func_before
stringlengths
10
482k
func_after
stringlengths
14
484k
cve_id
stringlengths
13
28
cwe_id
stringclasses
776 values
cve_description
stringlengths
30
3.31k
commit_link
stringlengths
48
164
commit_message
stringlengths
1
30.3k
file_name
stringlengths
4
244
extension
stringclasses
20 values
datetime
stringdate
1999-11-10 02:42:49
2024-01-29 16:00:57
static int l2_allocate(BlockDriverState *bs, int l1_index, uint64_t **table) { BDRVQcow2State *s = bs->opaque; uint64_t old_l2_offset; uint64_t *l2_table = NULL; int64_t l2_offset; int ret; old_l2_offset = s->l1_table[l1_index]; trace_qcow2_l2_allocate(bs, l1_index); l2_offset = qco...
static int l2_allocate(BlockDriverState *bs, int l1_index, uint64_t **table) { BDRVQcow2State *s = bs->opaque; uint64_t old_l2_offset; uint64_t *l2_table = NULL; int64_t l2_offset; int ret; old_l2_offset = s->l1_table[l1_index]; trace_qcow2_l2_allocate(bs, l1_index); l2_offset = qco...
null
null
null
qemu/commit/9883975050deffc147a3903d07ff995ecdc8a100
qcow2: Prevent allocating L2 tables at offset 0 If the refcount data is corrupted then we can end up trying to allocate a new L2 table at offset 0 in the image, triggering an assertion in the qcow2 cache that would crash QEMU: qcow2_cache_entry_mark_dirty: Assertion `c->entries[i].offset != 0' failed This patch ad...
./qemu/block/qcow2-cluster.c
c
2017-11-03T14:18:51Z
@Override public TaskQuery caseVariableValueLessThanOrEqual(String name, Object value) { if (orActive) { currentOrQueryObject.variableValueLessThanOrEqual(name, value, ScopeTypes.CMMN); } else { this.variableValueLessThanOrEqual(name, value, ScopeTypes.CMMN); } ...
@Override public TaskQuery caseVariableValueLessThanOrEqual(String name, Object value) { if (orActive) { currentOrQueryObject.scopedVariableValueLessThanOrEqual(name, value, ScopeTypes.CMMN); } else { this.scopedVariableValueLessThanOrEqual(name, value, ScopeTypes.CMMN); ...
null
null
null
https://github.com/flowable/flowable-engine/commit/978708494fb7ea7297ca6eddc7da36bfc4b8ae4e
Rename protected scope related methods to avoid clashing with Groovy method detection
modules/flowable-task-service/src/main/java/org/flowable/task/service/impl/TaskQueryImpl.java
java
2022-04-13T06:45:43Z
def update_inverter(self, inverter_serial, ts, status, etoday, etotal): query = ''' UPDATE Inverters SET TimeStamp='%s', Status='%s', eToday='%s', eTotal='%s' WHERE Serial='%s'; ''' % (ts, status, ...
def update_inverter(self, inverter_serial, ts, status, etoday, etotal): query = ''' UPDATE Inverters SET TimeStamp=?, Status=?, eToday=?, eTotal=? WHERE Serial=?; ''' self.c.execute(query, ...
null
cwe-089
null
github.com/philipptrenz/s0-bridge/commit/269b48caa05377b7c58c3e6d1622a4429cb5ba65
null
util/database.py
py
2019-01-18T13:00:24Z
public void updateDatasource(final OsvAdvisory advisory) { try (QueryManager qm = new QueryManager()) { LOGGER.debug("Synchronizing Google OSV advisory: " + advisory.getId()); final List<VulnerableSoftware> vsList = new ArrayList<>(); final Vulnerability vulnerability = map...
public void updateDatasource(final OsvAdvisory advisory) { try (QueryManager qm = new QueryManager()) { LOGGER.debug("Synchronizing Google OSV advisory: " + advisory.getId()); final List<VulnerableSoftware> vsList = new ArrayList<>(); final Vulnerability vulnerability = map...
null
null
null
https://github.com/DependencyTrack/dependency-track/commit/314bec9091ec84c26edc9f046e375860497b5ce4
Fix wrong alias ID being used for OSV vulnerabilities Fixes #2034 Signed-off-by: nscuro <nscuro@protonmail.com>
src/main/java/org/dependencytrack/tasks/OsvDownloadTask.java
java
2022-10-11T16:47:22Z
Chapters::~Chapters() { while (m_editions_count > 0) { Edition& e = m_editions[--m_editions_count]; e.Clear(); } }
Chapters::~Chapters() { while (m_editions_count > 0) { Edition& e = m_editions[--m_editions_count]; e.Clear(); } delete[] m_editions; }
CVE-2016-2464
CWE-20
libvpx in libwebm in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted mkv file, aka internal bug 23167726.
https://android.googlesource.com/platform/external/libvpx/+/cc274e2abe8b2a6698a5c47d8aa4bb45f1f9538d
external/libvpx/libwebm: Update snapshot Update libwebm snapshot. This update contains security fixes from upstream. Upstream git hash: 229f49347d19b0ca0941e072b199a242ef6c5f2b BUG=23167726 Change-Id: Id3e140e7b31ae11294724b1ecfe2e9c83b4d4207 (cherry picked from commit d0281a15b3c6bd91756e453cc9398c5ef412d99a)
libwebm/mkvparser.cpp
cpp
null
enum authfile_ret authfile_load(const char *file) { struct stat sb; char *auth_data = NULL; auth_t auth_entries[MAX_ENTRIES]; FILE *pwfile = fopen(file, "r"); if (pwfile == NULL) { return AUTHFILE_OPENFAIL; } else if (fstat(fileno(pwfile), &sb)) { fclose(pwfile); return ...
enum authfile_ret authfile_load(const char *file) { struct stat sb; char *auth_data = NULL; auth_t auth_entries[MAX_ENTRIES]; FILE *pwfile = fopen(file, "r"); if (pwfile == NULL) { return AUTHFILE_OPENFAIL; } else if (fstat(fileno(pwfile), &sb)) { fclose(pwfile); return ...
null
null
null
https://github.com/memcached/memcached/commit/264722ae4e248b453be00e97197dadc685b60fd0
Fix minor severity heap buffer overflow reading `--auth-file` Fixes #805 Allocate an extra byte for reading the last entry when there is no `\n` at the end of the file. Also, check if the user contains null bytes when reading the last entry. Unrelatedly, add handling in case the auth file size changes while it is b...
authfile.c
c
2021-07-22T14:17:17Z
static void k_ascii(struct vc_data *vc, unsigned char value, char up_flag) { int base; if (up_flag) return; if (value < 10) { /* decimal input of code, while Alt depressed */ base = 10; } else { /* hexadecimal input of code, while AltGr depressed */ value -= 10; base = 16; } if (npadch == -1) npa...
static void k_ascii(struct vc_data *vc, unsigned char value, char up_flag) { unsigned int base; if (up_flag) return; if (value < 10) { /* decimal input of code, while Alt depressed */ base = 10; } else { /* hexadecimal input of code, while AltGr depressed */ value -= 10; base = 16; } if (!npadch_ac...
CVE-2020-13974
CWE-190
An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae
vt: keyboard: avoid signed integer overflow in k_ascii When k_ascii is invoked several times in a row there is a potential for signed integer overflow: UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow: 10 * 1111111111 cannot be represented in type 'int' CPU: 0 PID: 0 Comm: swappe...
keyboard.c
c
null
lha_read_file_extended_header(struct archive_read *a, struct lha *lha, uint16_t *crc, int sizefield_length, size_t limitsize, size_t *total_size) { const void *h; const unsigned char *extdheader; size_t extdsize; size_t datasize; unsigned int i; unsigned char extdtype; #define EXT_HEADER_CRC 0x00 /* Header...
lha_read_file_extended_header(struct archive_read *a, struct lha *lha, uint16_t *crc, int sizefield_length, size_t limitsize, size_t *total_size) { const void *h; const unsigned char *extdheader; size_t extdsize; size_t datasize; unsigned int i; unsigned char extdtype; #define EXT_HEADER_CRC 0x00 /* Header...
CVE-2019-20509
null
null
https://github.com/libarchive/libarchive/commit/91cf9372e89f7af4582964b15ceb7fc6d1b37471
LHA reader: ensure that UTF-16 input always has a multiple of 2 bytes Fixes #1284
null
null
2019-11-26T22:32:31Z
@SubscribeEvent public void onTick(TickEvent.ClientTickEvent event) { if (event.phase != TickEvent.Phase.START) return; if (DankersSkyblockMod.tickAmount % 20 == 0) { if (Utils.tabLocation.equals("Dwarven Mines") || Utils.tabLocation.equals("Crystal Hollows")) { Collecti...
@SubscribeEvent public void onTick(TickEvent.ClientTickEvent event) { if (event.phase != TickEvent.Phase.START) return; if (DankersSkyblockMod.tickAmount % 20 == 0) { if (Utils.tabLocation.equals("Dwarven Mines") || Utils.tabLocation.equals("Crystal Hollows")) { if (Mine...
null
null
null
https://github.com/bowser0000/SkyblockMod/commit/86103f9e7cb5bf86f7abc34153aec99ed334be2f
Fix crash with powder tracker
src/main/java/me/Danker/features/PowderTracker.java
java
2022-11-05T23:17:39Z
$this->AddValidationError($prop, "$prop exceeds the maximum length of " . $fm->FieldSize . ""); } if ($this->$prop == "" && ($fm->DefaultValue || $fm->IsAutoInsert)) { // these fields are auto-populated so we don't need to validate them unless // ...
$this->AddValidationError($prop, "$prop exceeds the maximum length of " . $fm->FieldSize . ""); } if ($this->$prop == "" && ($fm->DefaultValue || $fm->IsAutoInsert)) { // these fields are auto-populated so we don't need to validate them unless // ...
CVE-2022-2824
CWE-639,CWE-639
Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.
https://github.com/openemr/openemr/commit/c5d99452c173ef21a8e2241e2bbf4b66e2d7fe11
bug fix and php8.1 fixes (#5664) * bug fix and php8.1 fixes * styling
Phreezable.php
php
2022-08-15T16:15:00Z
static int ds1338_recv(I2CSlave *i2c) { DS1338State *s = FROM_I2C_SLAVE(DS1338State, i2c); uint8_t res; res = s->nvram[s->ptr]; s->ptr = (s->ptr + 1) & 0xff; return res; }
static int ds1338_recv(I2CSlave *i2c) { DS1338State *s = FROM_I2C_SLAVE(DS1338State, i2c); uint8_t res; res = s->nvram[s->ptr]; s->ptr = (s->ptr + 1) & (NVRAM_SIZE - 1); return res; }
null
null
null
qemu/commit/ba4906a9b64e165a958e12f6208ca834dc7a36dc
hw/ds1338: Fix mishandling of register pointer Correct several deficiencies in the handling of the register pointer: * it should wrap around after 0x3f, not 0xff * guard against the caller handing us an out of range pointer (on h/w this can never happen, because only a 7 bit value is transferred over the I2C b...
./qemu/hw/ds1338.c
c
2012-10-12T10:54:38Z
private void handleMessage(@NonNull SignalServiceContent content, long timestamp, @NonNull Recipient senderRecipient, @NonNull Optional<Long> smsMessageId) throws IOException, GroupChangeBusyException { try { Recipient threadRecipient = getMessageDestination(content); if (shouldIgnore(content, ...
private void handleMessage(@NonNull SignalServiceContent content, long timestamp, @NonNull Recipient senderRecipient, @NonNull Optional<Long> smsMessageId) throws IOException, GroupChangeBusyException { try { Recipient threadRecipient = getMessageDestination(content); if (shouldIgnore(content, ...
null
null
null
https://github.com/signalapp/Signal-Android/commit/be2ed8989f873f96edfeac9f3e8b7f9a9be46f5b
Fix possible crash in ProfileKeySendJob if given an invalid threadId.
app/src/main/java/org/thoughtcrime/securesms/messages/MessageContentProcessor.java
java
2022-07-01T15:06:37Z
boolean isOrganizerRegistered(@NonNull ITaskFragmentOrganizer organizer) { return mTaskFragmentOrganizerState.containsKey(organizer.asBinder()); }
private boolean isOrganizerRegistered(@NonNull ITaskFragmentOrganizer organizer) { return mTaskFragmentOrganizerState.containsKey(organizer.asBinder()); }
null
null
null
https://github.com/aosp-mirror/platform_frameworks_base/commit/bed37ac501e0b44f8ddc972c2930c5695dafe27c
Fix potential crash when TaskFragmentOrganizer died Before, when TaskFragmentOrganizerController#onTransactionHandled() is called, we will always call #validateAndGetState(), which call throw an exception for racing condition like organizer process died. Bug: 207070762 Test: atest WmTests:TaskFragmentOrganizerControl...
services/core/java/com/android/server/wm/TaskFragmentOrganizerController.java
java
2022-11-17T11:45:43Z
server_request_direct_streamlocal(void) { Channel *c = NULL; char *target, *originator; u_short originator_port; target = packet_get_string(NULL); originator = packet_get_string(NULL); originator_port = packet_get_int(); packet_check_eom(); debug("server_request_direct_streamlocal: originator %s port %d, targ...
server_request_direct_streamlocal(void) { Channel *c = NULL; char *target, *originator; u_short originator_port; target = packet_get_string(NULL); originator = packet_get_string(NULL); originator_port = packet_get_int(); packet_check_eom(); debug("server_request_direct_streamlocal: originator %s port %d, targ...
CVE-2016-10010
CWE-264
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
https://github.com/openbsd/src/commit/c76fac666ea038753294f2ac94d310f8adece9ce
disable Unix-domain socket forwarding when privsep is disabled
serverloop.c
c
2017-01-05T02:59:00Z
static void check_cmd(AHCIState *s, int port) { AHCIPortRegs *pr = &s->dev[port].port_regs; int slot; if ((pr->cmd & PORT_CMD_START) && pr->cmd_issue) { for (slot = 0; (slot < 32) && pr->cmd_issue; slot++) { if ((pr->cmd_issue & (1 << slot)) && !handle_cmd(s, port, slot))...
static void check_cmd(AHCIState *s, int port) { AHCIPortRegs *pr = &s->dev[port].port_regs; int slot; if ((pr->cmd & PORT_CMD_START) && pr->cmd_issue) { for (slot = 0; (slot < 32) && pr->cmd_issue; slot++) { if ((pr->cmd_issue & (1U << slot)) && !handle_cmd(s, port, slot)...
null
null
null
qemu/commit/ee25595f0126de0f83da86cc29ba2365be7a50d2
hw/ide/ahci.c: Avoid shift left into sign bit Add U suffix to avoid shifting left into the sign bit, which is undefined behaviour. Signed-off-by: Peter Maydell <peter.maydell@linaro.org> Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
./qemu/hw/ide/ahci.c
c
2014-03-28T15:12:55Z
static void vp5_parse_coeff(VP56Context *s) { VP56RangeCoder *c = &s->c; VP56Model *model = s->modelp; uint8_t *permute = s->idct_scantable; uint8_t *model1, *model2; int coeff, sign, coeff_idx; int b, i, cg, idx, ctx, ctx_last; int pt = 0; for (b=0; b<6; b++) { int ct = 1; ...
static int vp5_parse_coeff(VP56Context *s) { VP56RangeCoder *c = &s->c; VP56Model *model = s->modelp; uint8_t *permute = s->idct_scantable; uint8_t *model1, *model2; int coeff, sign, coeff_idx; int b, i, cg, idx, ctx, ctx_last; int pt = 0; if (c->end >= c->buffer && c->bits >= 0) { ...
null
null
null
FFmpeg/commit/9e6a2427558a718be0c1fffacffd935f630a7a8d
avcodec/vp56: Check for the bitstream end, pass error codes on Fixes timeout Fixes: 446/fuzz-3-ffmpeg_VIDEO_AV_CODEC_ID_VP6_fuzzer Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
./ffmpeg/libavcodec/vp5.c
c
2017-01-24T21:21:25Z
apr_status_t h2_conn_run(conn_rec *c) { apr_status_t status; int mpm_state = 0; h2_session *session = h2_ctx_get_session(c); ap_assert(session); do { if (c->cs) { c->cs->sense = CONN_SENSE_DEFAULT; c->cs->state = CONN_STATE_HANDLER; } status ...
apr_status_t h2_conn_run(conn_rec *c) { apr_status_t status; int mpm_state = 0; h2_session *session = h2_ctx_get_session(c); ap_assert(session); do { if (c->cs) { c->cs->sense = CONN_SENSE_DEFAULT; c->cs->state = CONN_STATE_HANDLER; } status ...
CVE-2019-9516
CWE-770
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and kee...
https://github.com/icing/mod_h2/commit/dd05d49abe0f67512ce9ed5ba422d7711effecfb
* fixes Timeout vs. KeepAliveTimeout behaviour, see PR 63534 (for trunk now, mpm event backport to 2.4.x up for vote). * Fixes stream cleanup when connection throttling is in place. * Counts stream resets by client on streams initiated by client as cause for connection throttling. * Header length checks are no...
null
null
2019-07-18T12:21:12Z
@Override @TruffleBoundary public void setCursor(final int[] cursorWords, final int[] mask, final int width, final int height, final int depth, final int offsetX, final int offsetY) { final Dimension bestCursorSize = TOOLKIT.getBestCursorSize(width, height); final Cursor cursor; if (best...
@Override @TruffleBoundary public void setCursor(final int[] cursorWords, final int[] mask, final int width, final int height, final int depth, final int offsetX, final int offsetY) { final Dimension bestCursorSize = TOOLKIT.getBestCursorSize(width, height); final Cursor cursor; if (best...
null
null
null
https://github.com/hpi-swa/trufflesqueak/commit/8cfb5df03beeb14be63151e9f35c83dfde493339
Fix a crash in primitiveBeCursor Closes #151
src/de.hpi.swa.trufflesqueak/src/de/hpi/swa/trufflesqueak/io/SqueakDisplay.java
java
2021-11-01T18:30:42Z
private double walkingPhase(double time) { double timeHours = MarsClock.HOURS_PER_MILLISOL * time; double speed = 0; if (person != null) { speed = person.calculateWalkSpeed(); } else if (robot != null) { speed = robot.calculateWalkSpeed(); } else { throw new IllegalStateException("Do not know...
private double walkingPhase(double time) { double timeHours = MarsClock.HOURS_PER_MILLISOL * time; double speed = 0; if (person != null) { speed = person.calculateWalkSpeed(); } else if (robot != null) { speed = robot.calculateWalkSpeed(); } else { throw new IllegalStateException("Do not know...
null
null
null
https://github.com/mars-sim/mars-sim/commit/15efb256a26aaa9e4518de304938fb98e507569a
Revise checking a person's settlement r6360 2021-10-28 Note: since the last few commits, isInSettlement() will check if a person is inside ## FIX 1. Avoid NPE - Reorder the checking of a person's whereabout in getCurrentMissionLocation() in Mission. - Revise getEVASparePartsForTrip() in RoverMission. ## ...
mars-sim-core/src/main/java/org/mars_sim/msp/core/person/ai/task/WalkSettlementInterior.java
java
2021-10-29T02:27:01Z
parse_rfc1123_time(const char *buf, time_t *t) { struct tm tm; char month[4]; char weekday[4]; int i, m; unsigned tm_mday, tm_year, tm_hour, tm_min, tm_sec; if (strlen(buf) != RFC1123_TIME_LEN) return -1; memset(&tm, 0, sizeof(tm)); if (tor_sscanf(buf, "%3s, %2u %3s %u %2u:%2u:%2u GMT", weekday, ...
parse_rfc1123_time(const char *buf, time_t *t) { struct tm tm; char month[4]; char weekday[4]; int i, m; unsigned tm_mday, tm_year, tm_hour, tm_min, tm_sec; if (strlen(buf) != RFC1123_TIME_LEN) return -1; memset(&tm, 0, sizeof(tm)); if (tor_sscanf(buf, "%3s, %2u %3s %u %2u:%2u:%2u GMT", weekday, ...
CVE-2012-4419
null
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison.
https://gitweb.torproject.org/tor.git/commitdiff/973c18bf0e84d14d8006a9ae97fde7f7fb97e404
Fix assertion failure in tor_timegm. Fixes bug 6811.
null
null
null
int dsdb_user_obj_set_primary_group_id(struct ldb_context *ldb, struct ldb_message *usr_obj, uint32_t user_account_control, uint32_t *group_rid_p) { int ret; uint32_t rid; struct ldb_message_element *el; rid = ds_uf2prim_group_rid(user_account_control); ret = samdb_msg_add_uint(ldb, usr_obj, usr_obj, ...
int dsdb_user_obj_set_primary_group_id(struct ldb_context *ldb, struct ldb_message *usr_obj, uint32_t user_account_control, uint32_t *group_rid_p) { int ret; uint32_t rid; rid = ds_uf2prim_group_rid(user_account_control); ret = samdb_msg_add_uint_flags(ldb, usr_obj, usr_obj, "primaryGroupID"...
null
CWE-200
null
https://github.com/samba-team/samba/commit/0a3aa5f908e351201dc9c4d4807b09ed9eedff77
CVE-2022-32746 ldb: Make use of functions for appending to an ldb_message This aims to minimise usage of the error-prone pattern of searching for a just-added message element in order to make modifications to it (and potentially finding the wrong element). BUG: https://bugzilla.samba.org/show_bug.cgi?id=15009 Signed...
null
null
2022-02-21T03:27:37Z
void av_get_channel_layout_string(char *buf, int buf_size, int nb_channels, uint64_t channel_layout) { int i; if (nb_channels <= 0) nb_channels = av_get_channel_layout_nb_channels(channel_layout); for (i = 0; channel_layout_map[i].name; i++) if (nb_channels ...
void av_get_channel_layout_string(char *buf, int buf_size, int nb_channels, uint64_t channel_layout) { int i; if (nb_channels <= 0) nb_channels = av_get_channel_layout_nb_channels(channel_layout); for (i = 0; channel_layout_map[i].name; i++) if (nb_channels ...
null
null
null
FFmpeg/commit/019dd2365729d44d66a5b629102e1ecb919f4f67
Fix av_get_channel_layout_string() for positions >31 A value shifted left by >31 needs to have a 64-bit type. As there are no defined channels in this range, the fix is purely theoretical at this point, although it does avoid some invalid shifts triggering the overflow checker. Signed-off-by: Mans Rullgard <mans@mans...
./ffmpeg/libavutil/audioconvert.c
c
2011-11-25T14:58:50Z
napi_status napi_get_value_string_utf8(napi_env env, napi_value value, char* buf, size_t bufsize, size_t* result) { CHECK_ENV(env); CHECK_ARG(env, value); v8...
napi_status napi_get_value_string_utf8(napi_env env, napi_value value, char* buf, size_t bufsize, size_t* result) { CHECK_ENV(env); CHECK_ARG(env, value); v8...
CVE-2020-8174
CWE-191
napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0.
https://github.com/nodejs/node/commit/656260b4b65fec3b10f6da3fdc9f11fb941aafb5
napi: fix memory corruption vulnerability Fixes: https://hackerone.com/reports/784186 CVE-ID: CVE-2020-8174 PR-URL: https://github.com/nodejs-private/node-private/pull/195 Reviewed-By: Anna Henningsen <anna@addaleax.net> Reviewed-By: Gabriel Schulhof <gabriel.schulhof@intel.com> Reviewed-By: Michael Dawson <michael_da...
null
null
2020-01-27T17:38:36Z
int x25_negotiate_facilities(struct sk_buff *skb, struct sock *sk, struct x25_facilities *new, struct x25_dte_facilities *dte) { struct x25_sock *x25 = x25_sk(sk); struct x25_facilities *ours = &x25->facilities; struct x25_facilities theirs; int len; memset(&theirs, 0, sizeof(theirs)); memcpy(new, ours, siz...
int x25_negotiate_facilities(struct sk_buff *skb, struct sock *sk, struct x25_facilities *new, struct x25_dte_facilities *dte) { struct x25_sock *x25 = x25_sk(sk); struct x25_facilities *ours = &x25->facilities; struct x25_facilities theirs; int len; memset(&theirs, 0, sizeof(theirs)); memcpy(new, ours, siz...
CVE-2016-4580
CWE-200
The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.
https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8
net: fix a kernel infoleak in x25 module Stack object "dte_facilities" is allocated in x25_rx_call_request(), which is supposed to be initialized in x25_negotiate_facilities. However, 5 fields (8 bytes in total) are not initialized. This object is then copied to userland via copy_to_user, thus infoleak occurs. Signed...
x25_facilities.c
c
2016-05-08T16:10:14Z
@Override public void drawHSBBox(long vg, float x, float y, float width, float height, int colorTarget) { drawRoundedRect(vg, x, y, width, height, colorTarget, 8f); try (NVGPaint bg = NVGPaint.create(); NVGColor nvgColor = color(vg, -1); NVGColor nvgColor2 = color(vg, Colo...
@Override public void drawHSBBox(long vg, float x, float y, float width, float height, int colorTarget) { drawRoundedRect(vg, x, y, width, height, colorTarget, 8f); NVGPaint bg = NVGPaint.create(); nvgBeginPath(vg); nvgRoundedRect(vg, x, y, width, height, 8f); NVGColor nvgCo...
null
null
null
https://github.com/Polyfrost/OneConfig/commit/d25e0ec2f60896f1e41dc3947e0984630e63ae6b
new: put all gl text methods in `TextRenderer` fix: fix the 1 year ticket fix: fix color selector literally jvm crashing lmao
src/main/java/cc/polyfrost/oneconfig/internal/renderer/NanoVGHelperImpl.java
java
2022-11-24T08:29:25Z
static int path_set_perms(Item *i, const char *path) { char fn[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)]; _cleanup_close_ int fd = -1; struct stat st; assert(i); assert(path); if (!i->mode_set && !i->uid_set && !i->gid_set) goto shortcut; ...
static int path_set_perms(Item *i, const char *path) { _cleanup_close_ int fd = -1; struct stat st; assert(i); assert(path); fd = open(path, O_NOFOLLOW|O_CLOEXEC|O_PATH); if (fd < 0) { int level = LOG_ERR, r = -errno; /* Option "e" opera...
null
null
null
https://github.com/systemd/systemd/commit/6fb2e9a08f273ec9f7ec46154052f2584f745dbd
tmpfiles: don't resolve pathnames when traversing recursively through directory trees Otherwise we can be fooled if one path component is replaced underneath us. The patch achieves that by always operating at file descriptor level (by using *at() helpers) and by making sure we do not any path resolution when traversi...
src/tmpfiles/tmpfiles.c
c
2018-03-02T16:19:32Z
def change_password_for_user(username): if not userManager.enabled: return jsonify(SUCCESS) if ( current_user is not None and not current_user.is_anonymous and (current_user.get_name() == username or current_user.is_admin) ): if "application/json" not in request.head...
def change_password_for_user(username): if not userManager.enabled: return jsonify(SUCCESS) if ( current_user is not None and not current_user.is_anonymous and ( current_user.get_name() == username or current_user.has_permission(Permissions.SETTINGS) ...
null
null
null
https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f
🔒️ Require the current password for changing it Admins may still change existing user account passwords without having to enter the current one, however the regular user oriented password change dialog has been adjusted to require entry of the current password. The API has been locked down accordingly and the passwor...
src/octoprint/server/api/access.py
py
2022-08-18T15:23:11Z
private function __simple_query($cmd) { if (!empty($this->__setup['resources'])) { if (is_array($this->__setup['resources'])) { foreach ($this->__setup['resources'] as $resource) { $cmd .= " '" . $resource . "'"; } } else { ...
private function __simple_query($cmd) { if (!empty($this->__setup['resources'])) { $this->__request_object['search'] = $this->__setup['resources']; } $commandFile = $this->__generateCommandFile(); $results = shell_exec($cmd . ' --query_data ' . $commandFile); unli...
CVE-2021-41326
NVD-CWE-noinfo
In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call.
https://github.com/MISP/MISP/commit/e36f73947e741bc97320f0c42199acd1a94c7051
chg: [opendata] updated and changed parameter handling
OpendataExport.php
php
2021-09-17T18:15:00Z
uint16_t get_l2protocol(const u_char *pktdata, const int datalen, const int datalink) { uint16_t ether_type; uint16_t eth_hdr_offset = 0; if (!pktdata || !datalen) { errx(-1, "invalid l2 parameters: pktdata=0x%p len=%d", pktdata, datalen); return 0; } switch (datali...
uint16_t get_l2protocol(const u_char *pktdata, const int datalen, const int datalink) { uint16_t eth_hdr_offset = 0; if (!pktdata || !datalen) { errx(-1, "invalid l2 parameters: pktdata=0x%p len=%d", pktdata, datalen); return 0; } switch (datalink) { case DLT_RAW: ...
null
null
null
https://github.com/appneta/tcpreplay/commit/58dfef91fa206f29e52fc5f7efeeb334eeaf37c6
Bug #488 heap overflow csum replace4 (#496) * Bug #488 check for available buffer space before any packet edits * Bug #488 update CHANGELOG
src/common/get.c
c
2018-10-20T11:16:08Z
@RequestMapping(value = "/query/page/new", method = RequestMethod.POST) public ResponseResult<PageBean<Map<String, Object>>> queryPagedJob(@RequestBody PagedJobQO pagedJobQO) { List<String> roles = pagedJobQO.getRole(); List<String> status = pagedJobQO.getStatus(); if (roles != null) { ...
@RequestMapping(value = "/query/page/new", method = RequestMethod.POST) public ResponseResult<PageBean<Map<String, Object>>> queryPagedJob(@RequestBody PagedJobQO pagedJobQO) { ResponseResult responseResult = checkAppKey(); if (responseResult != null) return responseResult; List<String> role...
null
null
null
https://github.com/FederatedAI/FATE-Board/commit/322309265731ada15d1075963744046785fd265e
add api unauthorized notice
src/main/java/com/webank/ai/fate/board/controller/JobManagerController.java
java
2021-11-05T08:24:28Z
protected void dumpKylinPropsAndMetadata(String prj, Set<String> dumpList, KylinConfig kylinConfig, Configuration conf) throws IOException { File tmp = File.createTempFile("kylin_job_meta", ""); FileUtils.forceDelete(tmp); // we need a directory, so delete the file first File metaDi...
protected void dumpKylinPropsAndMetadata(String prj, Set<String> dumpList, KylinConfig kylinConfig, Configuration conf) throws IOException { File tmp = Files.createTempFile("kylin_job_meta", "").toFile(); FileUtils.forceDelete(tmp); // we need a directory, so delete the file first F...
null
null
null
https://github.com/apache/kylin/commit/45341307d573c181fa343a34e95fc76b89a5e0ba
vuln-fix: Temporary File Information Disclosure This fixes temporary file information disclosure vulnerability due to the use of the vulnerable `File.createTempFile()` method. The vulnerability is fixed by using the `Files.createTempFile()` method which sets the correct posix permissions. Weakness: CWE-377: Insecur...
build-engine/src/main/java/org/apache/kylin/engine/mr/common/AbstractHadoopJob.java
java
2022-11-18T22:53:02Z
@Override public void registerAuthenticationHandlerWithPrincipalResolvers(final Collection<AuthenticationHandler> handlers, final PrincipalResolver principalResolver) { handlers.forEach(h -> registerAuthenticationHandlerWithPrincipalResolve...
@Override public void registerAuthenticationHandlerWithPrincipalResolvers(final Collection<AuthenticationHandler> handlers, final PrincipalResolver principalResolver) { handlers.stream().filter(BeanSupplier::isNotProxy).forEach(h -> registe...
null
null
null
https://github.com/apereo/cas/commit/b7ee8d12c6f1266e8ef6a1b040b6f0ae6d38351b
enable mfa provider populator for other mfa providers
core/cas-server-core-authentication-api/src/main/java/org/apereo/cas/authentication/DefaultAuthenticationEventExecutionPlan.java
java
2022-03-07T07:12:26Z
int lzxd_decompress(struct lzxd_stream *lzx, off_t out_bytes) { /* bitstream and huffman reading variables */ register unsigned int bit_buffer; register int bits_left, i=0; unsigned char *i_ptr, *i_end; register unsigned short sym; int match_length, length_footer, extra, verbatim_bits, bytes_todo; int th...
int lzxd_decompress(struct lzxd_stream *lzx, off_t out_bytes) { /* bitstream and huffman reading variables */ register unsigned int bit_buffer; register int bits_left, i=0; unsigned char *i_ptr, *i_end; register unsigned short sym; int match_length, length_footer, extra, verbatim_bits, bytes_todo; int th...
null
CWE-119, CWE-787
null
https://github.com/vrtadmin/clamav-devel/commit/a83773682e856ad6529ba6db8d1792e6d515d7f1
fixing potential OOB window write when unpacking chm files
null
null
2017-03-29T18:55:26Z
bool f2fs_init_extent_tree(struct inode *inode, struct f2fs_extent *i_ext) { struct f2fs_sb_info *sbi = F2FS_I_SB(inode); struct extent_tree *et; struct extent_node *en; struct extent_info ei; if (!f2fs_may_extent_tree(inode)) { /* drop largest extent */ if (i_ext && i_ext->len) { i_ext->len = 0; return...
bool f2fs_init_extent_tree(struct inode *inode, struct f2fs_extent *i_ext) { bool ret = __f2fs_init_extent_tree(inode, i_ext); if (!F2FS_I(inode)->extent_tree) set_inode_flag(inode, FI_NO_EXTENT); return ret; }
null
CWE-119, CWE-787
null
https://github.com/torvalds/linux/commit/dad48e73127ba10279ea33e6dbc8d3905c4d31c0
f2fs: fix a bug caused by NULL extent tree Thread A: Thread B: -f2fs_remount -sbi->mount_opt.opt = 0; <--- -f2fs_iget -do_read_inode -f2fs_init_extent_tree -F2FS_I(inode)->extent_tree is NULL -default_options && parse_options -remount return ...
null
null
2017-05-19T07:06:12Z
OM_uint32 KRB5_CALLCONV gss_unwrap_iov (minor_status, context_handle, conf_state, qop_state, iov, iov_count) OM_uint32 * minor_status; gss_ctx_id_t context_handle; int * conf_state; gss_qop_t *qop_state; gss_iov_buffer_desc * iov; int...
OM_uint32 KRB5_CALLCONV gss_unwrap_iov (minor_status, context_handle, conf_state, qop_state, iov, iov_count) OM_uint32 * minor_status; gss_ctx_id_t context_handle; int * conf_state; gss_qop_t *qop_state; gss_iov_buffer_desc * iov; int...
null
null
null
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
Preserve GSS context on init/accept failure After gss_init_sec_context() or gss_accept_sec_context() has created a context, don't delete the mechglue context on failures from subsequent calls, even if the mechanism deletes the mech-specific context (which is allowed by RFC 2744 but not preferred). Check for union con...
src/lib/gssapi/mechglue/g_unwrap_iov.c
c
2017-07-14T17:02:46Z
@Override public void calculate(@NonNull Player target, @NonNull ContextConsumer consumer) { ClaimCache claimCache = HuskTowns.getClaimCache(); PlayerCache playerCache = HuskTowns.getPlayerCache(); if (claimCache.hasLoaded() && playerCache.hasLoaded()) { Location location = targe...
@Override public void calculate(@NonNull Player target, @NonNull ContextConsumer consumer) { ClaimCache claimCache = HuskTowns.getClaimCache(); PlayerCache playerCache = HuskTowns.getPlayerCache(); if (claimCache.hasLoaded() && playerCache.hasLoaded()) { Location location = targe...
null
null
null
https://github.com/WiIIiam278/HuskTowns/commit/22e14b017edcfe232e215219dec08d52383d07c8
Fix #87 - LuckPerms addon crash due to loading chunk async Signed-off-by: William <will27528@gmail.com>
bukkit/src/main/java/me/william278/husktowns/integrations/luckperms/calculators/PlayerAccessCalculator.java
java
2021-12-31T00:10:42Z
static int decode_nal_sei_message(GetBitContext *gb, void *logctx, HEVCSEI *s, const HEVCParamSets *ps, int nal_unit_type) { int payload_type = 0; int payload_size = 0; int byte = 0xFF; av_log(logctx, AV_LOG_DEBUG, "Decoding SEI\n"); while (byte == 0xFF) { b...
static int decode_nal_sei_message(GetBitContext *gb, void *logctx, HEVCSEI *s, const HEVCParamSets *ps, int nal_unit_type) { int payload_type = 0; int payload_size = 0; int byte = 0xFF; av_log(logctx, AV_LOG_DEBUG, "Decoding SEI\n"); while (byte == 0xFF) { i...
null
null
null
FFmpeg/commit/991ef6e5b9a6a9d95e274ff6bff52db1c82b3808
avcodec/hevc_sei: Fix integer overflows in decode_nal_sei_message() Fixes: signed integer overflow: 2147483520 + 255 cannot be represented in type 'int' Fixes: 4554/clusterfuzz-testcase-minimized-4843714515042304 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Signe...
./ffmpeg/libavcodec/hevc_sei.c
c
2017-12-15T16:50:12Z
snmp_engine(unsigned char *buff, uint32_t buff_len, unsigned char *out, uint32_t *out_len) { static snmp_header_t header; static snmp_varbind_t varbinds[SNMP_MAX_NR_VALUES]; static uint32_t varbind_length = SNMP_MAX_NR_VALUES; buff = snmp_message_decode(buff, buff_len, &header, varbinds, &varbind_length); if...
snmp_engine(snmp_packet_t *snmp_packet) { snmp_header_t header; snmp_varbind_t varbinds[SNMP_MAX_NR_VALUES]; memset(&header, 0, sizeof(header)); memset(varbinds, 0, sizeof(varbinds)); if(!snmp_message_decode(snmp_packet, &header, varbinds)) { return 0; } if(header.version != SNMP_VERSION_1) { i...
CVE-2020-12141
CWE-125
An out-of-bounds read in the SNMP stack in Contiki-NG 4.4 and earlier allows an attacker to cause a denial of service and potentially disclose information via crafted SNMP packets to snmp_ber_decode_string_len_buffer in os/net/app-layer/snmp/snmp-ber.c.
https://github.com/contiki-ng/contiki-ng/commit/12c824386ab60de757de5001974d73b32e19ad71
Refactored SNMP engine after vulnerabilities
snmp-engine.c
c
2021-10-19T16:15:00Z
def deny_uploads_containing_script_tag(uploaded_file): for chunk in uploaded_file.chunks(2048): if chunk.lower().find(b"<script") > -1: raise ValidationError(_("File contains forbidden <script> tag"))
def deny_uploads_containing_script_tag(uploaded_file): for chunk in uploaded_file.chunks(2048): if chunk.lower().find(b"<script") > -1: raise ValidationError(_("File contains forbidden <script> tag")) if chunk.lower().find(b"onload=") > -1: raise ValidationError(_("File cont...
null
null
null
https://github.com/kiwitcms/Kiwi/commit/d789f4b51025de4f8c747c037d02e1b0da80b034
Improve upload validation to check for dangerous attributes
tcms/kiwi_attachments/validators.py
py
2023-05-30T15:42:30Z
base_sock_create(struct net *net, struct socket *sock, int protocol, int kern) { struct sock *sk; if (sock->type != SOCK_RAW) return -ESOCKTNOSUPPORT; sk = sk_alloc(net, PF_ISDN, GFP_KERNEL, &mISDN_proto, kern); if (!sk) return -ENOMEM; sock_init_data(sock, sk); sock->ops = &base_sock_ops; sock->state = S...
base_sock_create(struct net *net, struct socket *sock, int protocol, int kern) { struct sock *sk; if (sock->type != SOCK_RAW) return -ESOCKTNOSUPPORT; if (!capable(CAP_NET_RAW)) return -EPERM; sk = sk_alloc(net, PF_ISDN, GFP_KERNEL, &mISDN_proto, kern); if (!sk) return -ENOMEM; sock_init_data(sock, sk); ...
CVE-2019-17055
CWE-862
base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80
mISDN: enforce CAP_NET_RAW for raw sockets When creating a raw AF_ISDN socket, CAP_NET_RAW needs to be checked first. Signed-off-by: Ori Nimron <orinimron123@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
null
null
null
def deliver!(mail) if ::File.respond_to?(:makedirs) ::File.makedirs settings[:location] else ::FileUtils.mkdir_p settings[:location] end mail.destinations.uniq.each do |to| ::File.open(::File.join(settings[:location], to), 'a') { |f| "#{f.write(mail.encoded)}\r\n\r\n" } ...
def deliver!(mail) if ::File.respond_to?(:makedirs) ::File.makedirs settings[:location] else ::FileUtils.mkdir_p settings[:location] end mail.destinations.uniq.each do |to| ::File.open(::File.join(settings[:location], File.basename(to.to_s)), 'a') { |f| "#{f.write(mail.e...
CVE-2012-2139
CWE-22
Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter.
https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f
Preventing file system traversal in file_delivery method
file_delivery.rb
rb
2012-07-18T18:55:00Z
int kvm_iommu_map_pages(struct kvm *kvm, struct kvm_memory_slot *slot) { gfn_t gfn, end_gfn; pfn_t pfn; int r = 0; struct iommu_domain *domain = kvm->arch.iommu_domain; int flags; /* check if iommu exists and in use */ if (!domain) return 0; gfn = slot->base_gfn; end_gfn = gfn + slot->npages; flags =...
int kvm_iommu_map_pages(struct kvm *kvm, struct kvm_memory_slot *slot) { gfn_t gfn, end_gfn; pfn_t pfn; int r = 0; struct iommu_domain *domain = kvm->arch.iommu_domain; int flags; /* check if iommu exists and in use */ if (!domain) return 0; gfn = slot->base_gfn; end_gfn = gfn + slot->npages; flags =...
CVE-2014-8369
CWE-119
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privilege...
http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
kvm: fix excessive pages un-pinning in kvm_iommu_map error path. The third parameter of kvm_unpin_pages() when called from kvm_iommu_map_pages() is wrong, it should be the number of pages to un-pin and not the page size. This error was facilitated with an inconsistent API: kvm_pin_pages() takes a size, but kvn_unpin_...
null
null
null
double av_get_double(void *obj, const char *name, const AVOption **o_out) { int64_t intnum=1; double num=1; int den=1; av_get_number(obj, name, o_out, &num, &den, &intnum); return num*intnum/den; }
double av_get_double(void *obj, const char *name, const AVOption **o_out) { int64_t intnum=1; double num=1; int den=1; if (av_get_number(obj, name, o_out, &num, &den, &intnum) < 0) return -1; return num*intnum/den; }
null
null
null
FFmpeg/commit/8089b7fa8c5b5a48cc7101daa4be891d0ead5a5e
avoptions: Check the return value from av_get_number This avoids doing a division by zero if the option wasn't found, or wasn't an option of an appropriate type. Signed-off-by: Martin Storsjö <martin@martin.st>
./ffmpeg/libavutil/opt.c
c
2011-05-22T18:34:49Z
static int qemu_chr_open_pipe(QemuOpts *opts, CharDriverState **_chr) { int fd_in, fd_out; char filename_in[256], filename_out[256]; const char *filename = qemu_opt_get(opts, "path"); if (filename == NULL) { fprintf(stderr, "chardev: pipe: no filename given\n"); return -EINVAL; } ...
static CharDriverState *qemu_chr_open_pipe(QemuOpts *opts) { int fd_in, fd_out; char filename_in[256], filename_out[256]; const char *filename = qemu_opt_get(opts, "path"); if (filename == NULL) { fprintf(stderr, "chardev: pipe: no filename given\n"); return NULL; } snprintf(file...
null
null
null
qemu/commit/1f51470d044852592922f91000e741c381582cdc
Revert "qemu-char: Print strerror message on failure" and deps The commit's purpose is laudable: The only way for chardev drivers to communicate an error was to return a NULL pointer, which resulted in an error message that said _that_ something went wrong, but not _why_. It attempts to achieve it by cha...
./qemu/qemu-char.c
c
2012-02-07T14:09:08Z
static int fsmSetFCaps(int dirfd, const char *path, const char *captxt) { int rc = 0; #if WITH_CAP if (captxt && *captxt != '\0') { cap_t fcaps = cap_from_text(captxt); /* cap_set_file() doesn't support dirfd based operation */ if ((dirfd >= 0 && *path != '/') || fcaps == NULL) rc = RPMERR_SETCAP_FAILE...
static int fsmSetFCaps(int fd, int dirfd, const char *path, const char *captxt) { int rc = 0; #if WITH_CAP if (captxt && *captxt != '\0') { cap_t fcaps = cap_from_text(captxt); if (fd >= 0) { if (fcaps == NULL || cap_set_fd(fd, fcaps)) rc = RPMERR_SETCAP_FAILED; } else { if (fcaps == NULL || ca...
null
null
null
https://github.com/rpm-software-management/rpm/commit/4682bcffd8af58cd47385508d9432e313c5cdfd7
Add support for fd-based file metadata setting We need to support both fd-based and (dirfd+) path based operations due to all the lovely mismatches in POSIX, so lotsa half-duplicated tedious stuff here. As of this commit, we only use fd based ops for regular files.
lib/fsm.c
c
2022-02-14T12:23:51Z
int MapOpenSSLErrorSSL() { unsigned long error_code; do { error_code = ERR_get_error(); if (error_code == 0) return ERR_SSL_PROTOCOL_ERROR; } while (ERR_GET_LIB(error_code) != ERR_LIB_SSL); DVLOG(1) << "OpenSSL SSL error, reason: " << ERR_GET_REASON(error_code) << ", name: " << ERR_err...
int MapOpenSSLErrorSSL() { unsigned long error_code; do { error_code = ERR_get_error(); if (error_code == 0) return ERR_SSL_PROTOCOL_ERROR; } while (ERR_GET_LIB(error_code) != ERR_LIB_SSL); DVLOG(1) << "OpenSSL SSL error, reason: " << ERR_GET_REASON(error_code) << ", name: " << ERR_err...
null
null
null
https://github.com/chromium/chromium/commit/b051cdb6465736e7233cd22b807e255554378206
OpenSSL: don't allow the server certificate to change during renegotiation. This mirrors r229611, but for OpenSSL. BUG=306959 Review URL: https://codereview.chromium.org/177143004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@254022 0039d316-1c4b-4281-b951-d872f2087c98
net/socket/ssl_client_socket_openssl.cc
cc
2014-02-28T02:20:16Z
static int set_hwframe_ctx(AVCodecContext *ctx, AVBufferRef *hw_device_ctx) { AVBufferRef *hw_frames_ref; AVHWFramesContext *frames_ctx = NULL; int err = 0; if (!(hw_frames_ref = av_hwframe_ctx_alloc(hw_device_ctx))) { fprintf(stderr, "Failed to create VAAPI frame context.\n"); return -1...
static int set_hwframe_ctx(AVCodecContext *ctx, AVBufferRef *hw_device_ctx) { AVBufferRef *hw_frames_ref; AVHWFramesContext *frames_ctx = NULL; int err = 0; if (!(hw_frames_ref = av_hwframe_ctx_alloc(hw_device_ctx))) { fprintf(stderr, "Failed to create VAAPI frame context.\n"); return -1...
null
null
null
FFmpeg/commit/a763d278274cfbda4e78e21b338b9b525fe22eab
examples/vaapi_encode: Fix leak on hwframe init failure Fixes CID #1424882.
./ffmpeg/doc/examples/vaapi_encode.c
c
2017-12-01T21:06:42Z
private void authorizeBulkItems( RequestInfo requestInfo, AuthorizationContext bulkAuthzContext, AuthorizationEngine authzEngine, AsyncSupplier<ResolvedIndices> resolvedIndicesAsyncSupplier, Metadata metadata, String requestId, ActionListener<Void> listener ) ...
private void authorizeBulkItems( RequestInfo requestInfo, AuthorizationContext bulkAuthzContext, AuthorizationEngine authzEngine, AsyncSupplier<ResolvedIndices> resolvedIndicesAsyncSupplier, Metadata metadata, String requestId, ActionListener<Void> listener ) ...
null
null
null
https://github.com/elastic/elasticsearch/commit/8bccf664b0c3d8814c485256a475e6a1857ede5c
Pre-authorize child search transport actions (#91886) This PR aims to improve authorization performance of `indices:data/read/search` action by avoiding authorizing the transport child actions on every node. The focus is on index search child actions since they are accessing just a subset of parent's indices. Some op...
x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/AuthorizationService.java
java
2022-12-19T15:33:02Z
void SSL_SESSION::CopyX509(X509* x) { if (x == 0) return; X509_NAME* issuer = x->GetIssuer(); X509_NAME* subject = x->GetSubject(); ASN1_STRING* before = x->GetBefore(); ASN1_STRING* after = x->GetAfter(); peerX509_ = NEW_YS X509(issuer->GetName(), issuer->GetLength(), subject->Get...
void SSL_SESSION::CopyX509(X509* x) { if (x == 0) return; X509_NAME* issuer = x->GetIssuer(); X509_NAME* subject = x->GetSubject(); ASN1_STRING* before = x->GetBefore(); ASN1_STRING* after = x->GetAfter(); peerX509_ = NEW_YS X509(issuer->GetName(), issuer->GetLength(), subject->Get...
CVE-2016-2047
CWE-254
The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Co...
https://github.com/mysql/mysql-server/commit/e7061f7e5a96c66cb2e0bf46bec7f6ff35801a69
Bug #22738607: YASSL FUNCTION X509_NAME_GET_INDEX_BY_NID IS NOT WORKING AS EXPECTED.
null
null
2016-02-26T06:23:56Z
ztype(i_ctx_t *i_ctx_p) { os_ptr op = osp; ref tnref; int code = array_get(imemory, op, (long)r_btype(op - 1), &tnref); if (code < 0) return code; if (!r_has_type(&tnref, t_name)) { /* Must be either a stack underflow or a t_[a]struct. */ check_op(2); { ...
ztype(i_ctx_t *i_ctx_p) { os_ptr op = osp; ref tnref; int code = array_get(imemory, op, (long)r_btype(op - 1), &tnref); if (code < 0) return code; if (!r_has_type(&tnref, t_name)) { /* Must be either a stack underflow or a t_[a]struct. */ check_op(2); { ...
CVE-2018-16511
CWE-704
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0edd3d6c634a577db261615a9dc2719bca7f6e01
null
null
c
null
public static void initializePermissionAPI() { if (PermissionAPI.activeHandler != null) throw new IllegalStateException("Tried to initialize PermissionAPI multiple times!"); PermissionGatherEvent.Handler handlerEvent = new PermissionGatherEvent.Handler(); MinecraftForge.EVENT_BUS.post(handl...
public static void initializePermissionAPI() { Class callerClass = StackWalker.getInstance(StackWalker.Option.RETAIN_CLASS_REFERENCE).getCallerClass(); if (callerClass != ServerLifecycleHooks.class) { LOGGER.warn("{} tried to initialize the PermissionAPI, this call will be ignore...
null
null
null
https://github.com/neoforged/NeoForge/commit/335cb5edc4467a213a01a315e75aad5aa3569f34
Fix crash with PermissionsAPI (#8330) Fixes a crash in singleplayer, when the internal server didn't shut down correctly between world loads.
src/main/java/net/minecraftforge/server/permission/PermissionAPI.java
java
2022-01-02T18:43:07Z
void ed_map_dst(ed_t p, const uint8_t *msg, int len, const uint8_t *dst, int dst_len) { bn_t k; fp_t t; ed_t q; /* enough space for two field elements plus extra bytes for uniformity */ const int len_per_elm = (FP_PRIME + ed_param_level() + 7) / 8; uint8_t *pseudo_random_bytes = RLC_ALLOCA(uint8_t, 2 * len_per_el...
void ed_map_dst(ed_t p, const uint8_t *msg, size_t len, const uint8_t *dst, size_t dst_len) { bn_t k; fp_t t; ed_t q; /* enough space for two field elements plus extra bytes for uniformity */ const int len_per_elm = (FP_PRIME + ed_param_level() + 7) / 8; uint8_t *pseudo_random_bytes = RLC_ALLOCA(uint8_t, 2 * le...
null
null
null
https://github.com/relic-toolkit/relic/commit/34580d840469361ba9b5f001361cad659687b9ab
Huge commit improving the API to use size_t instead of int.
src/ed/relic_ed_map.c
c
2022-11-14T20:47:12Z
static inline void sem_lock_and_putref(struct sem_array *sma) { ipc_lock_by_ptr(&sma->sem_perm); ipc_rcu_putref(sma); }
static inline void sem_lock_and_putref(struct sem_array *sma) { rcu_read_lock(); sem_lock(sma, NULL, -1); ipc_rcu_putref(sma); }
null
CWE-703, CWE-189
null
https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3
ipc,sem: fine grained locking for semtimedop Introduce finer grained locking for semtimedop, to handle the common case of a program wanting to manipulate one semaphore from an array with multiple semaphores. If the call is a semop manipulating just one semaphore in an array with multiple semaphores, only take the loc...
null
null
2013-05-01T02:15:44Z
static char* allocFromUTF16(const char16_t* in, size_t len) { if (len == 0) return getEmptyString(); const ssize_t bytes = utf16_to_utf8_length(in, len); if (bytes < 0) { return getEmptyString(); } SharedBuffer* buf = SharedBuffer::alloc(bytes+1); ALOG_ASSERT(buf, "Unable to al...
static char* allocFromUTF16(const char16_t* in, size_t len) { if (len == 0) return getEmptyString(); // Allow for closing '\0' const ssize_t resultStrLen = utf16_to_utf8_length(in, len) + 1; if (resultStrLen < 1) { return getEmptyString(); } SharedBuffer* buf = SharedBuffer::al...
CVE-2016-3861
CWE-119,CWE-264
LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffe...
https://android.googlesource.com/platform/system/core/+/ecf5fd58a8f50362ce9e8d4245a33d56f29f142b
libutils/Unicode.cpp: Correct length computation and add checks for utf16->utf8 Inconsistent behaviour between utf16_to_utf8 and utf16_to_utf8_length is causing a heap overflow. Correcting the length computation and adding bound checks to the conversion functions. Test: ran libutils_tests Bug: 29250543 Change-Id: I6...
libutils/String8.cpp
cpp
null
void update_rate_histogram(struct rate_hist *hist, const vpx_codec_enc_cfg_t *cfg, const vpx_codec_cx_pkt_t *pkt) { int i; int64_t then = 0; int64_t avg_bitrate = 0; int64_t sum_sz = 0; const int64_t now = pkt->data.frame.pts * 1000 * (uint64_t)cfg->g_timebase.num / (uint64_t)cfg->g_timebase.den; int idx = h...
void update_rate_histogram(struct rate_hist *hist, const vpx_codec_enc_cfg_t *cfg, const vpx_codec_cx_pkt_t *pkt) { int i; int64_t then = 0; int64_t avg_bitrate = 0; int64_t sum_sz = 0; const int64_t now = pkt->data.frame.pts * 1000 * (uint64_t)cfg->g_timebase.num / (uint64_t)cfg->g_timebase.den; int idx = h...
CVE-2016-1621
CWE-119
libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792.
https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426
Merge Conflict Fix CL to lmp-mr1-release for ag/849478 DO NOT MERGE - libvpx: Pull from upstream Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06 BUG=23452792 Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec
libvpx/rate_hist.c
c
null
static void virtio_balloon_set_config(VirtIODevice *vdev, const uint8_t *config_data) { VirtIOBalloon *dev = VIRTIO_BALLOON(vdev); struct virtio_balloon_config config; uint32_t oldactual = dev->actual; memcpy(&config, config_data, 8); dev->actual = le32_to_cpu(c...
static void virtio_balloon_set_config(VirtIODevice *vdev, const uint8_t *config_data) { VirtIOBalloon *dev = VIRTIO_BALLOON(vdev); struct virtio_balloon_config config; uint32_t oldactual = dev->actual; memcpy(&config, config_data, 8); dev->actual = le32_to_cpu(c...
null
null
null
qemu/commit/dcc6ceffc066745777960a1f0d32f3a555924f65
virtio-balloon: fix integer overflow in BALLOON_CHANGE QMP event Because dev->actual is uint32_t, the expression 'dev->actual << VIRTIO_BALLOON_PFN_SHIFT' is truncated to 32 bits. This overflows when dev->actual >= 1048576. To reproduce: 1. Start a VM with a QMP socket and 5G of RAM 2. Connect to the QMP socket, n...
./qemu/hw/virtio/virtio-balloon.c
c
2013-04-18T15:53:32Z
static int kvm_dirty_pages_log_change(target_phys_addr_t phys_addr, target_phys_addr_t end_addr, unsigned flags, unsigned mask) { KVMState *s = kvm_state; KVMSlot *mem = kvm_lookup_slot(s, phys_addr); if (mem == NULL) { ...
static int kvm_dirty_pages_log_change(target_phys_addr_t phys_addr, ram_addr_t size, unsigned flags, unsigned mask) { KVMState *s = kvm_state; KVMSlot *mem = kvm_lookup_matching_slot(s, phys_addr, phys_addr + size); if (mem == NULL)...
null
null
null
qemu/commit/d3f8d37fe2d0c24ec8bac9c94d5b0e2dc09c0d2a
kvm: Add sanity checks to slot management (Jan Kiszka) Fail loudly if we run out of memory slot. Make sure that dirty log start/stop works with consistent memory regions by reporting invalid parameters. This reveals several inconsistencies in the vga code, patch to fix them follows later in this series. And, for sim...
./qemu/kvm-all.c
c
2009-04-17T14:26:29Z
av_cold void ff_sws_init_input_funcs(SwsContext *c) { enum PixelFormat srcFormat = c->srcFormat; c->chrToYV12 = NULL; switch(srcFormat) { case PIX_FMT_YUYV422 : c->chrToYV12 = yuy2ToUV_c; break; case PIX_FMT_UYVY422 : c->chrToYV12 = uyvyToUV_c; break; case PIX_FMT_NV12 : c->chr...
av_cold void ff_sws_init_input_funcs(SwsContext *c) { enum PixelFormat srcFormat = c->srcFormat; c->chrToYV12 = NULL; switch(srcFormat) { case PIX_FMT_YUYV422 : c->chrToYV12 = yuy2ToUV_c; break; case PIX_FMT_UYVY422 : c->chrToYV12 = uyvyToUV_c; break; case PIX_FMT_NV12 : c->chr...
null
null
null
FFmpeg/commit/f972193a15026a99eb2b08e7913a03f2123663da
Support RGBA64 as input colour space. Mostly fixes ticket #503, opaque still overflows for RGBA64 -> RGBA conversion.
./ffmpeg/libswscale/input.c
c
2012-03-03T23:43:18Z
static void sdl_audio_callback(void *opaque, Uint8 *stream, int len) { VideoState *is = opaque; int audio_size, len1, silence = 0; audio_callback_time = av_gettime_relative(); while (len > 0) { if (is->audio_buf_index >= is->audio_buf_size) { audio_size = audio_decode_frame(is); ...
static void sdl_audio_callback(void *opaque, Uint8 *stream, int len) { VideoState *is = opaque; int audio_size, len1; audio_callback_time = av_gettime_relative(); while (len > 0) { if (is->audio_buf_index >= is->audio_buf_size) { audio_size = audio_decode_frame(is); if (aud...
null
null
null
FFmpeg/commit/a07934d51b40b0f48be531a359d39c091c414643
ffplay: fix silence insertion on error or pause Insertion of silence was a bit broken since df34b700981de606ca4847e1ed0bfdf9ac3e9104 because the info whether or not the source buffer supposed to be silence must be kept between callbacks. Failing to do so causes rogue samples from the last buffer to be presented, I gue...
./ffmpeg/ffplay.c
c
2016-04-03T19:23:41Z
static void WriteTo8BimProfile(Image *image,const char *name, const StringInfo *profile) { const unsigned char *datum, *q; register const unsigned char *p; size_t length; StringInfo *profile_8bim; ssize_t count; unsigned char length_byte; unsigned int value; uns...
static void WriteTo8BimProfile(Image *image,const char *name, const StringInfo *profile) { const unsigned char *datum, *q; register const unsigned char *p; size_t length; StringInfo *profile_8bim; ssize_t count; unsigned char length_byte; unsigned int value; uns...
CVE-2016-7536
CWE-20
magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.
https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453
Fixed SEGV reported in https://github.com/ImageMagick/ImageMagick/issues/130
magick/profile.c
c
null
static int unix_stream_connect(struct socket *sock, struct sockaddr *uaddr, int addr_len, int flags) { struct sockaddr_un *sunaddr=(struct sockaddr_un *)uaddr; struct sock *sk = sock->sk; struct unix_sock *u = unix_sk(sk), *newu, *otheru; struct sock *newsk = NULL; struct sock *other = NULL; struct sk_b...
static int unix_stream_connect(struct socket *sock, struct sockaddr *uaddr, int addr_len, int flags) { struct sockaddr_un *sunaddr=(struct sockaddr_un *)uaddr; struct sock *sk = sock->sk; struct unix_sock *u = unix_sk(sk), *newu, *otheru; struct sock *newsk = NULL; struct sock *other = NULL; struct sk_b...
CVE-2008-5029
null
The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and ...
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=1fd05ba5a2f2aa8e7b9b52ef55df850e2e7d54c9
[AF_UNIX]: Rewrite garbage collector, fixes race. Throw out the old mark & sweep garbage collector and put in a refcounting cycle detecting one. The old one had a race with recvmsg, that resulted in false positives and hence data loss. The old algorithm operated on all unix sockets in the system, so any additional l...
null
null
null
@Method(0x8001bbccL) public static void FUN_8001bbcc(final int x, final int y) { FUN_8001b92c(); final long s2 = _800bd700.getAddress(); long packet; if(doubleBufferFrame_800bb108.get() != 0) { //LAB_8001bf3c GPU.queueCommand(6, new GpuCommandPoly(4) .bpp(Bpp.BITS_15) .vra...
@Method(0x8001bbccL) public static void FUN_8001bbcc(final int x, final int y) { FUN_8001b92c(); final long s2 = _800bd700.getAddress(); long packet; if(doubleBufferFrame_800bb108.get() != 0) { //LAB_8001bf3c GPU.queueCommand(6, new GpuCommandPoly(4) .bpp(Bpp.BITS_15) .vra...
null
null
null
https://github.com/Legend-of-Dragoon-Modding/Severed-Chains/commit/f99608ab535148601d96a08d1dce2806342fd5dd
Cleanup; fix item list; fix addition squares not being red on counter-attack
src/main/java/legend/game/Scus94491BpeSegment.java
java
2022-11-02T20:33:19Z
static inline int get_amv(Mpeg4DecContext *ctx, int n) { MpegEncContext *s = &ctx->m; int x, y, mb_v, sum, dx, dy, shift; int len = 1 << (s->f_code + 4); const int a = s->sprite_warping_accuracy; if (s->workaround_bugs & FF_BUG_AMV) len >>= s->quarter_sample; if (s->real_sprite_warpi...
static inline int get_amv(Mpeg4DecContext *ctx, int n) { MpegEncContext *s = &ctx->m; int x, y, mb_v, sum, dx, dy, shift; int len = 1 << (s->f_code + 4); const int a = s->sprite_warping_accuracy; if (s->workaround_bugs & FF_BUG_AMV) len >>= s->quarter_sample; if (s->real_sprite_warpi...
null
null
null
FFmpeg/commit/6179dc8aa7e5fc5358b9614306f93f1adadf22a4
avcodec/mpeg4video: Fix runtime error: left shift of negative value Fixes: 644/clusterfuzz-testcase-4726434209726464 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
./ffmpeg/libavcodec/mpeg4videodec.c
c
2017-02-22T00:22:24Z
static int flattenSubquery( Parse *pParse, /* Parsing context */ Select *p, /* The parent or outer SELECT statement */ int iFrom, /* Index in p->pSrc->a[] of the inner subquery */ int isAgg /* True if outer SELECT uses aggregate functions */ ){ const char *zSavedAuthContex...
static int flattenSubquery( Parse *pParse, /* Parsing context */ Select *p, /* The parent or outer SELECT statement */ int iFrom, /* Index in p->pSrc->a[] of the inner subquery */ int isAgg /* True if outer SELECT uses aggregate functions */ ){ const char *zSavedAuthContex...
null
CWE-476
null
https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35
Continue to back away from the LEFT JOIN optimization of check-in [41c27bc0ff1d3135] by disallowing query flattening if the outer query is DISTINCT. Without this fix, if an index scan is run on the table within the view on the right-hand side of the LEFT JOIN, stale result registers might be accessed yielding incorrec...
null
null
2019-12-18T20:51:58Z
int snd_card_disconnect(struct snd_card *card) { struct snd_monitor_file *mfile; if (!card) return -EINVAL; spin_lock(&card->files_lock); if (card->shutdown) { spin_unlock(&card->files_lock); return 0; } card->shutdown = 1; spin_unlock(&card->files_lock); /* phase 1: disable fops (user space) operation...
int snd_card_disconnect(struct snd_card *card) { struct snd_monitor_file *mfile; if (!card) return -EINVAL; spin_lock(&card->files_lock); if (card->shutdown) { spin_unlock(&card->files_lock); return 0; } card->shutdown = 1; spin_unlock(&card->files_lock); /* replace file->f_op with special dummy operat...
CVE-2019-15214
CWE-416
An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
ALSA: core: Fix card races between register and disconnect There is a small race window in the card disconnection code that allows the registration of another card with the very same card id. This leads to a warning in procfs creation as caught by syzkaller. The problem is that we delete snd_cards and snd_cards_lock ...
init.c
c
null
@Override public void tryLockAndAttack() { super.tryLockAndAttack(); if (isAttacking() && (target.hasEffect(EntityEffect.NPC_ISH) || target.hasEffect(EntityEffect.ISH) || target.getHealth().hpDecreasedIn(3_000)) || hero...
@Override public void tryLockAndAttack() { super.tryLockAndAttack(); if (!hasTarget()) return; if (hero.distanceTo(target) > 1_000 || (isAttacking() && ( target.hasEffect(EntityEffect.NPC_ISH) || target.hasEffect(EntityEffect.ISH) ...
null
null
null
https://github.com/darkbot-reloaded/DarkBot/commit/3876b1c0f750ada2c2c35f302b717fdb30ac54fe
Update api, fix NPE on lock, beta 115
src/main/java/com/github/manolo8/darkbot/modules/utils/AttackAPIImpl.java
java
2022-12-24T16:00:02Z
bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format, int width, int height, bool init_to_zero) { if (!IsImageDataFormatSupported(format)) return false; // Only support this one format for now. if (width <= 0 || height <= 0) return false; ...
bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format, int width, int height, bool init_to_zero) { if (!IsImageDataFormatSupported(format)) return false; // Only support this one format for now. if (width <= 0 || height <= 0) return false; ...
CVE-2012-5143
CWE-190
Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers.
https://github.com/chromium/chromium/commit/ad103a1564365c95f4ee4f10261f9604f91f686a
Security fix: integer overflow on checking image size Test is left in another CL (codereview.chromiu,.org/11274036) to avoid conflict there. Hope it's fine. BUG=160926 Review URL: https://chromiumcodereview.appspot.com/11410081 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@167882 0039d316-1c4b-4281-b951-d87...
webkit/plugins/ppapi/ppb_image_data_impl.cc
cc
2012-11-15T07:27:55Z
static void dump_table(char *table, char *db) { char ignore_flag; char buf[200], table_buff[NAME_LEN+3]; DYNAMIC_STRING query_string; char table_type[NAME_LEN]; char *result_table, table_buff2[NAME_LEN*2+3], *opt_quoted_table; int error= 0; ulong rownr, row_break, total_length, init_length; uint...
static void dump_table(char *table, char *db) { char ignore_flag; char buf[200], table_buff[NAME_LEN+3]; DYNAMIC_STRING query_string; char table_type[NAME_LEN]; char *result_table, table_buff2[NAME_LEN*2+3], *opt_quoted_table; int error= 0; ulong rownr, row_break, total_length, init_length; uint...
CVE-2017-3600
null
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromis...
https://github.com/MariaDB/server/commit/5a43a31ee81bc181eeb5ef2bf0704befa6e0594d
mysqldump: comments and identifiers with new lines don't let identifiers with new lines to break a comment
null
null
2016-10-13T22:33:49Z
bool IsConstantFoldable( const Node* n, const std::unordered_map<string, std::vector<PartialTensorShape>>* shape_map, const std::function<bool(const Node*)>& consider, int64_t max_constant_size_in_bytes, std::unordered_map<const Node*, std::vector<Tensor>>* shape_replacement_map) { ...
bool IsConstantFoldable( const Node* n, const std::unordered_map<string, std::vector<PartialTensorShape>>* shape_map, const std::function<bool(const Node*)>& consider, int64_t max_constant_size_in_bytes, std::unordered_map<const Node*, std::vector<Tensor>>* shape_replacement_map) { ...
CVE-2021-41204
CWE-824
TensorFlow is an open source platform for machine learning. In affected versions during TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change. The fix will be included in TensorFlow 2.7.0. We will als...
https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659
Don't constant-fold DT_RESOURCE constants. PiperOrigin-RevId: 391803952 Change-Id: I0ea3ec31d3e7dfda0f03b4027a237f08d00a3091
constant_folding.cc
cc
2021-08-19T18:25:32Z
private void initialize(CustomConfigFields customConfigFields) { //Create configuration file from defaults if it does not exist File file = ConfigurationEngine.fileCreator(folderName, customConfigFields.getFilename()); //Get config file FileConfiguration fileConfiguration = Configuration...
private void initialize(CustomConfigFields customConfigFields) { //Create configuration file from defaults if it does not exist File file = ConfigurationEngine.fileCreator(folderName, customConfigFields.getFilename()); //Get config file FileConfiguration fileConfiguration = Configuration...
null
null
null
https://github.com/MagmaGuy/EliteMobs/commit/1ace0925399e412b9958744fe5dd8afbcbcf11d0
EliteMobs 7.3.5-SNAPSHOT-3 - [Fix] Fixed error related to the Ground Pound power - [Fix] Fixed error related to the Skeleton Pillar power - [Fix] Fixed enum generation for config defaults in config files - [Fix] Fixed crash when uninstalling world-based minidungeons - [Fix] Schematic-based minidungeons now install corr...
src/main/java/com/magmaguy/elitemobs/config/CustomConfig.java
java
2021-08-03T09:32:38Z
private void handle(ServletRequestHandler pReqHandler,HttpServletRequest pReq, HttpServletResponse pResp) throws IOException { JSONAware json = null; try { // Check access policy requestHandler.checkAccess(allowDnsReverseLookup ? pReq.getRemoteHost() : null, ...
private void handle(ServletRequestHandler pReqHandler,HttpServletRequest pReq, HttpServletResponse pResp) throws IOException { JSONAware json = null; try { // Check access policy requestHandler.checkAccess(allowDnsReverseLookup ? pReq.getRemoteHost() : null, ...
CVE-2018-1000129
CWE-79
An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.
https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f
fix: Verify a given 'mimeType' and/or 'callback' request parameter So that only fixed values are possible, in order to avoid XSS attack vectors.
AgentServlet.java
java
2018-03-14T13:29:00Z
@Override public void init() { if (this.minecraft.player == null) { return; } this.render = this.itemRenderer; // this.buttons.clear(); this.scrollList = new ScrollingBlockList((this.getWidth() / 2) - 37, this.getHeight() / 2 + 10, 203, 185, this.itemList, this);...
@Override public void init() { if (this.minecraft.player == null) { return; } this.render = this.itemRenderer; // this.buttons.clear(); this.scrollList = new ScrollingBlockList((this.getWidth() / 2) - 37, this.getHeight() / 2 + 10, 203, 185, this.itemList, this);...
null
null
null
https://github.com/AdvancedXRay/XRay-Fabric/commit/45218dd4536bfe70ccb329ef3759646109220ea4
fix: crashing issues and other issues found during testing
src/main/java/pro/mikey/fabric/xray/screens/forge/GuiSelectionScreen.java
java
2022-12-23T10:13:02Z
@Override public List<ITextComponent> getTooltipLines() { List<ITextComponent> strings = new ArrayList<>(); strings.add(new StringTextComponent(TextFormatting.GOLD + new TranslationTextComponent("tooltip.titanium.tank.fluid").getString()).append(tank.getFluidInTank(tankSlot).isEmpty() ? new Translat...
@Override public List<ITextComponent> getTooltipLines() { List<ITextComponent> strings = new ArrayList<>(); strings.add(new StringTextComponent(TextFormatting.GOLD + new TranslationTextComponent("tooltip.titanium.tank.fluid").getString()).append(tank.getFluidInTank(tankSlot).isEmpty() ? new Translat...
null
null
null
https://github.com/InnovativeOnlineIndustries/Industrial-Foregoing/commit/4a6391d80a381ec1a808492f82a5f78e3538e4b9
Fixed Tank GUI interaction bypassing bucket limits
src/main/java/com/buuz135/industrial/gui/component/ItemStackTankScreenAddon.java
java
2021-05-29T20:42:17Z
def _cliq_run(self, verb, cliq_args, check_exit_code=True): """Runs a CLIQ command over SSH, without doing any result parsing""" cliq_arg_strings = [] for k, v in cliq_args.items(): cliq_arg_strings.append(" %s=%s" % (k, v)) cmd = verb + ''.join(cliq_arg_strings) ret...
def _cliq_run(self, verb, cliq_args, check_exit_code=True): """Runs a CLIQ command over SSH, without doing any result parsing""" cmd_list = [verb] for k, v in cliq_args.items(): cmd_list.append("%s=%s" % (k, v)) return self._run_ssh(cmd_list, check_exit_code)
null
cwe-078
null
github.com/thatsdone/cinder/commit/c55589b131828f3a595903f6796cb2d0babb772f
null
cinder/volume/drivers/san/hp_lefthand.py
py
2013-07-18T15:05:43Z
int ffio_ensure_seekback(AVIOContext *s, int64_t buf_size) { uint8_t *buffer; int max_buffer_size = s->max_packet_size ? s->max_packet_size : IO_BUFFER_SIZE; int filled = s->buf_end - s->buffer; ptrdiff_t checksum_ptr_offset = s->checksum_ptr ? s->checksum_ptr - s->buffer : -1;...
int ffio_ensure_seekback(AVIOContext *s, int64_t buf_size) { uint8_t *buffer; int max_buffer_size = s->max_packet_size ? s->max_packet_size : IO_BUFFER_SIZE; int filled = s->buf_end - s->buffer; ptrdiff_t checksum_ptr_offset = s->checksum_ptr ? s->checksum_ptr - s->buffer : -1;...
null
null
null
FFmpeg/commit/dc87758775e2ce8be84e4fe598e12416e83d2845
avio: fix potential crashes when combining ffio_ensure_seekback + crc Calling ffio_ensure_seekback() if ffio_init_checksum() has been called on the same context can lead to out of bounds memory accesses and crashes. The reason is that ffio_ensure_seekback() does not update checksum_ptr after reallocating the buffer, r...
./ffmpeg/libavformat/aviobuf.c
c
2015-06-16T22:21:02Z
@Modified protected void modified(@Nullable Map<String, Object> properties) { if (properties != null) { Object value = properties.get(CONFIG_ALLOW_BASIC_AUTH); allowBasicAuth = value != null && "true".equals(value.toString()); value = properties.get(CONFIG_IMPLICIT_USER_R...
@Modified protected void modified(@Nullable Map<String, Object> properties) { if (properties != null) { allowBasicAuth = ConfigParser.valueAsOrElse(properties.get(CONFIG_ALLOW_BASIC_AUTH), Boolean.class, false); implicitUserRole = ConfigParser.valueAsOrElse(properties.get(CONFIG_IMPL...
null
null
null
https://github.com/openhab/openhab-core/commit/ef3b13fce892e1092e295b8f82fa77e45d166924
[auth] grant implicit user role by network address (#3106) * [auth] grant implicit user role by network Signed-off-by: Miguel Álvarez <miguelwork92@gmail.com>
bundles/org.openhab.core.io.rest.auth/src/main/java/org/openhab/core/io/rest/auth/internal/AuthFilter.java
java
2022-10-13T06:09:23Z
export function add_attribute(name, value, boolean) { if (value == null || (boolean && !value)) return ''; const assignment = (boolean && value === true) ? '' : `="${escape_attribute_value(value.toString())}"`; return ` ${name}${assignment}`; }
export function add_attribute(name, value, boolean) { if (value == null || (boolean && !value)) return ''; const assignment = (boolean && value === true) ? '' : `="${escape(value, true)}"`; return ` ${name}${assignment}`; }
CVE-2022-25875
CWE-79
The package svelte before 3.49.0 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function.
https://github.com/sveltejs/svelte/commit/f8605d6acbf66976da9b4547f76e90e163899907
[fix] harden attribute escaping during ssr (#7530)
ssr.ts
ts
2022-07-12T19:15:00Z
int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) { bool pr = false; u32 msr = msr_info->index; u64 data = msr_info->data; switch (msr) { case MSR_AMD64_NB_CFG: case MSR_IA32_UCODE_REV: case MSR_IA32_UCODE_WRITE: case MSR_VM_HSAVE_PA: case MSR_AMD64_PATCH_LOADER: case MSR_AMD64_BU_CFG2...
int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) { bool pr = false; u32 msr = msr_info->index; u64 data = msr_info->data; switch (msr) { case MSR_AMD64_NB_CFG: case MSR_IA32_UCODE_REV: case MSR_IA32_UCODE_WRITE: case MSR_VM_HSAVE_PA: case MSR_AMD64_PATCH_LOADER: case MSR_AMD64_BU_CFG2...
CVE-2013-1797
CWE-399
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memo...
https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1
KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797) There is a potential use after free issue with the handling of MSR_KVM_SYSTEM_TIME. If the guest specifies a GPA in a movable or removable memory such as frame buffers then KVM might continue to write to that address even after it...
x86.c
c
2013-03-22T11:59:00Z
@SubscribeEvent public void renderEnd(RenderTickEvent event) { if (event.phase == Phase.END) for (LittleLevelEntity animation : entities) animation.getRenderManager().isInSight = null; }
@SubscribeEvent public void renderEnd(RenderTickEvent event) { if (event.phase == Phase.END) for (LittleLevelEntity animation : entities) if (animation.hasLoaded()) animation.getRenderManager().isInSight = null; }
null
null
null
https://github.com/CreativeMD/LittleTiles/commit/b3a2d78ead1f17396aa5a534a3138e38095483ef
Made as() in ServerChunkCacheMixin private @unique
src/main/java/team/creative/littletiles/client/level/LittleAnimationHandlerClient.java
java
2022-11-28T17:25:44Z
boolean processBinaryPackets(ByteBuffer applicationData) { boolean requiresWriteOperation = false; boolean hasMessage = false; try { while (isConnected() && ((expectPacket && (applicationData.remaining() > incomingCipherLength)) || (expectedBytes > 0 && applicationData .hasRemaining())) && !requ...
boolean processBinaryPackets(ByteBuffer applicationData) { boolean requiresWriteOperation = false; boolean hasMessage = false; try { while (isConnected() && ((expectPacket && (applicationData.remaining() > incomingCipherLength)) || (expectedBytes > 0 && applicationData .hasRemaining())) && !requ...
null
null
null
https://github.com/sshtools/maverick-synergy/commit/697f68b34499cee169b50957a3fd2af86dbde6ad
HOTFIX: Use remote address in logs. Fix for callback ConnectionManager OOM.
maverick-synergy-common/src/main/java/com/sshtools/synergy/ssh/TransportProtocol.java
java
2021-12-01T14:04:13Z
@Override public void handle(Data data) { OkHttpClient client = new OkHttpClient.Builder().build(); try { Response request = client.newCall( new Request.Builder() .url("https://authserver.mojang.com/authenticate") ...
@Override public void handle(Data data) { OkHttpClient client = new OkHttpClient.Builder().build(); try { Response request = client.newCall( new Request.Builder() .url("https://authserver.mojang.com/authenticate") ...
null
null
null
https://github.com/FTBTeam/FTB-App/commit/c52e11dc88332a9b61a2890e889f949bd4bd2a4d
fix: Mojang auth clientToken, resolved issue with refresh check
subprocess/src/main/java/net/creeperhost/creeperlauncher/api/handlers/profiles/AuthenticateMcProfileHandler.java
java
2021-12-11T19:01:46Z
public static Event getInstance(Runnable runnable) { RunnableEvent instance = recycled.pop(); if (instance == null) { instance = new RunnableEvent(); } instance.runnable = runnable; return instance; }
public static Event getInstance(Runnable runnable) { RunnableEvent instance = recycled.pop(); if (instance == null) { instance = new RunnableEvent(); if (++instances > 100 && EventQueue.isImmediate()) { EventQueue.setImmediate(false); ViewHandler.postEvent(() -> Toast.makeText(ContextHolder.get...
null
null
null
https://github.com/nikita36078/J2ME-Loader/commit/f78c98c8a5cb9639d18e026e476a387ca4c2014e
Disable immediate mode when RunnableEvent instance > 100 (workaround for StackOverFlow issue)
app/src/main/java/javax/microedition/lcdui/event/RunnableEvent.java
java
2021-08-16T12:54:34Z
@Override public void onPlayerCollide(final Player player) { final IJob<?> job = getCitizenData().getJob(); if (job == null || !job.isGuard()) { super.onPlayerCollide(player); } else { // guards push the player out of their way ...
@Override public void onPlayerCollide(final Player player) { if (getCitizenData() == null) { super.onPlayerCollide(player); return; } final IJob<?> job = getCitizenData().getJob(); if (job == null || !job.isGuard()) { s...
null
null
null
https://github.com/ldtteam/minecolonies/commit/8f4a7812b4a1426553c4d666c89fb434517c4773
new visitor and slight rework of loading (#8296) Adds new Visitor Tobi Queries the name off-thread as its very slow. Also avoids calling that too often if the player is offline or similar. Properly use a player type model to display arms and legs correctly (and not just a mirror texture). Jump of mount on unstuck Fix ...
src/api/java/com/minecolonies/api/entity/citizen/AbstractEntityCitizen.java
java
2022-04-28T23:14:57Z
ast_type_reduce(PyObject *self, PyObject *unused) { PyObject *res; _Py_IDENTIFIER(__dict__); PyObject *dict = _PyObject_GetAttrId(self, &PyId___dict__); if (dict == NULL) { if (PyErr_ExceptionMatches(PyExc_AttributeError)) PyErr_Clear(); else return NULL; } ...
ast_type_reduce(PyObject *self, PyObject *unused) { _Py_IDENTIFIER(__dict__); PyObject *dict; if (lookup_attr_id(self, &PyId___dict__, &dict) < 0) { return NULL; } if (dict) { return Py_BuildValue("O()N", Py_TYPE(self), dict); } return Py_BuildValue("O()", Py_TYPE(self)); }
CVE-2019-19274
CWE-125
typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does ...
https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce
Fully incorporate the code from Python 3.7.2 (#78) This is a full port, following the recipe in update_process.md. I've also tried to keep the recipe up to date and improved the automation (see tools/script). I haven't cleaned up the commits. As of #77 there are a few tests that sanity-check this (though it's far from...
parsetok.c
c
2019-11-26T15:15:00Z
static PCIDevice *do_pci_register_device(PCIDevice *pci_dev, PCIBus *bus, const char *name, int devfn) { PCIDeviceClass *pc = PCI_DEVICE_GET_CLASS(pci_dev); PCIConfigReadFunc *config_read = pc->config_read; PCIConfigWriteFunc *config_write = pc->config_write; Add...
static PCIDevice *do_pci_register_device(PCIDevice *pci_dev, PCIBus *bus, const char *name, int devfn) { PCIDeviceClass *pc = PCI_DEVICE_GET_CLASS(pci_dev); PCIConfigReadFunc *config_read = pc->config_read; PCIConfigWriteFunc *config_write = pc->config_write; Add...
null
null
null
qemu/commit/306077640a652e090779498aadbeb0c605feaacd
hw/pci: fix error flow in pci multifunction init Scenario: - There is a non multifunction pci device A on 00:0X.0. - Hot-plug another multifunction pci device B at 00:0X.1. - The operation will fail of course. - Try to hot-plug the B device 2-3 more times, qemu will crash. Reason: The error flow leaves the B'...
./qemu/hw/pci/pci.c
c
2014-01-21T16:37:51Z
static GF_Err ttml_embed_data(GF_XMLNode *node, u8 *aux_data, u32 aux_data_size, u8 *subs_data, u32 subs_data_size) { u32 i=0; GF_XMLNode *child; u32 subs_idx=0; GF_XMLAttribute *att; Bool is_source = GF_FALSE; Bool has_src_att = GF_FALSE; if (!node || node->type) return GF_BAD_PARAM; if (!strcmp(node->name, "...
static GF_Err ttml_embed_data(GF_XMLNode *node, u8 *aux_data, u32 aux_data_size, u8 *subs_data, u32 subs_data_size) { u32 i=0; GF_XMLNode *child; u32 subs_idx=0; GF_XMLAttribute *att; Bool is_source = GF_FALSE; Bool has_src_att = GF_FALSE; if (!node || node->type) return GF_BAD_PARAM; if (!strcmp(node->name, "...
null
null
null
https://github.com/gpac/gpac/commit/ea1eca00fd92fa17f0e25ac25652622924a9a6a0
fixed #2138
src/filters/write_generic.c
c
2022-03-10T14:43:11Z
static av_cold int encode_init(AVCodecContext* avc_context) { theora_info t_info; theora_comment t_comment; ogg_packet o_packet; unsigned int offset; TheoraContext *h = avc_context->priv_data; theora_info_init( &t_info ); t_info.width = FFALIGN(avc_context->width, 16); t_info.height...
static av_cold int encode_init(AVCodecContext* avc_context) { theora_info t_info; theora_comment t_comment; ogg_packet o_packet; unsigned int offset; TheoraContext *h = avc_context->priv_data; theora_info_init( &t_info ); t_info.width = FFALIGN(avc_context->width, 16); t_info.height...
null
null
null
FFmpeg/commit/870ee6f71579f2f3f20dee93d6246d12871c280d
Fix memory leak in libtheora encoder Patch by Art Clarke [aclark , xuggle . com] Originally committed as revision 19423 to svn://svn.ffmpeg.org/ffmpeg/trunk
./ffmpeg/libavcodec/libtheoraenc.c
c
2009-07-13T01:59:45Z
@Override public boolean canSubmit(TeamData teamData, ServerPlayer player) { return ((ServerLevel) player.level).structureFeatureManager().getStructureWithPieceAt(player.blockPosition(), structure).isValid(); }
@Override public boolean canSubmit(TeamData teamData, ServerPlayer player) { ServerLevel level = (ServerLevel) player.level; return structure.map( key -> level.structureFeatureManager().getStructureWithPieceAt(player.blockPosition(), key).isValid(), tag -> { var reg = level.registryAccess().registry(R...
null
null
null
https://github.com/FTBTeam/FTB-Quests/commit/47f753a018dd537f4051b08324f097f8741f2cf2
feat: support structure tags in StructureTask To use, prefix the structure with "#" as normal - also fixes crashing on bad resource locations https://github.com/FTBTeam/FTB-Mods-Issues/issues/491
common/src/main/java/dev/ftb/mods/ftbquests/quest/task/StructureTask.java
java
2022-10-11T09:38:46Z
static void unzzip_cat_file(FILE* disk, char* name, FILE* out) { ZZIP_ENTRY_FILE* file = zzip_entry_ffile (disk, name); if (file) { char buffer[1024]; int len; while ((len = zzip_entry_fread (buffer, 1024, 1, file))) fwrite (buffer, len, 1, out); zzip_entry_fclose (file); } }
static void unzzip_cat_file(FILE* disk, char* name, FILE* out) { ZZIP_ENTRY_FILE* file = zzip_entry_ffile (disk, name); if (file) { char buffer[1024]; int len; while (0 < (len = zzip_entry_fread (buffer, 1024, 1, file))) fwrite (buffer, len, 1, out); zzip_entry_fclose (file); } }
null
null
null
https://github.com/gdraheim/zziplib/commit/d453977f59ca59c61bf59dec28dd724498828f2a
#68 return value of zzip_entry_fread is signed
bins/unzzipcat-big.c
c
2021-01-04T20:51:12Z
static void extract_arg(RAnal *anal, RAnalFunction *fcn, RAnalOp *op, const char *reg, const char *sign, char type) { st64 ptr = 0; char *addr, *esil_buf = NULL; const st64 maxstackframe = 1024 * 8; r_return_if_fail (anal && fcn && op && reg); size_t i; for (i = 0; i < R_ARRAY_SIZE (op->src); i++) { if (op->...
static void extract_arg(RAnal *anal, RAnalFunction *fcn, RAnalOp *op, const char *reg, const char *sign, char type) { st64 ptr = 0; char *addr, *esil_buf = NULL; const st64 maxstackframe = 1024 * 8; r_return_if_fail (anal && fcn && op && reg); size_t i; for (i = 0; i < R_ARRAY_SIZE (op->src); i++) { if (op->...
CVE-2022-1031
CWE-416
Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.
https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb
Fix UAF in aaaa on arm/thumb switching ##crash * Reported by @peacock-doris via huntr.dev * Reproducer tests_65185 * This is a logic fix, but not the fully safe as changes in the code can result on UAF again, to properly protect r2 from crashing we need to break the ABI and add refcounting to RRegItem, which can't...
null
null
2022-03-21T16:48:44Z
getcmdline_int( int firstc, long count UNUSED, // only used for incremental search int indent, // indent for inside conditionals int clear_ccline) // clear ccline first { static int depth = 0; // call depth int c; int i; int j; int gotesc = FALSE; // TRUE when <ESC> just...
getcmdline_int( int firstc, long count UNUSED, // only used for incremental search int indent, // indent for inside conditionals int clear_ccline) // clear ccline first { static int depth = 0; // call depth int c; int i; int j; int gotesc = FALSE; // TRUE when <ESC> just...
CVE-2022-3235
CWE-416
Use After Free in GitHub repository vim/vim prior to 9.0.0490.
https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0
patch 9.0.0490: using freed memory with cmdwin and BufEnter autocmd Problem: Using freed memory with cmdwin and BufEnter autocmd. Solution: Make sure pointer to b_p_iminsert is still valid.
ex_getln.c
c
2022-09-17T18:43:23Z
static int check_resource_valid(struct vrend_renderer_resource_create_args *args) { /* do not accept handle 0 */ if (args->handle == 0) return -1; /* limit the target */ if (args->target >= PIPE_MAX_TEXTURE_TYPES) return -1; if (args->format >= VIRGL_FORMAT_MAX) return -1; /* only...
static int check_resource_valid(struct vrend_renderer_resource_create_args *args) { /* do not accept handle 0 */ if (args->handle == 0) return -1; /* limit the target */ if (args->target >= PIPE_MAX_TEXTURE_TYPES) return -1; if (args->format >= VIRGL_FORMAT_MAX) return -1; bool for...
CVE-2019-18388
CWE-476
A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.
https://gitlab.freedesktop.org/virgl/virglrenderer/commit/0d9a2c88dc3a70023541b3260b9f00c982abda16
vrend: Check resource creation more thoroughly While we are at it: - free memory if texture allocation fails Closes #144 Closes #145 Closes #146 v2: Move the error string creation to extra patch (Emil) v3: Fix whitespace errors (Emil) and one logic error Signed-off-by: Gert Wollny <gert.wollny@collabora.com> Revi...
null
null
2019-10-10T07:42:25Z
do_parse_uri (parsed_uri_t uri, int only_local_part, int no_scheme_check, int force_tls) { uri_tuple_t *tail; char *p, *p2, *p3, *pp; int n; p = uri->buffer; n = strlen (uri->buffer); /* Initialize all fields to an empty string or an empty list. */ uri->scheme = uri->host = uri->path = p +...
do_parse_uri (parsed_uri_t uri, int only_local_part, int no_scheme_check, int force_tls) { uri_tuple_t *tail; char *p, *p2, *p3, *pp; int n; p = uri->buffer; n = strlen (uri->buffer); /* Initialize all fields to an empty string or an empty list. */ uri->scheme = uri->host = uri->path = p +...
CVE-2018-1000858
CWE-352
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigm...
https://github.com/gpg/gnupg/commit/4a4bb874f63741026bd26264c43bb32b1099f060
dirmngr: Avoid possible CSRF attacks via http redirects. * dirmngr/http.h (parsed_uri_s): Add fields off_host and off_path. (http_redir_info_t): New. * dirmngr/http.c (do_parse_uri): Set new fields. (same_host_p): New. (http_prepare_redirect): New. * dirmngr/t-http-basic.c: New test. * dirmngr/ks-engine-hkp.c (send_re...
null
null
2018-11-22T21:27:56Z
static Image *ReadRGFImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; register IndexPacket *indexes; register PixelPacket *q; register ssize_t i, x; register unsigned char *p; size_t bit, byte; ssize_t y;...
static Image *ReadRGFImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; register IndexPacket *indexes; register PixelPacket *q; register ssize_t i, x; register unsigned char *p; size_t bit, byte; ssize_t y;...
CVE-2016-10066
CWE-120
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
null
coders/rgf.c
c
null
GF_Err gf_sm_load_init(GF_SceneLoader *load) { GF_Err e = GF_NOT_SUPPORTED; char *ext, szExt[50]; /*we need at least a scene graph*/ if (!load || (!load->ctx && !load->scene_graph) #ifndef GPAC_DISABLE_ISOM || (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) ) #endif ) return...
GF_Err gf_sm_load_init(GF_SceneLoader *load) { GF_Err e = GF_NOT_SUPPORTED; char *ext, szExt[50]; /*we need at least a scene graph*/ if (!load || (!load->ctx && !load->scene_graph) #ifndef GPAC_DISABLE_ISOM || (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) ) #endif ) return...
CVE-2018-20761
CWE-119
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
fix some overflows due to strcpy fixes #1184, #1186, #1187 among other things
scene_manager.c
c
2019-01-11T10:32:54Z
public void updateUVs() { BufferedImage atlasImage = texture.getAtlas().getImage(); int textureX = texture.getX(), textureY = texture.getY(), textureWidth = texture.getWidth(), textureHeight = texture.getHeight(), atlasWidth...
public void updateUVs() { if (texture != null) { BufferedImage atlasImage = texture.getAtlas().getImage(); int textureX = texture.getX(), textureY = texture.getY(), textureWidth = texture.getWidth(), textureH...
null
null
null
https://github.com/ModificationStation/StationAPI/commit/2eb940e6cb777415a097fc565fd38e904fb9a442
Refactored PR #15
station-render-api-v0/src/main/java/net/modificationstation/stationapi/impl/client/model/JsonFaceData.java
java
2021-09-18T22:09:51Z
static int dv_read_seek(AVFormatContext *s, int stream_index, int64_t timestamp, int flags) { RawDVContext *r = s->priv_data; DVDemuxContext *c = r->dv_demux; int64_t offset = dv_frame_offset(s, c, timestamp, flags); dv_offset_reset(c, offset / c->sys->frame_size); offset...
static int dv_read_seek(AVFormatContext *s, int stream_index, int64_t timestamp, int flags) { RawDVContext *r = s->priv_data; DVDemuxContext *c = r->dv_demux; int64_t offset = dv_frame_offset(s, c, timestamp, flags); if (avio_seek(s->pb, offset, SEEK_SET) < 0) return ...
null
null
null
FFmpeg/commit/8332321c5737cf24ebad504bf10a03818424718d
dv: Check return value of avio_seek and avoid modifying state if it fails Signed-off-by: Paul B Mahol <onemda@gmail.com> Signed-off-by: Justin Ruggles <justin.ruggles@gmail.com>
./ffmpeg/libavformat/dv.c
c
2012-02-03T19:13:36Z
DelChar(NCURSES_SP_DCLx int count) { TR(TRACE_UPDATE, ("DelChar(%p, %d) called, position = (%ld,%ld)", (void *) SP_PARM, count, (long) NewScreen(SP_PARM)->_cury, (long) NewScreen(SP_PARM)->_curx)); if (parm_dch) { TPUTS_TRACE("parm_dch"); NCURSES_SP_NAME(tputs) (NCURSES_SP_ARGx TP...
DelChar(NCURSES_SP_DCLx int count) { TR(TRACE_UPDATE, ("DelChar(%p, %d) called, position = (%ld,%ld)", (void *) SP_PARM, count, (long) NewScreen(SP_PARM)->_cury, (long) NewScreen(SP_PARM)->_curx)); if (parm_dch) { TPUTS_TRACE("parm_dch"); NCURSES_SP_NAME(tputs) (NCURSES_SP_ARGx TI...
null
null
null
null
ncurses 6.2 - patch 20200531 + correct configure version-check/warnng for g++ to allow for 10.x + re-enable "bel" in konsole-base (report by Nia Huang) + add linux-s entry (patch by Alexandre Montaron). + drop long-obsolete convert_configure.pl + add test/test_parm.c, for checking tparm changes. + improve parameter-ch...
null
null
null
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { const TfLiteTensor* input = GetInput(context, node, kInputTensor); TfLiteTensor* output = GetOutput(context, node, kOutputTensor); switch (input->type) { case kTfLiteInt64: reference_ops::Negate( GetTensorShape(input), GetTensorData...
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { const TfLiteTensor* input; TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kInputTensor, &input)); TfLiteTensor* output; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, kOutputTensor, &output)); switch (input->typ...
CVE-2020-15211
CWE-125,CWE-787
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, inde...
https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35
[tflite]: Insert `nullptr` checks when obtaining tensors. As part of ongoing refactoring, `tflite::GetInput`, `tflite::GetOutput`, `tflite::GetTemporary` and `tflite::GetIntermediates` will return `nullptr` in some cases. Hence, we insert the `nullptr` checks on all usages. We also insert `nullptr` checks on usages o...
add_n.cc
cc
2020-09-25T19:15:00Z
@Override public List<Long> retrieveSavingsIdsPendingEscheat(LocalDate tenantLocalDate) { List<Long> ret = null; StringBuilder sql = new StringBuilder("select sa.id "); sql.append(" from m_savings_account as sa "); sql.append(" inner join m_savings_product as sp on (sa.product_id = s...
@Override public List<Long> retrieveSavingsIdsPendingEscheat(LocalDate tenantLocalDate) { List<Long> ret = null; StringBuilder sql = new StringBuilder("select sa.id "); sql.append(" from m_savings_account as sa "); sql.append(" inner join m_savings_product as sp on (sa.product_id = s...
null
null
null
https://github.com/apache/fineract/commit/a80f589ad4ad91a7b1c8abbd864e6a5129e8e2cf
fineract-1646 and fineract-1638 combined fix (#2457) authored-by: Dhaval Maniyar <dhavalmaniyar@Dhavals-MacBook-Pro.local>
fineract-provider/src/main/java/org/apache/fineract/portfolio/savings/service/SavingsAccountReadPlatformServiceImpl.java
java
2022-07-28T08:30:15Z