project string | commit_id string | target int64 | func string | cwe string | big_vul_idx string | idx int64 | hash string | size float64 | message string | dataset string |
|---|---|---|---|---|---|---|---|---|---|---|
server | 9e39d0ae44595dbd1570805d97c9c874778a6be8 | 1 | void ha_maria::drop_table(const char *name)
{
DBUG_ASSERT(file->s->temporary);
(void) ha_close();
(void) maria_delete_table_files(name, 1, MY_WME);
} | CWE-400 | null | 216,906 | 295943262298198796313787629901594498584 | 6 | MDEV-25787 Bug report: crash on SELECT DISTINCT thousands_blob_fields
fix a debug assert to account for not opened temp tables | other |
server | b3c3291f0b7c1623cb20663f7cf31b7f749768bc | 1 | bool open_table(THD *thd, TABLE_LIST *table_list, Open_table_context *ot_ctx)
{
TABLE *table;
const char *key;
uint key_length;
const char *alias= table_list->alias.str;
uint flags= ot_ctx->get_flags();
MDL_ticket *mdl_ticket;
TABLE_SHARE *share;
uint gts_flags;
bool from_share= false;
#ifdef WITH_PAR... | CWE-416 | null | 216,938 | 182517812383076277954919868268872014094 | 476 | MDEV-24176 fixup: GCC -Wmaybe-uninitialized | other |
server | 5ba77222e9fe7af8ff403816b5338b18b342053c | 1 | Field *create_tmp_field_from_field(THD *thd, Field *org_field,
const char *name, TABLE *table,
Item_field *item)
{
Field *new_field;
new_field= org_field->make_new_field(thd->mem_root, table,
table == org_f... | CWE-89 | null | 216,949 | 164261972443783551951315550437760179257 | 32 | MDEV-21028 Server crashes in Query_arena::set_query_arena upon SELECT from view
if the view has algorithm=temptable it is not updatable,
so DEFAULT() for its fields is meaningless,
and thus it's NULL or 0/'' for NOT NULL columns. | other |
server | ecb6f9c894d3ebafeff1c6eb3b65cd248062296f | 1 | multi_update::initialize_tables(JOIN *join)
{
TABLE_LIST *table_ref;
DBUG_ENTER("initialize_tables");
if (unlikely((thd->variables.option_bits & OPTION_SAFE_UPDATES) &&
error_if_full_join(join)))
DBUG_RETURN(1);
main_table=join->join_tab->table;
table_to_update= 0;
/* Any update has at ... | CWE-617 | null | 216,965 | 322966484405015890266186752836981150795 | 146 | MDEV-28095 crash in multi-update and implicit grouping
disallow implicit grouping in multi-update.
explicit GROUP BY is not allowed by the grammar. | other |
monit | 328f60773057641c4b2075fab9820145e95b728c | 1 | static void do_viewlog(HttpRequest req, HttpResponse res) {
if (is_readonly(req)) {
send_error(req, res, SC_FORBIDDEN, "You do not have sufficient privileges to access this page");
return;
}
do_head(res, "_viewlog", "View log", 100);
if ((Run.flags & Run_L... | CWE-79 | null | 217,176 | 44007244262753941920243993940600065355 | null | null | other |
gpac | ad18ece95fa064efc0995c4ab2c985f77fb166ec | 0 | GF_Err gf_isom_rtp_packet_begin(GF_ISOFile *the_file, u32 trackNumber,
s32 relativeTime,
u8 PackingBit,
u8 eXtensionBit,
u8 MarkerBit,
u8 PayloadType,
... | null | null | 219,901 | 135210532758408519809735309262837501503 | 35 | fixed #1904 | other |
glewlwyd | 125281f1c0d4b6a8b49f7e55a757205a2ef01fbe | 0 | int callback_glewlwyd_delete_scope (const struct _u_request * request, struct _u_response * response, void * user_data) {
struct config_elements * config = (struct config_elements *)user_data;
json_t * j_search_scope;
j_search_scope = get_scope(config, u_map_get(request->map_url, "scope"));
if (check_result_... | null | null | 219,991 | 21879157829563128577889659573080658049 | 21 | Fix update session when auth fail | other |
pcre2 | d4fa336fbcc388f89095b184ba6d99422cfc676c | 0 | static SLJIT_INLINE void compile_ref_iterator_backtrackingpath(compiler_common *common, struct backtrack_common *current)
{
DEFINE_COMPILER;
PCRE2_SPTR cc = current->cc;
BOOL ref = (*cc == OP_REF || *cc == OP_REFI);
PCRE2_UCHAR type;
type = cc[ref ? 1 + IMM2_SIZE : 1 + 2 * IMM2_SIZE];
if ((type & 0x1) == 0)
{
/* ... | null | null | 223,373 | 288436804787057463427568100308425798209 | 24 | Fix incorrect value reading in JIT. | other |
pcre2 | d4fa336fbcc388f89095b184ba6d99422cfc676c | 0 | static BOOL check_opcode_types(compiler_common *common, PCRE2_SPTR cc, PCRE2_SPTR ccend)
{
int count;
PCRE2_SPTR slot;
PCRE2_SPTR assert_back_end = cc - 1;
PCRE2_SPTR assert_na_end = cc - 1;
/* Calculate important variables (like stack size) and checks whether all opcodes are supported. */
while (cc < ccend)
{
swi... | null | null | 223,433 | 104144699881640659915549001222013190335 | 160 | Fix incorrect value reading in JIT. | other |
tensorflow | 08d7b00c0a5a20926363849f611729f53f3ec022 | 0 | Status Pool3DShape(shape_inference::InferenceContext* c) {
ShapeHandle input_shape;
TF_RETURN_IF_ERROR(c->WithRank(c->input(0), 5, &input_shape));
string data_format;
Status s = c->GetAttr("data_format", &data_format);
std::vector<int32> strides;
TF_RETURN_IF_ERROR(c->GetAttr("strides", &strides));
if (... | null | null | 224,560 | 304736669889278191184353852888637820897 | 81 | Fix Segfault in Concat V2 shape function.
PiperOrigin-RevId: 412120654
Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be | other |
tensorflow | 08d7b00c0a5a20926363849f611729f53f3ec022 | 0 | Status MaxPoolShape(shape_inference::InferenceContext* c) {
return MaxPoolShapeImpl(c, /*supports_explicit_padding=*/false);
} | null | null | 224,592 | 30835260043464724133923419352917564078 | 3 | Fix Segfault in Concat V2 shape function.
PiperOrigin-RevId: 412120654
Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be | other |
v4l2loopback | e4cd225557486c420f6a34411f98c575effd43dd | 0 | static int v4l2loopback_lookup_cb(int id, void *ptr, void *data)
{
struct v4l2_loopback_device *device = ptr;
struct v4l2loopback_lookup_cb_data *cbdata = data;
if (cbdata && device && device->vdev) {
if (device->vdev->num == cbdata->device_nr) {
cbdata->device = device;
cbdata->device_nr = id;
return 1;
... | null | null | 225,397 | 36502877497827830444652809109457004050 | 13 | add explicit format specifier to printf() invocations
CWE-134 | other |
gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | 0 | void mfra_box_del(GF_Box *s)
{
GF_MovieFragmentRandomAccessBox *ptr = (GF_MovieFragmentRandomAccessBox *)s;
if (ptr == NULL) return;
gf_list_del(ptr->tfra_list);
gf_free(ptr);
} | null | null | 225,645 | 166982083698724780356123058557769692020 | 7 | fixed #2092 | other |
gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | 0 |
GF_Box *chnl_box_new()
{
ISOM_DECL_BOX_ALLOC(GF_ChannelLayoutBox, GF_ISOM_BOX_TYPE_CHNL);
return (GF_Box *)tmp; | null | null | 225,676 | 186095885763030695620676670739985269725 | 5 | fixed #2092 | other |
gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | 0 | GF_Err moof_box_size(GF_Box *s)
{
u32 pos=0;
GF_MovieFragmentBox *ptr = (GF_MovieFragmentBox *) s;
if (!s) return GF_BAD_PARAM;
//Header First
gf_isom_check_position(s, (GF_Box *)ptr->mfhd, &pos);
//then PSSH
gf_isom_check_position_list(s, ptr->PSSHs, &pos);
//then the track list
gf_isom_check_position_list(s,... | null | null | 225,775 | 170536732827198318297117963545294843728 | 13 | fixed #2092 | other |
gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | 0 |
GF_Err fdsa_on_child_box(GF_Box *s, GF_Box *a, Bool is_rem)
{
GF_HintSample *ptr = (GF_HintSample *)s;
switch(a->type) {
case GF_ISOM_BOX_TYPE_FDPA:
BOX_FIELD_LIST_ASSIGN(packetTable)
return GF_OK;
case GF_ISOM_BOX_TYPE_EXTR:
BOX_FIELD_ASSIGN(extra_data, GF_ExtraDataBox)
break;
}
return GF_OK; | null | null | 225,915 | 16231677898973218848028614039180259892 | 13 | fixed #2092 | other |
gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | 0 |
GF_Err dmlp_box_write(GF_Box *s, GF_BitStream *bs)
{
GF_Err e;
GF_TrueHDConfigBox *ptr = (GF_TrueHDConfigBox *)s;
e = gf_isom_box_write_header(s, bs);
if (e) return e;
gf_bs_write_u32(bs, ptr->format_info);
gf_bs_write_int(bs, ptr->peak_data_rate, 15);
gf_bs_write_int(bs, 0, 1);
gf_bs_write_u32(bs, 0);
retur... | null | null | 225,955 | 308675745644893964270987579311863228889 | 13 | fixed #2092 | other |
gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | 0 |
GF_Err trep_box_read(GF_Box *s, GF_BitStream *bs)
{
GF_TrackExtensionPropertiesBox *ptr = (GF_TrackExtensionPropertiesBox *)s;
ISOM_DECREASE_SIZE(ptr, 4);
ptr->trackID = gf_bs_read_u32(bs);
return gf_isom_box_array_read(s, bs); | null | null | 225,964 | 258224393003018232474259052067579314663 | 9 | fixed #2092 | other |
gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | 0 | GF_Err uuid_box_read(GF_Box *s, GF_BitStream *bs)
{
u32 bytesToRead;
GF_UnknownUUIDBox *ptr = (GF_UnknownUUIDBox *)s;
if (ptr->size > 0xFFFFFFFF) return GF_ISOM_INVALID_FILE;
bytesToRead = (u32) (ptr->size);
if (bytesToRead) {
ptr->data = (char*)gf_malloc(bytesToRead);
if (ptr->data == NULL ) return GF_OUT_OF... | null | null | 226,254 | 207621800233513202130834349487536635483 | 15 | fixed #2092 | other |
tensorflow | a5b89cd68c02329d793356bda85d079e9e69b4e7 | 0 | Status VerifyWrappableInCallOp(const OpDef& opdef, EagerOperation* op) {
absl::flat_hash_set<string> opdef_attrs;
for (const auto& attr : opdef.attr()) {
opdef_attrs.insert(attr.name());
}
const auto& node_def = op->MutableAttrs()->BuildNodeDef();
for (const auto& attr : node_def.attr()) {
if (opdef_a... | null | null | 229,323 | 266764428931017137644739313304821897063 | 14 | Fix empty resource handle vulnerability.
Some ops that attempt to extract a resource handle from user input
can lead to nullptr dereferences. This returns an error in such
a case.
PiperOrigin-RevId: 445571938 | other |
gpac | 37592ad86c6ca934d34740012213e467acc4a3b0 | 0 | GF_EXPORT
u32 gf_isom_get_supported_box_type(u32 idx)
{
return box_registry[idx].box_4cc; | null | null | 232,326 | 51306403104286674450982607568575956051 | 4 | fixed #2163 | other |
pjproject | 9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a | 0 | static pj_status_t get_name_len(int rec_counter, const pj_uint8_t *pkt,
const pj_uint8_t *start, const pj_uint8_t *max,
int *parsed_len, int *name_len)
{
const pj_uint8_t *p;
pj_status_t status;
/* Limit the number of recursion */
if (rec_counter > 10) {
/* Too many name recursion */
return... | null | null | 235,641 | 304724818714881251816694868849317017205 | 67 | Merge pull request from GHSA-p6g5-v97c-w5q4
* Prevent heap buffer overflow when parsing DNS packets
* Make sure packet parsing doesn't advance beyond max/end
* Update checks
* Remove check
Co-authored-by: sauwming <ming@teluu.com> | other |
lsquic | a74702c630e108125e71898398737baec8f02238 | 0 | lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size,
unsigned dyn_table_size, unsigned max_risked_streams, int server)
{
enum lsqpack_enc_opts enc_opts;
assert(qeh->qeh_flags & QEH_INITIALIZED);
if (qeh->qeh_flags & QEH_HAVE_SETTINGS)
{
LSQ_WARN("settings alrea... | null | null | 237,885 | 325482743200506242883264217964767124086 | 35 | Release 3.1.0 | other |
linux | 64620e0a1e712a778095bd35cbb277dc2259281f | 0 | static struct bpf_verifier_state *push_stack(struct bpf_verifier_env *env,
int insn_idx, int prev_insn_idx,
bool speculative)
{
struct bpf_verifier_state *cur = env->cur_state;
struct bpf_verifier_stack_elem *elem;
int err;
elem = kzalloc(sizeof(struct bpf_verifier_stack_elem), GFP_KERNEL);
if... | null | null | 238,457 | 173869822630090312186700757827861033657 | 47 | bpf: Fix out of bounds access for ringbuf helpers
Both bpf_ringbuf_submit() and bpf_ringbuf_discard() have ARG_PTR_TO_ALLOC_MEM
in their bpf_func_proto definition as their first argument. They both expect
the result from a prior bpf_ringbuf_reserve() call which has a return type of
RET_PTR_TO_ALLOC_MEM_OR_NULL.
Meani... | other |
linux | 64620e0a1e712a778095bd35cbb277dc2259281f | 0 | struct btf *bpf_get_btf_vmlinux(void)
{
if (!btf_vmlinux && IS_ENABLED(CONFIG_DEBUG_INFO_BTF)) {
mutex_lock(&bpf_verifier_lock);
if (!btf_vmlinux)
btf_vmlinux = btf_parse_vmlinux();
mutex_unlock(&bpf_verifier_lock);
}
return btf_vmlinux;
} | null | null | 238,482 | 234269330592057921775920421239627309464 | 10 | bpf: Fix out of bounds access for ringbuf helpers
Both bpf_ringbuf_submit() and bpf_ringbuf_discard() have ARG_PTR_TO_ALLOC_MEM
in their bpf_func_proto definition as their first argument. They both expect
the result from a prior bpf_ringbuf_reserve() call which has a return type of
RET_PTR_TO_ALLOC_MEM_OR_NULL.
Meani... | other |
vim | 44db8213d38c39877d2148eff6a72f4beccfb94e | 0 | free_yank(long n)
{
if (y_current->y_array != NULL)
{
long i;
for (i = n; --i >= 0; )
vim_free(y_current->y_array[i]);
VIM_CLEAR(y_current->y_array);
}
} | null | null | 240,265 | 78294369507246526050725916519240901596 | 11 | patch 8.2.4219: reading before the start of the line
Problem: Reading before the start of the line.
Solution: Check boundary before trying to read the character. | other |
gpac | 77510778516803b7f7402d7423c6d6bef50254c3 | 0 | GF_Box *tfdt_box_new()
{
ISOM_DECL_BOX_ALLOC(GF_TFBaseMediaDecodeTimeBox, GF_ISOM_BOX_TYPE_TFDT);
return (GF_Box *)tmp;
} | null | null | 244,352 | 327319138272772957392040715484687607045 | 5 | fixed #2255 | other |
gpac | b43f9d1a4b4e33d08edaef6d313e6ce4bdf554d3 | 0 | static s32 naludmx_parse_nal_avc(GF_NALUDmxCtx *ctx, char *data, u32 size, u32 nal_type, Bool *skip_nal, Bool *is_slice, Bool *is_islice)
{
s32 ps_idx = 0;
s32 res = 0;
if (!size) return -1;
gf_bs_reassign_buffer(ctx->bs_r, data, size);
*skip_nal = GF_FALSE;
res = gf_avc_parse_nalu(ctx->bs_r, ctx->avc_state);
i... | null | null | 246,661 | 285879938566855088663728116790540514120 | 176 | fixed #2223 | other |
envoy | e9f936d85dc1edc34fabd0a1725ec180f2316353 | 0 | TestUtilOptions(const std::string& client_ctx_yaml, const std::string& server_ctx_yaml,
bool expect_success, Network::Address::IpVersion version)
: TestUtilOptionsBase(expect_success, version), client_ctx_yaml_(client_ctx_yaml),
server_ctx_yaml_(server_ctx_yaml), expect_no_cert_(false)... | null | null | 247,628 | 234130020991233082719629057316482677014 | 12 | CVE-2022-21654
tls allows re-use when some cert validation settings have changed
Signed-off-by: Yan Avlasov <yavlasov@google.com> | other |
libconfuse | d73777c2c3566fb2647727bb56d9a2295b81669b | 0 | DLLIMPORT signed long cfg_getnint(cfg_t *cfg, const char *name, unsigned int index)
{
return cfg_opt_getnint(cfg_getopt(cfg, name), index);
} | null | null | 248,280 | 308027921853121269984384081000598713054 | 4 | Fix #163: unterminated username used with getpwnam()
Signed-off-by: Joachim Wiberg <troglobit@gmail.com> | other |
gpac | dae9900580a8888969481cd72035408091edb11b | 0 | static GF_Err WriteInterleaved(MovieWriter *mw, GF_BitStream *bs, Bool drift_inter)
{
GF_Err e;
u32 i;
s32 moov_meta_pos=-1;
GF_Box *a, *cprt_box=NULL;
u64 firstSize, finalSize, offset, finalOffset;
GF_List *writers = gf_list_new();
GF_ISOFile *movie = mw->movie;
//first setup the writers
e = SetupWriters(mw,... | null | null | 249,983 | 307394486074364590508342463208104042512 | 132 | fixed #1659 | other |
tinyexr | a685e3332f61cd4e59324bf3f669d36973d64270 | 0 | static void bitmapFromData(const unsigned short data[/*nData*/], int nData,
unsigned char bitmap[BITMAP_SIZE],
unsigned short &minNonZero,
unsigned short &maxNonZero) {
for (int i = 0; i < BITMAP_SIZE; ++i) bitmap[i] = 0;
for (int i =... | null | null | 252,293 | 66767018618529288295644787485579012879 | 21 | Make line_no with too large value(2**20) invalid. Fixes #124 | other |
tinyexr | a685e3332f61cd4e59324bf3f669d36973d64270 | 0 | mz_bool mz_zip_reader_file_stat(mz_zip_archive *pZip, mz_uint file_index,
mz_zip_archive_file_stat *pStat) {
mz_uint n;
const mz_uint8 *p = mz_zip_reader_get_cdh(pZip, file_index);
if ((!p) || (!pStat)) return MZ_FALSE;
// Unpack the central directory record.
pStat->m_file_ind... | null | null | 252,384 | 172031456147728808119195234287572319435 | 44 | Make line_no with too large value(2**20) invalid. Fixes #124 | other |
linux | d6f5e358452479fa8a773b5c6ccc9e4ec5a20880 | 0 | crypt_message(struct TCP_Server_Info *server, int num_rqst,
struct smb_rqst *rqst, int enc)
{
struct smb2_transform_hdr *tr_hdr =
(struct smb2_transform_hdr *)rqst[0].rq_iov[0].iov_base;
unsigned int assoc_data_len = sizeof(struct smb2_transform_hdr) - 20;
int rc = 0;
struct scatterlist *sg;
u8 sign[SMB2_... | null | null | 253,580 | 186046911004554397138179611634707323797 | 103 | cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
When calling smb2_ioctl_query_info() with invalid
smb_query_info::flags, a NULL ptr dereference is triggered when trying
to kfree() uninitialised rqst[n].rq_iov array.
This also fixes leaked paths that are created in SMB2_open_init()
which required SMB2_open_f... | other |
v4l2loopback | 64a216af4c09c9ba9326057d7e78994271827eff | 0 | static ssize_t attr_show_buffers(struct device *cd,
struct device_attribute *attr, char *buf)
{
struct v4l2_loopback_device *dev = v4l2loopback_cd2dev(cd);
return sprintf(buf, "%d\n", dev->used_buffers);
} | null | null | 254,034 | 302510839924811667823050305726390461566 | 7 | add explicit format specifier to printf() invocations
CWE-134 | other |
v4l2loopback | 64a216af4c09c9ba9326057d7e78994271827eff | 0 | static void check_timers(struct v4l2_loopback_device *dev)
{
if (!dev->ready_for_capture)
return;
if (dev->timeout_jiffies > 0 && !timer_pending(&dev->timeout_timer))
mod_timer(&dev->timeout_timer, jiffies + dev->timeout_jiffies);
if (dev->sustain_framerate && !timer_pending(&dev->sustain_timer))
mod_timer(&d... | null | null | 254,039 | 258213869169538679594764324325310375204 | 10 | add explicit format specifier to printf() invocations
CWE-134 | other |
lighttpd1.4 | 971773f1fae600074b46ef64f3ca1f76c227985f | 0 | static void wstunnel_handler_ctx_free(void *gwhctx) {
handler_ctx *hctx = (handler_ctx *)gwhctx;
chunk_buffer_release(hctx->frame.payload);
} | null | null | 257,685 | 326260538769215832414829214874738730090 | 4 | [mod_wstunnel] fix crash with bad hybivers (fixes #3165)
(thx Michał Dardas)
x-ref:
"mod_wstunnel null pointer dereference"
https://redmine.lighttpd.net/issues/3165 | other |
lighttpd1.4 | 971773f1fae600074b46ef64f3ca1f76c227985f | 0 | static int get_key_number(uint32_t *ret, const buffer *b) {
const char * const s = b->ptr;
size_t j = 0;
unsigned long n;
uint32_t sp = 0;
char tmp[10 + 1]; /* #define UINT32_MAX_STRLEN 10 */
for (size_t i = 0, used = buffer_clen(b); i < used; ++i) {
if (light_isdigit(s[i])) {
... | null | null | 257,688 | 326082521741250107155386054424849194304 | 20 | [mod_wstunnel] fix crash with bad hybivers (fixes #3165)
(thx Michał Dardas)
x-ref:
"mod_wstunnel null pointer dereference"
https://redmine.lighttpd.net/issues/3165 | other |
njs | eafe4c7a326b163612f10861392622b5da5b1792 | 0 | njs_array_iterator_prototype_next(njs_vm_t *vm, njs_value_t *args,
njs_uint_t nargs, njs_index_t tag)
{
njs_int_t ret;
njs_bool_t check;
njs_value_t *this;
njs_object_t *object;
njs_object_prop_t *prop_value, *prop_done;
this = njs_argument(args, 0);
chec... | null | null | 262,726 | 120148118506687339042254072251119100086 | 56 | Fixed Array.prototype.lastIndexOf() with unicode string as "this".
Previously, when lastIndexOf() was called with unicode string as "this"
argument and a negative "fromIndex" argument null-pointer dererence
might occur because njs_string_offset() was called with invalid index
value whereas njs_string_offset() should a... | other |
linux | 99c23da0eed4fd20cae8243f2b51e10e66aa0951 | 0 | static void sco_sock_set_timer(struct sock *sk, long timeout)
{
if (!sco_pi(sk)->conn)
return;
BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout);
cancel_delayed_work(&sco_pi(sk)->conn->timeout_work);
schedule_delayed_work(&sco_pi(sk)->conn->timeout_work, timeout);
} | null | null | 263,506 | 209388870755621065800599141288357787719 | 9 | Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg()
The sco_send_frame() also takes lock_sock() during memcpy_from_msg()
call that may be endlessly blocked by a task with userfaultd
technique, and this will result in a hung task watchdog trigger.
Just like the similar fix for hci_sock_sendmsg() in commit
92... | other |
tensorflow | eb921122119a6b6e470ee98b89e65d721663179d | 0 | TfLiteStatus Gather(TfLiteContext* context, const TfLiteGatherParams& params,
const TfLiteTensor* input, const TfLiteTensor* positions,
TfLiteTensor* output) {
const PositionsT* indexes = GetTensorData<PositionsT>(positions);
bool indices_has_only_positive_elements = true;
... | null | null | 265,432 | 201071679938864636818163736764619902183 | 23 | Prevent heap OOB read in TFLite's `gather.cc`.
Passing negative indices is illegal but there was a missing check so that resulted in OOB accesses.
PiperOrigin-RevId: 387231300
Change-Id: I3111b54b2f232638d795be17efc46abe4ede6bf8 | other |
radare2 | 193f4fe01d7f626e2ea937450f2e0c4604420e9d | 0 | R_IPI bool r_bin_file_set_obj(RBin *bin, RBinFile *bf, RBinObject *obj) {
r_return_val_if_fail (bin && bf, false);
bin->file = bf->file;
bin->cur = bf;
bin->narch = bf->narch;
if (obj) {
bf->o = obj;
} else {
obj = bf->o;
}
RBinPlugin *plugin = r_bin_file_cur_plugin (bf);
if (bin->minstrlen < 1) {
bin->m... | null | null | 267,953 | 11109708838971955092594178821129064135 | 24 | Fix integer overflow in string search causing oobread ##crash
* Reported by @greatergoodest via huntrdev
* BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04
* Reproducer bfileovf | other |
radare2 | 193f4fe01d7f626e2ea937450f2e0c4604420e9d | 0 | static RBinPlugin *get_plugin_from_buffer(RBin *bin, RBinFile *bf, const char *pluginname, RBuffer *buf) {
RBinPlugin *plugin = bin->force? r_bin_get_binplugin_by_name (bin, bin->force): NULL;
if (plugin) {
return plugin;
}
plugin = pluginname? r_bin_get_binplugin_by_name (bin, pluginname): NULL;
if (plugin) {
... | null | null | 267,956 | 215812811139165702455696047759219823417 | 15 | Fix integer overflow in string search causing oobread ##crash
* Reported by @greatergoodest via huntrdev
* BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04
* Reproducer bfileovf | other |
radare2 | 193f4fe01d7f626e2ea937450f2e0c4604420e9d | 0 | R_API RBinFile *r_bin_file_find_by_fd(RBin *bin, ut32 bin_fd) {
RListIter *iter;
RBinFile *bf;
r_return_val_if_fail (bin, NULL);
r_list_foreach (bin->binfiles, iter, bf) {
if (bf->fd == bin_fd) {
return bf;
}
}
return NULL;
} | null | null | 267,963 | 35348010251906534441404139902219682378 | 13 | Fix integer overflow in string search causing oobread ##crash
* Reported by @greatergoodest via huntrdev
* BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04
* Reproducer bfileovf | other |
uftpd | 0fb2c031ce0ace07cc19cd2cb2143c4b5a63c9dd | 0 | static int do_abort(ctrl_t *ctrl)
{
if (ctrl->d || ctrl->d_num) {
uev_io_stop(&ctrl->data_watcher);
if (ctrl->d_num > 0)
free(ctrl->d);
ctrl->d_num = 0;
ctrl->d = NULL;
ctrl->i = 0;
if (ctrl->file)
free(ctrl->file);
ctrl->file = NULL;
}
if (ctrl->file) {
uev_io_stop(&ctrl->data_watcher);
fr... | null | null | 273,924 | 321756024100513914410711700288874310687 | 31 | FTP: Fix buffer overflow in PORT parser, reported by Aaron Esau
Signed-off-by: Joachim Nilsson <troglobit@gmail.com> | other |
gerbv | 319a8af890e4d0a5c38e6d08f510da8eefc42537 | 0 | callbacks_open_activate(GtkMenuItem *menuitem, gpointer user_data)
{
GSList *fns = NULL;
screen.win.gerber =
gtk_file_chooser_dialog_new (
_("Open Gerbv project, Gerber, drill, "
"or pick&place files"),
NULL, GTK_FILE_CHOOSER_ACTION_OPEN,
GTK_STOCK_CANCEL, GTK_RESPONSE_CANCEL,
GTK_STOCK_OPEN, GT... | null | null | 274,749 | 10546569675352686049676335445411764791 | 31 | Remove local alias to parameter array
Normalizing access to `gerbv_simplified_amacro_t::parameter` as a step to fix CVE-2021-40402 | other |
date | 8f2d7a0c7e52cea8333824bd527822e5449ed83d | 0 | d_lite_inspect_raw(VALUE self)
{
get_d1(self);
return mk_inspect_raw(dat, rb_obj_class(self));
} | null | null | 294,629 | 79567068934892548582210724174282211440 | 5 | `Date._<format>(nil)` should return an empty Hash
Fix: https://github.com/ruby/date/issues/39
This is how versions previous to 3.2.1 behaved and Active Support
currently rely on this behavior.
https://github.com/rails/rails/blob/90357af08048ef5076730505f6e7b14a81f33d0c/activesupport/lib/active_support/values/time_zo... | other |
exim | e2f5dc151e2e79058e93924e6d35510557f0535d | 0 | read_named_list(tree_node **anchorp, int *numberp, int max, uschar *s,
uschar *tname)
{
BOOL forcecache = FALSE;
uschar *ss;
tree_node *t;
namedlist_block *nb = store_get(sizeof(namedlist_block));
if (Ustrncmp(s, "_cache", 6) == 0)
{
forcecache = TRUE;
s += 6;
}
if (!isspace(*s))
log_write(0, LOG_PANIC_DI... | null | null | 299,895 | 16042436833134722795812694423110631061 | 48 | Check configure file permissions even for non-default files if still privileged
(Bug 1044, CVE-2010-4345) | other |
linux | d6d86830705f173fca6087a3e67ceaf68db80523 | 0 | static int tipc_sk_insert(struct tipc_sock *tsk)
{
struct sock *sk = &tsk->sk;
struct net *net = sock_net(sk);
struct tipc_net *tn = net_generic(net, tipc_net_id);
u32 remaining = (TIPC_MAX_PORT - TIPC_MIN_PORT) + 1;
u32 portid = prandom_u32() % remaining + TIPC_MIN_PORT;
while (remaining--) {
portid++;
if (... | null | null | 300,817 | 49892430050799669092879530873298978246 | 22 | net ticp:fix a kernel-infoleak in __tipc_sendmsg()
struct tipc_socket_addr.ref has a 4-byte hole,and __tipc_getname() currently
copying it to user space,causing kernel-infoleak.
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in instrument_c... | other |
ncurses | 790a85dbd4a81d5f5d8dd02a44d84f01512ef443 | 0 | set_conversions(TTY * tty_settings)
{
#ifdef ONLCR
tty_settings->c_oflag |= ONLCR;
#endif
tty_settings->c_iflag |= ICRNL;
tty_settings->c_lflag |= ECHO;
#ifdef OXTABS
tty_settings->c_oflag |= OXTABS;
#endif /* OXTABS */
/* test used to be tgetflag("NL") */
if (VALID_STRING(newline) && newline[0... | null | null | 309,899 | 311391480107612379888923697780274498645 | 26 | ncurses 6.2 - patch 20200531
+ correct configure version-check/warnng for g++ to allow for 10.x
+ re-enable "bel" in konsole-base (report by Nia Huang)
+ add linux-s entry (patch by Alexandre Montaron).
+ drop long-obsolete convert_configure.pl
+ add test/test_parm.c, for checking tparm changes.
+ improve parameter-ch... | other |
ncurses | 790a85dbd4a81d5f5d8dd02a44d84f01512ef443 | 0 | skip_delay(char *s)
{
while (*s == '/' || isdigit(UChar(*s)))
++s;
return s;
} | null | null | 310,021 | 111765975845851947072863777002864995611 | 6 | ncurses 6.2 - patch 20200531
+ correct configure version-check/warnng for g++ to allow for 10.x
+ re-enable "bel" in konsole-base (report by Nia Huang)
+ add linux-s entry (patch by Alexandre Montaron).
+ drop long-obsolete convert_configure.pl
+ add test/test_parm.c, for checking tparm changes.
+ improve parameter-ch... | other |
ncurses | 790a85dbd4a81d5f5d8dd02a44d84f01512ef443 | 0 | mouse_activate(SCREEN *sp, int on)
{
if (!on && !sp->_mouse_initialized)
return;
if (!_nc_mouse_init(sp))
return;
if (on) {
sp->_mouse_bstate = 0;
switch (sp->_mouse_type) {
case M_XTERM:
#if NCURSES_EXT_FUNCS
NCURSES_SP_NAME(keyok) (NCURSES_SP_ARGx KEY_MOUSE, on);
#endif
TPUTS_TRACE("xterm... | null | null | 310,108 | 228122921798639990128175751527020416456 | 77 | ncurses 6.2 - patch 20200531
+ correct configure version-check/warnng for g++ to allow for 10.x
+ re-enable "bel" in konsole-base (report by Nia Huang)
+ add linux-s entry (patch by Alexandre Montaron).
+ drop long-obsolete convert_configure.pl
+ add test/test_parm.c, for checking tparm changes.
+ improve parameter-ch... | other |
tor | 00fffbc1a15e2696a89c721d0c94dc333ff419ef | 0 | dirserv_get_consensus(const char *flavor_name)
{
if (!cached_consensuses)
return NULL;
return strmap_get(cached_consensuses, flavor_name);
} | null | null | 310,263 | 215315223511708647156635059924534938711 | 6 | Don't give the Guard flag to relays without the CVE-2011-2768 fix | other |
vim | d6c67629ed05aae436164eec474832daf8ba7420 | 0 | qf_new_list(qf_info_T *qi, char_u *qf_title)
{
int i;
qf_list_T *qfl;
// If the current entry is not the last entry, delete entries beyond
// the current entry. This makes it possible to browse in a tree-like
// way with ":grep".
while (qi->qf_listcount > qi->qf_curlist + 1)
qf_free(&qi->qf_... | null | null | 312,477 | 93732360710220841877453733545087850475 | 28 | patch 9.0.0260: using freed memory when using 'quickfixtextfunc' recursively
Problem: Using freed memory when using 'quickfixtextfunc' recursively.
Solution: Do not allow for recursion. | other |
vim | 395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c | 0 | nv_end(cmdarg_T *cap)
{
if (cap->arg || (mod_mask & MOD_MASK_CTRL)) // CTRL-END = goto last line
{
cap->arg = TRUE;
nv_goto(cap);
cap->count1 = 1; // to end of current line
}
nv_dollar(cap);
} | null | null | 313,833 | 113428978086857076445718800141878983962 | 10 | patch 8.2.4956: reading past end of line with "gf" in Visual block mode
Problem: Reading past end of line with "gf" in Visual block mode.
Solution: Do not include the NUL in the length. | other |
linux | 2a8859f373b0a86f0ece8ec8312607eacf12485d | 0 | static inline bool FNAME(is_last_gpte)(struct kvm_mmu *mmu,
unsigned int level, unsigned int gpte)
{
/*
* For EPT and PAE paging (both variants), bit 7 is either reserved at
* all level or indicates a huge page (ignoring CR3/EPTP). In either
* case, bit 7 being set terminates the walk.
*/
#if PTTYP... | null | null | 314,479 | 44046198089629007653487158637045629162 | 29 | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
FNAME(cmpxchg_gpte) is an inefficient mess. It is at least decent if it
can go through get_user_pages_fast(), but if it cannot then it tries to
use memremap(); that is not just terribly slow, it is also wrong because
it assumes that the VM_PFNMAP VMA ... | other |
linux | 2a8859f373b0a86f0ece8ec8312607eacf12485d | 0 | static inline unsigned FNAME(gpte_access)(u64 gpte)
{
unsigned access;
#if PTTYPE == PTTYPE_EPT
access = ((gpte & VMX_EPT_WRITABLE_MASK) ? ACC_WRITE_MASK : 0) |
((gpte & VMX_EPT_EXECUTABLE_MASK) ? ACC_EXEC_MASK : 0) |
((gpte & VMX_EPT_READABLE_MASK) ? ACC_USER_MASK : 0);
#else
BUILD_BUG_ON(ACC_EXEC_MASK != PT_PR... | null | null | 314,485 | 25615746603894343205835009457100590890 | 17 | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
FNAME(cmpxchg_gpte) is an inefficient mess. It is at least decent if it
can go through get_user_pages_fast(), but if it cannot then it tries to
use memremap(); that is not just terribly slow, it is also wrong because
it assumes that the VM_PFNMAP VMA ... | other |
net | 7892032cfe67f4bde6fc2ee967e45a8fbaf33756 | 0 | static struct ip6_tnl __rcu **__ip6gre_bucket(struct ip6gre_net *ign,
const struct __ip6_tnl_parm *p)
{
const struct in6_addr *remote = &p->raddr;
const struct in6_addr *local = &p->laddr;
unsigned int h = HASH_KEY(p->i_key);
int prio = 0;
if (!ipv6_addr_any(local))
prio |= 1;
if (!ipv6_addr_any(remote) && !... | null | null | 336,112 | 15270385349691506685460241366719163391 | 17 | ip6_gre: fix ip6gre_err() invalid reads
Andrey Konovalov reported out of bound accesses in ip6gre_err()
If GRE flags contains GRE_KEY, the following expression
*(((__be32 *)p) + (grehlen / 4) - 1)
accesses data ~40 bytes after the expected point, since
grehlen includes the size of IPv6 headers.
Let's use a "struct ... | other |
spice | ca5bbc5692e052159bce1a75f55dc60b36078749 | 0 | static RedsMigTargetClient* reds_mig_target_client_find(RedsState *reds, RedClient *client)
{
GList *l;
for (l = reds->mig_target_clients; l != NULL; l = l->next) {
RedsMigTargetClient *mig_client = (RedsMigTargetClient*) l->data;
if (mig_client->client == client) {
return mig_clie... | null | null | 336,520 | 177512632378378514037906220099719318192 | 13 | With OpenSSL 1.1: Disable client-initiated renegotiation.
Fixes issue #49
Fixes BZ#1904459
Signed-off-by: Julien Ropé <jrope@redhat.com>
Reported-by: BlackKD
Acked-by: Frediano Ziglio <fziglio@redhat.com> | other |
spice | ca5bbc5692e052159bce1a75f55dc60b36078749 | 0 | static void reds_mig_release(RedServerConfig *config)
{
if (config->mig_spice) {
g_free(config->mig_spice->cert_subject);
g_free(config->mig_spice->host);
g_free(config->mig_spice);
config->mig_spice = NULL;
}
} | null | null | 336,543 | 105940152202525552856838230907712217417 | 9 | With OpenSSL 1.1: Disable client-initiated renegotiation.
Fixes issue #49
Fixes BZ#1904459
Signed-off-by: Julien Ropé <jrope@redhat.com>
Reported-by: BlackKD
Acked-by: Frediano Ziglio <fziglio@redhat.com> | other |
tty | 15b3cd8ef46ad1b100e0d3c7e38774f330726820 | 0 | int con_copy_unimap(struct vc_data *dst_vc, struct vc_data *src_vc)
{
struct uni_pagedir *q;
if (!*src_vc->vc_uni_pagedir_loc)
return -EINVAL;
if (*dst_vc->vc_uni_pagedir_loc == *src_vc->vc_uni_pagedir_loc)
return 0;
con_free_unimap(dst_vc);
q = *src_vc->vc_uni_pagedir_loc;
q->refcount++;
*dst_vc->vc_uni_pa... | null | null | 345,210 | 111635185053533606181053014468092583454 | 14 | Revert "consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c"
This reverts commit 84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac.
con_insert_unipair() is working with a sparse 3-dimensional array:
- p->uni_pgdir[] is the top layer
- p1 points to a middle layer
- p2 points to a bottom layer
If it needs to a... | other |
linux | 1d0688421449718c6c5f46e458a378c9b530ba18 | 0 | static int virtbt_probe(struct virtio_device *vdev)
{
vq_callback_t *callbacks[VIRTBT_NUM_VQS] = {
[VIRTBT_VQ_TX] = virtbt_tx_done,
[VIRTBT_VQ_RX] = virtbt_rx_done,
};
const char *names[VIRTBT_NUM_VQS] = {
[VIRTBT_VQ_TX] = "tx",
[VIRTBT_VQ_RX] = "rx",
};
struct virtio_bluetooth *vbt;
struct hci_dev *hdev;... | null | null | 349,525 | 129546000597670610909112769484114841455 | 116 | Bluetooth: virtio_bt: fix memory leak in virtbt_rx_handle()
On the reception of packets with an invalid packet type, the memory of
the allocated socket buffers is never freed. Add a default case that frees
these to avoid a memory leak.
Fixes: afd2daa26c7a ("Bluetooth: Add support for virtio transport driver")
Signed-... | other |
poppler | b224e2f5739fe61de9fa69955d016725b2a4b78d | 0 | void SplashOutputDev::setOverprintMask(GfxColorSpace *colorSpace,
bool overprintFlag,
int overprintMode,
const GfxColor *singleColor,
bool grayIndexed) {
#ifdef SPLASH_CMYK
unsigned int mask;
GfxCMYK cmyk;
bool additive = false;
int i;
if (colorSpace->getMode() == ... | null | null | 353,148 | 211313924904805379136813267926417891874 | 63 | SplashOutputDev::tilingPatternFill: Fix crash on broken file
Issue #802 | other |
linux | a2ef990ab5a6705a356d146dd773a3b359787497 | 0 | static struct mm_struct *__check_mem_permission(struct task_struct *task)
{
struct mm_struct *mm;
mm = get_task_mm(task);
if (!mm)
return ERR_PTR(-EINVAL);
/*
* A task can always look at itself, in case it chooses
* to use system calls instead of load instructions.
*/
if (task == current)
return mm;
... | null | null | 369,945 | 32400825679336594106152712477471029748 | 34 | proc: fix null pointer deref in proc_pid_permission()
get_proc_task() can fail to search the task and return NULL,
put_task_struct() will then bomb the kernel with following oops:
BUG: unable to handle kernel NULL pointer dereference at 0000000000000010
IP: [<ffffffff81217d34>] proc_pid_permission+0x64/0xe0
PGD... | other |
qcad | 1eeffc5daf5a06cf6213ffc19e95923cdebb2eb8 | 0 | void DL_Dxf::addMText(DL_CreationInterface* creationInterface) {
double angle = 0.0;
if (hasValue(50)) {
if (libVersion<=0x02000200) {
// wrong but compatible with dxflib <=2.0.2.0 (angle stored in rad):
angle = getRealValue(50, 0.0);
} else {
angle = (getRea... | null | null | 386,560 | 46338429322259655153929301092741538110 | 54 | check vertexIndex which might be -1 for broken DXF | other |
linux | 5934d9a0383619c14df91af8fd76261dc3de2f5f | 0 | static int snd_ctl_elem_list_user(struct snd_card *card,
struct snd_ctl_elem_list __user *_list)
{
struct snd_ctl_elem_list list;
int err;
if (copy_from_user(&list, _list, sizeof(list)))
return -EFAULT;
err = snd_ctl_elem_list(card, &list);
if (err)
return err;
if (copy_to_user(_list, &list, sizeof(lis... | null | null | 387,581 | 63256158084291611402985334955951385448 | 16 | ALSA: control: Re-order bounds checking in get_ctl_id_hash()
These two checks are in the reverse order so it might read one element
beyond the end of the array. First check if the "i" is within bounds
before using it.
Fixes: 6ab55ec0a938 ("ALSA: control: Fix an out-of-bounds bug in get_ctl_id_hash()")
Signed-off-by:... | other |
vim | 1e56bda9048a9625bce6e660938c834c5c15b07d | 0 | check_for_dict_arg(typval_T *args, int idx)
{
if (args[idx].v_type != VAR_DICT)
{
semsg(_(e_dict_required_for_argument_nr), idx + 1);
return FAIL;
}
return OK;
} | null | null | 389,713 | 141080721318029071675117420640599644779 | 9 | patch 9.0.0104: going beyond allocated memory when evaluating string constant
Problem: Going beyond allocated memory when evaluating string constant.
Solution: Properly skip over <Key> form. | other |
vim | 1e56bda9048a9625bce6e660938c834c5c15b07d | 0 | check_for_bool_arg(typval_T *args, int idx)
{
if (args[idx].v_type != VAR_BOOL
&& !(args[idx].v_type == VAR_NUMBER
&& (args[idx].vval.v_number == 0
|| args[idx].vval.v_number == 1)))
{
semsg(_(e_bool_required_for_argument_nr), idx + 1);
return FAIL;
}
return OK;
} | null | null | 389,727 | 18860959565384722997224499968636100802 | 12 | patch 9.0.0104: going beyond allocated memory when evaluating string constant
Problem: Going beyond allocated memory when evaluating string constant.
Solution: Properly skip over <Key> form. | other |
squirrel | a6413aa690e0bdfef648c68693349a7b878fe60d | 0 | static SQInteger base_seterrorhandler(HSQUIRRELVM v)
{
sq_seterrorhandler(v);
return 0;
} | null | null | 393,481 | 178112983592969439257590626914183686801 | 5 | fix in thread.call | other |
linux | f227e3ec3b5cad859ad15666874405e8c1bbc1d4 | 0 | static void timer_sync_wait_running(struct timer_base *base)
{
if (atomic_read(&base->timer_waiters)) {
spin_unlock(&base->expiry_lock);
spin_lock(&base->expiry_lock);
}
} | null | null | 401,512 | 176891829193256923285135254041913515459 | 7 | random32: update the net random state on interrupt and activity
This modifies the first 32 bits out of the 128 bits of a random CPU's
net_rand_state on interrupt or CPU activity to complicate remote
observations that could lead to guessing the network RNG's internal
state.
Note that depending on some network devices'... | other |
at-spi2-core | c2e87fe00b596dba20c9d57d406ab8faa744b15a | 0 | on_name_lost (GDBusConnection *connection,
const gchar *name,
gpointer user_data)
{
A11yBusLauncher *app = user_data;
if (app->session_bus == NULL
&& connection == NULL
&& app->a11y_launch_error_message == NULL)
app->a11y_launch_error_message = g_strdup ("Fail... | null | null | 411,796 | 209162272483935417248155158643498161858 | 11 | Fix inverted logic.
Don't write more into a buffer than it can hold.
https://bugzilla.gnome.org/show_bug.cgi?id=791124 | other |
gnupg | b0b3803e8c2959dd67ca96debc54b5c6464f0d41 | 0 | pin_cb (void *opaque, const char *info, char **retstr)
{
assuan_context_t ctx = opaque;
char *command;
int rc;
unsigned char *value;
size_t valuelen;
if (!retstr)
{
/* We prompt for pinpad entry. To make sure that the popup has
been show we use an inquire and not just a status message.
... | null | null | 415,207 | 339532838092181681955556042023008325329 | 56 | scd: Avoid double-free on error condition in scd
* scd/command.c (cmd_readkey): avoid double-free of cert
--
When ksba_cert_new() fails, cert will be double-freed.
Debian-Bug-Id: 773471
Original patch changed by wk to do the free only at leave. | other |
MilkyTracker | 7afd55c42ad80d01a339197a2d8b5461d214edaf | 0 | void PlayerGeneric::enable(PlayModeOptions option, bool b)
{
ASSERT(option>=PlayModeOptionFirst && option<PlayModeOptionLast);
options[option] = b;
if (player)
player->enable(option, b);
} | null | null | 417,067 | 225622941726678529531855917956910537431 | 8 | Fix use-after-free in PlayerGeneric destructor | other |
file | 46a8443f76cec4b41ec736eca396984c74664f84 | 0 | cdf_swap_dir(cdf_directory_t *d)
{
d->d_namelen = CDF_TOLE2(d->d_namelen);
d->d_left_child = CDF_TOLE4(CAST(uint32_t, d->d_left_child));
d->d_right_child = CDF_TOLE4(CAST(uint32_t, d->d_right_child));
d->d_storage = CDF_TOLE4(CAST(uint32_t, d->d_storage));
d->d_storage_uuid[0] = CDF_TOLE8(d->d_storage_uuid[0]);
d... | null | null | 427,718 | 267598963095433805790413638791896858364 | 15 | Limit the number of elements in a vector (found by oss-fuzz) | other |
linux | 9b0971ca7fc75daca80c0bb6c02e96059daea90a | 0 | int svm_register_enc_region(struct kvm *kvm,
struct kvm_enc_region *range)
{
struct kvm_sev_info *sev = &to_kvm_svm(kvm)->sev_info;
struct enc_region *region;
int ret = 0;
if (!sev_guest(kvm))
return -ENOTTY;
/* If kvm is mirroring encryption context it isn't responsible for it */
if (is_mirroring_enc_... | null | null | 427,818 | 37735299863907632866603568494697437605 | 49 | KVM: SEV-ES: fix another issue with string I/O VMGEXITs
If the guest requests string I/O from the hypervisor via VMGEXIT,
SW_EXITINFO2 will contain the REP count. However, sev_es_string_io
was incorrectly treating it as the size of the GHCB buffer in
bytes.
This fixes the "outsw" test in the experimental SEV tests o... | other |
unicorn | 3d3deac5e6d38602b689c4fef5dac004f07a2e63 | 0 | static bool subpage_accepts(struct uc_struct *uc, void *opaque, hwaddr addr,
unsigned len, bool is_write,
MemTxAttrs attrs)
{
subpage_t *subpage = opaque;
#if defined(DEBUG_SUBPAGE)
printf("%s: subpage %p %c len %u addr " TARGET_FMT_plx "\n",
__... | null | null | 432,168 | 63967631870418926600391921964457441366 | 13 | Fix crash when mapping a big memory and calling uc_close | other |
linux | 89c2b3b74918200e46699338d7bcc19b1ea12110 | 0 | static void __io_commit_cqring_flush(struct io_ring_ctx *ctx)
{
if (ctx->off_timeout_used)
io_flush_timeouts(ctx);
if (ctx->drain_active)
io_queue_deferred(ctx);
} | null | null | 436,068 | 340010207469402300024205814911386979974 | 7 | io_uring: reexpand under-reexpanded iters
[ 74.211232] BUG: KASAN: stack-out-of-bounds in iov_iter_revert+0x809/0x900
[ 74.212778] Read of size 8 at addr ffff888025dc78b8 by task
syz-executor.0/828
[ 74.214756] CPU: 0 PID: 828 Comm: syz-executor.0 Not tainted
5.14.0-rc3-next-20210730 #1
[ 74.216525] Hardware n... | other |
ImageMagick6 | 210474b2fac6a661bfa7ed563213920e93e76395 | 0 | ModuleExport size_t RegisterPNMImage(void)
{
MagickInfo
*entry;
entry=SetMagickInfo("PAM");
entry->decoder=(DecodeImageHandler *) ReadPNMImage;
entry->encoder=(EncodeImageHandler *) WritePNMImage;
entry->description=ConstantString("Common 2-dimensional bitmap format");
entry->mime_type=ConstantString("... | null | null | 439,066 | 94264172621879694387592603491954916518 | 50 | Fix ultra rare but potential memory-leak | other |
spice | a4a16ac42d2f19a17e36556546aa94d5cd83745f | 0 | static void print_memslots(RedMemSlotInfo *info)
{
int i;
int x;
for (i = 0; i < info->num_memslots_groups; ++i) {
for (x = 0; x < info->num_memslots; ++x) {
if (!info->mem_slots[i][x].virt_start_addr &&
!info->mem_slots[i][x].virt_end_addr) {
continue;
... | null | null | 442,582 | 151001726244296520622555241676922871542 | 18 | memslot: Fix off-by-one error in group/slot boundary check
RedMemSlotInfo keeps an array of groups, and each group contains an
array of slots. Unfortunately, these checks are off by 1, they check
that the index is greater or equal to the number of elements in the
array, while these arrays are 0 based. The check should... | other |
curl | 70b1900dd13d16f2e83f571407a614541d5ac9ba | 0 | static int ftpfilemethod(struct Configurable *config, char *str)
{
if(curlx_strequal("singlecwd", str))
return CURLFTPMETHOD_SINGLECWD;
if(curlx_strequal("nocwd", str))
return CURLFTPMETHOD_NOCWD;
if(curlx_strequal("multicwd", str))
return CURLFTPMETHOD_MULTICWD;
warnf(config, "unrecognized ftp file... | null | null | 442,792 | 108849185848884077742314181965388997639 | 11 | 'mytx' in bug report #1723194 (http://curl.haxx.se/bug/view.cgi?id=1723194)
pointed out that the warnf() function in the curl tool didn't properly deal
with the cases when excessively long words were used in the string to chop
up. | other |
file-roller | b147281293a8307808475e102a14857055f81631 | 0 | fr_window_set_password_for_second_archive (FrWindow *window,
const char *password)
{
g_return_if_fail (window != NULL);
if (window->priv->second_password != NULL) {
g_free (window->priv->second_password);
window->priv->second_password = NULL;
}
if ((password != NULL) && (password[0] != '\0'))
wind... | null | null | 445,869 | 40852421738713627674976957508022854528 | 13 | libarchive: sanitize filenames before extracting | other |
frr | ff6db1027f8f36df657ff2e5ea167773752537ed | 0 | bool bgp_notify_received_hard_reset(struct peer *peer, uint8_t code,
uint8_t subcode)
{
/* When the "N" bit has been exchanged, a Hard Reset message is used to
* indicate to the peer that the session is to be fully terminated.
*/
if (!bgp_has_graceful_restart_notification(peer))
return false;
if (code... | null | null | 448,548 | 173437471597660270075946890529571204456 | 14 | bgpd: Make sure hdr length is at a minimum of what is expected
Ensure that if the capability length specified is enough data.
Signed-off-by: Donald Sharp <sharpd@nvidia.com> | other |
clamav-devel | c6870a6c857dd722dffaf6d37ae52ec259d12492 | 0 | int cli_scansis(int desc, cli_ctx *ctx) {
FILE *f;
int i;
char *tmpd;
uint32_t uid[4];
cli_dbgmsg("in scansis()\n");
if (!(tmpd = cli_gentemp(ctx->engine->tmpdir)))
return CL_ETMPDIR;
if (mkdir(tmpd, 0700)) {
cli_dbgmsg("SIS: Can't create temporary directory %s\n", tmpd);
free(tmpd);
... | null | null | 449,318 | 218645672916114051254559215843708120847 | 59 | bb #6808 | other |
bash | 951bdaad7a18cc0dc1036bba86b18b90874d39ff | 0 | bash_vi_complete (count, key)
int count, key;
{
#if defined (SPECIFIC_COMPLETION_FUNCTIONS)
int p, r;
char *t;
if ((rl_point < rl_end) && (!whitespace (rl_line_buffer[rl_point])))
{
if (!whitespace (rl_line_buffer[rl_point + 1]))
rl_vi_end_word (1, 'E');
rl_point++;
}
/* Find boundar... | null | null | 455,358 | 139310507451300935907578564904967929900 | 49 | commit bash-20190628 snapshot | other |
linux | 30e29a9a2bc6a4888335a6ede968b75cd329657a | 0 | static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs,
u64 *ips, u32 trace_nr, bool user)
{
int i;
struct vm_area_struct *vma;
bool irq_work_busy = false;
struct stack_map_irq_work *work = NULL;
if (irqs_disabled()) {
if (!IS_ENABLED(CONFIG_PREEMPT_RT)) {
work = this_cpu_ptr(&up... | null | null | 459,520 | 218331281774651464479696581807373915903 | 72 | bpf: Fix integer overflow in prealloc_elems_and_freelist()
In prealloc_elems_and_freelist(), the multiplication to calculate the
size passed to bpf_map_area_alloc() could lead to an integer overflow.
As a result, out-of-bounds write could occur in pcpu_freelist_populate()
as reported by KASAN:
[...]
[ 16.968613] BU... | other |
atril | f4291fd62f7dfe6460d2406a979ccfac0c68dd59 | 0 | comics_document_get_page_size (EvDocument *document,
EvPage *page,
double *width,
double *height)
{
GdkPixbufLoader *loader;
char **argv;
guchar buf[1024];
gboolean success, got_size = FALSE;
gint outpipe = -1;
GPid child_pid;
gssize bytes;
GdkPixbuf *pixbuf;
gchar *fi... | null | null | 463,033 | 42093752426338562510575554408611838860 | 67 | comics: make the files containing "--checkpoint-action=" unsupported
Fixes #257 | other |
kvm | e28ba7bb020f07193bc000453c8775e9d2c0dda7 | 0 | static void string_addr_inc(struct x86_emulate_ctxt *ctxt, unsigned seg,
int reg, struct operand *op)
{
int df = (ctxt->eflags & EFLG_DF) ? -1 : 1;
register_address_increment(ctxt, &ctxt->regs[reg], df * op->bytes);
op->addr.mem.ea = register_address(ctxt, ctxt->regs[reg]);
op->addr.mem.seg = seg;
} | null | null | 466,141 | 279937378381120723563750678467533571246 | 9 | KVM: x86: fix missing checks in syscall emulation
On hosts without this patch, 32bit guests will crash (and 64bit guests
may behave in a wrong way) for example by simply executing following
nasm-demo-application:
[bits 32]
global _start
SECTION .text
_start: syscall
(I tested it with winxp and linux ... | other |
linux | 75e5b4849b81e19e9efe1654b30d7f3151c33c2c | 0 | void usb_remove_config(struct usb_composite_dev *cdev,
struct usb_configuration *config)
{
unsigned long flags;
spin_lock_irqsave(&cdev->lock, flags);
if (cdev->config == config)
reset_config(cdev);
spin_unlock_irqrestore(&cdev->lock, flags);
remove_config(cdev, config);
} | null | null | 476,112 | 158127452115525305672838329101128620567 | 14 | USB: gadget: validate interface OS descriptor requests
Stall the control endpoint in case provided index exceeds array size of
MAX_CONFIG_INTERFACES or when the retrieved function pointer is null.
Signed-off-by: Szymon Heidrich <szymon.heidrich@gmail.com>
Cc: stable@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregk... | other |
radare2 | 9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | 0 | R_API RBinJavaAttrInfo *r_bin_java_line_number_table_attr_new(RBinJavaObj *bin, ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 curpos, offset = 0;
RBinJavaLineNumberAttribute *lnattr;
if (sz < 6) {
return NULL;
}
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (bin, buffer, sz, buf_offset);
if ... | null | null | 477,370 | 119348967668166951269710852739156757728 | 43 | Fix oobread segfault in java arith8.class ##crash
* Reported by Cen Zhang via huntr.dev | other |
radare2 | 9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | 0 | R_API void r_bin_java_reset_bin_info(RBinJavaObj *bin) {
free (bin->cf2.flags_str);
free (bin->cf2.this_class_name);
r_list_free (bin->imports_list);
r_list_free (bin->methods_list);
r_list_free (bin->fields_list);
r_list_free (bin->attrs_list);
r_list_free (bin->cp_list);
r_list_free (bin->interfaces_list);
r... | null | null | 477,386 | 257880697052646704196395827734415534903 | 21 | Fix oobread segfault in java arith8.class ##crash
* Reported by Cen Zhang via huntr.dev | other |
liblouis | 2e4772befb2b1c37cb4b9d6572945115ee28630a | 0 | compileGrouping(FileInfo *file, int noback, int nofor, TranslationTableHeader **table,
DisplayTableHeader **displayTable) {
int k;
CharsString name;
CharsString groupChars;
CharsString groupDots;
CharsString dotsParsed;
if (!getToken(file, &name, "name operand")) return 0;
if (!getRuleCharsText(file, &groupCha... | null | null | 482,489 | 184745494045006716627734704064241271128 | 60 | Prevent an invalid memory writes in compileRule
Thanks to Han Zheng for reporting it
Fixes #1214 | other |
linux-2.6 | 9926e4c74300c4b31dee007298c6475d33369df0 | 0 | static int set_one_prio(struct task_struct *p, int niceval, int error)
{
int no_nice;
if (p->uid != current->euid &&
p->euid != current->euid && !capable(CAP_SYS_NICE)) {
error = -EPERM;
goto out;
}
if (niceval < task_nice(p) && !can_nice(p, niceval)) {
error = -EACCES;
goto out;
}
no_nice = security_t... | CWE-20 | null | 487,649 | 175074766187818791589639418717951159110 | 24 | CPU time limit patch / setrlimit(RLIMIT_CPU, 0) cheat fix
As discovered here today, the change in Kernel 2.6.17 intended to inhibit
users from setting RLIMIT_CPU to 0 (as that is equivalent to unlimited) by
"cheating" and setting it to 1 in such a case, does not make a difference,
as the check is done in the wrong pla... | other |
openssl | cca1cd9a3447dd067503e4a85ebd1679ee78a48e | 0 | kssl_TKT2tkt( /* IN */ krb5_context krb5context,
/* IN */ KRB5_TKTBODY *asn1ticket,
/* OUT */ krb5_ticket **krb5ticket,
/* OUT */ KSSL_ERR *kssl_err )
{
krb5_error_code krb5rc = KRB5KRB_ERR_GENERIC;
krb5_ticket *new5ticket = NULL;
ASN1_GENERALSTRING *gstr_svc, *gstr_host;
... | CWE-20 | null | 500,056 | 16422261560787497011814600734339799474 | 70 | Submitted by: Tomas Hoger <thoger@redhat.com>
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted). | other |
openssl | cca1cd9a3447dd067503e4a85ebd1679ee78a48e | 0 | print_krb5_authdata(char *label, krb5_authdata **adata)
{
if (adata == NULL)
{
printf("%s, authdata==0\n", label);
return;
}
printf("%s [%p]\n", label, (void *)adata);
#if 0
{
int i;
printf("%s[at%d:%d] ", label, adata->ad_type, adata->length);
for (i=0; i < adata->length; i+... | CWE-20 | null | 500,075 | 183101211022783597999868632812091193726 | 21 | Submitted by: Tomas Hoger <thoger@redhat.com>
Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
could be crashed if the relevant tables were not present (e.g. chrooted). | other |
core | 69ad3c902ea4bbf9f21ab1857d8923f975dc6145 | 0 | rpa_read_buffer(pool_t pool, const unsigned char **data,
const unsigned char *end, unsigned char **buffer)
{
const unsigned char *p = *data;
unsigned int len;
if (p > end)
return 0;
len = *p++;
if (p + len > end || len == 0)
return 0;
*buffer = p_malloc(pool, len);
memcpy(*buffer, p, len);
*data += 1 ... | CWE-125 | null | 506,428 | 339411141889199958173804859413175563009 | 20 | auth: mech-rpa - Fail on zero len buffer | other |
server | 0168d1eda30dad4b517659422e347175eb89e923 | 0 | void promote_select_describe_flag_if_needed(LEX *lex)
{
if (lex->describe)
{
lex->select_lex.options |= SELECT_DESCRIBE;
}
} | null | 508,380 | 44316068689065413397010145560216090514 | 7 | MDEV-25766 Unused CTE lead to a crash in find_field_in_tables/find_order_in_list
Do not assume that subquery Item always present. | other | |
server | 0168d1eda30dad4b517659422e347175eb89e923 | 0 | Field *find_field_in_table_sef(TABLE *table, const char *name)
{
Field **field_ptr;
if (table->s->name_hash.records)
{
field_ptr= (Field**)my_hash_search(&table->s->name_hash,(uchar*) name,
strlen(name));
if (field_ptr)
{
/*
field_ptr points to fiel... | null | 508,409 | 34330718272183626264179761641215101680 | 29 | MDEV-25766 Unused CTE lead to a crash in find_field_in_tables/find_order_in_list
Do not assume that subquery Item always present. | other | |
server | 807945f2eb5fa22e6f233cc17b85a2e141efe2c8 | 0 | Item_date_literal_for_invalid_dates(THD *thd, const Date *ltime)
:Item_date_literal(thd, ltime)
{
maybe_null= false;
} | CWE-617 | null | 512,516 | 54308002906361432365810863007565647826 | 5 | MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order...
When doing condition pushdown from HAVING into WHERE,
Item_equal::create_pushable_equalities() calls
item->set_extraction_flag(IMMUTABLE_FL) for constant items.
Then, Item::cleanup_excluding_immutables_processor() checks for this flag
to see ... | other |
server | 807945f2eb5fa22e6f233cc17b85a2e141efe2c8 | 0 | const Type_handler *type_handler() const
{
return Type_handler::get_handler_by_field_type(int_field_type);
} | CWE-617 | null | 512,670 | 320212748104616102966869388990600827457 | 4 | MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order...
When doing condition pushdown from HAVING into WHERE,
Item_equal::create_pushable_equalities() calls
item->set_extraction_flag(IMMUTABLE_FL) for constant items.
Then, Item::cleanup_excluding_immutables_processor() checks for this flag
to see ... | other |
server | 807945f2eb5fa22e6f233cc17b85a2e141efe2c8 | 0 | Item_bool_rowready_func2* Eq_creator::create_swap(THD *thd, Item *a, Item *b) const
{
return new(thd->mem_root) Item_func_eq(thd, b, a);
} | CWE-617 | null | 512,983 | 286250761033775663381012619805177298974 | 4 | MDEV-26402: A SEGV in Item_field::used_tables/update_depend_map_for_order...
When doing condition pushdown from HAVING into WHERE,
Item_equal::create_pushable_equalities() calls
item->set_extraction_flag(IMMUTABLE_FL) for constant items.
Then, Item::cleanup_excluding_immutables_processor() checks for this flag
to see ... | other |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.