func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
u32 mp4box_parse_args_continue(int argc, char **argv, u32 *current_index) { u32 i = *current_index; /*parse our args*/ { char *arg = argv[i]; if (!stricmp(arg, "-itags")) { CHECK_NEXT_ARG itunes_tags = argv[i + 1]; i++; open_edit = GF_TRUE; } #ifndef GPAC_DISABLE_ISOM_HINTING else if (!stricmp(ar...
0
[ "CWE-476" ]
gpac
9eeac00b38348c664dfeae2525bba0cf1bc32349
231,678,588,551,398,250,000,000,000,000,000,000,000
1,019
fixed #1565
SCTP_STATIC void sctp_shutdown(struct sock *sk, int how) { struct net *net = sock_net(sk); struct sctp_endpoint *ep; struct sctp_association *asoc; if (!sctp_style(sk, TCP)) return; if (how & SEND_SHUTDOWN) { ep = sctp_sk(sk)->ep; if (!list_empty(&ep->asocs)) { asoc = list_entry(ep->asocs.next, s...
0
[ "CWE-20" ]
linux
726bc6b092da4c093eb74d13c07184b18c1af0f1
1,019,230,630,987,787,400,000,000,000,000,000,000
18
net/sctp: Validate parameter size for SCTP_GET_ASSOC_STATS Building sctp may fail with: In function ‘copy_from_user’, inlined from ‘sctp_getsockopt_assoc_stats’ at net/sctp/socket.c:5656:20: arch/x86/include/asm/uaccess_32.h:211:26: error: call to ‘copy_from_user_overflow’ declared with attribute error: c...
int fd() const { return fd_; }
0
[ "CWE-416" ]
node
7f178663ebffc82c9f8a5a1b6bf2da0c263a30ed
311,983,398,108,777,500,000,000,000,000,000,000,000
1
src: use unique_ptr for WriteWrap This commit attempts to avoid a use-after-free error by using unqiue_ptr and passing a reference to it. CVE-ID: CVE-2020-8265 Fixes: https://github.com/nodejs-private/node-private/issues/227 PR-URL: https://github.com/nodejs-private/node-private/pull/238 Reviewed-By: Michael Dawson <...
MagickExport void *AcquireMagickMemory(const size_t size) { register void *memory; #if !defined(MAGICKCORE_ANONYMOUS_MEMORY_SUPPORT) memory=memory_methods.acquire_memory_handler(size == 0 ? 1UL : size); #else if (memory_semaphore == (SemaphoreInfo *) NULL) ActivateSemaphoreInfo(&memory_semaphore); if (...
0
[ "CWE-770" ]
ImageMagick
061de02095a56d438409c63f723f340b2d9d36c7
292,288,834,521,102,220,000,000,000,000,000,000,000
45
https://github.com/ImageMagick/ImageMagick/issues/536
TEST(IndexBoundsBuilderTest, UnionizeWithNE) { auto testIndex = buildSimpleIndexEntry(); std::vector<BSONObj> toUnionize; toUnionize.push_back(fromjson("{a: {$ne: 3}}")); toUnionize.push_back(fromjson("{a: {$ne: 4}}}")); OrderedIntervalList oil; IndexBoundsBuilder::BoundsTightness tightness; ...
0
[ "CWE-754" ]
mongo
f8f55e1825ee5c7bdb3208fc7c5b54321d172732
257,720,872,206,252,150,000,000,000,000,000,000,000
14
SERVER-44377 generate correct plan for indexed inequalities to null
format_job_tidy(struct format_job_tree *jobs, int force) { struct format_job *fj, *fj1; time_t now; now = time(NULL); RB_FOREACH_SAFE(fj, format_job_tree, jobs, fj1) { if (!force && (fj->last > now || now - fj->last < 3600)) continue; RB_REMOVE(format_job_tree, jobs, fj); log_debug("%s: %s", __func__,...
0
[]
src
b32e1d34e10a0da806823f57f02a4ae6e93d756e
181,054,316,042,340,960,000,000,000,000,000,000,000
23
evbuffer_new and bufferevent_new can both fail (when malloc fails) and return NULL. GitHub issue 1547.
if (wolfSSH_SFTP_CreateStatus(ssh, WOLFSSH_FTP_NOFILE, reqId, "Unable To Open Directory", "English", out, &outSz) != WS_SUCCESS) { WFREE(out, ssh->ctx->heap, DYNTYPE_BUFFER); return WS_FATAL_ERROR; }
0
[ "CWE-190" ]
wolfssh
edb272e35ee57e7b89f3e127222c6981b6a1e730
211,171,836,252,934,740,000,000,000,000,000,000,000
6
ASAN SFTP Fixes When decoding SFTP messages, fix the size checks so they don't wrap. (ZD12766)
void unregister_fair_sched_group(struct task_group *tg) { }
0
[ "CWE-400", "CWE-703", "CWE-835" ]
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
287,384,847,333,865,800,000,000,000,000,000,000,000
1
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
void CLASS parse_gps_libraw(int base) { unsigned entries, tag, type, len, save, c; entries = get2(); if (entries > 200) return; if (entries > 0) imgdata.other.parsed_gps.gpsparsed = 1; while (entries--) { tiff_get(base, &tag, &type, &len, &save); if (len > 1024) { fseek(ifp, save,...
0
[ "CWE-190" ]
LibRaw
4554e24ce24beaef5d0ef48372801cfd91039076
101,846,798,340,772,830,000,000,000,000,000,000,000
50
parse_qt: possible integer overflow
static int sctp_setsockopt(struct sock *sk, int level, int optname, char __user *optval, unsigned int optlen) { int retval = 0; pr_debug("%s: sk:%p, optname:%d\n", __func__, sk, optname); /* I can hardly begin to describe how wrong this is. This is * so broken as to be worse than useless. The API draft ...
0
[ "CWE-415" ]
linux
dfcb9f4f99f1e9a49e43398a7bfbf56927544af1
128,479,643,376,044,610,000,000,000,000,000,000,000
169
sctp: deny peeloff operation on asocs with threads sleeping on it commit 2dcab5984841 ("sctp: avoid BUG_ON on sctp_wait_for_sndbuf") attempted to avoid a BUG_ON call when the association being used for a sendmsg() is blocked waiting for more sndbuf and another thread did a peeloff operation on such asoc, moving it to ...
psf_log_printf (SF_PRIVATE *psf, const char *format, ...) { va_list ap ; uint32_t u ; int d, tens, shift, width, width_specifier, left_align, slen ; char c, *strptr, istr [5], lead_char, sign_char ; va_start (ap, format) ; while ((c = *format++)) { if (c != '%') { log_putchar (psf, c) ; continue ; }...
0
[ "CWE-119", "CWE-787" ]
libsndfile
708e996c87c5fae77b104ccfeb8f6db784c32074
46,794,880,905,671,740,000,000,000,000,000,000,000
269
src/ : Move to a variable length header buffer Previously, the `psf->header` buffer was a fixed length specified by `SF_HEADER_LEN` which was set to `12292`. This was problematic for two reasons; this value was un-necessarily large for the majority of files and too small for some others. Now the size of the header bu...
explicit AgentThread(OSDService *o) : osd(o) {}
0
[ "CWE-287", "CWE-284" ]
ceph
5ead97120e07054d80623dada90a5cc764c28468
144,508,659,122,342,970,000,000,000,000,000,000,000
1
auth/cephx: add authorizer challenge Allow the accepting side of a connection to reject an initial authorizer with a random challenge. The connecting side then has to respond with an updated authorizer proving they are able to decrypt the service's challenge and that the new authorizer was produced for this specific ...
static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen) { int utf8_length; unsigned char *utf8_value; int i; int isdnsname = 0; /* Don't leave outputs uninitialized */ *dnsid = NULL; *idlen = 0; /*- * Per RFC 6125, DNS-IDs representing internationalized domain n...
1
[ "CWE-125" ]
openssl
8393de42498f8be75cf0353f5c9f906a43a748d2
22,186,418,961,622,883,000,000,000,000,000,000,000
92
Fix the name constraints code to not assume NUL terminated strings ASN.1 strings may not be NUL terminated. Don't assume they are. CVE-2021-3712 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org>
void CLASS foveon_thumb() { unsigned bwide, row, col, bitbuf = 0, bit = 1, c, i; char *buf; struct decode *dindex; short pred[3]; bwide = get4(); fprintf(ofp, "P6\n%d %d\n255\n", thumb_width, thumb_height); if (bwide > 0) { if (bwide < thumb_width * 3) return; buf = (char *)malloc(bwide);...
0
[ "CWE-476", "CWE-119" ]
LibRaw
d7c3d2cb460be10a3ea7b32e9443a83c243b2251
126,897,900,682,550,840,000,000,000,000,000,000,000
45
Secunia SA75000 advisory: several buffer overruns
int DecodeTCP(ThreadVars *tv, DecodeThreadVars *dtv, Packet *p, const uint8_t *pkt, uint16_t len) { StatsIncr(tv, dtv->counter_tcp); if (unlikely(DecodeTCPPacket(tv, p, pkt,len) < 0)) { SCLogDebug("invalid TCP packet"); CLEAR_TCP_PACKET(p); return TM_ECODE_FAILED; } #ifdef ...
0
[]
suricata
50e2b973eeec7172991bf8f544ab06fb782b97df
49,133,790,819,779,450,000,000,000,000,000,000,000
23
stream/tcp: handle RST with MD5 or AO header Special handling for RST packets if they have an TCP MD5 or AO header option. The options hash can't be validated. The end host might be able to validate it, as it can have a key/password that was communicated out of band. The sender could use this to move the TCP state to...
Timestamp timestamp() const { if (type() == mongo::Date || type() == bsonTimestamp) { return Timestamp(ConstDataView(value()).read<LittleEndian<unsigned long long>>().value); } return Timestamp(); }
0
[ "CWE-613" ]
mongo
e55d6e2292e5dbe2f97153251d8193d1cc89f5d7
243,481,342,999,167,320,000,000,000,000,000,000,000
6
SERVER-38984 Validate unique User ID on UserCache hit
static void FVMenuFindRpl(GWindow gw, struct gmenuitem *UNUSED(mi), GEvent *UNUSED(e)) { FontView *fv = (FontView *) GDrawGetUserData(gw); SVCreate(fv); }
0
[ "CWE-119", "CWE-787" ]
fontforge
626f751752875a0ddd74b9e217b6f4828713573c
220,025,267,393,647,700,000,000,000,000,000,000,000
5
Warn users before discarding their unsaved scripts (#3852) * Warn users before discarding their unsaved scripts This closes #3846.
process_demand_active(STREAM s) { uint8 type; uint16 len_src_descriptor, len_combined_caps; /* at this point we need to ensure that we have ui created */ rd_create_ui(); in_uint32_le(s, g_rdp_shareid); in_uint16_le(s, len_src_descriptor); in_uint16_le(s, len_combined_caps); in_uint8s(s, len_src_descriptor); ...
1
[ "CWE-787" ]
rdesktop
766ebcf6f23ccfe8323ac10242ae6e127d4505d2
271,817,870,556,343,320,000,000,000,000,000,000,000
40
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix pos...
nautilus_file_can_unmount (NautilusFile *file) { g_return_val_if_fail (NAUTILUS_IS_FILE (file), FALSE); return file->details->can_unmount || (file->details->mount != NULL && g_mount_can_unmount (file->details->mount)); }
0
[]
nautilus
7632a3e13874a2c5e8988428ca913620a25df983
60,852,582,187,108,960,000,000,000,000,000,000,000
8
Check for trusted desktop file launchers. 2009-02-24 Alexander Larsson <alexl@redhat.com> * libnautilus-private/nautilus-directory-async.c: Check for trusted desktop file launchers. * libnautilus-private/nautilus-file-private.h: * libnautilus-private/nautilus-file.c: * libnautilus-...
static void RSAZ_exp52x20_x2_256(BN_ULONG *out, /* [2][20] */ const BN_ULONG *base, /* [2][20] */ const BN_ULONG *exp[2], /* 2x16 */ const BN_ULONG *m, /* [2][20] */ con...
0
[ "CWE-787" ]
openssl
a1f7034bbd8f0730d360211f5ba0feeaef0b7b2c
327,765,863,055,252,300,000,000,000,000,000,000,000
183
rsa: fix bn_reduce_once_in_place call for rsaz_mod_exp_avx512_x2 bn_reduce_once_in_place expects the number of BN_ULONG, but factor_size is moduli bit size. Fixes #18625. Signed-off-by: Xi Ruoyao <xry111@xry111.site> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from...
std::string Magick::Image::attribute(const std::string name_) const { const char *value; GetPPException; value=GetImageProperty(constImage(),name_.c_str(),exceptionInfo); ThrowImageException; if (value) return(std::string(value)); return(std::string()); // Intentionally no exception }
0
[ "CWE-416" ]
ImageMagick
8c35502217c1879cb8257c617007282eee3fe1cc
27,343,407,626,446,270,000,000,000,000,000,000,000
14
Added missing return to avoid use after free.
static void coolkey_free_private_data(coolkey_private_data_t *priv) { list_t *l = &priv->objects_list; sc_cardctl_coolkey_object_t *o; /* Clean up the allocated memory in the items */ list_iterator_start(l); while (list_iterator_hasnext(l)) { o = (sc_cardctl_coolkey_object_t *)list_iterator_next(l); free(o->d...
0
[ "CWE-415" ]
OpenSC
c246f6f69a749d4f68626b40795a4f69168008f4
87,431,130,810,891,180,000,000,000,000,000,000,000
21
coolkey: Make sure the object ID is unique when filling list Thanks to oss-fuzz https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19208
void recompute_ideal_colors_1plane( const image_block& blk, const error_weight_block& ewb, const partition_info& pi, const decimation_info& di, int weight_quant_mode, const uint8_t* dec_weights_quant_pvalue, endpoints& ep, vfloat4 rgbs_vectors[BLOCK_MAX_PARTITIONS], vfloat4 rgbo_vectors[BLOCK_MAX_PARTITIONS] )...
0
[ "CWE-787" ]
astc-encoder
bdd385fe19bf2737bead4b5664acdfdeca7aab15
165,215,060,237,987,830,000,000,000,000,000,000,000
210
Only load based on texel index if undecimated
TEST_F(SQLiteUtilTests, test_whitespace_then_nonwhitespace_query) { auto dbc = getTestDBC(); QueryDataTyped results; auto status = queryInternal(" ; select * from time ", results, dbc); EXPECT_TRUE(status.ok()); }
0
[ "CWE-77", "CWE-295" ]
osquery
c3f9a3dae22d43ed3b4f6a403cbf89da4cba7c3c
258,489,448,220,078,500,000,000,000,000,000,000,000
6
Merge pull request from GHSA-4g56-2482-x7q8 * Proposed fix for attach tables vulnerability * Add authorizer to ATC tables and cleanups - Add unit test for authorizer function
uint32 Field_varstring::data_length() { return length_bytes == 1 ? (uint32) *ptr : uint2korr(ptr); }
0
[ "CWE-416", "CWE-703" ]
server
08c7ab404f69d9c4ca6ca7a9cf7eec74c804f917
78,937,316,278,017,320,000,000,000,000,000,000,000
4
MDEV-24176 Server crashes after insert in the table with virtual column generated using date_format() and if() vcol_info->expr is allocated on expr_arena at parsing stage. Since expr item is allocated on expr_arena all its containee items must be allocated on expr_arena too. Otherwise fix_session_expr() will encounter...
static inline u32 read_32bit_tls(struct task_struct *t, int tls) { return get_desc_base(&t->thread.tls_array[tls]); }
0
[ "CWE-200", "CWE-401" ]
linux
f647d7c155f069c1a068030255c300663516420e
62,746,886,867,215,920,000,000,000,000,000,000,000
4
x86_64, switch_to(): Load TLS descriptors before switching DS and ES Otherwise, if buggy user code points DS or ES into the TLS array, they would be corrupted after a context switch. This also significantly improves the comments and documents some gotchas in the code. Before this patch, the both tests below failed. ...
enum passdb_result auth_request_password_missing(struct auth_request *request) { if (request->fields.skip_password_check) { /* This passdb wasn't used for authentication */ return PASSDB_RESULT_OK; } e_info(authdb_event(request), "No password returned (and no nopassword)"); return PASSDB_RESULT_PASSWORD...
0
[ "CWE-284" ]
core
7bad6a24160e34bce8f10e73dbbf9e5fbbcd1904
176,503,422,745,561,470,000,000,000,000,000,000,000
10
auth: Fix handling passdbs with identical driver/args but different mechanisms/username_filter The passdb was wrongly deduplicated in this situation, causing wrong mechanisms or username_filter setting to be used. This would be a rather unlikely configuration though. Fixed by moving mechanisms and username_filter fro...
generateClonedExtStatsStmt(RangeVar *heapRel, Oid heapRelid, Oid source_statsid) { HeapTuple ht_stats; Form_pg_statistic_ext statsrec; CreateStatsStmt *stats; List *stat_types = NIL; List *def_names = NIL; bool isnull; Datum datum; ArrayType *arr; char *enabled; int i; Asser...
0
[ "CWE-94" ]
postgres
5919bb5a5989cda232ac3d1f8b9d90f337be2077
78,795,957,672,234,960,000,000,000,000,000,000,000
71
In extensions, don't replace objects not belonging to the extension. Previously, if an extension script did CREATE OR REPLACE and there was an existing object not belonging to the extension, it would overwrite the object and adopt it into the extension. This is problematic, first because the overwrite is probably uni...
detach_entity_load_avg(struct cfs_rq *cfs_rq, struct sched_entity *se) {}
0
[ "CWE-400", "CWE-703", "CWE-835" ]
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
193,092,331,506,513,300,000,000,000,000,000,000,000
1
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
size_t p_bits() const { return m_p_bits; }
0
[ "CWE-200" ]
botan
48fc8df51d99f9d8ba251219367b3d629cc848e3
228,036,193,515,254,040,000,000,000,000,000,000,000
1
Address DSA/ECDSA side channel
static void SFDGetType1(FILE *sfd) { /* We've read the OrigType1 token (this is now obselete, but parse it in case there are any old sfds) */ int len; struct enc85 dec; memset(&dec,'\0', sizeof(dec)); dec.pos = -1; dec.sfd = sfd; getint(sfd,&len); while ( --len >= 0 ) Dec85(&dec); }
0
[ "CWE-416" ]
fontforge
048a91e2682c1a8936ae34dbc7bd70291ec05410
215,989,177,114,604,800,000,000,000,000,000,000,000
12
Fix for #4084 Use-after-free (heap) in the SFD_GetFontMetaData() function Fix for #4086 NULL pointer dereference in the SFDGetSpiros() function Fix for #4088 NULL pointer dereference in the SFD_AssignLookups() function Add empty sf->fontname string if it isn't set, fixing #4089 #4090 and many other potential issues (...
void rtas_take_timebase(void) { while (!timebase) barrier(); arch_spin_lock(&timebase_lock); set_tb(timebase >> 32, timebase & 0xffffffff); timebase = 0; arch_spin_unlock(&timebase_lock); }
0
[ "CWE-862" ]
linux
bd59380c5ba4147dcbaad3e582b55ccfd120b764
179,885,431,661,324,940,000,000,000,000,000,000,000
9
powerpc/rtas: Restrict RTAS requests from userspace A number of userspace utilities depend on making calls to RTAS to retrieve information and update various things. The existing API through which we expose RTAS to userspace exposes more RTAS functionality than we actually need, through the sys_rtas syscall, which al...
call_queue_handler(evPtr, flags) Tcl_Event *evPtr; int flags; { struct call_queue *q = (struct call_queue *)evPtr; volatile VALUE ret; volatile VALUE q_dat; volatile VALUE thread = q->thread; struct tcltkip *ptr; DUMP2("do_call_queue_handler : evPtr = %p", evPtr); DUMP2("call_queue_...
0
[]
tk
ebd0fc80d62eeb7b8556522256f8d035e013eb65
193,640,905,058,556,040,000,000,000,000,000,000,000
92
tcltklib.c: check argument * ext/tk/tcltklib.c (ip_cancel_eval_core): check argument type and length. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@51468 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
static int h2c_decode_headers(struct h2c *h2c, struct buffer *rxbuf, uint32_t *flags) { const uint8_t *hdrs = (uint8_t *)b_head(&h2c->dbuf); struct buffer *tmp = get_trash_chunk(); struct http_hdr list[MAX_HTTP_HDR * 2]; struct buffer *copy = NULL; unsigned int msgf; struct htx *htx = NULL; int flen; // header f...
0
[ "CWE-125" ]
haproxy
a01f45e3ced23c799f6e78b5efdbd32198a75354
263,388,951,356,274,100,000,000,000,000,000,000,000
265
BUG/CRITICAL: mux-h2: re-check the frame length when PRIORITY is used Tim D�sterhus reported a possible crash in the H2 HEADERS frame decoder when the PRIORITY flag is present. A check is missing to ensure the 5 extra bytes needed with this flag are actually part of the frame. As per RFC7540#4.2, let's return a connec...
close_msg_fds(struct VhostUserMsg *msg) { int i; for (i = 0; i < msg->fd_num; i++) close(msg->fds[i]); }
0
[]
dpdk
bf472259dde6d9c4dd3ebad2c2b477a168c6e021
104,415,854,532,046,530,000,000,000,000,000,000,000
7
vhost: fix possible denial of service by leaking FDs A malicious Vhost-user master could send in loop hand-crafted vhost-user messages containing more file descriptors the vhost-user slave expects. Doing so causes the application using the vhost-user library to run out of FDs. This issue has been assigned CVE-2019-14...
void SFD_DumpLookup( FILE *sfd, SplineFont *sf ) { int isgpos; OTLookup *otl; struct lookup_subtable *sub; FeatureScriptLangList *fl; struct scriptlanglist *sl; int i; for ( isgpos=0; isgpos<2; ++isgpos ) { for ( otl = isgpos ? sf->gpos_lookups : sf->gsub_lookups; otl!=NULL; otl = otl->nex...
0
[ "CWE-416" ]
fontforge
048a91e2682c1a8936ae34dbc7bd70291ec05410
114,768,569,397,995,340,000,000,000,000,000,000,000
54
Fix for #4084 Use-after-free (heap) in the SFD_GetFontMetaData() function Fix for #4086 NULL pointer dereference in the SFDGetSpiros() function Fix for #4088 NULL pointer dereference in the SFD_AssignLookups() function Add empty sf->fontname string if it isn't set, fixing #4089 #4090 and many other potential issues (...
get_track_channels_generic(const void *p_user_data, track_t i_track) { const generic_img_private_t *p_env = p_user_data; return p_env->track_flags[i_track].channels; }
0
[ "CWE-415" ]
libcdio
dec2f876c2d7162da213429bce1a7140cdbdd734
133,893,172,514,632,200,000,000,000,000,000,000,000
5
Removed wrong line
static void closeAllCursors(Vdbe *p){ if( p->pFrame ){ VdbeFrame *pFrame; for(pFrame=p->pFrame; pFrame->pParent; pFrame=pFrame->pParent); sqlite3VdbeFrameRestore(pFrame); p->pFrame = 0; p->nFrame = 0; } assert( p->nFrame==0 ); closeCursorsInFrame(p); if( p->aMem ){ releaseMemArray(p->a...
0
[ "CWE-755" ]
sqlite
8654186b0236d556aa85528c2573ee0b6ab71be3
12,617,066,934,658,002,000,000,000,000,000,000,000
23
When an error occurs while rewriting the parser tree for window functions in the sqlite3WindowRewrite() routine, make sure that pParse->nErr is set, and make sure that this shuts down any subsequent code generation that might depend on the transformations that were implemented. This fixes a problem discovered by the Y...
static void check_no_speaker_on_headset(struct snd_kcontrol *kctl, struct snd_card *card) { const char *names_to_check[] = { "Headset", "headset", "Headphone", "headphone", NULL}; const char **s; bool found = false; if (strcmp("Speaker", kctl->id.name)) return; for (s = names_to_check; *s; s++) if (st...
0
[ "CWE-416", "CWE-787" ]
linux
124751d5e63c823092060074bd0abaae61aaa9c4
87,080,373,770,075,310,000,000,000,000,000,000,000
22
ALSA: usb-audio: Kill stray URB at exiting USB-audio driver may leave a stray URB for the mixer interrupt when it exits by some error during probe. This leads to a use-after-free error as spotted by syzkaller like: ================================================================== BUG: KASAN: use-after-free in sn...
void ElectronApiIPCHandlerImpl::MessageSync(bool internal, const std::string& channel, blink::CloneableMessage arguments, MessageSyncCallback callback) { api::WebContents* api_web_conten...
0
[]
electron
e9fa834757f41c0b9fe44a4dffe3d7d437f52d34
163,667,418,690,292,610,000,000,000,000,000,000,000
10
fix: ensure ElectronBrowser mojo service is only bound to appropriate render frames (#33344) * fix: ensure ElectronBrowser mojo service is only bound to authorized render frames Notes: no-notes * refactor: extract electron API IPC to its own mojo interface * fix: just check main frame not primary main frame ...
const char* samdb_ntds_object_category(TALLOC_CTX *tmp_ctx, struct ldb_context *ldb) { const char *attrs[] = { "objectCategory", NULL }; int ret; struct ldb_result *res; ret = ldb_search(ldb, tmp_ctx, &res, samdb_ntds_settings_dn(ldb, tmp_ctx), LDB_SCOPE_BASE, attrs, NULL); if (ret != LDB_SUCCESS) { goto failed...
0
[ "CWE-200" ]
samba
0a3aa5f908e351201dc9c4d4807b09ed9eedff77
284,789,399,867,960,480,000,000,000,000,000,000,000
21
CVE-2022-32746 ldb: Make use of functions for appending to an ldb_message This aims to minimise usage of the error-prone pattern of searching for a just-added message element in order to make modifications to it (and potentially finding the wrong element). BUG: https://bugzilla.samba.org/show_bug.cgi?id=15009 Signed...
int PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) { ASN1_OCTET_STRING *os; EVP_MD_CTX mdc_tmp, *mdc; int ret = 0, i; int md_type; STACK_OF(X509_ATTRIBUTE) *sk; BIO *btmp; EVP_PKEY *pkey; EVP_MD_CTX_init(&mdc_tmp); if (!PKCS7...
0
[ "CWE-703" ]
openssl
59302b600e8d5b77ef144e447bb046fd7ab72686
293,324,128,476,793,340,000,000,000,000,000,000,000
108
PKCS#7: Fix NULL dereference with missing EncryptedContent. CVE-2015-1790 Reviewed-by: Rich Salz <rsalz@openssl.org>
Pdata_poptuple(Pdata *self, Py_ssize_t start) { PyObject *tuple; Py_ssize_t len, i, j; if (start < self->fence) { Pdata_stack_underflow(self); return NULL; } len = Py_SIZE(self) - start; tuple = PyTuple_New(len); if (tuple == NULL) return NULL; for (i = start, j ...
0
[ "CWE-190", "CWE-369" ]
cpython
a4ae828ee416a66d8c7bf5ee71d653c2cc6a26dd
22,876,857,722,276,807,000,000,000,000,000,000,000
19
closes bpo-34656: Avoid relying on signed overflow in _pickle memos. (GH-9261)
void init_tmp_table_share(THD *thd, TABLE_SHARE *share, const char *key, uint key_length, const char *table_name, const char *path) { DBUG_ENTER("init_tmp_table_share"); DBUG_PRINT("enter", ("table: '%s'.'%s'", key, table_name)); bzero((char*) share, sizeof(*sh...
0
[ "CWE-416" ]
server
4681b6f2d8c82b4ec5cf115e83698251963d80d5
306,830,706,596,381,840,000,000,000,000,000,000,000
36
MDEV-26281 ASAN use-after-poison when complex conversion is involved in blob the bug was that in_vector array in Item_func_in was allocated in the statement arena, not in the table->expr_arena. revert part of the 5acd391e8b2d. Instead, change the arena correctly in fix_all_session_vcol_exprs(). Remove TABLE_ARENA, t...
GF_Err clap_Read(GF_Box *s, GF_BitStream *bs) { GF_CleanAppertureBox *ptr = (GF_CleanAppertureBox*)s; ISOM_DECREASE_SIZE(ptr, 32); ptr->cleanApertureWidthN = gf_bs_read_u32(bs); ptr->cleanApertureWidthD = gf_bs_read_u32(bs); ptr->cleanApertureHeightN = gf_bs_read_u32(bs); ptr->cleanApertureHeightD = gf_bs_read_u3...
0
[ "CWE-125" ]
gpac
bceb03fd2be95097a7b409ea59914f332fb6bc86
76,613,598,125,134,770,000,000,000,000,000,000,000
14
fixed 2 possible heap overflows (inc. #1088)
max3421_bus_suspend(struct usb_hcd *hcd) { return -1; }
0
[ "CWE-416" ]
linux
b5fdf5c6e6bee35837e160c00ac89327bdad031b
11,764,358,133,125,837,000,000,000,000,000,000,000
4
usb: max-3421: Prevent corruption of freed memory The MAX-3421 USB driver remembers the state of the USB toggles for a device/endpoint. To save SPI writes, this was only done when a new device/endpoint was being used. Unfortunately, if the old device was removed, this would cause writes to freed memory. To fix this, ...
static int sctp_getsockopt_peer_auth_chunks(struct sock *sk, int len, char __user *optval, int __user *optlen) { struct sctp_endpoint *ep = sctp_sk(sk)->ep; struct sctp_authchunks __user *p = (void __user *)optval; struct sctp_authchunks val; struct sctp_association *asoc; struct sctp_chunks_param *ch; u3...
0
[ "CWE-416" ]
linux
a0ff660058b88d12625a783ce9e5c1371c87951f
317,316,664,256,346,540,000,000,000,000,000,000,000
44
sctp: return error if the asoc has been peeled off in sctp_wait_for_sndbuf After commit cea0cc80a677 ("sctp: use the right sk after waking up from wait_buf sleep"), it may change to lock another sk if the asoc has been peeled off in sctp_wait_for_sndbuf. However, the asoc's new sk could be already closed elsewhere, a...
SMB2_open_init(struct cifs_tcon *tcon, struct smb_rqst *rqst, __u8 *oplock, struct cifs_open_parms *oparms, __le16 *path) { struct TCP_Server_Info *server = tcon->ses->server; struct smb2_create_req *req; unsigned int n_iov = 2; __u32 file_attributes = 0; int copy_size; int uni_path_len; unsigned int tot...
0
[ "CWE-416", "CWE-200" ]
linux
6a3eb3360667170988f8a6477f6686242061488a
293,926,270,760,338,170,000,000,000,000,000,000,000
137
cifs: Fix use-after-free in SMB2_write There is a KASAN use-after-free: BUG: KASAN: use-after-free in SMB2_write+0x1342/0x1580 Read of size 8 at addr ffff8880b6a8e450 by task ln/4196 Should not release the 'req' because it will use in the trace. Fixes: eccb4422cf97 ("smb3: Add ftrace tracepoints for improved SMB3 de...
gnutls_x509_crt_get_preferred_hash_algorithm(gnutls_x509_crt_t crt, gnutls_digest_algorithm_t * hash, unsigned int *mand) { gnutls_pk_params_st issuer_params; int ret; if (crt == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } ret = _gnutls_x509_crt_get_mpis(crt, &issuer_param...
0
[ "CWE-295" ]
gnutls
6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
273,987,239,212,654,340,000,000,000,000,000,000,000
28
on certificate import check whether the two signature algorithms match
static void read_local_oob_data_complete(uint8_t status, uint16_t length, const void *param, void *user_data) { const struct mgmt_rp_read_local_oob_data *rp = param; struct btd_adapter *adapter = user_data; const uint8_t *hash, *randomizer; if (status != MGMT_STATUS_SUCCESS) { btd_error(adapter->dev_id, ...
0
[ "CWE-862", "CWE-863" ]
bluez
b497b5942a8beb8f89ca1c359c54ad67ec843055
26,838,642,325,263,223,000,000,000,000,000,000,000
31
adapter: Fix storing discoverable setting discoverable setting shall only be store when changed via Discoverable property and not when discovery client set it as that be considered temporary just for the lifetime of the discovery.
static unsigned int task_scan_min(struct task_struct *p) { unsigned int scan_size = READ_ONCE(sysctl_numa_balancing_scan_size); unsigned int scan, floor; unsigned int windows = 1; if (scan_size < MAX_SCAN_WINDOW) windows = MAX_SCAN_WINDOW / scan_size; floor = 1000 / windows; scan = sysctl_numa_balancing_scan_...
0
[ "CWE-400", "CWE-703", "CWE-835" ]
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
8,205,666,535,359,127,000,000,000,000,000,000,000
13
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
static void t1_subset_ascii_part(void) { int i, j; t1_getline(); while (!t1_prefix("/Encoding")) { t1_scan_param(); if (!(t1_prefix("/UniqueID") && !strncmp(t1_line_array + strlen(t1_line_array) -4, "def", 3))) t1_putline(); t1_getline(); } if (is_re...
0
[ "CWE-119" ]
texlive-source
6ed0077520e2b0da1fd060c7f88db7b2e6068e4c
183,648,194,866,310,450,000,000,000,000,000,000,000
44
writet1 protection against buffer overflow git-svn-id: svn://tug.org/texlive/trunk/Build/source@48697 c570f23f-e606-0410-a88d-b1316a301751
find_info_for_subsystem(struct cgroup_process_info *info, const char *subsystem) { struct cgroup_process_info *info_ptr; for (info_ptr = info; info_ptr; info_ptr = info_ptr->next) { struct cgroup_hierarchy *h = info_ptr->hierarchy; if (lxc_string_in_array(subsystem, (const char **)h->subsystems)) return info_p...
0
[ "CWE-59", "CWE-61" ]
lxc
592fd47a6245508b79fe6ac819fe6d3b2c1289be
135,754,867,662,474,380,000,000,000,000,000,000,000
11
CVE-2015-1335: Protect container mounts against symlinks When a container starts up, lxc sets up the container's inital fstree by doing a bunch of mounting, guided by the container configuration file. The container config is owned by the admin or user on the host, so we do not try to guard against bad entries. Howev...
vmxnet3_pci_dma_writev(PCIDevice *pci_dev, const struct iovec *iov, size_t start_iov_off, hwaddr target_addr, size_t bytes_to_copy) { size_t curr_off = 0; size_t copied = 0; while (bytes_to_copy) { if (start...
0
[ "CWE-416" ]
qemu
6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8
319,791,239,569,374,760,000,000,000,000,000,000,000
28
net: vmxnet3: check for device_active before write Vmxnet3 device emulator does not check if the device is active, before using it for write. It leads to a use after free issue, if the vmxnet3_io_bar0_write routine is called after the device is deactivated. Add check to avoid it. Reported-by: Li Qiang <liqiang6-s@360...
static void vrend_create_buffer(struct vrend_resource *gr, uint32_t width, uint32_t flags) { GLbitfield buffer_storage_flags = 0; if (flags & VIRGL_RESOURCE_FLAG_MAP_PERSISTENT) { buffer_storage_flags |= GL_MAP_PERSISTENT_BIT; /* Gallium's storage_flags_to_buffer_flags seems to drop some information,...
0
[ "CWE-787" ]
virglrenderer
95e581fd181b213c2ed7cdc63f2abc03eaaa77ec
110,381,873,810,703,250,000,000,000,000,000,000,000
72
vrend: Add test to resource OOB write and fix it v2: Also check that no depth != 1 has been send when none is due Closes: #250 Signed-off-by: Gert Wollny <gert.wollny@collabora.com> Reviewed-by: Chia-I Wu <olvaffe@gmail.com>
DataInCode* Binary::data_in_code() { return command<DataInCode>(); }
0
[ "CWE-703" ]
LIEF
7acf0bc4224081d4f425fcc8b2e361b95291d878
210,443,016,598,892,100,000,000,000,000,000,000,000
3
Resolve #764
store_sb_text( char_u **sb_str, // start of string char_u *s, // just after string int attr, int *sb_col, int finish) // line ends { msgchunk_T *mp; if (do_clear_sb_text == SB_CLEAR_ALL || do_clear_sb_text == SB_CLEAR_CMDLINE_DONE) { clear_sb_text(do_clear_sb_text == SB_CLEAR...
0
[ "CWE-416" ]
vim
9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
139,060,044,168,992,460,000,000,000,000,000,000,000
46
patch 8.2.4040: keeping track of allocated lines is too complicated Problem: Keeping track of allocated lines in user functions is too complicated. Solution: Instead of freeing individual lines keep them all until the end.
AccumulatorSet* GetAccumulatorSet() { thread_local std::unique_ptr<AccumulatorSet> accumulator_set; thread_local ThreadLocalDestructionMarker marker; if (!marker.alive) { // This thread is being destroyed. It is unsafe to access accumulator_set. return nullptr; } if (accumulator_set == nullptr) { ...
0
[ "CWE-476", "CWE-908" ]
tensorflow
237822b59fc504dda2c564787f5d3ad9c4aa62d9
288,593,457,814,061,920,000,000,000,000,000,000,000
12
Fix tf.compat.v1.placeholder_with_default vulnerability with quantized types. When iterating through the tensor to extract shape values, an underlying missing kernel (`StridedSlice` for quantized types) causes an error, which then results in a `nullptr` being passed to `ParseDimensionValue()`, causing a segfault. The...
c_julian_last_day_of_month(int y, int m) { assert(m >= 1 && m <= 12); return monthtab[c_julian_leap_p(y) ? 1 : 0][m]; }
0
[]
date
3959accef8da5c128f8a8e2fd54e932a4fb253b0
299,890,391,730,036,860,000,000,000,000,000,000,000
5
Add length limit option for methods that parses date strings `Date.parse` now raises an ArgumentError when a given date string is longer than 128. You can configure the limit by giving `limit` keyword arguments like `Date.parse(str, limit: 1000)`. If you pass `limit: nil`, the limit is disabled. Not only `Date.parse`...
void drainBuffer(Buffer::OwnedImpl& buffer) { buffer.drain(buffer.length()); }
0
[]
envoy
cb4ef0b09200c720dfdb07e097092dd105450343
285,330,728,608,870,340,000,000,000,000,000,000,000
1
decompressors: stop decompressing upon excessive compression ratio (#733) Signed-off-by: Dmitry Rozhkov <dmitry.rozhkov@intel.com> Co-authored-by: Ryan Hamilton <rch@google.com> Signed-off-by: Matt Klein <mklein@lyft.com> Signed-off-by: Pradeep Rao <pcrao@google.com>
static void brotli_close_writer(struct Curl_easy *data, struct contenc_writer *writer) { struct brotli_params *bp = (struct brotli_params *) &writer->params; (void) data; if(bp->br) { BrotliDecoderDestroyInstance(bp->br); bp->br = NULL; } }
0
[]
curl
3a09fbb7f264c67c438d01a30669ce325aa508e2
251,059,720,511,297,000,000,000,000,000,000,000,000
11
content_encoding: return error on too many compression steps The max allowed steps is arbitrarily set to 5. Bug: https://curl.se/docs/CVE-2022-32206.html CVE-2022-32206 Reported-by: Harry Sintonen Closes #9049
int BN_get_params(int which) { if (which == 0) return(bn_limit_bits); else if (which == 1) return(bn_limit_bits_high); else if (which == 2) return(bn_limit_bits_low); else if (which == 3) return(bn_limit_bits_mont); else return(0); }
0
[ "CWE-310" ]
openssl
f9b6c0ba4c02497782f801e3c45688f3efaac55c
20,566,831,167,748,808,000,000,000,000,000,000,000
8
Fix for CVE-2014-0076 Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuva...
group_sched_in(struct perf_event *group_event, struct perf_cpu_context *cpuctx, struct perf_event_context *ctx) { struct perf_event *event, *partial_group = NULL; struct pmu *pmu = ctx->pmu; u64 now = ctx->time; bool simulate = false; if (group_event->state == PERF_EVENT_STATE_OFF) return 0; p...
0
[ "CWE-284", "CWE-264" ]
linux
f63a8daa5812afef4f06c962351687e1ff9ccb2b
170,228,411,956,469,140,000,000,000,000,000,000,000
67
perf: Fix event->ctx locking There have been a few reported issues wrt. the lack of locking around changing event->ctx. This patch tries to address those. It avoids the whole rwsem thing; and while it appears to work, please give it some thought in review. What I did fail at is sensible runtime checks on the use of ...
int ip6_xmit(struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, struct ipv6_txoptions *opt, int tclass) { struct net *net = sock_net(sk); struct ipv6_pinfo *np = inet6_sk(sk); struct in6_addr *first_hop = &fl6->daddr; struct dst_entry *dst = skb_dst(skb); struct ipv6hdr *hdr; u8 proto = fl6->flowi6_...
0
[ "CWE-399" ]
linux
75a493e60ac4bbe2e977e7129d6d8cbb0dd236be
320,805,652,929,671,000,000,000,000,000,000,000,000
79
ipv6: ip6_append_data_mtu did not care about pmtudisc and frag_size If the socket had an IPV6_MTU value set, ip6_append_data_mtu lost track of this when appending the second frame on a corked socket. This results in the following splat: [37598.993962] ------------[ cut here ]------------ [37598.994008] kernel BUG at ...
std::pair<Value *, bool> ESTreeIRGen::declareVariableOrGlobalProperty( Function *inFunc, VarDecl::Kind declKind, Identifier name) { Value *found = nameTable_.lookup(name); // If the variable is already declared in this scope, do not create a // second instance. if (found) { if (auto *var = llvh...
0
[ "CWE-125", "CWE-787" ]
hermes
091835377369c8fd5917d9b87acffa721ad2a168
117,207,870,493,670,040,000,000,000,000,000,000,000
59
Correctly restore whether or not a function is an inner generator Summary: If a generator was large enough to be lazily compiled, we would lose that information when reconstituting the function's context. This meant the function was generated as a regular function instead of a generator. #utd-hermes-ignore-android R...
_g_utf8_normalize_wc (const gchar * str, gssize max_len, GNormalizeMode mode) { gsize n_wc; gunichar *wc_buffer; const char *p; gsize last_start; gboolean do_compat = (mode == G_NORMALIZE_NFKC || mode == G_NORMALIZE_NFKD); gboolean do_compose = (mode == G_NORMALIZE_NFC || mode == G_NORMALIZE_NFKC); n_wc ...
0
[]
libidn
2e97c2796581c27213962c77f5a8571a598f9a2e
336,730,198,201,323,600,000,000,000,000,000,000,000
134
libidn: stringprep_utf8_to_ucs4 now rejects invalid UTF-8. CVE-2015-2059
static inline void cfs_rq_util_change(struct cfs_rq *cfs_rq, int flags) { struct rq *rq = rq_of(cfs_rq); if (&rq->cfs == cfs_rq || (flags & SCHED_CPUFREQ_MIGRATION)) { /* * There are a few boundary cases this might miss but it should * get called often enough that that should (hopefully) not be * a real p...
0
[ "CWE-400", "CWE-703", "CWE-835" ]
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
79,795,829,622,218,540,000,000,000,000,000,000,000
22
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
u64 __blkg_prfill_rwstat(struct seq_file *sf, struct blkg_policy_data *pd, const struct blkg_rwstat *rwstat) { static const char *rwstr[] = { [BLKG_RWSTAT_READ] = "Read", [BLKG_RWSTAT_WRITE] = "Write", [BLKG_RWSTAT_SYNC] = "Sync", [BLKG_RWSTAT_ASYNC] = "Async", }; const char *dname = blkg_dev_name(pd->bl...
0
[ "CWE-415" ]
linux
9b54d816e00425c3a517514e0d677bb3cec49258
176,667,906,956,332,600,000,000,000,000,000,000,000
25
blkcg: fix double free of new_blkg in blkcg_init_queue If blkg_create fails, new_blkg passed as an argument will be freed by blkg_create, so there is no need to free it again. Signed-off-by: Hou Tao <houtao1@huawei.com> Signed-off-by: Jens Axboe <axboe@fb.com>
static void set_mv_strides(ERContext *s, ptrdiff_t *mv_step, ptrdiff_t *stride) { if (s->avctx->codec_id == AV_CODEC_ID_H264) { av_assert0(s->quarter_sample); *mv_step = 4; *stride = s->mb_width * 4; } else { *mv_step = 2; *stride = s->b8_stride; } }
0
[ "CWE-20", "CWE-617" ]
FFmpeg
bd27a9364ca274ca97f1df6d984e88a0700fb235
68,918,699,703,523,310,000,000,000,000,000,000,000
11
avcodec/mpeg4videodec: Remove use of FF_PROFILE_MPEG4_SIMPLE_STUDIO as indicator of studio profile The profile field is changed by code inside and outside the decoder, its not a reliable indicator of the internal codec state. Maintaining it consistency with studio_profile is messy. Its easier to just avoid it and use ...
static struct tipc_peer *peer_head(struct tipc_peer *peer) { while (!peer->is_head) peer = peer_prev(peer); return peer; }
0
[ "CWE-787" ]
linux
9aa422ad326634b76309e8ff342c246800621216
196,646,828,585,686,700,000,000,000,000,000,000,000
6
tipc: improve size validations for received domain records The function tipc_mon_rcv() allows a node to receive and process domain_record structs from peer nodes to track their views of the network topology. This patch verifies that the number of members in a received domain record does not exceed the limit defined b...
DecimalV2Val(__int128 value) : val(value) {}
0
[ "CWE-200" ]
incubator-doris
246ac4e37aa4da6836b7850cb990f02d1c3725a3
182,626,716,458,843,440,000,000,000,000,000,000,000
1
[fix] fix a bug of encryption function with iv may return wrong result (#8277)
static CodeConvFunc conv_get_code_conv_func(const gchar *src_charset_str, const gchar *dest_charset_str) { CodeConvFunc code_conv = conv_noconv; CharSet src_charset; CharSet dest_charset; if (!src_charset_str) src_charset = conv_get_locale_charset(); else src_charset = conv_get_charset_from_str(src_c...
0
[ "CWE-119" ]
claws
d390fa07f5548f3173dd9cc13b233db5ce934c82
293,562,805,994,995,120,000,000,000,000,000,000,000
84
Make sure we don't run out of the output buffer. Maybe fixes bug #3557
lsb_32 (guchar *src) { return src[0] | (src[1] << 8) | (src[2] << 16) | (src[3] << 24); }
0
[]
gdk-pixbuf
779429ce34e439c01d257444fe9d6739e72a2024
48,314,642,038,825,610,000,000,000,000,000,000,000
4
bmp: Detect integer overflow of the line width Instead of risking crashes or OOM, return an error if we detect integer overflow. The commit also includes a test image that triggers this overflow when used with pixbuf-read. https://bugzilla.gnome.org/show_bug.cgi?id=768738
static void phys_map_node_reserve(PhysPageMap *map, unsigned nodes) { if (map->nodes_nb + nodes > map->nodes_nb_alloc) { map->nodes_nb_alloc = MAX(map->nodes_nb_alloc * 2, 16); map->nodes_nb_alloc = MAX(map->nodes_nb_alloc, map->nodes_nb + nodes); map->nodes = g_renew(Node, map->nodes, map->...
0
[]
qemu
c3c1bb99d1c11978d9ce94d1bdcf0705378c1459
99,612,716,306,687,390,000,000,000,000,000,000,000
8
exec: Respect as_tranlsate_internal length clamp address_space_translate_internal will clamp the *plen length argument based on the size of the memory region being queried. The iommu walker logic in addresss_space_translate was ignoring this by discarding the post fn call value of *plen. Fix by just always using *plen...
bool CIRCNetwork::SetName(const CString& sName) { if (IsValidNetwork(sName)) { m_sName = sName; return true; } return false; }
0
[ "CWE-20" ]
znc
64613bc8b6b4adf1e32231f9844d99cd512b8973
118,119,494,136,642,080,000,000,000,000,000,000,000
8
Don't crash if user specified invalid encoding. This is CVE-2019-9917
static bool io_poll_remove_one(struct io_kiocb *req) { bool do_complete; io_poll_remove_double(req); if (req->opcode == IORING_OP_POLL_ADD) { do_complete = __io_poll_remove_one(req, &req->poll); } else { struct async_poll *apoll = req->apoll; /* non-poll requests have submit ref still */ do_complete = __...
0
[]
linux
0f2122045b946241a9e549c2a76cea54fa58a7ff
3,339,708,037,648,590,600,000,000,000,000,000,000
30
io_uring: don't rely on weak ->files references Grab actual references to the files_struct. To avoid circular references issues due to this, we add a per-task note that keeps track of what io_uring contexts a task has used. When the tasks execs or exits its assigned files, we cancel requests based on this tracking. W...
cql_server::connection::process(uint16_t stream, request_reader in, service::client_state& client_state, service_permit permit, tracing::trace_state_ptr trace_state, Process process_fn) { fragmented_temporary_buffer::istream is = in.get_stream(); return process_fn(client_state, _server._query_processor...
0
[]
scylladb
1c2eef384da439b0457b6d71c7e37d7268e471cb
328,298,618,627,889,800,000,000,000,000,000,000,000
16
transport/server.cc: Return correct size of decompressed lz4 buffer An incorrect size is returned from the function, which could lead to crashes or undefined behavior. Fix by erroring out in these cases. Fixes #11476
txInteger fxGetDataViewSize(txMachine* the, txSlot* view, txSlot* buffer) { txInteger size = view->value.dataView.size; txSlot* arrayBuffer = buffer->value.reference->next; txSlot* bufferInfo = arrayBuffer->next; if (arrayBuffer->value.arrayBuffer.address == C_NULL) return 0; if (bufferInfo->value.bufferInfo.max...
0
[ "CWE-125" ]
moddable
135aa9a4a6a9b49b60aa730ebc3bcc6247d75c45
290,688,057,180,992,150,000,000,000,000,000,000,000
19
XS: #896
static ssize_t intel_vgpu_rw(struct mdev_device *mdev, char *buf, size_t count, loff_t *ppos, bool is_write) { struct intel_vgpu *vgpu = mdev_get_drvdata(mdev); unsigned int index = VFIO_PCI_OFFSET_TO_INDEX(*ppos); uint64_t pos = *ppos & VFIO_PCI_OFFSET_MASK; int ret = -EINVAL; if (index >= VFIO_PCI_NUM_REGIO...
0
[ "CWE-20" ]
linux
51b00d8509dc69c98740da2ad07308b630d3eb7d
137,020,954,748,359,050,000,000,000,000,000,000,000
48
drm/i915/gvt: Fix mmap range check This is to fix missed mmap range check on vGPU bar2 region and only allow to map vGPU allocated GMADDR range, which means user space should support sparse mmap to get proper offset for mmap vGPU aperture. And this takes care of actual pgoff in mmap request as original code always doe...
void bpf_map_area_free(void *area) { kvfree(area); }
0
[ "CWE-307" ]
linux
350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef
27,239,818,472,171,686,000,000,000,000,000,000,000
4
bpf: Dont allow vmlinux BTF to be used in map_create and prog_load. The syzbot got FD of vmlinux BTF and passed it into map_create which caused crash in btf_type_id_size() when it tried to access resolved_ids. The vmlinux BTF doesn't have 'resolved_ids' and 'resolved_sizes' initialized to save memory. To avoid such is...
virtual void visit(BackReference & /*ope*/) {}
0
[ "CWE-125" ]
cpp-peglib
b3b29ce8f3acf3a32733d930105a17d7b0ba347e
173,361,654,001,444,300,000,000,000,000,000,000,000
1
Fix #122
emsg_using_string_as(typval_T *tv, int as_number) { semsg(_(as_number ? e_using_string_as_number_str : e_using_string_as_bool_str), tv->vval.v_string == NULL ? (char_u *)"" : tv->vval.v_string); }
0
[ "CWE-416" ]
vim
9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
76,090,883,599,700,920,000,000,000,000,000,000,000
7
patch 8.2.3902: Vim9: double free with nested :def function Problem: Vim9: double free with nested :def function. Solution: Pass "line_to_free" from compile_def_function() and make sure cmdlinep is valid.
void MMDB_free_entry_data_list(MMDB_entry_data_list_s *const entry_data_list) { if (entry_data_list == NULL) { return; } if (entry_data_list->next) { MMDB_free_entry_data_list(entry_data_list->next); } free(entry_data_list); }
0
[]
libmaxminddb
51255f113fe3c7b63ffe957636a7656a3ff9d1ff
29,686,504,377,925,493,000,000,000,000,000,000,000
10
Fix several segfaults from missing bounds checks These were found using afl-fuzz. There are several more similar failure that warrant investigation. If we want to add tests, I have several corrupt databases we could add, but these are trivially reproducible when using the existing test databases as input to afl-fuzz.
static int LUKS2_open_and_verify_by_digest(struct crypt_device *cd, struct luks2_hdr *hdr, int keyslot, int digest, const char *password, size_t password_len, struct volume_key **vk) { const keyslot_handler *h; int r; if (!(h = LUKS2_keyslot_handler(cd, keyslot))) return -ENOENT; r = h->validate(cd, LUKS2...
0
[ "CWE-345" ]
cryptsetup
0113ac2d889c5322659ad0596d4cfc6da53e356c
318,729,380,548,053,550,000,000,000,000,000,000,000
29
Fix CVE-2021-4122 - LUKS2 reencryption crash recovery attack Fix possible attacks against data confidentiality through LUKS2 online reencryption extension crash recovery. An attacker can modify on-disk metadata to simulate decryption in progress with crashed (unfinished) reencryption step and persistently decrypt par...
rs_filter_get_enabled(RSFilter *filter) { g_return_val_if_fail(RS_IS_FILTER(filter), FALSE); return filter->enabled; }
0
[ "CWE-59" ]
rawstudio
9c2cd3c93c05d009a91d84eedbb85873b0cb505d
137,744,117,078,188,000,000,000,000,000,000,000,000
6
Fixes insecure use of temporary file (CVE-2014-4978).
xmlParseElementMixedContentDecl(xmlParserCtxtPtr ctxt, int inputchk) { xmlElementContentPtr ret = NULL, cur = NULL, n; const xmlChar *elem = NULL; GROW; if (CMP7(CUR_PTR, '#', 'P', 'C', 'D', 'A', 'T', 'A')) { SKIP(7); SKIP_BLANKS; SHRINK; if (RAW == ')') { if (ctxt->input->id != inputchk) { ...
0
[ "CWE-703", "CWE-835" ]
libxml2
899a5d9f0ed13b8e32449a08a361e0de127dd961
293,331,381,308,391,450,000,000,000,000,000,000,000
86
Detect infinite recursion in parameter entities When expanding a parameter entity in a DTD, infinite recursion could lead to an infinite loop or memory exhaustion. Thanks to Wei Lei for the first of many reports. Fixes bug 759579.
static CharDriverState *qemu_chr_open_stdio(const char *id, ChardevBackend *backend, ChardevReturn *ret, Error **errp) { CharDriverState *chr; WinStdioCharState *stdio; DWORD...
0
[ "CWE-416" ]
qemu
a4afa548fc6dd9842ed86639b4d37d4d1c4ad480
314,800,941,909,588,600,000,000,000,000,000,000,000
83
char: move front end handlers in CharBackend Since the hanlders are associated with a CharBackend, rather than the CharDriverState, it is more appropriate to store in CharBackend. This avoids the handler copy dance in qemu_chr_fe_set_handlers() then mux_chr_update_read_handler(), by storing the CharBackend pointer dir...
int netdev_get_name(struct net *net, char *name, int ifindex) { struct net_device *dev; unsigned int seq; retry: seq = raw_seqcount_begin(&devnet_rename_seq); rcu_read_lock(); dev = dev_get_by_index_rcu(net, ifindex); if (!dev) { rcu_read_unlock(); return -ENODEV; } strcpy(name, dev->name); rcu_read_unlo...
0
[ "CWE-400", "CWE-703" ]
linux
fac8e0f579695a3ecbc4d3cac369139d7f819971
335,091,963,744,615,500,000,000,000,000,000,000,000
23
tunnels: Don't apply GRO to multiple layers of encapsulation. When drivers express support for TSO of encapsulated packets, they only mean that they can do it for one layer of encapsulation. Supporting additional levels would mean updating, at a minimum, more IP length fields and they are unaware of this. No encapsul...
_lookup_passwd_info (const char *username, uid_t *uidp, gid_t *gidp, char **homep, char **shellp) { gboolean ret; struct passwd *passwd_entry; struct passwd passwd_buffer; char ...
0
[]
gdm
c25ef9245be4e0be2126ef3d075df4401949b570
175,618,059,289,056,420,000,000,000,000,000,000,000
77
Store the face and dmrc files in a cache. Refer to bug #565151.
static void *arm_coherent_dma_alloc(struct device *dev, size_t size, dma_addr_t *handle, gfp_t gfp, struct dma_attrs *attrs) { pgprot_t prot = __get_dma_pgprot(attrs, pgprot_kernel); void *memory; if (dma_alloc_from_coherent(dev, size, handle, &memory)) return memory; return __dma_alloc(dev, size, handle, gfp,...
1
[ "CWE-284", "CWE-264" ]
linux
0ea1ec713f04bdfac343c9702b21cd3a7c711826
252,334,972,941,904,400,000,000,000,000,000,000,000
12
ARM: dma-mapping: don't allow DMA mappings to be marked executable DMA mapping permissions were being derived from pgprot_kernel directly without using PAGE_KERNEL. This causes them to be marked with executable permission, which is not what we want. Fix this. Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk...
_outCaseTestExpr(StringInfo str, const CaseTestExpr *node) { WRITE_NODE_TYPE("CASETESTEXPR"); WRITE_OID_FIELD(typeId); WRITE_INT_FIELD(typeMod); WRITE_OID_FIELD(collation); }
0
[ "CWE-362" ]
postgres
5f173040e324f6c2eebb90d86cf1b0cdb5890f0a
84,117,135,581,728,440,000,000,000,000,000,000,000
8
Avoid repeated name lookups during table and index DDL. If the name lookups come to different conclusions due to concurrent activity, we might perform some parts of the DDL on a different table than other parts. At least in the case of CREATE INDEX, this can be used to cause the permissions checks to be performed aga...
void thread_stack_cache_init(void) { thread_stack_cache = kmem_cache_create("thread_stack", THREAD_SIZE, THREAD_SIZE, 0, NULL); BUG_ON(thread_stack_cache == NULL); }
0
[ "CWE-416", "CWE-703" ]
linux
2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
169,952,405,319,057,700,000,000,000,000,000,000,000
6
fork: fix incorrect fput of ->exe_file causing use-after-free Commit 7c051267931a ("mm, fork: make dup_mmap wait for mmap_sem for write killable") made it possible to kill a forking task while it is waiting to acquire its ->mmap_sem for write, in dup_mmap(). However, it was overlooked that this introduced an new erro...
Value ExpressionSubstrBytes::evaluate(const Document& root, Variables* variables) const { Value pString(_children[0]->evaluate(root, variables)); Value pLower(_children[1]->evaluate(root, variables)); Value pLength(_children[2]->evaluate(root, variables)); string str = pString.coerceToString(); uas...
0
[]
mongo
1772b9a0393b55e6a280a35e8f0a1f75c014f301
209,311,043,614,594,200,000,000,000,000,000,000,000
50
SERVER-49404 Enforce additional checks in $arrayToObject
int vfs_path_lookup(struct dentry *dentry, struct vfsmount *mnt, const char *name, unsigned int flags, struct nameidata *nd) { int retval; /* same as do_path_lookup */ nd->last_type = LAST_ROOT; nd->flags = flags; nd->depth = 0; nd->path.dentry = dentry; nd->path.mnt = mnt; path_get(&nd->path); ...
0
[ "CWE-120" ]
linux-2.6
d70b67c8bc72ee23b55381bd6a884f4796692f77
9,717,790,437,457,895,000,000,000,000,000,000,000
23
[patch] vfs: fix lookup on deleted directory Lookup can install a child dentry for a deleted directory. This keeps the directory dentry alive, and the inode pinned in the cache and on disk, even after all external references have gone away. This isn't a big problem normally, since memory pressure or umount will clea...
int Http2Stream::ReadStop() { CHECK(!this->IsDestroyed()); if (!IsReading()) return 0; flags_ |= NGHTTP2_STREAM_FLAG_READ_PAUSED; Debug(this, "reading stopped"); return 0; }
0
[ "CWE-416" ]
node
7f178663ebffc82c9f8a5a1b6bf2da0c263a30ed
147,320,910,999,247,170,000,000,000,000,000,000,000
8
src: use unique_ptr for WriteWrap This commit attempts to avoid a use-after-free error by using unqiue_ptr and passing a reference to it. CVE-ID: CVE-2020-8265 Fixes: https://github.com/nodejs-private/node-private/issues/227 PR-URL: https://github.com/nodejs-private/node-private/pull/238 Reviewed-By: Michael Dawson <...
static int local_LZ4_decompress_fast(const char* in, char* out, int inSize, int outSize) { (void)inSize; LZ4_decompress_fast(in, out, outSize); return outSize; }
0
[ "CWE-20" ]
lz4
da5373197e84ee49d75b8334d4510689731d6e90
291,853,450,228,646,670,000,000,000,000,000,000,000
6
Fixed : issue 52 (reported by Ludwig Strigeus)
adjust_msg_ttl(struct dns_msg* msg, time_t adjust) { size_t i; if(adjust >= 0 && msg->rep->ttl > adjust) msg->rep->ttl -= adjust; else msg->rep->ttl = 0; msg->rep->prefetch_ttl = PREFETCH_TTL_CALC(msg->rep->ttl); msg->rep->serve_expired_ttl = msg->rep->ttl + SERVE_EXPIRED_TTL; for(i=0; i<msg->rep->rrset_coun...
0
[ "CWE-613", "CWE-703" ]
unbound
f6753a0f1018133df552347a199e0362fc1dac68
163,767,356,989,976,200,000,000,000,000,000,000,000
15
- Fix the novel ghost domain issues CVE-2022-30698 and CVE-2022-30699.
void platform_device_del(struct platform_device *pdev) { u32 i; if (!IS_ERR_OR_NULL(pdev)) { device_del(&pdev->dev); if (pdev->id_auto) { ida_free(&platform_devid_ida, pdev->id); pdev->id = PLATFORM_DEVID_AUTO; } for (i = 0; i < pdev->num_resources; i++) { struct resource *r = &pdev->resource[i]; ...
0
[ "CWE-787" ]
linux
aa838896d87af561a33ecefea1caa4c15a68bc47
227,359,155,695,585,800,000,000,000,000,000,000,000
19
drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions Convert the various sprintf fmaily calls in sysfs device show functions to sysfs_emit and sysfs_emit_at for PAGE_SIZE buffer safety. Done with: $ spatch -sp-file sysfs_emit_dev.cocci --in-place --max-width=80 . And cocci script: $ cat s...
inline bool is_connected() { return TRUE; }
0
[ "CWE-416" ]
server
4681b6f2d8c82b4ec5cf115e83698251963d80d5
269,873,525,346,942,600,000,000,000,000,000,000,000
1
MDEV-26281 ASAN use-after-poison when complex conversion is involved in blob the bug was that in_vector array in Item_func_in was allocated in the statement arena, not in the table->expr_arena. revert part of the 5acd391e8b2d. Instead, change the arena correctly in fix_all_session_vcol_exprs(). Remove TABLE_ARENA, t...
static const char *cmd_cookie_format(cmd_parms *cmd, void *_dcfg, const char *p1) { directory_config *dcfg = (directory_config *)_dcfg; if (strcmp(p1, "0") == 0) dcfg->cookie_format = COOKIES_V0; else if (strcmp(p1, "1") == 0) dcfg->cookie_format = COOKIES_V1; e...
0
[ "CWE-20", "CWE-611" ]
ModSecurity
d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe
218,805,480,626,782,800,000,000,000,000,000,000,000
14
Added SecXmlExternalEntity