func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
getCharacters(FileInfo *file, CharsString *characters) { /* Get ruleChars string */ CharsString token; if (!getToken(file, &token, "characters")) return 0; return parseChars(file, characters, &token); }
0
[ "CWE-787" ]
liblouis
2e4772befb2b1c37cb4b9d6572945115ee28630a
191,167,099,419,753,550,000,000,000,000,000,000,000
6
Prevent an invalid memory writes in compileRule Thanks to Han Zheng for reporting it Fixes #1214
stub_callback(isc_task_t *task, isc_event_t *event) { const char me[] = "stub_callback"; dns_requestevent_t *revent = (dns_requestevent_t *)event; dns_stub_t *stub = NULL; dns_message_t *msg = NULL; dns_zone_t *zone = NULL; char master[ISC_SOCKADDR_FORMATSIZE]; char source[ISC_SOCKADDR_FORMATSIZE]; uint32_t nsc...
0
[ "CWE-327" ]
bind9
f09352d20a9d360e50683cd1d2fc52ccedcd77a0
169,655,409,138,470,560,000,000,000,000,000,000,000
257
Update keyfetch_done compute_tag check If in keyfetch_done the compute_tag fails (because for example the algorithm is not supported), don't crash, but instead ignore the key.
static int dissect_CPMSetBindings(tvbuff_t *tvb, packet_info *pinfo, proto_tree *parent_tree, gboolean in, void *private_data) { gint offset = 16; struct CPMSetBindingsIn request; col_append_str(pinfo->cinfo, COL_INFO, "SetBindings"); if (in) { struct mswsp_ct *ct = NULL; struct message_data *data = NULL; p...
0
[ "CWE-770" ]
wireshark
b7a0650e061b5418ab4a8f72c6e4b00317aff623
129,332,429,742,541,740,000,000,000,000,000,000,000
71
MS-WSP: Don't allocate huge amounts of memory. Add a couple of memory allocation sanity checks, one of which fixes #17331.
slapi_pblock_get_task_warning(Slapi_PBlock *pb) { #ifdef PBLOCK_ANALYTICS pblock_analytics_record(pb, SLAPI_TASK_WARNING); #endif if (pb->pb_task != NULL) { return pb->pb_task->task_warning; } return 0; }
0
[ "CWE-415" ]
389-ds-base
a3c298f8140d3e4fa1bd5a670f1bb965a21a9b7b
287,354,676,523,406,870,000,000,000,000,000,000,000
10
Issue 5218 - double-free of the virtual attribute context in persistent search (#5219) description: A search is processed by a worker using a private pblock. If the search is persistent, the worker spawn a thread and kind of duplicate its private pblock so that the spawn thread continue to process the p...
int js_isregexp(js_State *J, int idx) { js_Value *v = stackidx(J, idx); return v->type == JS_TOBJECT && v->u.object->type == JS_CREGEXP; }
0
[ "CWE-476" ]
mujs
77ab465f1c394bb77f00966cd950650f3f53cb24
7,004,631,823,063,290,000,000,000,000,000,000,000
5
Fix 697401: Error when dropping extra arguments to lightweight functions.
static inline void encode_claim_delegate_cur(struct xdr_stream *xdr, const struct qstr *name, const nfs4_stateid *stateid) { __be32 *p; p = reserve_space(xdr, 4+NFS4_STATEID_SIZE); *p++ = cpu_to_be32(NFS4_OPEN_CLAIM_DELEGATE_CUR); xdr_encode_opaque_fixed(p, stateid->data, NFS4_STATEID_SIZE); encode_string(xdr, na...
0
[ "CWE-703", "CWE-189" ]
linux
bf118a342f10dafe44b14451a1392c3254629a1f
171,421,726,823,130,330,000,000,000,000,000,000,000
9
NFSv4: include bitmap in nfsv4 get acl data The NFSv4 bitmap size is unbounded: a server can return an arbitrary sized bitmap in an FATTR4_WORD0_ACL request. Replace using the nfs4_fattr_bitmap_maxsz as a guess to the maximum bitmask returned by a server with the inclusion of the bitmap (xdr length plus bitmasks) and...
static void dissect_ACKNACK(tvbuff_t *tvb, packet_info *pinfo, gint offset, guint8 flags, const guint encoding, int octets_to_next_header, proto_tree *tree, proto_item *item, endpoint_guid *guid) { /* RTPS 1.0/1.1: * 0...2...........7...............15.............23...............31...
0
[ "CWE-401" ]
wireshark
33e63d19e5496c151bad69f65cdbc7cba2b4c211
244,772,503,192,367,460,000,000,000,000,000,000,000
86
RTPS: Fixup our coherent set map. coherent_set_tracking.coherent_set_registry_map uses a struct as a key, but the hash and comparison routines treat keys as a sequence of bytes. Make sure every key byte is initialized. Fixes #16994. Call wmem_strong_hash on our key in coherent_set_key_hash_by_key instead of creating ...
TEST_F(RenameCollectionTest, LongIndexNameAllowedForTargetCollection) { ASSERT_GREATER_THAN(_targetNssDifferentDb.size(), _sourceNss.size()); std::size_t longestIndexNameAllowedForSource = NamespaceString::MaxNsLen - 2U /*strlen(".$")*/ - _sourceNss.size(); ASSERT_OK(_sourceNss.checkLengthForRename(...
0
[ "CWE-20" ]
mongo
35c1b1f588f04926a958ad2fe4d9c59d79f81e8b
133,301,610,355,801,220,000,000,000,000,000,000,000
13
SERVER-35636 renameCollectionForApplyOps checks for complete namespace
release_keyid_list (keyid_list_t k) { while (k) { keyid_list_t k2 = k->next; xfree (k); k = k2; } }
0
[ "CWE-310" ]
gnupg
4bde12206c5bf199dc6e12a74af8da4558ba41bf
213,749,643,851,249,800,000,000,000,000,000,000,000
9
gpg: Distinguish between missing and cleared key flags. * include/cipher.h (PUBKEY_USAGE_NONE): New. * g10/getkey.c (parse_key_usage): Set new flag. -- We do not want to use the default capabilities (derived from the algorithm) if any key flags are given in a signature. Thus if key flags are used in any way, the def...
void nf_ct_frag6_output(unsigned int hooknum, struct sk_buff *skb, struct net_device *in, struct net_device *out, int (*okfn)(struct sk_buff *)) { struct sk_buff *s, *s2; unsigned int ret = 0; for (s = NFCT_FRAG6_CB(skb)->orig; s;) { nf_conntrack_put_reasm(s->nfct_reasm); nf_conntrack_get_reasm(skb); s-...
0
[]
linux
3ef0eb0db4bf92c6d2510fe5c4dc51852746f206
161,904,198,095,965,900,000,000,000,000,000,000,000
26
net: frag, move LRU list maintenance outside of rwlock Updating the fragmentation queues LRU (Least-Recently-Used) list, required taking the hash writer lock. However, the LRU list isn't tied to the hash at all, so we can use a separate lock for it. Original-idea-by: Florian Westphal <fw@strlen.de> Signed-off-by: Je...
static int btrfs_rmdir(struct inode *dir, struct dentry *dentry) { struct inode *inode = d_inode(dentry); int err = 0; struct btrfs_root *root = BTRFS_I(dir)->root; struct btrfs_trans_handle *trans; if (inode->i_size > BTRFS_EMPTY_DIR_SIZE) return -ENOTEMPTY; if (btrfs_ino(inode) == BTRFS_FIRST_FREE_OBJECTID) ...
0
[ "CWE-200" ]
linux
0305cd5f7fca85dae392b9ba85b116896eb7c1c7
50,090,928,401,754,580,000,000,000,000,000,000,000
39
Btrfs: fix truncation of compressed and inlined extents When truncating a file to a smaller size which consists of an inline extent that is compressed, we did not discard (or made unusable) the data between the new file size and the old file size, wasting metadata space and allowing for the truncated data to be leaked...
static int ffs_func_set_alt(struct usb_function *f, unsigned interface, unsigned alt) { struct ffs_function *func = ffs_func_from_usb(f); struct ffs_data *ffs = func->ffs; int ret = 0, intf; if (alt != (unsigned)-1) { intf = ffs_func_revmap_intf(func, interface); if (unlikely(intf < 0)) return intf; ...
0
[ "CWE-416", "CWE-362" ]
linux
38740a5b87d53ceb89eb2c970150f6e94e00373a
37,721,575,909,873,340,000,000,000,000,000,000,000
38
usb: gadget: f_fs: Fix use-after-free When using asynchronous read or write operations on the USB endpoints the issuer of the IO request is notified by calling the ki_complete() callback of the submitted kiocb when the URB has been completed. Calling this ki_complete() callback will free kiocb. Make sure that the str...
parse_options(const char *data, struct parsed_mount_info *parsed_info) { char *value = NULL; char *equals = NULL; char *next_keyword = NULL; char *out = parsed_info->options; unsigned long *filesys_flags = &parsed_info->flags; int out_len = 0; int word_len; int rc = 0; int got_uid = 0; int got_cruid = 0; int...
0
[ "CWE-20" ]
cifs-utils
f6eae44a3d05b6515a59651e6bed8b6dde689aec
221,107,615,698,170,440,000,000,000,000,000,000,000
400
mtab: handle ENOSPC/EFBIG condition properly when altering mtab It's possible that when mount.cifs goes to append the mtab that there won't be enough space to do so, and the mntent won't be appended to the file in its entirety. Add a my_endmntent routine that will fflush and then fsync the FILE if that succeeds. If e...
prepare_missing(mrb_state *mrb, mrb_value recv, mrb_sym mid, struct RClass **clsp, uint32_t a, uint16_t *c, mrb_value blk, int super) { mrb_sym missing = MRB_SYM(method_missing); mrb_callinfo *ci = mrb->c->ci; uint16_t b = *c; mrb_int n = b & 0xf; mrb_int nk = (b>>4) & 0xf; mrb_value *argv = &ci->stack[a+1]...
0
[ "CWE-122", "CWE-787" ]
mruby
47068ae07a5fa3aa9a1879cdfe98a9ce0f339299
329,620,459,116,985,240,000,000,000,000,000,000,000
42
vm.c: packed arguments length may be zero for `send` method.
piv_process_history(sc_card_t *card) { piv_private_data_t * priv = PIV_DATA(card); int r; int i; int enumtag; u8 * rbuf = NULL; size_t rbuflen = 0; const u8 * body; size_t bodylen; const u8 * num; size_t numlen; const u8 * url = NULL; size_t urllen; u8 * ocfhfbuf = NULL; unsigned int cla_out, tag_out; si...
0
[ "CWE-125" ]
OpenSC
8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
230,416,800,748,063,000,000,000,000,000,000,000,000
217
fixed out of bounds reads Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting and suggesting security fixes.
int pci_piix3_xen_ide_unplug(DeviceState *dev) { PCIIDEState *pci_ide; DriveInfo *di; int i; IDEDevice *idedev; pci_ide = PCI_IDE(dev); for (i = 0; i < 4; i++) { di = drive_get_by_index(IF_IDE, i); if (di != NULL && !di->media_cd) { BlockBackend *blk = blk_by_legacy...
0
[]
qemu
6cd387833d05e8ad31829d97e474dc420625aed9
50,331,044,897,901,220,000,000,000,000,000,000,000
30
Fix release_drive on unplugged devices (pci_piix3_xen_ide_unplug) pci_piix3_xen_ide_unplug should completely unhook the unplugged IDEDevice from the corresponding BlockBackend, otherwise the next call to release_drive will try to detach the drive again. Suggested-by: Kevin Wolf <kwolf@redhat.com> Signed-off-by: Stefa...
static int vmload_interception(struct vcpu_svm *svm) { struct vmcb *nested_vmcb; struct kvm_host_map map; int ret; if (nested_svm_check_permissions(svm)) return 1; ret = kvm_vcpu_map(&svm->vcpu, gpa_to_gfn(svm->vmcb->save.rax), &map); if (ret) { if (ret == -EINVAL) kvm_inject_gp(&svm->vcpu, 0); return ...
0
[ "CWE-401" ]
linux
d80b64ff297e40c2b6f7d7abc1b3eba70d22a068
327,826,894,884,546,540,000,000,000,000,000,000,000
25
KVM: SVM: Fix potential memory leak in svm_cpu_init() When kmalloc memory for sd->sev_vmcbs failed, we forget to free the page held by sd->save_area. Also get rid of the var r as '-ENOMEM' is actually the only possible outcome here. Reviewed-by: Liran Alon <liran.alon@oracle.com> Reviewed-by: Vitaly Kuznetsov <vkuzne...
static void pcnet_csr_writew(PCNetState *s, uint32_t rap, uint32_t new_value) { uint16_t val = new_value; #ifdef PCNET_DEBUG_CSR printf("pcnet_csr_writew rap=%d val=0x%04x\n", rap, val); #endif switch (rap) { case 0: s->csr[0] &= ~(val & 0x7f00); /* Clear any interrupt flags */ s->csr[0...
0
[]
qemu
34e29ce754c02bb6b3bdd244fbb85033460feaff
243,585,336,363,805,140,000,000,000,000,000,000,000
106
net: pcnet: check rx/tx descriptor ring length The AMD PC-Net II emulator has set of control and status(CSR) registers. Of these, CSR76 and CSR78 hold receive and transmit descriptor ring length respectively. This ring length could range from 1 to 65535. Setting ring length to zero leads to an infinite loop in pcnet_r...
bool DataWriterImpl::deadline_timer_reschedule() { assert(qos_.deadline().period != c_TimeInfinite); std::unique_lock<RecursiveTimedMutex> lock(writer_->getMutex()); steady_clock::time_point next_deadline_us; if (!history_.get_next_deadline(timer_owner_, next_deadline_us)) { logError(PUBLI...
0
[ "CWE-284" ]
Fast-DDS
d2aeab37eb4fad4376b68ea4dfbbf285a2926384
325,324,591,235,962,500,000,000,000,000,000,000,000
17
check remote permissions (#1387) * Refs 5346. Blackbox test Signed-off-by: Iker Luengo <ikerluengo@eprosima.com> * Refs 5346. one-way string compare Signed-off-by: Iker Luengo <ikerluengo@eprosima.com> * Refs 5346. Do not add partition separator on last partition Signed-off-by: Iker Luengo <ikerluengo@e...
static int filter_frame(AVFilterLink *inlink, AVFrame *in) { DelogoContext *s = inlink->dst->priv; AVFilterLink *outlink = inlink->dst->outputs[0]; const AVPixFmtDescriptor *desc = av_pix_fmt_desc_get(inlink->format); AVFrame *out; int hsub0 = desc->log2_chroma_w; int vsub0 = desc->log2_chroma_h...
1
[ "CWE-119", "CWE-787" ]
FFmpeg
e43a0a232dbf6d3c161823c2e07c52e76227a1bc
263,707,311,931,965,460,000,000,000,000,000,000,000
52
avfilter: fix plane validity checks Fixes out of array accesses Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
static l_noret undefgoto (LexState *ls, Labeldesc *gt) { const char *msg; if (eqstr(gt->name, luaS_newliteral(ls->L, "break"))) { msg = "break outside loop at line %d"; msg = luaO_pushfstring(ls->L, msg, gt->line); } else { msg = "no visible label '%s' for <goto> at line %d"; msg = luaO_pushfstr...
0
[ "CWE-125" ]
lua
1f3c6f4534c6411313361697d98d1145a1f030fa
271,943,950,654,015,050,000,000,000,000,000,000,000
12
Bug: Lua can generate wrong code when _ENV is <const>
nfqnl_rcv_nl_event(struct notifier_block *this, unsigned long event, void *ptr) { struct netlink_notify *n = ptr; struct nfnl_queue_net *q = nfnl_queue_pernet(n->net); if (event == NETLINK_URELEASE && n->protocol == NETLINK_NETFILTER) { int i; /* destroy all instances for this portid */ spin_lock(&q->in...
0
[ "CWE-416" ]
net
36d5fe6a000790f56039afe26834265db0a3ad4c
324,992,989,332,072,400,000,000,000,000,000,000,000
25
core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors skb_zerocopy can copy elements of the frags array between skbs, but it doesn't orphan them. Also, it doesn't handle errors, so this patch takes care of that as well, and modify the callers accordingly. skb_tx_error() is also added to the caller...
static bool cgroupfs_mount_cgroup(void *hdata, const char *root, int type) { size_t bufsz = strlen(root) + sizeof("/sys/fs/cgroup"); char *path = NULL; char **parts = NULL; char *dirname = NULL; char *abs_path = NULL; char *abs_path2 = NULL; struct cgfs_data *cgfs_d; struct cgroup_process_info *info, *base_info...
1
[ "CWE-59", "CWE-61" ]
lxc
592fd47a6245508b79fe6ac819fe6d3b2c1289be
4,054,613,066,748,944,300,000,000,000,000,000,000
217
CVE-2015-1335: Protect container mounts against symlinks When a container starts up, lxc sets up the container's inital fstree by doing a bunch of mounting, guided by the container configuration file. The container config is owned by the admin or user on the host, so we do not try to guard against bad entries. Howev...
static void xrun(struct snd_pcm_substream *substream) { struct snd_pcm_runtime *runtime = substream->runtime; trace_xrun(substream); if (runtime->tstamp_mode == SNDRV_PCM_TSTAMP_ENABLE) snd_pcm_gettime(runtime, (struct timespec *)&runtime->status->tstamp); snd_pcm_stop(substream, SNDRV_PCM_STATE_XRUN); if (xrun...
0
[ "CWE-416", "CWE-362" ]
linux
3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
77,870,993,652,957,830,000,000,000,000,000,000,000
15
ALSA: pcm : Call kill_fasync() in stream lock Currently kill_fasync() is called outside the stream lock in snd_pcm_period_elapsed(). This is potentially racy, since the stream may get released even during the irq handler is running. Although snd_pcm_release_substream() calls snd_pcm_drop(), this doesn't guarantee th...
static int ssl23_get_server_hello(SSL *s) { char buf[8]; unsigned char *p; int i; int n; n=ssl23_read_bytes(s,7); if (n != 7) return(n); p=s->packet; memcpy(buf,p,n); if ((p[0] & 0x80) && (p[2] == SSL2_MT_SERVER_HELLO) && (p[5] == 0x00) && (p[6] == 0x02)) { #ifdef OPENSSL_NO_SSL2 SSLerr(SSL_F_SSL23_...
1
[ "CWE-310" ]
openssl
cd332a07503bd9771595de87e768179f81715704
238,530,017,078,438,040,000,000,000,000,000,000,000
180
Fix no-ssl3 configuration option CVE-2014-3568 Reviewed-by: Emilia Kasper <emilia@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
smtp_quit (CamelSmtpTransport *transport, CamelStreamBuffer *istream, CamelStream *ostream, GCancellable *cancellable, GError **error) { /* we are going to reset the smtp server (just to be nice) */ gchar *cmdbuf, *respbuf = NULL; cmdbuf = g_strdup ("QUIT\r\n"); d (fprintf (stderr, "...
0
[ "CWE-74" ]
evolution-data-server
ba82be72cfd427b5d72ff21f929b3a6d8529c4df
55,101,301,076,453,420,000,000,000,000,000,000,000
43
I#226 - CVE-2020-14928: Response Injection via STARTTLS in SMTP and POP3 Closes https://gitlab.gnome.org/GNOME/evolution-data-server/-/issues/226
hb_buffer_duplicate_out_buffer (HB_Buffer buffer) { if (!buffer->alt_string) buffer->alt_string = malloc (buffer->allocated * sizeof (buffer->alt_string[0])); buffer->out_string = buffer->alt_string; memcpy (buffer->out_string, buffer->in_string, buffer->out_length * sizeof (buffer->out_string[0])); buffer...
0
[]
pango
336bb3201096bdd0494d29926dd44e8cca8bed26
158,877,504,577,036,580,000,000,000,000,000,000,000
11
[HB] Remove all references to the old code!
zbegintransparencymaskgroup(i_ctx_t *i_ctx_p) { os_ptr op = osp; os_ptr dop = op - 4; gs_transparency_mask_params_t params; ref *pparam; gs_rect bbox; int code; static const char *const subtype_names[] = { GS_TRANSPARENCY_MASK_SUBTYPE_NAMES, 0 }; check_type(*dop, t_dictionar...
0
[ "CWE-704" ]
ghostpdl
548bb434e81dadcc9f71adf891a3ef5bea8e2b4e
172,687,784,961,006,200,000,000,000,000,000,000,000
67
PS interpreter - add some type checking These were 'probably' safe anyway, since they mostly treat the objects as integers without checking, which at least can't result in a crash. Nevertheless, we ought to check. The return from comparedictkeys could be wrong if one of the keys had a value which was not an array, i...
pixOctreeQuantizePixels(PIX *pixs, CQCELL ***cqcaa, l_int32 ditherflag) { l_uint8 *bufu8r, *bufu8g, *bufu8b; l_int32 rval, gval, bval; l_int32 octindex, index; l_int32 val1, val2, val3, dif; l_int32 w, h, wpls, wpld, i, j, success; l_int32 rc, g...
0
[ "CWE-125" ]
leptonica
5ee24b398bb67666f6d173763eaaedd9c36fb1e5
64,048,389,961,671,970,000,000,000,000,000,000,000
192
Fixed issue 22140 in oss-fuzz: Heap-buffer-overflow * color quantized pix must be 8 bpp before extra colors are added.
int ssl3_connect(SSL *s) { BUF_MEM *buf=NULL; unsigned long Time=(unsigned long)time(NULL); void (*cb)(const SSL *ssl,int type,int val)=NULL; int ret= -1; int new_state,state,skip=0; RAND_add(&Time,sizeof(Time),0); ERR_clear_error(); clear_sys_error(); if (s->info_callback != NULL) cb=s->info_callback; e...
0
[]
openssl
ee2ffc279417f15fef3b1073c7dc81a908991516
264,062,758,472,625,200,000,000,000,000,000,000,000
424
Add Next Protocol Negotiation.
MATCHER_P(HeaderMapEqualIgnoreOrder, expected, "") { const bool equal = TestUtility::headerMapEqualIgnoreOrder(*arg, *expected); if (!equal) { *result_listener << "\n" << TestUtility::addLeftAndRightPadding("Expected header map:") << "\n" << *expected ...
0
[]
envoy
2c60632d41555ec8b3d9ef5246242be637a2db0f
69,149,684,119,834,780,000,000,000,000,000,000,000
13
http: header map security fixes for duplicate headers (#197) Previously header matching did not match on all headers for non-inline headers. This patch changes the default behavior to always logically match on all headers. Multiple individual headers will be logically concatenated with ',' similar to what is done with...
void generic_start_io_acct(struct request_queue *q, int rw, unsigned long sectors, struct hd_struct *part) { int cpu = part_stat_lock(); part_round_stats(q, cpu, part); part_stat_inc(cpu, part, ios[rw]); part_stat_add(cpu, part, sectors[rw], sectors); part_inc_in_flight(q, part, rw); part_stat_unlock(); }
0
[ "CWE-772", "CWE-787" ]
linux
95d78c28b5a85bacbc29b8dba7c04babb9b0d467
199,097,510,273,221,000,000,000,000,000,000,000,000
12
fix unbalanced page refcounting in bio_map_user_iov bio_map_user_iov and bio_unmap_user do unbalanced pages refcounting if IO vector has small consecutive buffers belonging to the same page. bio_add_pc_page merges them into one, but the page reference is never dropped. Cc: stable@vger.kernel.org Signed-off-by: Vitaly...
_PUBLIC_ _PURE_ size_t count_chars(const char *s, char c) { size_t count = 0; while (*s) { if (*s == c) count++; s ++; } return count; }
0
[]
samba
8eae8d28bce2c3f6a323d3dc48ed10c2e6bb1ba5
132,721,315,637,006,110,000,000,000,000,000,000
11
CVE-2013-4476: lib-util: add file_check_permissions() Bug: https://bugzilla.samba.org/show_bug.cgi?id=10234 Signed-off-by: Björn Baumbach <bb@sernet.de> Reviewed-by: Stefan Metzmacher <metze@samba.org>
void pb_release(const pb_msgdesc_t *fields, void *dest_struct) { pb_field_iter_t iter; if (!dest_struct) return; /* Ignore NULL pointers, similar to free() */ if (!pb_field_iter_begin(&iter, fields, dest_struct)) return; /* Empty message type */ do { pb_release_sin...
0
[ "CWE-763" ]
nanopb
e2f0ccf939d9f82931d085acb6df8e9a182a4261
143,914,140,750,776,300,000,000,000,000,000,000,000
15
Fix invalid free() with oneof (#647) Nanopb would call free() or realloc() on an invalid (attacker controlled) pointer value when all the following conditions are true: - PB_ENABLE_MALLOC is defined at the compile time - Message definition contains an oneof field, and the oneof contains at least one pointer type fi...
inline unsigned long copy_transact_fpr_to_user(void __user *to, struct task_struct *task) { return __copy_to_user(to, task->thread.transact_fp.fpr, ELF_NFPREG * sizeof(double)); }
0
[ "CWE-20", "CWE-284", "CWE-369" ]
linux
d2b9d2a5ad5ef04ff978c9923d19730cb05efd55
23,584,933,133,558,598,000,000,000,000,000,000,000
6
powerpc/tm: Block signal return setting invalid MSR state Currently we allow both the MSR T and S bits to be set by userspace on a signal return. Unfortunately this is a reserved configuration and will cause a TM Bad Thing exception if attempted (via rfid). This patch checks for this case in both the 32 and 64 bit s...
static void nft_setelem_data_activate(const struct net *net, const struct nft_set *set, struct nft_set_elem *elem) { const struct nft_set_ext *ext = nft_set_elem_ext(set, elem->priv); if (nft_set_ext_exists(ext, NFT_SET_EXT_DATA)) nft_data_hold(nft_set_ext_data(ext), set->dtype); if (nft_set_e...
0
[ "CWE-665" ]
linux
ad9f151e560b016b6ad3280b48e42fa11e1a5440
243,139,332,733,340,870,000,000,000,000,000,000,000
11
netfilter: nf_tables: initialize set before expression setup nft_set_elem_expr_alloc() needs an initialized set if expression sets on the NFT_EXPR_GC flag. Move set fields initialization before expression setup. [4512935.019450] ================================================================== [4512935.019456] BUG: ...
static int load_bitmap_header(struct bitmap_index *index) { struct bitmap_disk_header *header = (void *)index->map; if (index->map_size < sizeof(*header) + 20) return error("Corrupted bitmap index (missing header data)"); if (memcmp(header->magic, BITMAP_IDX_SIGNATURE, sizeof(BITMAP_IDX_SIGNATURE)) != 0) retur...
0
[ "CWE-119", "CWE-787" ]
git
de1e67d0703894cb6ea782e36abb63976ab07e60
167,061,696,973,829,030,000,000,000,000,000,000,000
32
list-objects: pass full pathname to callbacks When we find a blob at "a/b/c", we currently pass this to our show_object_fn callbacks as two components: "a/b/" and "c". Callbacks which want the full value then call path_name(), which concatenates the two. But this is an inefficient interface; the path is a strbuf, and ...
static int store_object( enum object_type type, struct strbuf *dat, struct last_object *last, struct object_id *oidout, uintmax_t mark) { void *out, *delta; struct object_entry *e; unsigned char hdr[96]; struct object_id oid; unsigned long hdrlen, deltalen; git_SHA_CTX c; git_zstream s; hdrlen = xsnprintf...
0
[]
git
68061e3470210703cb15594194718d35094afdc0
14,925,461,404,289,950,000,000,000,000,000,000,000
134
fast-import: disallow "feature export-marks" by default The fast-import stream command "feature export-marks=<path>" lets the stream write marks to an arbitrary path. This may be surprising if you are running fast-import against an untrusted input (which otherwise cannot do anything except update Git objects and refs)...
asmlinkage ssize_t sys_readahead(int fd, loff_t offset, size_t count) { ssize_t ret; struct file *file; ret = -EBADF; file = fget(fd); if (file) { if (file->f_mode & FMODE_READ) { struct address_space *mapping = file->f_mapping; pgoff_t start = offset >> PAGE_CACHE_SHIFT; pgoff_t end = (offset + count ...
0
[ "CWE-193" ]
linux-2.6
94ad374a0751f40d25e22e036c37f7263569d24c
169,461,602,936,137,000,000,000,000,000,000,000,000
19
Fix off-by-one error in iov_iter_advance() The iov_iter_advance() function would look at the iov->iov_len entry even though it might have iterated over the whole array, and iov was pointing past the end. This would cause DEBUG_PAGEALLOC to trigger a kernel page fault if the allocation was at the end of a page, and th...
void run() { intrusive_ptr<ExpressionContextForTest> expCtx(new ExpressionContextForTest()); BSONObj specObject = BSON("" << spec()); BSONElement specElement = specObject.firstElement(); VariablesParseState vps = expCtx->variablesParseState; intrusive_ptr<Expression> expressi...
0
[ "CWE-835" ]
mongo
0a076417d1d7fba3632b73349a1fd29a83e68816
49,993,419,959,389,910,000,000,000,000,000,000,000
13
SERVER-38070 fix infinite loop in agg expression
void ring_status_indication(struct s_smc *smc, u_long status) { PRINTK("ring_status_indication( "); if (status & RS_RES15) PRINTK("RS_RES15 "); if (status & RS_HARDERROR) PRINTK("RS_HARDERROR "); if (status & RS_SOFTERROR) PRINTK("RS_SOFTERROR "); if (status & RS_BEACON) PRINTK("RS_BEACON "); if (status &...
0
[ "CWE-264" ]
linux-2.6
c25b9abbc2c2c0da88e180c3933d6e773245815a
155,350,943,493,081,760,000,000,000,000,000,000,000
37
drivers/net/skfp: if !capable(CAP_NET_ADMIN): inverted logic Fix inverted logic Signed-off-by: Roel Kluin <roel.kluin@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
static jpc_enc_cp_t *cp_create(char *optstr, jas_image_t *image) { jpc_enc_cp_t *cp; jas_tvparser_t *tvp; int ret; int numilyrrates; double *ilyrrates; int i; int tagid; jpc_enc_tcp_t *tcp; jpc_enc_tccp_t *tccp; jpc_enc_ccp_t *ccp; int cmptno; uint_fast16_t rlvlno; uint_fast16_t prcwidthexpn; uint_fast16_...
0
[ "CWE-189" ]
jasper
3c55b399c36ef46befcb21e4ebc4799367f89684
249,238,926,149,914,640,000,000,000,000,000,000,000
427
At many places in the code, jas_malloc or jas_recalloc was being invoked with the size argument being computed in a manner that would not allow integer overflow to be detected. Now, these places in the code have been modified to use special-purpose memory allocation functions (e.g., jas_alloc2, jas_alloc3, jas_realloc...
void CIRCNetwork::SetAltNick(const CString& s) { if (m_pUser->GetAltNick().Equals(s)) { m_sAltNick = ""; } else { m_sAltNick = s; } }
0
[ "CWE-20" ]
znc
64613bc8b6b4adf1e32231f9844d99cd512b8973
8,749,175,029,456,342,000,000,000,000,000,000,000
7
Don't crash if user specified invalid encoding. This is CVE-2019-9917
static int parse_smacro_template(Token ***tpp, SMacro *tmpl) { int nparam = 0; enum sparmflags flags; struct smac_param *params = NULL; bool err, done; bool greedy = false; Token **tn = *tpp; Token *t = *tn; Token *name; /* * DO NOT skip whitespace here, or we won't be able to ...
0
[]
nasm
6299a3114ce0f3acd55d07de201a8ca2f0a83059
311,333,828,906,999,180,000,000,000,000,000,000,000
125
BR 3392708: fix NULL pointer reference for invalid %stacksize After issuing an error message for a missing %stacksize argument, need to quit rather than continuing to try to access the pointer. Fold uses of tok_text() while we are at it. Reported-by: Suhwan <prada960808@gmail.com> Signed-off-by: H. Peter Anvin (Inte...
unsigned long regs_get_register(struct pt_regs *regs, unsigned int offset) { if (offset >= NUM_GPRS) return 0; return regs->gprs[offset]; }
0
[ "CWE-264", "CWE-269" ]
linux
dab6cf55f81a6e16b8147aed9a843e1691dcd318
282,561,247,591,507,970,000,000,000,000,000,000,000
6
s390/ptrace: fix PSW mask check The PSW mask check of the PTRACE_POKEUSR_AREA command is incorrect. The PSW_MASK_USER define contains the PSW_MASK_ASC bits, the ptrace interface accepts all combinations for the address-space-control bits. To protect the kernel space the PSW mask check in ptrace needs to reject the add...
static int check_call(struct bpf_verifier_env *env, int func_id, int insn_idx) { const struct bpf_func_proto *fn = NULL; struct bpf_reg_state *regs; struct bpf_call_arg_meta meta; bool changes_data; int i, err; /* find function prototype */ if (func_id < 0 || func_id >= __BPF_FUNC_MAX_ID) { verbose(env, "inva...
0
[ "CWE-119", "CWE-284" ]
linux
468f6eafa6c44cb2c5d8aad35e12f06c240a812a
70,995,405,665,289,370,000,000,000,000,000,000,000
127
bpf: fix 32-bit ALU op verification 32-bit ALU ops operate on 32-bit values and have 32-bit outputs. Adjust the verifier accordingly. Fixes: f1174f77b50c ("bpf/verifier: rework value tracking") Signed-off-by: Jann Horn <jannh@google.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: Daniel Borkman...
int main(int argc, char *argv[]) { /* I18n */ setlocale(LC_ALL, ""); #if ENABLE_NLS bindtextdomain(PACKAGE, LOCALEDIR); textdomain(PACKAGE); #endif guint owner_id; abrt_init(argv); const char *program_usage_string = _( "& [options]" ); enum { OPT_v = 1 << 0, ...
0
[ "CWE-59" ]
abrt
7417505e1d93cc95ec648b74e3c801bc67aacb9f
80,080,151,437,477,910,000,000,000,000,000,000,000
76
daemon, dbus: allow only root to create CCpp, Koops, vmcore and xorg Florian Weimer <fweimer@redhat.com>: This prevents users from feeding things that are not actually coredumps and excerpts from /proc to these analyzers. For example, it should not be possible to trigger a rule with “EVENT=post-create...
OPJ_BOOL opj_t2_encode_packets(opj_t2_t* p_t2, OPJ_UINT32 p_tile_no, opj_tcd_tile_t *p_tile, OPJ_UINT32 p_maxlayers, OPJ_BYTE *p_dest, OPJ_UINT32 * p_data_written, ...
0
[ "CWE-416", "CWE-787" ]
openjpeg
c535531f03369623b9b833ef41952c62257b507e
118,397,352,435,155,420,000,000,000,000,000,000,000
140
opj_t2_encode_packet(): fix potential write heap buffer overflow (#992)
smb2_plain_req_init(__le16 smb2_command, struct cifs_tcon *tcon, void **request_buf, unsigned int *total_len) { int rc; struct smb2_sync_hdr *shdr; rc = smb2_reconnect(smb2_command, tcon); if (rc) return rc; /* BB eventually switch this to SMB2 specific small buf size */ *request_buf = cifs_small_buf_ge...
0
[ "CWE-476" ]
linux
cabfb3680f78981d26c078a26e5c748531257ebb
319,664,284,848,348,730,000,000,000,000,000,000,000
32
CIFS: Enable encryption during session setup phase In order to allow encryption on SMB connection we need to exchange a session key and generate encryption and decryption keys. Signed-off-by: Pavel Shilovsky <pshilov@microsoft.com>
static void store_param_float(NET *net, MYSQL_BIND *param) { float value= *(float*) param->buffer; float4store(net->write_pos, value); net->write_pos+= 4; }
0
[]
mysql-server
3d8134d2c9b74bc8883ffe2ef59c168361223837
98,262,926,697,841,550,000,000,000,000,000,000,000
6
Bug#25988681: USE-AFTER-FREE IN MYSQL_STMT_CLOSE() Description: If mysql_stmt_close() encountered error, it recorded error in prepared statement but then frees memory assigned to prepared statement. If mysql_stmt_error() is used to get error information, it will resu...
void Uint32Analysis::UnmarkUnsafePhis() { // No phis were collected. Nothing to do. if (phis_.length() == 0) return; // Worklist used to transitively clear kUint32 from phis that // are used as arguments to other phis. ZoneList<HPhi*> worklist(phis_.length(), zone_); // Phi can be used as a uint32 value i...
0
[]
node
fd80a31e0697d6317ce8c2d289575399f4e06d21
143,496,616,002,668,400,000,000,000,000,000,000,000
54
deps: backport 5f836c from v8 upstream Original commit message: Fix Hydrogen bounds check elimination When combining bounds checks, they must all be moved before the first load/store that they are guarding. BUG=chromium:344186 LOG=y R=svenpanne@chromium.org Review URL: https://coderevie...
int MonConnection::handle_auth_bad_method( uint32_t old_auth_method, int result, const std::vector<uint32_t>& allowed_methods, const std::vector<uint32_t>& allowed_modes) { ldout(cct,10) << __func__ << " old_auth_method " << old_auth_method << " result " << cpp_strerror(result) << " allowed_methods " << a...
0
[ "CWE-294" ]
ceph
6c14c2fb5650426285428dfe6ca1597e5ea1d07d
26,865,330,765,328,590,000,000,000,000,000,000,000
25
mon/MonClient: bring back CEPHX_V2 authorizer challenges Commit c58c5754dfd2 ("msg/async/ProtocolV1: use AuthServer and AuthClient") introduced a backwards compatibility issue into msgr1. To fix it, commit 321548010578 ("mon/MonClient: skip CEPHX_V2 challenge if client doesn't support it") set out to skip authorizer c...
static bool read_entry(RBuffer *b, ut64 addr, struct minidump_directory *entry) { st64 o_addr = r_buf_seek (b, 0, R_BUF_CUR); if (r_buf_seek (b, addr, R_BUF_SET) < 0) { return false; } entry->stream_type = r_buf_read_le32 (b); entry->location.data_size = r_buf_read_le32 (b); entry->location.rva = r_buf_read_le3...
0
[ "CWE-400", "CWE-703" ]
radare2
27fe8031782d3a06c3998eaa94354867864f9f1b
24,233,691,285,435,035,000,000,000,000,000,000,000
11
Fix DoS in the minidump parser ##crash * Reported by lazymio via huntr.dev * Reproducer: mdmp-dos
static void perf_group_detach(struct perf_event *event) { struct perf_event *sibling, *tmp; struct list_head *list = NULL; /* * We can have double detach due to exit/hot-unplug + close. */ if (!(event->attach_state & PERF_ATTACH_GROUP)) return; event->attach_state &= ~PERF_ATTACH_GROUP; /* * If this is...
0
[ "CWE-362", "CWE-125" ]
linux
321027c1fe77f892f4ea07846aeae08cefbbb290
204,567,984,886,157,930,000,000,000,000,000,000,000
47
perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race Di Shen reported a race between two concurrent sys_perf_event_open() calls where both try and move the same pre-existing software group into a hardware context. The problem is exactly that described in commit: f63a8daa5812 ("perf: Fix event->ctx...
static int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb) { BUF_MEM *b; unsigned char *p; int i; size_t want = HEADER_SIZE; int eos = 0; size_t off = 0; size_t len = 0; const unsigned char *q; long slen; int inf, tag, xclass; b = BUF_MEM_new(); if (b == NULL) { ASN1er...
1
[ "CWE-399" ]
openssl
c62981390d6cf9e3d612c489b8b77c2913b25807
169,354,499,671,052,600,000,000,000,000,000,000,000
126
Harden ASN.1 BIO handling of large amounts of data. If the ASN.1 BIO is presented with a large length field read it in chunks of increasing size checking for EOF on each read. This prevents small files allocating excessive amounts of data. CVE-2016-2109 Thanks to Brian Carpenter for reporting this issue. Reviewed-b...
static void nfs_mark_client_ready(struct nfs_client *clp, int state) { clp->cl_cons_state = state; wake_up_all(&nfs_client_active_wq); }
0
[ "CWE-20" ]
linux-2.6
54af3bb543c071769141387a42deaaab5074da55
141,576,999,425,405,620,000,000,000,000,000,000,000
5
NFS: Fix an Oops in encode_lookup() It doesn't look as if the NFS file name limit is being initialised correctly in the struct nfs_server. Make sure that we limit whatever is being set in nfs_probe_fsinfo() and nfs_init_server(). Also ensure that readdirplus and nfs4_path_walk respect our file name limits. Signed-of...
void sendSpawnRequest(NegotiationDetails &details) { TRACE_POINT(); try { string data = "You have control 1.0\n" "passenger_root: " + resourceLocator.getRoot() + "\n" "passenger_version: " PASSENGER_VERSION "\n" "ruby_libdir: " + resourceLocator.getRubyLibDir() + "\n" "generation_dir: " + genera...
0
[]
passenger
8c6693e0818772c345c979840d28312c2edd4ba4
155,644,756,206,731,590,000,000,000,000,000,000,000
35
Security check socket filenames reported by spawned application processes.
static bool qxl_rom_monitors_config_changed(QXLRom *rom, VDAgentMonitorsConfig *monitors_config, unsigned int max_outputs) { int i; unsigned int monitors_count; monitors_count = MIN(monitors_config->num_of_monitors, max_outputs); if (rom->client_monitors_config.count != monitors_count)...
0
[ "CWE-476" ]
qemu
d52680fc932efb8a2f334cc6993e705ed1e31e99
22,906,566,878,984,673,000,000,000,000,000,000,000
27
qxl: check release info object When releasing spice resources in release_resource() routine, if release info object 'ext.info' is null, it leads to null pointer dereference. Add check to avoid it. Reported-by: Bugs SysSec <bugs-syssec@rub.de> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Message-id: 20190425...
*/ PHP_FUNCTION(date_time_set) { zval *object; php_date_obj *dateobj; long h, i, s = 0; if (zend_parse_method_parameters(ZEND_NUM_ARGS() TSRMLS_CC, getThis(), "Oll|l", &object, date_ce_date, &h, &i, &s) == FAILURE) { RETURN_FALSE; } dateobj = (php_date_obj *) zend_object_store_get_object(objec...
0
[]
php-src
7b1898183032eeabc64a086ff040af991cebcd93
194,043,686,905,926,830,000,000,000,000,000,000,000
18
Fix bug #68942 (Use after free vulnerability in unserialize() with DateTimeZone) Conflicts: ext/date/php_date.c
static void fn_show_mem(struct vc_data *vc) { show_mem(0, NULL); }
0
[ "CWE-416" ]
linux
6ca03f90527e499dd5e32d6522909e2ad390896b
13,451,478,099,276,530,000,000,000,000,000,000,000
4
vt: keyboard, simplify vt_kdgkbsent Use 'strlen' of the string, add one for NUL terminator and simply do 'copy_to_user' instead of the explicit 'for' loop. This makes the KDGKBSENT case more compact. The only thing we need to take care about is NULL 'func_table[i]'. Use an empty string in that case. The original che...
rsock_init_unixsock(VALUE sock, VALUE path, int server) { struct sockaddr_un sockaddr; socklen_t sockaddrlen; int fd, status; rb_io_t *fptr; path = unixsock_path_value(path); INIT_SOCKADDR_UN(&sockaddr, sizeof(struct sockaddr_un)); if (sizeof(sockaddr.sun_path) < (size_t)RSTRING_LEN(path))...
0
[ "CWE-20" ]
ruby
b78fa27ae0b717c5569878c106a67d5047e5fb88
88,744,700,706,388,880,000,000,000,000,000,000,000
60
unixsocket.c: abstract namespace * ext/socket/unixsocket.c (unixsock_path_value): fix r62991 for Linux abstract namespace. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@63000 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
At_Root_Block_Obj Parser::parse_at_root_block() { stack.push_back(Scope::AtRoot); ParserState at_source_position = pstate; Block_Obj body; At_Root_Query_Obj expr; Lookahead lookahead_result; if (lex_css< exactly<'('> >()) { expr = parse_at_root_query(); } if (peek_css < exactly...
0
[ "CWE-125" ]
libsass
eb15533b07773c30dc03c9d742865604f47120ef
48,314,105,218,221,400,000,000,000,000,000,000,000
24
Fix memory leak in `parse_ie_keyword_arg` `kwd_arg` would never get freed when there was a parse error in `parse_ie_keyword_arg`. Closes #2656
static int cma_bind_addr(struct rdma_cm_id *id, struct sockaddr *src_addr, const struct sockaddr *dst_addr) { if (!src_addr || !src_addr->sa_family) { src_addr = (struct sockaddr *) &id->route.addr.src_addr; src_addr->sa_family = dst_addr->sa_family; if (IS_ENABLED(CONFIG_IPV6) && dst_addr->sa_family =...
0
[ "CWE-416" ]
linux
bc0bdc5afaa740d782fbf936aaeebd65e5c2921d
122,420,188,540,399,480,000,000,000,000,000,000,000
20
RDMA/cma: Do not change route.addr.src_addr.ss_family If the state is not idle then rdma_bind_addr() will immediately fail and no change to global state should happen. For instance if the state is already RDMA_CM_LISTEN then this will corrupt the src_addr and would cause the test in cma_cancel_operation(): if (cma...
uint32 max_char_length() const { return max_length / collation.collation->mbmaxlen; }
0
[]
mysql-server
f7316aa0c9a3909fc7498e7b95d5d3af044a7e21
223,966,289,795,416,160,000,000,000,000,000,000,000
2
Bug#26361149 MYSQL SERVER CRASHES AT: COL IN(IFNULL(CONST, COL), NAME_CONST('NAME', NULL)) Backport of Bug#19143243 fix. NAME_CONST item can return NULL_ITEM type in case of incorrect arguments. NULL_ITEM has special processing in Item_func_in function. In Item_func_in::fix_length_and_dec an a...
int mod_wstunnel_frame_send(handler_ctx *hctx, mod_wstunnel_frame_type_t type, const char *payload, size_t siz) { #ifdef _MOD_WEBSOCKET_SPEC_RFC_6455_ if (hctx->hybivers >= 8) return send_rfc_6455(hctx, type, payload, siz); #endif /* _MOD_WEBSOCKET_SPEC_RFC_6455_ */ #ifdef _MOD_WE...
0
[ "CWE-476" ]
lighttpd1.4
971773f1fae600074b46ef64f3ca1f76c227985f
134,390,396,819,532,600,000,000,000,000,000,000,000
10
[mod_wstunnel] fix crash with bad hybivers (fixes #3165) (thx Michał Dardas) x-ref: "mod_wstunnel null pointer dereference" https://redmine.lighttpd.net/issues/3165
TRIO_PUBLIC_STRING size_t trio_string_format_date_max TRIO_ARGS4((self, max, format, datetime), trio_string_t* self, size_t max, TRIO_CONST char* format, ...
0
[ "CWE-190", "CWE-125" ]
FreeRDP
05cd9ea2290d23931f615c1b004d4b2e69074e27
334,487,102,935,755,520,000,000,000,000,000,000,000
9
Fixed TrioParse and trio_length limts. CVE-2020-4030 thanks to @antonio-morales for finding this.
static void sdb_concat_by_path(Sdb *s, const char *path) { Sdb *db = sdb_new (0, path, 0); sdb_merge (s, db); sdb_close (db); sdb_free (db); }
0
[ "CWE-78" ]
radare2
5411543a310a470b1257fb93273cdd6e8dfcb3af
291,170,862,994,350,640,000,000,000,000,000,000,000
6
More fixes for the CVE-2019-14745
vhost_user_check_and_alloc_queue_pair(struct virtio_net *dev, struct VhostUserMsg *msg) { uint32_t vring_idx; switch (msg->request.master) { case VHOST_USER_SET_VRING_KICK: case VHOST_USER_SET_VRING_CALL: case VHOST_USER_SET_VRING_ERR: vring_idx = msg->payload.u64 & VHOST_USER_VRING_IDX_MASK; break; case ...
0
[ "CWE-190" ]
dpdk
c78d94189dced04def987a17f16097fcb197a186
9,402,609,735,214,432,000,000,000,000,000,000,000
34
vhost: fix vring index check vhost_user_check_and_alloc_queue_pair() is used to extract a vring index from a payload. This function validates the index and is called early on in when performing message handling. Most message handlers depend on it correctly validating the vring index. Depending on the message type the...
gdk_pixbuf__jpeg_image_save_to_callback (GdkPixbufSaveFunc save_func, gpointer user_data, GdkPixbuf *pixbuf, gchar **keys, gchar **values, GError **error) { return real_save_jpeg (pixbuf, keys, values, error, TRUE, NULL, ...
0
[ "CWE-787" ]
gdk-pixbuf
c2a40a92fe3df4111ed9da51fe3368c079b86926
188,367,302,394,330,900,000,000,000,000,000,000,000
10
jpeg: Throw error when number of color components is unsupported Explicitly check "3" or "4" output color components. gdk-pixbuf assumed that the value of output_components to be either 3 or 4, but not an invalid value (9) or an unsupported value (1). The way the buffer size was deduced was using a naive "== 4" chec...
GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns) { int r; static const char resp[] = "<u:%sResponse " "xmlns:u=\"%s\">" "<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>" "</u:%sResponse>"; char body[512]; int bodylen; struct NameValueParserData data; char * int_ip...
0
[ "CWE-476" ]
miniupnp
86030db849260dd8fb2ed975b9890aef1b62b692
173,514,320,258,047,670,000,000,000,000,000,000,000
63
fix error from commit 13585f15c7f7dc28bbbba1661efb280d530d114c
libxlLoggerFree(libxlLogger *logger) { xentoollog_logger *xtl_logger = (xentoollog_logger*)logger; if (logger->defaultLogFile) VIR_FORCE_FCLOSE(logger->defaultLogFile); g_clear_pointer(&logger->files, g_hash_table_unref); virMutexDestroy(&logger->tableLock); xtl_logger_destroy(xtl_logger); }
0
[ "CWE-703", "CWE-667" ]
libvirt
a7a03324d86e111f81687b5315b8f296dde84340
173,547,476,830,991,320,000,000,000,000,000,000,000
9
libxl: Protect access to libxlLogger files hash table The hash table of log file objects in libxlLogger is not protected against concurrent access. It is possible for one thread to remove an entry while another is updating it. Add a mutex to the libxlLogger object and lock it when accessing the files hash table. Sign...
GF_Err udta_Write(GF_Box *s, GF_BitStream *bs) { GF_Err e; u32 i; GF_UserDataMap *map; GF_UserDataBox *ptr = (GF_UserDataBox *)s; e = gf_isom_box_write_header(s, bs); if (e) return e; i=0; while ((map = (GF_UserDataMap *)gf_list_enum(ptr->recordList, &i))) { //warning: here we are not passing the actual "par...
0
[ "CWE-125" ]
gpac
bceb03fd2be95097a7b409ea59914f332fb6bc86
102,027,806,849,525,320,000,000,000,000,000,000,000
18
fixed 2 possible heap overflows (inc. #1088)
static const char *flat_escape_value_str(AVBPrint *dst, const char *src) { const char *p; for (p = src; *p; p++) { switch (*p) { case '\n': av_bprintf(dst, "%s", "\\n"); break; case '\r': av_bprintf(dst, "%s", "\\r"); break; case '\\': av_bprintf(dst, "%s", "\\\\"); break; ...
0
[ "CWE-476" ]
FFmpeg
837cb4325b712ff1aab531bf41668933f61d75d2
262,465,962,891,708,000,000,000,000,000,000,000,000
17
ffprobe: Fix null pointer dereference with color primaries Found-by: AD-lab of venustech Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
nautilus_file_mark_desktop_file_executable (GFile *file, GtkWindow *parent_window, gboolean interactive, NautilusOpCallback done_callback, ...
0
[ "CWE-20" ]
nautilus
1630f53481f445ada0a455e9979236d31a8d3bb0
290,929,870,451,674,150,000,000,000,000,000,000,000
20
mime-actions: use file metadata for trusting desktop files Currently we only trust desktop files that have the executable bit set, and don't replace the displayed icon or the displayed name until it's trusted, which prevents for running random programs by a malicious desktop file. However, the executable permission i...
long SSL_CTX_ctrl(SSL_CTX *ctx,int cmd,long larg,void *parg) { long l; switch (cmd) { case SSL_CTRL_GET_READ_AHEAD: return(ctx->read_ahead); case SSL_CTRL_SET_READ_AHEAD: l=ctx->read_ahead; ctx->read_ahead=larg; return(l); case SSL_CTRL_SET_MSG_CALLBACK_ARG: ctx->msg_callback_arg = parg; return ...
0
[]
openssl
ee2ffc279417f15fef3b1073c7dc81a908991516
29,539,267,807,896,103,000,000,000,000,000,000,000
78
Add Next Protocol Negotiation.
void GCompletionFieldSetCompletion(GGadget *g,GTextCompletionHandler completion) { ((GCompletionField *) g)->completion = completion; ((GTextField *) g)->accepts_tabs = ((GCompletionField *) g)->completion != NULL; }
0
[ "CWE-119", "CWE-787" ]
fontforge
626f751752875a0ddd74b9e217b6f4828713573c
162,299,619,126,191,950,000,000,000,000,000,000,000
4
Warn users before discarding their unsaved scripts (#3852) * Warn users before discarding their unsaved scripts This closes #3846.
static void hpack_dht_dump(FILE *out, const struct hpack_dht *dht) { unsigned int i; unsigned int slot; char name[4096], value[4096]; for (i = HPACK_SHT_SIZE; i < HPACK_SHT_SIZE + dht->used; i++) { slot = (hpack_get_dte(dht, i - HPACK_SHT_SIZE + 1) - dht->dte); fprintf(out, "idx=%d slot=%u name=<%s> value=<%s>...
0
[ "CWE-787" ]
haproxy
5dfc5d5cd0d2128d77253ead3acf03a421ab5b88
44,550,574,767,832,560,000,000,000,000,000,000,000
15
BUG/CRITICAL: hpack: never index a header into the headroom after wrapping The HPACK header table is implemented as a wrapping list inside a contigous area. Headers names and values are stored from right to left while indexes are stored from left to right. When there's no more room to store a new one, we wrap to the r...
static unsigned int skb_ts_get_next_block(unsigned int offset, const u8 **text, struct ts_config *conf, struct ts_state *state) { return skb_seq_read(offset, text, TS_SKB_CB(state));
0
[ "CWE-703", "CWE-125" ]
linux
8605330aac5a5785630aec8f64378a54891937cc
294,053,187,886,278,030,000,000,000,000,000,000,000
6
tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs __sock_recv_timestamp can be called for both normal skbs (for receive timestamps) and for skbs on the error queue (for transmit timestamps). Commit 1c885808e456 (tcp: SOF_TIMESTAMPING_OPT_STATS option for SO_TIMESTAMPING) assumes any skb passed to __sock_recv_timest...
TiledInputFile::dataWindowForLevel (int l) const { return dataWindowForLevel (l, l); }
0
[ "CWE-125" ]
openexr
e79d2296496a50826a15c667bf92bdc5a05518b4
284,377,496,376,512,030,000,000,000,000,000,000,000
4
fix memory leaks and invalid memory accesses Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
static void sg_proc_debug_helper(struct seq_file *s, Sg_device * sdp) { int k, new_interface, blen, usg; Sg_request *srp; Sg_fd *fp; const sg_io_hdr_t *hp; const char * cp; unsigned int ms; k = 0; list_for_each_entry(fp, &sdp->sfds, sfd_siblings) { k++; read_lock(&fp->rq_list_lock); /* irqs already disable...
0
[ "CWE-200" ]
linux
3e0097499839e0fe3af380410eababe5a47c4cf9
46,553,055,406,437,100,000,000,000,000,000,000,000
62
scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE When calling SG_GET_REQUEST_TABLE ioctl only a half-filled table is returned; the remaining part will then contain stale kernel memory information. This patch zeroes out the entire table to avoid this issue. Signed-off-by: Hannes Reinecke <hare@suse.com> Revie...
static int check_trust(X509_STORE_CTX *ctx, int num_untrusted) { int i, ok = 0; X509 *x = NULL; X509 *mx; struct dane_st *dane = (struct dane_st *)ctx->dane; int num = sk_X509_num(ctx->chain); int trust; /* * Check for a DANE issuer at depth 1 or greater, if it is a DANE-TA(2) * m...
0
[]
openssl
33cc5dde478ba5ad79f8fd4acd8737f0e60e236e
217,035,163,601,888,550,000,000,000,000,000,000,000
100
Compat self-signed trust with reject-only aux data When auxiliary data contains only reject entries, continue to trust self-signed objects just as when no auxiliary data is present. This makes it possible to reject specific uses without changing what's accepted (and thus overring the underlying EKU). Added new suppo...
void pad_short_parameter(std::string& param, unsigned int max_len) { if (param.length() < max_len) { QTC::TC("qpdf", "QPDF_encryption pad short parameter"); param.append(max_len - param.length(), '\0'); } }
1
[ "CWE-787" ]
qpdf
d71f05ca07eb5c7cfa4d6d23e5c1f2a800f52e8e
138,848,666,017,848,980,000,000,000,000,000,000,000
8
Fix sign and conversion warnings (major) This makes all integer type conversions that have potential data loss explicit with calls that do range checks and raise an exception. After this commit, qpdf builds with no warnings when -Wsign-conversion -Wconversion is used with gcc or clang or when -W3 -Wd4800 is used with ...
proto_register_usb_audio(void) { static hf_register_info hf[] = { { &hf_midi_cable_number, { "Cable Number", "usbaudio.midi.cable_number", FT_UINT8, BASE_HEX, NULL, 0xF0, NULL, HFILL }}, { &hf_midi_code_index, { "Code Index", "usbaudio.midi.code_index", FT_UINT8...
0
[ "CWE-476" ]
wireshark
2cb5985bf47bdc8bea78d28483ed224abdd33dc6
198,755,189,563,088,550,000,000,000,000,000,000,000
224
Make class "type" for USB conversations. USB dissectors can't assume that only their class type has been passed around in the conversation. Make explicit check that class type expected matches the dissector and stop/prevent dissection if there isn't a match. Bug: 12356 Change-Id: Ib23973a4ebd0fbb51952ffc118daf95e338...
BSONObj spec() { return BSON("$and" << BSON_ARRAY(1 << BSON("$and" << BSON_ARRAY(1)) << "$a" << "$b")); }
0
[ "CWE-835" ]
mongo
0a076417d1d7fba3632b73349a1fd29a83e68816
11,040,504,985,571,892,000,000,000,000,000,000,000
4
SERVER-38070 fix infinite loop in agg expression
Status Peek(std::size_t index, Tuple* tuple) { std::unique_lock<std::mutex> lock(mu_); // Wait if the requested index is not available non_empty_cond_var_.wait( lock, [index, this]() { return index < this->buf_.size(); }); // Place tensors in the output tuple for (const auto& tensor : bu...
0
[ "CWE-20", "CWE-703" ]
tensorflow
cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb
257,686,118,535,212,000,000,000,000,000,000,000,000
14
Fix tf.raw_ops.StagePeek vulnerability with invalid `index`. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445524908
psutil_disk_io_counters(PyObject *self, PyObject *args) { kstat_ctl_t *kc; kstat_t *ksp; kstat_io_t kio; PyObject *py_retdict = PyDict_New(); PyObject *py_disk_info = NULL; if (py_retdict == NULL) return NULL; kc = kstat_open(); if (kc == NULL) { PyErr_SetFromErrno(PyExc...
0
[ "CWE-415" ]
psutil
7d512c8e4442a896d56505be3e78f1156f443465
240,673,103,024,276,720,000,000,000,000,000,000,000
52
Use Py_CLEAR instead of Py_DECREF to also set the variable to NULL (#1616) These files contain loops that convert system data into python objects and during the process they create objects and dereference their refcounts after they have been added to the resulting list. However, in case of errors during the creat...
static int jpc_dec_tileinit(jpc_dec_t *dec, jpc_dec_tile_t *tile) { jpc_dec_tcomp_t *tcomp; int compno; int rlvlno; jpc_dec_rlvl_t *rlvl; jpc_dec_band_t *band; jpc_dec_prc_t *prc; int bndno; jpc_tsfb_band_t *bnd; int bandno; jpc_dec_ccp_t *ccp; int prccnt; jpc_dec_cblk_t *cblk; int cblkcnt; uint_fast32_t ...
0
[ "CWE-476" ]
jasper
69a1439a5381e42b06ec6a06ed2675eb793babee
228,370,315,124,015,570,000,000,000,000,000,000,000
282
The member (pi) in tiles was not properly initialized. This is now corrected. Also, each tile is now only cleaned up once.
static int _TS_RESP_verify_token(TS_VERIFY_CTX *ctx, PKCS7 *token, TS_TST_INFO *tst_info) { X509 *signer = NULL; GENERAL_NAME *tsa_name = TS_TST_INFO_get_tsa(tst_info); X509_ALGOR *md_alg = NULL; unsigned char *imprint = NULL; unsigned imprint_len = 0; int ret = 0; /* Verify the signature. */ if ((ctx->...
0
[]
openssl
c7235be6e36c4bef84594aa3b2f0561db84b63d8
156,797,182,484,585,460,000,000,000,000,000,000,000
70
RFC 3161 compliant time stamp request creation, response generation and response verification. Submitted by: Zoltan Glozik <zglozik@opentsa.org> Reviewed by: Ulf Moeller
bool Magick::Image::setColorMetric(const Image &reference_) { bool status; Image ref=reference_; GetPPException; modifyImage(); status=static_cast<bool>(SetImageColorMetric(image(),ref.constImage(), exceptionInfo)); ThrowImageException; return(status); }
0
[ "CWE-416" ]
ImageMagick
8c35502217c1879cb8257c617007282eee3fe1cc
60,949,699,104,621,780,000,000,000,000,000,000,000
15
Added missing return to avoid use after free.
GF_Err gf_isom_rtp_packet_set_flags(GF_ISOFile *the_file, u32 trackNumber, u8 PackingBit, u8 eXtensionBit, u8 MarkerBit, u8 disposable_packet, ...
0
[ "CWE-787" ]
gpac
86c1566f040b2b84c72afcb6cbd444c5aff56cfe
293,453,141,137,838,700,000,000,000,000,000,000,000
31
fixed #1894
add_account_key_values (GoaOAuthProvider *provider, GVariantBuilder *builder) { g_variant_builder_add (builder, "{ss}", "MailEnabled", "true"); g_variant_builder_add (builder, "{ss}", "CalendarEnabled", "true"); g_variant_builder_add (builder, "{ss}", "ContactsEnabled", "true"); g_var...
0
[ "CWE-310" ]
gnome-online-accounts
ecad8142e9ac519b9fc74b96dcb5531052bbffe1
224,004,053,586,748,480,000,000,000,000,000,000,000
9
Guard against invalid SSL certificates None of the branded providers (eg., Google, Facebook and Windows Live) should ever have an invalid certificate. So set "ssl-strict" on the SoupSession object being used by GoaWebView. Providers like ownCloud and Exchange might have to deal with certificates that are not up to th...
static int TIFFWriteDirectoryTagFloatArray(TIFF* tif, uint32* ndir, TIFFDirEntry* dir, uint16 tag, uint32 count, float* value) { if (dir==NULL) { (*ndir)++; return(1); } return(TIFFWriteDirectoryTagCheckedFloatArray(tif,ndir,dir,tag,count,value)); }
0
[ "CWE-617" ]
libtiff
de144fd228e4be8aa484c3caf3d814b6fa88c6d9
288,925,666,584,003,500,000,000,000,000,000,000,000
9
TIFFWriteDirectorySec: avoid assertion. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2795. CVE-2018-10963
ves_icall_Type_MakeGenericType (MonoReflectionType *type, MonoArray *type_array) { MonoClass *class; MonoType *geninst, **types; int i, count; MONO_ARCH_SAVE_REGS; count = mono_array_length (type_array); types = g_new0 (MonoType *, count); for (i = 0; i < count; i++) { MonoReflectionType *t = mono_array_get...
0
[ "CWE-264" ]
mono
035c8587c0d8d307e45f1b7171a0d337bb451f1e
180,531,560,871,319,800,000,000,000,000,000,000,000
29
Allow only primitive types/enums in RuntimeHelpers.InitializeArray ().
prepare_repo_download_targets(LrHandle *handle, LrYumRepo *repo, LrYumRepoMd *repomd, LrMetadataTarget *mdtarget, GSList **targets, GSList **cbdata_list, ...
1
[ "CWE-22" ]
librepo
7daea2a2429a54dad68b1de9b37a5f65c5cf2600
130,004,621,016,105,400,000,000,000,000,000,000,000
108
Validate path read from repomd.xml (RhBug:1868639) = changelog = msg: Validate path read from repomd.xml type: security resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1868639
PosibErr<void> Config::commit_all(Vector<int> * phs, const char * codeset) { committed_ = true; others_ = first_; first_ = 0; insert_point_ = &first_; Conv to_utf8; if (codeset) RET_ON_ERR(to_utf8.setup(*this, codeset, "utf-8", NormTo)); while (others_) { *insert_point_ = oth...
0
[ "CWE-125" ]
aspell
80fa26c74279fced8d778351cff19d1d8f44fe4e
147,936,931,143,084,280,000,000,000,000,000,000,000
20
Fix various bugs found by OSS-Fuze.
void perf_event_disable(struct perf_event *event) { struct perf_event_context *ctx; ctx = perf_event_ctx_lock(event); _perf_event_disable(event); perf_event_ctx_unlock(event, ctx); }
0
[ "CWE-284", "CWE-264" ]
linux
f63a8daa5812afef4f06c962351687e1ff9ccb2b
76,376,496,925,004,570,000,000,000,000,000,000,000
8
perf: Fix event->ctx locking There have been a few reported issues wrt. the lack of locking around changing event->ctx. This patch tries to address those. It avoids the whole rwsem thing; and while it appears to work, please give it some thought in review. What I did fail at is sensible runtime checks on the use of ...
read_rotation(const char *arg) { int i; if (strcmp(arg, "auto")) { return -1; } i = fz_atoi(arg); i = i % 360; if (i % 90 != 0) { fprintf(stderr, "Ignoring invalid rotation\n"); i = 0; } return i; }
0
[ "CWE-369", "CWE-22" ]
mupdf
22c47acbd52949421f8c7cb46ea1556827d0fcbf
138,582,412,399,876,540,000,000,000,000,000,000,000
20
Bug 704834: Fix division by zero for zero width pages in muraster.
struct crypto_instance *crypto_init( const unsigned char *private_key, unsigned int private_key_len, const char *crypto_cipher_type, const char *crypto_hash_type, void (*log_printf_func) ( int level, int subsys, const char *function, const char *file, int line, ...
0
[ "CWE-190" ]
corosync
fc1d5418533c1faf21616b282c2559bed7d361c4
197,387,553,211,104,670,000,000,000,000,000,000,000
46
totemcrypto: Check length of the packet Packet has to be longer than crypto_config_header and hash_len, otherwise unallocated memory is passed into calculate_nss_hash function, what may result in crash. Signed-off-by: Jan Friesse <jfriesse@redhat.com> Reviewed-by: Raphael Sanchez Prudencio <rasanche@redhat.com> Revie...
spnego_gss_init_sec_context( OM_uint32 *minor_status, gss_cred_id_t claimant_cred_handle, gss_ctx_id_t *context_handle, gss_name_t target_name, gss_OID mech_type, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t input_chan_bindings, gss_buffer_t input_token, gss_OID *actual_...
0
[ "CWE-18", "CWE-763" ]
krb5
b51b33f2bc5d1497ddf5bd107f791c101695000d
181,637,875,626,594,540,000,000,000,000,000,000,000
157
Fix SPNEGO context aliasing bugs [CVE-2015-2695] The SPNEGO mechanism currently replaces its context handle with the mechanism context handle upon establishment, under the assumption that most GSS functions are only called after context establishment. This assumption is incorrect, and can lead to aliasing violations ...
static void list_md_fn(const EVP_MD *m, const char *from, const char *to, void *arg ) { size_t len, n; const char *name, *cp, **seen; struct hstate *hstate = arg; EVP_MD_CTX ctx; u_int digest_len; u_char digest[EVP_MAX_MD_SIZE]; if (!m) return; /* Ignore aliases */ name = EVP_M...
0
[ "CWE-20" ]
ntp
07a5b8141e354a998a52994c3c9cd547927e56ce
274,680,736,833,404,500,000,000,000,000,000,000,000
59
[TALOS-CAN-0063] avoid buffer overrun in ntpq