func_before stringlengths 12 22.8k | func_after stringlengths 11 24.7k | commit_msg stringlengths 1 32.6k ⌀ | commit_url stringlengths 48 124 | cve_id stringclasses 530
values | cwe_id stringclasses 134
values | file_name stringlengths 4 244 | vulnerability_score int64 0 4 | extension stringclasses 6
values | is_test bool 1
class | date stringdate 1999-11-10 02:42:49 2024-01-29 16:00:57 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|
function exportAsCSV(scope) {
exportHTML = $("#exportButton").html()
var csvScope = null
var filename = campaign.name + ' - ' + capitalize(scope) + '.csv'
switch (scope) {
case "results":
csvScope = campaign.results
break;
case "events":
csvScope = cam... | function exportAsCSV(scope) {
exportHTML = $("#exportButton").html()
var csvScope = null
var filename = campaign.name + ' - ' + capitalize(scope) + '.csv'
switch (scope) {
case "results":
csvScope = campaign.results
break;
case "events":
csvScope = cam... | Updated PapaParse config to prevent CSV injection.
I've updated the PapaParse JS library to the latest version from the master branch which supports the `escapeForumlae` option in order to prevent malicious event entries from being parsed and executed by the Gophish user's spreadsheet software.
When a new PapaParse r... | https://github.com/gophish/gophish/commit/b25f5ac5e468f6730e377f43c7995e18f8fccc2b | CVE-2020-24707 | ['CWE-1236'] | static/js/src/app/campaign_results.js | 4 | js | false | 2020-07-25T03:44:24Z |
def _is_javascript_scheme(s):
if _is_image_dataurl(s):
return None
return _is_possibly_malicious_scheme(s) | def _is_javascript_scheme(s):
is_image_url = False
for image_type in _find_image_dataurls(s):
is_image_url = True
if _is_unsafe_image_type(image_type):
return True
if is_image_url:
return False
return bool(_is_possibly_malicious_scheme(s)) | Cleaner: Remove SVG image data URLs since they can embed script content.
Reported as GHSL-2021-1038 | https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0 | null | null | src/lxml/html/clean.py | 4 | py | false | 2021-11-11T12:21:08Z |
function updateAdult(firstName, lastName, username, password, packNumber,
leaderType, rankType, phoneNumber,adultID, connection)
{
var temp= selectAdult(username, connection);
if(temp.databaseObject.adult_id<1)
{
temp= new Adult(firstName, lastName, username, packNumber,
leaderType, rankType, phoneNumber,... | function updateAdult(firstName, lastName, username, password, packNumber,
leaderType, rankType, phoneNumber,adultID, connection)
{
var temp= selectAdult(username, connection);
if(temp.databaseObject.adult_id<1)
{
temp= new Adult(firstName, lastName, username, packNumber,
leaderType, rankType, phoneNumber,... | Added protection from sql injection and dubug flag | https://github.com/Seiji42/cub-scout-tracker/commit/b4bc1a328b1f59437db159f9d136d9ed15707e31 | CVE-2014-125046 | ['CWE-89'] | databaseAccessFunctions.js | 4 | js | false | 2014-12-10T02:29:24Z |
static void
vty_insert_word_overwrite (struct vty *vty, char *str)
{
int len = strlen (str);
vty_write (vty, str, len);
strcpy (&vty->buf[vty->cp], str);
vty->cp += len;
vty->length = vty->cp;
} | static void
vty_insert_word_overwrite (struct vty *vty, char *str)
{
size_t nwrite = MIN ((int) strlen (str), VTY_BUFSIZ - vty->cp);
vty_write (vty, str, nwrite);
strncpy (&vty->buf[vty->cp], str, nwrite);
vty->cp += nwrite;
vty->length = vty->cp;
} | lib: limit size of vty buffer to 4096 bytes
This removes the automatic resizing of the vty input buffer and places a
hard size cap of 4096 bytes. It also fixes a potentially unsafe strcpy.
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com> | https://github.com/freerangerouting/frr/commit/2af38873d89e20bd039255418366c1601aa99e64 | null | null | lib/vty.c | 4 | c | false | 2017-01-10T23:33:50Z |
async function respond(request, options, manifest, state) {
/** URL but stripped from the potential `/__data.json` suffix and its search param */
let url = new URL(request.url);
if (options.csrf_check_origin) {
const forbidden =
request.method === 'POST' &&
request.headers.get('origin') !== url.origin &&
... | async function respond(request, options, manifest, state) {
/** URL but stripped from the potential `/__data.json` suffix and its search param */
let url = new URL(request.url);
if (options.csrf_check_origin) {
const forbidden =
is_form_content_type(request) &&
(request.method === 'POST' ||
request.met... | Merge pull request from GHSA-5p75-vc5g-8rv2
* fix: address security advisory CVE-2023-29003 by enabling CSRF protection for plain/text requests
* Protect PUT/PATCH/DELETE. Add comment explicitly mentioning CSRF
* update docs
* update changeset
* Update packages/kit/types/index.d.ts
Co-authored-by: Conduitry <git@... | https://github.com/sveltejs/kit/commit/bb2253d51d00aba2e4353952d4fb0dcde6c77123 | CVE-2023-29003 | ['CWE-184', 'CWE-352'] | packages/kit/src/runtime/server/respond.js | 4 | js | false | 2023-04-04T17:42:00Z |
public static Cache.StoredCommentLinkInfoProto serialize(StoredCommentLinkInfo autoValue) {
return Cache.StoredCommentLinkInfoProto.newBuilder()
.setName(autoValue.getName())
.setMatch(nullToEmpty(autoValue.getMatch()))
.setLink(nullToEmpty(autoValue.getLink()))
.setPrefix(nullToEmpt... | public static Cache.StoredCommentLinkInfoProto serialize(StoredCommentLinkInfo autoValue) {
return Cache.StoredCommentLinkInfoProto.newBuilder()
.setName(autoValue.getName())
.setMatch(nullToEmpty(autoValue.getMatch()))
.setLink(nullToEmpty(autoValue.getLink()))
.setPrefix(nullToEmpt... | Remove html commentlink functionality.
Html commentlinks are too powerful and often allow for arbitrary html
injection on the page. Instead they are replaced with link commentlinks,
using optional `prefix`, `suffix`, `text` parameters to achieve the same
functionality.
The commentlinks that do not generate a link, bu... | https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638 | null | null | java/com/google/gerrit/server/cache/serialize/entities/StoredCommentLinkInfoSerializer.java | 4 | java | false | 2022-11-11T10:19:25Z |
function Gr(e,t,n){var r=e.display,i=e.doc,o=document.createDocumentFragment(),a=Gn(e.display),s=a.left,l=Math.max(r.sizerWidth,Yn(e)-r.sizer.offsetLeft)-a.right,u="ltr"==i.direction;function c(e,t,n,r){t<0&&(t=0),t=Math.round(t),r=Math.round(r),o.appendChild(O("div",null,"CodeMirror-selected","position: absolute; left... | function Gr(e,t,n){var r=e.display,i=e.doc,o=document.createDocumentFragment(),a=Gn(e.display),s=a.left,l=Math.max(r.sizerWidth,Zn(e)-r.sizer.offsetLeft)-a.right,c="ltr"==i.direction;function u(e,t,n,r){t<0&&(t=0),t=Math.round(t),r=Math.round(r),o.appendChild(O("div",null,"CodeMirror-selected","position: absolute; left... | fix: OPTIC-179: Properly ensure content is escaped (#4926)
* fix: OPTIC-179: Properly ensure content is escaped
* ci: Build frontend
Workflow run: https://github.com/HumanSignal/label-studio/actions/runs/6567480699
* update types
* ci: Build frontend
Workflow run: https://github.com/HumanSignal/label-st... | https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3 | CVE-2023-47115 | ['CWE-79'] | label_studio/frontend/dist/react-app/index.js | 4 | js | false | 2023-10-19T01:22:32Z |
struct vfsmount *clone_private_mount(const struct path *path)
{
struct mount *old_mnt = real_mount(path->mnt);
struct mount *new_mnt;
if (IS_MNT_UNBINDABLE(old_mnt))
return ERR_PTR(-EINVAL);
new_mnt = clone_mnt(old_mnt, path->dentry, CL_PRIVATE);
if (IS_ERR(new_mnt))
return ERR_CAST(new_mnt);
/* Longterm m... | struct vfsmount *clone_private_mount(const struct path *path)
{
struct mount *old_mnt = real_mount(path->mnt);
struct mount *new_mnt;
down_read(&namespace_sem);
if (IS_MNT_UNBINDABLE(old_mnt))
goto invalid;
if (!check_mnt(old_mnt))
goto invalid;
if (has_locked_children(old_mnt, path->dentry))
goto invali... | ovl: prevent private clone if bind mount is not allowed
Add the following checks from __do_loopback() to clone_private_mount() as
well:
- verify that the mount is in the current namespace
- verify that there are no locked children
Reported-by: Alois Wohlschlager <alois1@gmx-topmail.de>
Fixes: c771d683a62e ("vfs: ... | https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 | null | null | fs/namespace.c | 4 | c | false | 2021-08-09T08:19:47Z |
private static String encode(String password) {
return new MessageDigestPasswordEncoder("MD5", true).encodePassword(password, null);
} | private static String encode(String password) {
return MD5PasswordEncoder.getEncodedPassword(password);
} | Added Support for JDK 16+
- various dependencies updated to avoid illegal access exceptions
- Spring core libraries updated to version 5.3.6 (was 4.3.40)
- Jackson updated to 2.11.3 (was 2.6.1)
- Spring security updated to 5.4.6 (was 4.2.20)
- MD5 password encoder provided (MD5 is no longer available out of the b... | https://github.com/UniTime/unitime/commit/226836050b7941fe1a1d0fdfe17ccaf1071d82e1 | null | null | JavaSource/org/unitime/timetable/server/PasswordChangeBackend.java | 4 | java | false | 2021-05-11T07:40:48Z |
static int __net_init sit_init_net(struct net *net)
{
struct sit_net *sitn = net_generic(net, sit_net_id);
struct ip_tunnel *t;
int err;
sitn->tunnels[0] = sitn->tunnels_wc;
sitn->tunnels[1] = sitn->tunnels_l;
sitn->tunnels[2] = sitn->tunnels_r;
sitn->tunnels[3] = sitn->tunnels_r_l;
if (!net_has_fallback_tunn... | static int __net_init sit_init_net(struct net *net)
{
struct sit_net *sitn = net_generic(net, sit_net_id);
struct ip_tunnel *t;
int err;
sitn->tunnels[0] = sitn->tunnels_wc;
sitn->tunnels[1] = sitn->tunnels_l;
sitn->tunnels[2] = sitn->tunnels_r;
sitn->tunnels[3] = sitn->tunnels_r_l;
if (!net_has_fallback_tunn... | net: sit: fix memory leak in sit_init_net()
If register_netdev() is failed to register sitn->fb_tunnel_dev,
it will go to err_reg_dev and forget to free netdev(sitn->fb_tunnel_dev).
BUG: memory leak
unreferenced object 0xffff888378daad00 (size 512):
comm "syz-executor.1", pid 4006, jiffies 4295121142 (age 16.115s)
... | https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d | null | null | net/ipv6/sit.c | 4 | c | false | 2019-03-01T15:06:40Z |
static void control_work_handler(struct work_struct *work)
{
struct ports_device *portdev;
struct virtqueue *vq;
struct port_buffer *buf;
unsigned int len;
portdev = container_of(work, struct ports_device, control_work);
vq = portdev->c_ivq;
spin_lock(&portdev->c_ivq_lock);
while ((buf = virtqueue_get_buf(vq,... | static void control_work_handler(struct work_struct *work)
{
struct ports_device *portdev;
struct virtqueue *vq;
struct port_buffer *buf;
unsigned int len;
portdev = container_of(work, struct ports_device, control_work);
vq = portdev->c_ivq;
spin_lock(&portdev->c_ivq_lock);
while ((buf = virtqueue_get_buf(vq,... | virtio_console: Assure used length from device is limited
The buf->len might come from an untrusted device. This
ensures the value would not exceed the size of the buffer
to avoid data corruption or loss.
Signed-off-by: Xie Yongji <xieyongji@bytedance.com>
Acked-by: Jason Wang <jasowang@redhat.com>
Link: https://lore... | https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46 | null | null | drivers/char/virtio_console.c | 4 | c | false | 2021-05-25T12:56:22Z |
void ff_h264_free_tables(H264Context *h, int free_rbsp)
{
int i;
H264Context *hx;
av_freep(&h->intra4x4_pred_mode);
av_freep(&h->chroma_pred_mode_table);
av_freep(&h->cbp_table);
av_freep(&h->mvd_table[0]);
av_freep(&h->mvd_table[1]);
av_freep(&h->direct_table);
av_freep(&h->non_zer... | void ff_h264_free_tables(H264Context *h, int free_rbsp)
{
int i;
H264Context *hx;
av_freep(&h->intra4x4_pred_mode);
av_freep(&h->chroma_pred_mode_table);
av_freep(&h->cbp_table);
av_freep(&h->mvd_table[0]);
av_freep(&h->mvd_table[1]);
av_freep(&h->direct_table);
av_freep(&h->non_zer... | avcodec/h264: Clear delayed_pic on deallocation
Fixes use of freed memory
Fixes: case5_av_frame_copy_props.mp4
Found-by: Michal Zalewski <lcamtuf@coredump.cx>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | https://github.com/FFmpeg/FFmpeg/commit/e8714f6f93d1a32f4e4655209960afcf4c185214 | null | null | libavcodec/h264.c | 4 | c | false | 2014-12-17T20:27:37Z |
@Override
public int hashCode() {
return Objects.hash(match, link, html, enabled);
} | @Override
public int hashCode() {
return Objects.hash(match, link, prefix, suffix, text, enabled);
} | Remove html commentlink functionality.
Html commentlinks are too powerful and often allow for arbitrary html
injection on the page. Instead they are replaced with link commentlinks,
using optional `prefix`, `suffix`, `text` parameters to achieve the same
functionality.
The commentlinks that do not generate a link, bu... | https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638 | null | null | java/com/google/gerrit/extensions/api/projects/CommentLinkInfo.java | 4 | java | false | 2022-11-11T10:19:25Z |
gboolean
flatpak_builtin_remote_info (int argc, char **argv, GCancellable *cancellable, GError **error)
{
g_autoptr(GOptionContext) context = NULL;
g_autoptr(GPtrArray) dirs = NULL;
g_autoptr(FlatpakDir) preferred_dir = NULL;
g_autoptr(GVariant) commit_v = NULL;
const char *remote;
const char *pref;
g_aut... | gboolean
flatpak_builtin_remote_info (int argc, char **argv, GCancellable *cancellable, GError **error)
{
g_autoptr(GOptionContext) context = NULL;
g_autoptr(GPtrArray) dirs = NULL;
g_autoptr(FlatpakDir) preferred_dir = NULL;
g_autoptr(GVariant) commit_v = NULL;
const char *remote;
const char *pref;
g_aut... | Ensure special characters in permissions and metadata are escaped
This prevents someone from placing special characters in order to
manipulate the appearance of the permissions list.
CVE-2023-28101, GHSA-h43h-fwqx-mpp8
Signed-off-by: Ryan Gonzalez <ryan.gonzalez@collabora.com> | https://github.com/flatpak/flatpak/commit/6cac99dafe6003c8a4bd5666341c217876536869 | null | null | app/flatpak-builtins-remote-info.c | 4 | c | false | 2023-03-04T22:23:37Z |
function isUrl(string){
return matcher.test(string);
} | function isUrl(string){
var match = string.match(protocolAndDomainRE);
if (!match) {
return false;
}
var everythingAfterProtocol = match[1];
if (!everythingAfterProtocol) {
return false;
}
if (localhostDomainRE.test(everythingAfterProtocol) ||
nonLocalhostDomainRE.test(everythingAfterProto... | security: Fix REDOS vulnerability
Problem:
As disclosed by email, the regex in this module was vulnerable to
catastrophic backtracking.
This could be used as a REDOS vector for Node.js servers that use
this module.
Solution:
Use a two-step validation process.
Split the vulnerable regex into three safe ones. | https://github.com/segmentio/is-url/commit/149550935c63a98c11f27f694a7c4a9479e53794 | CVE-2018-25079 | ['CWE-1333'] | index.js | 4 | js | false | 2018-03-19T21:07:17Z |
static void ax25_kill_by_device(struct net_device *dev)
{
ax25_dev *ax25_dev;
ax25_cb *s;
if ((ax25_dev = ax25_dev_ax25dev(dev)) == NULL)
return;
spin_lock_bh(&ax25_list_lock);
again:
ax25_for_each(s, &ax25_list) {
if (s->ax25_dev == ax25_dev) {
spin_unlock_bh(&ax25_list_lock);
lock_sock(s->sk);
s->... | static void ax25_kill_by_device(struct net_device *dev)
{
ax25_dev *ax25_dev;
ax25_cb *s;
struct sock *sk;
if ((ax25_dev = ax25_dev_ax25dev(dev)) == NULL)
return;
spin_lock_bh(&ax25_list_lock);
again:
ax25_for_each(s, &ax25_list) {
if (s->ax25_dev == ax25_dev) {
sk = s->sk;
sock_hold(sk);
spin_unlo... | ax25: improve the incomplete fix to avoid UAF and NPD bugs
The previous commit 1ade48d0c27d ("ax25: NPD bug when detaching
AX25 device") introduce lock_sock() into ax25_kill_by_device to
prevent NPD bug. But the concurrency NPD or UAF bug will occur,
when lock_sock() or release_sock() dereferences the ax25_cb->sock.
... | https://github.com/torvalds/linux/commit/4e0f718daf97d47cf7dec122da1be970f145c809 | null | null | net/ax25/af_ax25.c | 4 | c | false | 2022-01-28T04:47:15Z |
def main():
global logger
result = 0
parser = argparse.ArgumentParser(description='Keycloak REST client',
prog=prog_name,
epilog=verbose_help.format(prog_name=prog_name),
formatter_class=argparse.RawDescriptionHelpFormatter)
parser.add_argume... | def main():
global logger
result = 0
parser = argparse.ArgumentParser(description='Keycloak REST client',
prog=prog_name,
epilog=verbose_help.format(prog_name=prog_name),
formatter_class=argparse.RawDescriptionHelpFormatter)
parser.add_argume... | CVE-2017-15111 unsafe /tmp log file in --log-file option in keycloak_cli.py
keycloak_cli.py is essentially a set of utilities used by the
keycloak-httpd-client-install tool. It can be invoked on it's own,
mostly for testing or to execute just one part of the Keycloak REST
API. It's log file defaulted to /tmp/{prog_nam... | https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440 | null | null | keycloak_httpd_client/keycloak_cli.py | 4 | py | false | 2018-01-08T23:53:14Z |
[HttpGet("{storeId}/tokens/{tokenId}/revoke")]
public async Task<IActionResult> RevokeToken(string tokenId)
{
var token = await _TokenRepository.GetToken(tokenId);
if (token == null || token.StoreId != CurrentStore.Id)
return NotFound();
return View("C... | [HttpGet("{storeId}/tokens/{tokenId}/revoke")]
public async Task<IActionResult> RevokeToken(string tokenId)
{
var token = await _TokenRepository.GetToken(tokenId);
if (token == null || token.StoreId != CurrentStore.Id)
return NotFound();
return View("C... | Fix several HTML injections | https://github.com/btcpayserver/btcpayserver/commit/02070d65836cd24627929b3403efbae8de56039a | null | null | BTCPayServer/Controllers/UIStoresController.cs | 4 | cs | false | 2023-01-21T10:05:41Z |
[HttpGet("{itemId}/stream")]
[HttpHead("{itemId}/stream", Name = "HeadVideoStream")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesVideoFile]
public async Task<ActionResult> GetVideoStream(
[FromRoute, Required] Guid itemId,
[FromQuery] string? containe... | [HttpGet("{itemId}/stream")]
[HttpHead("{itemId}/stream", Name = "HeadVideoStream")]
[ProducesResponseType(StatusCodes.Status200OK)]
[ProducesVideoFile]
public async Task<ActionResult> GetVideoStream(
[FromRoute, Required] Guid itemId,
[FromQuery][RegularExpressio... | Merge pull request from GHSA-866x-wj5j-2vf4
Validate codec and container | https://github.com/jellyfin/jellyfin/commit/a656799dc879d16d21bf2ce7ad412ebd5d45394a | null | null | Jellyfin.Api/Controllers/VideosController.cs | 4 | cs | false | 2023-11-29T03:20:32Z |
static void
create_vterm(term_T *term, int rows, int cols)
{
VTerm *vterm;
VTermScreen *screen;
VTermState *state;
VTermValue value;
vterm = vterm_new_with_allocator(rows, cols, &vterm_allocator, NULL);
term->tl_vterm = vterm;
screen = vterm_obtain_screen(vterm);
vterm_s... | static int
create_vterm(term_T *term, int rows, int cols)
{
VTerm *vterm;
VTermScreen *screen;
VTermState *state;
VTermValue value;
vterm = vterm_new_with_allocator(rows, cols, &vterm_allocator, NULL);
term->tl_vterm = vterm;
if (vterm == NULL)
return FAIL;
// Allocate... | patch 8.1.0633: crash when out of memory while opening a terminal window
Problem: Crash when out of memory while opening a terminal window.
Solution: Handle out-of-memory more gracefully. | https://github.com/vim/vim/commit/cd929f7ba8cc5b6d6dcf35c8b34124e969fed6b8 | null | null | src/terminal.c | 4 | c | false | 2018-12-24T20:38:45Z |
static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd,
struct ib_qp_init_attr *init_attr,
struct ib_udata *udata, struct mlx5_ib_qp *qp)
{
struct mlx5_ib_resources *devr = &dev->devr;
int inlen = MLX5_ST_SZ_BYTES(create_qp_in);
struct mlx5_core_dev *mdev = dev->mdev;
struct mlx5_ib_cre... | static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd,
struct ib_qp_init_attr *init_attr,
struct ib_udata *udata, struct mlx5_ib_qp *qp)
{
struct mlx5_ib_resources *devr = &dev->devr;
int inlen = MLX5_ST_SZ_BYTES(create_qp_in);
struct mlx5_core_dev *mdev = dev->mdev;
struct mlx5_ib_cre... | IB/mlx5: Fix leaking stack memory to userspace
mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes
were written.
Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp")
Cc: <stable@vger.kernel.org>
Acked-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <... | https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00 | null | null | drivers/infiniband/hw/mlx5/qp.c | 4 | c | false | 2018-08-14T21:33:52Z |
private void loadCommentLinkSections(Config rc) {
Set<String> subsections = rc.getSubsections(COMMENTLINK);
commentLinkSections = new LinkedHashMap<>(subsections.size());
for (String name : subsections) {
try {
commentLinkSections.put(name, buildCommentLink(rc, name, false));
} catch (Pa... | private void loadCommentLinkSections(Config rc) {
Set<String> subsections = rc.getSubsections(COMMENTLINK);
commentLinkSections = new LinkedHashMap<>(subsections.size());
for (String name : subsections) {
try {
commentLinkSections.put(name, buildCommentLink(rc, name));
} catch (PatternSy... | Remove html commentlink functionality.
Html commentlinks are too powerful and often allow for arbitrary html
injection on the page. Instead they are replaced with link commentlinks,
using optional `prefix`, `suffix`, `text` parameters to achieve the same
functionality.
The commentlinks that do not generate a link, bu... | https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638 | null | null | java/com/google/gerrit/server/project/ProjectConfig.java | 4 | java | false | 2022-11-11T10:19:25Z |
static void hid_input_field(struct hid_device *hid, struct hid_field *field,
__u8 *data, int interrupt)
{
unsigned n;
unsigned count = field->report_count;
unsigned offset = field->report_offset;
unsigned size = field->report_size;
__s32 min = field->logical_minimum;
__s32 max = field->logical_maximum;
__... | static void hid_input_field(struct hid_device *hid, struct hid_field *field,
__u8 *data, int interrupt)
{
unsigned n;
unsigned count = field->report_count;
unsigned offset = field->report_offset;
unsigned size = field->report_size;
__s32 min = field->logical_minimum;
__s32 max = field->logical_maximum;
__... | HID: core: prevent out-of-bound readings
Plugging a Logitech DJ receiver with KASAN activated raises a bunch of
out-of-bound readings.
The fields are allocated up to MAX_USAGE, meaning that potentially, we do
not have enough fields to fit the incoming values.
Add checks and silence KASAN.
Signed-off-by: Benjamin Tis... | https://github.com/torvalds/linux/commit/50220dead1650609206efe91f0cc116132d59b3f | null | null | drivers/hid/hid-core.c | 4 | c | false | 2016-01-19T11:34:58Z |
int ping_recvmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
size_t len, int noblock, int flags, int *addr_len)
{
struct inet_sock *isk = inet_sk(sk);
int family = sk->sk_family;
struct sk_buff *skb;
int copied, err;
pr_debug("ping_recvmsg(sk=%p,sk->num=%u)\n", isk, isk->inet_num);
err = -EOPNOT... | int ping_recvmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
size_t len, int noblock, int flags, int *addr_len)
{
struct inet_sock *isk = inet_sk(sk);
int family = sk->sk_family;
struct sk_buff *skb;
int copied, err;
pr_debug("ping_recvmsg(sk=%p,sk->num=%u)\n", isk, isk->inet_num);
err = -EOPNOT... | ping: prevent NULL pointer dereference on write to msg_name
A plain read() on a socket does set msg->msg_name to NULL. So check for
NULL pointer first.
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0 | null | null | net/ipv4/ping.c | 4 | c | false | 2013-11-18T06:07:45Z |
function ho(t){var e=t.match(uo);if(e){var n={};return e.forEach((function(t){n[t.slice(1)]=!0})),n}} | function ho(t){return t==t&&!zs(t)} | Merge pull request #10171 from snipe/fixes/xss_svg_in_file_uploads
Fixed SVG XSS vuln | https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128 | CVE-2021-3863 | ['CWE-79'] | public/js/build/app.js | 4 | js | false | 2021-10-06T19:38:51Z |
public void checkIfNotificationAllowed() {
if (!NotificationUtils.canShowNotifications(getContext())) {
if (buttonNotifAlertEnabled.isSelected()) {
buttonNotifAlertEnabled.setSelected(false);
buttonNotifAlertDisabled.setSelected(true);
... | public void checkIfNotificationAllowed() {
if (!NotificationUtils.canShowNotifications(getContext())) {
persistentButtonGroup.selectButton(WeatherPreferences.DISABLED);
alertsButtonGroup.selectButton(WeatherPreferences.DISABLED);
}
} | 2.2.4
* Added Gadgetbridge support
* Added predictive back gesture for Android 13
* Bugfix: Additional crashes in settings | https://github.com/TylerWilliamson/QuickWeather/commit/b50ae0bbe94c0bed822c34c6cdafc53424926cf0 | null | null | app/src/main/java/com/ominous/quickweather/activity/SettingsActivity.java | 4 | java | false | 2022-10-05T23:40:18Z |
int
nfs3svc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,
struct nfsd3_writeargs *args)
{
unsigned int len, v, hdr, dlen;
u32 max_blocksize = svc_max_payload(rqstp);
struct kvec *head = rqstp->rq_arg.head;
struct kvec *tail = rqstp->rq_arg.tail;
p = decode_fh(p, &args->fh);
if (!p)
return 0;
p = xd... | int
nfs3svc_decode_writeargs(struct svc_rqst *rqstp, __be32 *p,
struct nfsd3_writeargs *args)
{
unsigned int len, v, hdr, dlen;
u32 max_blocksize = svc_max_payload(rqstp);
struct kvec *head = rqstp->rq_arg.head;
struct kvec *tail = rqstp->rq_arg.tail;
p = decode_fh(p, &args->fh);
if (!p)
return 0;
p = xd... | nfsd: stricter decoding of write-like NFSv2/v3 ops
The NFSv2/v3 code does not systematically check whether we decode past
the end of the buffer. This generally appears to be harmless, but there
are a few places where we do arithmetic on the pointers involved and
don't account for the possibility that a length could b... | https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309 | null | null | fs/nfsd/nfs3xdr.c | 4 | c | false | 2017-04-21T19:26:30Z |
function l(e){e=!e?{}:e.internal?e:Object.create(e);e.internal=true;if(e.value){e.content=e.value}e.outputHeight=1;e.scrollable=e.hasVScrollBar=e.hasHScrollBar=e.extraScrolling=false;e.scrollX=e.scrollY=0;e.lineWrap=true;this.onAutoCompleteMenuSubmit=this.onAutoCompleteMenuSubmit.bind(this);this.onAutoCompleteMenuCance... | function l(e){if(s===clearTimeout){return clearTimeout(e)}if((s===a||!s)&&clearTimeout){s=clearTimeout;return clearTimeout(e)}try{return s(e)}catch(t){try{return s.call(null,e)}catch(t){return s.call(this,e)}}} | Fix a possible ReDoS | https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c | CVE-2021-4306 | ['CWE-1333'] | browser/termkit.min.js | 4 | js | false | 2021-10-12T09:55:03Z |
static int __ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
{
struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
struct inet_sock *inet = inet_sk(sk);
struct ipv6_pinfo *np = inet6_sk(sk);
struct in6_addr *daddr, *final_p, final;
struct dst_entry *dst;
struct flowi6 fl6;
str... | static int __ip6_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
{
struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
struct inet_sock *inet = inet_sk(sk);
struct ipv6_pinfo *np = inet6_sk(sk);
struct in6_addr *daddr, *final_p, final;
struct dst_entry *dst;
struct flowi6 fl6;
str... | ipv6: add complete rcu protection around np->opt
This patch addresses multiple problems :
UDP/RAW sendmsg() need to get a stable struct ipv6_txoptions
while socket is not locked : Other threads can change np->opt
concurrently. Dmitry posted a syzkaller
(http://github.com/google/syzkaller) program desmonstrating
use-a... | https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39 | null | null | net/ipv6/datagram.c | 4 | c | false | 2015-11-30T03:37:57Z |
function parse(source,defaultNSMapCopy,entityMap,domBuilder,errorHandler){
function fixedFromCharCode(code) {
// String.prototype.fromCharCode does not supports
// > 2 bytes unicode chars directly
if (code > 0xffff) {
code -= 0x10000;
var surrogate1 = 0xd800 + (code >> 10)
, surrogate2 = 0xdc00 + (code... | function parse(source,defaultNSMapCopy,entityMap,domBuilder,errorHandler){
function fixedFromCharCode(code) {
// String.prototype.fromCharCode does not supports
// > 2 bytes unicode chars directly
if (code > 0xffff) {
code -= 0x10000;
var surrogate1 = 0xd800 + (code >> 10)
, surrogate2 = 0xdc00 + (code... | Merge pull request from GHSA-h6q6-9hqw-rwfv
* fix!: Preserve quotes in DOCTYPE declaration
Since the only purpose of parsing the DOCTYPE is to be able to restore it when serializing,
we decided that it would be best to leave the parsed publicId and systemId as is,
including any quotes.
BREAKING CHANGE: If somebody r... | https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135 | CVE-2021-21366 | ['CWE-115', 'CWE-436'] | lib/sax.js | 4 | js | false | 2021-03-09T03:21:56Z |
static void php_zip_get_from(INTERNAL_FUNCTION_PARAMETERS, int type) /* {{{ */
{
struct zip *intern;
zval *self = getThis();
struct zip_stat sb;
struct zip_file *zf;
zend_long index = -1;
zend_long flags = 0;
zend_long len = 0;
zend_string *filename;
zend_string *buffer;
int n = 0;
if (!self) {
RETURN... | static void php_zip_get_from(INTERNAL_FUNCTION_PARAMETERS, int type) /* {{{ */
{
struct zip *intern;
zval *self = getThis();
struct zip_stat sb;
struct zip_file *zf;
zend_long index = -1;
zend_long flags = 0;
zend_long len = 0;
zend_string *filename;
zend_string *buffer;
int n = 0;
if (!self) {
RETURN... | Fix bug #71923 - integer overflow in ZipArchive::getFrom* | https://github.com/php/php-src/commit/3b8d4de300854b3517c7acb239b84f7726c1353c | null | null | ext/zip/php_zip.c | 4 | c | false | 2016-04-20T06:49:22Z |
def get_groups(self, env, token):
"""Get groups for the given token.
:param env: The current WSGI environment dictionary.
:param token: Token to validate and return a group string for.
:returns: None if the token is invalid or a string containing a comma
separated lis... | def get_groups(self, env, token):
"""Get groups for the given token.
:param env: The current WSGI environment dictionary.
:param token: Token to validate and return a group string for.
:returns: None if the token is invalid or a string containing a comma
separated lis... | Hash token before storing it in Swift
Swauth uses token value as object name. Object names are logged in proxy
and object servers. Anybody with access to proxy/object server logs can
see token values. Attacker can use this token to access user's data in
Swift store. Instead of token, hashed token (with HASH_PATH_PREFI... | https://github.com/openstack/swauth/commit/70af7986265a3defea054c46efc82d0698917298 | null | null | swauth/middleware.py | 4 | py | false | 2017-11-21T08:38:09Z |
static int ivr_read_header(AVFormatContext *s)
{
unsigned tag, type, len, tlen, value;
int i, j, n, count, nb_streams = 0, ret;
uint8_t key[256], val[256];
AVIOContext *pb = s->pb;
AVStream *st;
int64_t pos, offset, temp;
pos = avio_tell(pb);
tag = avio_rl32(pb);
if (tag == MKTAG('.... | static int ivr_read_header(AVFormatContext *s)
{
unsigned tag, type, len, tlen, value;
int i, j, n, count, nb_streams = 0, ret;
uint8_t key[256], val[256];
AVIOContext *pb = s->pb;
AVStream *st;
int64_t pos, offset, temp;
pos = avio_tell(pb);
tag = avio_rl32(pb);
if (tag == MKTAG('.... | avformat/rmdec: Fix DoS due to lack of eof check
Fixes: loop.ivr
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | https://github.com/FFmpeg/FFmpeg/commit/124eb202e70678539544f6268efc98131f19fa49 | null | null | libavformat/rmdec.c | 4 | c | false | 2017-08-24T23:15:28Z |
def validate_uploaded_file_for_valid_image(f):
if f is None:
return None
from PIL import Image
# We need to get a file object for Pillow. We might have a path or we might
# have to read the data into memory.
if hasattr(f, 'temporary_file_path'):
file = f.temporary_file_path()
e... | def validate_uploaded_file_for_valid_image(f):
if f is None:
return None
from PIL import Image
# We need to get a file object for Pillow. We might have a path or we might
# have to read the data into memory.
if hasattr(f, 'temporary_file_path'):
file = f.temporary_file_path()
e... | [SECURITY] Do not allow Pillow to parse EPS files | https://github.com/pretix/pretix/commit/8583bfb7d97263e9e923ad5d7f123ca1cadc8f2e | null | null | src/pretix/helpers/images.py | 4 | py | false | 2023-09-11T16:57:08Z |
@Override
boolean verify(char[] guess) throws InvalidKeyException {
try {
return Arrays.equals(digest, digestOf(algorithm, salt, guess));
} catch (NoSuchAlgorithmException e) {
throw log.invalidKeyNoSuchMessageDigestAlgorithm(algorithm);
}
} | @Override
boolean verify(char[] guess) throws InvalidKeyException {
try {
return MessageDigest.isEqual(digest, digestOf(algorithm, salt, guess));
} catch (NoSuchAlgorithmException e) {
throw log.invalidKeyNoSuchMessageDigestAlgorithm(algorithm);
}
} | ELY-2422
Update SaltedSimpleDigestPasswordImpl to make use of
MessageDigest#isEqual to avoid a potential timing attack | https://github.com/wildfly-security/wildfly-elytron/commit/3d353e9ae542994e9408f05ae3ee0c4ea8996a87 | null | null | password/impl/src/main/java/org/wildfly/security/password/impl/SaltedSimpleDigestPasswordImpl.java | 4 | java | false | 2022-09-16T21:33:03Z |
function c(){for(var e=[],t=0;t<arguments.length;t++){var n=arguments[t];if(n){var o=typeof n;if("string"==o||"number"==o)e.push(n);else if(Array.isArray(n)&&n.length){var r=c.apply(null,n);r&&e.push(r)}else if("object"==o)for(var i in n)a.call(n,i)&&n[i]&&e.push(i)}}return e.join(" ")} | function c(){var t=this;!function(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}(this,c),this.inputFocused=!1,this.editorMouseDown=!1,this.onEditorMouseDown=function(){t.editorFocused=!0},this.onInputMouseDown=function(){t.inputFocused=!0},this.isEditorBlur=function(e){return"INPUT"... | Releasing security update | https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380 | CVE-2021-31712 | ['CWE-79'] | dist/react-draft-wysiwyg.js | 4 | js | false | 2021-04-17T12:27:12Z |
static int __ipmi_bmc_register(struct ipmi_smi *intf,
struct ipmi_device_id *id,
bool guid_set, guid_t *guid, int intf_num)
{
int rv;
struct bmc_device *bmc;
struct bmc_device *old_bmc;
/*
* platform_device_register() can cause bmc_reg_mutex to
* be claimed because of the is_v... | static int __ipmi_bmc_register(struct ipmi_smi *intf,
struct ipmi_device_id *id,
bool guid_set, guid_t *guid, int intf_num)
{
int rv;
struct bmc_device *bmc;
struct bmc_device *old_bmc;
/*
* platform_device_register() can cause bmc_reg_mutex to
* be claimed because of the is_v... | ipmi: Fix memory leak in __ipmi_bmc_register
In the impelementation of __ipmi_bmc_register() the allocated memory for
bmc should be released in case ida_simple_get() fails.
Fixes: 68e7e50f195f ("ipmi: Don't use BMC product/dev ids in the BMC name")
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Message-Id... | https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab | null | null | drivers/char/ipmi/ipmi_msghandler.c | 4 | c | false | 2019-10-21T20:06:48Z |
function copy(val, key) {
var obj = this[key];
if (isObject(val) && isObject(obj)) {
mixinDeep(obj, val);
} else {
this[key] = val;
}
} | function copy(val, key) {
if (key === '__proto__') {
return;
}
var obj = this[key];
if (isObject(val) && isObject(obj)) {
mixinDeep(obj, val);
} else {
this[key] = val;
}
} | exclude __proto__ | https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c | CVE-2018-3719 | ['CWE-20', 'CWE-471'] | index.js | 4 | js | false | 2018-02-07T16:04:06Z |
RLEEXTRA
if ((rowDelta == 0) || (rowDelta < width))
return FALSE;
if (!pbSrcBuffer || !pbDestBuffer)
return FALSE;
pbEnd = pbSrcBuffer + cbSrcBuffer;
pbDestEnd = pbDestBuffer + rowDelta * height;
while (pbSrc < pbEnd)
{
/* Watch out for the end of the first scanline. */
if (fFirstLine)
{
if ((UIN... | RLEEXTRA
if ((rowDelta == 0) || (rowDelta < width))
return FALSE;
if (!pbSrcBuffer || !pbDestBuffer)
return FALSE;
pbEnd = pbSrcBuffer + cbSrcBuffer;
pbDestEnd = pbDestBuffer + rowDelta * height;
while (pbSrc < pbEnd)
{
/* Watch out for the end of the first scanline. */
if (fFirstLine)
{
if ((UIN... | Fixed out of bound read in RLEDECOMPRESS
CVE-2020-4033 thanks to @antonio-morales for finding this. | https://github.com/FreeRDP/FreeRDP/commit/0a98c450c58ec150e44781c89aa6f8e7e0f571f5 | null | null | libfreerdp/codec/include/bitmap.c | 4 | c | false | 2020-06-02T06:45:09Z |
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
{
struct fib* srbfib;
int status;
struct aac_srb *srbcmd = NULL;
struct user_aac_srb *user_srbcmd = NULL;
struct user_aac_srb __user *user_srb = arg;
struct aac_srb_reply __user *user_reply;
struct aac_srb_reply* reply;
u32 fibsize = 0;
u32 fl... | static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
{
struct fib* srbfib;
int status;
struct aac_srb *srbcmd = NULL;
struct user_aac_srb *user_srbcmd = NULL;
struct user_aac_srb __user *user_srb = arg;
struct aac_srb_reply __user *user_reply;
struct aac_srb_reply* reply;
u32 fibsize = 0;
u32 fl... | aacraid: prevent invalid pointer dereference
It appears that driver runs into a problem here if fibsize is too small
because we allocate user_srbcmd with fibsize size only but later we
access it until user_srbcmd->sg.count to copy it over to srbcmd.
It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t... | https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914 | null | null | drivers/scsi/aacraid/commctrl.c | 4 | c | false | 2013-10-31T08:31:02Z |
static krb5_error_code
get_matching_data(krb5_context context,
pkinit_plg_crypto_context plg_cryptoctx,
pkinit_req_crypto_context req_cryptoctx, X509 *cert,
pkinit_cert_matching_data **md_out)
{
krb5_error_code ret = ENOMEM;
pkinit_cert_matching_data *md = N... | static krb5_error_code
get_matching_data(krb5_context context,
pkinit_plg_crypto_context plg_cryptoctx,
pkinit_req_crypto_context req_cryptoctx, X509 *cert,
pkinit_cert_matching_data **md_out)
{
krb5_error_code ret = ENOMEM;
pkinit_cert_matching_data *md = N... | Fix PKINIT cert matching data construction
Rewrite X509_NAME_oneline_ex() and its call sites to use dynamic
allocation and to perform proper error checking.
ticket: 8617
target_version: 1.16
target_version: 1.15-next
target_version: 1.14-next
tags: pullup | https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4 | null | null | src/plugins/preauth/pkinit/pkinit_crypto_openssl.c | 4 | c | false | 2017-10-17T22:50:15Z |
@Override
public void getField(int index, String key) {
C.luaJ_getfield(L, index, key);
} | @Override
public void getField(int index, String key) {
checkStack(1);
C.luaJ_getfield(L, index, key);
} | Fixed Lua stack overflow: causing memory corruption | https://github.com/gudzpoz/luajava/commit/83505ac0aaba37ed1b6434677bd4fd681b391926 | null | null | luajava/src/main/java/party/iroiro/luajava/AbstractLua.java | 4 | java | false | 2022-06-27T15:20:47Z |
def _inject_metadata_into_fs(metadata, fs, execute=None):
metadata_path = os.path.join(fs, "meta.js")
metadata = dict([(m.key, m.value) for m in metadata])
utils.execute('tee', metadata_path,
process_input=jsonutils.dumps(metadata), run_as_root=True) | def _inject_metadata_into_fs(metadata, fs, execute=None):
metadata = dict([(m.key, m.value) for m in metadata])
_inject_file_into_fs(fs, 'meta.js', jsonutils.dumps(metadata)) | Prevent file injection writing to host filesystem.
Fix bug 1015531, CVE-2012-3360, CVE-2012-3361
This patch prevents the file injection code from writing into the host
filesystem if a user specifies a path for the injected file that
contains '..'. The check is to make sure that the final normalized path
that is abou... | https://github.com/openstack/nova/commit/2427d4a99bed35baefd8f17ba422cb7aae8dcca7 | null | null | nova/virt/disk/api.py | 4 | py | false | 2012-06-20T15:13:13Z |
function v(t,e){var n="undefined"!=typeof Symbol&&t[Symbol.iterator]||t["@@iterator"];if(!n){if(Array.isArray(t)||(n=function(t,e){if(t){if("string"==typeof t)return p(t,e);var n=Object.prototype.toString.call(t).slice(8,-1);return"Object"===n&&t.constructor&&(n=t.constructor.name),"Map"===n||"Set"===n?Array.from(t):"A... | function v(t,e){(null==e||e>t.length)&&(e=t.length);for(var n=0,i=new Array(e);n<e;n++)i[n]=t[n];return i} | Merge pull request #341 from SimplyBinary/fix-inner-html
Fix innerHTML XSS vulnerability | https://github.com/quill-mention/quill-mention/commit/e85262ddced0a7f0b6fc8350d236a68bd1e28385 | CVE-2023-26149 | ['CWE-79'] | docs/quill.mention.min.js | 4 | js | false | 2023-09-11T13:18:36Z |
static int rawsock_create(struct net *net, struct socket *sock,
const struct nfc_protocol *nfc_proto, int kern)
{
struct sock *sk;
pr_debug("sock=%p\n", sock);
if ((sock->type != SOCK_SEQPACKET) && (sock->type != SOCK_RAW))
return -ESOCKTNOSUPPORT;
if (sock->type == SOCK_RAW)
sock->ops = &rawsock_raw_op... | static int rawsock_create(struct net *net, struct socket *sock,
const struct nfc_protocol *nfc_proto, int kern)
{
struct sock *sk;
pr_debug("sock=%p\n", sock);
if ((sock->type != SOCK_SEQPACKET) && (sock->type != SOCK_RAW))
return -ESOCKTNOSUPPORT;
if (sock->type == SOCK_RAW) {
if (!capable(CAP_NET_RAW)... | net/nfc/rawsock.c: add CAP_NET_RAW check.
When creating a raw AF_NFC socket, CAP_NET_RAW needs to be checked first.
Signed-off-by: Qingyu Li <ieatmuttonchuan@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net> | https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041 | null | null | net/nfc/rawsock.c | 4 | c | false | 2020-08-10T01:51:00Z |
def get_vault_token(vault_endpoint: str, vault_secret: str) -> str:
if not vault_endpoint:
raise ValueError('vault_endpoint is required')
if not vault_secret:
raise ValueError('vault_secret is required')
headers = {'X-Vault-Token': vault_secret}
response = requests.get(vault_endpoint, h... | def get_vault_token(vault_endpoint: str, vault_secret: str, vault_endpoint_verify: str | bool | None = True) -> str:
if not vault_endpoint:
raise ValueError('vault_endpoint is required')
if not vault_secret:
raise ValueError('vault_secret is required')
headers = {'X-Vault-Token': vault_secr... | Enabled TLS certificate verification in get_vault_token() | https://github.com/allegro/bigflow/commit/7e956661f76907594e8c82e8fb0af76dbea2a0fc | null | null | bigflow/deploy.py | 4 | py | false | 2023-01-30T11:23:56Z |
void bn_set_2b(bn_t a, int b) {
int i, d;
if (b < 0) {
bn_zero(a);
} else {
RLC_RIP(b, d, b);
bn_grow(a, d + 1);
for (i = 0; i < d; i++) {
a->dp[i] = 0;
}
a->used = d + 1;
a->dp[d] = ((dig_t)1 << b);
a->sign = RLC_POS;
}
} | void bn_set_2b(bn_t a, size_t b) {
int i, d;
if (b >= RLC_BN_SIZE * RLC_DIG) {
RLC_THROW(ERR_NO_VALID);
} else {
RLC_RIP(b, d, b);
bn_grow(a, d + 1);
for (i = 0; i < d; i++) {
a->dp[i] = 0;
}
a->used = d + 1;
a->dp[d] = ((dig_t)1 << b);
a->sign = RLC_POS;
}
} | Huge commit improving the API to use size_t instead of int. | https://github.com/relic-toolkit/relic/commit/34580d840469361ba9b5f001361cad659687b9ab | null | null | src/bn/relic_bn_util.c | 4 | c | false | 2022-11-14T20:47:12Z |
function escapeArgForQuoted(arg) {
return arg
.replace(/[\0\u0008\u001B\u009B]/gu, "")
.replace(/\r?\n|\r/gu, " ")
.replace(/"/gu, `""`);
} | function escapeArgForQuoted(arg) {
return arg
.replace(/[\0\u0008\u001B\u009B]/gu, "")
.replace(/\r?\n|\r/gu, " ")
.replace(/%/gu, "^%")
.replace(/"/gu, `""`);
} | Test coverage for environment variables (#982)
Add e2e test coverage for environment variables and add escaping of `%`
for CMD. ALso include `%` in test fixtures for all shells on Windows.
The new test cases for environment variables are also included in the
`shescape/testing` injectionStrings. | https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac | CVE-2023-35931 | ['CWE-526'] | src/win/cmd.js | 4 | js | false | 2023-06-21T18:31:29Z |
function I(t,e,n,r){var i,o,a,s,u,l,c,f=e&&e.ownerDocument,p=e?e.nodeType:9;if(n=n||[],"string"!=typeof t||!t||1!==p&&9!==p&&11!==p)return n;if(!r&&(V(e),e=e||T,C)){if(11!==p&&(u=L.exec(t)))if(i=u[1]){if(9===p){if(!(a=e.getElementById(i)))return n;if(a.id===i)return k.call(n,a),n}else if(f&&(a=f.getElementById(i))&&I.c... | function I(t,e,n,r){var i,o,a,s,u,l,c,f=e&&e.ownerDocument,p=e?e.nodeType:9;if(n=n||[],"string"!=typeof t||!t||1!==p&&9!==p&&11!==p)return n;if(!r&&(V(e),e=e||T,C)){if(11!==p&&(u=L.exec(t)))if(i=u[1]){if(9===p){if(!(a=e.getElementById(i)))return n;if(a.id===i)return k.call(n,a),n}else if(f&&(a=f.getElementById(i))&&I.c... | Fixed xss in admin panel, complete fix SSRF in upload by link, option for store via html filter, jQuery v3.7.1, update Toastr. | https://github.com/instantsoft/icms2/commit/d0aeeaf5979fbdbf80dc3a3227d6c58442ab7487 | CVE-2023-4878 | ['CWE-918'] | templates/modern/js/jquery.js | 4 | js | false | 2023-09-10T17:46:58Z |
static void nsc_encode_argb_to_aycocg(NSC_CONTEXT* context, const BYTE* data,
UINT32 scanline)
{
UINT16 x;
UINT16 y;
UINT16 rw;
BYTE ccl;
const BYTE* src;
BYTE* yplane = NULL;
BYTE* coplane = NULL;
BYTE* cgplane = NULL;
BYTE* aplane = NULL;
INT16 r_val;
INT16 g_val;
INT... | static BOOL nsc_encode_argb_to_aycocg(NSC_CONTEXT* context, const BYTE* data,
UINT32 scanline)
{
UINT16 x;
UINT16 y;
UINT16 rw;
BYTE ccl;
const BYTE* src;
BYTE* yplane = NULL;
BYTE* coplane = NULL;
BYTE* cgplane = NULL;
BYTE* aplane = NULL;
INT16 r_val;
INT16 g_val;
INT... | Fixed CVE-2018-8788
Thanks to Eyal Itkin from Check Point Software Technologies. | https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659 | null | null | libfreerdp/codec/nsc_encode.c | 4 | c | false | 2018-10-22T14:52:21Z |
static __always_inline ssize_t __mcopy_atomic(struct mm_struct *dst_mm,
unsigned long dst_start,
unsigned long src_start,
unsigned long len,
bool zeropage,
bool *mmap_changing)
{
struct vm_area_struct *dst_vma;
ssize_t err;
pmd_t *dst_pmd;
unsigned long src_add... | static __always_inline ssize_t __mcopy_atomic(struct mm_struct *dst_mm,
unsigned long dst_start,
unsigned long src_start,
unsigned long len,
bool zeropage,
bool *mmap_changing)
{
struct vm_area_struct *dst_vma;
ssize_t err;
pmd_t *dst_pmd;
unsigned long src_add... | userfaultfd: shmem/hugetlbfs: only allow to register VM_MAYWRITE vmas
After the VMA to register the uffd onto is found, check that it has
VM_MAYWRITE set before allowing registration. This way we inherit all
common code checks before allowing to fill file holes in shmem and
hugetlbfs with UFFDIO_COPY.
The userfaultf... | https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1 | null | null | mm/userfaultfd.c | 4 | c | false | 2018-11-30T22:09:32Z |
@Override
boolean verify(final char[] guess) throws InvalidKeyException {
byte[] guessAsBytes = getNormalizedPasswordBytes(guess);
byte[] test;
try {
test = encode(guessAsBytes, getSalt());
} catch (NoSuchAlgorithmException e) {
throw log.invalidKeyCannotVerif... | @Override
boolean verify(final char[] guess) throws InvalidKeyException {
byte[] guessAsBytes = getNormalizedPasswordBytes(guess);
byte[] test;
try {
test = encode(guessAsBytes, getSalt());
} catch (NoSuchAlgorithmException e) {
throw log.invalidKeyCannotVerif... | ELY-2426: Update UnixMD5CryptPassworldImpl to make use of MessageDigest#isEqual to avoid a potential timing attack | https://github.com/wildfly-security/wildfly-elytron/commit/4abb472f61e91ff1c3a731b1b5f22925efb3d22b | null | null | password/impl/src/main/java/org/wildfly/security/password/impl/UnixMD5CryptPasswordImpl.java | 4 | java | false | 2022-09-16T20:17:04Z |
void ion_free(struct ion_client *client, struct ion_handle *handle)
{
bool valid_handle;
BUG_ON(client != handle->client);
mutex_lock(&client->lock);
valid_handle = ion_handle_validate(client, handle);
if (!valid_handle) {
WARN(1, "%s: invalid handle passed to free.\n", __func__);
mutex_unlock(&client->lock... | void ion_free(struct ion_client *client, struct ion_handle *handle)
{
BUG_ON(client != handle->client);
mutex_lock(&client->lock);
ion_free_nolock(client, handle);
mutex_unlock(&client->lock);
} | staging/android/ion : fix a race condition in the ion driver
There is a use-after-free problem in the ion driver.
This is caused by a race condition in the ion_ioctl()
function.
A handle has ref count of 1 and two tasks on different
cpus calls ION_IOC_FREE simultaneously.
cpu 0 cpu ... | https://github.com/torvalds/linux/commit/9590232bb4f4cc824f3425a6e1349afbe6d6d2b7 | null | null | drivers/staging/android/ion/ion.c | 4 | c | false | 2016-02-24T04:38:06Z |
static
int
mode_encrypt(File filein, File fileout)
{
size_t bytesread;
size_t chunkbuflen;
void *chunkbuf = NULL;
void *ivbuf = NULL;
size_t encryptbuflen = 0;
size_t encryptedlen = 0;
void *encryptbuf = NULL;
ulonglong ttlchunkswritten = 0;
ulonglong ttlbyteswritten = 0;
xb_wcrypt_t *xbcrypt... | static
int
mode_encrypt(File filein, File fileout)
{
size_t bytesread;
size_t chunkbuflen;
uchar *chunkbuf = NULL;
void *ivbuf = NULL;
size_t encryptbuflen = 0;
size_t encryptedlen = 0;
void *encryptbuf = NULL;
ulonglong ttlchunkswritten = 0;
ulonglong ttlbyteswritten = 0;
xb_wcrypt_t *xbcryp... | Merge branch '2.3-xb-pxb-186' into 2.4-xb-pxb-186
* 2.3-xb-pxb-186:
CVE-2016-6225: xtrabackup encryption is not setting the IV correctly | https://github.com/percona/percona-xtrabackup/commit/c043893ad7bd21d2c70e5528e27aa8674ff6b8e0 | null | null | storage/innobase/xtrabackup/src/xbcrypt.c | 4 | c | false | 2016-11-22T13:49:59Z |
function Compiler(node, options) {
this.options = options = options || {};
this.node = node;
this.bufferedConcatenationCount = 0;
this.hasCompiledDoctype = false;
this.hasCompiledTag = false;
this.pp = options.pretty || false;
if (this.pp && typeof this.pp !== 'string') {
this.pp = ' ';
}
this.de... | function Compiler(node, options) {
this.options = options = options || {};
this.node = node;
this.bufferedConcatenationCount = 0;
this.hasCompiledDoctype = false;
this.hasCompiledTag = false;
this.pp = options.pretty || false;
if (this.pp && typeof this.pp !== 'string') {
this.pp = ' ';
}
if (thi... | fix: sanitise and escape the `pretty` option (#3314) | https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0 | CVE-2021-21353 | ['CWE-74'] | packages/pug-code-gen/index.js | 4 | js | false | 2021-02-28T18:21:18Z |
void h2o_configurator__init_core(h2o_globalconf_t *conf)
{
/* check if already initialized */
if (h2o_configurator_get_command(conf, "files") != NULL)
return;
{ /* `hosts` and `paths` */
h2o_configurator_t *c = h2o_configurator_create(conf, sizeof(*c));
h2o_configurator_define_comma... | void h2o_configurator__init_core(h2o_globalconf_t *conf)
{
/* check if already initialized */
if (h2o_configurator_get_command(conf, "files") != NULL)
return;
{ /* `hosts` and `paths` */
h2o_configurator_t *c = h2o_configurator_create(conf, sizeof(*c));
h2o_configurator_define_comma... | [http2] delay processing requests upon observing suspicious behavior | https://github.com/h2o/h2o/commit/94fbc54b6c9309912fe3d53e7b63408bbe9a1b0d | null | null | lib/core/configurator.c | 4 | c | false | 2023-10-10T05:56:41Z |
static void channel_on_sending(belle_sip_channel_listener_t *obj, belle_sip_channel_t *chan, belle_sip_message_t *msg){
belle_sip_header_address_t* contact;
belle_sip_header_content_length_t* content_length = (belle_sip_header_content_length_t*)belle_sip_message_get_header(msg,"Content-Length");
const belle_sip_list... | static void channel_on_sending(belle_sip_channel_listener_t *obj, belle_sip_channel_t *chan, belle_sip_message_t *msg){
belle_sip_header_address_t* contact;
belle_sip_header_content_length_t* content_length = (belle_sip_header_content_length_t*)belle_sip_message_get_header(msg,"Content-Length");
const belle_sip_list... | -fix via header of CANCEL request
-fix crash in case of malformed paramless request uri in From header
-fix crash in case of From header display name with last value set to « \ » | https://github.com/BelledonneCommunications/belle-sip/commit/d3f0651531e45e91c2e60f3a16a8b612802e5d2d | null | null | src/provider.c | 4 | c | false | 2021-09-07T15:15:25Z |
public String[] getWebpages() {
return webpages;
} | public String[] getWebpages() {
return webpages != null ? webpages.clone() : null;
} | Fix the vulnerability for public methods that return private array
Signed-off-by: yugeeklab <yugeeklab@gmail.com> | https://github.com/fosslight/fosslight/commit/f95687a2685772c164f53209549ef932806f764f | null | null | src/main/java/oss/fosslight/domain/LicenseMaster.java | 4 | java | false | 2021-11-25T06:27:31Z |
static void
l2tp_bearer_cap_print(netdissect_options *ndo, const u_char *dat)
{
const uint32_t *ptr = (const uint32_t *)dat;
if (EXTRACT_32BITS(ptr) & L2TP_BEARER_CAP_ANALOG_MASK) {
ND_PRINT((ndo, "A"));
}
if (EXTRACT_32BITS(ptr) & L2TP_BEARER_CAP_DIGITAL_MASK) {
ND_PRINT((ndo, "D"));
}
} | static void
l2tp_bearer_cap_print(netdissect_options *ndo, const u_char *dat, u_int length)
{
const uint32_t *ptr = (const uint32_t *)dat;
if (length < 4) {
ND_PRINT((ndo, "AVP too short"));
return;
}
if (EXTRACT_32BITS(ptr) & L2TP_BEARER_CAP_ANALOG_MASK) {
ND_PRINT((ndo, "A"));
}
if (EXTRACT_32BITS(ptr) ... | CVE-2017-13006/L2TP: Check whether an AVP's content exceeds the AVP length.
It's not good enough to check whether all the data specified by the AVP
length was captured - you also have to check whether that length is
large enough for all the required data in the AVP.
This fixes a buffer over-read discovered by Yannick... | https://github.com/the-tcpdump-group/tcpdump/commit/cc4a7391c616be7a64ed65742ef9ed3f106eb165 | null | null | print-l2tp.c | 4 | c | false | 2017-03-06T03:56:20Z |
static int asepcos_parse_sec_attr(sc_card_t *card, sc_file_t *file, const u8 *buf,
size_t len)
{
const u8 *p = buf;
while (len != 0) {
unsigned int amode, tlen = 3;
if (len < 5 && p[0] != 0x80 && p[1] != 0x01) {
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "invalid access mode encoding");
return SC_ERROR_INTE... | static int asepcos_parse_sec_attr(sc_card_t *card, sc_file_t *file, const u8 *buf,
size_t len)
{
const u8 *p = buf;
while (len != 0) {
unsigned int amode, tlen = 3;
if (len < 5 || p[0] != 0x80 || p[1] != 0x01) {
sc_debug(card->ctx, SC_LOG_DEBUG_NORMAL, "invalid access mode encoding");
return SC_ERROR_INTE... | fixed out of bounds reads
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting and suggesting security fixes. | https://github.com/OpenSC/OpenSC/commit/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa | null | null | src/libopensc/card-asepcos.c | 4 | c | false | 2018-05-25T12:54:47Z |
public CommentLinkInfo toInfo() {
CommentLinkInfo info = new CommentLinkInfo();
info.name = getName();
info.match = getMatch();
info.link = getLink();
info.prefix = getPrefix();
info.suffix = getSuffix();
info.text = getText();
info.html = getHtml();
info.enabled = getEnabled();
... | public CommentLinkInfo toInfo() {
CommentLinkInfo info = new CommentLinkInfo();
info.name = getName();
info.match = getMatch();
info.link = getLink();
info.prefix = getPrefix();
info.suffix = getSuffix();
info.text = getText();
info.enabled = getEnabled();
return info;
} | Remove html commentlink functionality.
Html commentlinks are too powerful and often allow for arbitrary html
injection on the page. Instead they are replaced with link commentlinks,
using optional `prefix`, `suffix`, `text` parameters to achieve the same
functionality.
The commentlinks that do not generate a link, bu... | https://github.com/GerritCodeReview/gerrit/commit/734db9aedd22993a098e972ce5b4bc4b729f4638 | null | null | java/com/google/gerrit/entities/StoredCommentLinkInfo.java | 4 | java | false | 2022-11-11T10:19:25Z |
int fscrypt_get_encryption_info(struct inode *inode)
{
struct fscrypt_info *ci = inode->i_crypt_info;
if (!ci ||
(ci->ci_keyring_key &&
(ci->ci_keyring_key->flags & ((1 << KEY_FLAG_INVALIDATED) |
(1 << KEY_FLAG_REVOKED) |
(1 << KEY_FLAG_DEAD)))))
return fscrypt_get_crypt_info(inode);
... | int fscrypt_get_encryption_info(struct inode *inode)
{
struct fscrypt_info *crypt_info;
struct fscrypt_context ctx;
struct crypto_skcipher *ctfm;
const char *cipher_str;
int keysize;
u8 *raw_key = NULL;
int res;
if (inode->i_crypt_info)
return 0;
res = fscrypt_initialize(inode->i_sb->s_cop->flags);
if (re... | fscrypt: remove broken support for detecting keyring key revocation
Filesystem encryption ostensibly supported revoking a keyring key that
had been used to "unlock" encrypted files, causing those files to become
"locked" again. This was, however, buggy for several reasons, the most
severe of which was that when key r... | https://github.com/torvalds/linux/commit/1b53cf9815bb4744958d41f3795d5d5a1d365e2d | null | null | fs/crypto/keyinfo.c | 4 | c | false | 2017-02-21T23:07:11Z |
private boolean isVulnerableLog4j2(Version v) {
// according to 2021-12-22 update
// Upgrade to Log4j 2.12.3 for Java 7
if (v.getMajor() == 2 && v.getMinor() == 12 && v.getPatch() >= 3)
return false;
// Upgrade to Log4j 2.3.1 for Java 6
if (v.getMajor() == 2 && v.getMinor() == 3 && v.getPatch() >= 1)
r... | private boolean isVulnerableLog4j2(Version v) {
// according to 2021-12-29 CVE-2021-44832 update
// Upgrade to Log4j 2.12.4 for Java 7
if (v.getMajor() == 2 && v.getMinor() == 12 && v.getPatch() >= 4)
return false;
// Upgrade to Log4j 2.3.2 for Java 6
if (v.getMajor() == 2 && v.getMinor() == 3 && v.getPat... | Detect also CVE-2021-44832 (log4j 2.17.0) vulnerability. v2.6.4 | https://github.com/logpresso/CVE-2021-44228-Scanner/commit/12500cd7c73455f3b0944f73c23e23b0b8b42c69 | null | null | src/main/java/com/logpresso/scanner/Detector.java | 4 | java | false | 2021-12-29T01:38:38Z |
public static File[] convertPdf2Png(File inputPdfFile) throws IOException {
if (PDFBOX.equals(System.getProperty(PDF_LIBRARY))) {
return PdfBoxUtilities.convertPdf2Png(inputPdfFile);
} else {
try {
return PdfGsUtilities.convertPdf2Png(inputPdfFile);
} ... | public static File[] convertPdf2Png(File inputPdfFile) throws IOException {
return PdfBoxUtilities.convertPdf2Png(inputPdfFile);
} | Remove ghost4j dependency due to log4j vulnerabilities | https://github.com/nguyenq/tess4j/commit/9cfb5a04f92a391b126368c27a1e55d2ea280b41 | null | null | src/main/java/net/sourceforge/tess4j/util/PdfUtilities.java | 4 | java | false | 2022-02-22T16:40:59Z |
static
void headerMergeLegacySigs(Header h, Header sigh)
{
HeaderIterator hi;
struct rpmtd_s td;
hi = headerInitIterator(sigh);
for (; headerNext(hi, &td); rpmtdFreeData(&td))
{
switch (td.tag) {
/* XXX Translate legacy signature tag values. */
case RPMSIGTAG_SIZE:
td.tag = RPMTAG_SIGSIZE;
... | static
rpmTagVal headerMergeLegacySigs(Header h, Header sigh, char **msg)
{
const struct taglate_s *xl;
struct rpmtd_s td;
rpmtdReset(&td);
for (xl = xlateTags; xl->stag; xl++) {
/* There mustn't be one in the main header */
if (headerIsEntry(h, xl->xtag))
break;
if (headerGet(sigh, xl->stag, &... | Be much more careful about copying data from the signature header
Only look for known tags, and ensure correct type and size where known
before copying over. Bump the old arbitrary 16k count limit to 16M limit
though, it's not inconceivable that a package could have that many files.
While at it, ensure none of these t... | https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 | null | null | lib/package.c | 4 | c | false | 2021-03-04T11:21:19Z |
static int open_cred_file(char *file_name,
struct parsed_mount_info *parsed_info)
{
char *line_buf = NULL;
char *temp_val = NULL;
FILE *fs = NULL;
int i;
const int line_buf_size = 4096;
const int min_non_white = 10;
i = toggle_dac_capability(0, 1);
if (i)
goto return_i;
i = access(file_name, R_OK);
if ... | static int open_cred_file(char *file_name,
struct parsed_mount_info *parsed_info)
{
char *line_buf = NULL;
char *temp_val = NULL;
FILE *fs = NULL;
int i;
const int line_buf_size = 4096;
const int min_non_white = 10;
i = toggle_dac_capability(0, 1);
if (i)
goto return_i;
i = access(file_name, R_OK);
if ... | mount.cifs: fix verbose messages on option parsing
When verbose logging is enabled, invalid credentials file lines may be
dumped to stderr. This may lead to information disclosure in particular
conditions when the credentials file given is sensitive and contains '='
signs.
Bug: https://bugzilla.samba.org/show_bug.cgi... | https://github.com/piastry/cifs-utils/commit/3d67d09b4a73c85ac34c739a6936c456e80be038 | null | null | mount.cifs.c | 4 | c | false | null |
static int multipart_process_part_header(modsec_rec *msr, char **error_msg) {
int i, len, rc;
if (error_msg == NULL) return -1;
*error_msg = NULL;
/* Check for nul bytes. */
len = MULTIPART_BUF_SIZE - msr->mpd->bufleft;
for(i = 0; i < len; i++) {
if (msr->mpd->buf[i] == '\0') {
... | static int multipart_process_part_header(modsec_rec *msr, char **error_msg) {
int i, len, rc;
if (error_msg == NULL) return -1;
*error_msg = NULL;
/* Check for nul bytes. */
len = MULTIPART_BUF_SIZE - msr->mpd->bufleft;
for(i = 0; i < len; i++) {
if (msr->mpd->buf[i] == '\0') {
... | Multipart parsing fixes and new MULTIPART_PART_HEADERS collection | https://github.com/SpiderLabs/ModSecurity/commit/7a489bd07c66d3df19a320b4306e00c49716dbb0 | null | null | apache2/msc_multipart.c | 4 | c | false | 2022-09-07T18:09:47Z |
def _clone(
cls,
git: "Git",
url: PathLike,
path: PathLike,
odb_default_type: Type[GitCmdObjectDB],
progress: Union["RemoteProgress", "UpdateProgress", Callable[..., "RemoteProgress"], None] = None,
multi_options: Optional[List[str]] = None,
allow_unsafe_p... | def _clone(
cls,
git: "Git",
url: PathLike,
path: PathLike,
odb_default_type: Type[GitCmdObjectDB],
progress: Union["RemoteProgress", "UpdateProgress", Callable[..., "RemoteProgress"], None] = None,
multi_options: Optional[List[str]] = None,
allow_unsafe_p... | Block insecure non-multi options in clone/clone_from
Follow-up to #1521 | https://github.com/gitpython-developers/GitPython/commit/5c59e0d63da6180db8a0b349f0ad36fef42aceed | null | null | git/repo/base.py | 4 | py | false | 2023-07-10T14:10:10Z |
void svhandler_flash_pgm_blk(void) {
uint32_t beginAddr = _param_1;
uint32_t data = _param_2;
uint32_t length = _param_3;
// Protect from overflow.
if (beginAddr + length < beginAddr) return;
// Do not allow firmware to erase bootstrap or bootloader sectors.
if (((beginAddr >= BSTRP_FLASH_SECT_START) &&... | void svhandler_flash_pgm_blk(void) {
uint32_t beginAddr = _param_1;
uint32_t data = _param_2;
uint32_t length = _param_3;
// Verify requested address range is allowed.
if (!allow_svhandler_flash_range(beginAddr, beginAddr + length)) return;
// Unlock flash.
flash_clear_status_flags();
flash_unlock();
... | fix: more robust address range checks in svhandler_flash_* | https://github.com/keepkey/keepkey-firmware/commit/447c1f038a31378ab9589965c098467d9ea6cccc | null | null | lib/board/supervise.c | 4 | c | false | 2022-04-12T19:44:55Z |
static int parse_packet (sockent_t *se, /* {{{ */
void *buffer, size_t buffer_size, int flags,
const char *username)
{
int status;
value_list_t vl = VALUE_LIST_INIT;
notification_t n;
#if HAVE_LIBGCRYPT
int packet_was_signed = (flags & PP_SIGNED);
int packet_was_encrypted = (flags & PP_ENCRYPTED);
in... | static int parse_packet (sockent_t *se, /* {{{ */
void *buffer, size_t buffer_size, int flags,
const char *username)
{
int status;
value_list_t vl = VALUE_LIST_INIT;
notification_t n;
#if HAVE_LIBGCRYPT
int packet_was_signed = (flags & PP_SIGNED);
int packet_was_encrypted = (flags & PP_ENCRYPTED);
in... | network plugin: Fix heap overflow in parse_packet().
Emilien Gaspar has identified a heap overflow in parse_packet(), the
function used by the network plugin to parse incoming network packets.
This is a vulnerability in collectd, though the scope is not clear at
this point. At the very least specially crafted network... | https://github.com/collectd/collectd/commit/b589096f907052b3a4da2b9ccc9b0e2e888dfc18 | null | null | src/network.c | 4 | c | false | 2016-07-19T08:00:37Z |
static long do_get_mempolicy(int *policy, nodemask_t *nmask,
unsigned long addr, unsigned long flags)
{
int err;
struct mm_struct *mm = current->mm;
struct vm_area_struct *vma = NULL;
struct mempolicy *pol = current->mempolicy;
if (flags &
~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED))
... | static long do_get_mempolicy(int *policy, nodemask_t *nmask,
unsigned long addr, unsigned long flags)
{
int err;
struct mm_struct *mm = current->mm;
struct vm_area_struct *vma = NULL;
struct mempolicy *pol = current->mempolicy;
if (flags &
~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED))
... | mm/mempolicy: fix use after free when calling get_mempolicy
I hit a use after free issue when executing trinity and repoduced it
with KASAN enabled. The related call trace is as follows.
BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766
Read of size 2 by task syz-executor1/798
... | https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | null | null | mm/mempolicy.c | 4 | c | false | 2017-08-18T22:16:24Z |
set(value) {
if (typeof(value) !== 'function') {
currentPrepareStackTrace = value;
return;
}
const wrapped = localReflectApply(localWeakMapGet, wrappedPrepareStackTrace, [value]);
if (wrapped) {
currentPrepareStackTrace = wrapped;
return;
}
const newWrapped = (error, sst) => {
if (... | set(value) {
if (typeof(value) !== 'function') {
currentPrepareStackTrace = value;
return;
}
const wrapped = localReflectApply(localWeakMapGet, wrappedPrepareStackTrace, [value]);
if (wrapped) {
currentPrepareStackTrace = wrapped;
return;
}
const newWrapped = (error, sst) => {
if (... | Fix security issue | https://github.com/patriksimek/vm2/commit/3a9876482be487b78a90ac459675da7f83f46d69 | CVE-2022-25893 | ['NVD-CWE-noinfo'] | lib/setup-sandbox.js | 4 | js | false | 2022-07-05T12:26:06Z |
public String[] getIds() {
return ids;
} | public String[] getIds() {
return ids != null ? ids.clone() : null;
} | Fix the vulnerability for public method that return private type
Change public method that return private type to public method that
return copy.
Signed-off-by: yugeeklab <yugeeklab@gmail.com> | https://github.com/fosslight/fosslight/commit/7c1222e56b2b08a64551162bb579eb431f4e9798 | null | null | src/main/java/oss/fosslight/domain/ComBean.java | 4 | java | false | 2021-11-17T01:54:51Z |
function Ya(){$e=$e.concat(lr.takeRecords()),$e.length&&!Rt&&(Rt=!0,queueMicrotask(()=>{Za(),Rt=!1}))} | function Ya(){fr(Fe),Fe.length=0} | Stop caching csrf token in case of using wire:navigate across different sessions | https://github.com/livewire/livewire/commit/5d887316f2aaf83c0e380ac5e72766f19700fa3b | CVE-2024-22859 | ['CWE-352'] | dist/livewire.min.js | 4 | js | false | 2023-09-12T19:49:03Z |
void
shutdown_mib(void)
{
unload_all_mibs();
if (tree_top) {
if (tree_top->label)
SNMP_FREE(tree_top->label);
SNMP_FREE(tree_top);
}
tree_head = NULL;
Mib = NULL;
if (_mibindexes) {
int i;
for (i = 0; i < _mibindex; ++i)
SNMP_FREE(_mibindex... | void
shutdown_mib(void)
{
unload_all_mibs();
if (tree_top) {
if (tree_top->label)
SNMP_FREE(tree_top->label);
SNMP_FREE(tree_top);
}
tree_head = NULL;
Mib = NULL;
if (Prefix != NULL && Prefix != &Standard_Prefix[0])
SNMP_FREE(Prefix);
if (Prefix)
P... | CHANGES: snmpd: Stop reading and writing the mib_indexes/* files
Caching directory contents is something the operating system should do
and is not something Net-SNMP should do. Instead of storing a copy of
the directory contents in ${tmp_dir}/mib_indexes/${n}, always scan a
MIB directory. | https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602 | null | null | snmplib/mib.c | 4 | c | false | 2019-05-22T07:56:21Z |
static int
DefragDoSturgesNovakTest(int policy, u_char *expected, size_t expected_len)
{
int i;
int ret = 0;
DefragInit();
/*
* Build the packets.
*/
int id = 1;
Packet *packets[17];
memset(packets, 0x00, sizeof(packets));
/*
* Original fragments.
*/
/* A*24 ... | static int
DefragDoSturgesNovakTest(int policy, u_char *expected, size_t expected_len)
{
int i;
int ret = 0;
DefragInit();
/*
* Build the packets.
*/
int id = 1;
Packet *packets[17];
memset(packets, 0x00, sizeof(packets));
/*
* Original fragments.
*/
/* A*24 ... | defrag - take protocol into account during re-assembly
The IP protocol was not being used to match fragments with
their packets allowing a carefully constructed packet
with a different protocol to be matched, allowing re-assembly
to complete, creating a packet that would not be re-assembled
by the destination host. | https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8 | null | null | src/defrag.c | 4 | c | false | 2017-02-05T13:57:54Z |
function a(t,e,r){return t.highWaterMark!=null?t.highWaterMark:e?t[r]:null} | function a(t,e,r){var i=m.quantizationTable;var n,s,o,a,u,l,f,h,c;var d=r;var p;for(p=0;p<64;p++)d[p]=t[p]*i[p];for(p=0;p<8;++p){var g=8*p;if(d[1+g]==0&&d[2+g]==0&&d[3+g]==0&&d[4+g]==0&&d[5+g]==0&&d[6+g]==0&&d[7+g]==0){c=T*d[0+g]+512>>10;d[0+g]=c;d[1+g]=c;d[2+g]=c;d[3+g]=c;d[4+g]=c;d[5+g]=c;d[6+g]=c;d[7+g]=c;continue}n... | Fix a possible ReDoS | https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c | CVE-2021-4306 | ['CWE-1333'] | browser/termkit.min.js | 4 | js | false | 2021-10-12T09:55:03Z |
function setHomePage() {
$.ajax({
type: 'POST',
url: baseurl + '/userSettings/setHomePage',
data: {
path: window.location.pathname
},
success:function (data, textStatus) {
showMessage('success', 'Homepage set.');
$('#setHomePage').addClass(... | function setHomePage() {
$.ajax({
type: 'GET',
url: baseurl + '/userSettings/setHomePage',
success:function (data, textStatus) {
$('#ajax_hidden_container').html(data);
var currentPage = $('#setHomePage').data('current-page');
$('#UserSettingPath').val(cur... | fix: [security] setting a favourite homepage was not CSRF protected
- a user could be lured into setting a MISP home-page outside of the MISP baseurl
- switched the endpoint to be CSRF protection enabled
- as discovered by Mislav Božičević <mislav.bozicevic@nn.cz> | https://github.com/MISP/MISP/commit/bf4610c947c7dc372c4078f363d2dff6ae0703a8 | CVE-2020-15711 | ['CWE-352'] | app/webroot/js/misp.js | 4 | js | false | 2020-07-13T10:19:11Z |
@Override
public boolean isValid(Object value, ConstraintValidatorContext constraintValidatorContext) {
if (!(value instanceof String) || ((String) value).isEmpty() || xssPolicy == null) {
return true;
}
try {
return xssChecker.scan((String) value, xssPolicy).getNumb... | @Override
public boolean isValid(Object value, ConstraintValidatorContext constraintValidatorContext) {
if (!(value instanceof String) || ((String) value).isEmpty()) {
return true;
}
try {
return xssChecker.scan((String) value, xssPolicy).getNumberOfErrors() == 0;
... | Fix XSS policy file loading | https://github.com/thingsboard/thingsboard-edge/commit/d4718ae3545f10c165255b49dfd0317273ae533b | null | null | dao/src/main/java/org/thingsboard/server/dao/service/NoXssValidator.java | 4 | java | false | 2021-04-12T11:43:14Z |
def _safe_read(fp, size):
"""
Reads large blocks in a safe way. Unlike fp.read(n), this function
doesn't trust the user. If the requested size is larger than
SAFEBLOCK, the file is read block by block.
:param fp: File handle. Must implement a <b>read</b> method.
:param size: Number of bytes ... | def _safe_read(fp, size):
"""
Reads large blocks in a safe way. Unlike fp.read(n), this function
doesn't trust the user. If the requested size is larger than
SAFEBLOCK, the file is read block by block.
:param fp: File handle. Must implement a <b>read</b> method.
:param size: Number of bytes ... | Fix DOS in PSDImagePlugin -- CVE-2021-28675
* PSDImagePlugin did not sanity check the number of input layers and
vs the size of the data block, this could lead to a DOS on
Image.open prior to Image.load.
* This issue dates to the PIL fork | https://github.com/python-pillow/Pillow/commit/22e9bee4ef225c0edbb9323f94c26cee0c623497 | null | null | src/PIL/ImageFile.py | 4 | py | false | 2021-03-07T18:04:25Z |
@Override
public @Nullable Map<?, ?> toMap(int index) {
Object obj = toJavaObject(index);
if (obj instanceof Map) {
return ((Map<?, ?>) obj);
}
if (C.lua_istable(L, index) == 1) {
C.lua_pushnil(L);
Map<Object, Object> map = new HashMap<>();
... | @Override
public @Nullable Map<?, ?> toMap(int index) {
Object obj = toJavaObject(index);
if (obj instanceof Map) {
return ((Map<?, ?>) obj);
}
checkStack(2);
if (C.lua_istable(L, index) == 1) {
C.lua_pushnil(L);
Map<Object, Object> map = n... | Fixed Lua stack overflow: causing memory corruption | https://github.com/gudzpoz/luajava/commit/83505ac0aaba37ed1b6434677bd4fd681b391926 | null | null | luajava/src/main/java/party/iroiro/luajava/AbstractLua.java | 4 | java | false | 2022-06-27T15:20:47Z |
public void statusUpdate(Intent intent) {
mHandler.post(() -> {
if (mChildSessionsRemaining.size() == 0) {
// no children to deal with, ignore.
return;
}
final boolean destroyed;
synchronized (mLock) {
... | public void statusUpdate(Intent intent) {
mHandler.post(() -> {
if (mChildSessionsRemaining.size() == 0) {
// no children to deal with, ignore.
return;
}
final boolean destroyed;
synchronized (mLock) {
... | [RESTRICT AUTOMERGE] Fix bypass BG-FGS and BAL via package manager APIs
Opt-in for BAL of PendingIntent for following APIs:
* PackageInstaller.uninstall()
* PackageInstaller.installExistingPackage()
* PackageInstaller.uninstallExistingPackage()
* PackageInstaller.Session.commit()
* PackageInstaller.Session.commitTran... | https://github.com/PixelExperience/frameworks_base/commit/b0b1ddb4b4ba5db27f5616b02ae2cdca8b63496f | null | null | services/core/java/com/android/server/pm/PackageInstallerSession.java | 4 | java | false | 2023-01-11T08:02:27Z |
def values_from_list(values: List[str]) -> Dict[str, str]:
""" Convert a list of values into dict of {name: value} """
output: Dict[str, str] = {}
for i, value in enumerate(values):
if value[0].isalpha():
key = value.upper()
else:
key = f"... | def values_from_list(values: List[str]) -> Dict[str, str]:
""" Convert a list of values into dict of {name: value} """
output: Dict[str, str] = {}
for i, value in enumerate(values):
if value[0].isalpha():
key = value.upper()
else:
key = f"... | Merge pull request from GHSA-9x4c-63pf-525f
* All strings used as file/directory names are now sanitized to address the path traversal vulnerabilities
* Switched calls to utils.spinal_case to utils.kebab_case
* Quotation marks are now escaped in all names/descriptions to address arbitrary code execution issues
* Sa... | https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a | null | null | openapi_python_client/parser/properties.py | 4 | py | false | 2020-08-13T17:05:36Z |
function sendFileInformations(file, peer_id, broadcast = false) {
fileToSend = file;
// check if valid
if (fileToSend && fileToSend.size > 0) {
// no peers in the room
if (!thereIsPeerConnections()) {
return userLog('info', 'No participants detected');
}
let fileI... | function sendFileInformations(file, peer_id, broadcast = false) {
fileToSend = file;
// check if valid
if (fileToSend && fileToSend.size > 0) {
// no peers in the room
if (!thereIsPeerConnections()) {
return userLog('info', 'No participants detected');
}
// preve... | [mirotalk] - #139 fix XSS | https://github.com/miroslavpejic85/mirotalk/commit/d96d3d426cca548a198a985d23d2c1cb76afc580 | CVE-2023-27054 | ['CWE-79'] | public/js/client.js | 4 | js | false | 2023-02-18T08:09:13Z |
static void nsc_encode_subsampling(NSC_CONTEXT* context)
{
UINT16 x;
UINT16 y;
BYTE* co_dst;
BYTE* cg_dst;
INT8* co_src0;
INT8* co_src1;
INT8* cg_src0;
INT8* cg_src1;
UINT32 tempWidth;
UINT32 tempHeight;
tempWidth = ROUND_UP_TO(context->width, 8);
tempHeight = ROUND_UP_TO(context->height, 2);
for (y = 0; ... | static BOOL nsc_encode_subsampling(NSC_CONTEXT* context)
{
UINT16 x;
UINT16 y;
UINT32 tempWidth;
UINT32 tempHeight;
if (!context)
return FALSE;
tempWidth = ROUND_UP_TO(context->width, 8);
tempHeight = ROUND_UP_TO(context->height, 2);
if (tempHeight == 0)
return FALSE;
if (tempWidth > context->priv->Pla... | Fixed CVE-2018-8788
Thanks to Eyal Itkin from Check Point Software Technologies. | https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659 | null | null | libfreerdp/codec/nsc_encode.c | 4 | c | false | 2018-10-22T14:52:21Z |
render(markup, theme, options) {
const html = htmlUtils.processImageTags(markup, data => {
if (!data.src) return null;
const r = utils.imageReplacement(this.ResourceModel_, data.src, options.resources, this.resourceBaseUrl_);
if (!r) return null;
if (typeof r === 'string') {
return {
type: 'rep... | async render(markup, theme, options) {
const cacheKey = md5(escape(markup));
let html = this.cache_.get(cacheKey);
if (!html) {
html = htmlUtils.sanitizeHtml(markup);
html = htmlUtils.processImageTags(html, data => {
if (!data.src) return null;
const r = utils.imageReplacement(this.ResourceModel_... | All: Security: Fixed potential Arbitrary File Read via XSS | https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc | CVE-2020-9038 | ['CWE-79'] | ReactNativeClient/lib/joplin-renderer/HtmlToHtml.js | 4 | js | false | 2020-02-13T23:59:23Z |
@Override
public boolean equals(Object o) {
if (this == o) return true;
if (o == null || getClass() != o.getClass()) return false;
CliContext that = (CliContext) o;
return doNative == that.doNative &&
anyExtensionsAllowed == that.anyExtensionsAllowed &&
hintAboutNonMustSupport == that.hint... | @Override
public boolean equals(Object o) {
if (this == o) return true;
if (o == null || getClass() != o.getClass()) return false;
CliContext that = (CliContext) o;
return doNative == that.doNative &&
anyExtensionsAllowed == that.anyExtensionsAllowed &&
hintAboutNonMustSupport == that.hint... | add -no_unicode_bidi_control_chars to the validator for CVE-2021-42574 (https://trojansource.codes/) | https://github.com/hapifhir/org.hl7.fhir.core/commit/57edd95e8117c1f0450b361cc59fc2b8babab50c | null | null | org.hl7.fhir.validation/src/main/java/org/hl7/fhir/validation/cli/model/CliContext.java | 4 | java | false | 2021-11-02T06:47:25Z |
function ji(e){e.updatedDisplay=e.mustUpdate&&Ui(e.cm,e.update)} | function ji(e){var t=e.cm,n=t.display;e.updatedDisplay&&Jr(t),e.barMeasure=mi(t),n.maxLineChanged&&!t.options.lineWrapping&&(e.adjustWidthTo=er(t,n.maxLine,n.maxLine.text.length).left+3,t.display.sizerWidth=e.adjustWidthTo,e.barMeasure.scrollWidth=Math.max(n.scroller.clientWidth,n.sizer.offsetLeft+e.adjustWidthTo+Yn(t)... | fix: OPTIC-179: Properly ensure content is escaped (#4926)
* fix: OPTIC-179: Properly ensure content is escaped
* ci: Build frontend
Workflow run: https://github.com/HumanSignal/label-studio/actions/runs/6567480699
* update types
* ci: Build frontend
Workflow run: https://github.com/HumanSignal/label-st... | https://github.com/HumanSignal/label-studio/commit/a7a71e594f32ec4af8f3f800d5ccb8662e275da3 | CVE-2023-47115 | ['CWE-79'] | label_studio/frontend/dist/react-app/index.js | 4 | js | false | 2023-10-19T01:22:32Z |
void
ex_diffgetput(exarg_T *eap)
{
linenr_T lnum;
int count;
linenr_T off = 0;
diff_T *dp;
diff_T *dprev;
diff_T *dfree;
int idx_cur;
int idx_other;
int idx_from;
int idx_to;
int i;
int added;
char_u *p;
aco_save_T aco;
buf_T *buf;
int start_skip, ... | void
ex_diffgetput(exarg_T *eap)
{
linenr_T lnum;
int count;
linenr_T off = 0;
diff_T *dp;
diff_T *dprev;
diff_T *dfree;
int idx_cur;
int idx_other;
int idx_from;
int idx_to;
int i;
int added;
char_u *p;
aco_save_T aco;
buf_T *buf;
int start_skip, ... | patch 9.0.0026: accessing freed memory with diff put
Problem: Accessing freed memory with diff put.
Solution: Bail out when diff pointer is no longer valid. | https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e | null | null | src/diff.c | 4 | c | false | 2022-07-02T14:10:00Z |
static int rename_in_ns(int pid, char *oldname, char **newnamep)
{
int fd = -1, ofd = -1, ret, ifindex = -1;
bool grab_newname = false;
ofd = lxc_preserve_ns(getpid(), "net");
if (ofd < 0) {
fprintf(stderr, "Failed opening network namespace path for '%d'.", getpid());
return -1;
}
fd = lxc_preserve_ns(pid, ... | static int rename_in_ns(int pid, char *oldname, char **newnamep)
{
uid_t ruid, suid, euid;
int fret = -1;
int fd = -1, ifindex = -1, ofd = -1, ret;
bool grab_newname = false;
ofd = lxc_preserve_ns(getpid(), "net");
if (ofd < 0) {
usernic_error("Failed opening network namespace path for '%d'.", getpid());
ret... | CVE-2017-5985: Ensure target netns is caller-owned
Before this commit, lxc-user-nic could potentially have been tricked into
operating on a network namespace over which the caller did not hold privilege.
This commit ensures that the caller is privileged over the network namespace by
temporarily dropping privilege.
L... | https://github.com/lxc/lxc/commit/16af238036a5464ae8f2420ed3af214f0de875f9 | null | null | src/lxc/lxc_user_nic.c | 4 | c | false | 2017-01-28T12:02:34Z |
public override ServiceResult<NavigationEntity> Add(NavigationEntity item)
{
if (item.ParentId.IsNullOrEmpty())
{
item.ParentId = "#";
}
item.ID = Guid.NewGuid().ToString("N");
return base.Add(item);
} | public override ServiceResult<NavigationEntity> Add(NavigationEntity item)
{
if (item.ParentId.IsNullOrEmpty())
{
item.ParentId = "#";
}
item.ID = Guid.NewGuid().ToString("N");
Santize(item);
return base.Add(item);
} | Sanitize Html
#457 | https://github.com/SeriaWei/ZKEACMS/commit/833c5460dc5c6152092f6ad54b8b832870a59903 | null | null | src/ZKEACMS/Common/Service/NavigationService.cs | 4 | cs | false | 2022-04-14T14:55:34Z |
def parse_and_validate_server_name(server_name: str) -> Tuple[str, Optional[int]]:
"""Split a server name into host/port parts and do some basic validation.
Args:
server_name: server name to parse
Returns:
host/port parts.
Raises:
ValueError if the server name could not be par... | def parse_and_validate_server_name(server_name: str) -> Tuple[str, Optional[int]]:
"""Split a server name into host/port parts and do some basic validation.
Args:
server_name: server name to parse
Returns:
host/port parts.
Raises:
ValueError if the server name could not be par... | Prevent the media store from writing outside of the configured directory
Also tighten validation of server names by forbidding invalid characters
in IPv6 addresses and empty domain labels. | https://github.com/matrix-org/synapse/commit/91f2bd090 | null | null | synapse/util/stringutils.py | 4 | py | false | 2021-11-19T13:39:15Z |
def getaddresses(fieldvalues):
"""Return a list of (REALNAME, EMAIL) for each fieldvalue."""
all = COMMASPACE.join(str(v) for v in fieldvalues)
a = _AddressList(all)
return a.addresslist | def getaddresses(fieldvalues):
"""Return a list of (REALNAME, EMAIL) or ('','') for each fieldvalue.
When parsing fails for a fieldvalue, a 2-tuple of ('', '') is returned in
its place.
If the resulting list of parsed address is not the same as the number of
fieldvalues in the input list a parsing... | Merge remote-tracking branch 'upstream/main' into 106242 | https://github.com/python/cpython/commit/199abac9b1bd6737df6b7d202ffdbf50728a9c50 | null | null | Lib/email/utils.py | 4 | py | false | 2023-07-13T19:43:45Z |
static int
xfs_iget_cache_hit(
struct xfs_perag *pag,
struct xfs_inode *ip,
xfs_ino_t ino,
int flags,
int lock_flags) __releases(RCU)
{
struct inode *inode = VFS_I(ip);
struct xfs_mount *mp = ip->i_mount;
int error;
/*
* check for re-use of an inode within an RCU grace period due to the
* radix tr... | static int
xfs_iget_cache_hit(
struct xfs_perag *pag,
struct xfs_inode *ip,
xfs_ino_t ino,
int flags,
int lock_flags) __releases(RCU)
{
struct inode *inode = VFS_I(ip);
struct xfs_mount *mp = ip->i_mount;
int error;
/*
* check for re-use of an inode within an RCU grace period due to the
* radix tr... | xfs: validate cached inodes are free when allocated
A recent fuzzed filesystem image cached random dcache corruption
when the reproducer was run. This often showed up as panics in
lookup_slow() on a null inode->i_ops pointer when doing pathwalks.
BUG: unable to handle kernel NULL pointer dereference at 00000000000000... | https://github.com/torvalds/linux/commit/afca6c5b2595fc44383919fba740c194b0b76aff | null | null | fs/xfs/xfs_icache.c | 4 | c | false | 2018-04-18T00:17:34Z |
static int
list_session(char *log_dir, regex_t *re, const char *user, const char *tty)
{
char idbuf[7], *idstr, *cp;
struct eventlog *evlog = NULL;
const char *timestr;
int ret = -1;
debug_decl(list_session, SUDO_DEBUG_UTIL);
if ((evlog = iolog_parse_loginfo(-1, log_dir)) == NULL)
goto done;
... | static int
list_session(struct sudo_lbuf *lbuf, char *log_dir, regex_t *re,
const char *user, const char *tty)
{
char idbuf[7], *idstr, *cp;
struct eventlog *evlog = NULL;
const char *timestr;
int i, ret = -1;
debug_decl(list_session, SUDO_DEBUG_UTIL);
if ((evlog = iolog_parse_loginfo(-1, l... | Escape control characters in log messages and "sudoreplay -l" output.
The log message contains user-controlled strings that could include
things like terminal control characters. Space characters in the
command path are now also escaped.
Command line arguments that contain spaces are surrounded with
single quotes and... | https://github.com/sudo-project/sudo/commit/334daf92b31b79ce68ed75e2ee14fca265f029ca | null | null | plugins/sudoers/sudoreplay.c | 4 | c | false | 2023-01-18T15:21:34Z |
void WebPImage::decodeChunks(uint64_t filesize)
{
DataBuf chunkId(5);
byte size_buff[WEBP_TAG_SIZE];
bool has_canvas_data = false;
#ifdef DEBUG
std::cout << "Reading metadata" << std::endl;
#endif
chunkId.pData_[4] = '\0' ;
while ( !io_->eof() && (uint64... | void WebPImage::decodeChunks(uint32_t filesize)
{
DataBuf chunkId(5);
byte size_buff[WEBP_TAG_SIZE];
bool has_canvas_data = false;
#ifdef DEBUG
std::cout << "Reading metadata" << std::endl;
#endif
chunkId.pData_[4] = '\0' ;
while ( !io_->eof() && (uint64... | Avoid negative integer overflow when `filesize < io_->tell()`.
This fixes #791. | https://github.com/Exiv2/exiv2/commit/b5ea62faabdaa1b885b0545c5193769889eb5993 | null | null | src/webpimage.cpp | 4 | cpp | false | 2019-04-26T09:21:46Z |
static inline void handle_socket_receive_unknown(
fastd_socket_t *sock, const fastd_peer_address_t *local_addr, const fastd_peer_address_t *remote_addr,
fastd_buffer_t *buffer) {
const uint8_t *packet_type = buffer->data;
switch (*packet_type) {
case PACKET_DATA:
fastd_buffer_free(buffer);
if (!backoff_unkno... | static inline void handle_socket_receive_unknown(
fastd_socket_t *sock, const fastd_peer_address_t *local_addr, const fastd_peer_address_t *remote_addr,
fastd_buffer_t *buffer) {
const uint8_t *packet_type = buffer->data;
switch (*packet_type) {
case PACKET_DATA:
fastd_buffer_free(buffer);
if (!backoff_unkno... | receive: fix buffer leak when receiving invalid packets
For fastd versions before v20, this was just a memory leak (which could
still be used for DoS, as it's remotely triggerable). With the new
buffer management of fastd v20, this will trigger an assertion failure
instead as soon as the buffer pool is empty. | https://github.com/NeoRaider/fastd/commit/737925113363b6130879729cdff9ccc46c33eaea | null | null | src/receive.c | 4 | c | false | 2020-10-19T19:08:16Z |
static int analop(RAnal *a, RAnalOp *op, ut64 addr, const ut8 *buf, int len, RAnalOpMask mask) {
int opsize = -1;
op->type = -1;
opsize = 2;
switch (buf[0]) {
case 0x3f:
case 0x4f:
op->type = R_ANAL_OP_TYPE_MOV;
opsize = 4;
break;
case 0x6f:
op->type = R_ANAL_OP_TYPE_MOV;
opsize = 6;
break;
case 0x7... | static int analop(RAnal *a, RAnalOp *op, ut64 addr, const ut8 *buf, int len, RAnalOpMask mask) {
int opsize = -1;
op->type = -1;
opsize = 2;
if (len < 1) {
return -1;
}
switch (buf[0]) {
case 0x3f:
case 0x4f:
op->type = R_ANAL_OP_TYPE_MOV;
opsize = 4;
break;
case 0x6f:
op->type = R_ANAL_OP_TYPE_MOV;
... | Fix 1 byte oobread in the cris analysis plugin ##crash | https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1 | null | null | libr/anal/p/anal_cris.c | 4 | c | false | 2022-04-01T19:03:24Z |
def serve_file_download_backend(
request: HttpRequest, user_profile: UserProfile, realm_id_str: str, filename: str
) -> HttpResponseBase:
return serve_file(request, user_profile, realm_id_str, filename, url_only=False, download=True) | def serve_file_download_backend(
request: HttpRequest, user_profile: UserProfile, realm_id_str: str, filename: str
) -> HttpResponseBase:
return serve_file(
request, user_profile, realm_id_str, filename, url_only=False, force_download=True
) | CVE-2023-22735: Provide the Content-Disposition header from S3.
The Content-Type of user-provided uploads was provided by the browser
at initial upload time, and stored in S3; however, 04cf68b45ebb
switched to determining the Content-Disposition merely from the
filename. This makes uploads vulnerable to a stored XSS,... | https://github.com/zulip/zulip/commit/2f6c5a883e106aa82a570d3d1f243993284b70f3 | null | null | zerver/views/upload.py | 4 | py | false | 2023-01-11T16:36:41Z |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.