project
string
commit_id
string
target
int64
func
string
cwe
string
big_vul_idx
string
idx
int64
hash
string
size
float64
message
string
dataset
string
server
9e39d0ae44595dbd1570805d97c9c874778a6be8
1
void ha_maria::drop_table(const char *name) { DBUG_ASSERT(file->s->temporary); (void) ha_close(); (void) maria_delete_table_files(name, 1, MY_WME); }
CWE-400
null
216,906
295943262298198796313787629901594498584
6
MDEV-25787 Bug report: crash on SELECT DISTINCT thousands_blob_fields fix a debug assert to account for not opened temp tables
other
server
b3c3291f0b7c1623cb20663f7cf31b7f749768bc
1
bool open_table(THD *thd, TABLE_LIST *table_list, Open_table_context *ot_ctx) { TABLE *table; const char *key; uint key_length; const char *alias= table_list->alias.str; uint flags= ot_ctx->get_flags(); MDL_ticket *mdl_ticket; TABLE_SHARE *share; uint gts_flags; bool from_share= false; #ifdef WITH_PAR...
CWE-416
null
216,938
182517812383076277954919868268872014094
476
MDEV-24176 fixup: GCC -Wmaybe-uninitialized
other
server
5ba77222e9fe7af8ff403816b5338b18b342053c
1
Field *create_tmp_field_from_field(THD *thd, Field *org_field, const char *name, TABLE *table, Item_field *item) { Field *new_field; new_field= org_field->make_new_field(thd->mem_root, table, table == org_f...
CWE-89
null
216,949
164261972443783551951315550437760179257
32
MDEV-21028 Server crashes in Query_arena::set_query_arena upon SELECT from view if the view has algorithm=temptable it is not updatable, so DEFAULT() for its fields is meaningless, and thus it's NULL or 0/'' for NOT NULL columns.
other
server
ecb6f9c894d3ebafeff1c6eb3b65cd248062296f
1
multi_update::initialize_tables(JOIN *join) { TABLE_LIST *table_ref; DBUG_ENTER("initialize_tables"); if (unlikely((thd->variables.option_bits & OPTION_SAFE_UPDATES) && error_if_full_join(join))) DBUG_RETURN(1); main_table=join->join_tab->table; table_to_update= 0; /* Any update has at ...
CWE-617
null
216,965
322966484405015890266186752836981150795
146
MDEV-28095 crash in multi-update and implicit grouping disallow implicit grouping in multi-update. explicit GROUP BY is not allowed by the grammar.
other
monit
328f60773057641c4b2075fab9820145e95b728c
1
static void do_viewlog(HttpRequest req, HttpResponse res) { if (is_readonly(req)) { send_error(req, res, SC_FORBIDDEN, "You do not have sufficient privileges to access this page"); return; } do_head(res, "_viewlog", "View log", 100); if ((Run.flags & Run_L...
CWE-79
null
217,176
44007244262753941920243993940600065355
null
null
other
gpac
ad18ece95fa064efc0995c4ab2c985f77fb166ec
0
GF_Err gf_isom_rtp_packet_begin(GF_ISOFile *the_file, u32 trackNumber, s32 relativeTime, u8 PackingBit, u8 eXtensionBit, u8 MarkerBit, u8 PayloadType, ...
null
null
219,901
135210532758408519809735309262837501503
35
fixed #1904
other
glewlwyd
125281f1c0d4b6a8b49f7e55a757205a2ef01fbe
0
int callback_glewlwyd_delete_scope (const struct _u_request * request, struct _u_response * response, void * user_data) { struct config_elements * config = (struct config_elements *)user_data; json_t * j_search_scope; j_search_scope = get_scope(config, u_map_get(request->map_url, "scope")); if (check_result_...
null
null
219,991
21879157829563128577889659573080658049
21
Fix update session when auth fail
other
pcre2
d4fa336fbcc388f89095b184ba6d99422cfc676c
0
static SLJIT_INLINE void compile_ref_iterator_backtrackingpath(compiler_common *common, struct backtrack_common *current) { DEFINE_COMPILER; PCRE2_SPTR cc = current->cc; BOOL ref = (*cc == OP_REF || *cc == OP_REFI); PCRE2_UCHAR type; type = cc[ref ? 1 + IMM2_SIZE : 1 + 2 * IMM2_SIZE]; if ((type & 0x1) == 0) { /* ...
null
null
223,373
288436804787057463427568100308425798209
24
Fix incorrect value reading in JIT.
other
pcre2
d4fa336fbcc388f89095b184ba6d99422cfc676c
0
static BOOL check_opcode_types(compiler_common *common, PCRE2_SPTR cc, PCRE2_SPTR ccend) { int count; PCRE2_SPTR slot; PCRE2_SPTR assert_back_end = cc - 1; PCRE2_SPTR assert_na_end = cc - 1; /* Calculate important variables (like stack size) and checks whether all opcodes are supported. */ while (cc < ccend) { swi...
null
null
223,433
104144699881640659915549001222013190335
160
Fix incorrect value reading in JIT.
other
tensorflow
08d7b00c0a5a20926363849f611729f53f3ec022
0
Status Pool3DShape(shape_inference::InferenceContext* c) { ShapeHandle input_shape; TF_RETURN_IF_ERROR(c->WithRank(c->input(0), 5, &input_shape)); string data_format; Status s = c->GetAttr("data_format", &data_format); std::vector<int32> strides; TF_RETURN_IF_ERROR(c->GetAttr("strides", &strides)); if (...
null
null
224,560
304736669889278191184353852888637820897
81
Fix Segfault in Concat V2 shape function. PiperOrigin-RevId: 412120654 Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be
other
tensorflow
08d7b00c0a5a20926363849f611729f53f3ec022
0
Status MaxPoolShape(shape_inference::InferenceContext* c) { return MaxPoolShapeImpl(c, /*supports_explicit_padding=*/false); }
null
null
224,592
30835260043464724133923419352917564078
3
Fix Segfault in Concat V2 shape function. PiperOrigin-RevId: 412120654 Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be
other
v4l2loopback
e4cd225557486c420f6a34411f98c575effd43dd
0
static int v4l2loopback_lookup_cb(int id, void *ptr, void *data) { struct v4l2_loopback_device *device = ptr; struct v4l2loopback_lookup_cb_data *cbdata = data; if (cbdata && device && device->vdev) { if (device->vdev->num == cbdata->device_nr) { cbdata->device = device; cbdata->device_nr = id; return 1; ...
null
null
225,397
36502877497827830444652809109457004050
13
add explicit format specifier to printf() invocations CWE-134
other
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
0
void mfra_box_del(GF_Box *s) { GF_MovieFragmentRandomAccessBox *ptr = (GF_MovieFragmentRandomAccessBox *)s; if (ptr == NULL) return; gf_list_del(ptr->tfra_list); gf_free(ptr); }
null
null
225,645
166982083698724780356123058557769692020
7
fixed #2092
other
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
0
GF_Box *chnl_box_new() { ISOM_DECL_BOX_ALLOC(GF_ChannelLayoutBox, GF_ISOM_BOX_TYPE_CHNL); return (GF_Box *)tmp;
null
null
225,676
186095885763030695620676670739985269725
5
fixed #2092
other
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
0
GF_Err moof_box_size(GF_Box *s) { u32 pos=0; GF_MovieFragmentBox *ptr = (GF_MovieFragmentBox *) s; if (!s) return GF_BAD_PARAM; //Header First gf_isom_check_position(s, (GF_Box *)ptr->mfhd, &pos); //then PSSH gf_isom_check_position_list(s, ptr->PSSHs, &pos); //then the track list gf_isom_check_position_list(s,...
null
null
225,775
170536732827198318297117963545294843728
13
fixed #2092
other
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
0
GF_Err fdsa_on_child_box(GF_Box *s, GF_Box *a, Bool is_rem) { GF_HintSample *ptr = (GF_HintSample *)s; switch(a->type) { case GF_ISOM_BOX_TYPE_FDPA: BOX_FIELD_LIST_ASSIGN(packetTable) return GF_OK; case GF_ISOM_BOX_TYPE_EXTR: BOX_FIELD_ASSIGN(extra_data, GF_ExtraDataBox) break; } return GF_OK;
null
null
225,915
16231677898973218848028614039180259892
13
fixed #2092
other
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
0
GF_Err dmlp_box_write(GF_Box *s, GF_BitStream *bs) { GF_Err e; GF_TrueHDConfigBox *ptr = (GF_TrueHDConfigBox *)s; e = gf_isom_box_write_header(s, bs); if (e) return e; gf_bs_write_u32(bs, ptr->format_info); gf_bs_write_int(bs, ptr->peak_data_rate, 15); gf_bs_write_int(bs, 0, 1); gf_bs_write_u32(bs, 0); retur...
null
null
225,955
308675745644893964270987579311863228889
13
fixed #2092
other
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
0
GF_Err trep_box_read(GF_Box *s, GF_BitStream *bs) { GF_TrackExtensionPropertiesBox *ptr = (GF_TrackExtensionPropertiesBox *)s; ISOM_DECREASE_SIZE(ptr, 4); ptr->trackID = gf_bs_read_u32(bs); return gf_isom_box_array_read(s, bs);
null
null
225,964
258224393003018232474259052067579314663
9
fixed #2092
other
gpac
64a2e1b799352ac7d7aad1989bc06e7b0f2b01db
0
GF_Err uuid_box_read(GF_Box *s, GF_BitStream *bs) { u32 bytesToRead; GF_UnknownUUIDBox *ptr = (GF_UnknownUUIDBox *)s; if (ptr->size > 0xFFFFFFFF) return GF_ISOM_INVALID_FILE; bytesToRead = (u32) (ptr->size); if (bytesToRead) { ptr->data = (char*)gf_malloc(bytesToRead); if (ptr->data == NULL ) return GF_OUT_OF...
null
null
226,254
207621800233513202130834349487536635483
15
fixed #2092
other
tensorflow
a5b89cd68c02329d793356bda85d079e9e69b4e7
0
Status VerifyWrappableInCallOp(const OpDef& opdef, EagerOperation* op) { absl::flat_hash_set<string> opdef_attrs; for (const auto& attr : opdef.attr()) { opdef_attrs.insert(attr.name()); } const auto& node_def = op->MutableAttrs()->BuildNodeDef(); for (const auto& attr : node_def.attr()) { if (opdef_a...
null
null
229,323
266764428931017137644739313304821897063
14
Fix empty resource handle vulnerability. Some ops that attempt to extract a resource handle from user input can lead to nullptr dereferences. This returns an error in such a case. PiperOrigin-RevId: 445571938
other
gpac
37592ad86c6ca934d34740012213e467acc4a3b0
0
GF_EXPORT u32 gf_isom_get_supported_box_type(u32 idx) { return box_registry[idx].box_4cc;
null
null
232,326
51306403104286674450982607568575956051
4
fixed #2163
other
pjproject
9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
0
static pj_status_t get_name_len(int rec_counter, const pj_uint8_t *pkt, const pj_uint8_t *start, const pj_uint8_t *max, int *parsed_len, int *name_len) { const pj_uint8_t *p; pj_status_t status; /* Limit the number of recursion */ if (rec_counter > 10) { /* Too many name recursion */ return...
null
null
235,641
304724818714881251816694868849317017205
67
Merge pull request from GHSA-p6g5-v97c-w5q4 * Prevent heap buffer overflow when parsing DNS packets * Make sure packet parsing doesn't advance beyond max/end * Update checks * Remove check Co-authored-by: sauwming <ming@teluu.com>
other
lsquic
a74702c630e108125e71898398737baec8f02238
0
lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size, unsigned dyn_table_size, unsigned max_risked_streams, int server) { enum lsqpack_enc_opts enc_opts; assert(qeh->qeh_flags & QEH_INITIALIZED); if (qeh->qeh_flags & QEH_HAVE_SETTINGS) { LSQ_WARN("settings alrea...
null
null
237,885
325482743200506242883264217964767124086
35
Release 3.1.0
other
linux
64620e0a1e712a778095bd35cbb277dc2259281f
0
static struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env, int insn_idx, int prev_insn_idx, bool speculative) { struct bpf_verifier_state *cur = env->cur_state; struct bpf_verifier_stack_elem *elem; int err; elem = kzalloc(sizeof(struct bpf_verifier_stack_elem), GFP_KERNEL); if...
null
null
238,457
173869822630090312186700757827861033657
47
bpf: Fix out of bounds access for ringbuf helpers Both bpf_ringbuf_submit() and bpf_ringbuf_discard() have ARG_PTR_TO_ALLOC_MEM in their bpf_func_proto definition as their first argument. They both expect the result from a prior bpf_ringbuf_reserve() call which has a return type of RET_PTR_TO_ALLOC_MEM_OR_NULL. Meani...
other
linux
64620e0a1e712a778095bd35cbb277dc2259281f
0
struct btf *bpf_get_btf_vmlinux(void) { if (!btf_vmlinux && IS_ENABLED(CONFIG_DEBUG_INFO_BTF)) { mutex_lock(&bpf_verifier_lock); if (!btf_vmlinux) btf_vmlinux = btf_parse_vmlinux(); mutex_unlock(&bpf_verifier_lock); } return btf_vmlinux; }
null
null
238,482
234269330592057921775920421239627309464
10
bpf: Fix out of bounds access for ringbuf helpers Both bpf_ringbuf_submit() and bpf_ringbuf_discard() have ARG_PTR_TO_ALLOC_MEM in their bpf_func_proto definition as their first argument. They both expect the result from a prior bpf_ringbuf_reserve() call which has a return type of RET_PTR_TO_ALLOC_MEM_OR_NULL. Meani...
other
vim
44db8213d38c39877d2148eff6a72f4beccfb94e
0
free_yank(long n) { if (y_current->y_array != NULL) { long i; for (i = n; --i >= 0; ) vim_free(y_current->y_array[i]); VIM_CLEAR(y_current->y_array); } }
null
null
240,265
78294369507246526050725916519240901596
11
patch 8.2.4219: reading before the start of the line Problem: Reading before the start of the line. Solution: Check boundary before trying to read the character.
other
gpac
77510778516803b7f7402d7423c6d6bef50254c3
0
GF_Box *tfdt_box_new() { ISOM_DECL_BOX_ALLOC(GF_TFBaseMediaDecodeTimeBox, GF_ISOM_BOX_TYPE_TFDT); return (GF_Box *)tmp; }
null
null
244,352
327319138272772957392040715484687607045
5
fixed #2255
other
gpac
b43f9d1a4b4e33d08edaef6d313e6ce4bdf554d3
0
static s32 naludmx_parse_nal_avc(GF_NALUDmxCtx *ctx, char *data, u32 size, u32 nal_type, Bool *skip_nal, Bool *is_slice, Bool *is_islice) { s32 ps_idx = 0; s32 res = 0; if (!size) return -1; gf_bs_reassign_buffer(ctx->bs_r, data, size); *skip_nal = GF_FALSE; res = gf_avc_parse_nalu(ctx->bs_r, ctx->avc_state); i...
null
null
246,661
285879938566855088663728116790540514120
176
fixed #2223
other
envoy
e9f936d85dc1edc34fabd0a1725ec180f2316353
0
TestUtilOptions(const std::string& client_ctx_yaml, const std::string& server_ctx_yaml, bool expect_success, Network::Address::IpVersion version) : TestUtilOptionsBase(expect_success, version), client_ctx_yaml_(client_ctx_yaml), server_ctx_yaml_(server_ctx_yaml), expect_no_cert_(false)...
null
null
247,628
234130020991233082719629057316482677014
12
CVE-2022-21654 tls allows re-use when some cert validation settings have changed Signed-off-by: Yan Avlasov <yavlasov@google.com>
other
libconfuse
d73777c2c3566fb2647727bb56d9a2295b81669b
0
DLLIMPORT signed long cfg_getnint(cfg_t *cfg, const char *name, unsigned int index) { return cfg_opt_getnint(cfg_getopt(cfg, name), index); }
null
null
248,280
308027921853121269984384081000598713054
4
Fix #163: unterminated username used with getpwnam() Signed-off-by: Joachim Wiberg <troglobit@gmail.com>
other
gpac
dae9900580a8888969481cd72035408091edb11b
0
static GF_Err WriteInterleaved(MovieWriter *mw, GF_BitStream *bs, Bool drift_inter) { GF_Err e; u32 i; s32 moov_meta_pos=-1; GF_Box *a, *cprt_box=NULL; u64 firstSize, finalSize, offset, finalOffset; GF_List *writers = gf_list_new(); GF_ISOFile *movie = mw->movie; //first setup the writers e = SetupWriters(mw,...
null
null
249,983
307394486074364590508342463208104042512
132
fixed #1659
other
tinyexr
a685e3332f61cd4e59324bf3f669d36973d64270
0
static void bitmapFromData(const unsigned short data[/*nData*/], int nData, unsigned char bitmap[BITMAP_SIZE], unsigned short &minNonZero, unsigned short &maxNonZero) { for (int i = 0; i < BITMAP_SIZE; ++i) bitmap[i] = 0; for (int i =...
null
null
252,293
66767018618529288295644787485579012879
21
Make line_no with too large value(2**20) invalid. Fixes #124
other
tinyexr
a685e3332f61cd4e59324bf3f669d36973d64270
0
mz_bool mz_zip_reader_file_stat(mz_zip_archive *pZip, mz_uint file_index, mz_zip_archive_file_stat *pStat) { mz_uint n; const mz_uint8 *p = mz_zip_reader_get_cdh(pZip, file_index); if ((!p) || (!pStat)) return MZ_FALSE; // Unpack the central directory record. pStat->m_file_ind...
null
null
252,384
172031456147728808119195234287572319435
44
Make line_no with too large value(2**20) invalid. Fixes #124
other
linux
d6f5e358452479fa8a773b5c6ccc9e4ec5a20880
0
crypt_message(struct TCP_Server_Info *server, int num_rqst, struct smb_rqst *rqst, int enc) { struct smb2_transform_hdr *tr_hdr = (struct smb2_transform_hdr *)rqst[0].rq_iov[0].iov_base; unsigned int assoc_data_len = sizeof(struct smb2_transform_hdr) - 20; int rc = 0; struct scatterlist *sg; u8 sign[SMB2_...
null
null
253,580
186046911004554397138179611634707323797
103
cifs: fix NULL ptr dereference in smb2_ioctl_query_info() When calling smb2_ioctl_query_info() with invalid smb_query_info::flags, a NULL ptr dereference is triggered when trying to kfree() uninitialised rqst[n].rq_iov array. This also fixes leaked paths that are created in SMB2_open_init() which required SMB2_open_f...
other
v4l2loopback
64a216af4c09c9ba9326057d7e78994271827eff
0
static ssize_t attr_show_buffers(struct device *cd, struct device_attribute *attr, char *buf) { struct v4l2_loopback_device *dev = v4l2loopback_cd2dev(cd); return sprintf(buf, "%d\n", dev->used_buffers); }
null
null
254,034
302510839924811667823050305726390461566
7
add explicit format specifier to printf() invocations CWE-134
other
v4l2loopback
64a216af4c09c9ba9326057d7e78994271827eff
0
static void check_timers(struct v4l2_loopback_device *dev) { if (!dev->ready_for_capture) return; if (dev->timeout_jiffies > 0 && !timer_pending(&dev->timeout_timer)) mod_timer(&dev->timeout_timer, jiffies + dev->timeout_jiffies); if (dev->sustain_framerate && !timer_pending(&dev->sustain_timer)) mod_timer(&d...
null
null
254,039
258213869169538679594764324325310375204
10
add explicit format specifier to printf() invocations CWE-134
other
lighttpd1.4
971773f1fae600074b46ef64f3ca1f76c227985f
0
static void wstunnel_handler_ctx_free(void *gwhctx) { handler_ctx *hctx = (handler_ctx *)gwhctx; chunk_buffer_release(hctx->frame.payload); }
null
null
257,685
326260538769215832414829214874738730090
4
[mod_wstunnel] fix crash with bad hybivers (fixes #3165) (thx Michał Dardas) x-ref: "mod_wstunnel null pointer dereference" https://redmine.lighttpd.net/issues/3165
other
lighttpd1.4
971773f1fae600074b46ef64f3ca1f76c227985f
0
static int get_key_number(uint32_t *ret, const buffer *b) { const char * const s = b->ptr; size_t j = 0; unsigned long n; uint32_t sp = 0; char tmp[10 + 1]; /* #define UINT32_MAX_STRLEN 10 */ for (size_t i = 0, used = buffer_clen(b); i < used; ++i) { if (light_isdigit(s[i])) { ...
null
null
257,688
326082521741250107155386054424849194304
20
[mod_wstunnel] fix crash with bad hybivers (fixes #3165) (thx Michał Dardas) x-ref: "mod_wstunnel null pointer dereference" https://redmine.lighttpd.net/issues/3165
other
njs
eafe4c7a326b163612f10861392622b5da5b1792
0
njs_array_iterator_prototype_next(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, njs_index_t tag) { njs_int_t ret; njs_bool_t check; njs_value_t *this; njs_object_t *object; njs_object_prop_t *prop_value, *prop_done; this = njs_argument(args, 0); chec...
null
null
262,726
120148118506687339042254072251119100086
56
Fixed Array.prototype.lastIndexOf() with unicode string as "this". Previously, when lastIndexOf() was called with unicode string as "this" argument and a negative "fromIndex" argument null-pointer dererence might occur because njs_string_offset() was called with invalid index value whereas njs_string_offset() should a...
other
linux
99c23da0eed4fd20cae8243f2b51e10e66aa0951
0
static void sco_sock_set_timer(struct sock *sk, long timeout) { if (!sco_pi(sk)->conn) return; BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout); cancel_delayed_work(&sco_pi(sk)->conn->timeout_work); schedule_delayed_work(&sco_pi(sk)->conn->timeout_work, timeout); }
null
null
263,506
209388870755621065800599141288357787719
9
Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg() The sco_send_frame() also takes lock_sock() during memcpy_from_msg() call that may be endlessly blocked by a task with userfaultd technique, and this will result in a hung task watchdog trigger. Just like the similar fix for hci_sock_sendmsg() in commit 92...
other
tensorflow
eb921122119a6b6e470ee98b89e65d721663179d
0
TfLiteStatus Gather(TfLiteContext* context, const TfLiteGatherParams& params, const TfLiteTensor* input, const TfLiteTensor* positions, TfLiteTensor* output) { const PositionsT* indexes = GetTensorData<PositionsT>(positions); bool indices_has_only_positive_elements = true; ...
null
null
265,432
201071679938864636818163736764619902183
23
Prevent heap OOB read in TFLite's `gather.cc`. Passing negative indices is illegal but there was a missing check so that resulted in OOB accesses. PiperOrigin-RevId: 387231300 Change-Id: I3111b54b2f232638d795be17efc46abe4ede6bf8
other
radare2
193f4fe01d7f626e2ea937450f2e0c4604420e9d
0
R_IPI bool r_bin_file_set_obj(RBin *bin, RBinFile *bf, RBinObject *obj) { r_return_val_if_fail (bin && bf, false); bin->file = bf->file; bin->cur = bf; bin->narch = bf->narch; if (obj) { bf->o = obj; } else { obj = bf->o; } RBinPlugin *plugin = r_bin_file_cur_plugin (bf); if (bin->minstrlen < 1) { bin->m...
null
null
267,953
11109708838971955092594178821129064135
24
Fix integer overflow in string search causing oobread ##crash * Reported by @greatergoodest via huntrdev * BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04 * Reproducer bfileovf
other
radare2
193f4fe01d7f626e2ea937450f2e0c4604420e9d
0
static RBinPlugin *get_plugin_from_buffer(RBin *bin, RBinFile *bf, const char *pluginname, RBuffer *buf) { RBinPlugin *plugin = bin->force? r_bin_get_binplugin_by_name (bin, bin->force): NULL; if (plugin) { return plugin; } plugin = pluginname? r_bin_get_binplugin_by_name (bin, pluginname): NULL; if (plugin) { ...
null
null
267,956
215812811139165702455696047759219823417
15
Fix integer overflow in string search causing oobread ##crash * Reported by @greatergoodest via huntrdev * BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04 * Reproducer bfileovf
other
radare2
193f4fe01d7f626e2ea937450f2e0c4604420e9d
0
R_API RBinFile *r_bin_file_find_by_fd(RBin *bin, ut32 bin_fd) { RListIter *iter; RBinFile *bf; r_return_val_if_fail (bin, NULL); r_list_foreach (bin->binfiles, iter, bf) { if (bf->fd == bin_fd) { return bf; } } return NULL; }
null
null
267,963
35348010251906534441404139902219682378
13
Fix integer overflow in string search causing oobread ##crash * Reported by @greatergoodest via huntrdev * BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04 * Reproducer bfileovf
other
uftpd
0fb2c031ce0ace07cc19cd2cb2143c4b5a63c9dd
0
static int do_abort(ctrl_t *ctrl) { if (ctrl->d || ctrl->d_num) { uev_io_stop(&ctrl->data_watcher); if (ctrl->d_num > 0) free(ctrl->d); ctrl->d_num = 0; ctrl->d = NULL; ctrl->i = 0; if (ctrl->file) free(ctrl->file); ctrl->file = NULL; } if (ctrl->file) { uev_io_stop(&ctrl->data_watcher); fr...
null
null
273,924
321756024100513914410711700288874310687
31
FTP: Fix buffer overflow in PORT parser, reported by Aaron Esau Signed-off-by: Joachim Nilsson <troglobit@gmail.com>
other
gerbv
319a8af890e4d0a5c38e6d08f510da8eefc42537
0
callbacks_open_activate(GtkMenuItem *menuitem, gpointer user_data) { GSList *fns = NULL; screen.win.gerber = gtk_file_chooser_dialog_new ( _("Open Gerbv project, Gerber, drill, " "or pick&place files"), NULL, GTK_FILE_CHOOSER_ACTION_OPEN, GTK_STOCK_CANCEL, GTK_RESPONSE_CANCEL, GTK_STOCK_OPEN, GT...
null
null
274,749
10546569675352686049676335445411764791
31
Remove local alias to parameter array Normalizing access to `gerbv_simplified_amacro_t::parameter` as a step to fix CVE-2021-40402
other
date
8f2d7a0c7e52cea8333824bd527822e5449ed83d
0
d_lite_inspect_raw(VALUE self) { get_d1(self); return mk_inspect_raw(dat, rb_obj_class(self)); }
null
null
294,629
79567068934892548582210724174282211440
5
`Date._<format>(nil)` should return an empty Hash Fix: https://github.com/ruby/date/issues/39 This is how versions previous to 3.2.1 behaved and Active Support currently rely on this behavior. https://github.com/rails/rails/blob/90357af08048ef5076730505f6e7b14a81f33d0c/activesupport/lib/active_support/values/time_zo...
other
exim
e2f5dc151e2e79058e93924e6d35510557f0535d
0
read_named_list(tree_node **anchorp, int *numberp, int max, uschar *s, uschar *tname) { BOOL forcecache = FALSE; uschar *ss; tree_node *t; namedlist_block *nb = store_get(sizeof(namedlist_block)); if (Ustrncmp(s, "_cache", 6) == 0) { forcecache = TRUE; s += 6; } if (!isspace(*s)) log_write(0, LOG_PANIC_DI...
null
null
299,895
16042436833134722795812694423110631061
48
Check configure file permissions even for non-default files if still privileged (Bug 1044, CVE-2010-4345)
other
linux
d6d86830705f173fca6087a3e67ceaf68db80523
0
static int tipc_sk_insert(struct tipc_sock *tsk) { struct sock *sk = &tsk->sk; struct net *net = sock_net(sk); struct tipc_net *tn = net_generic(net, tipc_net_id); u32 remaining = (TIPC_MAX_PORT - TIPC_MIN_PORT) + 1; u32 portid = prandom_u32() % remaining + TIPC_MIN_PORT; while (remaining--) { portid++; if (...
null
null
300,817
49892430050799669092879530873298978246
22
net ticp:fix a kernel-infoleak in __tipc_sendmsg() struct tipc_socket_addr.ref has a 4-byte hole,and __tipc_getname() currently copying it to user space,causing kernel-infoleak. BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline] BUG: KMSAN: kernel-infoleak in instrument_c...
other
ncurses
790a85dbd4a81d5f5d8dd02a44d84f01512ef443
0
set_conversions(TTY * tty_settings) { #ifdef ONLCR tty_settings->c_oflag |= ONLCR; #endif tty_settings->c_iflag |= ICRNL; tty_settings->c_lflag |= ECHO; #ifdef OXTABS tty_settings->c_oflag |= OXTABS; #endif /* OXTABS */ /* test used to be tgetflag("NL") */ if (VALID_STRING(newline) && newline[0...
null
null
309,899
311391480107612379888923697780274498645
26
ncurses 6.2 - patch 20200531 + correct configure version-check/warnng for g++ to allow for 10.x + re-enable "bel" in konsole-base (report by Nia Huang) + add linux-s entry (patch by Alexandre Montaron). + drop long-obsolete convert_configure.pl + add test/test_parm.c, for checking tparm changes. + improve parameter-ch...
other
ncurses
790a85dbd4a81d5f5d8dd02a44d84f01512ef443
0
skip_delay(char *s) { while (*s == '/' || isdigit(UChar(*s))) ++s; return s; }
null
null
310,021
111765975845851947072863777002864995611
6
ncurses 6.2 - patch 20200531 + correct configure version-check/warnng for g++ to allow for 10.x + re-enable "bel" in konsole-base (report by Nia Huang) + add linux-s entry (patch by Alexandre Montaron). + drop long-obsolete convert_configure.pl + add test/test_parm.c, for checking tparm changes. + improve parameter-ch...
other
ncurses
790a85dbd4a81d5f5d8dd02a44d84f01512ef443
0
mouse_activate(SCREEN *sp, int on) { if (!on && !sp->_mouse_initialized) return; if (!_nc_mouse_init(sp)) return; if (on) { sp->_mouse_bstate = 0; switch (sp->_mouse_type) { case M_XTERM: #if NCURSES_EXT_FUNCS NCURSES_SP_NAME(keyok) (NCURSES_SP_ARGx KEY_MOUSE, on); #endif TPUTS_TRACE("xterm...
null
null
310,108
228122921798639990128175751527020416456
77
ncurses 6.2 - patch 20200531 + correct configure version-check/warnng for g++ to allow for 10.x + re-enable "bel" in konsole-base (report by Nia Huang) + add linux-s entry (patch by Alexandre Montaron). + drop long-obsolete convert_configure.pl + add test/test_parm.c, for checking tparm changes. + improve parameter-ch...
other
tor
00fffbc1a15e2696a89c721d0c94dc333ff419ef
0
dirserv_get_consensus(const char *flavor_name) { if (!cached_consensuses) return NULL; return strmap_get(cached_consensuses, flavor_name); }
null
null
310,263
215315223511708647156635059924534938711
6
Don't give the Guard flag to relays without the CVE-2011-2768 fix
other
vim
d6c67629ed05aae436164eec474832daf8ba7420
0
qf_new_list(qf_info_T *qi, char_u *qf_title) { int i; qf_list_T *qfl; // If the current entry is not the last entry, delete entries beyond // the current entry. This makes it possible to browse in a tree-like // way with ":grep". while (qi->qf_listcount > qi->qf_curlist + 1) qf_free(&qi->qf_...
null
null
312,477
93732360710220841877453733545087850475
28
patch 9.0.0260: using freed memory when using 'quickfixtextfunc' recursively Problem: Using freed memory when using 'quickfixtextfunc' recursively. Solution: Do not allow for recursion.
other
vim
395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c
0
nv_end(cmdarg_T *cap) { if (cap->arg || (mod_mask & MOD_MASK_CTRL)) // CTRL-END = goto last line { cap->arg = TRUE; nv_goto(cap); cap->count1 = 1; // to end of current line } nv_dollar(cap); }
null
null
313,833
113428978086857076445718800141878983962
10
patch 8.2.4956: reading past end of line with "gf" in Visual block mode Problem: Reading past end of line with "gf" in Visual block mode. Solution: Do not include the NUL in the length.
other
linux
2a8859f373b0a86f0ece8ec8312607eacf12485d
0
static inline bool FNAME(is_last_gpte)(struct kvm_mmu *mmu, unsigned int level, unsigned int gpte) { /* * For EPT and PAE paging (both variants), bit 7 is either reserved at * all level or indicates a huge page (ignoring CR3/EPTP). In either * case, bit 7 being set terminates the walk. */ #if PTTYP...
null
null
314,479
44046198089629007653487158637045629162
29
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address FNAME(cmpxchg_gpte) is an inefficient mess. It is at least decent if it can go through get_user_pages_fast(), but if it cannot then it tries to use memremap(); that is not just terribly slow, it is also wrong because it assumes that the VM_PFNMAP VMA ...
other
linux
2a8859f373b0a86f0ece8ec8312607eacf12485d
0
static inline unsigned FNAME(gpte_access)(u64 gpte) { unsigned access; #if PTTYPE == PTTYPE_EPT access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) | ((gpte & VMX_EPT_EXECUTABLE_MASK) ? ACC_EXEC_MASK : 0) | ((gpte & VMX_EPT_READABLE_MASK) ? ACC_USER_MASK : 0); #else BUILD_BUG_ON(ACC_EXEC_MASK != PT_PR...
null
null
314,485
25615746603894343205835009457100590890
17
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address FNAME(cmpxchg_gpte) is an inefficient mess. It is at least decent if it can go through get_user_pages_fast(), but if it cannot then it tries to use memremap(); that is not just terribly slow, it is also wrong because it assumes that the VM_PFNMAP VMA ...
other
net
7892032cfe67f4bde6fc2ee967e45a8fbaf33756
0
static struct ip6_tnl __rcu **__ip6gre_bucket(struct ip6gre_net *ign, const struct __ip6_tnl_parm *p) { const struct in6_addr *remote = &p->raddr; const struct in6_addr *local = &p->laddr; unsigned int h = HASH_KEY(p->i_key); int prio = 0; if (!ipv6_addr_any(local)) prio |= 1; if (!ipv6_addr_any(remote) && !...
null
null
336,112
15270385349691506685460241366719163391
17
ip6_gre: fix ip6gre_err() invalid reads Andrey Konovalov reported out of bound accesses in ip6gre_err() If GRE flags contains GRE_KEY, the following expression *(((__be32 *)p) + (grehlen / 4) - 1) accesses data ~40 bytes after the expected point, since grehlen includes the size of IPv6 headers. Let's use a "struct ...
other
spice
ca5bbc5692e052159bce1a75f55dc60b36078749
0
static RedsMigTargetClient* reds_mig_target_client_find(RedsState *reds, RedClient *client) { GList *l; for (l = reds->mig_target_clients; l != NULL; l = l->next) { RedsMigTargetClient *mig_client = (RedsMigTargetClient*) l->data; if (mig_client->client == client) { return mig_clie...
null
null
336,520
177512632378378514037906220099719318192
13
With OpenSSL 1.1: Disable client-initiated renegotiation. Fixes issue #49 Fixes BZ#1904459 Signed-off-by: Julien Ropé <jrope@redhat.com> Reported-by: BlackKD Acked-by: Frediano Ziglio <fziglio@redhat.com>
other
spice
ca5bbc5692e052159bce1a75f55dc60b36078749
0
static void reds_mig_release(RedServerConfig *config) { if (config->mig_spice) { g_free(config->mig_spice->cert_subject); g_free(config->mig_spice->host); g_free(config->mig_spice); config->mig_spice = NULL; } }
null
null
336,543
105940152202525552856838230907712217417
9
With OpenSSL 1.1: Disable client-initiated renegotiation. Fixes issue #49 Fixes BZ#1904459 Signed-off-by: Julien Ropé <jrope@redhat.com> Reported-by: BlackKD Acked-by: Frediano Ziglio <fziglio@redhat.com>
other
tty
15b3cd8ef46ad1b100e0d3c7e38774f330726820
0
int con_copy_unimap(struct vc_data *dst_vc, struct vc_data *src_vc) { struct uni_pagedir *q; if (!*src_vc->vc_uni_pagedir_loc) return -EINVAL; if (*dst_vc->vc_uni_pagedir_loc == *src_vc->vc_uni_pagedir_loc) return 0; con_free_unimap(dst_vc); q = *src_vc->vc_uni_pagedir_loc; q->refcount++; *dst_vc->vc_uni_pa...
null
null
345,210
111635185053533606181053014468092583454
14
Revert "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c" This reverts commit 84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac. con_insert_unipair() is working with a sparse 3-dimensional array: - p->uni_pgdir[] is the top layer - p1 points to a middle layer - p2 points to a bottom layer If it needs to a...
other
linux
1d0688421449718c6c5f46e458a378c9b530ba18
0
static int virtbt_probe(struct virtio_device *vdev) { vq_callback_t *callbacks[VIRTBT_NUM_VQS] = { [VIRTBT_VQ_TX] = virtbt_tx_done, [VIRTBT_VQ_RX] = virtbt_rx_done, }; const char *names[VIRTBT_NUM_VQS] = { [VIRTBT_VQ_TX] = "tx", [VIRTBT_VQ_RX] = "rx", }; struct virtio_bluetooth *vbt; struct hci_dev *hdev;...
null
null
349,525
129546000597670610909112769484114841455
116
Bluetooth: virtio_bt: fix memory leak in virtbt_rx_handle() On the reception of packets with an invalid packet type, the memory of the allocated socket buffers is never freed. Add a default case that frees these to avoid a memory leak. Fixes: afd2daa26c7a ("Bluetooth: Add support for virtio transport driver") Signed-...
other
poppler
b224e2f5739fe61de9fa69955d016725b2a4b78d
0
void SplashOutputDev::setOverprintMask(GfxColorSpace *colorSpace, bool overprintFlag, int overprintMode, const GfxColor *singleColor, bool grayIndexed) { #ifdef SPLASH_CMYK unsigned int mask; GfxCMYK cmyk; bool additive = false; int i; if (colorSpace->getMode() == ...
null
null
353,148
211313924904805379136813267926417891874
63
SplashOutputDev::tilingPatternFill: Fix crash on broken file Issue #802
other
linux
a2ef990ab5a6705a356d146dd773a3b359787497
0
static struct mm_struct *__check_mem_permission(struct task_struct *task) { struct mm_struct *mm; mm = get_task_mm(task); if (!mm) return ERR_PTR(-EINVAL); /* * A task can always look at itself, in case it chooses * to use system calls instead of load instructions. */ if (task == current) return mm; ...
null
null
369,945
32400825679336594106152712477471029748
34
proc: fix null pointer deref in proc_pid_permission() get_proc_task() can fail to search the task and return NULL, put_task_struct() will then bomb the kernel with following oops: BUG: unable to handle kernel NULL pointer dereference at 0000000000000010 IP: [<ffffffff81217d34>] proc_pid_permission+0x64/0xe0 PGD...
other
qcad
1eeffc5daf5a06cf6213ffc19e95923cdebb2eb8
0
void DL_Dxf::addMText(DL_CreationInterface* creationInterface) { double angle = 0.0; if (hasValue(50)) { if (libVersion<=0x02000200) { // wrong but compatible with dxflib <=2.0.2.0 (angle stored in rad): angle = getRealValue(50, 0.0); } else { angle = (getRea...
null
null
386,560
46338429322259655153929301092741538110
54
check vertexIndex which might be -1 for broken DXF
other
linux
5934d9a0383619c14df91af8fd76261dc3de2f5f
0
static int snd_ctl_elem_list_user(struct snd_card *card, struct snd_ctl_elem_list __user *_list) { struct snd_ctl_elem_list list; int err; if (copy_from_user(&list, _list, sizeof(list))) return -EFAULT; err = snd_ctl_elem_list(card, &list); if (err) return err; if (copy_to_user(_list, &list, sizeof(lis...
null
null
387,581
63256158084291611402985334955951385448
16
ALSA: control: Re-order bounds checking in get_ctl_id_hash() These two checks are in the reverse order so it might read one element beyond the end of the array. First check if the "i" is within bounds before using it. Fixes: 6ab55ec0a938 ("ALSA: control: Fix an out-of-bounds bug in get_ctl_id_hash()") Signed-off-by:...
other
vim
1e56bda9048a9625bce6e660938c834c5c15b07d
0
check_for_dict_arg(typval_T *args, int idx) { if (args[idx].v_type != VAR_DICT) { semsg(_(e_dict_required_for_argument_nr), idx + 1); return FAIL; } return OK; }
null
null
389,713
141080721318029071675117420640599644779
9
patch 9.0.0104: going beyond allocated memory when evaluating string constant Problem: Going beyond allocated memory when evaluating string constant. Solution: Properly skip over <Key> form.
other
vim
1e56bda9048a9625bce6e660938c834c5c15b07d
0
check_for_bool_arg(typval_T *args, int idx) { if (args[idx].v_type != VAR_BOOL && !(args[idx].v_type == VAR_NUMBER && (args[idx].vval.v_number == 0 || args[idx].vval.v_number == 1))) { semsg(_(e_bool_required_for_argument_nr), idx + 1); return FAIL; } return OK; }
null
null
389,727
18860959565384722997224499968636100802
12
patch 9.0.0104: going beyond allocated memory when evaluating string constant Problem: Going beyond allocated memory when evaluating string constant. Solution: Properly skip over <Key> form.
other
squirrel
a6413aa690e0bdfef648c68693349a7b878fe60d
0
static SQInteger base_seterrorhandler(HSQUIRRELVM v) { sq_seterrorhandler(v); return 0; }
null
null
393,481
178112983592969439257590626914183686801
5
fix in thread.call
other
linux
f227e3ec3b5cad859ad15666874405e8c1bbc1d4
0
static void timer_sync_wait_running(struct timer_base *base) { if (atomic_read(&base->timer_waiters)) { spin_unlock(&base->expiry_lock); spin_lock(&base->expiry_lock); } }
null
null
401,512
176891829193256923285135254041913515459
7
random32: update the net random state on interrupt and activity This modifies the first 32 bits out of the 128 bits of a random CPU's net_rand_state on interrupt or CPU activity to complicate remote observations that could lead to guessing the network RNG's internal state. Note that depending on some network devices'...
other
at-spi2-core
c2e87fe00b596dba20c9d57d406ab8faa744b15a
0
on_name_lost (GDBusConnection *connection, const gchar *name, gpointer user_data) { A11yBusLauncher *app = user_data; if (app->session_bus == NULL && connection == NULL && app->a11y_launch_error_message == NULL) app->a11y_launch_error_message = g_strdup ("Fail...
null
null
411,796
209162272483935417248155158643498161858
11
Fix inverted logic. Don't write more into a buffer than it can hold. https://bugzilla.gnome.org/show_bug.cgi?id=791124
other
gnupg
b0b3803e8c2959dd67ca96debc54b5c6464f0d41
0
pin_cb (void *opaque, const char *info, char **retstr) { assuan_context_t ctx = opaque; char *command; int rc; unsigned char *value; size_t valuelen; if (!retstr) { /* We prompt for pinpad entry. To make sure that the popup has been show we use an inquire and not just a status message. ...
null
null
415,207
339532838092181681955556042023008325329
56
scd: Avoid double-free on error condition in scd * scd/command.c (cmd_readkey): avoid double-free of cert -- When ksba_cert_new() fails, cert will be double-freed. Debian-Bug-Id: 773471 Original patch changed by wk to do the free only at leave.
other
MilkyTracker
7afd55c42ad80d01a339197a2d8b5461d214edaf
0
void PlayerGeneric::enable(PlayModeOptions option, bool b) { ASSERT(option>=PlayModeOptionFirst && option<PlayModeOptionLast); options[option] = b; if (player) player->enable(option, b); }
null
null
417,067
225622941726678529531855917956910537431
8
Fix use-after-free in PlayerGeneric destructor
other
file
46a8443f76cec4b41ec736eca396984c74664f84
0
cdf_swap_dir(cdf_directory_t *d) { d->d_namelen = CDF_TOLE2(d->d_namelen); d->d_left_child = CDF_TOLE4(CAST(uint32_t, d->d_left_child)); d->d_right_child = CDF_TOLE4(CAST(uint32_t, d->d_right_child)); d->d_storage = CDF_TOLE4(CAST(uint32_t, d->d_storage)); d->d_storage_uuid[0] = CDF_TOLE8(d->d_storage_uuid[0]); d...
null
null
427,718
267598963095433805790413638791896858364
15
Limit the number of elements in a vector (found by oss-fuzz)
other
linux
9b0971ca7fc75daca80c0bb6c02e96059daea90a
0
int svm_register_enc_region(struct kvm *kvm, struct kvm_enc_region *range) { struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info; struct enc_region *region; int ret = 0; if (!sev_guest(kvm)) return -ENOTTY; /* If kvm is mirroring encryption context it isn't responsible for it */ if (is_mirroring_enc_...
null
null
427,818
37735299863907632866603568494697437605
49
KVM: SEV-ES: fix another issue with string I/O VMGEXITs If the guest requests string I/O from the hypervisor via VMGEXIT, SW_EXITINFO2 will contain the REP count. However, sev_es_string_io was incorrectly treating it as the size of the GHCB buffer in bytes. This fixes the "outsw" test in the experimental SEV tests o...
other
unicorn
3d3deac5e6d38602b689c4fef5dac004f07a2e63
0
static bool subpage_accepts(struct uc_struct *uc, void *opaque, hwaddr addr, unsigned len, bool is_write, MemTxAttrs attrs) { subpage_t *subpage = opaque; #if defined(DEBUG_SUBPAGE) printf("%s: subpage %p %c len %u addr " TARGET_FMT_plx "\n", __...
null
null
432,168
63967631870418926600391921964457441366
13
Fix crash when mapping a big memory and calling uc_close
other
linux
89c2b3b74918200e46699338d7bcc19b1ea12110
0
static void __io_commit_cqring_flush(struct io_ring_ctx *ctx) { if (ctx->off_timeout_used) io_flush_timeouts(ctx); if (ctx->drain_active) io_queue_deferred(ctx); }
null
null
436,068
340010207469402300024205814911386979974
7
io_uring: reexpand under-reexpanded iters [ 74.211232] BUG: KASAN: stack-out-of-bounds in iov_iter_revert+0x809/0x900 [ 74.212778] Read of size 8 at addr ffff888025dc78b8 by task syz-executor.0/828 [ 74.214756] CPU: 0 PID: 828 Comm: syz-executor.0 Not tainted 5.14.0-rc3-next-20210730 #1 [ 74.216525] Hardware n...
other
ImageMagick6
210474b2fac6a661bfa7ed563213920e93e76395
0
ModuleExport size_t RegisterPNMImage(void) { MagickInfo *entry; entry=SetMagickInfo("PAM"); entry->decoder=(DecodeImageHandler *) ReadPNMImage; entry->encoder=(EncodeImageHandler *) WritePNMImage; entry->description=ConstantString("Common 2-dimensional bitmap format"); entry->mime_type=ConstantString("...
null
null
439,066
94264172621879694387592603491954916518
50
Fix ultra rare but potential memory-leak
other
spice
a4a16ac42d2f19a17e36556546aa94d5cd83745f
0
static void print_memslots(RedMemSlotInfo *info) { int i; int x; for (i = 0; i < info->num_memslots_groups; ++i) { for (x = 0; x < info->num_memslots; ++x) { if (!info->mem_slots[i][x].virt_start_addr && !info->mem_slots[i][x].virt_end_addr) { continue; ...
null
null
442,582
151001726244296520622555241676922871542
18
memslot: Fix off-by-one error in group/slot boundary check RedMemSlotInfo keeps an array of groups, and each group contains an array of slots. Unfortunately, these checks are off by 1, they check that the index is greater or equal to the number of elements in the array, while these arrays are 0 based. The check should...
other
curl
70b1900dd13d16f2e83f571407a614541d5ac9ba
0
static int ftpfilemethod(struct Configurable *config, char *str) { if(curlx_strequal("singlecwd", str)) return CURLFTPMETHOD_SINGLECWD; if(curlx_strequal("nocwd", str)) return CURLFTPMETHOD_NOCWD; if(curlx_strequal("multicwd", str)) return CURLFTPMETHOD_MULTICWD; warnf(config, "unrecognized ftp file...
null
null
442,792
108849185848884077742314181965388997639
11
'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194) pointed out that the warnf() function in the curl tool didn't properly deal with the cases when excessively long words were used in the string to chop up.
other
file-roller
b147281293a8307808475e102a14857055f81631
0
fr_window_set_password_for_second_archive (FrWindow *window, const char *password) { g_return_if_fail (window != NULL); if (window->priv->second_password != NULL) { g_free (window->priv->second_password); window->priv->second_password = NULL; } if ((password != NULL) && (password[0] != '\0')) wind...
null
null
445,869
40852421738713627674976957508022854528
13
libarchive: sanitize filenames before extracting
other
frr
ff6db1027f8f36df657ff2e5ea167773752537ed
0
bool bgp_notify_received_hard_reset(struct peer *peer, uint8_t code, uint8_t subcode) { /* When the "N" bit has been exchanged, a Hard Reset message is used to * indicate to the peer that the session is to be fully terminated. */ if (!bgp_has_graceful_restart_notification(peer)) return false; if (code...
null
null
448,548
173437471597660270075946890529571204456
14
bgpd: Make sure hdr length is at a minimum of what is expected Ensure that if the capability length specified is enough data. Signed-off-by: Donald Sharp <sharpd@nvidia.com>
other
clamav-devel
c6870a6c857dd722dffaf6d37ae52ec259d12492
0
int cli_scansis(int desc, cli_ctx *ctx) { FILE *f; int i; char *tmpd; uint32_t uid[4]; cli_dbgmsg("in scansis()\n"); if (!(tmpd = cli_gentemp(ctx->engine->tmpdir))) return CL_ETMPDIR; if (mkdir(tmpd, 0700)) { cli_dbgmsg("SIS: Can't create temporary directory %s\n", tmpd); free(tmpd); ...
null
null
449,318
218645672916114051254559215843708120847
59
bb #6808
other
bash
951bdaad7a18cc0dc1036bba86b18b90874d39ff
0
bash_vi_complete (count, key) int count, key; { #if defined (SPECIFIC_COMPLETION_FUNCTIONS) int p, r; char *t; if ((rl_point < rl_end) && (!whitespace (rl_line_buffer[rl_point]))) { if (!whitespace (rl_line_buffer[rl_point + 1])) rl_vi_end_word (1, 'E'); rl_point++; } /* Find boundar...
null
null
455,358
139310507451300935907578564904967929900
49
commit bash-20190628 snapshot
other
linux
30e29a9a2bc6a4888335a6ede968b75cd329657a
0
static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs, u64 *ips, u32 trace_nr, bool user) { int i; struct vm_area_struct *vma; bool irq_work_busy = false; struct stack_map_irq_work *work = NULL; if (irqs_disabled()) { if (!IS_ENABLED(CONFIG_PREEMPT_RT)) { work = this_cpu_ptr(&up...
null
null
459,520
218331281774651464479696581807373915903
72
bpf: Fix integer overflow in prealloc_elems_and_freelist() In prealloc_elems_and_freelist(), the multiplication to calculate the size passed to bpf_map_area_alloc() could lead to an integer overflow. As a result, out-of-bounds write could occur in pcpu_freelist_populate() as reported by KASAN: [...] [ 16.968613] BU...
other
atril
f4291fd62f7dfe6460d2406a979ccfac0c68dd59
0
comics_document_get_page_size (EvDocument *document, EvPage *page, double *width, double *height) { GdkPixbufLoader *loader; char **argv; guchar buf[1024]; gboolean success, got_size = FALSE; gint outpipe = -1; GPid child_pid; gssize bytes; GdkPixbuf *pixbuf; gchar *fi...
null
null
463,033
42093752426338562510575554408611838860
67
comics: make the files containing "--checkpoint-action=" unsupported Fixes #257
other
kvm
e28ba7bb020f07193bc000453c8775e9d2c0dda7
0
static void string_addr_inc(struct x86_emulate_ctxt *ctxt, unsigned seg, int reg, struct operand *op) { int df = (ctxt->eflags & EFLG_DF) ? -1 : 1; register_address_increment(ctxt, &ctxt->regs[reg], df * op->bytes); op->addr.mem.ea = register_address(ctxt, ctxt->regs[reg]); op->addr.mem.seg = seg; }
null
null
466,141
279937378381120723563750678467533571246
9
KVM: x86: fix missing checks in syscall emulation On hosts without this patch, 32bit guests will crash (and 64bit guests may behave in a wrong way) for example by simply executing following nasm-demo-application: [bits 32] global _start SECTION .text _start: syscall (I tested it with winxp and linux ...
other
linux
75e5b4849b81e19e9efe1654b30d7f3151c33c2c
0
void usb_remove_config(struct usb_composite_dev *cdev, struct usb_configuration *config) { unsigned long flags; spin_lock_irqsave(&cdev->lock, flags); if (cdev->config == config) reset_config(cdev); spin_unlock_irqrestore(&cdev->lock, flags); remove_config(cdev, config); }
null
null
476,112
158127452115525305672838329101128620567
14
USB: gadget: validate interface OS descriptor requests Stall the control endpoint in case provided index exceeds array size of MAX_CONFIG_INTERFACES or when the retrieved function pointer is null. Signed-off-by: Szymon Heidrich <szymon.heidrich@gmail.com> Cc: stable@kernel.org Signed-off-by: Greg Kroah-Hartman <gregk...
other
radare2
9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
0
R_API RBinJavaAttrInfo *r_bin_java_line_number_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) { ut32 i = 0; ut64 curpos, offset = 0; RBinJavaLineNumberAttribute *lnattr; if (sz < 6) { return NULL; } RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset); if ...
null
null
477,370
119348967668166951269710852739156757728
43
Fix oobread segfault in java arith8.class ##crash * Reported by Cen Zhang via huntr.dev
other
radare2
9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
0
R_API void r_bin_java_reset_bin_info(RBinJavaObj *bin) { free (bin->cf2.flags_str); free (bin->cf2.this_class_name); r_list_free (bin->imports_list); r_list_free (bin->methods_list); r_list_free (bin->fields_list); r_list_free (bin->attrs_list); r_list_free (bin->cp_list); r_list_free (bin->interfaces_list); r...
null
null
477,386
257880697052646704196395827734415534903
21
Fix oobread segfault in java arith8.class ##crash * Reported by Cen Zhang via huntr.dev
other
liblouis
2e4772befb2b1c37cb4b9d6572945115ee28630a
0
compileGrouping(FileInfo *file, int noback, int nofor, TranslationTableHeader **table, DisplayTableHeader **displayTable) { int k; CharsString name; CharsString groupChars; CharsString groupDots; CharsString dotsParsed; if (!getToken(file, &name, "name operand")) return 0; if (!getRuleCharsText(file, &groupCha...
null
null
482,489
184745494045006716627734704064241271128
60
Prevent an invalid memory writes in compileRule Thanks to Han Zheng for reporting it Fixes #1214
other
linux-2.6
9926e4c74300c4b31dee007298c6475d33369df0
0
static int set_one_prio(struct task_struct *p, int niceval, int error) { int no_nice; if (p->uid != current->euid && p->euid != current->euid && !capable(CAP_SYS_NICE)) { error = -EPERM; goto out; } if (niceval < task_nice(p) && !can_nice(p, niceval)) { error = -EACCES; goto out; } no_nice = security_t...
CWE-20
null
487,649
175074766187818791589639418717951159110
24
CPU time limit patch / setrlimit(RLIMIT_CPU, 0) cheat fix As discovered here today, the change in Kernel 2.6.17 intended to inhibit users from setting RLIMIT_CPU to 0 (as that is equivalent to unlimited) by "cheating" and setting it to 1 in such a case, does not make a difference, as the check is done in the wrong pla...
other
openssl
cca1cd9a3447dd067503e4a85ebd1679ee78a48e
0
kssl_TKT2tkt( /* IN */ krb5_context krb5context, /* IN */ KRB5_TKTBODY *asn1ticket, /* OUT */ krb5_ticket **krb5ticket, /* OUT */ KSSL_ERR *kssl_err ) { krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC; krb5_ticket *new5ticket = NULL; ASN1_GENERALSTRING *gstr_svc, *gstr_host; ...
CWE-20
null
500,056
16422261560787497011814600734339799474
70
Submitted by: Tomas Hoger <thoger@redhat.com> Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).
other
openssl
cca1cd9a3447dd067503e4a85ebd1679ee78a48e
0
print_krb5_authdata(char *label, krb5_authdata **adata) { if (adata == NULL) { printf("%s, authdata==0\n", label); return; } printf("%s [%p]\n", label, (void *)adata); #if 0 { int i; printf("%s[at%d:%d] ", label, adata->ad_type, adata->length); for (i=0; i < adata->length; i+...
CWE-20
null
500,075
183101211022783597999868632812091193726
21
Submitted by: Tomas Hoger <thoger@redhat.com> Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted).
other
core
69ad3c902ea4bbf9f21ab1857d8923f975dc6145
0
rpa_read_buffer(pool_t pool, const unsigned char **data, const unsigned char *end, unsigned char **buffer) { const unsigned char *p = *data; unsigned int len; if (p > end) return 0; len = *p++; if (p + len > end || len == 0) return 0; *buffer = p_malloc(pool, len); memcpy(*buffer, p, len); *data += 1 ...
CWE-125
null
506,428
339411141889199958173804859413175563009
20
auth: mech-rpa - Fail on zero len buffer
other
server
0168d1eda30dad4b517659422e347175eb89e923
0
void promote_select_describe_flag_if_needed(LEX *lex) { if (lex->describe) { lex->select_lex.options |= SELECT_DESCRIBE; } }
null
508,380
44316068689065413397010145560216090514
7
MDEV-25766 Unused CTE lead to a crash in find_field_in_tables/find_order_in_list Do not assume that subquery Item always present.
other
server
0168d1eda30dad4b517659422e347175eb89e923
0
Field *find_field_in_table_sef(TABLE *table, const char *name) { Field **field_ptr; if (table->s->name_hash.records) { field_ptr= (Field**)my_hash_search(&table->s->name_hash,(uchar*) name, strlen(name)); if (field_ptr) { /* field_ptr points to fiel...
null
508,409
34330718272183626264179761641215101680
29
MDEV-25766 Unused CTE lead to a crash in find_field_in_tables/find_order_in_list Do not assume that subquery Item always present.
other
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
0
Item_date_literal_for_invalid_dates(THD *thd, const Date *ltime) :Item_date_literal(thd, ltime) { maybe_null= false; }
CWE-617
null
512,516
54308002906361432365810863007565647826
5
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
other
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
0
const Type_handler *type_handler() const { return Type_handler::get_handler_by_field_type(int_field_type); }
CWE-617
null
512,670
320212748104616102966869388990600827457
4
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
other
server
807945f2eb5fa22e6f233cc17b85a2e141efe2c8
0
Item_bool_rowready_func2* Eq_creator::create_swap(THD *thd, Item *a, Item *b) const { return new(thd->mem_root) Item_func_eq(thd, b, a); }
CWE-617
null
512,983
286250761033775663381012619805177298974
4
MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order... When doing condition pushdown from HAVING into WHERE, Item_equal::create_pushable_equalities() calls item->set_extraction_flag(IMMUTABLE_FL) for constant items. Then, Item::cleanup_excluding_immutables_processor() checks for this flag to see ...
other