Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringlengths
13
16
hash
stringlengths
40
40
repo_url
stringlengths
56
159
cve_description
stringlengths
30
33
cvss2_base_score
null
cvss3_base_score
null
published_date
null
severity
null
cwe_id
stringclasses
171 values
cwe_name
stringclasses
1 value
cwe_description
stringclasses
1 value
commit_message
stringlengths
17
20
commit_date
null
version_tag
null
repo_total_files
null
repo_total_commits
null
file_paths
stringlengths
8
104
language
stringclasses
2 values
diff_stats
stringlengths
48
146
diff_with_context
null
vulnerable_code
stringlengths
10
83k
fixed_code
stringlengths
8
83.3k
security_keywords
stringclasses
1 value
CVE-2016-2538
7381aa893c7974195fb964c328d74b63a03953ab
https://github.com/qemu/qemu/commit/fe3c546c5ff2a6210f9a4d8561cc64051ca8603e
Vulnerability in CVE-2016-2538
null
null
null
null
CWE-189
Fix CVE-2016-2538
null
null
null
null
["hw/usb/dev-network.c"]
C
{"hw/usb/dev-network.c": {"lines_added": 45, "lines_deleted": 44}}
null
static int rndis_query_response(USBNetState *s, rndis_query_msg_type *buf, unsigned int length) { rndis_query_cmplt_type *resp; /* oid_supported_list is the largest data reply */ uint8_t infobuf[sizeof(oid_supported_list)]; uint32_t bufoffs, buflen; int infobuflen; unsigned int r...
static int rndis_query_response(USBNetState *s, rndis_query_msg_type *buf, unsigned int length) { rndis_query_cmplt_type *resp; /* oid_supported_list is the largest data reply */ uint8_t infobuf[sizeof(oid_supported_list)]; uint32_t bufoffs, buflen; int infobuflen; unsigned int r...
[]
CVE-2016-2538
76a04b79622385425afe6b68d6f549247ddb877c
https://github.com/qemu/qemu/commit/fe3c546c5ff2a6210f9a4d8561cc64051ca8603e
Vulnerability in CVE-2016-2538
null
null
null
null
CWE-189
Fix CVE-2016-2538
null
null
null
null
["hw/usb/dev-network.c"]
C
{"hw/usb/dev-network.c": {"lines_added": 31, "lines_deleted": 30}}
null
static int rndis_set_response(USBNetState *s, rndis_set_msg_type *buf, unsigned int length) { rndis_set_cmplt_type *resp = rndis_queue_response(s, sizeof(rndis_set_cmplt_type)); uint32_t bufoffs, buflen; int ret; if (!resp) return USB_RET_STALL; bufoffs = le32_t...
static int rndis_set_response(USBNetState *s, rndis_set_msg_type *buf, unsigned int length) { rndis_set_cmplt_type *resp = rndis_queue_response(s, sizeof(rndis_set_cmplt_type)); uint32_t bufoffs, buflen; int ret; if (!resp) return USB_RET_STALL; bufoffs = le32_t...
[]
CVE-2016-2538
8ef1d95d4604e5e32f8e9af794ffa351c27df08b
https://github.com/qemu/qemu/commit/fe3c546c5ff2a6210f9a4d8561cc64051ca8603e
Vulnerability in CVE-2016-2538
null
null
null
null
CWE-189
Fix CVE-2016-2538
null
null
null
null
["hw/usb/dev-network.c"]
C
{"hw/usb/dev-network.c": {"lines_added": 39, "lines_deleted": 38}}
null
static void usb_net_handle_dataout(USBNetState *s, USBPacket *p) { int sz = sizeof(s->out_buf) - s->out_ptr; struct rndis_packet_msg_type *msg = (struct rndis_packet_msg_type *) s->out_buf; uint32_t len; #ifdef TRAFFIC_DEBUG fprintf(stderr, "usbnet: data out len %zu\n", p->iov.size); io...
static void usb_net_handle_dataout(USBNetState *s, USBPacket *p) { int sz = sizeof(s->out_buf) - s->out_ptr; struct rndis_packet_msg_type *msg = (struct rndis_packet_msg_type *) s->out_buf; uint32_t len; #ifdef TRAFFIC_DEBUG fprintf(stderr, "usbnet: data out len %zu\n", p->iov.size); io...
[]
CVE-2016-2841
c850d0af2e3aef52362f6400c3db026d6aa23791
https://github.com/qemu/qemu/commit/415ab35a441eca767d033a2702223e785b9d5190
Vulnerability in CVE-2016-2841
null
null
null
null
CWE-20
Fix CVE-2016-2841
null
null
null
null
["hw/net/ne2000.c"]
C
{"hw/net/ne2000.c": {"lines_added": 18, "lines_deleted": 14}}
null
static int ne2000_buffer_full(NE2000State *s) { int avail, index, boundary; index = s->curpag << 8; boundary = s->boundary << 8; if (index < boundary) avail = boundary - index; else avail = (s->stop - s->start) - (index - boundary); if (avail < (MAX_ETH_FRAME_SIZE + 4)) ...
static int ne2000_buffer_full(NE2000State *s) { int avail, index, boundary; if (s->stop <= s->start) { return 1; } index = s->curpag << 8; boundary = s->boundary << 8; if (index < boundary) avail = boundary - index; else avail = (s->stop - s->start) - (index - bound...
[]
CVE-2016-2841
bcd29f20ad400b95990dac5f741c4bf70e6f6e8a
https://github.com/qemu/qemu/commit/415ab35a441eca767d033a2702223e785b9d5190
Vulnerability in CVE-2016-2841
null
null
null
null
CWE-20
Fix CVE-2016-2841
null
null
null
null
["hw/net/ne2000.c"]
C
{"hw/net/ne2000.c": {"lines_added": 11, "lines_deleted": 0}}
null
null
static inline uint32_t ne2000_mem_readl(NE2000State *s, uint32_t addr) { addr &= ~1; /* XXX: check exact behaviour if not even */ if (addr < 32 || (addr >= NE2000_PMEM_START && addr + sizeof(uint32_t) <= NE2000_MEM_SIZE)) { return ldl_le_p(s->mem + addr); } else { return ...
[]
CVE-2016-2841
bcd29f20ad400b95990dac5f741c4bf70e6f6e8a
https://github.com/qemu/qemu/commit/415ab35a441eca767d033a2702223e785b9d5190
Vulnerability in CVE-2016-2841
null
null
null
null
CWE-20
Fix CVE-2016-2841
null
null
null
null
["hw/net/ne2000.c"]
C
{"hw/net/ne2000.c": {"lines_added": 10, "lines_deleted": 0}}
null
null
static inline void ne2000_mem_writel(NE2000State *s, uint32_t addr, uint32_t val) { addr &= ~1; /* XXX: check exact behaviour if not even */ if (addr < 32 || (addr >= NE2000_PMEM_START && addr + sizeof(uint32_t) <= NE2000_MEM_SIZE)) { stl_le_p(s->...
[]
CVE-2016-3062
49e83785fb9310c31438b0710bc8d017fb35867e
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 107, "lines_deleted": 106}}
null
static int mov_read_dref(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; int entries, i, j; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_data; avio_rb32(pb); // version + flags entries = avio_rb...
static int mov_read_dref(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; int entries, i, j; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_data; avio_rb32(pb); // version + flags entries = avio_rb...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 11, "lines_deleted": 0}}
null
null
static int mov_read_moov(MOVContext *c, AVIOContext *pb, MOVAtom atom) { int ret; if ((ret = mov_read_default(c, pb, atom)) < 0) return ret; /* we parsed the 'moov' atom, we can terminate the parsing as soon as we find the 'mdat' */ /* so we don't parse the whole file if over a network */ c...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 6, "lines_deleted": 0}}
null
null
static int mov_read_moof(MOVContext *c, AVIOContext *pb, MOVAtom atom) { c->fragment.moof_offset = avio_tell(pb) - 8; av_dlog(c->fc, "moof offset %"PRIx64"\n", c->fragment.moof_offset); return mov_read_default(c, pb, atom); }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 93, "lines_deleted": 0}}
null
null
static int mov_read_trak(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; int ret; st = avformat_new_stream(c->fc, NULL); if (!st) return AVERROR(ENOMEM); st->id = c->fc->nb_streams; sc = av_mallocz(sizeof(MOVStreamContext)); if (!sc) return AVERROR(EN...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 85, "lines_deleted": 0}}
null
null
static int mov_read_packet(AVFormatContext *s, AVPacket *pkt) { MOVContext *mov = s->priv_data; MOVStreamContext *sc; AVIndexEntry *sample; AVStream *st = NULL; int ret; mov->fc = s; retry: sample = mov_find_next_sample(s, &st); if (!sample) { mov->found_mdat = 0; if (!m...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 15, "lines_deleted": 0}}
null
null
static int mov_metadata_int8_bypass_padding(MOVContext *c, AVIOContext *pb, unsigned len, const char *key) { char buf[16]; /* bypass padding bytes */ avio_r8(pb); avio_r8(pb); avio_r8(pb); snprintf(buf, sizeof(buf), "%d", avio_r8(pb)); av_dict_se...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 48, "lines_deleted": 0}}
null
null
static int mov_read_header(AVFormatContext *s) { MOVContext *mov = s->priv_data; AVIOContext *pb = s->pb; int err; MOVAtom atom = { AV_RL32("root") }; mov->fc = s; /* .mov and .mp4 aren't streamable anyway (only progressive download if moov is before mdat) */ if (pb->seekable) atom....
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}}
null
null
static int mov_read_esds(MOVContext *c, AVIOContext *pb, MOVAtom atom) { return ff_mov_read_esds(c->fc, pb, atom); }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 10, "lines_deleted": 0}}
null
null
static int mov_metadata_int8_no_padding(MOVContext *c, AVIOContext *pb, unsigned len, const char *key) { char buf[16]; snprintf(buf, sizeof(buf), "%d", avio_r8(pb)); av_dict_set(&c->fc->metadata, key, buf, 0); return 0; }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 8, "lines_deleted": 0}}
null
null
static int mov_read_chan2(MOVContext *c, AVIOContext *pb, MOVAtom atom) { if (atom.size < 16) return 0; avio_skip(pb, 4); ff_mov_read_chan(c->fc, atom.size - 4, c->fc->streams[0]->codec); return 0; }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 39, "lines_deleted": 0}}
null
null
static int mov_read_close(AVFormatContext *s) { MOVContext *mov = s->priv_data; int i, j; for (i = 0; i < s->nb_streams; i++) { AVStream *st = s->streams[i]; MOVStreamContext *sc = st->priv_data; av_freep(&sc->ctts_data); for (j = 0; j < sc->drefs_count; j++) { ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 51, "lines_deleted": 0}}
null
null
static int mov_read_hdlr(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; uint32_t type; uint32_t av_unused ctype; int title_size; char *title_str; if (c->fc->nb_streams < 1) // meta before first trak return 0; st = c->fc->streams[c->fc->nb_streams-1]; avio_r8(pb)...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}}
null
null
static int mov_read_alac(MOVContext *c, AVIOContext *pb, MOVAtom atom) { return mov_read_extradata(c, pb, atom, CODEC_ID_ALAC); }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 72, "lines_deleted": 0}}
null
null
static int mov_read_stsz(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; unsigned int i, entries, sample_size, field_size, num_bytes; GetBitContext gb; unsigned char* buf; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 97, "lines_deleted": 0}}
null
null
static int mov_read_tkhd(MOVContext *c, AVIOContext *pb, MOVAtom atom) { int i; int width; int height; int64_t disp_transform[2]; int display_matrix[3][2]; AVStream *st; MOVStreamContext *sc; int version; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 18, "lines_deleted": 0}}
null
null
static int mov_metadata_track_or_disc_number(MOVContext *c, AVIOContext *pb, unsigned len, const char *key) { char buf[16]; short current, total = 0; avio_rb16(pb); // unknown current = avio_rb16(pb); if (len >= 6) total = avio_rb16(pb); if (...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 104, "lines_deleted": 0}}
null
null
static int mov_read_udta_string(MOVContext *c, AVIOContext *pb, MOVAtom atom) { #ifdef MOV_EXPORT_ALL_METADATA char tmp_key[5]; #endif char str[1024], key2[16], language[4] = {0}; const char *key = NULL; uint16_t str_size, langcode = 0; uint32_t data_type = 0; int (*parse)(MOVContext*, AVIOConte...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 30, "lines_deleted": 0}}
null
null
enum CodecID ff_mov_get_lpcm_codec_id(int bps, int flags) { if (flags & 1) { // floating point if (flags & 2) { // big endian if (bps == 32) return CODEC_ID_PCM_F32BE; else if (bps == 64) return CODEC_ID_PCM_F64BE; } else { if (bps == 32) return CODEC_ID...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 30, "lines_deleted": 0}}
null
null
static int mov_read_ftyp(MOVContext *c, AVIOContext *pb, MOVAtom atom) { uint32_t minor_ver; int comp_brand_size; char minor_ver_str[11]; /* 32 bit integer -> 10 digits + null */ char* comp_brands_str; uint8_t type[5] = {0}; avio_read(pb, type, 4); if (strcmp(type, "qt ")) c->isom ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 95, "lines_deleted": 0}}
null
null
static int mov_read_trun(MOVContext *c, AVIOContext *pb, MOVAtom atom) { MOVFragment *frag = &c->fragment; AVStream *st = NULL; MOVStreamContext *sc; MOVStts *ctts_data; uint64_t offset; int64_t dts; int data_offset = 0; unsigned entries, first_sample_flags = frag->flags; int flags, ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 16, "lines_deleted": 0}}
null
null
static int mov_metadata_gnre(MOVContext *c, AVIOContext *pb, unsigned len, const char *key) { short genre; char buf[20]; avio_r8(pb); // unknown genre = avio_r8(pb); if (genre < 1 || genre > ID3v1_GENRE_MAX) return 0; snprintf(buf, sizeof(buf), "%s", ff_id3...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 12, "lines_deleted": 0}}
null
null
static int mov_read_wfex(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; ff_get_wav_header(pb, st->codec, atom.size); return 0; }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 36, "lines_deleted": 0}}
null
null
static int mov_read_stss(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; unsigned int i, entries; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_data; avio_r8(pb); /* version */ avio_rb24(pb); /* ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 40, "lines_deleted": 0}}
null
null
static int mov_read_mvhd(MOVContext *c, AVIOContext *pb, MOVAtom atom) { time_t creation_time; int version = avio_r8(pb); /* version */ avio_rb24(pb); /* flags */ if (version == 1) { creation_time = avio_rb64(pb); avio_rb64(pb); } else { creation_time = avio_rb32(pb); ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 51, "lines_deleted": 0}}
null
null
static int mov_read_chan(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; uint8_t version; uint32_t flags, layout_tag, bitmap, num_descr, label_mask; int i; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; if (atom.size < 16) retur...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 36, "lines_deleted": 0}}
null
null
static int mov_read_tfhd(MOVContext *c, AVIOContext *pb, MOVAtom atom) { MOVFragment *frag = &c->fragment; MOVTrackExt *trex = NULL; int flags, track_id, i; avio_r8(pb); /* version */ flags = avio_rb24(pb); track_id = avio_rb32(pb); if (!track_id) return AVERROR_INVALIDDATA; fr...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 26, "lines_deleted": 0}}
null
null
static int mov_read_dvc1(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; uint8_t profile_level; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; if (atom.size >= (1<<28) || atom.size < 7) return AVERROR_INVALIDDATA; profile_level = a...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}}
null
null
static int mov_read_avss(MOVContext *c, AVIOContext *pb, MOVAtom atom) { return mov_read_extradata(c, pb, atom, CODEC_ID_AVS); }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 30, "lines_deleted": 0}}
null
null
static int mov_read_seek(AVFormatContext *s, int stream_index, int64_t sample_time, int flags) { AVStream *st; int64_t seek_timestamp, timestamp; int sample; int i; if (stream_index >= s->nb_streams) return AVERROR_INVALIDDATA; if (sample_time < 0) sample_time = 0; st = s->...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 31, "lines_deleted": 0}}
null
null
static int mov_read_enda(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; int little_endian; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; little_endian = avio_rb16(pb) & 0xFF; av_dlog(c->fc, "enda %d\n", little_endian); if (little_endi...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 24, "lines_deleted": 0}}
null
null
static int mov_read_smi(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; if ((uint64_t)atom.size > (1<<30)) return AVERROR_INVALIDDATA; // currently SVQ3 decoder expect full STSD header - s...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 29, "lines_deleted": 0}}
null
null
static int mov_read_glbl(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; if ((uint64_t)atom.size > (1<<30)) return AVERROR_INVALIDDATA; if (atom.size >= 10) { // Broken files creat...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 43, "lines_deleted": 0}}
null
null
static int mov_probe(AVProbeData *p) { unsigned int offset; uint32_t tag; int score = 0; /* check file header */ offset = 0; for (;;) { /* ignore invalid offset */ if ((offset + 8) > (unsigned int)p->buf_size) return score; tag = AV_RL32(p->buf + offset + 4);...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}}
null
null
static int mov_read_jp2h(MOVContext *c, AVIOContext *pb, MOVAtom atom) { return mov_read_extradata(c, pb, atom, CODEC_ID_JPEG2000); }
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 47, "lines_deleted": 0}}
null
null
static int mov_read_cmov(MOVContext *c, AVIOContext *pb, MOVAtom atom) { #if CONFIG_ZLIB AVIOContext ctx; uint8_t *cmov_data; uint8_t *moov_data; /* uncompressed data */ long cmov_len, moov_len; int ret = -1; avio_rb32(pb); /* dcom atom */ if (avio_rl32(pb) != MKTAG('d','c','o','m')) ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 41, "lines_deleted": 0}}
null
null
static int mov_read_elst(MOVContext *c, AVIOContext *pb, MOVAtom atom) { MOVStreamContext *sc; int i, edit_count, version, edit_start_index = 0; if (c->fc->nb_streams < 1) return 0; sc = c->fc->streams[c->fc->nb_streams-1]->priv_data; version = avio_r8(pb); /* version */ avio_rb24(pb);...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 23, "lines_deleted": 0}}
null
null
static int mov_read_strf(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; if (c->fc->nb_streams < 1) return 0; if (atom.size <= 40) return 0; st = c->fc->streams[c->fc->nb_streams-1]; if ((uint64_t)atom.size > (1<<30)) return AVERROR_INVALIDDATA; av_free(s...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 28, "lines_deleted": 0}}
null
null
static int mov_read_stps(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; unsigned i, entries; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_data; avio_rb32(pb); // version + flags entries = avio...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 39, "lines_deleted": 0}}
null
null
static int mov_read_mdhd(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; int version; char language[4] = {0}; unsigned lang; time_t creation_time; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 28, "lines_deleted": 0}}
null
null
static int mov_read_wave(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; if ((uint64_t)atom.size > (1<<30)) return AVERROR_INVALIDDATA; if (st->codec->codec_id == CODEC_ID_QDM2 || st->code...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 34, "lines_deleted": 0}}
null
null
static int mov_read_stsc(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; unsigned int i, entries; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_data; avio_r8(pb); /* version */ avio_rb24(pb); /* ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 23, "lines_deleted": 0}}
null
null
static int mov_read_trex(MOVContext *c, AVIOContext *pb, MOVAtom atom) { MOVTrackExt *trex; if ((uint64_t)c->trex_count+1 >= UINT_MAX / sizeof(*c->trex_data)) return AVERROR_INVALIDDATA; trex = av_realloc(c->trex_data, (c->trex_count+1)*sizeof(*c->trex_data)); if (!trex) return AVERROR(...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 56, "lines_deleted": 0}}
null
null
static int mov_read_stts(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; unsigned int i, entries; int64_t duration=0; int64_t total_sample_count=0; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_da...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 37, "lines_deleted": 0}}
null
null
static int mov_read_stco(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; unsigned int i, entries; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_data; avio_r8(pb); /* version */ avio_rb24(pb); /* ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 68, "lines_deleted": 0}}
null
null
static void mov_read_chapters(AVFormatContext *s) { MOVContext *mov = s->priv_data; AVStream *st = NULL; MOVStreamContext *sc; int64_t cur_pos; int i; for (i = 0; i < s->nb_streams; i++) if (s->streams[i]->id == mov->chapter_track) { st = s->streams[i]; break; ...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 12, "lines_deleted": 0}}
null
null
static void mov_metadata_creation_time(AVDictionary **metadata, time_t time) { char buffer[32]; if (time) { struct tm *ptm; time -= 2082844800; /* seconds between 1904-01-01 and Epoch */ ptm = gmtime(&time); if (!ptm) return; strftime(buffer, sizeof(buffer), "%Y-%m-%d %H...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 21, "lines_deleted": 0}}
null
null
int ff_mov_read_esds(AVFormatContext *fc, AVIOContext *pb, MOVAtom atom) { AVStream *st; int tag; if (fc->nb_streams < 1) return 0; st = fc->streams[fc->nb_streams-1]; avio_rb32(pb); /* version + flags */ ff_mp4_read_descr(fc, pb, &tag); if (tag == MP4ESDescrTag) { ff_mp4_p...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 28, "lines_deleted": 0}}
null
null
static int mov_read_extradata(MOVContext *c, AVIOContext *pb, MOVAtom atom, enum CodecID codec_id) { AVStream *st; uint64_t size; uint8_t *buf; if (c->fc->nb_streams < 1) // will happen with jp2 files return 0; st= c->fc->streams[c->fc->nb_streams-1]; if (...
[]
CVE-2016-3062
bbee8354c6384c7be291db978b673fe0eebdf4a1
https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
Vulnerability in CVE-2016-3062
null
null
null
null
CWE-119
Fix CVE-2016-3062
null
null
null
null
["libavformat/mov.c"]
C
{"libavformat/mov.c": {"lines_added": 48, "lines_deleted": 0}}
null
null
static int mov_read_ctts(MOVContext *c, AVIOContext *pb, MOVAtom atom) { AVStream *st; MOVStreamContext *sc; unsigned int i, entries; if (c->fc->nb_streams < 1) return 0; st = c->fc->streams[c->fc->nb_streams-1]; sc = st->priv_data; avio_r8(pb); /* version */ avio_rb24(pb); /* ...
[]
CVE-2016-4817
8b2c4657bb35940b8da5af7f03b524b9150fef34
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 12, "lines_deleted": 10}}
null
void close_connection(h2o_http2_conn_t *conn) { conn->state = H2O_HTTP2_CONN_STATE_IS_CLOSING; if (conn->_write.buf_in_flight != NULL || h2o_timeout_is_linked(&conn->_write.timeout_entry)) { /* there is a pending write, let on_write_complete actually close the connection */ } else { close_c...
int close_connection(h2o_http2_conn_t *conn) { conn->state = H2O_HTTP2_CONN_STATE_IS_CLOSING; if (conn->_write.buf_in_flight != NULL || h2o_timeout_is_linked(&conn->_write.timeout_entry)) { /* there is a pending write, let on_write_complete actually close the connection */ } else { close_co...
[]
CVE-2016-4817
2b3b80948d3a8aa0890f6ff300d1b487e783e085
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 38, "lines_deleted": 38}}
null
static void parse_input(h2o_http2_conn_t *conn) { size_t http2_max_concurrent_requests_per_connection = conn->super.ctx->globalconf->http2.max_concurrent_requests_per_connection; int perform_early_exit = 0; if (conn->num_streams.pull.half_closed + conn->num_streams.push.half_closed != http2_max_concurrent_...
static int parse_input(h2o_http2_conn_t *conn) { size_t http2_max_concurrent_requests_per_connection = conn->super.ctx->globalconf->http2.max_concurrent_requests_per_connection; int perform_early_exit = 0; if (conn->num_streams.pull.half_closed + conn->num_streams.push.half_closed != http2_max_concurrent_r...
[]
CVE-2016-4817
72d245d8f341a813c18d6c6969b81931f9f4d87d
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 20, "lines_deleted": 19}}
null
static void on_read(h2o_socket_t *sock, int status) { h2o_http2_conn_t *conn = sock->data; if (status != 0) { h2o_socket_read_stop(conn->sock); close_connection(conn); return; } update_idle_timeout(conn); parse_input(conn); /* write immediately, if there is no write in...
static void on_read(h2o_socket_t *sock, int status) { h2o_http2_conn_t *conn = sock->data; if (status != 0) { h2o_socket_read_stop(conn->sock); close_connection(conn); return; } update_idle_timeout(conn); if (parse_input(conn) != 0) return; /* write immediately...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 19, "lines_deleted": 0}}
null
null
static void execute_or_enqueue_request(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream) { assert(stream->state < H2O_HTTP2_STREAM_STATE_REQ_PENDING); if (stream->_req_body != NULL && stream->_expected_content_length != SIZE_MAX && stream->_req_body->size != stream->_expected_content_length) { ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 40, "lines_deleted": 0}}
null
null
static int handle_window_update_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) { h2o_http2_window_update_payload_t payload; int ret, err_is_stream_level; if ((ret = h2o_http2_decode_window_update_payload(&payload, frame, err_desc, &err_is_stream_level)) != 0) { if (e...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 15, "lines_deleted": 0}}
null
null
static int handle_trailing_headers(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream, const uint8_t *src, size_t len, const char **err_desc) { size_t dummy_content_length; int ret; assert(stream->state == H2O_HTTP2_STREAM_STATE_RECV_BODY); if ((ret = h2o_hpack_parse...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 19, "lines_deleted": 0}}
null
null
static ssize_t expect_preface(h2o_http2_conn_t *conn, const uint8_t *src, size_t len, const char **err_desc) { if (len < CONNECTION_PREFACE.len) { return H2O_HTTP2_ERROR_INCOMPLETE; } if (memcmp(src, CONNECTION_PREFACE.base, CONNECTION_PREFACE.len) != 0) { return H2O_HTTP2_ERROR_PROTOCOL_CLO...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 22, "lines_deleted": 0}}
null
null
static int emit_writereq_of_openref(h2o_http2_scheduler_openref_t *ref, int *still_is_active, void *cb_arg) { h2o_http2_conn_t *conn = cb_arg; h2o_http2_stream_t *stream = H2O_STRUCT_FROM_MEMBER(h2o_http2_stream_t, _refs.scheduler, ref); assert(h2o_http2_stream_has_pending_data(stream) || stream->state >= ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 11, "lines_deleted": 0}}
null
null
static int handle_goaway_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) { h2o_http2_goaway_payload_t payload; int ret; if ((ret = h2o_http2_decode_goaway_payload(&payload, frame, err_desc)) != 0) return ret; /* nothing to do, since we do not open new streams by ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 50, "lines_deleted": 0}}
null
null
static ssize_t expect_continuation_of_headers(h2o_http2_conn_t *conn, const uint8_t *src, size_t len, const char **err_desc) { h2o_http2_frame_t frame; ssize_t ret; h2o_http2_stream_t *stream; int hret; if ((ret = h2o_http2_decode_frame(&frame, src, len, &H2O_HTTP2_SETTINGS_HOST, err_desc)) < 0) ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 31, "lines_deleted": 0}}
null
null
static void set_priority(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream, const h2o_http2_priority_t *priority, int scheduler_is_open) { h2o_http2_scheduler_node_t *parent_sched; /* determine the parent */ if (priority->dependency != 0) { h2o_http2_stream_t *parent_strea...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 25, "lines_deleted": 0}}
null
null
static void on_upgrade_complete(void *_conn, h2o_socket_t *sock, size_t reqsize) { h2o_http2_conn_t *conn = _conn; if (sock == NULL) { close_connection(conn); return; } conn->sock = sock; sock->data = conn; conn->_http1_req_input = sock->input; h2o_buffer_init(&sock->input,...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 25, "lines_deleted": 0}}
null
null
static void initiate_graceful_shutdown(h2o_context_t *ctx) { /* draft-16 6.8 * A server that is attempting to gracefully shut down a connection SHOULD send an initial GOAWAY frame with the last stream * identifier set to 231-1 and a NO_ERROR code. This signals to the client that a shutdown is imminent and...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 10, "lines_deleted": 0}}
null
null
static void update_idle_timeout(h2o_http2_conn_t *conn) { h2o_timeout_unlink(&conn->_timeout_entry); if (conn->num_streams.pull.half_closed + conn->num_streams.push.half_closed == 0) { assert(h2o_linklist_is_empty(&conn->_pending_reqs)); conn->_timeout_entry.cb = on_idle_timeout; h2o_ti...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 32, "lines_deleted": 0}}
null
null
static int handle_settings_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) { if (frame->stream_id != 0) { *err_desc = "invalid stream id in SETTINGS frame"; return H2O_HTTP2_ERROR_PROTOCOL; } if ((frame->flags & H2O_HTTP2_FRAME_FLAG_ACK) != 0) { if (fr...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 53, "lines_deleted": 0}}
null
null
static void on_write_complete(h2o_socket_t *sock, int status) { h2o_http2_conn_t *conn = sock->data; assert(conn->_write.buf_in_flight != NULL); /* close by error if necessary */ if (status != 0) { close_connection_now(conn); return; } /* reset the other memory pool */ h2o...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 6, "lines_deleted": 0}}
null
null
static void emit_writereq(h2o_timeout_entry_t *entry) { h2o_http2_conn_t *conn = H2O_STRUCT_FROM_MEMBER(h2o_http2_conn_t, _write.timeout_entry, entry); do_emit_writereq(conn); }
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 11, "lines_deleted": 0}}
null
null
static void graceful_shutdown_resend_goaway(h2o_timeout_entry_t *entry) { h2o_context_t *ctx = H2O_STRUCT_FROM_MEMBER(h2o_context_t, http2._graceful_shutdown_timeout, entry); h2o_linklist_t *node; for (node = ctx->http2._conns.next; node != &ctx->http2._conns; node = node->next) { h2o_http2_conn_t ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 12, "lines_deleted": 0}}
null
null
void h2o_http2_conn_register_stream(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream) { khiter_t iter; int r; if (!h2o_http2_stream_is_push(stream->stream_id) && conn->pull_stream_ids.max_open < stream->stream_id) conn->pull_stream_ids.max_open = stream->stream_id; iter = kh_put(h2o_http2_st...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 10, "lines_deleted": 0}}
null
null
static void update_input_window(h2o_http2_conn_t *conn, uint32_t stream_id, h2o_http2_window_t *window, size_t consumed) { h2o_http2_window_consume_window(window, consumed); if (h2o_http2_window_get_window(window) * 2 < H2O_HTTP2_SETTINGS_HOST.initial_window_size) { int32_t delta = (int32_t)(H2O_HTTP2_S...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 30, "lines_deleted": 0}}
null
null
ssize_t expect_default(h2o_http2_conn_t *conn, const uint8_t *src, size_t len, const char **err_desc) { h2o_http2_frame_t frame; ssize_t ret; static int (*FRAME_HANDLERS[])(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) = { handle_data_frame, /* DATA */ ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 19, "lines_deleted": 0}}
null
null
int do_emit_writereq(h2o_http2_conn_t *conn) { assert(conn->_write.buf_in_flight == NULL); /* push DATA frames */ if (conn->state < H2O_HTTP2_CONN_STATE_IS_CLOSING && h2o_http2_conn_get_buffer_window(conn) > 0) h2o_http2_scheduler_run(&conn->scheduler, emit_writereq_of_openref, conn); if (conn...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 7, "lines_deleted": 0}}
null
null
static void on_idle_timeout(h2o_timeout_entry_t *entry) { h2o_http2_conn_t *conn = H2O_STRUCT_FROM_MEMBER(h2o_http2_conn_t, _timeout_entry, entry); enqueue_goaway(conn, H2O_HTTP2_ERROR_NONE, h2o_iovec_init(H2O_STRLIT("idle timeout"))); close_connection(conn); }
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 38, "lines_deleted": 0}}
null
null
static int handle_incoming_request(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream, const uint8_t *src, size_t len, const char **err_desc) { int ret, header_exists_map; assert(stream->state == H2O_HTTP2_STREAM_STATE_RECV_HEADERS); header_exists_map = 0; if ((ret =...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 65, "lines_deleted": 0}}
null
null
static int handle_headers_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) { h2o_http2_headers_payload_t payload; h2o_http2_stream_t *stream; int ret; /* decode */ if ((ret = h2o_http2_decode_headers_payload(&payload, frame, err_desc)) != 0) return ret; if ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 33, "lines_deleted": 0}}
null
null
static int handle_priority_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) { h2o_http2_priority_t payload; h2o_http2_stream_t *stream; int ret; if ((ret = h2o_http2_decode_priority_payload(&payload, frame, err_desc)) != 0) return ret; if (frame->stream_id == p...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 76, "lines_deleted": 0}}
null
null
static void push_path(h2o_req_t *src_req, const char *abspath, size_t abspath_len) { h2o_http2_conn_t *conn = (void *)src_req->conn; h2o_http2_stream_t *src_stream = H2O_STRUCT_FROM_MEMBER(h2o_http2_stream_t, req, src_req); if (!conn->peer_settings.enable_push || conn->num_streams.push.open >= conn->peer_s...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 7, "lines_deleted": 0}}
null
null
static void close_connection_now(h2o_http2_conn_t *conn) { h2o_http2_stream_t *stream; assert(!h2o_timeout_is_linked(&conn->_write.timeout_entry)); kh_foreach_value(conn->streams, stream, { h2o_http2_stream_close(conn, stream); }
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 13, "lines_deleted": 0}}
null
null
void h2o_http2_conn_register_for_proceed_callback(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream) { h2o_http2_conn_request_write(conn); if (h2o_http2_stream_has_pending_data(stream) || stream->state >= H2O_HTTP2_STREAM_STATE_SEND_BODY_IS_FINAL) { if (h2o_http2_window_get_window(&stream->output_wind...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 6, "lines_deleted": 0}}
null
null
void h2o_http2_conn_request_write(h2o_http2_conn_t *conn) { if (conn->state == H2O_HTTP2_CONN_STATE_IS_CLOSING) return; request_gathered_write(conn); }
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 8, "lines_deleted": 0}}
null
null
static void request_gathered_write(h2o_http2_conn_t *conn) { assert(conn->state < H2O_HTTP2_CONN_STATE_IS_CLOSING); if (conn->_write.buf_in_flight == NULL) { if (!h2o_timeout_is_linked(&conn->_write.timeout_entry)) h2o_timeout_link(conn->super.ctx->loop, &conn->super.ctx->zero_timeout, &conn...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 13, "lines_deleted": 0}}
null
null
static int handle_ping_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) { h2o_http2_ping_payload_t payload; int ret; if ((ret = h2o_http2_decode_ping_payload(&payload, frame, err_desc)) != 0) return ret; h2o_http2_encode_ping_frame(&conn->_write.buf, 1, payload.da...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 11, "lines_deleted": 0}}
null
null
static int update_stream_output_window(h2o_http2_stream_t *stream, ssize_t delta) { ssize_t cur = h2o_http2_window_get_window(&stream->output_window); if (h2o_http2_window_update(&stream->output_window, delta) != 0) return -1; if (cur <= 0 && h2o_http2_window_get_window(&stream->output_window) > 0 &...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 56, "lines_deleted": 0}}
null
null
static int handle_data_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) { h2o_http2_data_payload_t payload; h2o_http2_stream_t *stream; int ret; if ((ret = h2o_http2_decode_data_payload(&payload, frame, err_desc)) != 0) return ret; if (conn->state >= H2O_HTTP2...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 8, "lines_deleted": 0}}
null
null
void send_stream_error(h2o_http2_conn_t *conn, uint32_t stream_id, int errnum) { assert(stream_id != 0); assert(conn->state < H2O_HTTP2_CONN_STATE_IS_CLOSING); h2o_http2_encode_rst_stream_frame(&conn->_write.buf, stream_id, -errnum); h2o_http2_conn_request_write(conn); }
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 9, "lines_deleted": 0}}
null
null
void h2o_http2_accept(h2o_accept_ctx_t *ctx, h2o_socket_t *sock, struct timeval connected_at) { h2o_http2_conn_t *conn = create_conn(ctx->ctx, ctx->hosts, sock, connected_at); sock->data = conn; h2o_socket_read_start(conn->sock, on_read); update_idle_timeout(conn); if (sock->input->size != 0) ...
[]
CVE-2016-4817
030c1bddaf347cd52eb889cb6c90cbd0b43430d1
https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4
Vulnerability in CVE-2016-4817
null
null
null
null
CWE-Other
Fix CVE-2016-4817
null
null
null
null
["lib/http2/connection.c"]
C
{"lib/http2/connection.c": {"lines_added": 47, "lines_deleted": 0}}
null
null
int h2o_http2_handle_upgrade(h2o_req_t *req, struct timeval connected_at) { h2o_http2_conn_t *http2conn = create_conn(req->conn->ctx, req->conn->hosts, NULL, connected_at); h2o_http2_stream_t *stream; ssize_t connection_index, settings_index; h2o_iovec_t settings_decoded; const char *err_desc; ...
[]
CVE-2017-9732
86b5fb979ee75a1925c6714b7df82c1a7abfe282
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1
Vulnerability in CVE-2017-9732
null
null
null
null
CWE-400
Fix CVE-2017-9732
null
null
null
null
["bin/gssstdio.c"]
C
{"bin/gssstdio.c": {"lines_added": 48, "lines_deleted": 45}}
null
void * gstd_accept(int fd, char **display_creds, char **export_name, char **mech) { gss_name_t client; gss_OID mech_oid; struct gstd_tok *tok; gss_ctx_id_t ctx = GSS_C_NO_CONTEXT; gss_buffer_desc in, out; OM_uint32 maj, min; int ret; *display_creds = NULL; *export_name = NULL; out.length = 0; in.len...
void * gstd_accept(int fd, char **display_creds, char **export_name, char **mech) { gss_name_t client; gss_OID mech_oid; struct gstd_tok *tok; gss_ctx_id_t ctx = GSS_C_NO_CONTEXT; gss_buffer_desc in, out; OM_uint32 maj, min; int ret; *display_creds = NULL; *export_name = NULL; out.length = 0; in.len...
[]
CVE-2017-9732
a2b3bb9d7db1a3c11f18efaf1b21fdeaae13098d
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1
Vulnerability in CVE-2017-9732
null
null
null
null
CWE-400
Fix CVE-2017-9732
null
null
null
null
["bin/gssstdio.c"]
C
{"bin/gssstdio.c": {"lines_added": 103, "lines_deleted": 96}}
null
static int read_packet(int fd, gss_buffer_t buf, int timeout, int first) { int ret; static uint32_t len = 0; static char len_buf[4]; static int len_buf_pos = 0; static char * tmpbuf = 0; static int tmpbuf_pos = 0; if (first) { len_buf_pos = 0; return -2; } if (len_buf_pos < 4) { ret = timed_rea...
static int read_packet(int fd, gss_buffer_t buf, int timeout, int first) { int ret; static uint32_t len = 0; static char len_buf[4]; static int len_buf_pos = 0; static char * tmpbuf = 0; static int tmpbuf_pos = 0; if (first) { len_buf_pos = 0; return -2; } if (len_buf_pos < 4) { ret = timed_rea...
[]
CVE-2017-9732
85ca9c323aca36487650c96938d1b85334e91d4f
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1
Vulnerability in CVE-2017-9732
null
null
null
null
CWE-400
Fix CVE-2017-9732
null
null
null
null
["bin/gssstdio.c"]
C
{"bin/gssstdio.c": {"lines_added": 23, "lines_deleted": 0}}
null
null
static ssize_t timed_read(int fd, void *buf, size_t bytes, int timeout) { struct pollfd fds[1]; int ret; if (timeout > 0) { fds[0].fd = fd; fds[0].events = POLLIN; ret = poll(fds, 1, timeout); if (ret == -1) return -1; if (ret != 1) { errno = ETIMEDOUT; return -1; } } return read(fd, b...
[]
CVE-2017-9732
85ca9c323aca36487650c96938d1b85334e91d4f
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1
Vulnerability in CVE-2017-9732
null
null
null
null
CWE-400
Fix CVE-2017-9732
null
null
null
null
["bin/gssstdio.c"]
C
{"bin/gssstdio.c": {"lines_added": 12, "lines_deleted": 0}}
null
null
void gstd_error(int pri, int min_stat, const char *s) { char *t1; if (gstd_errstring(&t1, min_stat) < 1) LOG(pri, ("%s: couldn't form GSSAPI error string", s)); else { LOG(pri, ("%s: %s", s, t1)); free(t1); } }
[]
CVE-2017-9732
85ca9c323aca36487650c96938d1b85334e91d4f
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1
Vulnerability in CVE-2017-9732
null
null
null
null
CWE-400
Fix CVE-2017-9732
null
null
null
null
["bin/gssstdio.c"]
C
{"bin/gssstdio.c": {"lines_added": 6, "lines_deleted": 0}}
null
null
void gstd_release_context(void *ctx) { OM_uint32 min; gss_delete_sec_context(&min, (gss_ctx_id_t *)ctx, GSS_C_NO_BUFFER); }
[]
End of preview. Expand in Data Studio

YAML Metadata Warning:The task_categories "code-generation" is not in the official list: text-classification, token-classification, table-question-answering, question-answering, zero-shot-classification, translation, summarization, feature-extraction, text-generation, fill-mask, sentence-similarity, text-to-speech, text-to-audio, automatic-speech-recognition, audio-to-audio, audio-classification, audio-text-to-text, voice-activity-detection, depth-estimation, image-classification, object-detection, image-segmentation, text-to-image, image-to-text, image-to-image, image-to-video, unconditional-image-generation, video-classification, reinforcement-learning, robotics, tabular-classification, tabular-regression, tabular-to-text, table-to-text, multiple-choice, text-ranking, text-retrieval, time-series-forecasting, text-to-video, image-text-to-text, image-text-to-image, image-text-to-video, visual-question-answering, document-question-answering, zero-shot-image-classification, graph-ml, mask-generation, zero-shot-object-detection, text-to-3d, image-to-3d, image-feature-extraction, video-text-to-text, keypoint-detection, visual-document-retrieval, any-to-any, video-to-video, other

MegaVul Dataset (CVEfixes-Compatible Format)

Dataset Description

This is a processed version of the MegaVul dataset converted to match the CVEfixes schema format for unified vulnerability analysis and model training.

Source Kaggle Dataset: marcdamie/megavul-a-cc-java-vulnerability-dataset Original Project: Icyrockton/MegaVul

Dataset Summary

MegaVul is a large, high-quality, extensible, continuously updated C/C++/Java function-level vulnerability dataset.

This processed version provides:

  • 671,797 vulnerability records
  • 8,476 unique CVEs
  • 9,284 unique repositories
  • CVEfixes-compatible schema for combined training

Languages

Language Count Percentage
C 538269 80.1%
C++ 133528 19.9%

Dataset Structure

See the project's megavul_dataset_loader.py for full schema details.

Source Data

Original Dataset

This dataset is derived from the MegaVul project.

Data Collection

This dataset was created by:

  1. Downloading the version of the dataset from Kaggle.
  2. Converting it to the CVEfixes commit-level schema.
  3. Generating synthetic commit hashes and other metadata.

Licensing & Attribution

License

This dataset is licensed under GPL-3.0 to match the original MegaVul license.

Citation

If you use this dataset, please cite the original MegaVul paper:

@inproceedings{megavul2024,
  title={MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representations},
  author={Chen Ni and Zhuo Xu and Yun Zhang and Yang Liu and others},
  booktitle={Proceedings of the 21st International Conference on Mining Software Repositories},
  year={2024},
  publisher={ACM}
}

And acknowledge this processed version:

@misc{hitoshura25_megavul,
  title={MegaVul Dataset in CVEfixes Format},
  author={Your Name},
  year={2025},
  howpublished={\url{https://huggingface.co/datasets/hitoshura25/megavul}},
  note={Processed from the Kaggle dataset by Marc Damie, based on the original MegaVul project.}
}

Usage

from datasets import load_dataset

dataset = load_dataset("hitoshura25/megavul")
Downloads last month
222

Paper for hitoshura25/megavul