func
string
target
int64
cwe
list
project
string
commit_id
string
hash
float64
size
int64
message
string
int inet_csk_compat_getsockopt(struct sock *sk, int level, int optname, char __user *optval, int __user *optlen) { const struct inet_connection_sock *icsk = inet_csk(sk); if (icsk->icsk_af_ops->compat_getsockopt) return icsk->icsk_af_ops->compat_getsockopt(sk, level, optname, optval, optlen); ...
0
[ "CWE-200", "CWE-415" ]
linux
657831ffc38e30092a2d5f03d385d710eb88b09a
192,488,467,814,255,770,000,000,000,000,000,000,000
11
dccp/tcp: do not inherit mc_list from parent syzkaller found a way to trigger double frees from ip_mc_drop_socket() It turns out that leave a copy of parent mc_list at accept() time, which is very bad. Very similar to commit 8b485ce69876 ("tcp: do not inherit fastopen_req from parent") Initial report from Pray3r, c...
static MagickBooleanType Classify(Image *image,short **extrema, const double cluster_threshold, const double weighting_exponent,const MagickBooleanType verbose, ExceptionInfo *exception) { #define SegmentImageTag "Segment/Image" #define ThrowClassifyException(severity,tag,label) \ {\ for (cluster=head; cluster...
0
[ "CWE-369" ]
ImageMagick
a4c89f2a61069ad7637bc7749cc1a839de442526
81,213,553,045,113,840,000,000,000,000,000,000,000
441
https://github.com/ImageMagick/ImageMagick/issues/1730
rfbBool rfbProcessFileTransfer(rfbClientPtr cl, uint8_t contentType, uint8_t contentParam, uint32_t size, uint32_t length) { char *buffer=NULL, *p=NULL; int retval=0; char filename1[MAX_PATH]; char filename2[MAX_PATH]; char szFileTime[MAX_PATH]; struct stat statbuf; uint32_t sizeHtmp=0; ...
1
[]
libvncserver
804335f9d296440bb708ca844f5d89b58b50b0c6
237,745,009,422,221,330,000,000,000,000,000,000,000
380
Thread safety for zrle, zlib, tight. Proposed tight security type fix for debian bug 517422.
close_redir(void) { if (redir_fd != NULL) { fclose(redir_fd); redir_fd = NULL; } #ifdef FEAT_EVAL redir_reg = 0; if (redir_vname) { var_redir_stop(); redir_vname = 0; } #endif }
0
[ "CWE-78" ]
vim
8c62a08faf89663e5633dc5036cd8695c80f1075
310,946,320,758,317,220,000,000,000,000,000,000,000
16
patch 8.1.0881: can execute shell commands in rvim through interfaces Problem: Can execute shell commands in rvim through interfaces. Solution: Disable using interfaces in restricted mode. Allow for writing file with writefile(), histadd() and a few others.
static void vmx_flush_tlb_all(struct kvm_vcpu *vcpu) { struct vcpu_vmx *vmx = to_vmx(vcpu); /* * INVEPT must be issued when EPT is enabled, irrespective of VPID, as * the CPU is not required to invalidate guest-physical mappings on * VM-Entry, even if VPID is disabled. Guest-physical mappings are * associat...
0
[ "CWE-787" ]
linux
04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
178,335,673,369,835,340,000,000,000,000,000,000,000
22
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index __vmx_handle_exit() uses vcpu->run->internal.ndata as an index for an array access. Since vcpu->run is (can be) mapped to a user address space with a writer permission, the 'ndata' could be updated by the user process at anytime (the user process can set...
_gnutls_check_pk_algo_in_list (const gnutls_pk_algorithm_t * pk_algos, int pk_algos_length, gnutls_pk_algorithm_t algo_to_check) { int i; for (i = 0; i < pk_algos_length; i++) { if (algo_to_check == pk_algos[i]) { return 0; ...
0
[ "CWE-399" ]
gnutls
9c62f4feb2bdd6fbbb06eb0c60bfdea80d21bbb8
11,332,070,326,256,257,000,000,000,000,000,000,000
14
Deinitialize the correct number of certificates. Reported by Remi Gacogne.
static int msg_cache_clean_cb (const char* id, body_cache_t* bcache, void* data) { unsigned int uv, uid; IMAP_DATA* idata = (IMAP_DATA*)data; if (sscanf (id, "%u-%u", &uv, &uid) != 2) return 0; /* bad UID */ if (uv != idata->uid_validity || !int_hash_find (idata->uid_hash, uid)) mutt_bcache_de...
0
[ "CWE-787" ]
mutt
3287534daa3beac68e2e83ca4b4fe8a3148ff870
327,022,029,062,579,280,000,000,000,000,000,000,000
15
Don't overflow tmp in msg_parse_fetch. Ensure INTERNALDATE and RFC822.SIZE field sizes fit temp buffer. Thanks to Jeriko One for the bug report and patch, which this patch is based upon.
cp1251_get_case_fold_codes_by_str(OnigCaseFoldType flag, const OnigUChar* p, const OnigUChar* end, OnigCaseFoldCodeItem items[]) { return onigenc_get_case_fold_codes_by_str_with_map( sizeof(CaseFoldMap)/sizeof(OnigPairCaseFoldCodes), CaseFoldMap, 0, flag, p, end, items); }
0
[ "CWE-125" ]
oniguruma
65a9b1aa03c9bc2dc01b074295b9603232cb3b78
293,658,390,481,653,660,000,000,000,000,000,000,000
7
onig-5.9.2
PHP_MINIT_FUNCTION(gd) { le_gd = zend_register_list_destructors_ex(php_free_gd_image, NULL, "gd", module_number); le_gd_font = zend_register_list_destructors_ex(php_free_gd_font, NULL, "gd font", module_number); #if HAVE_GD_BUNDLED && HAVE_LIBFREETYPE gdFontCacheMutexSetup(); #endif #if HAVE_LIBT1 T1_SetBitmapPad(...
0
[ "CWE-787" ]
php-src
1bd103df00f49cf4d4ade2cfe3f456ac058a4eae
101,052,498,624,933,980,000,000,000,000,000,000,000
140
Fix bug #72730 - imagegammacorrect allows arbitrary write access
static void svm_decache_cr0_guest_bits(struct kvm_vcpu *vcpu) { }
0
[ "CWE-400" ]
linux-2.6
9581d442b9058d3699b4be568b6e5eae38a41493
111,712,244,676,034,930,000,000,000,000,000,000,000
3
KVM: Fix fs/gs reload oops with invalid ldt kvm reloads the host's fs and gs blindly, however the underlying segment descriptors may be invalid due to the user modifying the ldt after loading them. Fix by using the safe accessors (loadsegment() and load_gs_index()) instead of home grown unsafe versions. This is CVE-...
Status GetFuncAttr(const EagerOperation* op, const EagerContext& ctx, const char* attr_name, bool* value) { Status status = op->Attrs().Get(attr_name, value); if (status.ok()) { VLOG(2) << "Caller explicitly specifies " << (attr_name ? "=true " : "=false, ") << op->DebugString(); ...
0
[ "CWE-476", "CWE-475" ]
tensorflow
a5b89cd68c02329d793356bda85d079e9e69b4e7
82,906,819,283,068,950,000,000,000,000,000,000,000
23
Fix empty resource handle vulnerability. Some ops that attempt to extract a resource handle from user input can lead to nullptr dereferences. This returns an error in such a case. PiperOrigin-RevId: 445571938
static void btrfs_run_delalloc_work(struct btrfs_work *work) { struct btrfs_delalloc_work *delalloc_work; delalloc_work = container_of(work, struct btrfs_delalloc_work, work); if (delalloc_work->wait) btrfs_wait_ordered_range(delalloc_work->inode, 0, (u64)-1); else filemap_flush(delalloc_work->inode->...
0
[ "CWE-310" ]
linux-2.6
9c52057c698fb96f8f07e7a4bcf4801a092bda89
289,939,622,709,889,800,000,000,000,000,000,000,000
17
Btrfs: fix hash overflow handling The handling for directory crc hash overflows was fairly obscure, split_leaf returns EOVERFLOW when we try to extend the item and that is supposed to bubble up to userland. For a while it did so, but along the way we added better handling of errors and forced the FS readonly if we hi...
static int php_plain_files_rename(php_stream_wrapper *wrapper, const char *url_from, const char *url_to, int options, php_stream_context *context) { int ret; if (!url_from || !url_to) { return 0; } #ifdef PHP_WIN32 if (!php_win32_check_trailing_space(url_from, (int)strlen(url_from))) { php_win32_docref2_from_...
1
[ "CWE-264" ]
php-src
e3133e4db70476fb7adfdedb738483e2255ce0e1
332,530,315,887,200,060,000,000,000,000,000,000,000
83
Fix bug #77630 - safer rename() procedure In order to rename safer, we do the following: - set umask to 077 (unfortunately, not TS, so excluding ZTS) - chown() first, to set proper group before allowing group access - chmod() after, even if chown() fails
CImg<T>& stats(const unsigned int variance_method=1) { return get_stats(variance_method).move_to(*this); }
0
[ "CWE-770" ]
cimg
619cb58dd90b4e03ac68286c70ed98acbefd1c90
292,501,326,524,663,950,000,000,000,000,000,000,000
3
CImg<>::load_bmp() and CImg<>::load_pandore(): Check that dimensions encoded in file does not exceed file size.
resolve_len_ran_interval(struct ly_ctx *ctx, const char *str_restr, struct lys_type *type, struct len_ran_intv **ret) { /* 0 - unsigned, 1 - signed, 2 - floating point */ int kind; int64_t local_smin = 0, local_smax = 0, local_fmin, local_fmax; uint64_t local_umin, local_umax = 0; uint8_t local_fdig...
0
[ "CWE-119" ]
libyang
32fb4993bc8bb49e93e84016af3c10ea53964be5
261,500,239,445,116,950,000,000,000,000,000,000,000
387
schema tree BUGFIX do not check features while still resolving schema Fixes #723
~WriteCheckTimestampCallback() override { EXPECT_EQ(STATE_SUCCEEDED, state); }
0
[ "CWE-125" ]
folly
c321eb588909646c15aefde035fd3133ba32cdee
233,052,988,244,550,660,000,000,000,000,000,000,000
3
Handle close_notify as standard writeErr in AsyncSSLSocket. Summary: Fixes CVE-2019-11934 Reviewed By: mingtaoy Differential Revision: D18020613 fbshipit-source-id: db82bb250e53f0d225f1280bd67bc74abd417836
PARAMETER *rfc2231_encode_string (const char *attribute, char *value) { int encode = 0, add_quotes = 0, free_src_value = 0; int split = 0, continuation_number = 0; size_t dest_value_len = 0, max_value_len = 0, cur_value_len = 0; char *cur, *charset = NULL, *src_value = NULL; PARAMETER *result = NULL, *current...
0
[]
mutt
3b6f6b829718ec8a7cf3eb6997d86e83e6c38567
124,633,300,189,662,630,000,000,000,000,000,000,000
154
Avoid undefined behavior on huge integer in a RFC 2231 header. The atoi() function was called on the index, which can potentially be huge in an invalid message and can yield undefined behavior. The mutt_atoi() function is now used for error detection.
entry_guard_describe(const entry_guard_t *guard) { static char buf[256]; tor_snprintf(buf, sizeof(buf), "%s ($%s)", strlen(guard->nickname) ? guard->nickname : "[bridge]", hex_str(guard->identity, DIGEST_LEN)); return buf; }
0
[ "CWE-200" ]
tor
665baf5ed5c6186d973c46cdea165c0548027350
153,272,801,187,805,440,000,000,000,000,000,000,000
9
Consider the exit family when applying guard restrictions. When the new path selection logic went into place, I accidentally dropped the code that considered the _family_ of the exit node when deciding if the guard was usable, and we didn't catch that during code review. This patch makes the guard_restriction_t code ...
static void do_con_trol(struct tty_struct *tty, struct vc_data *vc, int c) { /* * Control characters can be used in the _middle_ * of an escape sequence. */ if (vc->vc_state == ESosc && c>=8 && c<=13) /* ... except for OSC */ return; switch (c) { case 0: return; case 7: if (vc->vc_state == ESosc) ...
0
[ "CWE-416", "CWE-362" ]
linux
ca4463bf8438b403596edd0ec961ca0d4fbe0220
122,057,880,091,488,780,000,000,000,000,000,000,000
412
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console The VT_DISALLOCATE ioctl can free a virtual console while tty_release() is still running, causing a use-after-free in con_shutdown(). This occurs because VT_DISALLOCATE considers a virtual console's 'struct vc_data' to be unused as soon as the correspond...
static int rtnl_stats_dump(struct sk_buff *skb, struct netlink_callback *cb) { int h, s_h, err, s_idx, s_idxattr, s_prividx; struct net *net = sock_net(skb->sk); unsigned int flags = NLM_F_MULTI; struct if_stats_msg *ifsm; struct hlist_head *head; struct net_device *dev; u32 filter_mask = 0; int idx = 0; s_h ...
0
[ "CWE-476" ]
linux
f428fe4a04cc339166c8bbd489789760de3a0cee
97,845,686,021,658,200,000,000,000,000,000,000,000
59
rtnetlink: give a user socket to get_target_net() This function is used from two places: rtnl_dump_ifinfo and rtnl_getlink. In rtnl_getlink(), we give a request skb into get_target_net(), but in rtnl_dump_ifinfo, we give a response skb into get_target_net(). The problem here is that NETLINK_CB() isn't initialized for ...
GC_API size_t GC_CALL GC_get_prof_stats_unsafe( struct GC_prof_stats_s *pstats, size_t stats_sz) { struct GC_prof_stats_s stats; if (stats_sz >= sizeof(stats)) { fill_prof_stats(pstats); if (stat...
0
[ "CWE-119" ]
bdwgc
7292c02fac2066d39dd1bcc37d1a7054fd1e32ee
122,880,854,140,777,060,000,000,000,000,000,000,000
18
Fix malloc routines to prevent size value wrap-around See issue #135 on Github. * allchblk.c (GC_allochblk, GC_allochblk_nth): Use OBJ_SZ_TO_BLOCKS_CHECKED instead of OBJ_SZ_TO_BLOCKS. * malloc.c (GC_alloc_large): Likewise. * alloc.c (GC_expand_hp_inner): Type of "bytes" local variable changed from word to size_t; ca...
static void *ok_stdlib_alloc(void *user_data, size_t size) { (void)user_data; return malloc(size); }
0
[ "CWE-787" ]
ok-file-formats
a9cc1711dd4ed6a215038f1c5c03af0ef52c3211
42,585,255,217,512,410,000,000,000,000,000,000,000
4
ok_jpg: Fix invalid DHT (#11)
void drop_collected_mounts(struct vfsmount *mnt) { LIST_HEAD(umount_list); down_write(&namespace_sem); br_write_lock(&vfsmount_lock); umount_tree(real_mount(mnt), 0, &umount_list); br_write_unlock(&vfsmount_lock); up_write(&namespace_sem); release_mounts(&umount_list); }
0
[ "CWE-284", "CWE-264" ]
linux
3151527ee007b73a0ebd296010f1c0454a919c7d
191,664,012,187,667,100,000,000,000,000,000,000,000
10
userns: Don't allow creation if the user is chrooted Guarantee that the policy of which files may be access that is established by setting the root directory will not be violated by user namespaces by verifying that the root directory points to the root of the mount namespace at the time of user namespace creation. ...
static uint64_t sdhci_read(void *opaque, hwaddr offset, unsigned size) { SDHCIState *s = (SDHCIState *)opaque; uint32_t ret = 0; if (timer_pending(s->transfer_timer)) { sdhci_resume_pending_transfer(s); } switch (offset & ~0x3) { case SDHC_SYSAD: ret = s->sdmasysad; bre...
0
[ "CWE-119" ]
qemu
b263d8f928001b5cfa2a993ea43b7a5b3a1811e8
302,712,819,557,663,560,000,000,000,000,000,000,000
93
hw/sd: sdhci: Don't transfer any data when command time out At the end of sdhci_send_command(), it starts a data transfer if the command register indicates data is associated. But the data transfer should only be initiated when the command execution has succeeded. With this fix, the following reproducer: outl 0xcf8 ...
TEST_F(HttpConnectionManagerImplTest, FilterContinueAndEndStreamData) { InSequence s; setup(false, ""); EXPECT_CALL(*codec_, dispatch(_)).WillOnce(Invoke([&](Buffer::Instance&) -> void { StreamDecoder* decoder = &conn_manager_->newStream(response_encoder_); auto headers = makeHeaderMap({{":authority", "h...
0
[ "CWE-400", "CWE-703" ]
envoy
afc39bea36fd436e54262f150c009e8d72db5014
231,466,813,039,049,870,000,000,000,000,000,000,000
39
Track byteSize of HeaderMap internally. Introduces a cached byte size updated internally in HeaderMap. The value is stored as an optional, and is cleared whenever a non-const pointer or reference to a HeaderEntry is accessed. The cached value can be set with refreshByteSize() which performs an iteration over the Heade...
void snd_usb_autosuspend(struct snd_usb_audio *chip) { if (atomic_read(&chip->shutdown)) return; if (atomic_dec_and_test(&chip->active)) usb_autopm_put_interface(chip->pm_intf); }
0
[ "CWE-284", "CWE-125" ]
linux
bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991
219,070,684,970,467,040,000,000,000,000,000,000,000
7
ALSA: usb-audio: Check out-of-bounds access by corrupted buffer descriptor When a USB-audio device receives a maliciously adjusted or corrupted buffer descriptor, the USB-audio driver may access an out-of-bounce value at its parser. This was detected by syzkaller, something like: BUG: KASAN: slab-out-of-bounds in ...
void NumberFormatTest::TestFormatFastpaths() { // get some additional case { UErrorCode status=U_ZERO_ERROR; DecimalFormat df(UnicodeString(u"0000"),status); if (U_FAILURE(status)) { dataerrln("Error creating DecimalFormat - %s", u_errorName(status)); } else { ...
0
[ "CWE-190" ]
icu
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
194,994,304,639,884,720,000,000,000,000,000,000,000
113
ICU-20246 Fixing another integer overflow in number parsing.
dns_message_movename(dns_message_t *msg, dns_name_t *name, dns_section_t fromsection, dns_section_t tosection) { REQUIRE(msg != NULL); REQUIRE(msg->from_to_wire == DNS_MESSAGE_INTENTRENDER); REQUIRE(name != NULL); REQUIRE(VALID_NAMED_SECTION(fromsection)); REQUIRE(VALID_NAMED_SECTION(tosection)); /...
0
[ "CWE-617" ]
bind9
6ed167ad0a647dff20c8cb08c944a7967df2d415
79,333,195,789,737,040,000,000,000,000,000,000,000
16
Always keep a copy of the message this allows it to be available even when dns_message_parse() returns a error.
static void pincode_reply_complete(uint8_t status, uint16_t length, const void *param, void *user_data) { struct btd_device *device = user_data; /* If the MGMT_OP_PIN_CODE_REPLY command is acknowledged, move the * starting time to that point. This give a better sense of time * evaluating the pincode. */ de...
0
[ "CWE-862", "CWE-863" ]
bluez
b497b5942a8beb8f89ca1c359c54ad67ec843055
156,327,927,124,734,780,000,000,000,000,000,000,000
10
adapter: Fix storing discoverable setting discoverable setting shall only be store when changed via Discoverable property and not when discovery client set it as that be considered temporary just for the lifetime of the discovery.
nfs_readdir_inode_mapping_valid(struct nfs_inode *nfsi) { if (nfsi->cache_validity & (NFS_INO_INVALID_CHANGE | NFS_INO_INVALID_DATA)) return false; smp_rmb(); return !test_bit(NFS_INO_INVALIDATING, &nfsi->flags); }
0
[ "CWE-909" ]
linux
ac795161c93699d600db16c1a8cc23a65a1eceaf
271,741,872,926,307,700,000,000,000,000,000,000,000
8
NFSv4: Handle case where the lookup of a directory fails If the application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() will punt to doing a regular lookup. If the server then returns a regular file, we will happily return a file descriptor with uninitialised open state. The fix is ...
static int vmci_transport_recv_stream_cb(void *data, struct vmci_datagram *dg) { struct sock *sk; struct sockaddr_vm dst; struct sockaddr_vm src; struct vmci_transport_packet *pkt; struct vsock_sock *vsk; bool bh_process_pkt; int err; sk = NULL; err = VMCI_SUCCESS; bh_process_pkt = false; /* Ignore incomin...
0
[ "CWE-20", "CWE-269" ]
linux
f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
163,668,294,242,609,810,000,000,000,000,000,000,000
131
net: rework recvmsg handler msg_name and msg_namelen logic This patch now always passes msg->msg_namelen as 0. recvmsg handlers must set msg_namelen to the proper size <= sizeof(struct sockaddr_storage) to return msg_name to the user. This prevents numerous uninitialized memory leaks we had in the recvmsg handlers an...
static void test_recv_s32(GInputStream *is, gint32 v) { gint32 e; g_assert(g_input_stream_read_all(is, &e, 4, NULL, NULL, NULL)); e = GINT32_FROM_BE(e); g_assert(e == v); }
0
[]
gtk-vnc
c8583fd3783c5b811590fcb7bae4ce6e7344963e
299,320,128,395,747,100,000,000,000,000,000,000,000
7
Correctly validate color map range indexes The color map index could wrap around to zero causing negative array index accesses. https://bugzilla.gnome.org/show_bug.cgi?id=778050 CVE-2017-5885 Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
dse_modify(Slapi_PBlock *pb) /* JCM There should only be one exit point from this function! */ { int err; /*House keeping stuff*/ LDAPMod **mods; /*Used to apply the modifications*/ LDAPMod **original_mods = NULL; /* some mods can be removed by callback, save them for later logging */ c...
0
[ "CWE-200", "CWE-203" ]
389-ds-base
b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32
224,198,456,634,545,040,000,000,000,000,000,000,000
304
Issue 4609 - CVE - info disclosure when authenticating Description: If you bind as a user that does not exist. Error 49 is returned instead of error 32. As error 32 discloses that the entry does not exist. When you bind as an entry that does not have userpassword set then ...
on_session_reauthentication_started (GdmSession *session, int pid_of_caller, const char *address, GdmManager *manager) { GDBusMethodInvocation *invocation; gpointer source...
0
[]
gdm
ff98b2817014684ae1acec78ff06f0f461a56a9f
8,864,234,938,604,426,000,000,000,000,000,000,000
23
manager: if falling back to X11 retry autologin Right now, we get one shot to autologin. If it fails, we fall back to the greeter. We should give it another go if the reason for the failure was wayland fallback to X. https://bugzilla.gnome.org/show_bug.cgi?id=780520
TEST_F(RouterTest, MaxStreamDurationWithRetryPolicy) { // First upstream request NiceMock<Http::MockRequestEncoder> encoder1; Http::ResponseDecoder* response_decoder = nullptr; setUpstreamMaxStreamDuration(500); EXPECT_CALL(cm_.thread_local_cluster_.conn_pool_, newStream(_, _)) .WillOnce(Invoke( ...
0
[ "CWE-703" ]
envoy
f0bb2219112d8cdb4c4e8b346834f962925362ca
254,023,815,343,358,500,000,000,000,000,000,000,000
45
[1.20] CVE-2022-21655 Crash with direct_response Signed-off-by: Otto van der Schaaf <ovanders@redhat.com>
static int rsi_send_beacon(struct rsi_common *common) { struct sk_buff *skb = NULL; u8 dword_align_bytes = 0; skb = dev_alloc_skb(MAX_MGMT_PKT_SIZE); if (!skb) return -ENOMEM; memset(skb->data, 0, MAX_MGMT_PKT_SIZE); dword_align_bytes = ((unsigned long)skb->data & 0x3f); if (dword_align_bytes) skb_pull(sk...
1
[ "CWE-400", "CWE-401" ]
linux
d563131ef23cbc756026f839a82598c8445bc45f
175,741,261,833,627,060,000,000,000,000,000,000,000
24
rsi: release skb if rsi_prepare_beacon fails In rsi_send_beacon, if rsi_prepare_beacon fails the allocated skb should be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
static void zero_bvec(struct bio_vec *bv) { void *buf; unsigned long flags; buf = bvec_kmap_irq(bv, &flags); memset(buf, 0, bv->bv_len); flush_dcache_page(bv->bv_page); bvec_kunmap_irq(buf, &flags); }
0
[ "CWE-863" ]
linux
f44d04e696feaf13d192d942c4f14ad2e117065a
290,976,382,556,174,700,000,000,000,000,000,000,000
10
rbd: require global CAP_SYS_ADMIN for mapping and unmapping It turns out that currently we rely only on sysfs attribute permissions: $ ll /sys/bus/rbd/{add*,remove*} --w------- 1 root root 4096 Sep 3 20:37 /sys/bus/rbd/add --w------- 1 root root 4096 Sep 3 20:37 /sys/bus/rbd/add_single_major --w------- 1 ro...
COrphan(CTransaction* ptxIn) { ptx = ptxIn; dPriority = 0; }
0
[ "CWE-16", "CWE-787" ]
bitcoin
a206b0ea12eb4606b93323268fc81a4f1f952531
53,016,061,048,698,020,000,000,000,000,000,000,000
5
Do not allow overwriting unspent transactions (BIP 30) Introduce the following network rule: * a block is not valid if it contains a transaction whose hash already exists in the block chain, unless all that transaction's outputs were already spent before said block. Warning: this is effectively a network rule ...
static int oidc_handle_info_request(request_rec *r, oidc_cfg *c, oidc_session_t *session, apr_byte_t needs_save) { int rc = HTTP_UNAUTHORIZED; char *s_format = NULL, *s_interval = NULL, *r_value = NULL; oidc_util_get_request_parameter(r, OIDC_REDIRECT_URI_REQUEST_INFO, &s_format); oidc_util_get_request_paramet...
0
[ "CWE-79" ]
mod_auth_openidc
55ea0a085290cd2c8cdfdd960a230cbc38ba8b56
158,523,185,974,767,930,000,000,000,000,000,000,000
189
Add a function to escape Javascript characters
static JSValue js_bs_put_u8(JSContext *ctx, JSValueConst this_val, int argc, JSValueConst *argv) { return js_bs_put_val(ctx, this_val, argc, argv, 0); }
0
[ "CWE-787" ]
gpac
ea1eca00fd92fa17f0e25ac25652622924a9a6a0
201,997,238,760,390,000,000,000,000,000,000,000,000
4
fixed #2138
virtual bool update_max(Field *max_val, bool force_update) { bool update_fl= force_update || cmp(ptr, max_val->ptr) > 0; if (update_fl) { max_val->set_notnull(); memcpy(max_val->ptr, ptr, pack_length()); } return update_fl; }
0
[ "CWE-416", "CWE-703" ]
server
08c7ab404f69d9c4ca6ca7a9cf7eec74c804f917
198,844,355,346,251,100,000,000,000,000,000,000,000
10
MDEV-24176 Server crashes after insert in the table with virtual column generated using date_format() and if() vcol_info->expr is allocated on expr_arena at parsing stage. Since expr item is allocated on expr_arena all its containee items must be allocated on expr_arena too. Otherwise fix_session_expr() will encounter...
static void cleanup_coins(Coin* coins, size_t num) { size_t i; for(i = 0; i < num; i++) coin_cleanup(&coins[i]); }
0
[ "CWE-401" ]
FreeRDP
9fee4ae076b1ec97b97efb79ece08d1dab4df29a
37,300,019,408,781,865,000,000,000,000,000,000,000
5
Fixed #5645: realloc return handling
static int compareFileMem(const char *filename, const char *mem, int size) { int res; int fd; char bytes[4096]; int idx = 0; struct stat info; if (update_results) { fd = open(filename, WR_FLAGS, 0644); if (fd < 0) { fprintf(stderr, "failed to open %s for writing", filename)...
0
[ "CWE-125" ]
libxml2
a820dbeac29d330bae4be05d9ecd939ad6b4aa33
240,469,145,283,095,650,000,000,000,000,000,000,000
55
Bug 758605: Heap-based buffer overread in xmlDictAddString <https://bugzilla.gnome.org/show_bug.cgi?id=758605> Reviewed by David Kilzer. * HTMLparser.c: (htmlParseName): Add bounds check. (htmlParseNameComplex): Ditto. * result/HTML/758605.html: Added. * result/HTML/758605.html.err: Added. * result/HTML/758605.html.s...
get_multipart_info(packet_info *pinfo, http_message_info_t *message_info) { char *start_boundary, *start_protocol = NULL; multipart_info_t *m_info = NULL; const char *type = pinfo->match_string; char *parameters; gint dummy; /* * We need both a content type AND parameters * for multip...
1
[]
wireshark
5803c7b87b3414cdb8bf502af50bb406ca774482
137,095,112,545,880,180,000,000,000,000,000,000,000
57
multipart: fix deallocation of invalid parts Fixes #16741 (cherry picked from commit 2411eae9edb562e80c45962c74945238a94e5d3b)
static int qeth_set_thread_start_bit(struct qeth_card *card, unsigned long thread) { unsigned long flags; spin_lock_irqsave(&card->thread_mask_lock, flags); if (!(card->thread_allowed_mask & thread) || (card->thread_start_mask & thread)) { spin_unlock_irqrestore(&card->thread_mask_lock, flags); return ...
0
[ "CWE-200", "CWE-119" ]
linux
6fb392b1a63ae36c31f62bc3fc8630b49d602b62
230,241,472,596,730,970,000,000,000,000,000,000,000
15
qeth: avoid buffer overflow in snmp ioctl Check user-defined length in snmp ioctl request and allow request only if it fits into a qeth command buffer. Signed-off-by: Ursula Braun <ursula.braun@de.ibm.com> Signed-off-by: Frank Blaschka <frank.blaschka@de.ibm.com> Reviewed-by: Heiko Carstens <heicars2@linux.vnet.ibm.c...
qedi_dbg_warn(struct qedi_dbg_ctx *qedi, const char *func, u32 line, const char *fmt, ...) { va_list va; struct va_format vaf; char nfunc[32]; memset(nfunc, 0, sizeof(nfunc)); memcpy(nfunc, func, sizeof(nfunc) - 1); va_start(va, fmt); vaf.fmt = fmt; vaf.va = &va; if (!(qedi_dbg_log & QEDI_LOG_WARN))...
1
[ "CWE-125" ]
linux
c09581a52765a85f19fc35340127396d5e3379cc
290,179,814,775,698,600,000,000,000,000,000,000,000
27
scsi: qedi: remove memset/memcpy to nfunc and use func instead KASAN reports this: BUG: KASAN: global-out-of-bounds in qedi_dbg_err+0xda/0x330 [qedi] Read of size 31 at addr ffffffffc12b0ae0 by task syz-executor.0/2429 CPU: 0 PID: 2429 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45 Hardware name: QEMU Standard PC (...
int tcp_disconnect(struct sock *sk, int flags) { struct inet_sock *inet = inet_sk(sk); struct inet_connection_sock *icsk = inet_csk(sk); struct tcp_sock *tp = tcp_sk(sk); int err = 0; int old_state = sk->sk_state; if (old_state != TCP_CLOSE) tcp_set_state(sk, TCP_CLOSE); /* ABORT function of RFC793 */ if (o...
0
[ "CWE-400", "CWE-119", "CWE-703" ]
linux
baff42ab1494528907bf4d5870359e31711746ae
282,458,087,861,806,900,000,000,000,000,000,000,000
63
net: Fix oops from tcp_collapse() when using splice() tcp_read_sock() can have a eat skbs without immediately advancing copied_seq. This can cause a panic in tcp_collapse() if it is called as a result of the recv_actor dropping the socket lock. A userspace program that splices data from a socket to either another soc...
int i40e_close(struct net_device *netdev) { struct i40e_netdev_priv *np = netdev_priv(netdev); struct i40e_vsi *vsi = np->vsi; i40e_vsi_close(vsi); return 0; }
0
[ "CWE-400", "CWE-401" ]
linux
27d461333459d282ffa4a2bdb6b215a59d493a8f
78,613,963,325,228,135,000,000,000,000,000,000,000
9
i40e: prevent memory leak in i40e_setup_macvlans In i40e_setup_macvlans if i40e_setup_channel fails the allocated memory for ch should be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Tested-by: Andrew Bowers <andrewx.bowers@intel.com> Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
static BROTLI_NOINLINE BrotliDecoderErrorCode SafeProcessCommands( BrotliDecoderState* s) { return ProcessCommandsInternal(1, s); }
0
[ "CWE-120" ]
brotli
223d80cfbec8fd346e32906c732c8ede21f0cea6
203,202,616,898,873,140,000,000,000,000,000,000,000
4
Update (#826) * IMPORTANT: decoder: fix potential overflow when input chunk is >2GiB * simplify max Huffman table size calculation * eliminate symbol duplicates (static arrays in .h files) * minor combing in research/ code
MagickPrivate ssize_t FormatLocaleFileList(FILE *file, const char *magick_restrict format,va_list operands) { ssize_t n; #if defined(MAGICKCORE_LOCALE_SUPPORT) && defined(MAGICKCORE_HAVE_VFPRINTF_L) { locale_t locale; locale=AcquireCLocale(); if (locale == (locale_t) NULL) n=(ssize_t...
0
[ "CWE-125" ]
ImageMagick
07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36
173,818,289,538,476,860,000,000,000,000,000,000,000
44
...
static const char *req_proxyreq_field(request_rec *r) { switch (r->proxyreq) { case PROXYREQ_NONE: return "PROXYREQ_NONE"; case PROXYREQ_PROXY: return "PROXYREQ_PROXY"; case PROXYREQ_REVERSE: return "PROXYREQ_REVERSE"; case PROXYREQ_RESPONSE: return "PROXYREQ_RESPONSE"; ...
0
[ "CWE-20" ]
httpd
78eb3b9235515652ed141353d98c239237030410
206,447,647,233,642,020,000,000,000,000,000,000,000
10
*) SECURITY: CVE-2015-0228 (cve.mitre.org) mod_lua: A maliciously crafted websockets PING after a script calls r:wsupgrade() can cause a child process crash. [Edward Lu <Chaosed0 gmail.com>] Discovered by Guido Vranken <guidovranken gmail.com> Submitted by: Edward Lu Committed by: covener git-svn-id...
static Renode *newnode(struct cstate *g, int type) { Renode *node = g->pend++; node->type = type; node->cc = NULL; node->c = 0; node->ng = 0; node->m = 0; node->n = 0; node->x = node->y = NULL; return node; }
0
[ "CWE-703", "CWE-674" ]
mujs
160ae29578054dc09fd91e5401ef040d52797e61
54,532,164,115,383,340,000,000,000,000,000,000,000
12
Issue #162: Check stack overflow during regexp compilation. Only bother checking during the first compilation pass that counts the size of the program.
static void nfc_sock_link(struct nfc_sock_list *l, struct sock *sk) { write_lock(&l->lock); sk_add_node(sk, &l->head); write_unlock(&l->lock); }
0
[ "CWE-276", "CWE-703" ]
linux
26896f01467a28651f7a536143fe5ac8449d4041
31,428,420,676,961,773,000,000,000,000,000,000,000
6
net/nfc/rawsock.c: add CAP_NET_RAW check. When creating a raw AF_NFC socket, CAP_NET_RAW needs to be checked first. Signed-off-by: Qingyu Li <ieatmuttonchuan@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
static int udf_delete_entry(struct inode *inode, struct fileIdentDesc *fi, struct udf_fileident_bh *fibh, struct fileIdentDesc *cfi) { cfi->fileCharacteristics |= FID_FILE_CHAR_DELETED; if (UDF_QUERY_FLAG(inode->i_sb, UDF_FLAG_STRICT)) memset(&(cfi->icb), 0x00, sizeof(struct long_ad)); return udf_w...
0
[ "CWE-200" ]
linux
0143fc5e9f6f5aad4764801015bc8d4b4a278200
75,048,440,374,060,870,000,000,000,000,000,000,000
11
udf: avoid info leak on export For type 0x51 the udf.parent_partref member in struct fid gets copied uninitialized to userland. Fix this by initializing it to 0. Signed-off-by: Mathias Krause <minipli@googlemail.com> Signed-off-by: Jan Kara <jack@suse.cz>
e_ews_connection_delete_items_sync (EEwsConnection *cnc, gint pri, const GSList *ids, EwsDeleteType delete_type, EwsSendMeetingCancellationsType send_cancels, ...
0
[ "CWE-295" ]
evolution-ews
915226eca9454b8b3e5adb6f2fff9698451778de
322,009,815,254,314,630,000,000,000,000,000,000,000
30
I#27 - SSL Certificates are not validated This depends on https://gitlab.gnome.org/GNOME/evolution-data-server/commit/6672b8236139bd6ef41ecb915f4c72e2a052dba5 too. Closes https://gitlab.gnome.org/GNOME/evolution-ews/issues/27
void imap_pretty_mailbox(char *path, size_t pathlen, const char *folder) { struct ConnAccount cac_target = { { 0 } }; struct ConnAccount cac_home = { { 0 } }; struct Url url = { 0 }; const char *delim = NULL; int tlen; int hlen = 0; bool home_match = false; char target_mailbox[1024]; char home_mailbox...
0
[ "CWE-125" ]
neomutt
fa1db5785e5cfd9d3cd27b7571b9fe268d2ec2dc
247,941,266,812,074,140,000,000,000,000,000,000,000
57
Fix seqset iterator when it ends in a comma If the seqset ended with a comma, the substr_end marker would be just before the trailing nul. In the next call, the loop to skip the marker would iterate right past the end of string too. The fix is simple: place the substr_end marker and skip past it immediately.
static void nfs4_bitmap_copy_adjust_setattr(__u32 *dst, const __u32 *src, struct inode *inode) { nfs4_bitmap_copy_adjust(dst, src, inode); }
0
[ "CWE-787" ]
linux
b4487b93545214a9db8cbf32e86411677b0cca21
157,309,184,515,288,510,000,000,000,000,000,000,000
5
nfs: Fix getxattr kernel panic and memory overflow Move the buffer size check to decode_attr_security_label() before memcpy() Only call memcpy() if the buffer is large enough Fixes: aa9c2669626c ("NFS: Client implementation of Labeled-NFS") Signed-off-by: Jeffrey Mitchell <jeffrey.mitchell@starlab.io> [Trond: clean u...
LogL16InitState(TIFF* tif) { static const char module[] = "LogL16InitState"; TIFFDirectory *td = &tif->tif_dir; LogLuvState* sp = DecoderState(tif); assert(sp != NULL); assert(td->td_photometric == PHOTOMETRIC_LOGL); /* for some reason, we can't do this in TIFFInitLogL16 */ if (sp->user_datafmt == SGILOGDATAFM...
0
[ "CWE-787" ]
libtiff
aaab5c3c9d2a2c6984f23ccbc79702610439bc65
154,384,958,554,651,050,000,000,000,000,000,000,000
38
* libtiff/tif_luv.c: fix potential out-of-bound writes in decode functions in non debug builds by replacing assert()s by regular if checks (bugzilla #2522). Fix potential out-of-bound reads in case of short input data.
static void GetStandardDeviationPixelList(PixelList *pixel_list, MagickPixelPacket *pixel) { MagickRealType sum, sum_squared; register SkipList *list; register ssize_t channel; size_t color; ssize_t count; unsigned short channels[ListChannels]; /* Find the standard-...
0
[ "CWE-119", "CWE-787" ]
ImageMagick6
91e58d967a92250439ede038ccfb0913a81e59fe
203,652,866,982,320,860,000,000,000,000,000,000,000
53
https://github.com/ImageMagick/ImageMagick/issues/1615
static int xfrm_alloc_replay_state_esn(struct xfrm_replay_state_esn **replay_esn, struct xfrm_replay_state_esn **preplay_esn, struct nlattr *rta) { struct xfrm_replay_state_esn *p, *pp, *up; int klen, ulen; if (!rta) return 0; up = nla_data(rta); klen = xfrm_replay_state_esn_len(up); ule...
0
[ "CWE-264" ]
net
90f62cf30a78721641e08737bda787552428061e
204,421,746,879,288,550,000,000,000,000,000,000,000
32
net: Use netlink_ns_capable to verify the permisions of netlink messages It is possible by passing a netlink socket to a more privileged executable and then to fool that executable into writing to the socket data that happens to be valid netlink message to do something that privileged executable did not intend to do. ...
void passdb_init(struct passdb_module *passdb) { if (passdb->iface.init != NULL && passdb->init_refcount == 0) passdb->iface.init(passdb); passdb->init_refcount++; }
0
[ "CWE-284" ]
core
7bad6a24160e34bce8f10e73dbbf9e5fbbcd1904
259,069,160,174,440,640,000,000,000,000,000,000,000
6
auth: Fix handling passdbs with identical driver/args but different mechanisms/username_filter The passdb was wrongly deduplicated in this situation, causing wrong mechanisms or username_filter setting to be used. This would be a rather unlikely configuration though. Fixed by moving mechanisms and username_filter fro...
build_select_string(my_bool key) { char buf[HUGE_STRING_LENGTH]; unsigned int col_count; statement *ptr; static DYNAMIC_STRING query_string; DBUG_ENTER("build_select_string"); init_dynamic_string(&query_string, "", 1024, 1024); dynstr_append_mem(&query_string, "SELECT ", 7); for (col_coun...
0
[ "CWE-284", "CWE-295" ]
mysql-server
3bd5589e1a5a93f9c224badf983cd65c45215390
151,600,384,051,865,500,000,000,000,000,000,000,000
61
WL#6791 : Redefine client --ssl option to imply enforced encryption # Changed the meaning of the --ssl=1 option of all client binaries to mean force ssl, not try ssl and fail over to eunecrypted # Added a new MYSQL_OPT_SSL_ENFORCE mysql_options() option to specify that an ssl connection is required. # Added a new macr...
bool DependencyOptimizer::SafeToConvertToNoOp(const NodeDef& node) const { if (HasRegularOutputs(node, *node_map_)) { // The output values of this node may be needed. VLOG(3) << "Not safe to convert '" << node.name() << " to NoOp. Node has outputs."; return false; } if (!fetch_nodes_known_...
0
[ "CWE-476" ]
tensorflow
e6340f0665d53716ef3197ada88936c2a5f7a2d3
73,449,684,201,122,920,000,000,000,000,000,000,000
55
Handle a special grappler case resulting in crash. It might happen that a malformed input could be used to trick Grappler into trying to optimize a node with no inputs. This, in turn, would produce a null pointer dereference and a segfault. PiperOrigin-RevId: 369242852 Change-Id: I2e5cbe7aec243d34a6d60220ac8ac9b16f13...
static void __exit x25_exit(void) { x25_proc_exit(); x25_link_free(); x25_route_free(); x25_unregister_sysctl(); unregister_netdevice_notifier(&x25_dev_notifier); dev_remove_pack(&x25_packet_type); sock_unregister(AF_X25); proto_unregister(&x25_proto); }
0
[]
net
7781607938c8371d4c2b243527430241c62e39c2
43,201,730,428,312,790,000,000,000,000,000,000,000
15
net/x25: Fix null-ptr-deref caused by x25_disconnect When the link layer is terminating, x25->neighbour will be set to NULL in x25_disconnect(). As a result, it could cause null-ptr-deref bugs in x25_sendmsg(),x25_recvmsg() and x25_connect(). One of the bugs is shown below. (Thread 1) | (Thread 2...
static void create_pdf(char const* filename) { QPDF pdf; pdf.emptyPDF(); QPDFObjectHandle font = pdf.makeIndirectObject( QPDFObjectHandle::newDictionary()); font.replaceKey("/Type", newName("/Font")); font.replaceKey("/Subtype", newName("/Type1")); font.replaceKey("/Name", newName("/F1...
1
[ "CWE-787" ]
qpdf
d71f05ca07eb5c7cfa4d6d23e5c1f2a800f52e8e
115,375,909,062,278,110,000,000,000,000,000,000,000
72
Fix sign and conversion warnings (major) This makes all integer type conversions that have potential data loss explicit with calls that do range checks and raise an exception. After this commit, qpdf builds with no warnings when -Wsign-conversion -Wconversion is used with gcc or clang or when -W3 -Wd4800 is used with ...
static int find_virq(unsigned int virq, unsigned int cpu, evtchn_port_t *evtchn) { struct evtchn_status status; evtchn_port_t port; int rc = -ENOENT; memset(&status, 0, sizeof(status)); for (port = 0; port < xen_evtchn_max_channels(); port++) { status.dom = DOMID_SELF; status.port = port; rc = HYPERVISOR_ev...
0
[ "CWE-400", "CWE-703" ]
linux
e99502f76271d6bc4e374fe368c50c67a1fd3070
23,435,573,472,264,726,000,000,000,000,000,000,000
22
xen/events: defer eoi in case of excessive number of events In case rogue guests are sending events at high frequency it might happen that xen_evtchn_do_upcall() won't stop processing events in dom0. As this is done in irq handling a crash might be the result. In order to avoid that, delay further inter-domain events...
json_const_iterator ObjectBegin(const json &o) { #ifdef TINYGLTF_USE_RAPIDJSON return o.MemberBegin(); #else return o.begin(); #endif }
0
[ "CWE-20" ]
tinygltf
52ff00a38447f06a17eab1caa2cf0730a119c751
213,220,072,872,637,630,000,000,000,000,000,000,000
7
Do not expand file path since its not necessary for glTF asset path(URI) and for security reason(`wordexp`).
void adapter_remove_profile(struct btd_adapter *adapter, gpointer p) { struct btd_profile *profile = p; if (!adapter->initialized) return; if (profile->device_remove) g_slist_foreach(adapter->devices, device_remove_profile, p); adapter->profiles = g_slist_remove(adapter->profiles, profile); if (profile->ad...
0
[ "CWE-862", "CWE-863" ]
bluez
b497b5942a8beb8f89ca1c359c54ad67ec843055
49,082,595,041,364,710,000,000,000,000,000,000,000
15
adapter: Fix storing discoverable setting discoverable setting shall only be store when changed via Discoverable property and not when discovery client set it as that be considered temporary just for the lifetime of the discovery.
static void snd_usb_mixer_free(struct usb_mixer_interface *mixer) { /* kill pending URBs */ snd_usb_mixer_disconnect(mixer); kfree(mixer->id_elems); if (mixer->urb) { kfree(mixer->urb->transfer_buffer); usb_free_urb(mixer->urb); } usb_free_urb(mixer->rc_urb); kfree(mixer->rc_setup_packet); kfree(mixer); }
0
[ "CWE-416", "CWE-787" ]
linux
124751d5e63c823092060074bd0abaae61aaa9c4
166,614,604,683,283,730,000,000,000,000,000,000,000
14
ALSA: usb-audio: Kill stray URB at exiting USB-audio driver may leave a stray URB for the mixer interrupt when it exits by some error during probe. This leads to a use-after-free error as spotted by syzkaller like: ================================================================== BUG: KASAN: use-after-free in sn...
static my_xid wsrep_order_and_check_continuity(XID *list, int len) { #ifdef WITH_WSREP wsrep_sort_xid_array(list, len); wsrep::gtid cur_position= wsrep_get_SE_checkpoint(); long long cur_seqno= cur_position.seqno().get(); for (int i= 0; i < len; ++i) { if (!wsrep_is_wsrep_xid(list + i) || wsrep_xi...
0
[ "CWE-416" ]
server
af810407f78b7f792a9bb8c47c8c532eb3b3a758
118,214,406,837,609,830,000,000,000,000,000,000,000
24
MDEV-28098 incorrect key in "dup value" error after long unique reset errkey after using it, so that it wouldn't affect the next error message in the next statement
static int do_timer_create(clockid_t which_clock, struct sigevent *event, timer_t __user *created_timer_id) { const struct k_clock *kc = clockid_to_kclock(which_clock); struct k_itimer *new_timer; int error, new_timer_id; int it_id_set = IT_ID_NOT_SET; if (!kc) return -EINVAL; if (!kc->timer_create) re...
1
[ "CWE-190" ]
linux
78c9c4dfbf8c04883941445a195276bb4bb92c76
170,034,708,802,794,660,000,000,000,000,000,000,000
78
posix-timers: Sanitize overrun handling The posix timer overrun handling is broken because the forwarding functions can return a huge number of overruns which does not fit in an int. As a consequence timer_getoverrun(2) and siginfo::si_overrun can turn into random number generators. The k_clock::timer_forward() callb...
static int kwajd_error(struct mskwaj_decompressor *base) { struct mskwaj_decompressor_p *self = (struct mskwaj_decompressor_p *) base; return (self) ? self->error : MSPACK_ERR_ARGS; }
0
[ "CWE-310", "CWE-787" ]
libmspack
0b0ef9344255ff5acfac6b7af09198ac9c9756c8
201,482,073,482,381,300,000,000,000,000,000,000,000
5
kwaj_read_headers(): fix handling of non-terminated strings
PHP_FUNCTION(ldap_get_dn) { zval *link, *result_entry; ldap_linkdata *ld; ldap_resultentry *resultentry; char *text; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "rr", &link, &result_entry) != SUCCESS) { return; } ZEND_FETCH_RESOURCE(ld, ldap_linkdata *, &link, -1, "ldap link", le_link); ZEND_FETCH_...
0
[ "CWE-476" ]
php-src
49782c54994ecca2ef2a061063bd5a7079c43527
38,764,899,190,867,670,000,000,000,000,000,000,000
26
Fix bug #76248 - Malicious LDAP-Server Response causes Crash
add_opt_anc_info(OptAncInfo* to, int anc) { if (is_left_anchor(anc)) to->left_anchor |= anc; else to->right_anchor |= anc; }
0
[ "CWE-125" ]
php-src
c6e34d91b88638966662caac62c4d0e90538e317
255,887,378,744,033,800,000,000,000,000,000,000,000
7
Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node)
xmlSAXParseEntity(xmlSAXHandlerPtr sax, const char *filename) { xmlDocPtr ret; xmlParserCtxtPtr ctxt; ctxt = xmlCreateFileParserCtxt(filename); if (ctxt == NULL) { return(NULL); } if (sax != NULL) { if (ctxt->sax != NULL) xmlFree(ctxt->sax); ctxt->sax = sax; ctxt->userDat...
0
[ "CWE-125" ]
libxml2
77404b8b69bc122d12231807abf1a837d121b551
331,601,604,131,475,500,000,000,000,000,000,000,000
30
Make sure the parser returns when getting a Stop order patch backported from chromiun bug fixes, assuming author is Chris
g_file_new_for_commandline_arg (const char *arg) { g_return_val_if_fail (arg != NULL, NULL); return new_for_cmdline_arg (arg, NULL); }
0
[ "CWE-362" ]
glib
d8f8f4d637ce43f8699ba94c9b7648beda0ca174
107,813,819,448,387,900,000,000,000,000,000,000,000
6
gfile: Limit access to files when copying file_copy_fallback creates new files with default permissions and set the correct permissions after the operation is finished. This might cause that the files can be accessible by more users during the operation than expected. Use G_FILE_CREATE_PRIVATE for the new files to lim...
tm_diff (struct tm const *a, struct tm const *b) { /* Compute intervening leap days correctly even if year is negative. Take care to avoid int overflow in leap day calculations. */ int a4 = SHR (a->tm_year, 2) + SHR (TM_YEAR_BASE, 2) - ! (a->tm_year & 3); int b4 = SHR (b->tm_year, 2) + SHR (TM_YEAR_BASE, 2)...
0
[]
gnulib
94e01571507835ff59dd8ce2a0b56a4b566965a4
314,446,796,022,523,880,000,000,000,000,000,000,000
19
time_rz: fix heap buffer overflow vulnerability This issue has been assigned CVE-2017-7476 and was detected with American Fuzzy Lop 2.41b run on the coreutils date(1) program with ASAN enabled. ERROR: AddressSanitizer: heap-buffer-overflow on address 0x... WRITE of size 8 at 0x60d00000cff8 thread T0 #1 0x443020...
static void sig_channel_destroyed(IRC_CHANNEL_REC *channel) { g_return_if_fail(channel != NULL); if (IS_IRC_CHANNEL(channel)) query_remove_all(channel); }
0
[ "CWE-416" ]
irssi
43e44d553d44e313003cee87e6ea5e24d68b84a1
242,696,588,594,943,400,000,000,000,000,000,000,000
7
Merge branch 'security' into 'master' Security Closes GL#12, GL#13, GL#14, GL#15, GL#16 See merge request irssi/irssi!23
void yyerror(YYLTYPE *yylloc, void *scanner, struct yang_parameter *param, ...) { free(*param->value); *param->value = NULL; if (yylloc->first_line != -1) { if (*param->data_node && (*param->data_node) == (*param->actual_node)) { LOGVAL(param->module->ctx, LYE_INSTMT, LY_VLOG_LYS, *param->data_node, yyg...
0
[ "CWE-415" ]
libyang
88bd6c548ba79bce176cd875e9b56e7e0ef4d8d4
166,128,385,044,986,330,000,000,000,000,000,000,000
12
yang parser BUGFIX double free Fixes #739
cudnnConvolutionFwdAlgo_t ToConvForwardAlgo(dnn::AlgorithmDesc algorithm) { cudnnConvolutionFwdAlgo_t algo = cudnnConvolutionFwdAlgo_t(algorithm.algo_id()); switch (algo) { case CUDNN_CONVOLUTION_FWD_ALGO_IMPLICIT_GEMM: case CUDNN_CONVOLUTION_FWD_ALGO_IMPLICIT_PRECOMP_GEMM: case CUDNN_CONVOLUTION_...
0
[ "CWE-20" ]
tensorflow
14755416e364f17fb1870882fa778c7fec7f16e3
302,111,896,886,555,630,000,000,000,000,000,000,000
18
Prevent CHECK-fail in LSTM/GRU with zero-length input. PiperOrigin-RevId: 346239181 Change-Id: I5f233dbc076aab7bb4e31ba24f5abd4eaf99ea4f
inline std::pair<int, size_t> parse_octal_number(const char *s, size_t n, size_t i) { int ret = 0; int val; while (i < n && is_digit(s[i], val)) { ret = static_cast<int>(ret * 8 + val); i++; } return std::make_pair(ret, i); }
0
[ "CWE-125" ]
cpp-peglib
b3b29ce8f3acf3a32733d930105a17d7b0ba347e
284,205,455,863,705,070,000,000,000,000,000,000,000
10
Fix #122
static void __mcheck_cpu_init_vendor(struct cpuinfo_x86 *c) { switch (c->x86_vendor) { case X86_VENDOR_INTEL: mce_intel_feature_init(c); mce_adjust_timer = cmci_intel_adjust_timer; break; case X86_VENDOR_AMD: { mce_amd_feature_init(c); break; } default: break; } }
0
[ "CWE-362" ]
linux
b3b7c4795ccab5be71f080774c45bbbcc75c2aaf
81,079,782,587,642,660,000,000,000,000,000,000,000
17
x86/MCE: Serialize sysfs changes The check_interval file in /sys/devices/system/machinecheck/machinecheck<cpu number> directory is a global timer value for MCE polling. If it is changed by one CPU, mce_restart() broadcasts the event to other CPUs to delete and restart the MCE polling timer and __mcheck_cpu_init_ti...
ATSimpleRecursion(List **wqueue, Relation rel, AlterTableCmd *cmd, bool recurse, LOCKMODE lockmode) { /* * Propagate to children if desired. Non-table relations never have * children, so no need to search in that case. */ if (recurse && rel->rd_rel->relkind == RELKIND_RELATION) { Oid relid = Relatio...
0
[ "CWE-362" ]
postgres
5f173040e324f6c2eebb90d86cf1b0cdb5890f0a
20,753,998,197,329,077,000,000,000,000,000,000,000
35
Avoid repeated name lookups during table and index DDL. If the name lookups come to different conclusions due to concurrent activity, we might perform some parts of the DDL on a different table than other parts. At least in the case of CREATE INDEX, this can be used to cause the permissions checks to be performed aga...
static ssize_t cgroup_file_write(struct kernfs_open_file *of, char *buf, size_t nbytes, loff_t off) { struct cgroup_file_ctx *ctx = of->priv; struct cgroup *cgrp = of->kn->parent->priv; struct cftype *cft = of_cft(of); struct cgroup_subsys_state *css; int ret; if (!nbytes) return 0; /* * If namespaces...
0
[ "CWE-416" ]
linux
a06247c6804f1a7c86a2e5398a4c1f1db1471848
160,521,236,069,143,180,000,000,000,000,000,000,000
52
psi: Fix uaf issue when psi trigger is destroyed while being polled With write operation on psi files replacing old trigger with a new one, the lifetime of its waitqueue is totally arbitrary. Overwriting an existing trigger causes its waitqueue to be freed and pending poll() will stumble on trigger->event_wait which w...
pdf14_put_image(gx_device * dev, gs_gstate * pgs, gx_device * target) { const pdf14_device * pdev = (pdf14_device *)dev; int code; gs_image1_t image; gx_image_enum_common_t *info; pdf14_buf *buf = pdev->ctx->stack; gs_int_rect rect = buf->rect; int y; int num_comp = buf->n_chan - 1; ...
0
[]
ghostpdl
ea1b3ef437f39e45874f821c06bd953196625ac5
26,496,368,894,880,955,000,000,000,000,000,000,000
246
Bug 700176: Use the actual output device for both devices in setdevice Also fixes bug 700189. The pdf14 compositor device, despite being a forwarding device, does not forward all spec_ops to it's target, only a select few are special cased for that. gxdso_current_output_device needs to be included in those special ca...
ping_device (u2fh_devs * devs, unsigned index) { unsigned char data[1] = { 0 }; unsigned char resp[1024]; size_t resplen = sizeof (resp); return u2fh_sendrecv (devs, index, U2FHID_PING, data, sizeof (data), resp, &resplen); }
0
[ "CWE-119", "CWE-908", "CWE-22" ]
libu2f-host
e4bb58cc8b6202a421e65f8230217d8ae6e16eb5
295,604,368,079,615,800,000,000,000,000,000,000,000
8
fix filling out of initresp
static void tg3_ints_fini(struct tg3 *tp) { if (tg3_flag(tp, USING_MSIX)) pci_disable_msix(tp->pdev); else if (tg3_flag(tp, USING_MSI)) pci_disable_msi(tp->pdev); tg3_flag_clear(tp, USING_MSI); tg3_flag_clear(tp, USING_MSIX); tg3_flag_clear(tp, ENABLE_RSS); tg3_flag_clear(tp, ENABLE_TSS); }
0
[ "CWE-476", "CWE-119" ]
linux
715230a44310a8cf66fbfb5a46f9a62a9b2de424
138,005,110,612,289,930,000,000,000,000,000,000,000
11
tg3: fix length overflow in VPD firmware parsing Commit 184b89044fb6e2a74611dafa69b1dce0d98612c6 ("tg3: Use VPD fw version when present") introduced VPD parsing that contained a potential length overflow. Limit the hardware's reported firmware string length (max 255 bytes) to stay inside the driver's firmware string ...
static int ZEND_FASTCALL ZEND_IS_SMALLER_OR_EQUAL_SPEC_VAR_CONST_HANDLER(ZEND_OPCODE_HANDLER_ARGS) { zend_op *opline = EX(opline); zend_free_op free_op1; zval *result = &EX_T(opline->result.u.var).tmp_var; compare_function(result, _get_zval_ptr_var(&opline->op1, EX(Ts), &free_op1 TSRMLS_CC), &opline->op2.u.co...
0
[]
php-src
ce96fd6b0761d98353761bf78d5bfb55291179fd
300,563,995,676,734,100,000,000,000,000,000,000,000
14
- fix #39863, do not accept paths with NULL in them. See http://news.php.net/php.internals/50191, trunk will have the patch later (adding a macro and/or changing (some) APIs. Patch by Rasmus
static int coolkey_detect_card(sc_pkcs15_card_t *p15card) { sc_card_t *card = p15card->card; SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_VERBOSE); if (card->type < SC_CARD_TYPE_COOLKEY_GENERIC || card->type >= SC_CARD_TYPE_COOLKEY_GENERIC+1000) return SC_ERROR_INVALID_CARD; return SC_SUCCESS; }
0
[]
OpenSC
7114fb71b54ddfe06ce5dfdab013f4c38f129d14
96,523,522,674,226,790,000,000,000,000,000,000,000
10
coolkey: Initialize potentially uninitialized memory Thanks oss-fuzz https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28855
SYSCALL_DEFINE4(reboot, int, magic1, int, magic2, unsigned int, cmd, void __user *, arg) { char buffer[256]; int ret = 0; /* We only trust the superuser with rebooting the system. */ if (!capable(CAP_SYS_BOOT)) return -EPERM; /* For safety, we require "magic" arguments. */ if (magic1 != LINUX_REBOOT_MAGIC1 ...
0
[ "CWE-264" ]
linux
259e5e6c75a910f3b5e656151dc602f53f9d7548
290,519,654,442,179,800,000,000,000,000,000,000,000
86
Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs With this change, calling prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) disables privilege granting operations at execve-time. For example, a process will not be able to execute a setuid binary to change their uid or gid if this bit is set. The same is t...
static int btrfs_real_readdir(struct file *filp, void *dirent, filldir_t filldir) { struct inode *inode = filp->f_dentry->d_inode; struct btrfs_root *root = BTRFS_I(inode)->root; struct btrfs_item *item; struct btrfs_dir_item *di; struct btrfs_key key; struct btrfs_key found_key; struct btrfs_path *path...
0
[ "CWE-310" ]
linux-2.6
9c52057c698fb96f8f07e7a4bcf4801a092bda89
197,870,515,457,300,600,000,000,000,000,000,000,000
182
Btrfs: fix hash overflow handling The handling for directory crc hash overflows was fairly obscure, split_leaf returns EOVERFLOW when we try to extend the item and that is supposed to bubble up to userland. For a while it did so, but along the way we added better handling of errors and forced the FS readonly if we hi...
TEST_F(PlaintextRecordTest, TestReadAlert) { addToQueue("15030100050123456789"); auto msg = read_.read(queue_); EXPECT_EQ(msg->type, ContentType::alert); expectSame(msg->fragment, "0123456789"); EXPECT_TRUE(queue_.empty()); }
0
[ "CWE-119", "CWE-835", "CWE-787" ]
fizz
40bbb161e72fb609608d53b9d64c56bb961a6ee2
233,209,921,277,092,670,000,000,000,000,000,000,000
7
Avoid arithmetic operation on uint16 read from the wire. Summary: This could overflow previously. CVE-2019-3560 Reviewed By: yfeldblum Differential Revision: D14152362 fbshipit-source-id: c0ebb3fc59b49c7c23e6bcb90458c19cd891be65
PackLinuxElf64::PackLinuxElf64(InputFile *f) : super(f), phdri(NULL), shdri(NULL), gnu_stack(NULL), note_body(NULL), page_mask(~0ull<<lg2_page), dynseg(NULL), hashtab(NULL), gashtab(NULL), dynsym(NULL), jni_onload_sym(NULL), shstrtab(NULL), sec_strndx(NULL), sec_dynsym(NULL), sec_dynstr(NULL...
0
[ "CWE-415" ]
upx
d9288213ec156dffc435566b9d393d23e87c6914
172,681,394,098,779,550,000,000,000,000,000,000,000
15
More checking of PT_DYNAMIC and its contents. https://github.com/upx/upx/issues/206 modified: p_lx_elf.cpp
static void virtio_net_instance_init(Object *obj) { VirtIONet *n = VIRTIO_NET(obj); /* * The default config_size is sizeof(struct virtio_net_config). * Can be overriden with virtio_net_set_config_size. */ n->config_size = sizeof(struct virtio_net_config); }
0
[ "CWE-119" ]
qemu
98f93ddd84800f207889491e0b5d851386b459cf
324,167,119,212,765,170,000,000,000,000,000,000,000
10
virtio-net: out-of-bounds buffer write on load CVE-2013-4149 QEMU 1.3.0 out-of-bounds buffer write in virtio_net_load()@hw/net/virtio-net.c > } else if (n->mac_table.in_use) { > uint8_t *buf = g_malloc0(n->mac_table.in_use); We are allocating buffer of size n->mac_table.in_use > qemu...
const Http::RequestHeaderMap& headers() { return *headers_; }
0
[ "CWE-400" ]
envoy
dfddb529e914d794ac552e906b13d71233609bf7
285,404,608,214,247,800,000,000,000,000,000,000,000
1
listener: Add configurable accepted connection limits (#153) Add support for per-listener limits on accepted connections. Signed-off-by: Tony Allen <tony@allen.gg>
static void vmxnet3_instance_init(Object *obj) { VMXNET3State *s = VMXNET3(obj); device_add_bootindex_property(obj, &s->conf.bootindex, "bootindex", "/ethernet-phy@0", DEVICE(obj), NULL); }
0
[ "CWE-20" ]
qemu
a7278b36fcab9af469563bd7b9dadebe2ae25e48
112,783,048,376,296,210,000,000,000,000,000,000,000
7
net/vmxnet3: Refine l2 header validation Validation of l2 header length assumed minimal packet size as eth_header + 2 * vlan_header regardless of the actual protocol. This caused crash for valid non-IP packets shorter than 22 bytes, as 'tx_pkt->packet_type' hasn't been assigned for such packets, and 'vmxnet3_on_tx_do...
static OPJ_BOOL opj_jp2_setup_header_writing(opj_jp2_t *jp2, opj_event_mgr_t * p_manager) { /* preconditions */ assert(jp2 != 00); assert(p_manager != 00); if (! opj_procedure_list_add_procedure(jp2->m_procedure_list, (opj_procedure)opj_jp2_write_jp, p...
0
[ "CWE-20" ]
openjpeg
4edb8c83374f52cd6a8f2c7c875e8ffacccb5fa5
43,004,033,512,718,430,000,000,000,000,000,000,000
34
Add support for generation of PLT markers in encoder * -PLT switch added to opj_compress * Add a opj_encoder_set_extra_options() function that accepts a PLT=YES option, and could be expanded later for other uses. ------- Testing with a Sentinel2 10m band, T36JTT_20160914T074612_B02.jp2, coming from S2A_MSIL1C_20...
static void index_entry_reuc_free(git_index_reuc_entry *reuc) { git__free(reuc); }
0
[ "CWE-415", "CWE-190" ]
libgit2
3db1af1f370295ad5355b8f64b865a2a357bcac0
211,763,489,781,515,280,000,000,000,000,000,000,000
4
index: error out on unreasonable prefix-compressed path lengths When computing the complete path length from the encoded prefix-compressed path, we end up just allocating the complete path without ever checking what the encoded path length actually is. This can easily lead to a denial of service by just encoding an un...
HWB_Diff (int r1, int g1, int b1, int r2, int g2, int b2) { RGBType RGB1, RGB2; HWBType HWB1, HWB2; float diff; SETUP_RGB (RGB1, r1, g1, b1); SETUP_RGB (RGB2, r2, g2, b2); RGB_to_HWB (RGB1, &HWB1); RGB_to_HWB (RGB2, &HWB2); /* * I made this bit up; it seems to produce OK results, and it is certain...
0
[ "CWE-190" ]
libgd
cfee163a5e848fc3e3fb1d05a30d7557cdd36457
23,879,155,802,483,310,000,000,000,000,000,000,000
37
- #18, Removed invalid gdFree call when overflow2 fails - #17, Free im->pixels as well on error
static void esp_fifo_push(ESPState *s, uint8_t val) { if (fifo8_num_used(&s->fifo) == ESP_FIFO_SZ) { trace_esp_error_fifo_overrun(); return; } fifo8_push(&s->fifo, val); }
1
[ "CWE-476" ]
qemu
e5455b8c1c6170c788f3c0fd577cc3be53539a99
161,878,997,658,954,170,000,000,000,000,000,000,000
9
esp: consolidate esp_cmdfifo_push() into esp_fifo_push() Each FIFO currently has its own push functions with the only difference being the capacity check. The original reason for this was that the fifo8 implementation doesn't have a formal API for retrieving the FIFO capacity, however there are multiple examples withi...