func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
void CClient::BouncedOff() { PutStatusNotice( t_s("You are being disconnected because another user just " "authenticated as you.")); Close(Csock::CLT_AFTERWRITE); }
0
[ "CWE-476" ]
znc
2390ad111bde16a78c98ac44572090b33c3bd2d8
205,851,344,480,183,000,000,000,000,000,000,000,000
6
Fix null pointer dereference in echo-message The bug was introduced while fixing #1705. If a client did not enable echo-message, and doesn't have a network, it crashes. Thanks to LunarBNC for reporting this
ip_get_eventloop_weight(self) VALUE self; { return get_eventloop_weight(self); }
0
[]
tk
ebd0fc80d62eeb7b8556522256f8d035e013eb65
305,617,605,171,681,550,000,000,000,000,000,000,000
5
tcltklib.c: check argument * ext/tk/tcltklib.c (ip_cancel_eval_core): check argument type and length. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@51468 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
svcauth_gss_accept_sec_context(struct svc_req *rqst, struct rpc_gss_init_res *gr) { struct svc_rpc_gss_data *gd; struct rpc_gss_cred *gc; gss_buffer_desc recv_tok, seqbuf; gss_OID mech; OM_uint32 maj_stat = 0, min_stat = 0, ret_flags, seq; log_debug("in svcauth_gss_accept_context()"); gd = SVC...
0
[ "CWE-200" ]
krb5
5bb8a6b9c9eb8dd22bc9526751610aaa255ead9c
304,739,839,992,912,950,000,000,000,000,000,000,000
114
Fix gssrpc data leakage [CVE-2014-9423] [MITKRB5-SA-2015-001] In svcauth_gss_accept_sec_context(), do not copy bytes from the union context into the handle field we send to the client. We do not use this handle field, so just supply a fixed string of "xxxx". In gss_union_ctx_id_struct, remove the unused "interposer"...
static int firm_set_rts(struct usb_serial_port *port, __u8 onoff) { struct whiteheat_set_rdb rts_command; rts_command.port = port->port_number + 1; rts_command.state = onoff; return firm_send_command(port, WHITEHEAT_SET_RTS, (__u8 *)&rts_command, sizeof(rts_command)); }
0
[ "CWE-399" ]
linux
cbb4be652d374f64661137756b8f357a1827d6a4
210,131,734,381,638,470,000,000,000,000,000,000,000
9
USB: whiteheat: fix potential null-deref at probe Fix potential null-pointer dereference at probe by making sure that the required endpoints are present. The whiteheat driver assumes there are at least five pairs of bulk endpoints, of which the final pair is used for the "command port". An attempt to bind to an inter...
template<typename tq, typename tv> bool _priority_queue_insert(CImg<tq>& is_queued, unsigned int& siz, const tv value, const unsigned int x, const unsigned int y, const unsigned int z, const unsigned int n=1) { if (is_queued(x,y,z)) return fa...
0
[ "CWE-125" ]
CImg
10af1e8c1ad2a58a0a3342a856bae63e8f257abb
339,736,476,106,723,500,000,000,000,000,000,000,000
18
Fix other issues in 'CImg<T>::load_bmp()'.
static inline int cma_loopback_addr(struct sockaddr *addr) { switch (addr->sa_family) { case AF_INET: return ipv4_is_loopback(((struct sockaddr_in *) addr)->sin_addr.s_addr); case AF_INET6: return ipv6_addr_loopback(&((struct sockaddr_in6 *) addr)->sin6_addr); case AF_IB: return ib_addr_loopback(&((struct soc...
0
[ "CWE-20" ]
linux
b2853fd6c2d0f383dbdf7427e263eb576a633867
207,094,991,446,182,550,000,000,000,000,000,000,000
13
IB/core: Don't resolve passive side RoCE L2 address in CMA REQ handler The code that resolves the passive side source MAC within the rdma_cm connection request handler was both redundant and buggy, so remove it. It was redundant since later, when an RC QP is modified to RTR state, the resolution will take place in th...
path_n_le(PG_FUNCTION_ARGS) { PATH *p1 = PG_GETARG_PATH_P(0); PATH *p2 = PG_GETARG_PATH_P(1); PG_RETURN_BOOL(p1->npts <= p2->npts); }
0
[ "CWE-703", "CWE-189" ]
postgres
31400a673325147e1205326008e32135a78b4d8a
98,773,722,565,566,070,000,000,000,000,000,000,000
7
Predict integer overflow to avoid buffer overruns. Several functions, mostly type input functions, calculated an allocation size such that the calculation wrapped to a small positive value when arguments implied a sufficiently-large requirement. Writes past the end of the inadvertent small allocation followed shortly...
static int parse_length_modifier(const char *format, size_t len, int *flags_return) { int idx = 0; int length_modifier = 0; while (idx < len) { switch (format[idx]) { case 'l': BUG_RETURN_VAL(length_modifier & LMOD_SHORT, 0); if (length_modifier & LMOD_L...
0
[ "CWE-863" ]
xserver
da15c7413916f754708c62c2089265528cd661e2
125,238,714,378,012,060,000,000,000,000,000,000,000
35
LogFilePrep: add a comment to the unsafe format string. CVE-2018-14665 also made it possible to exploit this to access memory. With -logfile forbidden when running with elevated privileges this is no longer an issue. Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> Reviewed-by: Adam Jackson <ajax@redhat.com> (cherry...
int in_egroup_p(gid_t grp) { int retval = 1; if (grp != current->egid) retval = groups_search(current->group_info, grp); return retval; }
0
[ "CWE-20" ]
linux-2.6
9926e4c74300c4b31dee007298c6475d33369df0
137,780,121,146,391,840,000,000,000,000,000,000,000
7
CPU time limit patch / setrlimit(RLIMIT_CPU, 0) cheat fix As discovered here today, the change in Kernel 2.6.17 intended to inhibit users from setting RLIMIT_CPU to 0 (as that is equivalent to unlimited) by "cheating" and setting it to 1 in such a case, does not make a difference, as the check is done in the wrong pla...
static void nfnetlink_bind(int group) { const struct nfnetlink_subsystem *ss; int type = nfnl_group2type[group]; rcu_read_lock(); ss = nfnetlink_get_subsys(type); if (!ss) { rcu_read_unlock(); request_module("nfnetlink-subsys-%d", type); return; } rcu_read_unlock(); }
0
[ "CWE-264" ]
net
90f62cf30a78721641e08737bda787552428061e
181,728,847,851,632,800,000,000,000,000,000,000,000
14
net: Use netlink_ns_capable to verify the permisions of netlink messages It is possible by passing a netlink socket to a more privileged executable and then to fool that executable into writing to the socket data that happens to be valid netlink message to do something that privileged executable did not intend to do. ...
static int vsock_stream_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) { struct sock *sk; struct vsock_sock *vsk; const struct vsock_transport *transport; ssize_t total_written; long timeout; int err; struct vsock_transport_send_notify_data send_data; DEFINE_WAIT_FUNC(wait, woken_wake_function...
1
[ "CWE-667" ]
linux
c518adafa39f37858697ac9309c6cf1805581446
196,120,595,846,231,440,000,000,000,000,000,000,000
138
vsock: fix the race conditions in multi-transport support There are multiple similar bugs implicitly introduced by the commit c0cfa2d8a788fcf4 ("vsock: add multi-transports support") and commit 6a2c0962105ae8ce ("vsock: prevent transport modules unloading"). The bug pattern: [1] vsock_sock.transport pointer is copie...
gdk_pixbuf__tiff_is_save_option_supported (const gchar *option_key) { if (g_strcmp0 (option_key, "bits-per-sample") == 0 || g_strcmp0 (option_key, "compression") == 0 || g_strcmp0 (option_key, "icc-profile") == 0 || g_strcmp0 (option_key, "x-dpi") == 0 || g_strcmp...
0
[]
gdk-pixbuf
31a6cff3dfc6944aad4612a9668b8ad39122e48b
322,761,777,603,056,900,000,000,000,000,000,000,000
11
tiff: Check for integer overflows in multiplication The checks currently in use are not sufficient, because they depend on undefined behaviour: rowstride = width * 4; if (rowstride / 4 != width) { /* overflow */ If the multiplication has already overflowed, the compiler may decide to optimize the if out and ...
int serverCron(struct aeEventLoop *eventLoop, long long id, void *clientData) { int j; UNUSED(eventLoop); UNUSED(id); UNUSED(clientData); /* Software watchdog: deliver the SIGALRM that will reach the signal * handler if we don't return here fast enough. */ if (server.watchdog_period) watch...
0
[ "CWE-770" ]
redis
5674b0057ff2903d43eaff802017eddf37c360f8
271,735,428,277,507,760,000,000,000,000,000,000,000
247
Prevent unauthenticated client from easily consuming lots of memory (CVE-2021-32675) This change sets a low limit for multibulk and bulk length in the protocol for unauthenticated connections, so that they can't easily cause redis to allocate massive amounts of memory by sending just a few characters on the network. T...
static void process_nmi(struct kvm_vcpu *vcpu) { unsigned limit = 2; /* * x86 is limited to one NMI running, and one NMI pending after it. * If an NMI is already in progress, limit further NMIs to just one. * Otherwise, allow two (and we'll inject the first one immediately). */ if (kvm_x86_ops->get_nmi_mask...
0
[]
kvm
0769c5de24621141c953fbe1f943582d37cb4244
158,145,143,985,400,610,000,000,000,000,000,000,000
16
KVM: x86: extend "struct x86_emulate_ops" with "get_cpuid" In order to be able to proceed checks on CPU-specific properties within the emulator, function "get_cpuid" is introduced. With "get_cpuid" it is possible to virtually call the guests "cpuid"-opcode without changing the VM's context. [mtosatti: cleanup/beautif...
static int check_reg_arg(struct bpf_verifier_env *env, u32 regno, enum reg_arg_type t) { struct bpf_verifier_state *vstate = env->cur_state; struct bpf_func_state *state = vstate->frame[vstate->curframe]; struct bpf_insn *insn = env->prog->insnsi + env->insn_idx; struct bpf_reg_state *reg, *regs = state->regs; ...
0
[ "CWE-787" ]
linux
64620e0a1e712a778095bd35cbb277dc2259281f
212,745,018,317,452,200,000,000,000,000,000,000,000
46
bpf: Fix out of bounds access for ringbuf helpers Both bpf_ringbuf_submit() and bpf_ringbuf_discard() have ARG_PTR_TO_ALLOC_MEM in their bpf_func_proto definition as their first argument. They both expect the result from a prior bpf_ringbuf_reserve() call which has a return type of RET_PTR_TO_ALLOC_MEM_OR_NULL. Meani...
QStringMap AbstractWebApplication::initializeContentTypeByExtMap() { QStringMap map; map["htm"] = Http::CONTENT_TYPE_HTML; map["html"] = Http::CONTENT_TYPE_HTML; map["css"] = Http::CONTENT_TYPE_CSS; map["gif"] = Http::CONTENT_TYPE_GIF; map["png"] = Http::CONTENT_TYPE_PNG; map["js"] = Http::...
0
[ "CWE-20" ]
qBittorrent
f5ad04766f4abaa78374ff03704316f8ce04627d
1,182,420,376,330,230,800,000,000,000,000,000,000
13
[WebUI] Avoid clickjacking attacks
static inline void skb_init_secmark(struct sk_buff *skb)
0
[ "CWE-20" ]
linux
2b16f048729bf35e6c28a40cbfad07239f9dcd90
139,188,669,555,158,890,000,000,000,000,000,000,000
2
net: create skb_gso_validate_mac_len() If you take a GSO skb, and split it into packets, will the MAC length (L2 + L3 + L4 headers + payload) of those packets be small enough to fit within a given length? Move skb_gso_mac_seglen() to skbuff.h with other related functions like skb_gso_network_seglen() so we can use it...
static unsigned int readuint(FILE * f, int bigendian) { unsigned char c1, c2, c3, c4; if (!fread(&c1, 1, 1, f)) { fprintf(stderr, "\nError: fread return a number of element different from the expected.\n"); return 0; } if (!fread(&c2, 1, 1, f)) { fprintf(stderr, ...
0
[ "CWE-787" ]
openjpeg
e5285319229a5d77bf316bb0d3a6cbd3cb8666d9
214,112,914,161,176,300,000,000,000,000,000,000,000
31
pgxtoimage(): fix write stack buffer overflow (#997)
const char * cli_get_last_virus(const cli_ctx * ctx) { if (!ctx || !ctx->virname || !(*ctx->virname)) return NULL; return *ctx->virname; }
0
[]
clamav-devel
167c0079292814ec5523d0b97a9e1b002bf8819b
4,429,637,493,221,876,600,000,000,000,000,000,000
6
fix 0.99.3 false negative of virus Pdf.Exploit.CVE_2016_1046-1.
dtls1_process_record(SSL *s) { int i,al; int enc_err; SSL_SESSION *sess; SSL3_RECORD *rr; unsigned int mac_size; unsigned char md[EVP_MAX_MD_SIZE]; rr= &(s->s3->rrec); sess = s->session; /* At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, * and we have that many bytes in s->packe...
0
[ "CWE-310" ]
openssl
be88529753897c29c677d1becb321f0072c0659c
175,400,391,963,294,300,000,000,000,000,000,000,000
162
Update DTLS code to match CBC decoding in TLS. This change updates the DTLS code to match the constant-time CBC behaviour in the TLS. (cherry picked from commit 9f27de170d1b7bef3d46d41382dc4dafde8b3900) (cherry picked from commit 5e4ca556e970edb8a7f364fcb6ee6818a965a60b) Conflicts: ssl/d1_enc.c ssl/d1_pkt.c ssl/s3...
archive_string_default_conversion_for_read(struct archive *a) { const char *cur_charset = get_current_charset(a); char oemcp[16]; /* NOTE: a check of cur_charset is unneeded but we need * that get_current_charset() has been surely called at * this time whatever C compiler optimized. */ if (cur_charset != NULL ...
0
[ "CWE-476" ]
libarchive
42a3408ac7df1e69bea9ea12b72e14f59f7400c0
104,001,970,317,842,200,000,000,000,000,000,000,000
19
archive_strncat_l(): allocate and do not convert if length == 0 This ensures e.g. that archive_mstring_copy_mbs_len_l() does not set aes_set = AES_SET_MBS with aes_mbs.s == NULL. Resolves possible null-pointer dereference reported by OSS-Fuzz. Reported-By: OSS-Fuzz issue 286
void close() {}
0
[ "CWE-617" ]
server
2e7891080667c59ac80f788eef4d59d447595772
203,557,133,201,634,400,000,000,000,000,000,000,000
1
MDEV-25635 Assertion failure when pushing from HAVING into WHERE of view This bug could manifest itself after pushing a where condition over a mergeable derived table / view / CTE DT into a grouping view / derived table / CTE V whose item list contained set functions with constant arguments such as MIN(2), SUM(1) etc....
const char *gf_avc_get_profile_name(u8 video_prof) { switch (video_prof) { case 0x42: return "Baseline"; case 0x4D: return "Main"; case 0x53: return "Scalable Baseline"; case 0x56: return "Scalable High"; case 0x58: return "Extended"; case 0x64: return "High"; case 0x6E: return "High 10"; case 0x...
0
[ "CWE-190", "CWE-787" ]
gpac
51cdb67ff7c5f1242ac58c5aa603ceaf1793b788
118,721,491,547,892,720,000,000,000,000,000,000,000
26
add safety in avc/hevc/vvc sps/pps/vps ID check - cf #1720 #1721 #1722
find_method_icall (const IcallTypeDesc *imap, const char *name) { const char **nameslot = bsearch (name, icall_names + imap->first_icall, icall_desc_num_icalls (imap), sizeof (icall_names [0]), compare_method_imap); if (!nameslot) return NULL; return (gpointer)icall_functions [(nameslot - icall_names)]; }
0
[ "CWE-264" ]
mono
035c8587c0d8d307e45f1b7171a0d337bb451f1e
314,714,332,472,173,920,000,000,000,000,000,000,000
7
Allow only primitive types/enums in RuntimeHelpers.InitializeArray ().
void Ogg::XiphComment::parse(const ByteVector &data) { // The first thing in the comment data is the vendor ID length, followed by a // UTF8 string with the vendor ID. uint pos = 0; int vendorLength = data.mid(0, 4).toUInt(false); pos += 4; d->vendorID = String(data.mid(pos, vendorLength), String::UTF8);...
1
[ "CWE-20" ]
taglib
ab8a0ee8937256311e649a88e8ddd7c7f870ad59
205,178,597,703,581,420,000,000,000,000,000,000,000
47
Don't store the output of ByteVector::toUInt() in int, use uint instead
get_split_sourceline( int c UNUSED, void *cookie, int indent UNUSED, getline_opt_T options UNUSED) { source_cookie_T *sp = (source_cookie_T *)cookie; char_u *p; char_u *line; if (*sp->nextline == NUL) return NULL; p = vim_strchr(sp->nextline, '\n'); if (p == NULL) { line = vim_strsa...
0
[ "CWE-416" ]
vim
9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
86,911,559,932,399,530,000,000,000,000,000,000,000
25
patch 8.2.3902: Vim9: double free with nested :def function Problem: Vim9: double free with nested :def function. Solution: Pass "line_to_free" from compile_def_function() and make sure cmdlinep is valid.
static void lex_unget(lex_t *lex, int c) { stream_unget(&lex->stream, c); }
0
[ "CWE-20" ]
jansson
64ce0ad3731ebd77e02897b07920eadd0e2cc318
319,870,623,065,678,100,000,000,000,000,000,000,000
4
Fix for issue #282 The fix limits recursion depths when parsing arrays and objects. The limit is configurable via the `JSON_PARSER_MAX_DEPTH` setting within `jansson_config.h` and is set by default to 2048. Update the RFC conformance document to note the limit; the RFC allows limits to be set by the implementation so...
static __poll_t snd_timer_user_poll(struct file *file, poll_table * wait) { __poll_t mask; struct snd_timer_user *tu; tu = file->private_data; poll_wait(file, &tu->qchange_sleep, wait); mask = 0; spin_lock_irq(&tu->qlock); if (tu->qused) mask |= EPOLLIN | EPOLLRDNORM; if (tu->di...
0
[ "CWE-416", "CWE-703" ]
linux
e7af6307a8a54f0b873960b32b6a644f2d0fbd97
242,075,331,089,318,200,000,000,000,000,000,000,000
19
ALSA: timer: Fix incorrectly assigned timer instance The clean up commit 41672c0c24a6 ("ALSA: timer: Simplify error path in snd_timer_open()") unified the error handling code paths with the standard goto, but it introduced a subtle bug: the timer instance is stored in snd_timer_open() incorrectly even if it returns an...
static char *shadow_copy2_realpath(vfs_handle_struct *handle, const char *fname) { time_t timestamp; char *stripped = NULL; char *tmp = NULL; char *result = NULL; char *inserted = NULL; char *inserted_to, *inserted_end; int saved_errno; if (!shadow_copy2_strip_snapshot(talloc_tos(), handle, fname, ...
0
[ "CWE-200" ]
samba
675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
285,110,081,026,941,340,000,000,000,000,000,000,000
53
CVE-2015-5299: s3-shadow-copy2: fix missing access check on snapdir Fix originally from <partha@exablox.com> https://bugzilla.samba.org/show_bug.cgi?id=11529 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: David Disseldorp <ddiss@samba.org>
static int tun_net_close(struct net_device *dev) { netif_stop_queue(dev); return 0; }
0
[ "CWE-119" ]
linux-2.6
3c8a9c63d5fd738c261bd0ceece04d9c8357ca13
240,381,896,344,683,400,000,000,000,000,000,000,000
5
tun/tap: Fix crashes if open() /dev/net/tun and then poll() it. Fix NULL pointer dereference in tun_chr_pool() introduced by commit 33dccbb050bbe35b88ca8cf1228dcf3e4d4b3554 ("tun: Limit amount of queued packets per device") and triggered by this code: int fd; struct pollfd pfd; fd = open("/dev/net/tun", O_RDWR); ...
TEST_F(EncryptedRecordTest, TestReadAlert) { addToQueue("17030100050123456789"); EXPECT_CALL(*readAead_, _decrypt(_, _, 0)) .WillOnce(Invoke([](std::unique_ptr<IOBuf>& buf, const IOBuf*, uint64_t) { expectSame(buf, "0123456789"); return getBuf("020215"); })); auto msg = read_.read(queu...
0
[ "CWE-400", "CWE-703", "CWE-770" ]
fizz
6bf67137ef1ee5cd70c842b014c322b7deaf994b
17,898,183,203,529,880,000,000,000,000,000,000,000
12
Reject zero length handshake records. Summary: Zero length (all padding) handshake are forbidden by RFC. Allowing these was a regression in D13754697 (2c6f78a). This is a partial fix for CVE-2019-11924 Reviewed By: xybu Differential Revision: D16285100 fbshipit-source-id: 05a19d31ad74601ce89156a0e59517aaad8dd928
static void dw_writer(struct dw_spi *dws) { u32 max; u16 txw = 0; spin_lock(&dws->buf_lock); max = tx_max(dws); while (max--) { /* Set the tx word if the transfer's original "tx" is not null */ if (dws->tx_end - dws->len) { if (dws->n_bytes == 1) txw = *(u8 *)(dws->tx); else txw = *(u16 *)(dws->...
0
[ "CWE-662" ]
linux
19b61392c5a852b4e8a0bf35aecb969983c5932d
175,439,461,371,127,860,000,000,000,000,000,000,000
20
spi: spi-dw: Add lock protect dw_spi rx/tx to prevent concurrent calls dw_spi_irq() and dw_spi_transfer_one concurrent calls. I find a panic in dw_writer(): txw = *(u8 *)(dws->tx), when dw->tx==null, dw->len==4, and dw->tx_end==1. When tpm driver's message overtime dw_spi_irq() and dw_spi_transfer_one may concurrent...
bool PackLinuxElf64::calls_crt1(Elf64_Rela const *rela, int sz) { if (!dynsym || !dynstr) { return false; } for (; 0 < sz; (sz -= sizeof(Elf64_Rela)), ++rela) { unsigned const symnum = get_te64(&rela->r_info) >> 32; char const *const symnam = get_te32(&dynsym[symnum].st_name) + dynst...
0
[ "CWE-415" ]
upx
d9288213ec156dffc435566b9d393d23e87c6914
279,622,613,616,480,300,000,000,000,000,000,000,000
16
More checking of PT_DYNAMIC and its contents. https://github.com/upx/upx/issues/206 modified: p_lx_elf.cpp
hb_ot_layout_language_get_feature_indexes (hb_face_t *face, hb_tag_t table_tag, unsigned int script_index, unsigned int language_index, unsigned int *feature_count /* IN/OUT */, unsigned int *feature_indexes /* OUT */) { const GSUBGPOS &g = get_gsubgpos_table (face, t...
0
[ "CWE-119" ]
pango
797d46714d27f147277fdd5346648d838c68fb8c
136,462,204,821,220,400,000,000,000,000,000,000,000
12
[HB/GDEF] Fix bug in building synthetic GDEF table
assegment_new (u_char type, u_short length) { struct assegment *new; new = XCALLOC (MTYPE_AS_SEG, sizeof (struct assegment)); if (length) new->as = assegment_data_new (length); new->length = length; new->type = type; return new; }
0
[ "CWE-20" ]
quagga
7a42b78be9a4108d98833069a88e6fddb9285008
194,837,776,218,374,050,000,000,000,000,000,000,000
14
bgpd: Fix AS_PATH size calculation for long paths If you have an AS_PATH with more entries than what can be written into a single AS_SEGMENT_MAX it needs to be broken up. The code that noticed that the AS_PATH needs to be broken up was not correctly calculating the size of the resulting message. This patch addresses...
static inline struct proto* get_proto(struct net_device *dev, u16 pid) { struct ppp *ppp = get_ppp(dev); switch (pid) { case PID_LCP: return &ppp->protos[IDX_LCP]; case PID_IPCP: return &ppp->protos[IDX_IPCP]; case PID_IPV6CP: return &ppp->protos[IDX_IPV6CP]; default: return NULL; } }
0
[ "CWE-20" ]
net
66d42ed8b25b64eb63111a2b8582c5afc8bf1105
185,856,960,603,664,980,000,000,000,000,000,000,000
15
hdlc_ppp: add range checks in ppp_cp_parse_cr() There are a couple bugs here: 1) If opt[1] is zero then this results in a forever loop. If the value is less than 2 then it is invalid. 2) It assumes that "len" is more than sizeof(valid_accm) or 6 which can result in memory corruption. In the case of LCP_OPTION_...
static int _gdImageJpegCtx(gdImagePtr im, gdIOCtx *outfile, int quality) { struct jpeg_compress_struct cinfo; struct jpeg_error_mgr jerr; int i, j, jidx; /* volatile so we can gdFree it on return from longjmp */ volatile JSAMPROW row = 0; JSAMPROW rowptr[1]; jmpbuf_wrapper jmpbufw; JDIMENSION nlines; char comm...
0
[ "CWE-415" ]
libgd
553702980ae89c83f2d6e254d62cf82e204956d0
24,638,686,614,233,604,000,000,000,000,000,000,000
155
Fix #492: Potential double-free in gdImage*Ptr() Whenever `gdImage*Ptr()` calls `gdImage*Ctx()` and the latter fails, we must not call `gdDPExtractData()`; otherwise a double-free would happen. Since `gdImage*Ctx()` are void functions, and we can't change that for BC reasons, we're introducing static helpers which ar...
static void nvme_set_blk_stats(NvmeNamespace *ns, struct nvme_stats *stats) { BlockAcctStats *s = blk_get_stats(ns->blkconf.blk); stats->units_read += s->nr_bytes[BLOCK_ACCT_READ] >> BDRV_SECTOR_BITS; stats->units_written += s->nr_bytes[BLOCK_ACCT_WRITE] >> BDRV_SECTOR_BITS; stats->read_commands += s->...
0
[]
qemu
736b01642d85be832385063f278fe7cd4ffb5221
319,161,021,786,764,340,000,000,000,000,000,000,000
9
hw/nvme: fix CVE-2021-3929 This fixes CVE-2021-3929 "locally" by denying DMA to the iomem of the device itself. This still allows DMA to MMIO regions of other devices (e.g. doing P2P DMA to the controller memory buffer of another NVMe device). Fixes: CVE-2021-3929 Reported-by: Qiuhao Li <Qiuhao.Li@outlook.com> Review...
ext4_find_extent(struct inode *inode, ext4_lblk_t block, struct ext4_ext_path **orig_path, int flags) { struct ext4_extent_header *eh; struct buffer_head *bh; struct ext4_ext_path *path = orig_path ? *orig_path : NULL; short int depth, i, ppos = 0; int ret; eh = ext_inode_hdr(inode); depth = ext_depth(inode)...
1
[ "CWE-125" ]
linux
bc890a60247171294acc0bd67d211fa4b88d40ba
115,061,876,847,053,640,000,000,000,000,000,000,000
75
ext4: verify the depth of extent tree in ext4_find_extent() If there is a corupted file system where the claimed depth of the extent tree is -1, this can cause a massive buffer overrun leading to sadness. This addresses CVE-2018-10877. https://bugzilla.kernel.org/show_bug.cgi?id=199417 Signed-off-by: Theodore Ts'o ...
int pipeline_d(blosc2_context* context, const int32_t bsize, uint8_t* dest, const int32_t offset, uint8_t* src, uint8_t* tmp, uint8_t* tmp2, int last_filter_index) { int32_t typesize = context->typesize; uint8_t* filters = context->filters; uint8_t* filters_meta = context->filters_me...
0
[ "CWE-787" ]
c-blosc2
c4c6470e88210afc95262c8b9fcc27e30ca043ee
133,776,624,211,031,940,000,000,000,000,000,000,000
81
Fixed asan heap buffer overflow when not enough space to write compressed block size.
static av_cold void avcodec_init(void) { static int initialized = 0; if (initialized != 0) return; initialized = 1; if (CONFIG_ME_CMP) ff_me_cmp_init_static(); }
0
[ "CWE-787" ]
FFmpeg
2080bc33717955a0e4268e738acf8c1eeddbf8cb
47,694,990,892,232,680,000,000,000,000,000,000,000
11
avcodec/utils: correct align value for interplay Fixes out of array access Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
static int oplidt(RAsm *a, ut8 *data, const Opcode *op) { int l = 0; switch (op->operands_count) { case 1: if ( op->operands[0].type & OT_MEMORY ) { data[l++] = 0x0f; data[l++] = 0x01; data[l++] = 0x18 | op->operands[0].regs[0]; } else { return -1; } break; default: return -1; } return l; }
0
[ "CWE-119", "CWE-125", "CWE-787" ]
radare2
9b46d38dd3c4de6048a488b655c7319f845af185
76,286,673,913,268,900,000,000,000,000,000,000,000
17
Fix #12372 and #12373 - Crash in x86 assembler (#12380) 0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL- leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx--
ipcp_val_agg_replacement_ok_p (ipa_agg_replacement_value *, int , HOST_WIDE_INT offset, ipa_polymorphic_call_context) { return offset == -1; }
0
[ "CWE-20" ]
gcc
a09ccc22459c565814f79f96586fe4ad083fe4eb
211,411,911,106,870,300,000,000,000,000,000,000,000
6
Avoid segfault when doing IPA-VRP but not IPA-CP (PR 93015) 2019-12-21 Martin Jambor <mjambor@suse.cz> PR ipa/93015 * ipa-cp.c (ipcp_store_vr_results): Check that info exists testsuite/ * gcc.dg/lto/pr93015_0.c: New test. From-SVN: r279695
table_check_service(struct table *t, uint32_t mask) { return t->t_backend->services & mask; }
0
[ "CWE-772", "CWE-401" ]
src
79a034b4aed29e965f45a13409268290c9910043
67,548,092,936,481,710,000,000,000,000,000,000,000
4
Use regfree after we're done with preg. From gilles@
int TS_ACCURACY_set_seconds(TS_ACCURACY *a, ASN1_INTEGER *seconds) { ASN1_INTEGER *new_seconds; if (a->seconds == seconds) return 1; new_seconds = ASN1_INTEGER_dup(seconds); if (new_seconds == NULL) { TSerr(TS_F_TS_ACCURACY_SET_SECONDS, ERR_R_MALLOC_FAILURE); return 0; } ASN1_INTEGER_free(a->seconds); ...
0
[]
openssl
c7235be6e36c4bef84594aa3b2f0561db84b63d8
336,834,060,131,439,600,000,000,000,000,000,000,000
16
RFC 3161 compliant time stamp request creation, response generation and response verification. Submitted by: Zoltan Glozik <zglozik@opentsa.org> Reviewed by: Ulf Moeller
virtual ~Frame_cursor() {}
0
[]
server
ba4927e520190bbad763bb5260ae154f29a61231
216,743,763,147,406,360,000,000,000,000,000,000,000
1
MDEV-19398: Assertion `item1->type() == Item::FIELD_ITEM ... Window Functions code tries to minimize the number of times it needs to sort the select's resultset by finding "compatible" OVER (PARTITION BY ... ORDER BY ...) clauses. This employs compare_order_elements(). That function assumed that the order expressions...
static OPJ_BOOL opj_jp2_read_colr(opj_jp2_t *jp2, OPJ_BYTE * p_colr_header_data, OPJ_UINT32 p_colr_header_size, opj_event_mgr_t * p_manager ) { OPJ_UINT32 l_value; /* precondit...
0
[ "CWE-20" ]
openjpeg
4edb8c83374f52cd6a8f2c7c875e8ffacccb5fa5
37,059,334,806,195,170,000,000,000,000,000,000,000
132
Add support for generation of PLT markers in encoder * -PLT switch added to opj_compress * Add a opj_encoder_set_extra_options() function that accepts a PLT=YES option, and could be expanded later for other uses. ------- Testing with a Sentinel2 10m band, T36JTT_20160914T074612_B02.jp2, coming from S2A_MSIL1C_20...
Stream *Parser::makeStream(Object &&dict, Guchar *fileKey, CryptAlgorithm encAlgorithm, int keyLength, int objNum, int objGen, int recursion, GBool strict) { BaseStream *baseStr; Stream *str; Goffset length; Goffset pos, endPos; // get stream start position lexer->ski...
0
[ "CWE-190" ]
poppler
0868c499a9f5f37f8df5c9fef03c37496b40fc8a
161,352,086,230,946,270,000,000,000,000,000,000,000
87
Parser::makeStream: Fix potential integer overflow
BOOL bitmap_interleaved_context_reset(BITMAP_INTERLEAVED_CONTEXT* interleaved) { if (!interleaved) return FALSE; return TRUE; }
0
[ "CWE-787" ]
FreeRDP
7b1d4b49391b4512402840431757703a96946820
5,488,398,330,078,881,000,000,000,000,000,000,000
7
Fix CVE-2020-11524: out of bounds access in interleaved Thanks to Sunglin and HuanGMz from Knownsec 404
xmlTextReaderReadState(xmlTextReaderPtr reader) { if (reader == NULL) return(-1); return(reader->mode); }
0
[ "CWE-399" ]
libxml2
213f1fe0d76d30eaed6e5853057defc43e6df2c9
227,319,821,873,303,070,000,000,000,000,000,000,000
5
CVE-2015-1819 Enforce the reader to run in constant memory One of the operation on the reader could resolve entities leading to the classic expansion issue. Make sure the buffer used for xmlreader operation is bounded. Introduce a new allocation type for the buffers for this effect.
static int ZEND_FASTCALL ZEND_DIV_SPEC_TMP_CONST_HANDLER(ZEND_OPCODE_HANDLER_ARGS) { zend_op *opline = EX(opline); zend_free_op free_op1; div_function(&EX_T(opline->result.u.var).tmp_var, _get_zval_ptr_tmp(&opline->op1, EX(Ts), &free_op1 TSRMLS_CC), &opline->op2.u.constant TSRMLS_CC); zval_dtor(free_op1.var);...
0
[]
php-src
ce96fd6b0761d98353761bf78d5bfb55291179fd
199,159,555,702,993,240,000,000,000,000,000,000,000
12
- fix #39863, do not accept paths with NULL in them. See http://news.php.net/php.internals/50191, trunk will have the patch later (adding a macro and/or changing (some) APIs. Patch by Rasmus
static MagickBooleanType WriteMETAImage(const ImageInfo *image_info, Image *image) { const StringInfo *profile; MagickBooleanType status; size_t length; /* Open image file. */ assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickSignature); assert(im...
0
[ "CWE-400" ]
ImageMagick6
4a8a6274f5e690f9106a998de9b8a8f3929402bc
321,953,188,835,172,140,000,000,000,000,000,000,000
153
https://github.com/ImageMagick/ImageMagick/issues/660
static void toggle_interruptibility(struct kvm_vcpu *vcpu, u32 mask) { u32 int_shadow = kvm_x86_ops->get_interrupt_shadow(vcpu); /* * an sti; sti; sequence only disable interrupts for the first * instruction. So, if the last instruction, be it emulated or * not, left the system with the INT_STI flag enabled, it...
0
[]
kvm
854e8bb1aa06c578c2c9145fa6bfe3680ef63b23
201,370,553,035,237,100,000,000,000,000,000,000,000
18
KVM: x86: Check non-canonical addresses upon WRMSR Upon WRMSR, the CPU should inject #GP if a non-canonical value (address) is written to certain MSRs. The behavior is "almost" identical for AMD and Intel (ignoring MSRs that are not implemented in either architecture since they would anyhow #GP). However, IA32_SYSENTE...
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; IndexPacket index; int x_status; MagickBooleanType ...
1
[ "CWE-369" ]
ImageMagick6
f663dfb8431c97d95682a2b533cca1c8233d21b4
67,553,035,693,596,730,000,000,000,000,000,000,000
453
https://github.com/ImageMagick/ImageMagick/issues/1546
CDECL void module_init() { CmdExec::RegisterCommand("mirror",cmd_mirror,0, N_("\n" "Mirror specified remote directory to local directory\n" "\n" " -R, --reverse reverse mirror (put files)\n" "Lots of other options are documented in the man page lftp(1).\n" "\n" "When using -R, the first di...
0
[ "CWE-20", "CWE-401" ]
lftp
a27e07d90a4608ceaf928b1babb27d4d803e1992
72,446,738,144,742,190,000,000,000,000,000,000,000
17
mirror: prepend ./ to rm and chmod arguments to avoid URL recognition (fix #452)
static int fbo_write(struct tcmu_device *dev, uint8_t *cdb, struct iovec *iovec, size_t iov_cnt, uint8_t *sense, bool do_verify) { struct fbo_state *state = tcmu_get_dev_private(dev); struct iovec write_iovec[iov_cnt]; uint8_t fua = cdb[1] & 0x08; uint64_t cur_lba = 0; uint64_t offset; int length = 0; int...
0
[ "CWE-200" ]
tcmu-runner
8cf8208775022301adaa59c240bb7f93742d1329
5,744,658,315,567,717,000,000,000,000,000,000,000
65
removed all check_config callback implementations to avoid security issues see github issue #194 qcow.c contained an information leak, could test for existance of any file in the system file_example.c and file_optical.c allow also to test for existance of any file, plus to temporarily create empty new files anywhere...
void DL_Dxf::addTrace(DL_CreationInterface* creationInterface) { DL_TraceData td; for (int k = 0; k < 4; k++) { td.x[k] = getRealValue(10 + k, 0.0); td.y[k] = getRealValue(20 + k, 0.0); td.z[k] = getRealValue(30 + k, 0.0); } creationInterface->addTrace(td); }
0
[ "CWE-191" ]
qcad
1eeffc5daf5a06cf6213ffc19e95923cdebb2eb8
243,587,102,242,723,900,000,000,000,000,000,000,000
10
check vertexIndex which might be -1 for broken DXF
BGD_DECLARE(void *) gdImageGifAnimBeginPtr(gdImagePtr im, int *size, int GlobalCM, int Loops) { void *rv; gdIOCtx *out = gdNewDynamicCtx(2048, NULL); if (out == NULL) return NULL; gdImageGifAnimBeginCtx(im, out, GlobalCM, Loops); rv = gdDPExtractData(out, size); out->gd_free(out); return rv; }
0
[ "CWE-415" ]
libgd
553702980ae89c83f2d6e254d62cf82e204956d0
190,884,949,487,401,970,000,000,000,000,000,000,000
10
Fix #492: Potential double-free in gdImage*Ptr() Whenever `gdImage*Ptr()` calls `gdImage*Ctx()` and the latter fails, we must not call `gdDPExtractData()`; otherwise a double-free would happen. Since `gdImage*Ctx()` are void functions, and we can't change that for BC reasons, we're introducing static helpers which ar...
int ldsem_down_write_trylock(struct ld_semaphore *sem) { long count = sem->count; while ((count & LDSEM_ACTIVE_MASK) == 0) { if (ldsem_cmpxchg(&count, count + LDSEM_WRITE_BIAS, sem)) { lockdep_acquire(sem, 0, 1, _RET_IP_); lock_stat(sem, acquired); return 1; } } return 0; }
0
[ "CWE-362" ]
linux
cf872776fc84128bb779ce2b83a37c884c3203ae
149,149,695,527,268,000,000,000,000,000,000,000,000
13
tty: Fix hang at ldsem_down_read() When a controlling tty is being hung up and the hang up is waiting for a just-signalled tty reader or writer to exit, and a new tty reader/writer tries to acquire an ldisc reference concurrently with the ldisc reference release from the signalled reader/writer, the hangup can hang. T...
autoar_extractor_dispose (GObject *object) { AutoarExtractor *self; self = AUTOAR_EXTRACTOR (object); g_debug ("AutoarExtractor: dispose"); if (self->istream != NULL) { if (!g_input_stream_is_closed (self->istream)) { g_input_stream_close (self->istream, self->cancellable, NULL); } g_object...
0
[ "CWE-59" ]
gnome-autoar
8109c368c6cfdb593faaf698c2bf5da32bb1ace4
330,478,830,301,611,060,000,000,000,000,000,000,000
47
extractor: Do not allow symlink in parents Currently, it is still possible that some files are extracted outside of the destination dir in case of malicious archives. The checks from commit adb067e6 can be still bypassed in certain cases. See GNOME/file-roller#108 for more details. After some investigation, I am convi...
static long unix_stream_data_wait(struct sock * sk, long timeo) { DEFINE_WAIT(wait); unix_state_lock(sk); for (;;) { prepare_to_wait(sk->sk_sleep, &wait, TASK_INTERRUPTIBLE); if (!skb_queue_empty(&sk->sk_receive_queue) || sk->sk_err || (sk->sk_shutdown & RCV_SHUTDOWN) || signal_pending(curre...
0
[]
linux-2.6
6209344f5a3795d34b7f2c0061f49802283b6bdd
120,657,875,404,687,160,000,000,000,000,000,000,000
27
net: unix: fix inflight counting bug in garbage collector Previously I assumed that the receive queues of candidates don't change during the GC. This is only half true, nothing can be received from the queues (see comment in unix_gc()), but buffers could be added through the other half of the socket pair, which may s...
ldns_rdf_set_size(ldns_rdf *rd, size_t size) { assert(rd != NULL); rd->_size = size; }
0
[ "CWE-415" ]
ldns
070b4595981f48a21cc6b4f5047fdc2d09d3da91
87,380,988,848,161,050,000,000,000,000,000,000,000
5
CAA and URI
_outList(StringInfo str, const List *node) { const ListCell *lc; appendStringInfoChar(str, '('); if (IsA(node, IntList)) appendStringInfoChar(str, 'i'); else if (IsA(node, OidList)) appendStringInfoChar(str, 'o'); foreach(lc, node) { /* * For the sake of backward compatibility, we emit a slightly *...
0
[ "CWE-362" ]
postgres
5f173040e324f6c2eebb90d86cf1b0cdb5890f0a
115,567,360,407,094,360,000,000,000,000,000,000,000
35
Avoid repeated name lookups during table and index DDL. If the name lookups come to different conclusions due to concurrent activity, we might perform some parts of the DDL on a different table than other parts. At least in the case of CREATE INDEX, this can be used to cause the permissions checks to be performed aga...
static void media_device_kpad_to_upad(const struct media_pad *kpad, struct media_pad_desc *upad) { upad->entity = kpad->entity->id; upad->index = kpad->index; upad->flags = kpad->flags; }
0
[ "CWE-200" ]
linux
e6a623460e5fc960ac3ee9f946d3106233fd28d8
74,971,610,386,944,130,000,000,000,000,000,000,000
7
[media] media-device: fix infoleak in ioctl media_enum_entities() This fixes CVE-2014-1739. Signed-off-by: Salva Peiró <speiro@ai2.upv.es> Acked-by: Laurent Pinchart <laurent.pinchart@ideasonboard.com> Cc: stable@vger.kernel.org Signed-off-by: Mauro Carvalho Chehab <m.chehab@samsung.com>
BaseType_t xQueuePeek( QueueHandle_t xQueue, void * const pvBuffer, TickType_t xTicksToWait ) { BaseType_t xEntryTimeSet = pdFALSE; TimeOut_t xTimeOut; int8_t * pcOriginalReadPosition; Queue_t * const pxQueue = xQueue; /* Check the pointer is n...
0
[ "CWE-200", "CWE-190" ]
FreeRTOS-Kernel
47338393f1f79558f6144213409f09f81d7c4837
85,562,058,189,642,120,000,000,000,000,000,000,000
149
add assert for addition overflow on queue creation (#225)
static void usbredir_do_attach(void *opaque) { USBRedirDevice *dev = opaque; Error *local_err = NULL; /* In order to work properly with XHCI controllers we need these caps */ if ((dev->dev.port->speedmask & USB_SPEED_MASK_SUPER) && !( usbredirparser_peer_has_cap(dev->parser, ...
0
[ "CWE-770" ]
qemu
7ec54f9eb62b5d177e30eb8b1cad795a5f8d8986
253,435,018,402,649,480,000,000,000,000,000,000,000
25
usb/redir: avoid dynamic stack allocation (CVE-2021-3527) Use autofree heap allocation instead. Fixes: 4f4321c11ff ("usb: use iovecs in USBPacket") Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com> Message-Id:...
int dtls1_do_write(SSL *s, int type) { int ret; int curr_mtu; unsigned int len, frag_off, mac_size, blocksize; /* AHA! Figure out the MTU, and stick to the right size */ if ( ! (SSL_get_options(s) & SSL_OP_NO_QUERY_MTU)) { s->d1->mtu = BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL); /* ...
0
[]
openssl
1507f3abba28f333ed5d1bd200e5ee82b2c7f16a
45,291,303,120,708,910,000,000,000,000,000,000,000
179
PR: 2230 Submitted By: Robin Seggelmann <seggelmann@fh-muenster.de> Fix various DTLS fragment reassembly bugs.
void AuthorizationSessionImpl::_buildAuthenticatedRolesVector() { _authenticatedRoleNames.clear(); for (UserSet::iterator it = _authenticatedUsers.begin(); it != _authenticatedUsers.end(); ++it) { RoleNameIterator roles = (*it)->getIndirectRoles(); while (roles.more()) { Rol...
0
[ "CWE-613" ]
mongo
e55d6e2292e5dbe2f97153251d8193d1cc89f5d7
152,735,490,487,804,040,000,000,000,000,000,000,000
11
SERVER-38984 Validate unique User ID on UserCache hit
void BN_free(BIGNUM *a) { if (a == NULL) return; bn_check_top(a); if ((a->d != NULL) && !(BN_get_flags(a, BN_FLG_STATIC_DATA))) OPENSSL_free(a->d); if (a->flags & BN_FLG_MALLOCED) OPENSSL_free(a); else { #ifndef OPENSSL_NO_DEPRECATED a->flags |= BN_FLG_FREE; #endif ...
0
[]
openssl
b18162a7c9bbfb57112459a4d6631fa258fd8c0c
206,077,937,349,755,240,000,000,000,000,000,000,000
16
CVE-2018-5407 fix: ECC ladder Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com> (Merged from https://github.com/openssl/openssl/pull/7593)
gs_manager_deactivate (GSManager *manager) { g_return_val_if_fail (manager != NULL, FALSE); g_return_val_if_fail (GS_IS_MANAGER (manager), FALSE); if (! manager->priv->active) { gs_debug ("Trying to deactivate a screensaver that is not active"); return FALSE; ...
0
[]
gnome-screensaver
2f597ea9f1f363277fd4dfc109fa41bbc6225aca
98,336,309,212,013,630,000,000,000,000,000,000,000
29
Fix adding monitors Make sure to show windows that are added. And fix an off by one bug.
static inline int fpu_alloc(struct fpu *fpu) { if (fpu_allocated(fpu)) return 0; fpu->state = kmem_cache_alloc(task_xstate_cachep, GFP_KERNEL); if (!fpu->state) return -ENOMEM; WARN_ON((unsigned long)fpu->state & 15); return 0; }
0
[ "CWE-284", "CWE-264" ]
linux
26bef1318adc1b3a530ecc807ef99346db2aa8b0
196,606,045,177,527,130,000,000,000,000,000,000,000
10
x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround Before we do an EMMS in the AMD FXSAVE information leak workaround we need to clear any pending exceptions, otherwise we trap with a floating-point exception inside this code. Reported-by: halfdog <me@halfdog.net> Tested-by: Borislav Petkov <bp@suse.de> Link: h...
void virtio_save(VirtIODevice *vdev, QEMUFile *f) { BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); int i; if (k->save_config) { k->save_config(qbus->parent, f); } qemu_put_8s(f, &vdev->status); qemu_put_8s(f, &vdev->isr); qem...
0
[ "CWE-269" ]
qemu
5f5a1318653c08e435cfa52f60b6a712815b659d
210,469,550,995,699,270,000,000,000,000,000,000,000
36
virtio: properly validate address before accessing config There are several several issues in the current checking: - The check was based on the minus of unsigned values which can overflow - It was done after .{set|get}_config() which can lead crash when config_len is zero since vdev->config is NULL Fix this by: ...
static int on_url(http_parser* self_, const char* at, size_t length) { HTTPParser* self = static_cast<HTTPParser*>(self_); self->req.raw_url.insert(self->req.raw_url.end(), at, at + length); self->req.url_params = query_string(self->req.raw_url); self->req...
0
[ "CWE-416" ]
Crow
fba01dc76d6ea940ad7c8392e8f39f9647241d8e
30,145,575,489,327,437,000,000,000,000,000,000,000
11
Prevent HTTP pipelining which Crow doesn't support.
static int ac_interception(struct vcpu_svm *svm) { kvm_queue_exception_e(&svm->vcpu, AC_VECTOR, 0); return 1; }
0
[ "CWE-401" ]
linux
d80b64ff297e40c2b6f7d7abc1b3eba70d22a068
190,308,963,493,231,140,000,000,000,000,000,000,000
5
KVM: SVM: Fix potential memory leak in svm_cpu_init() When kmalloc memory for sd->sev_vmcbs failed, we forget to free the page held by sd->save_area. Also get rid of the var r as '-ENOMEM' is actually the only possible outcome here. Reviewed-by: Liran Alon <liran.alon@oracle.com> Reviewed-by: Vitaly Kuznetsov <vkuzne...
static void __sched notrace preempt_schedule_common(void) { do { preempt_disable_notrace(); __schedule(true); preempt_enable_no_resched_notrace(); /* * Check again in case we missed a preemption opportunity * between schedule and now. */ } while (need_resched()); }
0
[ "CWE-119" ]
linux
29d6455178a09e1dc340380c582b13356227e8df
243,044,671,841,520,000,000,000,000,000,000,000,000
13
sched: panic on corrupted stack end Until now, hitting this BUG_ON caused a recursive oops (because oops handling involves do_exit(), which calls into the scheduler, which in turn raises an oops), which caused stuff below the stack to be overwritten until a panic happened (e.g. via an oops in interrupt context, cause...
nma_menu_deactivate_cb (GtkWidget *widget, NMApplet *applet) { /* Must punt the destroy to a low-priority idle to ensure that * the menu items don't get destroyed before any 'activate' signal * fires for an item. */ g_idle_add_full (G_PRIORITY_LOW, (GSourceFunc) nma_menu_clear, applet, NULL); /* Re-set the to...
0
[ "CWE-200" ]
network-manager-applet
8627880e07c8345f69ed639325280c7f62a8f894
191,781,593,275,341,000,000,000,000,000,000,000,000
15
editor: prevent any registration of objects on the system bus D-Bus access-control is name-based; so requests for a specific name are allowed/denied based on the rules in /etc/dbus-1/system.d. But apparently apps still get a non-named service on the bus, and if we register *any* object even though we don't have a nam...
gb18030_is_mbc_ambiguous(OnigCaseFoldType flag, const UChar** pp, const UChar* end) { return onigenc_mbn_is_mbc_ambiguous(ONIG_ENCODING_GB18030, flag, pp, end); }
0
[ "CWE-125" ]
oniguruma
65a9b1aa03c9bc2dc01b074295b9603232cb3b78
123,175,315,593,948,530,000,000,000,000,000,000,000
5
onig-5.9.2
int x509parse_verify( x509_cert *crt, x509_cert *trust_ca, x509_crl *ca_crl, const char *cn, int *flags, int (*f_vrfy)(void *, x509_cert *, int, int *), void *p_vrfy ) { size_t cn_len; int ret; int ...
0
[ "CWE-310" ]
polarssl
43f9799ce61c6392a014d0a2ea136b4b3a9ee194
308,171,931,314,253,600,000,000,000,000,000,000,000
107
RSA blinding on CRT operations to counter timing attacks
get_stringztrunc_value(wmem_allocator_t *scope, tvbuff_t *tvb, gint start, gint length, gint *ret_length, const guint encoding) { /* * XXX - currently, string values are null- * terminated, so a "zero-truncated" string * isn't special. If we represent string * values as something that includes a counted ...
0
[ "CWE-401" ]
wireshark
a9fc769d7bb4b491efb61c699d57c9f35269d871
28,144,691,810,263,890,000,000,000,000,000,000,000
17
epan: Fix a memory leak. Make sure _proto_tree_add_bits_ret_val allocates a bits array using the packet scope, otherwise we leak memory. Fixes #17032.
int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type, bool initiator) { BT_DBG("hcon %p", conn); if (conn->type == LE_LINK) return smp_conn_security(conn, sec_level); /* For sdp we don't need the link key. */ if (sec_level == BT_SECURITY_SDP) return 1; /* For non 2.1 devices a...
1
[ "CWE-327" ]
linux
693cd8ce3f882524a5d06f7800dd8492411877b3
271,413,316,204,060,140,000,000,000,000,000,000,000
67
Bluetooth: Fix regression with minimum encryption key size alignment When trying to align the minimum encryption key size requirement for Bluetooth connections, it turns out doing this in a central location in the HCI connection handling code is not possible. Original Bluetooth version up to 2.0 used a security model...
ews_store_get_property (GObject *object, guint property_id, GValue *value, GParamSpec *pspec) { switch (property_id) { case PROP_HAS_OOO_SET: g_value_set_boolean ( value, camel_ews_store_get_has_ooo_set ( CAMEL_EWS_STORE (object))...
0
[ "CWE-295" ]
evolution-ews
915226eca9454b8b3e5adb6f2fff9698451778de
332,259,811,773,596,860,000,000,000,000,000,000,000
34
I#27 - SSL Certificates are not validated This depends on https://gitlab.gnome.org/GNOME/evolution-data-server/commit/6672b8236139bd6ef41ecb915f4c72e2a052dba5 too. Closes https://gitlab.gnome.org/GNOME/evolution-ews/issues/27
arpt_error(struct sk_buff *skb, const struct xt_action_param *par) { if (net_ratelimit()) pr_err("arp_tables: error: '%s'\n", (const char *)par->targinfo); return NF_DROP; }
0
[ "CWE-200" ]
linux-2.6
42eab94fff18cb1091d3501cd284d6bd6cc9c143
11,012,692,971,832,465,000,000,000,000,000,000,000
8
netfilter: arp_tables: fix infoleak to userspace Structures ipt_replace, compat_ipt_replace, and xt_get_revision are copied from userspace. Fields of these structs that are zero-terminated strings are not checked. When they are used as argument to a format string containing "%s" in request_module(), some sensitive i...
static struct file *do_open_execat(int fd, struct filename *name, int flags) { struct file *file; int err; struct open_flags open_exec_flags = { .open_flag = O_LARGEFILE | O_RDONLY | __FMODE_EXEC, .acc_mode = MAY_EXEC, .intent = LOOKUP_OPEN, .lookup_flags = LOOKUP_FOLLOW, }; if ((flags & ~(AT_SYMLINK_NOFO...
0
[]
linux
98da7d08850fb8bdeb395d6368ed15753304aa0c
226,866,641,448,438,670,000,000,000,000,000,000,000
43
fs/exec.c: account for argv/envp pointers When limiting the argv/envp strings during exec to 1/4 of the stack limit, the storage of the pointers to the strings was not included. This means that an exec with huge numbers of tiny strings could eat 1/4 of the stack limit in strings and then additional space would be lat...
lyd_get_node_siblings(const struct lyd_node *data, const struct lys_node *schema, struct ly_set *set) { const struct lyd_node *iter; assert(set && !set->number); assert(schema); assert(schema->nodetype & (LYS_CONTAINER | LYS_LEAF | LYS_LIST | LYS_LEAFLIST | LYS_ANYDATA | LYS_NOTIF | LYS_RPC | ...
0
[ "CWE-119" ]
libyang
32fb4993bc8bb49e93e84016af3c10ea53964be5
235,424,148,241,008,030,000,000,000,000,000,000,000
21
schema tree BUGFIX do not check features while still resolving schema Fixes #723
virConnectDomainEventRegister(virConnectPtr conn, virConnectDomainEventCallback cb, void *opaque, virFreeCallback freecb) { VIR_DEBUG("conn=%p, cb=%p, opaque=%p, freecb=%p", conn, cb, opaque, freecb); virResetLastError(); ...
0
[ "CWE-254" ]
libvirt
506e9d6c2d4baaf580d489fff0690c0ff2ff588f
151,004,864,920,792,620,000,000,000,000,000,000,000
24
virDomainGetTime: Deny on RO connections We have a policy that if API may end up talking to a guest agent it should require RW connection. We don't obey the rule in virDomainGetTime(). Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
static s32 gf_avc_read_sps_bs_internal(GF_BitStream *bs, AVCState *avc, u32 subseq_sps, u32 *vui_flag_pos, u32 nal_hdr) { AVC_SPS *sps; s32 mb_width, mb_height, sps_id = -1; u32 profile_idc, level_idc, pcomp, i, chroma_format_idc, cl = 0, cr = 0, ct = 0, cb = 0, luma_bd, chroma_bd; u8 separate_colour_plane_flag = 0...
1
[ "CWE-190" ]
gpac
0cd19f4db70615d707e0e6202933c2ea0c1d36df
24,220,685,543,054,480,000,000,000,000,000,000,000
310
fixed #2067
static int fuse_buffered_write(struct file *file, struct inode *inode, loff_t pos, unsigned count, struct page *page) { int err; size_t nres; struct fuse_conn *fc = get_fuse_conn(inode); unsigned offset = pos & (PAGE_CACHE_SIZE - 1); struct fuse_req *req; if (is_bad_inode(inode)) return -EIO; /* ...
0
[]
linux-2.6
0bd87182d3ab18a32a8e9175d3f68754c58e3432
82,818,703,315,731,000,000,000,000,000,000,000,000
40
fuse: fix kunmap in fuse_ioctl_copy_user Looks like another victim of the confusing kmap() vs kmap_atomic() API differences. Reported-by: Todor Gyumyushev <yodor1@gmail.com> Signed-off-by: Jens Axboe <jens.axboe@oracle.com> Signed-off-by: Miklos Szeredi <mszeredi@suse.cz> Cc: Tejun Heo <tj@kernel.org> Cc: stable@kern...
R_API void r_bin_java_print_float_cp_summary(RBinJavaCPTypeObj *obj) { ut8 *b = NULL; if (!obj) { eprintf ("Attempting to print an invalid RBinJavaCPTypeObj* Double.\n"); return; } b = obj->info.cp_float.bytes.raw; printf ("Float ConstantPool Type (%d) ", obj->metas->ord); printf (" Offset: 0x%08"PFMT64x ""...
0
[ "CWE-119", "CWE-788" ]
radare2
6c4428f018d385fc80a33ecddcb37becea685dd5
326,797,397,143,394,500,000,000,000,000,000,000,000
12
Improve boundary checks to fix oobread segfaults ##crash * Reported by Cen Zhang via huntr.dev * Reproducer: bins/fuzzed/javaoob-havoc.class
static void print_version(void) { set_server_version(); printf("%s Ver %s for %s on %s (%s)\n",my_progname, server_version,SYSTEM_TYPE,MACHINE_TYPE, MYSQL_COMPILATION_COMMENT); }
0
[ "CWE-264" ]
mysql-server
48bd8b16fe382be302c6f0b45931be5aa6f29a0e
133,832,254,624,609,940,000,000,000,000,000,000,000
7
Bug#24388753: PRIVILEGE ESCALATION USING MYSQLD_SAFE [This is the 5.5/5.6 version of the bugfix]. The problem was that it was possible to write log files ending in .ini/.cnf that later could be parsed as an options file. This made it possible for users to specify startup options without the permissions to do so. Thi...
int nested_svm_exit_special(struct vcpu_svm *svm) { u32 exit_code = svm->vmcb->control.exit_code; switch (exit_code) { case SVM_EXIT_INTR: case SVM_EXIT_NMI: case SVM_EXIT_NPF: return NESTED_EXIT_HOST; case SVM_EXIT_EXCP_BASE ... SVM_EXIT_EXCP_BASE + 0x1f: { u32 excp_bits = 1 << (exit_code - SVM_EXIT_EXCP_BA...
0
[ "CWE-416" ]
linux
a58d9166a756a0f4a6618e4f593232593d6df134
222,638,158,865,409,540,000,000,000,000,000,000,000
27
KVM: SVM: load control fields from VMCB12 before checking them Avoid races between check and use of the nested VMCB controls. This for example ensures that the VMRUN intercept is always reflected to the nested hypervisor, instead of being processed by the host. Without this patch, it is possible to end up with svm->...
int state_putwc (wchar_t wc, STATE *s) { char mb[MB_LEN_MAX] = ""; int rc; if ((rc = wcrtomb (mb, wc, NULL)) < 0) return rc; if (fputs (mb, s->fpout) == EOF) return -1; return 0; }
0
[ "CWE-668" ]
mutt
6d0624411a979e2e1d76af4dd97d03f47679ea4a
178,290,264,287,842,870,000,000,000,000,000,000,000
11
use a 64-bit random value in temporary filenames. closes #3158
void CLASS sinar_4shot_load_raw() { ushort *pixel; unsigned shot, row, col, r, c; if (raw_image) { shot = LIM (shot_select, 1, 4) - 1; fseek (ifp, data_offset + shot*4, SEEK_SET); fseek (ifp, get4(), SEEK_SET); unpacked_load_raw(); return; } #ifdef LIBRAW_LIBRARY_BUILD else if(!image) ...
0
[ "CWE-369", "CWE-704" ]
LibRaw
9f26ce37f5be86ea11bfc6831366558650b1f6ff
212,683,866,419,511,170,000,000,000,000,000,000,000
45
SA81000: LibRaw 0.18.8
static long set_instruction_bp(struct task_struct *child, struct ppc_hw_breakpoint *bp_info) { int slot; int slot1_in_use = ((child->thread.debug.dbcr0 & DBCR0_IAC1) != 0); int slot2_in_use = ((child->thread.debug.dbcr0 & DBCR0_IAC2) != 0); int slot3_in_use = ((child->thread.debug.dbcr0 & DBCR0_IAC3) != 0)...
0
[ "CWE-119", "CWE-787" ]
linux
c1fa0768a8713b135848f78fd43ffc208d8ded70
105,322,392,842,089,040,000,000,000,000,000,000,000
87
powerpc/tm: Flush TM only if CPU has TM feature Commit cd63f3c ("powerpc/tm: Fix saving of TM SPRs in core dump") added code to access TM SPRs in flush_tmregs_to_thread(). However flush_tmregs_to_thread() does not check if TM feature is available on CPU before trying to access TM SPRs in order to copy live state to th...
PJ_DEF(pj_status_t) pjsip_dlg_respond( pjsip_dialog *dlg, pjsip_rx_data *rdata, int st_code, const pj_str_t *st_text, const pjsip_hdr *hdr_list, const pjsip_msg_body *body ) { pj_status_t status; pjsip_tx_data *tdata; /* Sanity check. */ PJ_ASSERT_RETURN(dlg && rdata && rdata-...
0
[ "CWE-297", "CWE-295" ]
pjproject
67e46c1ac45ad784db5b9080f5ed8b133c122872
309,354,111,260,933,940,000,000,000,000,000,000,000
45
Merge pull request from GHSA-8hcp-hm38-mfph * Check hostname during TLS transport selection * revision based on feedback * remove the code in create_request that has been moved
int crypt_token_max(const char *type) { if (isLUKS2(type)) return LUKS2_TOKENS_MAX; return -EINVAL; }
0
[ "CWE-345" ]
cryptsetup
0113ac2d889c5322659ad0596d4cfc6da53e356c
23,635,706,884,662,006,000,000,000,000,000,000,000
7
Fix CVE-2021-4122 - LUKS2 reencryption crash recovery attack Fix possible attacks against data confidentiality through LUKS2 online reencryption extension crash recovery. An attacker can modify on-disk metadata to simulate decryption in progress with crashed (unfinished) reencryption step and persistently decrypt par...
ecc_gostdsa_verify (const struct ecc_curve *ecc, const mp_limb_t *pp, /* Public key */ size_t length, const uint8_t *digest, const mp_limb_t *rp, const mp_limb_t *sp, mp_limb_t *scratch) { /* Procedure, according to GOST R 34.10. q denotes the group order. 1. Check 0 < r, s < q. 2. v ...
1
[ "CWE-787" ]
nettle
401c8d53d8a8cf1e79980e62bda3f946f8e07c14
293,591,225,616,428,640,000,000,000,000,000,000,000
70
Analogous fix to ecc_gostdsa_verify. * ecc-gostdsa-verify.c (ecc_gostdsa_verify): Use ecc_mod_mul_canonical to compute the scalars used for ecc multiplication. (cherry picked from commit fbaefb64b90cb45b7075a0ed72a92f2a1fbcd2ab)
on_response(void *data, krb5_error_code retval, otp_response response) { struct request_state rs = *(struct request_state *)data; free(data); if (retval == 0 && response != otp_response_success) retval = KRB5_PREAUTH_FAILED; if (retval == 0) rs.enc_tkt_reply->flags |= TKT_FLG_PRE_AUTH...
0
[ "CWE-284", "CWE-264" ]
krb5
e3b5a5e5267818c97750b266df50b6a3d4649604
17,707,532,551,411,090,000,000,000,000,000,000,000
14
Prevent requires_preauth bypass [CVE-2015-2694] In the OTP kdcpreauth module, don't set the TKT_FLG_PRE_AUTH bit until the request is successfully verified. In the PKINIT kdcpreauth module, don't respond with code 0 on empty input or an unconfigured realm. Together these bugs could cause the KDC preauth framework to...
bool file_tree_checksum::operator==(const file_tree_checksum &rhs) const { return nfiles == rhs.nfiles && sum_size == rhs.sum_size && modified == rhs.modified; }
0
[ "CWE-200" ]
wesnoth
af61f9fdd15cd439da9e2fe5fa39d174c923eaae
275,262,564,491,983,980,000,000,000,000,000,000,000
5
fs: Use game data path to resolve ./ in the absence of a current_dir Fixes a file content disclosure bug (#22042) affecting functionality relying on the get_wml_location() function and not passing a non-empty value for the current_dir parameter. See <https://gna.org/bugs/?22042> for details. This is a candidate for ...
bgp_read_options(struct bgp_conn *conn, byte *pos, uint len, uint rest) { struct bgp_proto *p = conn->bgp; int ext = 0; /* Handle extended length (draft-ietf-idr-ext-opt-param-07) */ if ((len > 0) && (rest > 0) && (pos[0] == 255)) { if (rest < 3) goto err; /* Update pos/len to describe optiona...
0
[ "CWE-787" ]
bird
8388f5a7e14108a1458fea35bfbb5a453e2c563c
13,775,932,453,583,135,000,000,000,000,000,000,000
63
BGP: Fix bugs in handling of shutdown messages There is an improper check for valid message size, which may lead to stack overflow and buffer leaks to log when a large message is received. Thanks to Daniel McCarney for bugreport and analysis.
static void set_banner(apr_pool_t *pconf) { if (ap_server_tokens == SrvTk_PRODUCT_ONLY) { ap_add_version_component(pconf, AP_SERVER_BASEPRODUCT); } else if (ap_server_tokens == SrvTk_MINIMAL) { ap_add_version_component(pconf, AP_SERVER_BASEVERSION); } else if (ap_server_tokens == Srv...
0
[ "CWE-416", "CWE-284" ]
httpd
4cc27823899e070268b906ca677ee838d07cf67a
232,915,052,381,824,660,000,000,000,000,000,000,000
27
core: Disallow Methods' registration at run time (.htaccess), they may be used only if registered at init time (httpd.conf). Calling ap_method_register() in children processes is not the right scope since it won't be shared for all requests. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1807655 13f7...