func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
*/ void bfq_bfqq_expire(struct bfq_data *bfqd, struct bfq_queue *bfqq, bool compensate, enum bfqq_expiration reason) { bool slow; unsigned long delta = 0; struct bfq_entity *entity = &bfqq->entity; /* * Check whether the process is slow (see bfq_bfqq_is_slow). */ slow = bfq_bfqq_is_slow(...
0
[ "CWE-416" ]
linux
2f95fa5c955d0a9987ffdc3a095e2f4e62c5f2a9
182,001,668,168,082,970,000,000,000,000,000,000,000
138
block, bfq: fix use-after-free in bfq_idle_slice_timer_body In bfq_idle_slice_timer func, bfqq = bfqd->in_service_queue is not in bfqd-lock critical section. The bfqq, which is not equal to NULL in bfq_idle_slice_timer, may be freed after passing to bfq_idle_slice_timer_body. So we will access the freed memory. In ad...
static ZEND_COLD zend_function *zend_generator_get_constructor(zend_object *object) /* {{{ */ { zend_throw_error(NULL, "The \"Generator\" class is reserved for internal use and cannot be manually instantiated"); return NULL; }
0
[]
php-src
83e2b9e2202da6cc25bdaac67a58022b90be88e7
250,721,412,413,018,750,000,000,000,000,000,000,000
6
Fixed bug #76946
e_util_identity_can_send (ESourceRegistry *registry, ESource *identity_source) { ESourceMailSubmission *mail_submission; ESource *transport_source = NULL; const gchar *transport_uid; gboolean can_send = FALSE; g_return_val_if_fail (E_IS_SOURCE_REGISTRY (registry), FALSE); g_return_val_if_fail (E_IS_SOURCE (...
0
[ "CWE-295" ]
evolution-data-server
6672b8236139bd6ef41ecb915f4c72e2a052dba5
226,225,060,036,674,700,000,000,000,000,000,000,000
46
Let child source with 'none' authentication method use collection source authentication That might be the same as having set NULL authentication method. Related to https://gitlab.gnome.org/GNOME/evolution-ews/issues/27
Expression_Obj Parser::parse_value() { lex< css_comments >(false); if (lex< ampersand >()) { if (match< ampersand >()) { warning("In Sass, \"&&\" means two copies of the parent selector. You probably want to use \"and\" instead.", pstate); } return SASS_MEMORY_NEW(Parent_Refere...
0
[ "CWE-125" ]
libsass
b3374e3fd1a0c3658644d2bad24e4a0ff2e0dcea
323,881,285,288,831,740,000,000,000,000,000,000,000
86
Fix handling of unclosed interpolant in url Fixes #2661
setint_v(struct tbl *vq, struct tbl *vp, bool arith) { int base; mksh_ari_u num; if ((base = getint(vp, &num, arith)) == -1) return (NULL); setint_n(vq, num.i, 0); if (vq->type == 0) /* default base */ vq->type = base; return (vq); }
0
[]
mksh
de53d2df1c3b812c262cc1bddbfe0b3bfc25c14b
323,971,425,471,059,250,000,000,000,000,000,000,000
13
SECURITY: do not permit += from environment either this makes our environment filter/sanitisation complete
TEST_P(Http2IntegrationTest, LargeRequestTrailersRejected) { testLargeRequestTrailers(66, 60); }
0
[ "CWE-400", "CWE-703" ]
envoy
afc39bea36fd436e54262f150c009e8d72db5014
162,570,382,255,795,540,000,000,000,000,000,000,000
1
Track byteSize of HeaderMap internally. Introduces a cached byte size updated internally in HeaderMap. The value is stored as an optional, and is cleared whenever a non-const pointer or reference to a HeaderEntry is accessed. The cached value can be set with refreshByteSize() which performs an iteration over the Heade...
static void airspy_cleanup_queued_bufs(struct airspy *s) { unsigned long flags; dev_dbg(s->dev, "\n"); spin_lock_irqsave(&s->queued_bufs_lock, flags); while (!list_empty(&s->queued_bufs)) { struct airspy_frame_buf *buf; buf = list_entry(s->queued_bufs.next, struct airspy_frame_buf, list); list_del(&buf...
0
[ "CWE-119" ]
media_tree
aa93d1fee85c890a34f2510a310e55ee76a27848
35,070,161,761,096,504,000,000,000,000,000,000,000
17
media: fix airspy usb probe error path Fix a memory leak on probe error of the airspy usb device driver. The problem is triggered when more than 64 usb devices register with v4l2 of type VFL_TYPE_SDR or VFL_TYPE_SUBDEV. The memory leak is caused by the probe function of the airspy driver mishandeling errors and not ...
static inline void __user *get_sigframe(struct sigaction *sa, struct pt_regs *regs, unsigned long framesize) { unsigned long sp = regs->u_regs[UREG_FP]; /* * If we are on the alternate signal stack and would overflow it, don't. * Return an always-bogus address instead so we will die with SIGSEGV. */ if (on_si...
0
[]
linux-2.6
ee18d64c1f632043a02e6f5ba5e045bb26a5465f
166,863,647,065,449,040,000,000,000,000,000,000,000
27
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] Add a keyctl to install a process's session keyring onto its parent. This replaces the parent's session keyring. Because the COW credential code does not permit one process to change another process's credentials directly, the change is...
BOOL ber_read_integer(wStream* s, UINT32* value) { int length; if (!ber_read_universal_tag(s, BER_TAG_INTEGER, FALSE) || !ber_read_length(s, &length) || Stream_GetRemainingLength(s) < length) return FALSE; if (value == NULL) { // even if we don't care the integer value, check the announced size return S...
0
[ "CWE-476" ]
FreeRDP
0dc22d5a30a1c7d146b2a835b2032668127c33e9
84,157,442,264,017,620,000,000,000,000,000,000,000
47
Fixed a range of BER boundary encoding bugs which would occur when any NLA packet hit the 127 character mark. Removed ber#get_content_length as it was not behaving deterministically.
static int bpf_map_mmap(struct file *filp, struct vm_area_struct *vma) { struct bpf_map *map = filp->private_data; int err; if (!map->ops->map_mmap || map_value_has_spin_lock(map) || map_value_has_timer(map)) return -ENOTSUPP; if (!(vma->vm_flags & VM_SHARED)) return -EINVAL; mutex_lock(&map->freeze_mu...
0
[ "CWE-367" ]
bpf
353050be4c19e102178ccc05988101887c25ae53
195,954,603,884,750,160,000,000,000,000,000,000,000
48
bpf: Fix toctou on read-only map's constant scalar tracking Commit a23740ec43ba ("bpf: Track contents of read-only maps as scalars") is checking whether maps are read-only both from BPF program side and user space side, and then, given their content is constant, reading out their data via map->ops->map_direct_value_ad...
static WSGIRequestConfig *wsgi_create_req_config(apr_pool_t *p, request_rec *r) { WSGIRequestConfig *config = NULL; WSGIServerConfig *sconfig = NULL; WSGIDirectoryConfig *dconfig = NULL; config = (WSGIRequestConfig *)apr_pcalloc(p, sizeof(WSGIRequestConfig)); dconfig = ap_get_module_config(r->per_...
0
[ "CWE-264" ]
mod_wsgi
d9d5fea585b23991f76532a9b07de7fcd3b649f4
166,908,235,957,583,770,000,000,000,000,000,000,000
124
Local privilege escalation when using daemon mode. (CVE-2014-0240)
void WebContents::RenderProcessGone(base::TerminationStatus status) { auto weak_this = GetWeakPtr(); Emit("crashed", status == base::TERMINATION_STATUS_PROCESS_WAS_KILLED); // User might destroy WebContents in the crashed event. if (!weak_this || !web_contents()) return; v8::Isolate* isolate = Javascrip...
0
[]
electron
6b04cce91ad1563bd9555f2007a2ad5aa5487304
54,161,760,385,482,110,000,000,000,000,000,000,000
15
fix: ensure ElectronBrowser mojo service is only bound to appropriate render frames (#33367) * Make ElectronBrowser mojo interface frame associated. (#32815) Co-authored-by: Marek Haranczyk <marek@openfin.co> * fix: ensure ElectronBrowser mojo service is only bound to appropriate render frames (#33323) (#33350) ...
static int apparmor_dentry_open(struct file *file, const struct cred *cred) { struct aa_file_cxt *fcxt = file->f_security; struct aa_profile *profile; int error = 0; if (!mediated_filesystem(file->f_path.dentry->d_inode)) return 0; /* If in exec, permission is handled by bprm hooks. * Cache permissions grant...
0
[ "CWE-20" ]
linux
a5b2c5b2ad5853591a6cac6134cd0f599a720865
121,691,027,665,028,720,000,000,000,000,000,000,000
32
AppArmor: fix oops in apparmor_setprocattr When invalid parameters are passed to apparmor_setprocattr a NULL deref oops occurs when it tries to record an audit message. This is because it is passing NULL for the profile parameter for aa_audit. But aa_audit now requires that the profile passed is not NULL. Fix this by...
static ssize_t ffs_epfile_write_iter(struct kiocb *kiocb, struct iov_iter *from) { struct ffs_io_data io_data, *p = &io_data; ssize_t res; ENTER(); if (!is_sync_kiocb(kiocb)) { p = kmalloc(sizeof(io_data), GFP_KERNEL); if (unlikely(!p)) return -ENOMEM; p->aio = true; } else { p->aio = false; } p->r...
0
[ "CWE-416", "CWE-362" ]
linux
38740a5b87d53ceb89eb2c970150f6e94e00373a
235,512,314,879,728,260,000,000,000,000,000,000,000
35
usb: gadget: f_fs: Fix use-after-free When using asynchronous read or write operations on the USB endpoints the issuer of the IO request is notified by calling the ki_complete() callback of the submitted kiocb when the URB has been completed. Calling this ki_complete() callback will free kiocb. Make sure that the str...
Logger::~Logger() {}
0
[ "CWE-20", "CWE-79" ]
qBittorrent
6ca3e4f094da0a0017cb2d483ec1db6176bb0b16
95,758,677,467,593,360,000,000,000,000,000,000,000
1
Add Utils::String::toHtmlEscaped
static inline int pfkey_init_proc(struct net *net) { return 0; }
0
[]
linux
096f41d3a8fcbb8dde7f71379b1ca85fe213eded
180,372,938,948,818,000,000,000,000,000,000,000,000
4
af_key: Fix sadb_x_ipsecrequest parsing The parsing of sadb_x_ipsecrequest is broken in a number of ways. First of all we're not verifying sadb_x_ipsecrequest_len. This is needed when the structure carries addresses at the end. Worse we don't even look at the length when we parse those optional addresses. The migra...
static void purple_transfer_forward(struct file_transfer *ft) { struct prpl_xfer_data *px = ft->data; struct purple_data *pd = px->ic->proto_data; /* xfer_new() will pick up this variable. It's a hack but we're not multi-threaded anyway. */ next_ft = ft; serv_send_file(purple_account_get_connection(pd->accoun...
0
[ "CWE-476" ]
bitlbee
30d598ce7cd3f136ee9d7097f39fa9818a272441
129,445,461,812,664,770,000,000,000,000,000,000,000
11
purple: Fix crash on ft requests from unknown contacts Followup to 701ab81 (included in 3.5) which was a partial fix which only improved things for non-libpurple file transfers (that is, just jabber)
hufCompress (const unsigned short raw[], int nRaw, char compressed[]) { if (nRaw == 0) return 0; AutoArray <Int64, HUF_ENCSIZE> freq; countFrequencies (freq, raw, nRaw); int im = 0; int iM = 0; hufBuildEncTable (freq, &im, &iM); char *tableStart = compressed + 20; char *...
0
[ "CWE-125" ]
openexr
e79d2296496a50826a15c667bf92bdc5a05518b4
46,444,668,250,450,950,000,000,000,000,000,000,000
32
fix memory leaks and invalid memory accesses Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
static int bpf_link_release(struct inode *inode, struct file *filp) { struct bpf_link *link = filp->private_data; bpf_link_put(link); return 0; }
0
[ "CWE-307" ]
linux
350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef
229,395,091,785,426,000,000,000,000,000,000,000,000
7
bpf: Dont allow vmlinux BTF to be used in map_create and prog_load. The syzbot got FD of vmlinux BTF and passed it into map_create which caused crash in btf_type_id_size() when it tried to access resolved_ids. The vmlinux BTF doesn't have 'resolved_ids' and 'resolved_sizes' initialized to save memory. To avoid such is...
_copyMinMaxExpr(const MinMaxExpr *from) { MinMaxExpr *newnode = makeNode(MinMaxExpr); COPY_SCALAR_FIELD(minmaxtype); COPY_SCALAR_FIELD(minmaxcollid); COPY_SCALAR_FIELD(inputcollid); COPY_SCALAR_FIELD(op); COPY_NODE_FIELD(args); COPY_LOCATION_FIELD(location); return newnode; }
0
[ "CWE-362" ]
postgres
5f173040e324f6c2eebb90d86cf1b0cdb5890f0a
264,327,322,432,113,100,000,000,000,000,000,000,000
13
Avoid repeated name lookups during table and index DDL. If the name lookups come to different conclusions due to concurrent activity, we might perform some parts of the DDL on a different table than other parts. At least in the case of CREATE INDEX, this can be used to cause the permissions checks to be performed aga...
void fpm_children_bury() /* {{{ */ { int status; pid_t pid; struct fpm_child_s *child; while ( (pid = waitpid(-1, &status, WNOHANG | WUNTRACED)) > 0) { char buf[128]; int severity = ZLOG_NOTICE; int restart_child = 1; child = fpm_child_find(pid); if (WIFEXITED(status)) { snprintf(buf, sizeof(buf), ...
1
[ "CWE-787" ]
php-src
fadb1f8c1d08ae62b4f0a16917040fde57a3b93b
121,905,719,218,941,660,000,000,000,000,000,000,000
126
Fix bug #81026 (PHP-FPM oob R/W in root process leading to priv escalation) The main change is to store scoreboard procs directly to the variable sized array rather than indirectly through the pointer. Signed-off-by: Stanislav Malyshev <stas@php.net>
sg_add_request(Sg_fd * sfp) { int k; unsigned long iflags; Sg_request *rp = sfp->req_arr; write_lock_irqsave(&sfp->rq_list_lock, iflags); if (!list_empty(&sfp->rq_list)) { if (!sfp->cmd_q) goto out_unlock; for (k = 0; k < SG_MAX_QUEUE; ++k, ++rp) { if (!rp->parentfp) break; } if (k >= SG_MAX_QU...
0
[ "CWE-200" ]
linux
3e0097499839e0fe3af380410eababe5a47c4cf9
308,702,245,446,492,520,000,000,000,000,000,000,000
28
scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE When calling SG_GET_REQUEST_TABLE ioctl only a half-filled table is returned; the remaining part will then contain stale kernel memory information. This patch zeroes out the entire table to avoid this issue. Signed-off-by: Hannes Reinecke <hare@suse.com> Revie...
static void io_req_task_prio_work_add(struct io_kiocb *req) { struct io_uring_task *tctx = req->task->io_uring; if (req->ctx->flags & IORING_SETUP_SQPOLL) __io_req_task_work_add(req, tctx, &tctx->prio_task_list); else __io_req_task_work_add(req, tctx, &tctx->task_list); }
0
[ "CWE-416" ]
linux
9cae36a094e7e9d6e5fe8b6dcd4642138b3eb0c7
282,205,965,971,871,630,000,000,000,000,000,000,000
9
io_uring: reinstate the inflight tracking After some debugging, it was realized that we really do still need the old inflight tracking for any file type that has io_uring_fops assigned. If we don't, then trivial circular references will mean that we never get the ctx cleaned up and hence it'll leak. Just bring back t...
place_entity(struct cfs_rq *cfs_rq, struct sched_entity *se, int initial) { u64 vruntime = cfs_rq->min_vruntime; /* * The 'current' period is already promised to the current tasks, * however the extra weight of the new task will slow them down a * little, place the new task so that it fits in the slot that *...
0
[ "CWE-400", "CWE-703", "CWE-835" ]
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
995,514,699,442,841,900,000,000,000,000,000,000
30
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
vte_terminal_emit_resize_window(VteTerminal *terminal, guint width, guint height) { _vte_debug_print(VTE_DEBUG_SIGNALS, "Emitting `resize-window'.\n"); g_signal_emit_by_name(terminal, "resize-window", width, height); }
0
[]
vte
58bc3a942f198a1a8788553ca72c19d7c1702b74
266,229,385,149,675,260,000,000,000,000,000,000,000
7
fix bug #548272 svn path=/trunk/; revision=2365
static void virtio_gpu_get_config(VirtIODevice *vdev, uint8_t *config) { VirtIOGPU *g = VIRTIO_GPU(vdev); memcpy(config, &g->virtio_config, sizeof(g->virtio_config)); }
0
[]
qemu
acfc4846508a02cc4c83aa27799fd74ac280bdb2
207,514,528,459,156,250,000,000,000,000,000,000,000
5
virtio-gpu: use VIRTIO_GPU_MAX_SCANOUTS The value is defined in virtio_gpu.h already (changing from 4 to 16). Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com> Message-id: 1463653560-26958-6-git-send-email-marcandre.lureau@redhat.com Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
void key_fsgid_changed(struct task_struct *tsk) { /* update the ownership of the thread keyring */ BUG_ON(!tsk->cred); if (tsk->cred->thread_keyring) { down_write(&tsk->cred->thread_keyring->sem); tsk->cred->thread_keyring->gid = tsk->cred->fsgid; up_write(&tsk->cred->thread_keyring->sem); } } /* end key_fsg...
0
[]
linux-2.6
ee18d64c1f632043a02e6f5ba5e045bb26a5465f
214,969,359,865,419,100,000,000,000,000,000,000,000
11
KEYS: Add a keyctl to install a process's session keyring on its parent [try #6] Add a keyctl to install a process's session keyring onto its parent. This replaces the parent's session keyring. Because the COW credential code does not permit one process to change another process's credentials directly, the change is...
static MagickBooleanType ReadRectangle(Image *image,PICTRectangle *rectangle) { rectangle->top=(short) ReadBlobMSBShort(image); rectangle->left=(short) ReadBlobMSBShort(image); rectangle->bottom=(short) ReadBlobMSBShort(image); rectangle->right=(short) ReadBlobMSBShort(image); if ((EOFBlob(image) != MagickFal...
0
[ "CWE-190", "CWE-189", "CWE-703" ]
ImageMagick
0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
295,337,530,846,642,860,000,000,000,000,000,000,000
11
int paravirt_disable_iospace(void) { return request_resource(&ioport_resource, &reserve_ioports); }
0
[ "CWE-200" ]
linux
5800dc5c19f34e6e03b5adab1282535cb102fafd
85,874,676,910,335,380,000,000,000,000,000,000,000
4
x86/paravirt: Fix spectre-v2 mitigations for paravirt guests Nadav reported that on guests we're failing to rewrite the indirect calls to CALLEE_SAVE paravirt functions. In particular the pv_queued_spin_unlock() call is left unpatched and that is all over the place. This obviously wrecks Spectre-v2 mitigation (for par...
static inline int may_follow_link(struct nameidata *nd) { const struct inode *inode; const struct inode *parent; kuid_t puid; if (!sysctl_protected_symlinks) return 0; /* Allowed if owner and follower match. */ inode = nd->link_inode; if (uid_eq(current_cred()->fsuid, inode->i_uid)) return 0; /* Allowed ...
0
[ "CWE-416", "CWE-284" ]
linux
d0cb50185ae942b03c4327be322055d622dc79f6
161,802,909,568,717,940,000,000,000,000,000,000,000
31
do_last(): fetch directory ->i_mode and ->i_uid before it's too late may_create_in_sticky() call is done when we already have dropped the reference to dir. Fixes: 30aba6656f61e (namei: allow restricted O_CREAT of FIFOs and regular files) Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
send_multihop_request(struct interface *ifp, const unsigned char *prefix, unsigned char plen, unsigned short seqno, const unsigned char *id, unsigned short hop_count) { int v4, pb, len; /* Make sure any buffered updates go out before this reques...
0
[ "CWE-787" ]
frr
c3793352a8d76d2eee1edc38a9a16c1c8a6573f4
296,401,999,833,460,000,000,000,000,000,000,000,000
45
babeld: fix #10502 #10503 by repairing the checks on length This patch repairs the checking conditions on length in four functions: babel_packet_examin, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv Signed-off-by: qingkaishi <qingkaishi@gmail.com>
handle_ftp_ctl(struct conntrack *ct, const struct conn_lookup_ctx *ctx, struct dp_packet *pkt, const struct conn *ec, long long now, enum ftp_ctl_pkt ftp_ctl, bool nat) { struct ip_header *l3_hdr = dp_packet_l3(pkt); ovs_be32 v4_addr_rep = 0; struct ct_addr v6_addr_rep; siz...
0
[ "CWE-400" ]
ovs
abd7a457652e6734902720fe6a5dddb3fc0d1e3b
84,152,478,904,033,070,000,000,000,000,000,000,000
95
flow: Support extra padding length. Although not required, padding can be optionally added until the packet length is MTU bytes. A packet with extra padding currently fails sanity checks. Vulnerability: CVE-2020-35498 Fixes: fa8d9001a624 ("miniflow_extract: Properly handle small IP packets.") Reported-by: Joakim Hind...
static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track) { AC3HeaderInfo *hdr = NULL; struct eac3_info *info; int num_blocks, ret; if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info)))) return AVERROR(ENOMEM); info = track->eac3_priv; if (avpriv_ac3...
1
[ "CWE-125" ]
FFmpeg
95556e27e2c1d56d9e18f5db34d6f756f3011148
238,949,947,605,401,380,000,000,000,000,000,000,000
139
avformat/movenc: Do not pass AVCodecParameters in avpriv_request_sample Fixes: out of array read Fixes: ffmpeg_crash_8.avi Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
is_negative_caching_appropriate(HttpTransact::State* s) { if (!s->txn_conf->negative_caching_enabled || !s->hdr_info.server_response.valid()) return false; switch (s->hdr_info.server_response.status_get()) { case HTTP_STATUS_NO_CONTENT: case HTTP_STATUS_USE_PROXY: case HTTP_STATUS_BAD_REQUEST: case HTT...
0
[ "CWE-119" ]
trafficserver
8b5f0345dade6b2822d9b52c8ad12e63011a5c12
155,520,131,209,321,370,000,000,000,000,000,000,000
25
Fix the internal buffer sizing. Thanks to Sudheer for helping isolating this bug
doIgnoreSection(XML_Parser parser, const ENCODING *enc, const char **startPtr, const char *end, const char **nextPtr, XML_Bool haveMore) { const char *next; int tok; const char *s = *startPtr; const char **eventPP; const char **ev...
0
[ "CWE-119" ]
libexpat
ba0f9c3b40c264b8dd392e02a7a060a8fa54f032
42,166,439,357,389,894,000,000,000,000,000,000,000
57
CVE-2015-1283 Sanity check size calculations. r=peterv, a=abillings https://sourceforge.net/p/expat/bugs/528/
static int ndisc_netdev_event(struct notifier_block *this, unsigned long event, void *ptr) { struct net_device *dev = netdev_notifier_info_to_dev(ptr); struct net *net = dev_net(dev); struct inet6_dev *idev; switch (event) { case NETDEV_CHANGEADDR: neigh_changeaddr(&nd_tbl, dev); fib6_run_gc(0, net, false); ...
0
[ "CWE-17" ]
linux
6fd99094de2b83d1d4c8457f2c83483b2828e75a
129,998,486,090,535,750,000,000,000,000,000,000,000
30
ipv6: Don't reduce hop limit for an interface A local route may have a lower hop_limit set than global routes do. RFC 3756, Section 4.2.7, "Parameter Spoofing" > 1. The attacker includes a Current Hop Limit of one or another small > number which the attacker knows will cause legitimate packets to > be...
HiiRemovePackageList ( IN CONST EFI_HII_DATABASE_PROTOCOL *This, IN EFI_HII_HANDLE Handle ) { EFI_STATUS Status; HII_DATABASE_PRIVATE_DATA *Private; LIST_ENTRY *Link; HII_DATABASE_RECORD *Node; HI...
0
[ "CWE-416" ]
edk2
c32be82e99ef272e7fa742c2f06ff9a4c3756613
26,104,112,583,065,876,000,000,000,000,000,000,000
125
MdeModulePkg/HiiDB: Remove configuration table when it's freed (CVE-2019-14586) REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1995 Fix the corner case issue that the original configuration runtime memory is freed, but it is still exposed to the OS runtime. So this patch is to remove the configuration table to a...
void cpu_load_update_nohz_start(void) { struct rq *this_rq = this_rq(); /* * This is all lockless but should be fine. If weighted_cpuload changes * concurrently we'll exit nohz. And cpu_load write can race with * cpu_load_update_idle() but both updater would be writing the same. */ this_rq->cpu_load[0] = we...
0
[ "CWE-400", "CWE-703", "CWE-835" ]
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
107,704,157,718,509,310,000,000,000,000,000,000,000
11
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
static void do_notify_parent_cldstop(struct task_struct *tsk, bool for_ptracer, int why) { struct siginfo info; unsigned long flags; struct task_struct *parent; struct sighand_struct *sighand; if (for_ptracer) { parent = tsk->parent; } else { tsk = tsk->group_leader; parent = tsk->real_parent; } ...
0
[ "CWE-20", "CWE-362" ]
linux
9899d11f654474d2d54ea52ceaa2a1f4db3abd68
51,705,733,183,284,650,000,000,000,000,000,000,000
54
ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL putreg() assumes that the tracee is not running and pt_regs_access() can safely play with its stack. However a killed tracee can return from ptrace_stop() to the low-level asm code and do RESTORE_REST, this means that debugger can actually read/mod...
xmlIsID(xmlDocPtr doc, xmlNodePtr elem, xmlAttrPtr attr) { if ((attr == NULL) || (attr->name == NULL)) return(0); if ((attr->ns != NULL) && (attr->ns->prefix != NULL) && (!strcmp((char *) attr->name, "id")) && (!strcmp((char *) attr->ns->prefix, "xml"))) return(1); if (doc == NULL) return(0...
0
[]
libxml2
932cc9896ab41475d4aa429c27d9afd175959d74
4,654,220,302,501,240,500,000,000,000,000,000,000
50
Fix buffer size checks in xmlSnprintfElementContent xmlSnprintfElementContent failed to correctly check the available buffer space in two locations. Fixes bug 781333 (CVE-2017-9047) and bug 781701 (CVE-2017-9048). Thanks to Marcel Böhme and Thuan Pham for the report.
int SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain) { return tls1_check_chain(s, x, pk, chain, -1); }
0
[]
openssl
76343947ada960b6269090638f5391068daee88d
258,076,564,337,455,750,000,000,000,000,000,000,000
4
Fix for CVE-2015-0291 If a client renegotiates using an invalid signature algorithms extension it will crash a server with a NULL pointer dereference. Thanks to David Ramos of Stanford University for reporting this bug. CVE-2015-0291 Reviewed-by: Tim Hudson <tjh@openssl.org> Conflicts: ssl/t1_lib.c
resolve_data(const struct lys_module *mod, const char *name, int nam_len, struct lyd_node *start, struct unres_data *parents) { struct lyd_node *node; int flag; uint32_t i; if (!parents->count) { parents->count = 1; parents->node = malloc(sizeof *parents->node); LY_CHECK_ERR_RET...
0
[ "CWE-119" ]
libyang
32fb4993bc8bb49e93e84016af3c10ea53964be5
291,726,842,892,963,150,000,000,000,000,000,000,000
48
schema tree BUGFIX do not check features while still resolving schema Fixes #723
NOEXPORT void tray_update(const int num) { NOTIFYICONDATA nid; static ICON_TYPE previous_icon=ICON_NONE; ICON_TYPE current_icon; LPTSTR tip; if(!global_options.option.taskbar) { /* currently disabled */ tray_delete(); /* remove the taskbark icon if exists */ return; } if(!tr...
1
[ "CWE-295" ]
stunnel
ebad9ddc4efb2635f37174c9d800d06206f1edf9
202,518,620,246,555,600,000,000,000,000,000,000,000
49
stunnel-5.57
static struct sk_buff *pfifo_fast_dequeue(struct Qdisc* qdisc) { int prio; struct sk_buff_head *list = qdisc_priv(qdisc); for (prio = 0; prio < PFIFO_FAST_BANDS; prio++) { if (!skb_queue_empty(list + prio)) { qdisc->q.qlen--; return __qdisc_dequeue_head(qdisc, list + prio); } } return NULL; }
0
[ "CWE-399" ]
linux-2.6
2ba2506ca7ca62c56edaa334b0fe61eb5eab6ab0
113,796,797,893,900,290,000,000,000,000,000,000,000
14
[NET]: Add preemption point in qdisc_run The qdisc_run loop is currently unbounded and runs entirely in a softirq. This is bad as it may create an unbounded softirq run. This patch fixes this by calling need_resched and breaking out if necessary. It also adds a break out if the jiffies value changes since that woul...
slot_show(struct md_rdev *rdev, char *page) { if (rdev->raid_disk < 0) return sprintf(page, "none\n"); else return sprintf(page, "%d\n", rdev->raid_disk); }
0
[ "CWE-200" ]
linux
b6878d9e03043695dbf3fa1caa6dfc09db225b16
44,943,196,308,260,860,000,000,000,000,000,000,000
7
md: use kzalloc() when bitmap is disabled In drivers/md/md.c get_bitmap_file() uses kmalloc() for creating a mdu_bitmap_file_t called "file". 5769 file = kmalloc(sizeof(*file), GFP_NOIO); 5770 if (!file) 5771 return -ENOMEM; This structure is copied to user space at the end of the fun...
void FeatureEvaluator::getMats() { if (!(sbufFlag & SBUF_VALID)) { usbuf.copyTo(sbuf); sbufFlag |= SBUF_VALID; } }
0
[ "CWE-125" ]
opencv
321c74ccd6077bdea1d47450ca4fe955cb5b6330
198,481,793,467,539,040,000,000,000,000,000,000,000
8
objdetect: validate feature rectangle on reading
explicit EditDistanceOp(OpKernelConstruction* ctx) : OpKernel(ctx) { OP_REQUIRES_OK(ctx, ctx->GetAttr("normalize", &normalize_)); }
0
[ "CWE-476", "CWE-369" ]
tensorflow
f4c364a5d6880557f6f5b6eb5cee2c407f0186b3
228,726,508,281,356,650,000,000,000,000,000,000,000
3
Fix multiple issues in EditDistance PiperOrigin-RevId: 372033948 Change-Id: Ieb957c29894af05bdfeb1a0402fced808dfcfd7b
static bool io_link_cancel_timeout(struct io_kiocb *req) { struct io_ring_ctx *ctx = req->ctx; int ret; ret = hrtimer_try_to_cancel(&req->timeout.data->timer); if (ret != -1) { io_cqring_fill_event(req, -ECANCELED); io_commit_cqring(ctx); req->flags &= ~REQ_F_LINK; io_put_req(req); return true; } retu...
0
[]
linux
181e448d8709e517c9c7b523fcd209f24eb38ca7
164,279,289,064,210,000,000,000,000,000,000,000,000
16
io_uring: async workers should inherit the user creds If we don't inherit the original task creds, then we can confuse users like fuse that pass creds in the request header. See link below on identical aio issue. Link: https://lore.kernel.org/linux-fsdevel/26f0d78e-99ca-2f1b-78b9-433088053a61@scylladb.com/T/#u Signed...
FLAC__uint32 limit_channel_mask(FLAC__uint32 mask, unsigned channels) { FLAC__uint32 x = 0x80000000; unsigned count = count_channel_mask_bits(mask); while(x && count > channels) { if(mask & x) { mask &= ~x; count--; } x >>= 1; } FLAC__ASSERT(count_channel_mask_bits(mask) == channels); return mask; }
0
[]
flac
c06a44969c1145242a22f75fc8fb2e8b54c55303
113,853,579,321,643,970,000,000,000,000,000,000,000
14
flac : Fix for https://sourceforge.net/p/flac/bugs/425/ * flac/encode.c : Validate num_tracks field of cuesheet. * libFLAC/stream_encoder.c : Add check for a NULL pointer. * flac/encode.c : Improve bounds checking. Closes: https://sourceforge.net/p/flac/bugs/425/
static int calc_send_wqe(struct ib_qp_init_attr *attr) { int inl_size = 0; int size; size = sq_overhead(attr); if (size < 0) return size; if (attr->cap.max_inline_data) { inl_size = size + sizeof(struct mlx5_wqe_inline_seg) + attr->cap.max_inline_data; } size += attr->cap.max_send_sge * sizeof(struct m...
0
[ "CWE-119", "CWE-787" ]
linux
0625b4ba1a5d4703c7fb01c497bd6c156908af00
114,910,315,745,233,650,000,000,000,000,000,000,000
21
IB/mlx5: Fix leaking stack memory to userspace mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes were written. Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp") Cc: <stable@vger.kernel.org> Acked-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Jason Gunthorpe <...
libxlDomainDefCheckABIStability(libxlDriverPrivate *driver, virDomainDef *src, virDomainDef *dst) { virDomainDef *migratableDefSrc = NULL; virDomainDef *migratableDefDst = NULL; bool ret = false; if (!(migratableDefSrc = virDomainDefCopy(s...
0
[ "CWE-667" ]
libvirt
23b51d7b8ec885e97a9277cf0a6c2833db4636e8
216,377,156,797,171,320,000,000,000,000,000,000,000
21
libxl: Disable death events after receiving a shutdown event The libxl driver will handle all domain destruction and cleanup when receiving a domain shutdown event from libxl. Commit fa30ee04a2a introduced the ignoreDeathEvent boolean in the DomainObjPrivate struct to ignore subsequent death events from libxl. But lib...
static void tcp_keepalive_timer (struct timer_list *t) { struct sock *sk = from_timer(sk, t, sk_timer); struct inet_connection_sock *icsk = inet_csk(sk); struct tcp_sock *tp = tcp_sk(sk); u32 elapsed; /* Only process if socket is not in use. */ bh_lock_sock(sk); if (sock_owned_by_user(sk)) { /* Try again late...
0
[ "CWE-770" ]
net
967c05aee439e6e5d7d805e195b3a20ef5c433d6
13,857,908,183,845,256,000,000,000,000,000,000,000
86
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() If mtu probing is enabled tcp_mtu_probing() could very well end up with a too small MSS. Use the new sysctl tcp_min_snd_mss to make sure MSS search is performed in an acceptable range. CVE-2019-11479 -- tcp mss hardcoded to 48 Signed-off-by: Eric Dumazet <edumazet@g...
static inline bool nested_vmx_prepare_msr_bitmap(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12) { int msr; struct page *page; unsigned long *msr_bitmap_l1; unsigned long *msr_bitmap_l0 = to_vmx(vcpu)->nested.vmcs02.msr_bitmap; /* * pred_cmd & spec_ctrl are trying to verify two things: * * 1. L0 gave a ...
0
[ "CWE-863" ]
kvm
c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
27,152,788,689,527,050,000,000,000,000,000,000,000
94
KVM: x86: nVMX: fix x2APIC VTPR read intercept Referring to the "VIRTUALIZING MSR-BASED APIC ACCESSES" chapter of the SDM, when "virtualize x2APIC mode" is 1 and "APIC-register virtualization" is 0, a RDMSR of 808H should return the VTPR from the virtual APIC page. However, for nested, KVM currently fails to disable ...
int ssl_print_curves(BIO *out, SSL *s) { int i, ncurves, *curves, nid; const char *cname; ncurves = SSL_get1_curves(s, NULL); if (ncurves <= 0) return 1; curves = OPENSSL_malloc(ncurves * sizeof(int)); SSL_get1_curves(s, curves); BIO_puts(out, "Supported Elliptic Curves: "); for (i = 0; i < ncurves; i++) ...
0
[]
openssl
c70a1fee71119a9005b1f304a3bf47694b4a53ac
273,179,095,676,029,030,000,000,000,000,000,000,000
46
Reorganise supported signature algorithm extension processing. Only store encoded versions of peer and configured signature algorithms. Determine shared signature algorithms and cache the result along with NID equivalents of each algorithm. (backport from HEAD)
static inline int split_huge_page(struct page *page) { return 0; }
0
[ "CWE-399" ]
linux
78f11a255749d09025f54d4e2df4fbcb031530e2
233,997,484,280,418,070,000,000,000,000,000,000,000
4
mm: thp: fix /dev/zero MAP_PRIVATE and vm_flags cleanups The huge_memory.c THP page fault was allowed to run if vm_ops was null (which would succeed for /dev/zero MAP_PRIVATE, as the f_op->mmap wouldn't setup a special vma->vm_ops and it would fallback to regular anonymous memory) but other THP logics weren't fully ac...
bool Item_sum_avg::fix_length_and_dec() { if (Item_sum_sum::fix_length_and_dec()) return TRUE; maybe_null=null_value=1; prec_increment= current_thd->variables.div_precincrement; if (Item_sum_avg::result_type() == DECIMAL_RESULT) { int precision= args[0]->decimal_precision() + prec_increment; decim...
1
[ "CWE-120" ]
server
eca207c46293bc72dd8d0d5622153fab4d3fccf1
209,667,962,706,818,440,000,000,000,000,000,000,000
25
MDEV-25317 Assertion `scale <= precision' failed in decimal_bin_size And Assertion `scale >= 0 && precision > 0 && scale <= precision' failed in decimal_bin_size_inline/decimal_bin_size. Precision should be kept below DECIMAL_MAX_SCALE for computations. It can be bigger in Item_decimal. I'd fix this too but it changes...
int vsprintf(char *buf, const char *fmt, va_list args) { return vsnprintf(buf, INT_MAX, fmt, args); }
0
[ "CWE-200" ]
linux
ad67b74d2469d9b82aaa572d76474c95bc484d57
271,780,458,884,896,400,000,000,000,000,000,000,000
4
printk: hash addresses printed with %p Currently there exist approximately 14 000 places in the kernel where addresses are being printed using an unadorned %p. This potentially leaks sensitive information regarding the Kernel layout in memory. Many of these calls are stale, instead of fixing every call lets hash the a...
void unmap_hugepage_range(struct vm_area_struct *vma, unsigned long start, unsigned long end, struct page *ref_page) { mutex_lock(&vma->vm_file->f_mapping->i_mmap_mutex); __unmap_hugepage_range(vma, start, end, ref_page); mutex_unlock(&vma->vm_file->f_mapping->i_mmap_mutex); }
0
[ "CWE-399" ]
linux
90481622d75715bfcb68501280a917dbfe516029
328,050,993,960,327,400,000,000,000,000,000,000,000
7
hugepages: fix use after free bug in "quota" handling hugetlbfs_{get,put}_quota() are badly named. They don't interact with the general quota handling code, and they don't much resemble its behaviour. Rather than being about maintaining limits on on-disk block usage by particular users, they are instead about maintai...
static void caf_teardown(pcm_reader_t **reader) { free(*reader); *reader = 0; }
0
[ "CWE-703" ]
fdkaac
4ec1422bd951a137225ffa4052da120e2ab0a0f4
237,601,141,898,182,830,000,000,000,000,000,000,000
5
wav/caf parser: ensure fmt/desc chunk fixes https://github.com/nu774/fdkaac/issues/52
static pn_bytes_t encode_message(app_data_t* app) { /* Construct a message with the map { "sequence": app.sent } */ pn_message_t* message = pn_message(); pn_data_t* body = pn_message_body(message); pn_data_put_int(pn_message_id(message), app->sent); /* Set the message_id also */ pn_data_put_map(body); pn_da...
0
[]
qpid-proton
159fac1f90d9b1ace1138d510176e7a5da54e9e9
99,397,651,903,781,700,000,000,000,000,000,000,000
35
PROTON-2014: [c] Fix example broker to warn when it fails to set up ssl - Also make send-ssl tell you the remote peer
static int setindexedspace(i_ctx_t * i_ctx_p, ref *r, int *stage, int *cont, int CIESubst) { ref *pproc = &istate->colorspace[0].procs.special.index_proc; int code = 0; uint edepth = ref_stack_count(&e_stack); ref_colorspace cspace_old; ref hival, lookup; gs_color_space *pcs; gs_color_space ...
1
[ "CWE-704" ]
ghostpdl
693baf02152119af6e6afd30bb8ec76d14f84bbf
199,997,284,319,139,760,000,000,000,000,000,000,000
114
PS interpreter - check the Implementation of a Pattern before use Bug #700141 "Type confusion in setpattern" As the bug thread says, we were not checking that the Implementation of a pattern dictionary was a structure type, leading to a crash when we tried to treat it as one. Here we make the st_pattern1_instance an...
static void megasas_complete_frame(MegasasState *s, uint64_t context) { PCIDevice *pci_dev = PCI_DEVICE(s); int tail, queue_offset; /* Decrement busy count */ s->busy--; if (s->reply_queue_pa) { /* * Put command on the reply queue. * Context is opaque, but emulation is run...
0
[ "CWE-401" ]
qemu
765a707000e838c30b18d712fe6cb3dd8e0435f3
99,031,192,124,944,740,000,000,000,000,000,000,000
51
megasas: fix guest-triggered memory leak If the guest sets the sglist size to a value >=2GB, megasas_handle_dcmd will return MFI_STAT_MEMORY_NOT_AVAILABLE without freeing the memory. Avoid this by returning only the status from map_dcmd, and loading cmd->iov_size in the caller. Reported-by: Li Qiang <liqiang6-s@360.c...
Auth::Digest::Config::registerWithCacheManager(void) { Mgr::RegisterAction("digestauthenticator", "Digest User Authenticator Stats", authenticateDigestStats, 0, 1); }
0
[ "CWE-190", "CWE-352" ]
squid
eeebf0f37a72a2de08348e85ae34b02c34e9a811
311,616,481,771,399,900,000,000,000,000,000,000,000
6
Fix auth digest refcount integer overflow (#585) This fixes a possible overflow of the nonce reference counter in the digest authentication scheme, found by security researchers @synacktiv. It changes `references` to be an 64 bits unsigned integer. This makes overflowing the counter impossible in practice.
static void power_pmu_sched_task(struct perf_event_context *ctx, bool sched_in) { if (!ppmu->bhrb_nr) return; if (sched_in) power_pmu_bhrb_reset(); }
0
[ "CWE-476" ]
linux
60b7ed54a41b550d50caf7f2418db4a7e75b5bdc
122,405,699,645,860,100,000,000,000,000,000,000,000
8
powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set On systems without any specific PMU driver support registered, running perf record causes Oops. The relevant portion from call trace: BUG: Kernel NULL pointer dereference on read at 0x00000040 Faulting instruction address: 0xc0021f0c Oo...
static int do_ssl3_write(SSL *s, int type, const unsigned char *buf, unsigned int len, int create_empty_fragment) { unsigned char *p,*plen; int i,mac_size,clear=0; int prefix_len=0; int eivlen; long align=0; SSL3_RECORD *wr; SSL3_BUFFER *wb=&(s->s3->wbuf); SSL_SESSION *sess; /* first check if there is a...
0
[]
openssl
b107586c0c3447ea22dba8698ebbcd81bb29d48c
131,505,359,644,558,660,000,000,000,000,000,000,000
226
Fixed NULL pointer dereference. See PR#3321
**/ CImgDisplay& set_wheel(const int amplitude) { _wheel+=amplitude; _is_event = amplitude?true:false; if (amplitude) { #if cimg_display==1 pthread_cond_broadcast(&cimg::X11_attr().wait_event); #elif cimg_display==2 SetEvent(cimg::Win32_attr().wait_event); #endif } ...
0
[ "CWE-125" ]
CImg
10af1e8c1ad2a58a0a3342a856bae63e8f257abb
151,575,908,525,024,440,000,000,000,000,000,000,000
12
Fix other issues in 'CImg<T>::load_bmp()'.
static void help(void) { printf("%s [OPTIONS...] [CONFIGURATION FILE...]\n\n" "Creates, deletes and cleans up volatile and temporary files and directories.\n\n" " -h --help Show this help\n" " --user Execute user configuration\n" ...
0
[ "CWE-59" ]
systemd
5579f85663d10269e7ac7464be6548c99cea4ada
199,459,079,016,011,970,000,000,000,000,000,000,000
15
tmpfiles: refuse to chown()/chmod() files which are hardlinked, unless protected_hardlinks sysctl is on Let's add some extra safety. Fixes: #7736
SELECT_LEX *current_select_or_default() { return current_select ? current_select : &builtin_select; }
0
[ "CWE-703" ]
server
39feab3cd31b5414aa9b428eaba915c251ac34a2
243,006,915,465,092,840,000,000,000,000,000,000,000
4
MDEV-26412 Server crash in Item_field::fix_outer_field for INSERT SELECT IF an INSERT/REPLACE SELECT statement contained an ON expression in the top level select and this expression used a subquery with a column reference that could not be resolved then an attempt to resolve this reference as an outer reference caused...
static void hci_cc_le_set_addr_resolution_enable(struct hci_dev *hdev, struct sk_buff *skb) { __u8 *sent, status = *((__u8 *) skb->data); BT_DBG("%s status 0x%2.2x", hdev->name, status); if (status) return; sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADDR_RESOLV_ENABLE); if (!sent) return; hci_dev_...
0
[ "CWE-290" ]
linux
3ca44c16b0dcc764b641ee4ac226909f5c421aa3
37,898,881,837,336,600,000,000,000,000,000,000,000
23
Bluetooth: Consolidate encryption handling in hci_encrypt_cfm This makes hci_encrypt_cfm calls hci_connect_cfm in case the connection state is BT_CONFIG so callers don't have to check the state. Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
static char *get_constant_symbol_name(char *proto_name, LuaConstEntry *entry) { rz_return_val_if_fail(entry || proto_name, NULL); ut8 tag = entry->tag; char *ret; int integer_value; double float_value; switch (tag) { case LUA_VNIL: ret = rz_str_newf("%s_const_nil", proto_name); break; case LUA_VTRUE: ret...
0
[ "CWE-200", "CWE-787" ]
rizin
07b43bc8aa1ffebd9b68d60624c9610cf7e460c7
308,617,618,519,371,000,000,000,000,000,000,000,000
44
fix oob read on luac
static int load_segment_descriptor(struct x86_emulate_ctxt *ctxt, u16 selector, int seg) { u8 cpl = ctxt->ops->cpl(ctxt); return __load_segment_descriptor(ctxt, selector, seg, cpl, false); }
1
[]
kvm
d1442d85cc30ea75f7d399474ca738e0bc96f715
241,598,534,996,018,800,000,000,000,000,000,000,000
6
KVM: x86: Handle errors when RIP is set during far jumps Far jmp/call/ret may fault while loading a new RIP. Currently KVM does not handle this case, and may result in failed vm-entry once the assignment is done. The tricky part of doing so is that loading the new CS affects the VMCS/VMCB state, so if we fail during...
ws_read(rfbClientPtr cl, char *buf, int len) { int n; if (cl->sslctx) { n = rfbssl_read(cl, buf, len); } else { n = read(cl->sock, buf, len); } return n; }
0
[ "CWE-787" ]
libvncserver
aac95a9dcf4bbba87b76c72706c3221a842ca433
122,248,294,335,804,620,000,000,000,000,000,000,000
10
fix overflow and refactor websockets decode (Hybi) fix critical heap-based buffer overflow which allowed easy modification of a return address via an overwritten function pointer fix bug causing connections to fail due a "one websocket frame = one ws_read" assumption, which failed with LibVNCServer-0.9.11 refactor w...
GList *get_problem_storages(void) { GList *pths = NULL; load_abrt_conf(); pths = g_list_append(pths, xstrdup(g_settings_dump_location)); //not needed, we don't steal directories anymore pths = g_list_append(pths, concat_path_file(g_get_user_cache_dir(), "abrt/spool")); free_abrt_conf_data(); ...
0
[ "CWE-20" ]
abrt
7814554e0827ece778ca88fd90832bd4d05520b1
124,945,536,119,498,660,000,000,000,000,000,000,000
11
dbus: avoid race-conditions in tests for dum dir availability Florian Weimer <fweimer@redhat.com> dump_dir_accessible_by_uid() is fundamentally insecure because it opens up a classic time-of-check-time-of-use race between this function and and dd_opendir(). Related: #1214745 Signed-off-by: Jakub Filak <...
/* returns true if it causes the idle timer to be disabled */ static bool __bfq_insert_request(struct bfq_data *bfqd, struct request *rq) { struct bfq_queue *bfqq = RQ_BFQQ(rq), *new_bfqq = bfq_setup_cooperator(bfqd, bfqq, rq, true); bool waiting, idle_timer_disabled = false; if (new_bfqq) { /* * Release the...
0
[ "CWE-416" ]
linux
2f95fa5c955d0a9987ffdc3a095e2f4e62c5f2a9
90,370,131,632,745,360,000,000,000,000,000,000,000
51
block, bfq: fix use-after-free in bfq_idle_slice_timer_body In bfq_idle_slice_timer func, bfqq = bfqd->in_service_queue is not in bfqd-lock critical section. The bfqq, which is not equal to NULL in bfq_idle_slice_timer, may be freed after passing to bfq_idle_slice_timer_body. So we will access the freed memory. In ad...
static int mov_read_extradata(MOVContext *c, AVIOContext *pb, MOVAtom atom, enum AVCodecID codec_id) { AVStream *st; uint64_t original_size; int err; if (c->fc->nb_streams < 1) // will happen with jp2 files return 0; st = c->fc->streams[c->fc->nb_streams-1]; ...
0
[ "CWE-399", "CWE-834" ]
FFmpeg
9cb4eb772839c5e1de2855d126bf74ff16d13382
16,102,872,981,849,817,000,000,000,000,000,000,000
24
avformat/mov: Fix DoS in read_tfra() Fixes: Missing EOF check in loop No testcase Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
static int max_dl_per_request(const or_options_t *options, int purpose) { /* Since squid does not like URLs >= 4096 bytes we limit it to 96. * 4096 - strlen(http://[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535 * /tor/server/d/.z) == 4026 * 4026/41 (40 for the hash and 1 for the + that s...
0
[]
tor
1afc2ed956a35b40dfd1d207652af5b50c295da7
68,114,210,243,965,530,000,000,000,000,000,000,000
25
Fix policies.c instance of the "if (r=(a-b)) return r" pattern I think this one probably can't underflow, since the input ranges are small. But let's not tempt fate. This patch also replaces the "cmp" functions here with just "eq" functions, since nothing actually checked for anything besides 0 and nonzero. Related...
int LibRaw::is_phaseone_compressed() { return (load_raw == &LibRaw::phase_one_load_raw_c && imgdata.rawdata.ph1_black); }
0
[ "CWE-119", "CWE-787" ]
LibRaw
2f912f5b33582961b1cdbd9fd828589f8b78f21d
90,830,157,110,857,660,000,000,000,000,000,000,000
4
fixed wrong data_maximum calcluation; prevent out-of-buffer in exp_bef
GC_INNER char * GC_envfile_getenv(const char *name) { char *p; char *end_of_content; unsigned namelen; # ifndef NO_GETENV p = getenv(name); /* try the standard getenv() first */ if (p != NULL) return *p != '\0' ? p : NULL; # endif p = GC_envfile_content; if (p == NULL) ...
0
[ "CWE-119" ]
bdwgc
7292c02fac2066d39dd1bcc37d1a7054fd1e32ee
193,793,225,015,618,380,000,000,000,000,000,000,000
26
Fix malloc routines to prevent size value wrap-around See issue #135 on Github. * allchblk.c (GC_allochblk, GC_allochblk_nth): Use OBJ_SZ_TO_BLOCKS_CHECKED instead of OBJ_SZ_TO_BLOCKS. * malloc.c (GC_alloc_large): Likewise. * alloc.c (GC_expand_hp_inner): Type of "bytes" local variable changed from word to size_t; ca...
do_query_info (GVfsBackend *backend, GVfsJobQueryInfo *query_info_job, const char *filename, GFileQueryInfoFlags flags, GFileInfo *info, GFileAttributeMatcher *matcher) { GVfsBackendAdmin *self = G_VFS_BACKEND_ADMIN (backend); GVfsJob *job =...
0
[]
gvfs
d7d362995aa0cb8905c8d5c2a2a4c305d2ffff80
26,662,520,625,509,166,000,000,000,000,000,000,000
30
admin: Use fsuid to ensure correct file ownership Files created over admin backend should be owned by root, but they are owned by the user itself. This is because the daemon drops the uid to make dbus connection work. Use fsuid and euid to fix this issue. Closes: https://gitlab.gnome.org/GNOME/gvfs/issues/21
static int ext4_normal_writepage(struct page *page, struct writeback_control *wbc) { struct inode *inode = page->mapping->host; loff_t size = i_size_read(inode); loff_t len; trace_mark(ext4_normal_writepage, "dev %s ino %lu page_index %lu", inode->i_sb->s_id, inode->i_ino, page->index); J_ASSERT(Pag...
0
[ "CWE-399" ]
linux-2.6
06a279d636734da32bb62dd2f7b0ade666f65d7c
304,150,879,799,589,500,000,000,000,000,000,000,000
37
ext4: only use i_size_high for regular files Directories are not allowed to be bigger than 2GB, so don't use i_size_high for anything other than regular files. E2fsck should complain about these inodes, but the simplest thing to do for the kernel is to only use i_size_high for regular files. This prevents an intenti...
EIGEN_STRONG_INLINE QInt32 operator+(const QInt32 a, const QUInt16 b) { return QInt32(a.value + static_cast<int32_t>(b.value)); }
0
[ "CWE-908", "CWE-787" ]
tensorflow
ace0c15a22f7f054abcc1f53eabbcb0a1239a9e2
7,170,771,480,791,238,000,000,000,000,000,000,000
3
Default initialize fixed point Eigen types. In certain cases, tensors are filled with default values of the type. But, for these fixed point types, these values were uninitialized. Thus, we would have uninitialized memory access bugs, some of which were caught by MSAN. PiperOrigin-RevId: 344101137 Change-Id: I14555fd...
parse_single_hex_dump_line(char* rec, guint8 *buf, guint byte_offset) { int pos, i; char *s; unsigned long value; guint16 word_value; /* Get the byte_offset directly from the record */ rec[4] = '\0'; s = rec; value = strtoul(s, NULL, 16); if (value != byte_offset) { return FALSE; } /* Go through the...
0
[ "CWE-20" ]
wireshark
3270dfac43da861c714df76513456b46765ff47f
268,301,084,105,980,870,000,000,000,000,000,000,000
41
Don't treat the packet length as unsigned. The scanf family of functions are as annoyingly bad at handling unsigned numbers as strtoul() is - both of them are perfectly willing to accept a value beginning with a negative sign as an unsigned value. When using strtoul(), you can compensate for this by explicitly checki...
static void enter_lmode(struct kvm_vcpu *vcpu) { u32 guest_tr_ar; guest_tr_ar = vmcs_read32(GUEST_TR_AR_BYTES); if ((guest_tr_ar & AR_TYPE_MASK) != AR_TYPE_BUSY_64_TSS) { printk(KERN_DEBUG "%s: tss fixup for long mode. \n", __func__); vmcs_write32(GUEST_TR_AR_BYTES, (guest_tr_ar & ~AR_TYPE_MASK...
0
[ "CWE-400" ]
linux-2.6
9581d442b9058d3699b4be568b6e5eae38a41493
333,309,839,741,139,980,000,000,000,000,000,000,000
14
KVM: Fix fs/gs reload oops with invalid ldt kvm reloads the host's fs and gs blindly, however the underlying segment descriptors may be invalid due to the user modifying the ldt after loading them. Fix by using the safe accessors (loadsegment() and load_gs_index()) instead of home grown unsafe versions. This is CVE-...
static sector_t fuse_bmap(struct address_space *mapping, sector_t block) { struct inode *inode = mapping->host; struct fuse_conn *fc = get_fuse_conn(inode); FUSE_ARGS(args); struct fuse_bmap_in inarg; struct fuse_bmap_out outarg; int err; if (!inode->i_sb->s_bdev || fc->no_bmap) return 0; memset(&inarg, 0, ...
0
[ "CWE-399", "CWE-835" ]
linux
3ca8138f014a913f98e6ef40e939868e1e9ea876
339,336,786,290,826,320,000,000,000,000,000,000,000
29
fuse: break infinite loop in fuse_fill_write_pages() I got a report about unkillable task eating CPU. Further investigation shows, that the problem is in the fuse_fill_write_pages() function. If iov's first segment has zero length, we get an infinite loop, because we never reach iov_iter_advance() call. Fix this by c...
static int interpret_errors(void) { char bad; if (inr != 7) { DPRINT("-- FDC reply error\n"); fdc_state[current_fdc].reset = 1; return 1; } /* check IC to find cause of interrupt */ switch (reply_buffer[ST0] & ST0_INTR) { case 0x40: /* error occurred during command execution */ if (reply_buffer[ST1] & ...
0
[ "CWE-416" ]
linux
f71f01394f742fc4558b3f9f4c7ef4c4cf3b07c8
245,626,390,136,832,730,000,000,000,000,000,000,000
48
floppy: use a statically allocated error counter Interrupt handler bad_flp_intr() may cause a UAF on the recently freed request just to increment the error count. There's no point keeping that one in the request anyway, and since the interrupt handler uses a static pointer to the error which cannot be kept in sync wi...
parse_ipsecrequest(struct xfrm_policy *xp, struct sadb_x_ipsecrequest *rq) { struct net *net = xp_net(xp); struct xfrm_tmpl *t = xp->xfrm_vec + xp->xfrm_nr; int mode; if (xp->xfrm_nr >= XFRM_MAX_DEPTH) return -ELOOP; if (rq->sadb_x_ipsecrequest_mode == 0) return -EINVAL; t->id.proto = rq->sadb_x_ipsecreque...
1
[]
linux
096f41d3a8fcbb8dde7f71379b1ca85fe213eded
322,476,098,538,820,020,000,000,000,000,000,000,000
49
af_key: Fix sadb_x_ipsecrequest parsing The parsing of sadb_x_ipsecrequest is broken in a number of ways. First of all we're not verifying sadb_x_ipsecrequest_len. This is needed when the structure carries addresses at the end. Worse we don't even look at the length when we parse those optional addresses. The migra...
static int selinux_netlbl_sock_setsid(struct sock *sk) { int rc; struct sk_security_struct *sksec = sk->sk_security; struct netlbl_lsm_secattr *secattr; if (sksec->nlbl_state != NLBL_REQUIRE) return 0; secattr = selinux_netlbl_sock_genattr(sk); if (secattr == NULL) return -ENOMEM; rc = netlbl_sock_setattr(...
0
[]
linux-2.6
d7f59dc4642ce2fc7b79fcd4ec02ffce7f21eb02
177,733,037,616,160,400,000,000,000,000,000,000,000
25
selinux: Fix a panic in selinux_netlbl_inode_permission() Rick McNeal from LSI identified a panic in selinux_netlbl_inode_permission() caused by a certain sequence of SUNRPC operations. The problem appears to be due to the lack of NULL pointer checking in the function; this patch adds the pointer checks so the functi...
proto_item_set_text(proto_item *pi, const char *format, ...) { field_info *fi = NULL; va_list ap; TRY_TO_FAKE_THIS_REPR_VOID(pi); fi = PITEM_FINFO(pi); if (fi == NULL) return; if (fi->rep) { ITEM_LABEL_FREE(PNODE_POOL(pi), fi->rep); fi->rep = NULL; } va_start(ap, format); proto_tree_set_represent...
0
[ "CWE-401" ]
wireshark
a9fc769d7bb4b491efb61c699d57c9f35269d871
202,830,805,662,635,450,000,000,000,000,000,000,000
20
epan: Fix a memory leak. Make sure _proto_tree_add_bits_ret_val allocates a bits array using the packet scope, otherwise we leak memory. Fixes #17032.
Status upgradeAuthSchemaStep(OperationContext* txn, AuthorizationManager* authzManager, bool* isDone) { int authzVersion; Status status = authzManager->getAuthorizationVersion(txn, &authzVersion); if (!status.isOK()) { return status; } ...
0
[ "CWE-613" ]
mongo
64d8e9e1b12d16b54d6a592bae8110226c491b4e
290,357,271,903,275,270,000,000,000,000,000,000,000
24
SERVER-38984 Validate unique User ID on UserCache hit (cherry picked from commit e55d6e2292e5dbe2f97153251d8193d1cc89f5d7)
static long vbg_misc_device_ioctl(struct file *filp, unsigned int req, unsigned long arg) { struct vbg_session *session = filp->private_data; size_t returned_size, size; struct vbg_ioctl_hdr hdr; bool is_vmmdev_req; int ret = 0; void *buf; if (copy_from_user(&hdr, (void *)arg, sizeof(hdr))) return -EFAU...
1
[ "CWE-362" ]
linux
bd23a7269834dc7c1f93e83535d16ebc44b75eba
30,527,652,087,481,900,000,000,000,000,000,000,000
68
virt: vbox: Only copy_from_user the request-header once In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the 'version', 'size_in', and 'size_out' fields of 'hdr' are verified. Before this commit, after the checks a buffe...
static int password_cb(char *buf, int num, int rwflag, void *user_data) { pj_ssl_cert_t *cert = (pj_ssl_cert_t*) user_data; PJ_UNUSED_ARG(rwflag); if(num < cert->privkey_pass.slen) return 0; pj_memcpy(buf, cert->privkey_pass.ptr, cert->privkey_pass.slen); return (int)cert->privkey_pass.slen;...
0
[ "CWE-362", "CWE-703" ]
pjproject
d5f95aa066f878b0aef6a64e60b61e8626e664cd
275,108,403,005,661,770,000,000,000,000,000,000,000
12
Merge pull request from GHSA-cv8x-p47p-99wr * - Avoid SSL socket parent/listener getting destroyed during handshake by increasing parent's reference count. - Add missing SSL socket close when the newly accepted SSL socket is discarded in SIP TLS transport. * - Fix silly mistake: accepted active socket created without...
ll_free_all(qf_info_T **pqi) { int i; qf_info_T *qi; qi = *pqi; if (qi == NULL) return; *pqi = NULL; // Remove reference to this list // If the location list is still in use, then queue the delete request // to be processed later. if (quickfix_busy > 0) { locstack_queue_delreq(q...
0
[ "CWE-416" ]
vim
4f1b083be43f351bc107541e7b0c9655a5d2c0bb
51,234,209,863,895,410,000,000,000,000,000,000,000
30
patch 9.0.0322: crash when no errors and 'quickfixtextfunc' is set Problem: Crash when no errors and 'quickfixtextfunc' is set. Solution: Do not handle errors if there aren't any.
OaepDecode( TPM2B *dataOut, // OUT: the recovered data TPM_ALG_ID hashAlg, // IN: algorithm to use for padding const TPM2B *label, // IN: null-terminated string (may be NULL) TPM2B *padded // IN: the padded data ) { UINT32 i; BY...
0
[ "CWE-787" ]
libtpms
505ef841c00b4c096b1977c667cb957bec3a1d8b
85,024,654,072,465,040,000,000,000,000,000,000,000
65
tpm2: Fix output buffer parameter and size for RSA decyrption For the RSA decryption we have to use an output buffer of the size of the (largest possible) RSA key for the decryption to always work. This fixes a stack corruption bug that caused a SIGBUS and termination of 'swtpm'. Signed-off-by: Stefan Berger <stefan...
explicit ReverseOp(OpKernelConstruction* context) : OpKernel(context) {}
0
[ "CWE-369" ]
tensorflow
4071d8e2f6c45c1955a811fee757ca2adbe462c1
38,486,394,168,083,487,000,000,000,000,000,000,000
1
Fix FPE issue with `tf.raw_ops.Reverse`. PiperOrigin-RevId: 371176973 Change-Id: Ic6d483bfc95313ec2299c2d1c956cfe96c96626c
static inline void clr_cr_intercept(struct vcpu_svm *svm, int bit) { struct vmcb *vmcb = get_host_vmcb(svm); vmcb->control.intercept_cr &= ~(1U << bit); recalc_intercepts(svm); }
0
[]
kvm
854e8bb1aa06c578c2c9145fa6bfe3680ef63b23
243,174,637,867,823,670,000,000,000,000,000,000,000
8
KVM: x86: Check non-canonical addresses upon WRMSR Upon WRMSR, the CPU should inject #GP if a non-canonical value (address) is written to certain MSRs. The behavior is "almost" identical for AMD and Intel (ignoring MSRs that are not implemented in either architecture since they would anyhow #GP). However, IA32_SYSENTE...
static int ntop_stats_get_minute_samplings_interval(lua_State *vm) { time_t epoch_start, epoch_end; int ifid; NetworkInterface* iface; StatsManager *sm; struct statsManagerRetrieval retvals; ntop->getTrace()->traceEvent(TRACE_INFO, "%s() called", __FUNCTION__); if(ntop_lua_check(vm, __FUNCTION__, 1, LUA...
0
[ "CWE-254" ]
ntopng
2e0620be3410f5e22c9aa47e261bc5a12be692c6
139,018,337,202,898,310,000,000,000,000,000,000,000
37
Added security fix to avoid escalating privileges to non-privileged users Many thanks to Dolev Farhi for reporting it
int ssl3_send_client_key_exchange(SSL *s) { unsigned char *p; int n; unsigned long alg_k; #ifndef OPENSSL_NO_RSA unsigned char *q; EVP_PKEY *pkey = NULL; #endif #ifndef OPENSSL_NO_KRB5 KSSL_ERR kssl_err; #endif /* OPENSSL_NO_KRB5 */ #ifndef OPENSSL_NO_ECDH EC_KEY *cl...
0
[ "CWE-310" ]
openssl
e1b568dd2462f7cacf98f3d117936c34e2849a6b
115,731,767,478,460,750,000,000,000,000,000,000,000
777
Prevent handshake with unseeded PRNG Fix security issue where under certain conditions a client can complete a handshake with an unseeded PRNG. The conditions are: - Client is on a platform where the PRNG has not been seeded, and the user has not seeded manually - A protocol specific client method version has been use...
int ff_set_ref_count(H264Context *h) { int num_ref_idx_active_override_flag; // set defaults, might be overridden a few lines later h->ref_count[0] = h->pps.ref_count[0]; h->ref_count[1] = h->pps.ref_count[1]; if (h->slice_type_nos != AV_PICTURE_TYPE_I) { unsigned max[2]; max[0] = ...
0
[ "CWE-703" ]
FFmpeg
29ffeef5e73b8f41ff3a3f2242d356759c66f91f
208,876,890,326,286,880,000,000,000,000,000,000,000
42
avcodec/h264: do not trust last_pic_droppable when marking pictures as done This simplifies the code and fixes a deadlock Fixes Ticket2927 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
MagickExport void XGetResourceInfo(const ImageInfo *image_info, XrmDatabase database,const char *client_name,XResourceInfo *resource_info) { char *directory, *resource_value; /* Initialize resource info fields. */ (void) LogMagickEvent(TraceEvent,GetMagickModule(),"..."); assert(resource_info !...
0
[ "CWE-401" ]
ImageMagick6
13801f5d0bd7a6fdb119682d34946636afdb2629
289,429,961,011,871,460,000,000,000,000,000,000,000
167
https://github.com/ImageMagick/ImageMagick/issues/1531
inline void Http2Session::EmitStatistics() { if (!HasHttp2Observer(env())) return; Http2SessionPerformanceEntry* entry = new Http2SessionPerformanceEntry(env(), statistics_, TypeName()); env()->SetImmediate([](Environment* env, void* data) { Local<Context> context = env->context(); Http2SessionPer...
0
[]
node
ce22d6f9178507c7a41b04ac4097b9ea902049e3
295,630,939,295,346,900,000,000,000,000,000,000,000
43
http2: add altsvc support Add support for sending and receiving ALTSVC frames. PR-URL: https://github.com/nodejs/node/pull/17917 Reviewed-By: Anna Henningsen <anna@addaleax.net> Reviewed-By: Tiancheng "Timothy" Gu <timothygu99@gmail.com> Reviewed-By: Matteo Collina <matteo.collina@gmail.com>