Datasets:
cve_id stringlengths 13 16 | hash stringlengths 40 40 | repo_url stringlengths 56 159 | cve_description stringlengths 30 33 | cvss2_base_score null | cvss3_base_score null | published_date null | severity null | cwe_id stringclasses 171
values | cwe_name stringclasses 1
value | cwe_description stringclasses 1
value | commit_message stringlengths 17 20 | commit_date null | version_tag null | repo_total_files null | repo_total_commits null | file_paths stringlengths 8 104 | language stringclasses 2
values | diff_stats stringlengths 48 146 | diff_with_context null | vulnerable_code stringlengths 10 83k ⌀ | fixed_code stringlengths 8 83.3k | security_keywords stringclasses 1
value |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2016-2538 | 7381aa893c7974195fb964c328d74b63a03953ab | https://github.com/qemu/qemu/commit/fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | Vulnerability in CVE-2016-2538 | null | null | null | null | CWE-189 | Fix CVE-2016-2538 | null | null | null | null | ["hw/usb/dev-network.c"] | C | {"hw/usb/dev-network.c": {"lines_added": 45, "lines_deleted": 44}} | null | static int rndis_query_response(USBNetState *s,
rndis_query_msg_type *buf, unsigned int length)
{
rndis_query_cmplt_type *resp;
/* oid_supported_list is the largest data reply */
uint8_t infobuf[sizeof(oid_supported_list)];
uint32_t bufoffs, buflen;
int infobuflen;
unsigned int r... | static int rndis_query_response(USBNetState *s,
rndis_query_msg_type *buf, unsigned int length)
{
rndis_query_cmplt_type *resp;
/* oid_supported_list is the largest data reply */
uint8_t infobuf[sizeof(oid_supported_list)];
uint32_t bufoffs, buflen;
int infobuflen;
unsigned int r... | [] | ||
CVE-2016-2538 | 76a04b79622385425afe6b68d6f549247ddb877c | https://github.com/qemu/qemu/commit/fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | Vulnerability in CVE-2016-2538 | null | null | null | null | CWE-189 | Fix CVE-2016-2538 | null | null | null | null | ["hw/usb/dev-network.c"] | C | {"hw/usb/dev-network.c": {"lines_added": 31, "lines_deleted": 30}} | null | static int rndis_set_response(USBNetState *s,
rndis_set_msg_type *buf, unsigned int length)
{
rndis_set_cmplt_type *resp =
rndis_queue_response(s, sizeof(rndis_set_cmplt_type));
uint32_t bufoffs, buflen;
int ret;
if (!resp)
return USB_RET_STALL;
bufoffs = le32_t... | static int rndis_set_response(USBNetState *s,
rndis_set_msg_type *buf, unsigned int length)
{
rndis_set_cmplt_type *resp =
rndis_queue_response(s, sizeof(rndis_set_cmplt_type));
uint32_t bufoffs, buflen;
int ret;
if (!resp)
return USB_RET_STALL;
bufoffs = le32_t... | [] | ||
CVE-2016-2538 | 8ef1d95d4604e5e32f8e9af794ffa351c27df08b | https://github.com/qemu/qemu/commit/fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | Vulnerability in CVE-2016-2538 | null | null | null | null | CWE-189 | Fix CVE-2016-2538 | null | null | null | null | ["hw/usb/dev-network.c"] | C | {"hw/usb/dev-network.c": {"lines_added": 39, "lines_deleted": 38}} | null | static void usb_net_handle_dataout(USBNetState *s, USBPacket *p)
{
int sz = sizeof(s->out_buf) - s->out_ptr;
struct rndis_packet_msg_type *msg =
(struct rndis_packet_msg_type *) s->out_buf;
uint32_t len;
#ifdef TRAFFIC_DEBUG
fprintf(stderr, "usbnet: data out len %zu\n", p->iov.size);
io... | static void usb_net_handle_dataout(USBNetState *s, USBPacket *p)
{
int sz = sizeof(s->out_buf) - s->out_ptr;
struct rndis_packet_msg_type *msg =
(struct rndis_packet_msg_type *) s->out_buf;
uint32_t len;
#ifdef TRAFFIC_DEBUG
fprintf(stderr, "usbnet: data out len %zu\n", p->iov.size);
io... | [] | ||
CVE-2016-2841 | c850d0af2e3aef52362f6400c3db026d6aa23791 | https://github.com/qemu/qemu/commit/415ab35a441eca767d033a2702223e785b9d5190 | Vulnerability in CVE-2016-2841 | null | null | null | null | CWE-20 | Fix CVE-2016-2841 | null | null | null | null | ["hw/net/ne2000.c"] | C | {"hw/net/ne2000.c": {"lines_added": 18, "lines_deleted": 14}} | null | static int ne2000_buffer_full(NE2000State *s)
{
int avail, index, boundary;
index = s->curpag << 8;
boundary = s->boundary << 8;
if (index < boundary)
avail = boundary - index;
else
avail = (s->stop - s->start) - (index - boundary);
if (avail < (MAX_ETH_FRAME_SIZE + 4))
... | static int ne2000_buffer_full(NE2000State *s)
{
int avail, index, boundary;
if (s->stop <= s->start) {
return 1;
}
index = s->curpag << 8;
boundary = s->boundary << 8;
if (index < boundary)
avail = boundary - index;
else
avail = (s->stop - s->start) - (index - bound... | [] | ||
CVE-2016-2841 | bcd29f20ad400b95990dac5f741c4bf70e6f6e8a | https://github.com/qemu/qemu/commit/415ab35a441eca767d033a2702223e785b9d5190 | Vulnerability in CVE-2016-2841 | null | null | null | null | CWE-20 | Fix CVE-2016-2841 | null | null | null | null | ["hw/net/ne2000.c"] | C | {"hw/net/ne2000.c": {"lines_added": 11, "lines_deleted": 0}} | null | null | static inline uint32_t ne2000_mem_readl(NE2000State *s, uint32_t addr)
{
addr &= ~1; /* XXX: check exact behaviour if not even */
if (addr < 32
|| (addr >= NE2000_PMEM_START
&& addr + sizeof(uint32_t) <= NE2000_MEM_SIZE)) {
return ldl_le_p(s->mem + addr);
} else {
return ... | [] | ||
CVE-2016-2841 | bcd29f20ad400b95990dac5f741c4bf70e6f6e8a | https://github.com/qemu/qemu/commit/415ab35a441eca767d033a2702223e785b9d5190 | Vulnerability in CVE-2016-2841 | null | null | null | null | CWE-20 | Fix CVE-2016-2841 | null | null | null | null | ["hw/net/ne2000.c"] | C | {"hw/net/ne2000.c": {"lines_added": 10, "lines_deleted": 0}} | null | null | static inline void ne2000_mem_writel(NE2000State *s, uint32_t addr,
uint32_t val)
{
addr &= ~1; /* XXX: check exact behaviour if not even */
if (addr < 32
|| (addr >= NE2000_PMEM_START
&& addr + sizeof(uint32_t) <= NE2000_MEM_SIZE)) {
stl_le_p(s->... | [] | ||
CVE-2016-3062 | 49e83785fb9310c31438b0710bc8d017fb35867e | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 107, "lines_deleted": 106}} | null | static int mov_read_dref(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
int entries, i, j;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_data;
avio_rb32(pb); // version + flags
entries = avio_rb... | static int mov_read_dref(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
int entries, i, j;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_data;
avio_rb32(pb); // version + flags
entries = avio_rb... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 11, "lines_deleted": 0}} | null | null | static int mov_read_moov(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
int ret;
if ((ret = mov_read_default(c, pb, atom)) < 0)
return ret;
/* we parsed the 'moov' atom, we can terminate the parsing as soon as we find the 'mdat' */
/* so we don't parse the whole file if over a network */
c... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 6, "lines_deleted": 0}} | null | null | static int mov_read_moof(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
c->fragment.moof_offset = avio_tell(pb) - 8;
av_dlog(c->fc, "moof offset %"PRIx64"\n", c->fragment.moof_offset);
return mov_read_default(c, pb, atom);
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 93, "lines_deleted": 0}} | null | null | static int mov_read_trak(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
int ret;
st = avformat_new_stream(c->fc, NULL);
if (!st) return AVERROR(ENOMEM);
st->id = c->fc->nb_streams;
sc = av_mallocz(sizeof(MOVStreamContext));
if (!sc) return AVERROR(EN... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 85, "lines_deleted": 0}} | null | null | static int mov_read_packet(AVFormatContext *s, AVPacket *pkt)
{
MOVContext *mov = s->priv_data;
MOVStreamContext *sc;
AVIndexEntry *sample;
AVStream *st = NULL;
int ret;
mov->fc = s;
retry:
sample = mov_find_next_sample(s, &st);
if (!sample) {
mov->found_mdat = 0;
if (!m... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 15, "lines_deleted": 0}} | null | null | static int mov_metadata_int8_bypass_padding(MOVContext *c, AVIOContext *pb,
unsigned len, const char *key)
{
char buf[16];
/* bypass padding bytes */
avio_r8(pb);
avio_r8(pb);
avio_r8(pb);
snprintf(buf, sizeof(buf), "%d", avio_r8(pb));
av_dict_se... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 48, "lines_deleted": 0}} | null | null | static int mov_read_header(AVFormatContext *s)
{
MOVContext *mov = s->priv_data;
AVIOContext *pb = s->pb;
int err;
MOVAtom atom = { AV_RL32("root") };
mov->fc = s;
/* .mov and .mp4 aren't streamable anyway (only progressive download if moov is before mdat) */
if (pb->seekable)
atom.... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}} | null | null | static int mov_read_esds(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
return ff_mov_read_esds(c->fc, pb, atom);
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 10, "lines_deleted": 0}} | null | null | static int mov_metadata_int8_no_padding(MOVContext *c, AVIOContext *pb,
unsigned len, const char *key)
{
char buf[16];
snprintf(buf, sizeof(buf), "%d", avio_r8(pb));
av_dict_set(&c->fc->metadata, key, buf, 0);
return 0;
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 8, "lines_deleted": 0}} | null | null | static int mov_read_chan2(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
if (atom.size < 16)
return 0;
avio_skip(pb, 4);
ff_mov_read_chan(c->fc, atom.size - 4, c->fc->streams[0]->codec);
return 0;
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 39, "lines_deleted": 0}} | null | null | static int mov_read_close(AVFormatContext *s)
{
MOVContext *mov = s->priv_data;
int i, j;
for (i = 0; i < s->nb_streams; i++) {
AVStream *st = s->streams[i];
MOVStreamContext *sc = st->priv_data;
av_freep(&sc->ctts_data);
for (j = 0; j < sc->drefs_count; j++) {
... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 51, "lines_deleted": 0}} | null | null | static int mov_read_hdlr(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
uint32_t type;
uint32_t av_unused ctype;
int title_size;
char *title_str;
if (c->fc->nb_streams < 1) // meta before first trak
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
avio_r8(pb)... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}} | null | null | static int mov_read_alac(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
return mov_read_extradata(c, pb, atom, CODEC_ID_ALAC);
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 72, "lines_deleted": 0}} | null | null | static int mov_read_stsz(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
unsigned int i, entries, sample_size, field_size, num_bytes;
GetBitContext gb;
unsigned char* buf;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 97, "lines_deleted": 0}} | null | null | static int mov_read_tkhd(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
int i;
int width;
int height;
int64_t disp_transform[2];
int display_matrix[3][2];
AVStream *st;
MOVStreamContext *sc;
int version;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 18, "lines_deleted": 0}} | null | null | static int mov_metadata_track_or_disc_number(MOVContext *c, AVIOContext *pb,
unsigned len, const char *key)
{
char buf[16];
short current, total = 0;
avio_rb16(pb); // unknown
current = avio_rb16(pb);
if (len >= 6)
total = avio_rb16(pb);
if (... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 104, "lines_deleted": 0}} | null | null | static int mov_read_udta_string(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
#ifdef MOV_EXPORT_ALL_METADATA
char tmp_key[5];
#endif
char str[1024], key2[16], language[4] = {0};
const char *key = NULL;
uint16_t str_size, langcode = 0;
uint32_t data_type = 0;
int (*parse)(MOVContext*, AVIOConte... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 30, "lines_deleted": 0}} | null | null | enum CodecID ff_mov_get_lpcm_codec_id(int bps, int flags)
{
if (flags & 1) { // floating point
if (flags & 2) { // big endian
if (bps == 32) return CODEC_ID_PCM_F32BE;
else if (bps == 64) return CODEC_ID_PCM_F64BE;
} else {
if (bps == 32) return CODEC_ID... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 30, "lines_deleted": 0}} | null | null | static int mov_read_ftyp(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
uint32_t minor_ver;
int comp_brand_size;
char minor_ver_str[11]; /* 32 bit integer -> 10 digits + null */
char* comp_brands_str;
uint8_t type[5] = {0};
avio_read(pb, type, 4);
if (strcmp(type, "qt "))
c->isom ... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 95, "lines_deleted": 0}} | null | null | static int mov_read_trun(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
MOVFragment *frag = &c->fragment;
AVStream *st = NULL;
MOVStreamContext *sc;
MOVStts *ctts_data;
uint64_t offset;
int64_t dts;
int data_offset = 0;
unsigned entries, first_sample_flags = frag->flags;
int flags, ... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 16, "lines_deleted": 0}} | null | null | static int mov_metadata_gnre(MOVContext *c, AVIOContext *pb,
unsigned len, const char *key)
{
short genre;
char buf[20];
avio_r8(pb); // unknown
genre = avio_r8(pb);
if (genre < 1 || genre > ID3v1_GENRE_MAX)
return 0;
snprintf(buf, sizeof(buf), "%s", ff_id3... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 12, "lines_deleted": 0}} | null | null | static int mov_read_wfex(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
ff_get_wav_header(pb, st->codec, atom.size);
return 0;
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 36, "lines_deleted": 0}} | null | null | static int mov_read_stss(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
unsigned int i, entries;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_data;
avio_r8(pb); /* version */
avio_rb24(pb); /* ... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 40, "lines_deleted": 0}} | null | null | static int mov_read_mvhd(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
time_t creation_time;
int version = avio_r8(pb); /* version */
avio_rb24(pb); /* flags */
if (version == 1) {
creation_time = avio_rb64(pb);
avio_rb64(pb);
} else {
creation_time = avio_rb32(pb);
... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 51, "lines_deleted": 0}} | null | null | static int mov_read_chan(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
uint8_t version;
uint32_t flags, layout_tag, bitmap, num_descr, label_mask;
int i;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
if (atom.size < 16)
retur... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 36, "lines_deleted": 0}} | null | null | static int mov_read_tfhd(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
MOVFragment *frag = &c->fragment;
MOVTrackExt *trex = NULL;
int flags, track_id, i;
avio_r8(pb); /* version */
flags = avio_rb24(pb);
track_id = avio_rb32(pb);
if (!track_id)
return AVERROR_INVALIDDATA;
fr... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 26, "lines_deleted": 0}} | null | null | static int mov_read_dvc1(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
uint8_t profile_level;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
if (atom.size >= (1<<28) || atom.size < 7)
return AVERROR_INVALIDDATA;
profile_level = a... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}} | null | null | static int mov_read_avss(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
return mov_read_extradata(c, pb, atom, CODEC_ID_AVS);
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 30, "lines_deleted": 0}} | null | null | static int mov_read_seek(AVFormatContext *s, int stream_index, int64_t sample_time, int flags)
{
AVStream *st;
int64_t seek_timestamp, timestamp;
int sample;
int i;
if (stream_index >= s->nb_streams)
return AVERROR_INVALIDDATA;
if (sample_time < 0)
sample_time = 0;
st = s->... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 31, "lines_deleted": 0}} | null | null | static int mov_read_enda(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
int little_endian;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
little_endian = avio_rb16(pb) & 0xFF;
av_dlog(c->fc, "enda %d\n", little_endian);
if (little_endi... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 24, "lines_deleted": 0}} | null | null | static int mov_read_smi(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
if ((uint64_t)atom.size > (1<<30))
return AVERROR_INVALIDDATA;
// currently SVQ3 decoder expect full STSD header - s... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 29, "lines_deleted": 0}} | null | null | static int mov_read_glbl(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
if ((uint64_t)atom.size > (1<<30))
return AVERROR_INVALIDDATA;
if (atom.size >= 10) {
// Broken files creat... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 43, "lines_deleted": 0}} | null | null | static int mov_probe(AVProbeData *p)
{
unsigned int offset;
uint32_t tag;
int score = 0;
/* check file header */
offset = 0;
for (;;) {
/* ignore invalid offset */
if ((offset + 8) > (unsigned int)p->buf_size)
return score;
tag = AV_RL32(p->buf + offset + 4);... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 4, "lines_deleted": 0}} | null | null | static int mov_read_jp2h(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
return mov_read_extradata(c, pb, atom, CODEC_ID_JPEG2000);
} | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 47, "lines_deleted": 0}} | null | null | static int mov_read_cmov(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
#if CONFIG_ZLIB
AVIOContext ctx;
uint8_t *cmov_data;
uint8_t *moov_data; /* uncompressed data */
long cmov_len, moov_len;
int ret = -1;
avio_rb32(pb); /* dcom atom */
if (avio_rl32(pb) != MKTAG('d','c','o','m'))
... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 41, "lines_deleted": 0}} | null | null | static int mov_read_elst(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
MOVStreamContext *sc;
int i, edit_count, version, edit_start_index = 0;
if (c->fc->nb_streams < 1)
return 0;
sc = c->fc->streams[c->fc->nb_streams-1]->priv_data;
version = avio_r8(pb); /* version */
avio_rb24(pb);... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 23, "lines_deleted": 0}} | null | null | static int mov_read_strf(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
if (c->fc->nb_streams < 1)
return 0;
if (atom.size <= 40)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
if ((uint64_t)atom.size > (1<<30))
return AVERROR_INVALIDDATA;
av_free(s... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 28, "lines_deleted": 0}} | null | null | static int mov_read_stps(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
unsigned i, entries;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_data;
avio_rb32(pb); // version + flags
entries = avio... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 39, "lines_deleted": 0}} | null | null | static int mov_read_mdhd(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
int version;
char language[4] = {0};
unsigned lang;
time_t creation_time;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 28, "lines_deleted": 0}} | null | null | static int mov_read_wave(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
if ((uint64_t)atom.size > (1<<30))
return AVERROR_INVALIDDATA;
if (st->codec->codec_id == CODEC_ID_QDM2 || st->code... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 34, "lines_deleted": 0}} | null | null | static int mov_read_stsc(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
unsigned int i, entries;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_data;
avio_r8(pb); /* version */
avio_rb24(pb); /* ... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 23, "lines_deleted": 0}} | null | null | static int mov_read_trex(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
MOVTrackExt *trex;
if ((uint64_t)c->trex_count+1 >= UINT_MAX / sizeof(*c->trex_data))
return AVERROR_INVALIDDATA;
trex = av_realloc(c->trex_data, (c->trex_count+1)*sizeof(*c->trex_data));
if (!trex)
return AVERROR(... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 56, "lines_deleted": 0}} | null | null | static int mov_read_stts(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
unsigned int i, entries;
int64_t duration=0;
int64_t total_sample_count=0;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_da... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 37, "lines_deleted": 0}} | null | null | static int mov_read_stco(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
unsigned int i, entries;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_data;
avio_r8(pb); /* version */
avio_rb24(pb); /* ... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 68, "lines_deleted": 0}} | null | null | static void mov_read_chapters(AVFormatContext *s)
{
MOVContext *mov = s->priv_data;
AVStream *st = NULL;
MOVStreamContext *sc;
int64_t cur_pos;
int i;
for (i = 0; i < s->nb_streams; i++)
if (s->streams[i]->id == mov->chapter_track) {
st = s->streams[i];
break;
... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 12, "lines_deleted": 0}} | null | null | static void mov_metadata_creation_time(AVDictionary **metadata, time_t time)
{
char buffer[32];
if (time) {
struct tm *ptm;
time -= 2082844800; /* seconds between 1904-01-01 and Epoch */
ptm = gmtime(&time);
if (!ptm) return;
strftime(buffer, sizeof(buffer), "%Y-%m-%d %H... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 21, "lines_deleted": 0}} | null | null | int ff_mov_read_esds(AVFormatContext *fc, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
int tag;
if (fc->nb_streams < 1)
return 0;
st = fc->streams[fc->nb_streams-1];
avio_rb32(pb); /* version + flags */
ff_mp4_read_descr(fc, pb, &tag);
if (tag == MP4ESDescrTag) {
ff_mp4_p... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 28, "lines_deleted": 0}} | null | null | static int mov_read_extradata(MOVContext *c, AVIOContext *pb, MOVAtom atom,
enum CodecID codec_id)
{
AVStream *st;
uint64_t size;
uint8_t *buf;
if (c->fc->nb_streams < 1) // will happen with jp2 files
return 0;
st= c->fc->streams[c->fc->nb_streams-1];
if (... | [] | ||
CVE-2016-3062 | bbee8354c6384c7be291db978b673fe0eebdf4a1 | https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746 | Vulnerability in CVE-2016-3062 | null | null | null | null | CWE-119 | Fix CVE-2016-3062 | null | null | null | null | ["libavformat/mov.c"] | C | {"libavformat/mov.c": {"lines_added": 48, "lines_deleted": 0}} | null | null | static int mov_read_ctts(MOVContext *c, AVIOContext *pb, MOVAtom atom)
{
AVStream *st;
MOVStreamContext *sc;
unsigned int i, entries;
if (c->fc->nb_streams < 1)
return 0;
st = c->fc->streams[c->fc->nb_streams-1];
sc = st->priv_data;
avio_r8(pb); /* version */
avio_rb24(pb); /* ... | [] | ||
CVE-2016-4817 | 8b2c4657bb35940b8da5af7f03b524b9150fef34 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 12, "lines_deleted": 10}} | null | void close_connection(h2o_http2_conn_t *conn)
{
conn->state = H2O_HTTP2_CONN_STATE_IS_CLOSING;
if (conn->_write.buf_in_flight != NULL || h2o_timeout_is_linked(&conn->_write.timeout_entry)) {
/* there is a pending write, let on_write_complete actually close the connection */
} else {
close_c... | int close_connection(h2o_http2_conn_t *conn)
{
conn->state = H2O_HTTP2_CONN_STATE_IS_CLOSING;
if (conn->_write.buf_in_flight != NULL || h2o_timeout_is_linked(&conn->_write.timeout_entry)) {
/* there is a pending write, let on_write_complete actually close the connection */
} else {
close_co... | [] | ||
CVE-2016-4817 | 2b3b80948d3a8aa0890f6ff300d1b487e783e085 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 38, "lines_deleted": 38}} | null | static void parse_input(h2o_http2_conn_t *conn)
{
size_t http2_max_concurrent_requests_per_connection = conn->super.ctx->globalconf->http2.max_concurrent_requests_per_connection;
int perform_early_exit = 0;
if (conn->num_streams.pull.half_closed + conn->num_streams.push.half_closed != http2_max_concurrent_... | static int parse_input(h2o_http2_conn_t *conn)
{
size_t http2_max_concurrent_requests_per_connection = conn->super.ctx->globalconf->http2.max_concurrent_requests_per_connection;
int perform_early_exit = 0;
if (conn->num_streams.pull.half_closed + conn->num_streams.push.half_closed != http2_max_concurrent_r... | [] | ||
CVE-2016-4817 | 72d245d8f341a813c18d6c6969b81931f9f4d87d | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 20, "lines_deleted": 19}} | null | static void on_read(h2o_socket_t *sock, int status)
{
h2o_http2_conn_t *conn = sock->data;
if (status != 0) {
h2o_socket_read_stop(conn->sock);
close_connection(conn);
return;
}
update_idle_timeout(conn);
parse_input(conn);
/* write immediately, if there is no write in... | static void on_read(h2o_socket_t *sock, int status)
{
h2o_http2_conn_t *conn = sock->data;
if (status != 0) {
h2o_socket_read_stop(conn->sock);
close_connection(conn);
return;
}
update_idle_timeout(conn);
if (parse_input(conn) != 0)
return;
/* write immediately... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 19, "lines_deleted": 0}} | null | null | static void execute_or_enqueue_request(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream)
{
assert(stream->state < H2O_HTTP2_STREAM_STATE_REQ_PENDING);
if (stream->_req_body != NULL && stream->_expected_content_length != SIZE_MAX &&
stream->_req_body->size != stream->_expected_content_length) {
... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 40, "lines_deleted": 0}} | null | null | static int handle_window_update_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc)
{
h2o_http2_window_update_payload_t payload;
int ret, err_is_stream_level;
if ((ret = h2o_http2_decode_window_update_payload(&payload, frame, err_desc, &err_is_stream_level)) != 0) {
if (e... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 15, "lines_deleted": 0}} | null | null | static int handle_trailing_headers(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream, const uint8_t *src, size_t len,
const char **err_desc)
{
size_t dummy_content_length;
int ret;
assert(stream->state == H2O_HTTP2_STREAM_STATE_RECV_BODY);
if ((ret = h2o_hpack_parse... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 19, "lines_deleted": 0}} | null | null | static ssize_t expect_preface(h2o_http2_conn_t *conn, const uint8_t *src, size_t len, const char **err_desc)
{
if (len < CONNECTION_PREFACE.len) {
return H2O_HTTP2_ERROR_INCOMPLETE;
}
if (memcmp(src, CONNECTION_PREFACE.base, CONNECTION_PREFACE.len) != 0) {
return H2O_HTTP2_ERROR_PROTOCOL_CLO... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 22, "lines_deleted": 0}} | null | null | static int emit_writereq_of_openref(h2o_http2_scheduler_openref_t *ref, int *still_is_active, void *cb_arg)
{
h2o_http2_conn_t *conn = cb_arg;
h2o_http2_stream_t *stream = H2O_STRUCT_FROM_MEMBER(h2o_http2_stream_t, _refs.scheduler, ref);
assert(h2o_http2_stream_has_pending_data(stream) || stream->state >= ... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 11, "lines_deleted": 0}} | null | null | static int handle_goaway_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc)
{
h2o_http2_goaway_payload_t payload;
int ret;
if ((ret = h2o_http2_decode_goaway_payload(&payload, frame, err_desc)) != 0)
return ret;
/* nothing to do, since we do not open new streams by ... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 50, "lines_deleted": 0}} | null | null | static ssize_t expect_continuation_of_headers(h2o_http2_conn_t *conn, const uint8_t *src, size_t len, const char **err_desc)
{
h2o_http2_frame_t frame;
ssize_t ret;
h2o_http2_stream_t *stream;
int hret;
if ((ret = h2o_http2_decode_frame(&frame, src, len, &H2O_HTTP2_SETTINGS_HOST, err_desc)) < 0)
... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 31, "lines_deleted": 0}} | null | null | static void set_priority(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream, const h2o_http2_priority_t *priority,
int scheduler_is_open)
{
h2o_http2_scheduler_node_t *parent_sched;
/* determine the parent */
if (priority->dependency != 0) {
h2o_http2_stream_t *parent_strea... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 25, "lines_deleted": 0}} | null | null | static void on_upgrade_complete(void *_conn, h2o_socket_t *sock, size_t reqsize)
{
h2o_http2_conn_t *conn = _conn;
if (sock == NULL) {
close_connection(conn);
return;
}
conn->sock = sock;
sock->data = conn;
conn->_http1_req_input = sock->input;
h2o_buffer_init(&sock->input,... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 25, "lines_deleted": 0}} | null | null | static void initiate_graceful_shutdown(h2o_context_t *ctx)
{
/* draft-16 6.8
* A server that is attempting to gracefully shut down a connection SHOULD send an initial GOAWAY frame with the last stream
* identifier set to 231-1 and a NO_ERROR code. This signals to the client that a shutdown is imminent and... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 10, "lines_deleted": 0}} | null | null | static void update_idle_timeout(h2o_http2_conn_t *conn)
{
h2o_timeout_unlink(&conn->_timeout_entry);
if (conn->num_streams.pull.half_closed + conn->num_streams.push.half_closed == 0) {
assert(h2o_linklist_is_empty(&conn->_pending_reqs));
conn->_timeout_entry.cb = on_idle_timeout;
h2o_ti... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 32, "lines_deleted": 0}} | null | null | static int handle_settings_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc)
{
if (frame->stream_id != 0) {
*err_desc = "invalid stream id in SETTINGS frame";
return H2O_HTTP2_ERROR_PROTOCOL;
}
if ((frame->flags & H2O_HTTP2_FRAME_FLAG_ACK) != 0) {
if (fr... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 53, "lines_deleted": 0}} | null | null | static void on_write_complete(h2o_socket_t *sock, int status)
{
h2o_http2_conn_t *conn = sock->data;
assert(conn->_write.buf_in_flight != NULL);
/* close by error if necessary */
if (status != 0) {
close_connection_now(conn);
return;
}
/* reset the other memory pool */
h2o... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 6, "lines_deleted": 0}} | null | null | static void emit_writereq(h2o_timeout_entry_t *entry)
{
h2o_http2_conn_t *conn = H2O_STRUCT_FROM_MEMBER(h2o_http2_conn_t, _write.timeout_entry, entry);
do_emit_writereq(conn);
} | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 11, "lines_deleted": 0}} | null | null | static void graceful_shutdown_resend_goaway(h2o_timeout_entry_t *entry)
{
h2o_context_t *ctx = H2O_STRUCT_FROM_MEMBER(h2o_context_t, http2._graceful_shutdown_timeout, entry);
h2o_linklist_t *node;
for (node = ctx->http2._conns.next; node != &ctx->http2._conns; node = node->next) {
h2o_http2_conn_t ... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 12, "lines_deleted": 0}} | null | null | void h2o_http2_conn_register_stream(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream)
{
khiter_t iter;
int r;
if (!h2o_http2_stream_is_push(stream->stream_id) && conn->pull_stream_ids.max_open < stream->stream_id)
conn->pull_stream_ids.max_open = stream->stream_id;
iter = kh_put(h2o_http2_st... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 10, "lines_deleted": 0}} | null | null | static void update_input_window(h2o_http2_conn_t *conn, uint32_t stream_id, h2o_http2_window_t *window, size_t consumed)
{
h2o_http2_window_consume_window(window, consumed);
if (h2o_http2_window_get_window(window) * 2 < H2O_HTTP2_SETTINGS_HOST.initial_window_size) {
int32_t delta = (int32_t)(H2O_HTTP2_S... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 30, "lines_deleted": 0}} | null | null | ssize_t expect_default(h2o_http2_conn_t *conn, const uint8_t *src, size_t len, const char **err_desc)
{
h2o_http2_frame_t frame;
ssize_t ret;
static int (*FRAME_HANDLERS[])(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc) = {
handle_data_frame, /* DATA */
... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 19, "lines_deleted": 0}} | null | null | int do_emit_writereq(h2o_http2_conn_t *conn)
{
assert(conn->_write.buf_in_flight == NULL);
/* push DATA frames */
if (conn->state < H2O_HTTP2_CONN_STATE_IS_CLOSING && h2o_http2_conn_get_buffer_window(conn) > 0)
h2o_http2_scheduler_run(&conn->scheduler, emit_writereq_of_openref, conn);
if (conn... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 7, "lines_deleted": 0}} | null | null | static void on_idle_timeout(h2o_timeout_entry_t *entry)
{
h2o_http2_conn_t *conn = H2O_STRUCT_FROM_MEMBER(h2o_http2_conn_t, _timeout_entry, entry);
enqueue_goaway(conn, H2O_HTTP2_ERROR_NONE, h2o_iovec_init(H2O_STRLIT("idle timeout")));
close_connection(conn);
} | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 38, "lines_deleted": 0}} | null | null | static int handle_incoming_request(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream, const uint8_t *src, size_t len,
const char **err_desc)
{
int ret, header_exists_map;
assert(stream->state == H2O_HTTP2_STREAM_STATE_RECV_HEADERS);
header_exists_map = 0;
if ((ret =... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 65, "lines_deleted": 0}} | null | null | static int handle_headers_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc)
{
h2o_http2_headers_payload_t payload;
h2o_http2_stream_t *stream;
int ret;
/* decode */
if ((ret = h2o_http2_decode_headers_payload(&payload, frame, err_desc)) != 0)
return ret;
if ... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 33, "lines_deleted": 0}} | null | null | static int handle_priority_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc)
{
h2o_http2_priority_t payload;
h2o_http2_stream_t *stream;
int ret;
if ((ret = h2o_http2_decode_priority_payload(&payload, frame, err_desc)) != 0)
return ret;
if (frame->stream_id == p... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 76, "lines_deleted": 0}} | null | null | static void push_path(h2o_req_t *src_req, const char *abspath, size_t abspath_len)
{
h2o_http2_conn_t *conn = (void *)src_req->conn;
h2o_http2_stream_t *src_stream = H2O_STRUCT_FROM_MEMBER(h2o_http2_stream_t, req, src_req);
if (!conn->peer_settings.enable_push || conn->num_streams.push.open >= conn->peer_s... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 7, "lines_deleted": 0}} | null | null | static void close_connection_now(h2o_http2_conn_t *conn)
{
h2o_http2_stream_t *stream;
assert(!h2o_timeout_is_linked(&conn->_write.timeout_entry));
kh_foreach_value(conn->streams, stream, { h2o_http2_stream_close(conn, stream); } | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 13, "lines_deleted": 0}} | null | null | void h2o_http2_conn_register_for_proceed_callback(h2o_http2_conn_t *conn, h2o_http2_stream_t *stream)
{
h2o_http2_conn_request_write(conn);
if (h2o_http2_stream_has_pending_data(stream) || stream->state >= H2O_HTTP2_STREAM_STATE_SEND_BODY_IS_FINAL) {
if (h2o_http2_window_get_window(&stream->output_wind... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 6, "lines_deleted": 0}} | null | null | void h2o_http2_conn_request_write(h2o_http2_conn_t *conn)
{
if (conn->state == H2O_HTTP2_CONN_STATE_IS_CLOSING)
return;
request_gathered_write(conn);
} | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 8, "lines_deleted": 0}} | null | null | static void request_gathered_write(h2o_http2_conn_t *conn)
{
assert(conn->state < H2O_HTTP2_CONN_STATE_IS_CLOSING);
if (conn->_write.buf_in_flight == NULL) {
if (!h2o_timeout_is_linked(&conn->_write.timeout_entry))
h2o_timeout_link(conn->super.ctx->loop, &conn->super.ctx->zero_timeout, &conn... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 13, "lines_deleted": 0}} | null | null | static int handle_ping_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc)
{
h2o_http2_ping_payload_t payload;
int ret;
if ((ret = h2o_http2_decode_ping_payload(&payload, frame, err_desc)) != 0)
return ret;
h2o_http2_encode_ping_frame(&conn->_write.buf, 1, payload.da... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 11, "lines_deleted": 0}} | null | null | static int update_stream_output_window(h2o_http2_stream_t *stream, ssize_t delta)
{
ssize_t cur = h2o_http2_window_get_window(&stream->output_window);
if (h2o_http2_window_update(&stream->output_window, delta) != 0)
return -1;
if (cur <= 0 && h2o_http2_window_get_window(&stream->output_window) > 0 &... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 56, "lines_deleted": 0}} | null | null | static int handle_data_frame(h2o_http2_conn_t *conn, h2o_http2_frame_t *frame, const char **err_desc)
{
h2o_http2_data_payload_t payload;
h2o_http2_stream_t *stream;
int ret;
if ((ret = h2o_http2_decode_data_payload(&payload, frame, err_desc)) != 0)
return ret;
if (conn->state >= H2O_HTTP2... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 8, "lines_deleted": 0}} | null | null | void send_stream_error(h2o_http2_conn_t *conn, uint32_t stream_id, int errnum)
{
assert(stream_id != 0);
assert(conn->state < H2O_HTTP2_CONN_STATE_IS_CLOSING);
h2o_http2_encode_rst_stream_frame(&conn->_write.buf, stream_id, -errnum);
h2o_http2_conn_request_write(conn);
} | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 9, "lines_deleted": 0}} | null | null | void h2o_http2_accept(h2o_accept_ctx_t *ctx, h2o_socket_t *sock, struct timeval connected_at)
{
h2o_http2_conn_t *conn = create_conn(ctx->ctx, ctx->hosts, sock, connected_at);
sock->data = conn;
h2o_socket_read_start(conn->sock, on_read);
update_idle_timeout(conn);
if (sock->input->size != 0)
... | [] | ||
CVE-2016-4817 | 030c1bddaf347cd52eb889cb6c90cbd0b43430d1 | https://github.com/h2o/h2o/commit/1c0808d580da09fdec5a9a74ff09e103ea058dd4 | Vulnerability in CVE-2016-4817 | null | null | null | null | CWE-Other | Fix CVE-2016-4817 | null | null | null | null | ["lib/http2/connection.c"] | C | {"lib/http2/connection.c": {"lines_added": 47, "lines_deleted": 0}} | null | null | int h2o_http2_handle_upgrade(h2o_req_t *req, struct timeval connected_at)
{
h2o_http2_conn_t *http2conn = create_conn(req->conn->ctx, req->conn->hosts, NULL, connected_at);
h2o_http2_stream_t *stream;
ssize_t connection_index, settings_index;
h2o_iovec_t settings_decoded;
const char *err_desc;
... | [] | ||
CVE-2017-9732 | 86b5fb979ee75a1925c6714b7df82c1a7abfe282 | https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | Vulnerability in CVE-2017-9732 | null | null | null | null | CWE-400 | Fix CVE-2017-9732 | null | null | null | null | ["bin/gssstdio.c"] | C | {"bin/gssstdio.c": {"lines_added": 48, "lines_deleted": 45}} | null | void *
gstd_accept(int fd, char **display_creds, char **export_name, char **mech)
{
gss_name_t client;
gss_OID mech_oid;
struct gstd_tok *tok;
gss_ctx_id_t ctx = GSS_C_NO_CONTEXT;
gss_buffer_desc in, out;
OM_uint32 maj, min;
int ret;
*display_creds = NULL;
*export_name = NULL;
out.length = 0;
in.len... | void *
gstd_accept(int fd, char **display_creds, char **export_name, char **mech)
{
gss_name_t client;
gss_OID mech_oid;
struct gstd_tok *tok;
gss_ctx_id_t ctx = GSS_C_NO_CONTEXT;
gss_buffer_desc in, out;
OM_uint32 maj, min;
int ret;
*display_creds = NULL;
*export_name = NULL;
out.length = 0;
in.len... | [] | ||
CVE-2017-9732 | a2b3bb9d7db1a3c11f18efaf1b21fdeaae13098d | https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | Vulnerability in CVE-2017-9732 | null | null | null | null | CWE-400 | Fix CVE-2017-9732 | null | null | null | null | ["bin/gssstdio.c"] | C | {"bin/gssstdio.c": {"lines_added": 103, "lines_deleted": 96}} | null | static int
read_packet(int fd, gss_buffer_t buf, int timeout, int first)
{
int ret;
static uint32_t len = 0;
static char len_buf[4];
static int len_buf_pos = 0;
static char * tmpbuf = 0;
static int tmpbuf_pos = 0;
if (first) {
len_buf_pos = 0;
return -2;
}
if (len_buf_pos < 4) {
ret = timed_rea... | static int
read_packet(int fd, gss_buffer_t buf, int timeout, int first)
{
int ret;
static uint32_t len = 0;
static char len_buf[4];
static int len_buf_pos = 0;
static char * tmpbuf = 0;
static int tmpbuf_pos = 0;
if (first) {
len_buf_pos = 0;
return -2;
}
if (len_buf_pos < 4) {
ret = timed_rea... | [] | ||
CVE-2017-9732 | 85ca9c323aca36487650c96938d1b85334e91d4f | https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | Vulnerability in CVE-2017-9732 | null | null | null | null | CWE-400 | Fix CVE-2017-9732 | null | null | null | null | ["bin/gssstdio.c"] | C | {"bin/gssstdio.c": {"lines_added": 23, "lines_deleted": 0}} | null | null | static ssize_t
timed_read(int fd, void *buf, size_t bytes, int timeout)
{
struct pollfd fds[1];
int ret;
if (timeout > 0) {
fds[0].fd = fd;
fds[0].events = POLLIN;
ret = poll(fds, 1, timeout);
if (ret == -1)
return -1;
if (ret != 1) {
errno = ETIMEDOUT;
return -1;
}
}
return read(fd, b... | [] | ||
CVE-2017-9732 | 85ca9c323aca36487650c96938d1b85334e91d4f | https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | Vulnerability in CVE-2017-9732 | null | null | null | null | CWE-400 | Fix CVE-2017-9732 | null | null | null | null | ["bin/gssstdio.c"] | C | {"bin/gssstdio.c": {"lines_added": 12, "lines_deleted": 0}} | null | null | void
gstd_error(int pri, int min_stat, const char *s)
{
char *t1;
if (gstd_errstring(&t1, min_stat) < 1)
LOG(pri, ("%s: couldn't form GSSAPI error string", s));
else {
LOG(pri, ("%s: %s", s, t1));
free(t1);
}
} | [] | ||
CVE-2017-9732 | 85ca9c323aca36487650c96938d1b85334e91d4f | https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | Vulnerability in CVE-2017-9732 | null | null | null | null | CWE-400 | Fix CVE-2017-9732 | null | null | null | null | ["bin/gssstdio.c"] | C | {"bin/gssstdio.c": {"lines_added": 6, "lines_deleted": 0}} | null | null | void
gstd_release_context(void *ctx) {
OM_uint32 min;
gss_delete_sec_context(&min, (gss_ctx_id_t *)ctx, GSS_C_NO_BUFFER);
} | [] |
YAML Metadata Warning:The task_categories "code-generation" is not in the official list: text-classification, token-classification, table-question-answering, question-answering, zero-shot-classification, translation, summarization, feature-extraction, text-generation, fill-mask, sentence-similarity, text-to-speech, text-to-audio, automatic-speech-recognition, audio-to-audio, audio-classification, audio-text-to-text, voice-activity-detection, depth-estimation, image-classification, object-detection, image-segmentation, text-to-image, image-to-text, image-to-image, image-to-video, unconditional-image-generation, video-classification, reinforcement-learning, robotics, tabular-classification, tabular-regression, tabular-to-text, table-to-text, multiple-choice, text-ranking, text-retrieval, time-series-forecasting, text-to-video, image-text-to-text, image-text-to-image, image-text-to-video, visual-question-answering, document-question-answering, zero-shot-image-classification, graph-ml, mask-generation, zero-shot-object-detection, text-to-3d, image-to-3d, image-feature-extraction, video-text-to-text, keypoint-detection, visual-document-retrieval, any-to-any, video-to-video, other
MegaVul Dataset (CVEfixes-Compatible Format)
Dataset Description
This is a processed version of the MegaVul dataset converted to match the CVEfixes schema format for unified vulnerability analysis and model training.
Source Kaggle Dataset: marcdamie/megavul-a-cc-java-vulnerability-dataset Original Project: Icyrockton/MegaVul
Dataset Summary
MegaVul is a large, high-quality, extensible, continuously updated C/C++/Java function-level vulnerability dataset.
This processed version provides:
- 671,797 vulnerability records
- 8,476 unique CVEs
- 9,284 unique repositories
- CVEfixes-compatible schema for combined training
Languages
| Language | Count | Percentage |
|---|---|---|
| C | 538269 | 80.1% |
| C++ | 133528 | 19.9% |
Dataset Structure
See the project's megavul_dataset_loader.py for full schema details.
Source Data
Original Dataset
This dataset is derived from the MegaVul project.
- Original Repository: https://github.com/Icyrockton/MegaVul
- Academic Paper: MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representations
- License: GPL-3.0
Data Collection
This dataset was created by:
- Downloading the version of the dataset from Kaggle.
- Converting it to the CVEfixes commit-level schema.
- Generating synthetic commit hashes and other metadata.
Licensing & Attribution
License
This dataset is licensed under GPL-3.0 to match the original MegaVul license.
Citation
If you use this dataset, please cite the original MegaVul paper:
@inproceedings{megavul2024,
title={MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representations},
author={Chen Ni and Zhuo Xu and Yun Zhang and Yang Liu and others},
booktitle={Proceedings of the 21st International Conference on Mining Software Repositories},
year={2024},
publisher={ACM}
}
And acknowledge this processed version:
@misc{hitoshura25_megavul,
title={MegaVul Dataset in CVEfixes Format},
author={Your Name},
year={2025},
howpublished={\url{https://huggingface.co/datasets/hitoshura25/megavul}},
note={Processed from the Kaggle dataset by Marc Damie, based on the original MegaVul project.}
}
Usage
from datasets import load_dataset
dataset = load_dataset("hitoshura25/megavul")
- Downloads last month
- 222