func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
static void oinf_entry_dump(GF_OperatingPointsInformation *ptr, FILE * trace) { u32 i, count; if (!ptr) { fprintf(trace, "<OperatingPointsInformation scalability_mask=\"Multiview|Spatial scalability|Auxilary|unknown\" num_profile_tier_level=\"\" num_operating_points=\"\" dependency_layers=\"\">\n"); fprintf(tra...
1
[ "CWE-125" ]
gpac
bceb03fd2be95097a7b409ea59914f332fb6bc86
111,747,007,114,405,370,000,000,000,000,000,000,000
79
fixed 2 possible heap overflows (inc. #1088)
static void xemaclite_aligned_read(u32 *src_ptr, u8 *dest_ptr, unsigned length) { u16 *to_u16_ptr, *from_u16_ptr; u32 *from_u32_ptr; u32 align_buffer; from_u32_ptr = src_ptr; to_u16_ptr = (u16 *)dest_ptr; for (; length > 3; length -= 4) { /* Copy each word into the temporary buffer */ align_buffer = ...
0
[ "CWE-703", "CWE-824" ]
linux
d0d62baa7f505bd4c59cd169692ff07ec49dde37
185,949,649,245,631,830,000,000,000,000,000,000,000
33
net: xilinx_emaclite: Do not print real IOMEM pointer Printing kernel pointers is discouraged because they might leak kernel memory layout. This fixes smatch warning: drivers/net/ethernet/xilinx/xilinx_emaclite.c:1191 xemaclite_of_probe() warn: argument 4 to %08lX specifier is cast from pointer Signed-off-by: YueH...
static const char *set_limit_req_fields(cmd_parms *cmd, void *dummy, const char *arg) { const char *err = ap_check_cmd_context(cmd, NOT_IN_DIR_LOC_FILE); int lim; if (err != NULL) { return err; } lim = atoi(arg); if (lim < 0) { return apr...
0
[ "CWE-416", "CWE-284" ]
httpd
4cc27823899e070268b906ca677ee838d07cf67a
314,223,588,576,689,940,000,000,000,000,000,000,000
20
core: Disallow Methods' registration at run time (.htaccess), they may be used only if registered at init time (httpd.conf). Calling ap_method_register() in children processes is not the right scope since it won't be shared for all requests. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1807655 13f7...
is_prefetch(struct pt_regs *regs, unsigned long error_code, unsigned long addr) { unsigned char *max_instr; unsigned char *instr; int prefetch = 0; /* * If it was a exec (instruction fetch) fault on NX page, then * do not ignore the fault: */ if (error_code & PF_INSTR) return 0; instr = (void *)convert_...
0
[ "CWE-264" ]
linux
548acf19234dbda5a52d5a8e7e205af46e9da840
38,502,237,338,492,680,000,000,000,000,000,000,000
32
x86/mm: Expand the exception table logic to allow new handling options Huge amounts of help from Andy Lutomirski and Borislav Petkov to produce this. Andy provided the inspiration to add classes to the exception table with a clever bit-squeezing trick, Boris pointed out how much cleaner it would all be if we just had...
static int getScreenRows(void) { int rows; #ifdef _WIN32 CONSOLE_SCREEN_BUFFER_INFO inf; GetConsoleScreenBufferInfo(GetStdHandle(STD_OUTPUT_HANDLE), &inf); rows = 1 + inf.srWindow.Bottom - inf.srWindow.Top; #else struct winsize ws; rows = (ioctl(1, TIOCGWINSZ, &ws) == -1) ? 24 : ws.ws_row; #endi...
0
[ "CWE-200" ]
mongo
035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
1,065,513,099,925,044,200,000,000,000,000,000,000
12
SERVER-25335 avoid group and other permissions when creating .dbshell history file
static int create_intf_ep_devs(struct usb_interface *intf) { struct usb_device *udev = interface_to_usbdev(intf); struct usb_host_interface *alt = intf->cur_altsetting; int i; if (intf->ep_devs_created || intf->unregistering) return 0; for (i = 0; i < alt->desc.bNumEndpoints; ++i) (void) usb_create_ep_devs(&...
0
[ "CWE-119", "CWE-787" ]
linux
2e1c42391ff2556387b3cb6308b24f6f65619feb
104,488,507,817,943,160,000,000,000,000,000,000,000
14
USB: core: harden cdc_parse_cdc_header Andrey Konovalov reported a possible out-of-bounds problem for the cdc_parse_cdc_header function. He writes: It looks like cdc_parse_cdc_header() doesn't validate buflen before accessing buffer[1], buffer[2] and so on. The only check present is while (buflen > 0). So fix thi...
i915_gem_execbuffer_relocate_slow(struct drm_device *dev, struct drm_i915_gem_execbuffer2 *args, struct drm_file *file, struct intel_ring_buffer *ring, struct eb_objects *eb, struct drm_i915_gem_exec_object2 *exec) { struct drm_i915_gem_relocation_entry *reloc; struct drm_i915_gem_object...
0
[]
linux
3118a4f652c7b12c752f3222af0447008f9b2368
161,462,639,685,411,500,000,000,000,000,000,000,000
112
drm/i915: bounds check execbuffer relocation count It is possible to wrap the counter used to allocate the buffer for relocation copies. This could lead to heap writing overflows. CVE-2013-0913 v3: collapse test, improve comment v2: move check into validate_exec_list Signed-off-by: Kees Cook <keescook@chromium.org>...
repodata_key2id(Repodata *data, Repokey *key, int create) { Id keyid; for (keyid = 1; keyid < data->nkeys; keyid++) if (data->keys[keyid].name == key->name && data->keys[keyid].type == key->type) { if ((key->type == REPOKEY_TYPE_CONSTANT || key->type == REPOKEY_TYPE_CONSTANTID) && key->size != da...
0
[ "CWE-125" ]
libsolv
fdb9c9c03508990e4583046b590c30d958f272da
224,303,383,713,631,600,000,000,000,000,000,000,000
27
repodata_schema2id: fix heap-buffer-overflow in memcmp When the length of last schema in data->schemadata is less than length of input schema, we got a read overflow in asan test. Signed-off-by: Zhipeng Xie <xiezhipeng1@huawei.com>
static char *SanitizeDelegateString(const char *source) { char *sanitize_source; const char *q; register char *p; static char #if defined(MAGICKCORE_WINDOWS_SUPPORT) whitelist[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 " "$-_.+!;*(),{}|^~[]`\'><#%/?:@&="; ...
0
[ "CWE-91" ]
ImageMagick
89a1c73ee2693ded91a72d00bdf3aba410f349f1
277,350,330,394,831,500,000,000,000,000,000,000,000
29
fix shell injection vulnerability via the -authenticate option
float MSG_ReadDeltaKeyFloat( msg_t *msg, int key, float oldV ) { if ( MSG_ReadBits( msg, 1 ) ) { floatint_t fi; fi.i = MSG_ReadBits( msg, 32 ) ^ key; return fi.f; } return oldV; }
0
[ "CWE-119" ]
ioq3
d2b1d124d4055c2fcbe5126863487c52fd58cca1
248,113,198,696,820,500,000,000,000,000,000,000,000
9
Fix/improve buffer overflow in MSG_ReadBits/MSG_WriteBits Prevent reading past end of message in MSG_ReadBits. If read past end of msg->data buffer (16348 bytes) the engine could SEGFAULT. Make MSG_WriteBits use an exact buffer overflow check instead of possibly failing with a few bytes left.
static inline unsigned long intel_iommu_get_pts(struct device *dev) { int pts, max_pasid; max_pasid = intel_pasid_get_dev_max_id(dev); pts = find_first_bit((unsigned long *)&max_pasid, MAX_NR_PASID_BITS); if (pts < 5) return 0; return pts - 5; }
0
[]
linux
fb58fdcd295b914ece1d829b24df00a17a9624bc
182,653,945,883,439,700,000,000,000,000,000,000,000
11
iommu/vt-d: Do not enable ATS for untrusted devices Currently Linux automatically enables ATS (Address Translation Service) for any device that supports it (and IOMMU is turned on). ATS is used to accelerate DMA access as the device can cache translations locally so there is no need to do full translation on IOMMU sid...
static void setProtocolError(redisClient *c, int pos) { c->flags |= REDIS_CLOSE_AFTER_REPLY; c->querybuf = sdsrange(c->querybuf,pos,-1); }
0
[ "CWE-20" ]
redis
697af434fbeb2e3ba2ba9687cd283ed1a2734fa5
172,305,850,914,304,800,000,000,000,000,000,000,000
4
initial changes needed to turn the current VM code into a cache system. Tons of work to do still.
njs_string_prototype_to_string(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, njs_index_t unused) { njs_int_t ret; njs_str_t enc, str; njs_value_t value; njs_string_prop_t string; ret = njs_string_prototype_value_of(vm, args, nargs, unused); if (njs_slow_path(r...
0
[]
njs
36f04a3178fcb6da8513cc3dbf35215c2a581b3f
52,355,250,705,672,480,000,000,000,000,000,000,000
45
Fixed String.prototype.replace() with byte strings. This closes #522 issue on Github.
static bool rbd_img_advance(struct rbd_img_request *img_req, int *result) { struct rbd_device *rbd_dev = img_req->rbd_dev; int ret; again: switch (img_req->state) { case RBD_IMG_START: rbd_assert(!*result); ret = rbd_img_exclusive_lock(img_req); if (ret < 0) { *result = ret; return true; } img_req...
0
[ "CWE-863" ]
linux
f44d04e696feaf13d192d942c4f14ad2e117065a
47,108,443,483,325,315,000,000,000,000,000,000,000
44
rbd: require global CAP_SYS_ADMIN for mapping and unmapping It turns out that currently we rely only on sysfs attribute permissions: $ ll /sys/bus/rbd/{add*,remove*} --w------- 1 root root 4096 Sep 3 20:37 /sys/bus/rbd/add --w------- 1 root root 4096 Sep 3 20:37 /sys/bus/rbd/add_single_major --w------- 1 ro...
bool is_sameXZC(const CImg<t>& img) const { return is_sameXZC(img._width,img._depth,img._spectrum); }
0
[ "CWE-770" ]
cimg
619cb58dd90b4e03ac68286c70ed98acbefd1c90
270,372,219,424,007,870,000,000,000,000,000,000,000
3
CImg<>::load_bmp() and CImg<>::load_pandore(): Check that dimensions encoded in file does not exceed file size.
GC_API void GC_CALL GC_set_full_freq(int value) { GC_ASSERT(value >= 0); GC_full_freq = value; }
0
[ "CWE-119" ]
bdwgc
7292c02fac2066d39dd1bcc37d1a7054fd1e32ee
334,554,957,574,422,300,000,000,000,000,000,000,000
5
Fix malloc routines to prevent size value wrap-around See issue #135 on Github. * allchblk.c (GC_allochblk, GC_allochblk_nth): Use OBJ_SZ_TO_BLOCKS_CHECKED instead of OBJ_SZ_TO_BLOCKS. * malloc.c (GC_alloc_large): Likewise. * alloc.c (GC_expand_hp_inner): Type of "bytes" local variable changed from word to size_t; ca...
static bool get_uuid_le(const uint8_t *uuid, size_t len, bt_uuid_t *out_uuid) { uint128_t u128; switch (len) { case 2: bt_uuid16_create(out_uuid, get_le16(uuid)); return true; case 16: bswap_128(uuid, &u128.data); bt_uuid128_create(out_uuid, u128); return true; default: return false; } return false...
0
[ "CWE-287" ]
bluez
00da0fb4972cf59e1c075f313da81ea549cb8738
3,645,621,195,650,842,000,000,000,000,000,000,000
18
shared/gatt-server: Fix not properly checking for secure flags When passing the mask to check_permissions all valid permissions for the operation must be set including BT_ATT_PERM_SECURE flags.
int HevcSpsUnit::deserialize() { int rez = HevcUnit::deserialize(); if (rez) return rez; try { vps_id = m_reader.getBits(4); int max_sub_layers_minus1 = m_reader.getBits(3); if (max_sub_layers_minus1 > 6) return 1; max_sub_layers = max_sub_layers_minus...
1
[ "CWE-22" ]
tsMuxer
3763dd34755a8944d903aa19578fa22cd3734165
242,046,294,508,713,500,000,000,000,000,000,000,000
161
Fix Buffer Overflow Fixes issue #509.
static int parse_playlist(HLSContext *c, const char *url, struct playlist *pls, AVIOContext *in) { int ret = 0, is_segment = 0, is_variant = 0; int64_t duration = 0; enum KeyType key_type = KEY_NONE; uint8_t iv[16] = ""; int has_iv = 0; char key[MAX_URL_SIZE] = ""; ...
0
[ "CWE-703", "CWE-835" ]
FFmpeg
7ec414892ddcad88313848494b6fc5f437c9ca4a
155,471,044,621,754,180,000,000,000,000,000,000,000
203
avformat/hls: Fix DoS due to infinite loop Fixes: loop.m3u The default max iteration count of 1000 is arbitrary and ideas for a better solution are welcome Found-by: Xiaohei and Wangchu from Alibaba Security Team Previous version reviewed-by: Steven Liu <lingjiujianke@gmail.com> Signed-off-by: Michael Niedermayer <...
static ssize_t rbd_cluster_fsid_show(struct device *dev, struct device_attribute *attr, char *buf) { struct rbd_device *rbd_dev = dev_to_rbd_dev(dev); return sprintf(buf, "%pU\n", &rbd_dev->rbd_client->client->fsid); }
0
[ "CWE-863" ]
linux
f44d04e696feaf13d192d942c4f14ad2e117065a
237,551,849,161,164,480,000,000,000,000,000,000,000
7
rbd: require global CAP_SYS_ADMIN for mapping and unmapping It turns out that currently we rely only on sysfs attribute permissions: $ ll /sys/bus/rbd/{add*,remove*} --w------- 1 root root 4096 Sep 3 20:37 /sys/bus/rbd/add --w------- 1 root root 4096 Sep 3 20:37 /sys/bus/rbd/add_single_major --w------- 1 ro...
static int sched_rt_global_constraints(void) { unsigned long flags; int i; if (sysctl_sched_rt_period <= 0) return -EINVAL; /* * There's always some RT tasks in the root group * -- migration, kstopmachine etc.. */ if (sysctl_sched_rt_runtime == 0) return -EBUSY; raw_spin_lock_irqsave(&def_rt_bandwidt...
0
[ "CWE-703", "CWE-835" ]
linux
f26f9aff6aaf67e9a430d16c266f91b13a5bff64
282,430,891,246,413,800,000,000,000,000,000,000,000
27
Sched: fix skip_clock_update optimization idle_balance() drops/retakes rq->lock, leaving the previous task vulnerable to set_tsk_need_resched(). Clear it after we return from balancing instead, and in setup_thread_stack() as well, so no successfully descheduled or never scheduled task has it set. Need resched confus...
static MagickBooleanType DrawDashPolygon(const DrawInfo *draw_info, const PrimitiveInfo *primitive_info,Image *image,ExceptionInfo *exception) { DrawInfo *clone_info; double length, maximum_length, offset, scale, total_length; MagickStatusType status; PrimitiveInfo *dash_pol...
1
[ "CWE-399", "CWE-119" ]
ImageMagick
726812fa2fa7ce16bcf58f6e115f65427a1c0950
194,507,296,591,147,230,000,000,000,000,000,000,000
141
Prevent buffer overflow in magick/draw.c
static int dualshock4_get_calibration_data(struct sony_sc *sc) { u8 *buf; int ret; short gyro_pitch_bias, gyro_pitch_plus, gyro_pitch_minus; short gyro_yaw_bias, gyro_yaw_plus, gyro_yaw_minus; short gyro_roll_bias, gyro_roll_plus, gyro_roll_minus; short gyro_speed_plus, gyro_speed_minus; short acc_x_plus, acc_x_...
0
[ "CWE-787" ]
linux
d9d4b1e46d9543a82c23f6df03f4ad697dab361b
263,427,676,764,717,770,000,000,000,000,000,000,000
139
HID: Fix assumption that devices have inputs The syzbot fuzzer found a slab-out-of-bounds write bug in the hid-gaff driver. The problem is caused by the driver's assumption that the device must have an input report. While this will be true for all normal HID input devices, a suitably malicious device can violate the...
static int tcp_v6_md5_hash_skb(char *md5_hash, const struct tcp_md5sig_key *key, const struct sock *sk, const struct sk_buff *skb) { const struct in6_addr *saddr, *daddr; struct tcp_md5sig_pool *hp; struct ahash_request *req; const struct tcphdr *th = tcp_hdr(skb); if (sk) { /* valid...
0
[]
linux
1d2f7b2d956e242179aaf4a08f3545f99c81f9a3
2,244,663,511,931,433,200,000,000,000,000,000,000
48
net: ipv6: tcp reset, icmp need to consider L3 domain Responses for packets to unused ports are getting lost with L3 domains. IPv4 has ip_send_unicast_reply for sending TCP responses which accounts for L3 domains; update the IPv6 counterpart tcp_v6_send_response. For icmp the L3 master check needs to be moved up in i...
static int cr_interception(struct vcpu_svm *svm) { int reg, cr; unsigned long val; int err; if (!static_cpu_has(X86_FEATURE_DECODEASSISTS)) return emulate_on_interception(svm); if (unlikely((svm->vmcb->control.exit_info_1 & CR_VALID) == 0)) return emulate_on_interception(svm); reg = svm->vmcb->control.exit...
0
[ "CWE-200", "CWE-399" ]
linux
cbdb967af3d54993f5814f1cee0ed311a055377d
229,355,021,302,351,820,000,000,000,000,000,000,000
72
KVM: svm: unconditionally intercept #DB This is needed to avoid the possibility that the guest triggers an infinite stream of #DB exceptions (CVE-2015-8104). VMX is not affected: because it does not save DR6 in the VMCS, it already intercepts #DB unconditionally. Reported-by: Jan Beulich <jbeulich@suse.com> Cc: stab...
njs_module_require(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, njs_index_t unused) { njs_int_t ret; njs_str_t name; njs_mod_t *module; njs_value_t *path; if (nargs < 2) { njs_type_error(vm, "missing path"); return NJS_ERROR; } path = njs_argument(args, ...
0
[ "CWE-787" ]
njs
ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1
51,576,332,723,935,090,000,000,000,000,000,000,000
32
Fixed typo while calculating module path length. The issue was introduced in 77c398f26d7e (not released yet).
static inline bool fuse_page_is_writeback(struct inode *inode, pgoff_t index) { return fuse_range_is_writeback(inode, index, index); }
0
[ "CWE-459" ]
linux
5d069dbe8aaf2a197142558b6fb2978189ba3454
336,281,039,598,418,200,000,000,000,000,000,000,000
4
fuse: fix bad inode Jan Kara's analysis of the syzbot report (edited): The reproducer opens a directory on FUSE filesystem, it then attaches dnotify mark to the open directory. After that a fuse_do_getattr() call finds that attributes returned by the server are inconsistent, and calls make_bad_inode() which,...
static int cm_init_qp_rtr_attr(struct cm_id_private *cm_id_priv, struct ib_qp_attr *qp_attr, int *qp_attr_mask) { unsigned long flags; int ret; spin_lock_irqsave(&cm_id_priv->lock, flags); switch (cm_id_priv->id.state) { case IB_CM_REQ_RCVD: case IB_CM_MRA_REQ_SENT: case IB_CM_REP_RCVD: cas...
0
[ "CWE-20" ]
linux
b2853fd6c2d0f383dbdf7427e263eb576a633867
133,492,366,591,773,000,000,000,000,000,000,000,000
72
IB/core: Don't resolve passive side RoCE L2 address in CMA REQ handler The code that resolves the passive side source MAC within the rdma_cm connection request handler was both redundant and buggy, so remove it. It was redundant since later, when an RC QP is modified to RTR state, the resolution will take place in th...
DeepTiledInputFile::readPixelSampleCount (int dx, int dy, int l) { readPixelSampleCount (dx, dy, l, l); }
0
[ "CWE-125" ]
openexr
e79d2296496a50826a15c667bf92bdc5a05518b4
177,597,755,876,207,900,000,000,000,000,000,000,000
4
fix memory leaks and invalid memory accesses Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
static void bnx2x_init_fcoe_fp(struct bnx2x *bp) { struct bnx2x_fastpath *fp = bnx2x_fcoe_fp(bp); unsigned long q_type = 0; bnx2x_fcoe(bp, rx_queue) = BNX2X_NUM_ETH_QUEUES(bp); bnx2x_fcoe(bp, cl_id) = bnx2x_cnic_eth_cl_id(bp, BNX2X_FCOE_ETH_CL_ID_IDX); bnx2x_fcoe(bp, cid) = BNX2X_FCOE_ETH_CID(bp); bnx...
0
[ "CWE-20" ]
linux
8914a595110a6eca69a5e275b323f5d09e18f4f9
75,095,534,770,284,830,000,000,000,000,000,000,000
40
bnx2x: disable GSO where gso_size is too big for hardware If a bnx2x card is passed a GSO packet with a gso_size larger than ~9700 bytes, it will cause a firmware error that will bring the card down: bnx2x: [bnx2x_attn_int_deasserted3:4323(enP24p1s0f0)]MC assert! bnx2x: [bnx2x_mc_assert:720(enP24p1s0f0)]XSTORM_ASSERT...
//! Fill sequentially all pixel values with specified values \overloading. CImg<T>& fill(const T& val0, const T& val1, const T& val2, const T& val3, const T& val4, const T& val5, const T& val6, const T& val7, const T& val8, const T& val9, const T& val10) { if (is_empty()) return *this; ...
0
[ "CWE-125" ]
CImg
10af1e8c1ad2a58a0a3342a856bae63e8f257abb
62,753,775,506,098,720,000,000,000,000,000,000,000
24
Fix other issues in 'CImg<T>::load_bmp()'.
char opening_bracket_for(char closing_bracket) { switch (closing_bracket) { case ')': return '('; case ']': return '['; case '}': return '{'; default: return '\0'; } }
0
[ "CWE-674" ]
libsass
f2db04883e5fff4e03777dcc1eb60d4373c45be1
4,113,609,093,783,297,400,000,000,000,000,000,000
8
Make `parse_css_variable_value` non-recursive Fixes #2658 stack overflow
static int do_job(blosc2_context* context) { int32_t ntbytes; /* Set sentinels */ context->dref_not_init = 1; /* Check whether we need to restart threads */ check_nthreads(context); /* Run the serial version when nthreads is 1 or when the buffers are not larger than blocksize */ if (context->nthre...
0
[ "CWE-787" ]
c-blosc2
c4c6470e88210afc95262c8b9fcc27e30ca043ee
189,878,750,383,948,850,000,000,000,000,000,000,000
28
Fixed asan heap buffer overflow when not enough space to write compressed block size.
command_forward_key_event (Fep *fep, FepControlMessage *request) { uint32_t keyval, modifiers; if (_fep_control_message_read_uint32_arg (request, 0, &keyval) == 0 && _fep_control_message_read_uint32_arg (request, 1, &modifiers) == 0) { size_t length; char *data = _fep_key_to_string (keyv...
0
[ "CWE-264" ]
libfep
293d9d3f7565f01a9dc40b53259886832eaa2ace
79,468,173,455,260,360,000,000,000,000,000,000,000
16
Don't use abstract Unix domain sockets
void ip6_input(struct mbuf *m) { struct ip6 *ip6; Slirp *slirp = m->slirp; if (!slirp->in6_enabled) { goto bad; } DEBUG_CALL("ip6_input"); DEBUG_ARG("m = %p", m); DEBUG_ARG("m_len = %d", m->m_len); if (m->m_len < sizeof(struct ip6)) { goto bad; } ip6 = mtod(m,...
1
[ "CWE-125" ]
libslirp
c7ede54cbd2e2b25385325600958ba0124e31cc0
209,410,218,731,375,640,000,000,000,000,000,000,000
55
Drop bogus IPv6 messages Drop IPv6 message shorter than what's mentioned in the payload length header (+ the size of the IPv6 header). They're invalid an could lead to data leakage in icmp6_send_echoreply().
static string openssl_HMACsha256(const void *key, size_t key_len, const void *data, size_t data_len){ std::shared_ptr<char> out(new char[32], [](char *ptr) { delete[] ptr; }); unsigned int out_len; #if defined(OPENSSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER > 0x10100000L) //openssl 1.1.0新增api,老版本api作废 ...
0
[ "CWE-703" ]
ZLMediaKit
7d8b212a3c3368bc2f6507cb74664fc419eb9327
214,302,940,158,495,740,000,000,000,000,000,000,000
23
修复rtmp汇报窗口太小导致循环递归的bug:#1839
u64 current_tick_length(void) { return tick_length; }
0
[ "CWE-189" ]
linux
f8bd2258e2d520dff28c855658bd24bdafb5102d
307,823,112,860,531,700,000,000,000,000,000,000,000
4
remove div_long_long_rem x86 is the only arch right now, which provides an optimized for div_long_long_rem and it has the downside that one has to be very careful that the divide doesn't overflow. The API is a little akward, as the arguments for the unsigned divide are signed. The signed version also doesn't handle ...
void *php_stream_xmlIO_open_wrapper(const char *filename) { TSRMLS_FETCH(); return php_stream_open_wrapper((char*)filename, "rb", ENFORCE_SAFE_MODE|REPORT_ERRORS, NULL); }
0
[ "CWE-200" ]
php-src
afe98b7829d50806559acac9b530acb8283c3bf4
316,884,937,486,201,230,000,000,000,000,000,000,000
5
Disabled external entities loading
Mat_VarReadNext( mat_t *mat ) { long fpos = 0; matvar_t *matvar = NULL; if ( mat->version != MAT_FT_MAT73 ) { if ( feof((FILE *)mat->fp) ) return NULL; /* Read position so we can reset the file position if an error occurs */ fpos = ftell((FILE*)mat->fp); if ( fpo...
0
[ "CWE-401" ]
matio
a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3
238,640,860,909,368,100,000,000,000,000,000,000,000
28
Fix memory leak As reported by https://github.com/tbeu/matio/issues/131
static inline int try_force_unload(unsigned int flags) { int ret = (flags & O_TRUNC); if (ret) add_taint(TAINT_FORCED_RMMOD, LOCKDEP_NOW_UNRELIABLE); return ret; }
0
[ "CWE-362", "CWE-347" ]
linux
0c18f29aae7ce3dadd26d8ee3505d07cc982df75
304,877,276,290,614,940,000,000,000,000,000,000,000
7
module: limit enabling module.sig_enforce Irrespective as to whether CONFIG_MODULE_SIG is configured, specifying "module.sig_enforce=1" on the boot command line sets "sig_enforce". Only allow "sig_enforce" to be set when CONFIG_MODULE_SIG is configured. This patch makes the presence of /sys/module/module/parameters/s...
size_t strlens(const char *last, ...) { va_list ap; size_t ret = 0; const char *str; va_start(ap, last); for (str = last; str != NULL; str = va_arg(ap, const char *)) ret += strlen(str); va_end(ap); return (ret); }
0
[ "CWE-476" ]
cronie
a6576769f01325303b11edc3e0cfb05ef382ce56
67,473,867,768,262,040,000,000,000,000,000,000,000
11
Fix CVE-2019-9704 and CVE-2019-9705 The users can cause DoS of the crond by loading huge crontab files. We now allow maximum 1000 environment variables and 1000 crontab entries. Also the comments and whitespace between the entries and variables are now limited to 32768 characters.
static void buffer_verify(ssh_buffer buf) { bool do_abort = false; if (buf->data == NULL) { return; } if (buf->used > buf->allocated) { fprintf(stderr, "BUFFER ERROR: allocated %zu, used %zu\n", buf->allocated, buf->used); do_abor...
0
[ "CWE-476" ]
libssh-mirror
10b3ebbe61a7031a3dae97f05834442220447181
201,596,289,800,580,000,000,000,000,000,000,000,000
33
buffer: Reformat ssh_buffer_add_data() Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
GF_Err sdtp_box_write(GF_Box *s, GF_BitStream *bs) { GF_Err e; GF_SampleDependencyTypeBox *ptr = (GF_SampleDependencyTypeBox *)s; e = gf_isom_full_box_write(s, bs); if (e) return e; gf_bs_write_data(bs, (char*)ptr->sample_info, ptr->sampleCount); return GF_OK;
0
[ "CWE-787" ]
gpac
388ecce75d05e11fc8496aa4857b91245007d26e
52,598,709,367,785,860,000,000,000,000,000,000,000
9
fixed #1587
static void ioat1_reset_channel(struct ioat_dma_chan *ioat) { struct ioat_chan_common *chan = &ioat->base; void __iomem *reg_base = chan->reg_base; u32 chansts, chanerr; dev_warn(to_dev(chan), "reset\n"); chanerr = readl(reg_base + IOAT_CHANERR_OFFSET); chansts = *chan->completion & IOAT_CHANSTS_STATUS; if (cha...
0
[]
linux
7bced397510ab569d31de4c70b39e13355046387
262,168,396,125,714,560,000,000,000,000,000,000,000
30
net_dma: simple removal Per commit "77873803363c net_dma: mark broken" net_dma is no longer used and there is no plan to fix it. This is the mechanical removal of bits in CONFIG_NET_DMA ifdef guards. Reverting the remainder of the net_dma induced changes is deferred to subsequent patches. Marked for stable due to Ro...
Isolate* isolate() const { return isolate_; }
0
[ "CWE-20", "CWE-119" ]
node
530af9cb8e700e7596b3ec812bad123c9fa06356
185,728,135,533,911,500,000,000,000,000,000,000,000
1
v8: Interrupts must not mask stack overflow. Backport of https://codereview.chromium.org/339883002
void __init efi_map_region(efi_memory_desc_t *md) { unsigned long size = md->num_pages << PAGE_SHIFT; u64 pa = md->phys_addr; if (efi_enabled(EFI_OLD_MEMMAP)) return old_map_region(md); /* * Make sure the 1:1 mappings are present as a catch-all for b0rked * firmware which doesn't update all internal pointer...
0
[ "CWE-388" ]
tip
4e78921ba4dd0aca1cc89168f45039add4183f8e
227,163,663,241,842,900,000,000,000,000,000,000,000
50
efi/x86/Add missing error handling to old_memmap 1:1 mapping code The old_memmap flow in efi_call_phys_prolog() performs numerous memory allocations, and either does not check for failure at all, or it does but fails to propagate it back to the caller, which may end up calling into the firmware with an incomplete 1:1 ...
static void tv_details_row_activated( GtkTreeView *tree_view, GtkTreePath *tree_path_UNUSED, GtkTreeViewColumn *column, gpointer user_data) { gchar *item_name; struct problem_item *item = get_cu...
1
[ "CWE-200" ]
libreport
257578a23d1537a2d235aaa2b1488ee4f818e360
271,968,172,777,111,380,000,000,000,000,000,000,000
65
wizard: fix save users changes after reviewing dump dir files If the user reviewed the dump dir's files during reporting the crash, the changes was thrown away and original data was passed to the bugzilla bug report. report-gtk saves the first text view buffer and then reloads data from the reported problem directory...
void kmem_cache_free_bulk(struct kmem_cache *orig_s, size_t size, void **p) { struct kmem_cache *s; size_t i; local_irq_disable(); for (i = 0; i < size; i++) { void *objp = p[i]; if (!orig_s) /* called via kfree_bulk */ s = virt_to_cache(objp); else s = cache_from_obj(orig_s, objp); debug_check_no_...
0
[ "CWE-703" ]
linux
c4e490cf148e85ead0d1b1c2caaba833f1d5b29f
18,567,310,261,817,562,000,000,000,000,000,000,000
24
mm/slab.c: fix SLAB freelist randomization duplicate entries This patch fixes a bug in the freelist randomization code. When a high random number is used, the freelist will contain duplicate entries. It will result in different allocations sharing the same chunk. It will result in odd behaviours and crashes. It sh...
static inline int tcp_skb_pcount(const struct sk_buff *skb) { return TCP_SKB_CB(skb)->tcp_gso_segs; }
0
[ "CWE-416", "CWE-269" ]
linux
bb1fceca22492109be12640d49f5ea5a544c6bb4
278,064,766,108,863,330,000,000,000,000,000,000,000
4
tcp: fix use after free in tcp_xmit_retransmit_queue() When tcp_sendmsg() allocates a fresh and empty skb, it puts it at the tail of the write queue using tcp_add_write_queue_tail() Then it attempts to copy user data into this fresh skb. If the copy fails, we undo the work and remove the fresh skb. Unfortunately, t...
static int dct_sad8x8_c(/*MpegEncContext*/ void *c, uint8_t *src1, uint8_t *src2, int stride, int h){ MpegEncContext * const s= (MpegEncContext *)c; LOCAL_ALIGNED_16(int16_t, temp, [64]); av_assert2(h==8); s->dsp.diff_pixels(temp, src1, src2, stride); s->dsp.fdct(temp); return s->dsp.sum_abs_d...
0
[ "CWE-703", "CWE-189" ]
FFmpeg
454a11a1c9c686c78aa97954306fb63453299760
303,667,252,415,377,800,000,000,000,000,000,000,000
10
avcodec/dsputil: fix signedness in sizeof() comparissions Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
static int ZEND_FASTCALL ZEND_BW_OR_SPEC_TMP_TMP_HANDLER(ZEND_OPCODE_HANDLER_ARGS) { zend_op *opline = EX(opline); zend_free_op free_op1, free_op2; bitwise_or_function(&EX_T(opline->result.u.var).tmp_var, _get_zval_ptr_tmp(&opline->op1, EX(Ts), &free_op1 TSRMLS_CC), _get_zval_ptr_tmp(&opline->op2, EX(Ts), &fre...
0
[]
php-src
ce96fd6b0761d98353761bf78d5bfb55291179fd
338,582,741,283,777,480,000,000,000,000,000,000,000
12
- fix #39863, do not accept paths with NULL in them. See http://news.php.net/php.internals/50191, trunk will have the patch later (adding a macro and/or changing (some) APIs. Patch by Rasmus
bool ValidateSEAL() { const byte input[] = {0x37,0xa0,0x05,0x95,0x9b,0x84,0xc4,0x9c,0xa4,0xbe,0x1e,0x05,0x06,0x73,0x53,0x0f,0x5f,0xb0,0x97,0xfd,0xf6,0xa1,0x3f,0xbd,0x6c,0x2c,0xde,0xcd,0x81,0xfd,0xee,0x7c}; const byte key[] = {0x67, 0x45, 0x23, 0x01, 0xef, 0xcd, 0xab, 0x89, 0x98, 0xba, 0xdc, 0xfe, 0x10, 0x32, 0x54,...
0
[ "CWE-190", "CWE-125" ]
cryptopp
07dbcc3d9644b18e05c1776db2a57fe04d780965
124,276,387,752,675,510,000,000,000,000,000,000,000
27
Add Inflator::BadDistanceErr exception (Issue 414) The improved validation and excpetion clears the Address Sanitizer and Undefined Behavior Sanitizer findings
njs_generate_stop_statement_end(njs_vm_t *vm, njs_generator_t *generator, njs_parser_node_t *node) { njs_index_t index; njs_vmcode_stop_t *stop; njs_generate_code(generator, njs_vmcode_stop_t, stop, NJS_VMCODE_STOP, 1, node); index = njs_scope_undefined_index(vm, 0); ...
0
[ "CWE-703", "CWE-754" ]
njs
404553896792b8f5f429dc8852d15784a59d8d3e
20,738,836,692,608,920,000,000,000,000,000,000,000
25
Fixed break instruction in a try-catch block. Previously, JUMP offset for a break instruction inside a try-catch block was not set to a correct offset during code generation when a return instruction was present in inner try-catch block. The fix is to update the JUMP offset appropriately. This closes #553 issue on G...
static inline void r_write_at_be64(void *dest, ut64 val, size_t offset) { ut8 *d = (ut8*)dest + offset; r_write_be64 (d, val); }
0
[ "CWE-476" ]
radare2
1ea23bd6040441a21fbcfba69dce9a01af03f989
321,784,299,382,821,230,000,000,000,000,000,000,000
4
Fix #6816 - null deref in r_read_*
static Fixed lsr_translate_coords(GF_LASeRCodec *lsr, u32 val, u32 nb_bits) { #ifdef GPAC_FIXED_POINT if (val >> (nb_bits-1) ) { s32 neg = (s32) val - (1<<nb_bits); if (neg < -FIX_ONE / 2) return 2 * gf_divfix(INT2FIX(neg/2), lsr->res_factor); return gf_divfix(INT2FIX(neg), lsr->res_factor); } else { if (v...
1
[ "CWE-190" ]
gpac
faa75edde3dfeba1e2cf6ffa48e45a50f1042096
274,104,527,853,091,760,000,000,000,000,000,000,000
22
fixed #2213
static struct vfsmount *get_vfsmount_from_fd(int fd) { struct vfsmount *mnt; if (fd == AT_FDCWD) { struct fs_struct *fs = current->fs; spin_lock(&fs->lock); mnt = mntget(fs->pwd.mnt); spin_unlock(&fs->lock); } else { struct fd f = fdget(fd); if (!f.file) return ERR_PTR(-EBADF); mnt = mntget(f.file-...
0
[ "CWE-362" ]
linux
161f873b89136eb1e69477c847d5a5033239d9ba
84,328,797,903,282,120,000,000,000,000,000,000,000
18
vfs: read file_handle only once in handle_to_path We used to read file_handle twice. Once to get the amount of extra bytes, and once to fetch the entire structure. This may be problematic since we do size verifications only after the first read, so if the number of extra bytes changes in userspace between the first ...
static UINT parallel_process_irp_create(PARALLEL_DEVICE* parallel, IRP* irp) { char* path = NULL; int status; WCHAR* ptr; UINT32 PathLength; if (!Stream_SafeSeek(irp->input, 28)) return ERROR_INVALID_DATA; /* DesiredAccess(4) AllocationSize(8), FileAttributes(4) */ /* SharedAccess(4) CreateDisposition(4), Crea...
0
[ "CWE-415", "CWE-125" ]
FreeRDP
795842f4096501fcefc1a7f535ccc8132feb31d7
213,401,734,041,482,680,000,000,000,000,000,000,000
46
Fixed oob read in parallel_process_irp_create
static void dmaengine_destroy_unmap_pool(void) { int i; for (i = 0; i < ARRAY_SIZE(unmap_pool); i++) { struct dmaengine_unmap_pool *p = &unmap_pool[i]; if (p->pool) mempool_destroy(p->pool); p->pool = NULL; if (p->cache) kmem_cache_destroy(p->cache); p->cache = NULL; } }
0
[]
linux
7bced397510ab569d31de4c70b39e13355046387
203,217,284,771,486,000,000,000,000,000,000,000,000
15
net_dma: simple removal Per commit "77873803363c net_dma: mark broken" net_dma is no longer used and there is no plan to fix it. This is the mechanical removal of bits in CONFIG_NET_DMA ifdef guards. Reverting the remainder of the net_dma induced changes is deferred to subsequent patches. Marked for stable due to Ro...
get_permission_from_string (const gchar *permission) { g_return_val_if_fail (permission != NULL, EwsPermissionLevel_Unknown); if (!g_ascii_strcasecmp (permission, "Editor")) return EwsPermissionLevel_Editor; else if (!g_ascii_strcasecmp (permission, "Author")) return EwsPermissionLevel_Author; else if (!g_asci...
0
[ "CWE-295" ]
evolution-ews
915226eca9454b8b3e5adb6f2fff9698451778de
207,433,199,428,557,070,000,000,000,000,000,000,000
16
I#27 - SSL Certificates are not validated This depends on https://gitlab.gnome.org/GNOME/evolution-data-server/commit/6672b8236139bd6ef41ecb915f4c72e2a052dba5 too. Closes https://gitlab.gnome.org/GNOME/evolution-ews/issues/27
int nf_tables_bind_set(const struct nft_ctx *ctx, struct nft_set *set, struct nft_set_binding *binding) { struct nft_set_binding *i; struct nft_set_iter iter; if (set->use == UINT_MAX) return -EOVERFLOW; if (!list_empty(&set->bindings) && nft_set_is_anonymous(set)) return -EBUSY; if (binding->flags...
0
[ "CWE-665" ]
linux
ad9f151e560b016b6ad3280b48e42fa11e1a5440
78,908,215,153,547,090,000,000,000,000,000,000,000
43
netfilter: nf_tables: initialize set before expression setup nft_set_elem_expr_alloc() needs an initialized set if expression sets on the NFT_EXPR_GC flag. Move set fields initialization before expression setup. [4512935.019450] ================================================================== [4512935.019456] BUG: ...
static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) { int i; for (i = npols - 1; i >= 0; --i) xfrm_pol_put(pols[i]); }
0
[ "CWE-416" ]
linux
dbb2483b2a46fbaf833cfb5deb5ed9cace9c7399
236,108,665,424,695,970,000,000,000,000,000,000,000
6
xfrm: clean up xfrm protocol checks In commit 6a53b7593233 ("xfrm: check id proto in validate_tmpl()") I introduced a check for xfrm protocol, but according to Herbert IPSEC_PROTO_ANY should only be used as a wildcard for lookup, so it should be removed from validate_tmpl(). And, IPSEC_PROTO_ANY is expected to only m...
void problem_data_get_osinfo(problem_data_t *problem_data, map_string_t *osinfo) { char *rootdir = problem_data_get_content_or_NULL(problem_data, FILENAME_ROOTDIR); if (rootdir && problem_data_get_osinfo_from_items(problem_data, osinfo, FILENAME_OS_INFO_IN_ROOTDIR, FILENAME_OS_RELEASE_IN...
0
[ "CWE-20" ]
libreport
1951e7282043dfe1268d492aea056b554baedb75
275,795,215,961,952,360,000,000,000,000,000,000,000
11
lib: fix races in dump directory handling code Florian Weimer <fweimer@redhat.com>: dd_opendir() should keep a file handle (opened with O_DIRECTORY) and use openat() and similar functions to access files in it. ... The file system manipulation functions should guard against hard links (check tha...
static ssize_t bmCapabilities_show (struct device *dev, struct device_attribute *attr, char *buf) { struct usb_interface *intf = to_usb_interface(dev); struct acm *acm = usb_get_intfdata(intf); return sprintf(buf, "%d", acm->ctrl_caps); }
0
[ "CWE-416" ]
linux
c52873e5a1ef72f845526d9f6a50704433f9c625
120,989,860,698,625,200,000,000,000,000,000,000,000
8
usb: cdc-acm: make sure a refcount is taken early enough destroy() will decrement the refcount on the interface, so that it needs to be taken so early that it never undercounts. Fixes: 7fb57a019f94e ("USB: cdc-acm: Fix potential deadlock (lockdep warning)") Cc: stable <stable@vger.kernel.org> Reported-and-tested-by: ...
void *UntrustedCacheMalloc::GetBuffer() { void **buffers = nullptr; void *buffer; bool is_pool_empty; { LockGuard spin_lock(&lock_); is_pool_empty = buffer_pool_.empty(); if (is_pool_empty) { buffers = primitives::AllocateUntrustedBuffers(kPoolIncrement, kPoolEntrySize); for (...
0
[ "CWE-200", "CWE-668" ]
asylo
a47ef55db2337d29de19c50cd29b0deb2871d31c
49,646,276,951,412,525,000,000,000,000,000,000,000
32
Fix vulnerability in UntrustedCacheMalloc The pointer array is stored in untrusted memory, so we cannot trust the value even after validation. We should validate the pointer is pointing to untrusted memory after it's stored inside the enclave. PiperOrigin-RevId: 358474391 Change-Id: I63cf6c251bdaf1b491dbf06cc0dcf77f7...
query_info(const unsigned int xid, struct cifs_tcon *tcon, u64 persistent_fid, u64 volatile_fid, u8 info_class, u8 info_type, u32 additional_info, size_t output_len, size_t min_len, void **data, u32 *dlen) { struct smb_rqst rqst; struct smb2_query_info_rsp *rsp = NULL; struct kvec iov[1]; struct kvec rsp_...
0
[ "CWE-416", "CWE-200" ]
linux
6a3eb3360667170988f8a6477f6686242061488a
118,052,510,238,531,370,000,000,000,000,000,000,000
80
cifs: Fix use-after-free in SMB2_write There is a KASAN use-after-free: BUG: KASAN: use-after-free in SMB2_write+0x1342/0x1580 Read of size 8 at addr ffff8880b6a8e450 by task ln/4196 Should not release the 'req' because it will use in the trace. Fixes: eccb4422cf97 ("smb3: Add ftrace tracepoints for improved SMB3 de...
void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl,int type,int val) { return ctx->info_callback; }
0
[]
openssl
edc032b5e3f3ebb1006a9c89e0ae00504f47966f
36,820,124,535,060,408,000,000,000,000,000,000,000
4
Add SRP support.
add_fifo_list (pathname) char *pathname; { if (nfifo >= fifo_list_size - 1) { fifo_list_size += FIFO_INCR; fifo_list = (struct temp_fifo *)xrealloc (fifo_list, fifo_list_size * sizeof (struct temp_fifo)); } fifo_list[nfifo].file = savestring (pathname); nfifo++; }
0
[]
bash
955543877583837c85470f7fb8a97b7aa8d45e6c
88,223,145,861,038,920,000,000,000,000,000,000,000
13
bash-4.4-rc2 release
static int hw_atl_utils_mpi_set_speed(struct aq_hw_s *self, u32 speed) { u32 val = aq_hw_read_reg(self, HW_ATL_MPI_CONTROL_ADR); val = val & ~HW_ATL_MPI_SPEED_MSK; val |= speed << HW_ATL_MPI_SPEED_SHIFT; aq_hw_write_reg(self, HW_ATL_MPI_CONTROL_ADR, val); return 0; }
0
[ "CWE-787" ]
net
b922f622592af76b57cbc566eaeccda0b31a3496
99,925,828,636,705,340,000,000,000,000,000,000,000
10
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait This bug report shows up when running our research tools. The reports is SOOB read, but it seems SOOB write is also possible a few lines below. In details, fw.len and sw.len are inputs coming from io. A len over the size of self->rpc triggers SOOB. The patc...
xdr_krb5_ui_4(XDR *xdrs, krb5_ui_4 *objp) { if (!xdr_u_int32(xdrs, (uint32_t *) objp)) { return (FALSE); } return (TRUE); }
0
[ "CWE-703" ]
krb5
a197e92349a4aa2141b5dff12e9dd44c2a2166e3
191,967,896,140,168,500,000,000,000,000,000,000,000
7
Fix kadm5/gssrpc XDR double free [CVE-2014-9421] [MITKRB5-SA-2015-001] In auth_gssapi_unwrap_data(), do not free partial deserialization results upon failure to deserialize. This responsibility belongs to the callers, svctcp_getargs() and svcudp_getargs(); doing it in the unwrap function results in freeing the result...
DU_cstoreStatusString(Uint16 statusCode) { const char *s = NULL; switch (statusCode) { case STATUS_Success: s = "Success"; break; case STATUS_STORE_Refused_SOPClassNotSupported: s = "Refused: SOPClassNotSupported"; break; case STATUS_STORE_Warning_Coerc...
0
[ "CWE-476", "CWE-787" ]
dcmtk
5c14bf53fb42ceca12bbcc0016e8704b1580920d
155,784,149,184,251,750,000,000,000,000,000,000,000
47
Fixed possible NULL pointer dereference. Thanks to Jinsheng Ba <bajinsheng@u.nus.edu> for the report and patch.
ews_get_junk_folder_sync (CamelStore *store, GCancellable *cancellable, GError **error) { CamelEwsStore *ews_store; CamelFolder *folder = NULL; gchar *folder_id, *folder_name; g_return_val_if_fail (CAMEL_IS_EWS_STORE (store), NULL); ews_store = CAMEL_EWS_STORE ...
0
[ "CWE-295" ]
evolution-ews
915226eca9454b8b3e5adb6f2fff9698451778de
304,054,773,484,624,300,000,000,000,000,000,000,000
33
I#27 - SSL Certificates are not validated This depends on https://gitlab.gnome.org/GNOME/evolution-data-server/commit/6672b8236139bd6ef41ecb915f4c72e2a052dba5 too. Closes https://gitlab.gnome.org/GNOME/evolution-ews/issues/27
void Run() override { SoftmaxImpl(params, input_shape, input_data, output_shape, output_data, start_batch, end_batch); }
0
[ "CWE-476", "CWE-369" ]
tensorflow
15691e456c7dc9bd6be203b09765b063bf4a380c
318,206,013,258,158,000,000,000,000,000,000,000,000
4
Prevent dereferencing of null pointers in TFLite's `add.cc`. PiperOrigin-RevId: 387244946 Change-Id: I56094233327fbd8439b92e1dbb1262176e00eeb9
_equalCreateFunctionStmt(const CreateFunctionStmt *a, const CreateFunctionStmt *b) { COMPARE_SCALAR_FIELD(replace); COMPARE_NODE_FIELD(funcname); COMPARE_NODE_FIELD(parameters); COMPARE_NODE_FIELD(returnType); COMPARE_NODE_FIELD(options); COMPARE_NODE_FIELD(withClause); return true; }
0
[ "CWE-362" ]
postgres
5f173040e324f6c2eebb90d86cf1b0cdb5890f0a
229,320,503,470,497,630,000,000,000,000,000,000,000
11
Avoid repeated name lookups during table and index DDL. If the name lookups come to different conclusions due to concurrent activity, we might perform some parts of the DDL on a different table than other parts. At least in the case of CREATE INDEX, this can be used to cause the permissions checks to be performed aga...
static int dev_cpu_callback(struct notifier_block *nfb, unsigned long action, void *ocpu) { struct sk_buff **list_skb; struct sk_buff *skb; unsigned int cpu, oldcpu = (unsigned long)ocpu; struct softnet_data *sd, *oldsd; if (action != CPU_DEAD && action != CPU_DEAD_FROZEN) return NOTIFY_OK; loc...
0
[ "CWE-400", "CWE-703" ]
linux
fac8e0f579695a3ecbc4d3cac369139d7f819971
289,409,337,001,000,770,000,000,000,000,000,000,000
63
tunnels: Don't apply GRO to multiple layers of encapsulation. When drivers express support for TSO of encapsulated packets, they only mean that they can do it for one layer of encapsulation. Supporting additional levels would mean updating, at a minimum, more IP length fields and they are unaware of this. No encapsul...
static void string_registers_quirk(struct x86_emulate_ctxt *ctxt) { /* * Intel CPUs mask the counter and pointers in quite strange * manner when ECX is zero due to REP-string optimizations. */ #ifdef CONFIG_X86_64 if (ctxt->ad_bytes != 4 || !vendor_intel(ctxt)) return; *reg_write(ctxt, VCPU_REGS_RCX) = 0; ...
0
[ "CWE-284" ]
linux
33ab91103b3415e12457e3104f0e4517ce12d0f3
44,131,251,113,205,680,000,000,000,000,000,000,000
23
KVM: x86: fix emulation of "MOV SS, null selector" This is CVE-2017-2583. On Intel this causes a failed vmentry because SS's type is neither 3 nor 7 (even though the manual says this check is only done for usable SS, and the dmesg splat says that SS is unusable!). On AMD it's worse: svm.c is confused and sets CPL to ...
applet_pre_keyring_callback (gpointer user_data) { NMApplet *applet = NM_APPLET (user_data); GdkScreen *screen; GdkDisplay *display; if (applet->menu && applet->menu->window) { screen = gdk_drawable_get_screen (applet->menu->window); display = gdk_screen_get_display (screen); g_object_ref (display); gtk_w...
0
[ "CWE-200" ]
network-manager-applet
8627880e07c8345f69ed639325280c7f62a8f894
110,106,646,905,092,300,000,000,000,000,000,000,000
40
editor: prevent any registration of objects on the system bus D-Bus access-control is name-based; so requests for a specific name are allowed/denied based on the rules in /etc/dbus-1/system.d. But apparently apps still get a non-named service on the bus, and if we register *any* object even though we don't have a nam...
flush_pkt(void) { DPRINTF(3, ("request: flushing packet, %d items\n", nitems)); /* * Must send the last packet. If nothing in here and nothing * has been sent, send an error saying no data to be found. */ if (seqno == 0 && nitems == 0) req_ack(toaddr, frominter, (struct req_pkt *)&rpkt, INFO_ERR_NODATA);...
0
[ "CWE-190" ]
ntp
c04c3d3d940dfe1a53132925c4f51aef017d2e0f
13,551,804,754,665,669,000,000,000,000,000,000,000
19
[TALOS-CAN-0052] crash by loop counter underrun.
static word32 wolfSSH_SFTP_buffer_size(WS_SFTP_BUFFER* buffer) { word32 ret = 0; if (buffer != NULL) { ret = buffer->sz; } return ret; }
0
[ "CWE-190" ]
wolfssh
edb272e35ee57e7b89f3e127222c6981b6a1e730
166,090,630,339,984,900,000,000,000,000,000,000,000
8
ASAN SFTP Fixes When decoding SFTP messages, fix the size checks so they don't wrap. (ZD12766)
is_boundary(unsigned char *ch1, unsigned char *ch2) { if (!*ch1 || !*ch2) return 1; if (*ch1 == ' ' && *ch2 == ' ') return 0; if (*ch1 != ' ' && is_period_char(ch2)) return 0; if (*ch2 != ' ' && is_beginning_char(ch1)) return 0; #ifdef USE_M17N if (is_combining_char(ch2)) return 0; #endif ...
0
[ "CWE-476" ]
w3m
59b91cd8e30c86f23476fa81ae005cabff49ebb6
142,867,574,237,522,330,000,000,000,000,000,000,000
23
Prevent segfault with malformed input type Bug-Debian: https://github.com/tats/w3m/issues/7
f_getftype(typval_T *argvars, typval_T *rettv) { char_u *fname; stat_T st; char_u *type = NULL; if (in_vim9script() && check_for_string_arg(argvars, 0) == FAIL) return; fname = tv_get_string(&argvars[0]); rettv->v_type = VAR_STRING; if (mch_lstat((char *)fname, &st) >= 0) type = vim_str...
0
[ "CWE-823", "CWE-703" ]
vim
5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
138,633,836,334,632,330,000,000,000,000,000,000,000
16
patch 8.2.4418: crash when using special multi-byte character Problem: Crash when using special multi-byte character. Solution: Don't use isalpha() for an arbitrary character.
UsbRootHubClearPortFeature ( IN USB_INTERFACE *HubIf, IN UINT8 Port, IN EFI_USB_PORT_FEATURE Feature ) { EFI_STATUS Status; Status = UsbHcClearRootHubPortFeature (HubIf->Device->Bus, Port, Feature); return Status; }
0
[ "CWE-787" ]
edk2
acebdf14c985c5c9f50b37ece0b15ada87767359
66,638,684,164,011,030,000,000,000,000,000,000,000
12
MdeModulePkg UsbBusDxe: Fix wrong buffer length used to read hub desc REF: https://bugzilla.tianocore.org/show_bug.cgi?id=973 HUB descriptor has variable length. But the code uses stack (HubDesc in UsbHubInit) with fixed length sizeof(EFI_USB_HUB_DESCRIPTOR) to hold HUB descriptor data. It uses hard code length value...
int tls_validate_all_contexts(SSL *s, unsigned int thisctx, RAW_EXTENSION *exts) { size_t i, num_exts, builtin_num = OSSL_NELEM(ext_defs), offset; RAW_EXTENSION *thisext; unsigned int context; ENDPOINT role = ENDPOINT_BOTH; if ((thisctx & SSL_EXT_CLIENT_HELLO) != 0) role = ENDPOINT_SERVER; ...
0
[ "CWE-476" ]
openssl
fb9fa6b51defd48157eeb207f52181f735d96148
116,146,666,986,331,680,000,000,000,000,000,000,000
37
ssl sigalg extension: fix NULL pointer dereference As the variable peer_sigalgslen is not cleared on ssl rehandshake, it's possible to crash an openssl tls secured server remotely by sending a manipulated hello message in a rehandshake. On such a manipulated rehandshake, tls1_set_shared_sigalgs() calls tls12_shared_s...
connection_set_status (struct connection *conn, int value) { if (conn->nworkers && pthread_mutex_lock (&conn->status_lock)) abort (); if (value < conn->status) { if (conn->nworkers && conn->status > 0) { char c = 0; assert (conn->status_pipe[1] >= 0); if (write (conn->status_pipe[1]...
0
[ "CWE-406" ]
nbdkit
c05686f9577fa91b6a3a4d8c065954ca6fc3fd62
26,744,292,177,935,180,000,000,000,000,000,000,000
20
server: Wait until handshake complete before calling .open callback Currently we call the plugin .open callback as soon as we receive a TCP connection: $ nbdkit -fv --tls=require --tls-certificates=tests/pki null \ --run "telnet localhost 10809" [...] Trying ::1... Connected to localhost. Escape ...
bool str_needs_quotes() { return TRUE; }
0
[ "CWE-416", "CWE-703" ]
server
08c7ab404f69d9c4ca6ca7a9cf7eec74c804f917
170,945,965,094,499,850,000,000,000,000,000,000,000
1
MDEV-24176 Server crashes after insert in the table with virtual column generated using date_format() and if() vcol_info->expr is allocated on expr_arena at parsing stage. Since expr item is allocated on expr_arena all its containee items must be allocated on expr_arena too. Otherwise fix_session_expr() will encounter...
std::string subconverter(RESPONSE_CALLBACK_ARGS) { std::string &argument = request.argument; int *status_code = &response.status_code; std::string argTarget = getUrlArg(argument, "target"), argSurgeVer = getUrlArg(argument, "ver"); tribool argClashNewField = getUrlArg(argument, "new_name"); int int...
0
[ "CWE-434", "CWE-94" ]
subconverter
ce8d2bd0f13f05fcbd2ed90755d097f402393dd3
295,358,752,541,369,000,000,000,000,000,000,000,000
584
Enhancements Add authorization check before loading scripts. Add detailed logs when loading preference settings.
static int follow_dotdot_rcu(struct nameidata *nd) { struct inode *inode = nd->inode; while (1) { if (path_equal(&nd->path, &nd->root)) break; if (nd->path.dentry != nd->path.mnt->mnt_root) { struct dentry *old = nd->path.dentry; struct dentry *parent = old->d_parent; unsigned seq; inode = parent...
0
[ "CWE-284" ]
linux
9409e22acdfc9153f88d9b1ed2bd2a5b34d2d3ca
113,078,316,229,703,080,000,000,000,000,000,000,000
53
vfs: rename: check backing inode being equal If a file is renamed to a hardlink of itself POSIX specifies that rename(2) should do nothing and return success. This condition is checked in vfs_rename(). However it won't detect hard links on overlayfs where these are given separate inodes on the overlayfs layer. Over...
TEST_F(QueryPlannerTest, OrOfAnd6) { addIndex(BSON("a" << 1 << "b" << 1)); runQuery(fromjson("{$or: [{a:{$in:[1]},b:{$in:[1]}}, {a:{$in:[1,5]},b:{$in:[1,5]}}]}")); assertNumSolutions(2U); assertSolutionExists("{cscan: {dir: 1}}"); assertSolutionExists( "{fetch: {filter: null, node: {or: {no...
0
[]
mongo
ee97c0699fd55b498310996ee002328e533681a3
285,352,732,317,452,130,000,000,000,000,000,000,000
14
SERVER-36993 Fix crash due to incorrect $or pushdown for indexed $expr.
static int ff_layout_write_prepare_common(struct rpc_task *task, struct nfs_pgio_header *hdr) { if (unlikely(test_bit(NFS_CONTEXT_BAD, &hdr->args.context->flags))) { rpc_exit(task, -EIO); return -EIO; } ff_layout_write_record_layoutstats_start(task, hdr); return 0; }
0
[ "CWE-787" ]
linux
ed34695e15aba74f45247f1ee2cf7e09d449f925
228,977,133,502,718,800,000,000,000,000,000,000,000
11
pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() We (adam zabrocki, alexander matrosov, alexander tereshkin, maksym bazalii) observed the check: if (fh->size > sizeof(struct nfs_fh)) should not use the size of the nfs_fh struct which includes an extra two bytes from the size field. struct nfs_fh { unsi...
static int bus_message_append_strv_key_value( sd_bus_message *m, const char **l) { const char **k, **v; int r; assert(m); r = sd_bus_message_open_container(m, 'a', "{ss}"); if (r < 0) return r; STRV_FOREACH_PAIR(k, v, l)...
0
[ "CWE-416" ]
systemd
637486261528e8aa3da9f26a4487dc254f4b7abb
286,206,741,864,407,200,000,000,000,000,000,000,000
25
polkit: when authorizing via PK let's re-resolve callback/userdata instead of caching it Previously, when doing an async PK query we'd store the original callback/userdata pair and call it again after the PK request is complete. This is problematic, since PK queries might be slow and in the meantime the userdata might...
SAPI_API char *sapi_getenv(char *name, size_t name_len TSRMLS_DC) { if (!strncasecmp(name, "HTTP_PROXY", name_len)) { /* Ugly fix for HTTP_PROXY issue */ return NULL; } if (sapi_module.getenv) { char *value, *tmp = sapi_module.getenv(name, name_len TSRMLS_CC); if (tmp) { value = estrdup(tmp); } else { ...
0
[ "CWE-601" ]
php-src
98b9dfaec95e6f910f125ed172cdbd25abd006ec
161,963,212,016,464,650,000,000,000,000,000,000,000
20
Fix for HTTP_PROXY issue. The following changes are made: - _SERVER/_ENV only has HTTP_PROXY if the local environment has it, and only one from the environment. - getenv('HTTP_PROXY') only returns one from the local environment - getenv has optional second parameter, telling it to only consider local environment
const struct cpumask *cpu_coregroup_mask(int cpu) { const cpumask_t *core_mask = cpumask_of_node(cpu_to_node(cpu)); /* Find the smaller of NUMA, core or LLC siblings */ if (cpumask_subset(&cpu_topology[cpu].core_sibling, core_mask)) { /* not numa in package, lets use the package siblings */ core_mask = &cpu_top...
0
[ "CWE-787" ]
linux
aa838896d87af561a33ecefea1caa4c15a68bc47
248,636,059,684,297,220,000,000,000,000,000,000,000
16
drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions Convert the various sprintf fmaily calls in sysfs device show functions to sysfs_emit and sysfs_emit_at for PAGE_SIZE buffer safety. Done with: $ spatch -sp-file sysfs_emit_dev.cocci --in-place --max-width=80 . And cocci script: $ cat s...
_hb_buffer_clear_positions (HB_Buffer buffer) { _hb_buffer_clear_output (buffer); if (!buffer->positions) buffer->positions = malloc (buffer->allocated * sizeof (buffer->positions[0])); memset (buffer->positions, 0, sizeof (buffer->positions[0]) * buffer->in_length); return HB_Err_Ok; }
0
[]
pango
336bb3201096bdd0494d29926dd44e8cca8bed26
50,435,675,895,673,090,000,000,000,000,000,000,000
11
[HB] Remove all references to the old code!
xmlDictGrow(xmlDictPtr dict, size_t size) { unsigned long key, okey; size_t oldsize, i; xmlDictEntryPtr iter, next; struct _xmlDictEntry *olddict; #ifdef DEBUG_GROW unsigned long nbElem = 0; #endif int ret = 0; int keep_keys = 1; if (dict == NULL) return(-1); if (size < 8) ...
0
[ "CWE-119" ]
libxml2
6360a31a84efe69d155ed96306b9a931a40beab9
20,473,697,029,697,560,000,000,000,000,000,000,000
124
CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey For https://bugzilla.gnome.org/show_bug.cgi?id=756528 It was possible to hit a negative offset in the name indexing used to randomize the dictionary key generation Reported and fix provided by David Drysdale @ Google
BOOL update_write_field_flags(wStream* s, UINT32 fieldFlags, BYTE flags, BYTE fieldBytes) { BYTE byte; if (fieldBytes == 1) { byte = fieldFlags & 0xFF; Stream_Write_UINT8(s, byte); } else if (fieldBytes == 2) { byte = fieldFlags & 0xFF; Stream_Write_UINT8(s, byte); byte = (fieldFlags >> 8) & 0xFF; St...
0
[ "CWE-415" ]
FreeRDP
67c2aa52b2ae0341d469071d1bc8aab91f8d2ed8
230,928,447,604,325,760,000,000,000,000,000,000,000
32
Fixed #6013: Check new length is > 0
static void flush_buffer (void) { DEBUG ("network plugin: flush_buffer: send_buffer_fill = %i", send_buffer_fill); network_send_buffer (send_buffer, (size_t) send_buffer_fill); stats_octets_tx += ((uint64_t) send_buffer_fill); stats_packets_tx++; network_init_buffer (); }
0
[ "CWE-119", "CWE-787" ]
collectd
b589096f907052b3a4da2b9ccc9b0e2e888dfc18
77,247,059,342,567,140,000,000,000,000,000,000,000
12
network plugin: Fix heap overflow in parse_packet(). Emilien Gaspar has identified a heap overflow in parse_packet(), the function used by the network plugin to parse incoming network packets. This is a vulnerability in collectd, though the scope is not clear at this point. At the very least specially crafted network...
String *Item_func_gtid_subtract::val_str_ascii(String *str) { DBUG_ENTER("Item_func_gtid_subtract::val_str_ascii"); String *str1, *str2; const char *charp1, *charp2; enum_return_status status; /* We must execute args[*]->val_str_ascii() before checking args[*]->null_value to ensure that them are updat...
0
[]
mysql-server
475dcde2c7856dd0050b967099a86c087d94f32f
293,630,566,160,074,240,000,000,000,000,000,000,000
39
Bug#27099029: UNLIMITED LENGTH OF THE PASSWORD Description: my_crypt_genhash depends on the length of plaintext password. Longer the password, more is the time required to produce the transformation. An unusually large password may consume considerable amount of time...
get_desktop_file_path (GsmXSMPClient *client) { SmProp *prop; char *desktop_file_path = NULL; char **dirs; const char *program_name; /* XSMP clients using eggsmclient defines a special property * pointing to their respective desktop entry file */ ...
0
[ "CWE-125", "CWE-835" ]
gnome-session
b0dc999e0b45355314616321dbb6cb71e729fc9d
283,799,980,837,492,000,000,000,000,000,000,000,000
38
[gsm] Delay the creation of the GsmXSMPClient until it really exists We used to create the GsmXSMPClient before the XSMP connection is really accepted. This can lead to some issues, though. An example is: https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting: "What is happening is that a new client (probabl...
zsetstrokecolor(i_ctx_t * i_ctx_p) { int code; es_ptr iesp = esp; /* preserve exec stack in case of error */ code = zswapcolors(i_ctx_p); if (code < 0) return code; /* Set up for the continuation procedure which will finish by restoring the fill colour space */ /* Make sure the exec s...
0
[]
ghostpdl
ea735ba37dc0fd5f5622d031830b9a559dec1cc9
309,943,926,866,687,080,000,000,000,000,000,000,000
25
Fix error condition for SC and CS The SC and CS PDF operators correctly checked the return code from the underlying setcolor and setcolorspace code, but we had already set up the exec stack for handling a non-error return. We have to do this before calling the underlying code, as that also uses a state machine, and a...
*/ void *skb_pull(struct sk_buff *skb, unsigned int len) { return skb_pull_inline(skb, len);
0
[ "CWE-20" ]
linux
2b16f048729bf35e6c28a40cbfad07239f9dcd90
201,439,556,134,803,820,000,000,000,000,000,000,000
4
net: create skb_gso_validate_mac_len() If you take a GSO skb, and split it into packets, will the MAC length (L2 + L3 + L4 headers + payload) of those packets be small enough to fit within a given length? Move skb_gso_mac_seglen() to skbuff.h with other related functions like skb_gso_network_seglen() so we can use it...
static int srpt_init_nodeacl(struct se_node_acl *se_nacl, const char *name) { u8 i_port_id[16]; if (srpt_parse_i_port_id(i_port_id, name) < 0) { pr_err("invalid initiator port ID %s\n", name); return -EINVAL; } return 0; }
0
[ "CWE-200", "CWE-476" ]
linux
51093254bf879bc9ce96590400a87897c7498463
327,009,117,888,619,930,000,000,000,000,000,000,000
10
IB/srpt: Simplify srpt_handle_tsk_mgmt() Let the target core check task existence instead of the SRP target driver. Additionally, let the target core check the validity of the task management request instead of the ib_srpt driver. This patch fixes the following kernel crash: BUG: unable to handle kernel NULL pointer...