5d2772875f29
static const EVP_MD *nid_to_evpmd(int nid) { switch (nid) { case NID_X9_62_prime256v1: return EVP_sha256(); case NID_secp384r1: return EVP_sha384(); case NID_secp521r1: return EVP_sha512(); default: return NULL; } return NULL; ...
0
[ "CWE-310" ]
libssh
e99246246b4061f7e71463f8806b9dcad65affa0
5,794,060,601,551,204,000,000,000,000,000,000,000
15
security: fix for vulnerability CVE-2014-0017 When accepting a new connection, a forking server based on libssh forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not g...
outputBits (int nBits, Int64 bits, Int64 &c, int &lc, char *&out) { c <<= nBits; lc += nBits; c |= bits; while (lc >= 8) *out++ = (c >> (lc -= 8)); }
0
[ "CWE-125" ]
openexr
e79d2296496a50826a15c667bf92bdc5a05518b4
281,129,906,196,380,000,000,000,000,000,000,000,000
10
fix memory leaks and invalid memory accesses Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
static int already_uses(struct module *a, struct module *b) { struct module_use *use; list_for_each_entry(use, &b->source_list, source_list) { if (use->source == a) { pr_debug("%s uses %s!\n", a->name, b->name); return 1; } } pr_debug("%s does not use %s!\n", a->name, b->name); return 0; }
0
[ "CWE-362", "CWE-347" ]
linux
0c18f29aae7ce3dadd26d8ee3505d07cc982df75
49,892,566,371,696,000,000,000,000,000,000,000,000
13
module: limit enabling module.sig_enforce Irrespective as to whether CONFIG_MODULE_SIG is configured, specifying "module.sig_enforce=1" on the boot command line sets "sig_enforce". Only allow "sig_enforce" to be set when CONFIG_MODULE_SIG is configured. This patch makes the presence of /sys/module/module/parameters/s...
GF_Box *tsro_box_new() { ISOM_DECL_BOX_ALLOC(GF_TimeOffHintEntryBox, GF_ISOM_BOX_TYPE_TSRO); return (GF_Box *)tmp; }
0
[ "CWE-787" ]
gpac
77510778516803b7f7402d7423c6d6bef50254c3
25,351,831,955,503,436,000,000,000,000,000,000,000
5
fixed #2255
//! Return specified range of image columns \inplace. CImg<T> get_columns(const int x0, const int x1) const { return get_crop(x0,0,0,0,x1,height() - 1,depth() - 1,spectrum() - 1);
0
[ "CWE-125" ]
CImg
10af1e8c1ad2a58a0a3342a856bae63e8f257abb
41,482,716,884,650,440,000,000,000,000,000,000,000
3
Fix other issues in 'CImg<T>::load_bmp()'.
int _q_unlink(const char *pathname) { #ifdef _WIN32 return _unlink(pathname); #endif return unlink(pathname); }
0
[ "CWE-94" ]
qdecoder
ce7c8a7ac450a823a11b06508ef1eb7441241f81
248,506,426,595,763,720,000,000,000,000,000,000,000
7
security update: add check on improperly encoded input
get_username(cupsd_client_t *con) /* I - Connection */ { ipp_attribute_t *attr; /* Attribute */ if (con->username[0]) return (con->username); else if ((attr = ippFindAttribute(con->request, "requesting-user-name", IPP_TAG_NAME)) != NULL) return (attr->values[0].strin...
0
[ "CWE-20" ]
cups
49fa4983f25b64ec29d548ffa3b9782426007df3
189,695,535,784,735,400,000,000,000,000,000,000,000
13
DBUS notifications could crash the scheduler (Issue #5143) - scheduler/ipp.c: Make sure requesting-user-name string is valid UTF-8.
static int hidpp20_battery_event(struct hidpp_device *hidpp, u8 *data, int size) { struct hidpp_report *report = (struct hidpp_report *)data; int status, capacity, next_capacity, level; bool changed; if (report->fap.feature_index != hidpp->battery.feature_index || report->fap.funcindex_clientid != EVENT_...
0
[ "CWE-787" ]
linux
d9d4b1e46d9543a82c23f6df03f4ad697dab361b
16,812,083,596,031,888,000,000,000,000,000,000,000
34
HID: Fix assumption that devices have inputs The syzbot fuzzer found a slab-out-of-bounds write bug in the hid-gaff driver. The problem is caused by the driver's assumption that the device must have an input report. While this will be true for all normal HID input devices, a suitably malicious device can violate the...
xcf_init (Gimp *gimp) { GimpPlugInProcedure *proc; GFile *file; GimpProcedure *procedure; g_return_if_fail (GIMP_IS_GIMP (gimp)); /* So this is sort of a hack, but its better than it was before. To * do this right there would be a file load-save handler type and * the whole interf...
0
[ "CWE-125" ]
gimp
702c4227e8b6169f781e4bb5ae4b5733f51ab126
35,012,588,253,195,755,000,000,000,000,000,000,000
155
790783 - buffer overread in XCF parser if version field... ...has no null terminator Check for the presence of '\0' before using atoi() on the version string. Patch slightly modified (mitch).
TEST_F(QueryPlannerTest, SortLimit) { // Negative limit indicates hard limit - see query_request.cpp runQuerySortProjSkipNToReturn(BSONObj(), fromjson("{a: 1}"), BSONObj(), 0, -3); assertNumSolutions(1U); assertSolutionExists( "{sort: {pattern: {a: 1}, limit: 3, node: {sortKeyGen: " "{no...
0
[]
mongo
ee97c0699fd55b498310996ee002328e533681a3
302,174,331,954,331,300,000,000,000,000,000,000,000
8
SERVER-36993 Fix crash due to incorrect $or pushdown for indexed $expr.
static inline void hid_map_usage_clear(struct hid_input *hidinput, struct hid_usage *usage, unsigned long **bit, int *max, __u8 type, __u16 c) { hid_map_usage(hidinput, usage, bit, max, type, c); clear_bit(c, *bit); }
1
[ "CWE-787" ]
linux
35556bed836f8dc07ac55f69c8d17dce3e7f0e25
251,215,353,331,880,040,000,000,000,000,000,000,000
7
HID: core: Sanitize event code and type when mapping input When calling into hid_map_usage(), the passed event code is blindly stored as is, even if it doesn't fit in the associated bitmap. This event code can come from a variety of sources, including devices masquerading as input devices, only a bit more "programmab...
static void ax_bump(struct mkiss *ax) { struct sk_buff *skb; int count; spin_lock_bh(&ax->buflock); if (ax->rbuff[0] > 0x0f) { if (ax->rbuff[0] & 0x80) { if (check_crc_16(ax->rbuff, ax->rcount) < 0) { ax->dev->stats.rx_errors++; spin_unlock_bh(&ax->buflock); return; } if (ax->crcmode != CRC...
0
[ "CWE-416" ]
linux
b2f37aead1b82a770c48b5d583f35ec22aabb61e
243,371,297,393,827,780,000,000,000,000,000,000,000
63
hamradio: improve the incomplete fix to avoid NPD The previous commit 3e0588c291d6 ("hamradio: defer ax25 kfree after unregister_netdev") reorder the kfree operations and unregister_netdev operation to prevent UAF. This commit improves the previous one by also deferring the nullify of the ax->tty pointer. Otherwise, ...
static void alg_do_release(const struct af_alg_type *type, void *private) { if (!type) return; type->release(private); module_put(type->owner); }
0
[ "CWE-416" ]
linux
9060cb719e61b685ec0102574e10337fa5f445ea
257,864,738,880,712,970,000,000,000,000,000,000,000
8
net: crypto set sk to NULL when af_alg_release. KASAN has found use-after-free in sockfs_setattr. The existed commit 6d8c50dcb029 ("socket: close race condition between sock_close() and sockfs_setattr()") is to fix this simillar issue, but it seems to ignore that crypto module forgets to set the sk to NULL after af_al...
*/ PHP_MINIT_FUNCTION(spl) { PHP_MINIT(spl_exceptions)(INIT_FUNC_ARGS_PASSTHRU); PHP_MINIT(spl_iterators)(INIT_FUNC_ARGS_PASSTHRU); PHP_MINIT(spl_array)(INIT_FUNC_ARGS_PASSTHRU); PHP_MINIT(spl_directory)(INIT_FUNC_ARGS_PASSTHRU); PHP_MINIT(spl_dllist)(INIT_FUNC_ARGS_PASSTHRU); PHP_MINIT(spl_heap)(INIT_FUNC_ARGS_...
0
[]
php-src
b584b513983319be170f02828bc7c12850b40320
331,999,189,977,317,540,000,000,000,000,000,000,000
13
Fixed bug #70290 (Null pointer deref (segfault) in spl_autoload via ob_start)
void read_coding_quadtree(thread_context* tctx, int x0, int y0, int log2CbSize, int ctDepth) { logtrace(LogSlice,"- read_coding_quadtree %d;%d cbsize:%d depth:%d POC:%d\n",x0,y0,1<<log2CbSize,ctDepth,tctx->img->PicOrderCntVal); de265_ima...
0
[]
libde265
e83f3798dd904aa579425c53020c67e03735138d
226,272,050,263,880,330,000,000,000,000,000,000,000
70
fix check for valid PPS idx (#298)
void IntegrationCodecClient::sendTrailers(Http::StreamEncoder& encoder, const Http::HeaderMap& trailers) { encoder.encodeTrailers(trailers); flushWrite(); }
0
[ "CWE-400", "CWE-703" ]
envoy
afc39bea36fd436e54262f150c009e8d72db5014
320,580,727,070,402,200,000,000,000,000,000,000,000
5
Track byteSize of HeaderMap internally. Introduces a cached byte size updated internally in HeaderMap. The value is stored as an optional, and is cleared whenever a non-const pointer or reference to a HeaderEntry is accessed. The cached value can be set with refreshByteSize() which performs an iteration over the Heade...
unhook_all () { int type; struct t_hook *ptr_hook, *next_hook; for (type = 0; type < HOOK_NUM_TYPES; type++) { ptr_hook = weechat_hooks[type]; while (ptr_hook) { next_hook = ptr_hook->next_hook; unhook (ptr_hook); ptr_hook = next_hook; ...
0
[ "CWE-20" ]
weechat
efb795c74fe954b9544074aafcebb1be4452b03a
11,720,487,959,191,864,000,000,000,000,000,000,000
16
core: do not call shell to execute command in hook_process (fix security problem when a plugin/script gives untrusted command) (bug #37764)
TEST_F(RouterTest, PoolFailureDueToConnectTimeout) { ON_CALL(callbacks_.route_->route_entry_, priority()) .WillByDefault(Return(Upstream::ResourcePriority::High)); EXPECT_CALL(cm_.thread_local_cluster_, httpConnPool(Upstream::ResourcePriority::High, _, &router_)); EXPECT_CALL(cm_.thread_local_...
0
[ "CWE-703" ]
envoy
5bf9b0f1e7f247a4eee7180849cb0823926f7fff
133,509,792,965,789,060,000,000,000,000,000,000,000
30
[1.21] CVE-2022-21655 Signed-off-by: Otto van der Schaaf <ovanders@redhat.com>
ieee80211_rx_h_action_return(struct ieee80211_rx_data *rx) { struct ieee80211_local *local = rx->local; struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *) rx->skb->data; struct sk_buff *nskb; struct ieee80211_sub_if_data *sdata = rx->sdata; struct ieee80211_rx_status *status = IEEE80211_SKB_RXCB(rx->skb); i...
0
[]
linux
588f7d39b3592a36fb7702ae3b8bdd9be4621e2f
60,382,045,643,779,780,000,000,000,000,000,000,000
61
mac80211: drop robust management frames from unknown TA When receiving a robust management frame, drop it if we don't have rx->sta since then we don't have a security association and thus couldn't possibly validate the frame. Cc: stable@vger.kernel.org Signed-off-by: Johannes Berg <johannes.berg@intel.com>
MOCK_IMPL(STATIC time_t, randomize_time,(time_t now, time_t max_backdate)) { tor_assert(max_backdate > 0); time_t earliest = now - max_backdate; time_t latest = now; if (earliest <= 0) earliest = 1; if (latest <= earliest) latest = earliest + 1; return crypto_rand_time_range(earliest, latest); }
0
[ "CWE-200" ]
tor
665baf5ed5c6186d973c46cdea165c0548027350
6,273,334,187,629,144,000,000,000,000,000,000,000
14
Consider the exit family when applying guard restrictions. When the new path selection logic went into place, I accidentally dropped the code that considered the _family_ of the exit node when deciding if the guard was usable, and we didn't catch that during code review. This patch makes the guard_restriction_t code ...
static int __remove_section(struct zone *zone, struct mem_section *ms) { /* * XXX: Freeing memmap with vmemmap is not implement yet. * This should be removed later. */ return -EBUSY; }
0
[]
linux-2.6
08dff7b7d629807dbb1f398c68dd9cd58dd657a1
120,791,200,170,496,600,000,000,000,000,000,000,000
8
mm/hotplug: correctly add new zone to all other nodes' zone lists When online_pages() is called to add new memory to an empty zone, it rebuilds all zone lists by calling build_all_zonelists(). But there's a bug which prevents the new zone to be added to other nodes' zone lists. online_pages() { build_all_zonelists(...
lyd_new_yangdata(const struct lys_module *module, const char *name_template, const char *name) { const struct lys_node *schema = NULL, *snode; if (!module || !name_template || !name) { LOGARG; return NULL; } schema = lyp_get_yang_data_template(module, name_template, strlen(name_templat...
0
[ "CWE-119" ]
libyang
32fb4993bc8bb49e93e84016af3c10ea53964be5
65,519,280,154,549,790,000,000,000,000,000,000,000
23
schema tree BUGFIX do not check features while still resolving schema Fixes #723
std::string help() const override { return "Adds a role to the system"; }
0
[ "CWE-613" ]
mongo
e55d6e2292e5dbe2f97153251d8193d1cc89f5d7
221,701,680,948,466,020,000,000,000,000,000,000,000
3
SERVER-38984 Validate unique User ID on UserCache hit
void md5_update(MD5CTX c, const void *data, unsigned long len) { EVP_DigestUpdate(c, data, len); }
0
[ "CWE-476" ]
libssh
b36272eac1b36982598c10de7af0a501582de07a
177,191,595,221,869,600,000,000,000,000,000,000,000
4
CVE-2020-1730: Fix a possible segfault when zeroing AES-CTR key Fixes T213 Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
virtual ~ExpectedResultBase() {}
0
[ "CWE-835" ]
mongo
0a076417d1d7fba3632b73349a1fd29a83e68816
340,067,152,319,676,060,000,000,000,000,000,000,000
1
SERVER-38070 fix infinite loop in agg expression
void json_tokener_reset(struct json_tokener *tok) { int i; if (!tok) return; for(i = tok->depth; i >= 0; i--) json_tokener_reset_level(tok, i); tok->depth = 0; tok->err = json_tokener_success; }
0
[ "CWE-119", "CWE-310" ]
json-c
64e36901a0614bf64a19bc3396469c66dcd0b015
179,445,907,806,056,680,000,000,000,000,000,000,000
11
Patch to address the following issues: * CVE-2013-6371: hash collision denial of service * CVE-2013-6370: buffer overflow if size_t is larger than int
void avahi_server_enumerate_aux_records(AvahiServer *s, AvahiInterface *i, AvahiRecord *r, void (*callback)(AvahiServer *s, AvahiRecord *r, int flush_cache, void* userdata), void* userdata) { assert(s); assert(i); assert(r); assert(callback); /* Call the specified callback far all records reference...
0
[ "CWE-399" ]
avahi
3093047f1aa36bed8a37fa79004bf0ee287929f4
294,964,401,481,877,300,000,000,000,000,000,000,000
19
Don't get confused by UDP packets with a source port that is zero This is a fix for rhbz 475394. Problem identified by Hugo Dias.
determine_versionability (struct cgraph_node *node, class ipa_node_params *info) { const char *reason = NULL; /* There are a number of generic reasons functions cannot be versioned. We also cannot remove parameters if there are type attributes such as fnspec present. */ if (node->alias || node->...
0
[ "CWE-20" ]
gcc
a09ccc22459c565814f79f96586fe4ad083fe4eb
338,130,583,500,935,580,000,000,000,000,000,000,000
65
Avoid segfault when doing IPA-VRP but not IPA-CP (PR 93015) 2019-12-21 Martin Jambor <mjambor@suse.cz> PR ipa/93015 * ipa-cp.c (ipcp_store_vr_results): Check that info exists testsuite/ * gcc.dg/lto/pr93015_0.c: New test. From-SVN: r279695
PHP_MSHUTDOWN_FUNCTION(openssl) { EVP_cleanup(); #if OPENSSL_VERSION_NUMBER >= 0x00090805f /* prevent accessing locking callback from unloaded extension */ CRYPTO_set_locking_callback(NULL); /* free allocated error strings */ ERR_free_strings(); #endif php_unregister_url_stream_wrapper("https" TSRMLS_CC); php_...
0
[ "CWE-754" ]
php-src
89637c6b41b510c20d262c17483f582f115c66d6
72,871,155,123,185,940,000,000,000,000,000,000,000
33
Fix bug #74651 - check EVP_SealInit as it can return -1
static enum_func_status php_mysqlnd_rowp_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC) { zend_uchar *p; enum_func_status ret = PASS; MYSQLND_PACKET_ROW *packet= (MYSQLND_PACKET_ROW *) _packet; size_t post_alloc_for_bit_fields = 0; size_t data_size = 0; DBG_ENTER("php_mysqlnd_rowp_read"); if (!packet...
0
[ "CWE-119", "CWE-787" ]
php-src
28f80baf3c53e267c9ce46a2a0fadbb981585132
214,642,112,435,050,150,000,000,000,000,000,000,000
87
Fix bug #72293 - Heap overflow in mysqlnd related to BIT fields
parse_reparse_posix(struct reparse_posix_data *symlink_buf, u32 plen, char **target_path, struct cifs_sb_info *cifs_sb) { unsigned int len; /* See MS-FSCC 2.1.2.6 for the 'NFS' style reparse tags */ len = le16_to_cpu(symlink_buf->ReparseDataLength); if (le64_to_cpu(symlink_buf->InodeType) != NFS_S...
0
[ "CWE-476" ]
linux
d6f5e358452479fa8a773b5c6ccc9e4ec5a20880
160,145,054,573,324,980,000,000,000,000,000,000,000
26
cifs: fix NULL ptr dereference in smb2_ioctl_query_info() When calling smb2_ioctl_query_info() with invalid smb_query_info::flags, a NULL ptr dereference is triggered when trying to kfree() uninitialised rqst[n].rq_iov array. This also fixes leaked paths that are created in SMB2_open_init() which required SMB2_open_f...
int print_deleg_lookup(RES* ssl, struct worker* worker, uint8_t* nm, size_t nmlen, int ATTR_UNUSED(nmlabs)) { /* deep links into the iterator module */ struct delegpt* dp; struct dns_msg* msg; struct regional* region = worker->scratchpad; char b[260]; struct query_info qinfo; struct iter_hints_stub* stub; regi...
1
[ "CWE-613", "CWE-703" ]
unbound
f6753a0f1018133df552347a199e0362fc1dac68
132,475,581,811,875,140,000,000,000,000,000,000,000
86
- Fix the novel ghost domain issues CVE-2022-30698 and CVE-2022-30699.
void HGraphBuilder::GenerateMathLog(CallRuntime* call) { ASSERT_EQ(1, call->arguments()->length()); CHECK_ALIVE(VisitArgumentList(call->arguments())); HValue* context = environment()->LookupContext(); HCallStub* result = new(zone()) HCallStub(context, CodeStub::TranscendentalCache, 1); result->set_trans...
0
[]
node
fd80a31e0697d6317ce8c2d289575399f4e06d21
185,227,124,565,499,550,000,000,000,000,000,000,000
10
deps: backport 5f836c from v8 upstream Original commit message: Fix Hydrogen bounds check elimination When combining bounds checks, they must all be moved before the first load/store that they are guarding. BUG=chromium:344186 LOG=y R=svenpanne@chromium.org Review URL: https://coderevie...
static int io_poll_add_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe) { struct io_poll_iocb *poll = &req->poll; u32 flags; if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL)) return -EINVAL; if (sqe->ioprio || sqe->buf_index || sqe->off || sqe->addr) return -EINVAL; flags = READ_ONCE(sqe->len); ...
0
[ "CWE-416" ]
linux
e677edbcabee849bfdd43f1602bccbecf736a646
329,052,985,388,963,940,000,000,000,000,000,000,000
19
io_uring: fix race between timeout flush and removal io_flush_timeouts() assumes the timeout isn't in progress of triggering or being removed/canceled, so it unconditionally removes it from the timeout list and attempts to cancel it. Leave it on the list and let the normal timeout cancelation take care of it. Cc: st...
inline U32 readOpaque32() { check(4); U32 r; ((U8*)&r)[0] = *ptr++; ((U8*)&r)[1] = *ptr++; ((U8*)&r)[2] = *ptr++; ((U8*)&r)[3] = *ptr++; return r; }
0
[ "CWE-20", "CWE-787" ]
tigervnc
0943c006c7d900dfc0281639e992791d6c567438
131,024,751,553,163,060,000,000,000,000,000,000,000
3
Use size_t for lengths in stream objects Provides safety against them accidentally becoming negative because of bugs in the calculations. Also does the same to CharArray and friends as they were strongly connection to the stream objects.
static void ps_mm_destroy(ps_mm *data) { int h; ps_sd *sd, *next; /* This function is called during each module shutdown, but we must not release the shared memory pool, when an Apache child dies! */ if (data->owner != getpid()) { return; } for (h = 0; h < data->hash_max + 1; h++) { for (sd = data->...
0
[ "CWE-264" ]
php-src
25e8fcc88fa20dc9d4c47184471003f436927cde
7,156,559,296,232,536,000,000,000,000,000,000,000
23
Strict session
mb_replace_pop_ins(int cc) { int n; char_u buf[MB_MAXBYTES + 1]; int i; int c; if (has_mbyte && (n = MB_BYTE2LEN(cc)) > 1) { buf[0] = cc; for (i = 1; i < n; ++i) buf[i] = replace_pop(); ins_bytes_len(buf, n); } else ins_char(cc); if (enc_utf8) // Handle composing chars...
0
[]
vim
98a336dd497d3422e7efeef9f24cc9e25aeb8a49
251,572,372,935,924,540,000,000,000,000,000,000,000
47
patch 8.2.0133: invalid memory access with search command Problem: Invalid memory access with search command. Solution: When :normal runs out of characters in bracketed paste mode break out of the loop.(closes #5511)
xmlValidatePushElement(xmlValidCtxtPtr ctxt, xmlDocPtr doc, xmlNodePtr elem, const xmlChar *qname) { int ret = 1; xmlElementPtr eDecl; int extsubset = 0; if (ctxt == NULL) return(0); /* printf("PushElem %s\n", qname); */ if ((ctxt->vstateNr > 0) && (ctxt->vstate != NU...
0
[ "CWE-416" ]
libxml2
652dd12a858989b14eed4e84e453059cd3ba340e
84,982,435,194,051,060,000,000,000,000,000,000,000
81
[CVE-2022-23308] Use-after-free of ID and IDREF attributes If a document is parsed with XML_PARSE_DTDVALID and without XML_PARSE_NOENT, the value of ID attributes has to be normalized after potentially expanding entities in xmlRemoveID. Otherwise, later calls to xmlGetID can return a pointer to previously freed memory...
PostgresMain(int argc, char *argv[], const char *dbname, const char *username) { int firstchar; StringInfoData input_message; sigjmp_buf local_sigjmp_buf; volatile bool send_ready_for_query = true; /* Initialize startup process environment if necessary. */ if (!IsUnderPostmaster) InitStandaloneProces...
0
[ "CWE-89" ]
postgres
2b3a8b20c2da9f39ffecae25ab7c66974fbc0d3b
186,300,637,815,117,600,000,000,000,000,000,000,000
722
Be more careful to not lose sync in the FE/BE protocol. If any error occurred while we were in the middle of reading a protocol message from the client, we could lose sync, and incorrectly try to interpret a part of another message as a new protocol message. That will usually lead to an "invalid frontend message" erro...
backref_match_at_nested_level(regex_t* reg, StackType* top, StackType* stk_base, int ignore_case, int case_fold_flag, int nest, int mem_num, MemNumType* memp, UChar** s, const UChar* send) { UChar *...
0
[ "CWE-125" ]
oniguruma
d3e402928b6eb3327f8f7d59a9edfa622fec557b
147,109,676,103,382,150,000,000,000,000,000,000,000
56
fix heap-buffer-overflow
static int unlink_urbs (struct usbnet *dev, struct sk_buff_head *q) { unsigned long flags; struct sk_buff *skb; int count = 0; spin_lock_irqsave (&q->lock, flags); while (!skb_queue_empty(q)) { struct skb_data *entry; struct urb *urb; int retval; skb_queue_walk(q, skb) { entry = (struct skb_da...
0
[ "CWE-703" ]
linux
1666984c8625b3db19a9abc298931d35ab7bc64b
110,769,967,628,184,280,000,000,000,000,000,000,000
44
usbnet: cleanup after bind() in probe() In case bind() works, but a later error forces bailing in probe() in error cases work and a timer may be scheduled. They must be killed. This fixes an error case related to the double free reported in http://www.spinics.net/lists/netdev/msg367669.html and needs to go on top of L...
static int io_register_enable_rings(struct io_ring_ctx *ctx) { if (!(ctx->flags & IORING_SETUP_R_DISABLED)) return -EBADFD; if (ctx->restrictions.registered) ctx->restricted = 1; io_sq_offload_start(ctx); return 0;
0
[ "CWE-667" ]
linux
3ebba796fa251d042be42b929a2d916ee5c34a49
257,579,878,806,346,370,000,000,000,000,000,000,000
11
io_uring: ensure that SQPOLL thread is started for exit If we create it in a disabled state because IORING_SETUP_R_DISABLED is set on ring creation, we need to ensure that we've kicked the thread if we're exiting before it's been explicitly disabled. Otherwise we can run into a deadlock where exit is waiting go park t...
PERL_STATIC_INLINE regnode_offset S_handle_named_backref(pTHX_ RExC_state_t *pRExC_state, I32 *flagp, char * parse_start, char ch ) { regnode_offset ret; char* name_start = RExC_parse; U32 num = 0; ...
0
[ "CWE-190", "CWE-787" ]
perl5
897d1f7fd515b828e4b198d8b8bef76c6faf03ed
323,505,587,434,031,700,000,000,000,000,000,000,000
44
regcomp.c: Prevent integer overflow from nested regex quantifiers. (CVE-2020-10543) On 32bit systems the size calculations for nested regular expression quantifiers could overflow causing heap memory corruption. Fixes: Perl/perl5-security#125 (cherry picked from commit bfd31397db5dc1a5c5d3e0a1f753a4f89a736e71)
int cgroup_migrate(struct task_struct *leader, bool threadgroup, struct cgroup_mgctx *mgctx) { struct task_struct *task; /* * Prevent freeing of tasks while we take a snapshot. Tasks that are * already PF_EXITING could be freed from underneath us unless we * take an rcu_read_lock. */ spin_lock_irq(&css...
0
[ "CWE-416" ]
linux
a06247c6804f1a7c86a2e5398a4c1f1db1471848
173,599,067,864,295,370,000,000,000,000,000,000,000
23
psi: Fix uaf issue when psi trigger is destroyed while being polled With write operation on psi files replacing old trigger with a new one, the lifetime of its waitqueue is totally arbitrary. Overwriting an existing trigger causes its waitqueue to be freed and pending poll() will stumble on trigger->event_wait which w...
static int emulator_cmpxchg_emulated(struct x86_emulate_ctxt *ctxt, unsigned long addr, const void *old, const void *new, unsigned int bytes, struct x86_exception *exception) { struct kvm_vcpu *vcpu = emul_to_vcpu(ctxt); u64 page_line_mask; unsigned long hva; gpa_t gpa; ...
0
[ "CWE-476" ]
linux
fee060cd52d69c114b62d1a2948ea9648b5131f9
185,122,673,807,582,670,000,000,000,000,000,000,000
72
KVM: x86: avoid calling x86 emulator without a decoded instruction Whenever x86_decode_emulated_instruction() detects a breakpoint, it returns the value that kvm_vcpu_check_breakpoint() writes into its pass-by-reference second argument. Unfortunately this is completely bogus because the expected outcome of x86_decode...
static int scsi_setup_flush_cmnd(struct scsi_device *sdp, struct request *rq) { rq->timeout = SD_FLUSH_TIMEOUT; rq->retries = SD_MAX_RETRIES; rq->cmd[0] = SYNCHRONIZE_CACHE; rq->cmd_len = 10; return scsi_setup_blk_pc_cmnd(sdp, rq); }
0
[ "CWE-284", "CWE-264" ]
linux
0bfc96cb77224736dfa35c3c555d37b3646ef35e
283,227,210,278,221,650,000,000,000,000,000,000,000
9
block: fail SCSI passthrough ioctls on partition devices Linux allows executing the SG_IO ioctl on a partition or LVM volume, and will pass the command to the underlying block device. This is well-known, but it is also a large security problem when (via Unix permissions, ACLs, SELinux or a combination thereof) a prog...
int STDCALL mysql_reset_connection(MYSQL *mysql) { int rc; /* check if connection handler is active */ if (IS_CONNHDLR_ACTIVE(mysql)) { if (mysql->extension->conn_hdlr->plugin && mysql->extension->conn_hdlr->plugin->reset) return(mysql->extension->conn_hdlr->plugin->reset(mysql)); } /* skip resu...
0
[]
mariadb-connector-c
27b2f3d1f1550dfaee0f63a331a406ab31c1b37e
275,860,702,094,216,640,000,000,000,000,000,000,000
37
various checks for corrupted packets in the protocol also: check the return value of unpack_fields()
static int io_close_prep(struct io_kiocb *req, const struct io_uring_sqe *sqe) { if (unlikely(req->ctx->flags & IORING_SETUP_IOPOLL)) return -EINVAL; if (sqe->ioprio || sqe->off || sqe->addr || sqe->len || sqe->rw_flags || sqe->buf_index) return -EINVAL; if (req->flags & REQ_F_FIXED_FILE) return -EBADF; ...
0
[ "CWE-416" ]
linux
e677edbcabee849bfdd43f1602bccbecf736a646
28,313,373,766,557,196,000,000,000,000,000,000,000
17
io_uring: fix race between timeout flush and removal io_flush_timeouts() assumes the timeout isn't in progress of triggering or being removed/canceled, so it unconditionally removes it from the timeout list and attempts to cancel it. Leave it on the list and let the normal timeout cancelation take care of it. Cc: st...
static int req_add_output_filter(lua_State *L) { request_rec *r = ap_lua_check_request_rec(L, 1); const char *name = luaL_checkstring(L, 2); ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(01485) "adding output filter %s", name); ap_add_output_filter(name, L, r, r->connection); ...
0
[ "CWE-20" ]
httpd
78eb3b9235515652ed141353d98c239237030410
108,633,717,268,169,530,000,000,000,000,000,000,000
9
*) SECURITY: CVE-2015-0228 (cve.mitre.org) mod_lua: A maliciously crafted websockets PING after a script calls r:wsupgrade() can cause a child process crash. [Edward Lu <Chaosed0 gmail.com>] Discovered by Guido Vranken <guidovranken gmail.com> Submitted by: Edward Lu Committed by: covener git-svn-id...
void TRI_InitV8ServerUtils(v8::Isolate* isolate) { TRI_AddGlobalFunctionVocbase( isolate, TRI_V8_ASCII_STRING(isolate, "SYS_CLUSTER_API_JWT_POLICY"), JS_ClusterApiJwtPolicy, true); TRI_AddGlobalFunctionVocbase( isolate, TRI_V8_ASCII_STRING(isolate, "SYS_IS_FOXX_API_DISABLED"), JS_IsFoxxApiDi...
1
[ "CWE-918" ]
arangodb
d7b35a6884c6b2802d34d79fb2a79fb2c9ec2175
72,503,858,120,705,610,000,000,000,000,000,000,000
58
[APM-78] Disable installation from remote URL (#15292) (#15343) * [APM-78] Disable installation from remote URL (#15292) * Update CHANGELOG * Fix clang-format Co-authored-by: Vadim <vadim@arangodb.com>
SProcXkbDispatch(ClientPtr client) { REQUEST(xReq); switch (stuff->data) { case X_kbUseExtension: return SProcXkbUseExtension(client); case X_kbSelectEvents: return SProcXkbSelectEvents(client); case X_kbBell: return SProcXkbBell(client); case X_kbGetState: return...
0
[ "CWE-191" ]
xserver
144849ea27230962227e62a943b399e2ab304787
9,585,537,264,703,475,000,000,000,000,000,000,000
60
Fix XkbSelectEvents() integer underflow CVE-2020-14361 ZDI-CAN 11573 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
QInt16() : value(0) {}
0
[ "CWE-908", "CWE-787" ]
tensorflow
ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2
96,234,882,407,118,850,000,000,000,000,000,000,000
1
Default initialize fixed point Eigen types. In certain cases, tensors are filled with default values of the type. But, for these fixed point types, these values were uninitialized. Thus, we would have uninitialized memory access bugs, some of which were caught by MSAN. PiperOrigin-RevId: 344101137 Change-Id: I14555fd...
overwrite_dialog_response_cb (GtkDialog *dialog, int response_id, gpointer user_data) { OverwriteData *odata = user_data; gboolean do_not_extract = FALSE; switch (response_id) { case _FR_RESPONSE_OVERWRITE_YES_ALL: odata->edata->overwrite = FR_OVERWRITE_YES; break; case _FR_R...
0
[ "CWE-22" ]
file-roller
b147281293a8307808475e102a14857055f81631
318,699,230,762,735,850,000,000,000,000,000,000,000
47
libarchive: sanitize filenames before extracting
void *mlx5_get_send_wqe(struct mlx5_ib_qp *qp, int n) { return get_wqe(qp, qp->sq.offset + (n << MLX5_IB_SQ_STRIDE)); }
0
[ "CWE-119", "CWE-787" ]
linux
0625b4ba1a5d4703c7fb01c497bd6c156908af00
185,891,827,052,147,800,000,000,000,000,000,000,000
4
IB/mlx5: Fix leaking stack memory to userspace mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes were written. Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp") Cc: <stable@vger.kernel.org> Acked-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Jason Gunthorpe <...
static int rsm_load_state_64(struct x86_emulate_ctxt *ctxt, u64 smbase) { struct desc_struct desc; struct desc_ptr dt; u64 val, cr0, cr4; u32 base3; u16 selector; int i, r; for (i = 0; i < 16; i++) *reg_write(ctxt, i) = GET_SMSTATE(u64, smbase, 0x7ff8 - i * 8); ctxt->_eip = GET_SMSTATE(u64, smbase, 0x7f78...
0
[ "CWE-284" ]
linux
33ab91103b3415e12457e3104f0e4517ce12d0f3
90,548,750,891,371,400,000,000,000,000,000,000,000
61
KVM: x86: fix emulation of "MOV SS, null selector" This is CVE-2017-2583. On Intel this causes a failed vmentry because SS's type is neither 3 nor 7 (even though the manual says this check is only done for usable SS, and the dmesg splat says that SS is unusable!). On AMD it's worse: svm.c is confused and sets CPL to ...