func_before stringlengths 10 482k | func_after stringlengths 14 484k | cve_id stringlengths 13 28 ⌀ | cwe_id stringclasses 776
values | cve_description stringlengths 30 3.31k ⌀ | commit_link stringlengths 48 164 ⌀ | commit_message stringlengths 1 30.3k ⌀ | file_name stringlengths 4 244 ⌀ | extension stringclasses 20
values | datetime stringdate 1999-11-10 02:42:49 2024-01-29 16:00:57 ⌀ |
|---|---|---|---|---|---|---|---|---|---|
static int l2_allocate(BlockDriverState *bs, int l1_index, uint64_t **table)
{
BDRVQcow2State *s = bs->opaque;
uint64_t old_l2_offset;
uint64_t *l2_table = NULL;
int64_t l2_offset;
int ret;
old_l2_offset = s->l1_table[l1_index];
trace_qcow2_l2_allocate(bs, l1_index);
l2_offset = qco... | static int l2_allocate(BlockDriverState *bs, int l1_index, uint64_t **table)
{
BDRVQcow2State *s = bs->opaque;
uint64_t old_l2_offset;
uint64_t *l2_table = NULL;
int64_t l2_offset;
int ret;
old_l2_offset = s->l1_table[l1_index];
trace_qcow2_l2_allocate(bs, l1_index);
l2_offset = qco... | null | null | null | qemu/commit/9883975050deffc147a3903d07ff995ecdc8a100 | qcow2: Prevent allocating L2 tables at offset 0
If the refcount data is corrupted then we can end up trying to
allocate a new L2 table at offset 0 in the image, triggering an
assertion in the qcow2 cache that would crash QEMU:
qcow2_cache_entry_mark_dirty: Assertion `c->entries[i].offset != 0' failed
This patch ad... | ./qemu/block/qcow2-cluster.c | c | 2017-11-03T14:18:51Z |
@Override
public TaskQuery caseVariableValueLessThanOrEqual(String name, Object value) {
if (orActive) {
currentOrQueryObject.variableValueLessThanOrEqual(name, value, ScopeTypes.CMMN);
} else {
this.variableValueLessThanOrEqual(name, value, ScopeTypes.CMMN);
}
... | @Override
public TaskQuery caseVariableValueLessThanOrEqual(String name, Object value) {
if (orActive) {
currentOrQueryObject.scopedVariableValueLessThanOrEqual(name, value, ScopeTypes.CMMN);
} else {
this.scopedVariableValueLessThanOrEqual(name, value, ScopeTypes.CMMN);
... | null | null | null | https://github.com/flowable/flowable-engine/commit/978708494fb7ea7297ca6eddc7da36bfc4b8ae4e | Rename protected scope related methods to avoid clashing with Groovy method detection | modules/flowable-task-service/src/main/java/org/flowable/task/service/impl/TaskQueryImpl.java | java | 2022-04-13T06:45:43Z |
def update_inverter(self, inverter_serial, ts, status, etoday, etotal):
query = '''
UPDATE Inverters
SET
TimeStamp='%s',
Status='%s',
eToday='%s',
eTotal='%s'
WHERE Serial='%s';
''' % (ts, status, ... | def update_inverter(self, inverter_serial, ts, status, etoday, etotal):
query = '''
UPDATE Inverters
SET
TimeStamp=?,
Status=?,
eToday=?,
eTotal=?
WHERE Serial=?;
'''
self.c.execute(query, ... | null | cwe-089 | null | github.com/philipptrenz/s0-bridge/commit/269b48caa05377b7c58c3e6d1622a4429cb5ba65 | null | util/database.py | py | 2019-01-18T13:00:24Z |
public void updateDatasource(final OsvAdvisory advisory) {
try (QueryManager qm = new QueryManager()) {
LOGGER.debug("Synchronizing Google OSV advisory: " + advisory.getId());
final List<VulnerableSoftware> vsList = new ArrayList<>();
final Vulnerability vulnerability = map... | public void updateDatasource(final OsvAdvisory advisory) {
try (QueryManager qm = new QueryManager()) {
LOGGER.debug("Synchronizing Google OSV advisory: " + advisory.getId());
final List<VulnerableSoftware> vsList = new ArrayList<>();
final Vulnerability vulnerability = map... | null | null | null | https://github.com/DependencyTrack/dependency-track/commit/314bec9091ec84c26edc9f046e375860497b5ce4 | Fix wrong alias ID being used for OSV vulnerabilities
Fixes #2034
Signed-off-by: nscuro <nscuro@protonmail.com> | src/main/java/org/dependencytrack/tasks/OsvDownloadTask.java | java | 2022-10-11T16:47:22Z |
Chapters::~Chapters() {
while (m_editions_count > 0) {
Edition& e = m_editions[--m_editions_count];
e.Clear();
}
} | Chapters::~Chapters() {
while (m_editions_count > 0) {
Edition& e = m_editions[--m_editions_count];
e.Clear();
}
delete[] m_editions;
} | CVE-2016-2464 | CWE-20 | libvpx in libwebm in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-06-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted mkv file, aka internal bug 23167726. | https://android.googlesource.com/platform/external/libvpx/+/cc274e2abe8b2a6698a5c47d8aa4bb45f1f9538d | external/libvpx/libwebm: Update snapshot
Update libwebm snapshot. This update contains security fixes from upstream.
Upstream git hash: 229f49347d19b0ca0941e072b199a242ef6c5f2b
BUG=23167726
Change-Id: Id3e140e7b31ae11294724b1ecfe2e9c83b4d4207
(cherry picked from commit d0281a15b3c6bd91756e453cc9398c5ef412d99a) | libwebm/mkvparser.cpp | cpp | null |
enum authfile_ret authfile_load(const char *file) {
struct stat sb;
char *auth_data = NULL;
auth_t auth_entries[MAX_ENTRIES];
FILE *pwfile = fopen(file, "r");
if (pwfile == NULL) {
return AUTHFILE_OPENFAIL;
} else if (fstat(fileno(pwfile), &sb)) {
fclose(pwfile);
return ... | enum authfile_ret authfile_load(const char *file) {
struct stat sb;
char *auth_data = NULL;
auth_t auth_entries[MAX_ENTRIES];
FILE *pwfile = fopen(file, "r");
if (pwfile == NULL) {
return AUTHFILE_OPENFAIL;
} else if (fstat(fileno(pwfile), &sb)) {
fclose(pwfile);
return ... | null | null | null | https://github.com/memcached/memcached/commit/264722ae4e248b453be00e97197dadc685b60fd0 | Fix minor severity heap buffer overflow reading `--auth-file`
Fixes #805
Allocate an extra byte for reading the last entry when there is no `\n` at
the end of the file.
Also, check if the user contains null bytes when reading the last entry.
Unrelatedly, add handling in case the auth file size changes while it is b... | authfile.c | c | 2021-07-22T14:17:17Z |
static void k_ascii(struct vc_data *vc, unsigned char value, char up_flag)
{
int base;
if (up_flag)
return;
if (value < 10) {
/* decimal input of code, while Alt depressed */
base = 10;
} else {
/* hexadecimal input of code, while AltGr depressed */
value -= 10;
base = 16;
}
if (npadch == -1)
npa... | static void k_ascii(struct vc_data *vc, unsigned char value, char up_flag)
{
unsigned int base;
if (up_flag)
return;
if (value < 10) {
/* decimal input of code, while Alt depressed */
base = 10;
} else {
/* hexadecimal input of code, while AltGr depressed */
value -= 10;
base = 16;
}
if (!npadch_ac... | CVE-2020-13974 | CWE-190 | An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae | vt: keyboard: avoid signed integer overflow in k_ascii
When k_ascii is invoked several times in a row there is a potential for
signed integer overflow:
UBSAN: Undefined behaviour in drivers/tty/vt/keyboard.c:888:19 signed integer overflow:
10 * 1111111111 cannot be represented in type 'int'
CPU: 0 PID: 0 Comm: swappe... | keyboard.c | c | null |
lha_read_file_extended_header(struct archive_read *a, struct lha *lha,
uint16_t *crc, int sizefield_length, size_t limitsize, size_t *total_size)
{
const void *h;
const unsigned char *extdheader;
size_t extdsize;
size_t datasize;
unsigned int i;
unsigned char extdtype;
#define EXT_HEADER_CRC 0x00 /* Header... | lha_read_file_extended_header(struct archive_read *a, struct lha *lha,
uint16_t *crc, int sizefield_length, size_t limitsize, size_t *total_size)
{
const void *h;
const unsigned char *extdheader;
size_t extdsize;
size_t datasize;
unsigned int i;
unsigned char extdtype;
#define EXT_HEADER_CRC 0x00 /* Header... | CVE-2019-20509 | null | null | https://github.com/libarchive/libarchive/commit/91cf9372e89f7af4582964b15ceb7fc6d1b37471 | LHA reader: ensure that UTF-16 input always has a multiple of 2 bytes
Fixes #1284 | null | null | 2019-11-26T22:32:31Z |
@SubscribeEvent
public void onTick(TickEvent.ClientTickEvent event) {
if (event.phase != TickEvent.Phase.START) return;
if (DankersSkyblockMod.tickAmount % 20 == 0) {
if (Utils.tabLocation.equals("Dwarven Mines") || Utils.tabLocation.equals("Crystal Hollows")) {
Collecti... | @SubscribeEvent
public void onTick(TickEvent.ClientTickEvent event) {
if (event.phase != TickEvent.Phase.START) return;
if (DankersSkyblockMod.tickAmount % 20 == 0) {
if (Utils.tabLocation.equals("Dwarven Mines") || Utils.tabLocation.equals("Crystal Hollows")) {
if (Mine... | null | null | null | https://github.com/bowser0000/SkyblockMod/commit/86103f9e7cb5bf86f7abc34153aec99ed334be2f | Fix crash with powder tracker | src/main/java/me/Danker/features/PowderTracker.java | java | 2022-11-05T23:17:39Z |
$this->AddValidationError($prop, "$prop exceeds the maximum length of " . $fm->FieldSize . "");
}
if ($this->$prop == "" && ($fm->DefaultValue || $fm->IsAutoInsert)) {
// these fields are auto-populated so we don't need to validate them unless
// ... | $this->AddValidationError($prop, "$prop exceeds the maximum length of " . $fm->FieldSize . "");
}
if ($this->$prop == "" && ($fm->DefaultValue || $fm->IsAutoInsert)) {
// these fields are auto-populated so we don't need to validate them unless
// ... | CVE-2022-2824 | CWE-639,CWE-639 | Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1. | https://github.com/openemr/openemr/commit/c5d99452c173ef21a8e2241e2bbf4b66e2d7fe11 | bug fix and php8.1 fixes (#5664)
* bug fix and php8.1 fixes
* styling | Phreezable.php | php | 2022-08-15T16:15:00Z |
static int ds1338_recv(I2CSlave *i2c)
{
DS1338State *s = FROM_I2C_SLAVE(DS1338State, i2c);
uint8_t res;
res = s->nvram[s->ptr];
s->ptr = (s->ptr + 1) & 0xff;
return res;
} | static int ds1338_recv(I2CSlave *i2c)
{
DS1338State *s = FROM_I2C_SLAVE(DS1338State, i2c);
uint8_t res;
res = s->nvram[s->ptr];
s->ptr = (s->ptr + 1) & (NVRAM_SIZE - 1);
return res;
} | null | null | null | qemu/commit/ba4906a9b64e165a958e12f6208ca834dc7a36dc | hw/ds1338: Fix mishandling of register pointer
Correct several deficiencies in the handling of the register pointer:
* it should wrap around after 0x3f, not 0xff
* guard against the caller handing us an out of range pointer
(on h/w this can never happen, because only a 7 bit value is
transferred over the I2C b... | ./qemu/hw/ds1338.c | c | 2012-10-12T10:54:38Z |
private void handleMessage(@NonNull SignalServiceContent content, long timestamp, @NonNull Recipient senderRecipient, @NonNull Optional<Long> smsMessageId)
throws IOException, GroupChangeBusyException
{
try {
Recipient threadRecipient = getMessageDestination(content);
if (shouldIgnore(content, ... | private void handleMessage(@NonNull SignalServiceContent content, long timestamp, @NonNull Recipient senderRecipient, @NonNull Optional<Long> smsMessageId)
throws IOException, GroupChangeBusyException
{
try {
Recipient threadRecipient = getMessageDestination(content);
if (shouldIgnore(content, ... | null | null | null | https://github.com/signalapp/Signal-Android/commit/be2ed8989f873f96edfeac9f3e8b7f9a9be46f5b | Fix possible crash in ProfileKeySendJob if given an invalid threadId. | app/src/main/java/org/thoughtcrime/securesms/messages/MessageContentProcessor.java | java | 2022-07-01T15:06:37Z |
boolean isOrganizerRegistered(@NonNull ITaskFragmentOrganizer organizer) {
return mTaskFragmentOrganizerState.containsKey(organizer.asBinder());
} | private boolean isOrganizerRegistered(@NonNull ITaskFragmentOrganizer organizer) {
return mTaskFragmentOrganizerState.containsKey(organizer.asBinder());
} | null | null | null | https://github.com/aosp-mirror/platform_frameworks_base/commit/bed37ac501e0b44f8ddc972c2930c5695dafe27c | Fix potential crash when TaskFragmentOrganizer died
Before, when TaskFragmentOrganizerController#onTransactionHandled()
is called, we will always call #validateAndGetState(), which call throw
an exception for racing condition like organizer process died.
Bug: 207070762
Test: atest WmTests:TaskFragmentOrganizerControl... | services/core/java/com/android/server/wm/TaskFragmentOrganizerController.java | java | 2022-11-17T11:45:43Z |
server_request_direct_streamlocal(void)
{
Channel *c = NULL;
char *target, *originator;
u_short originator_port;
target = packet_get_string(NULL);
originator = packet_get_string(NULL);
originator_port = packet_get_int();
packet_check_eom();
debug("server_request_direct_streamlocal: originator %s port %d, targ... | server_request_direct_streamlocal(void)
{
Channel *c = NULL;
char *target, *originator;
u_short originator_port;
target = packet_get_string(NULL);
originator = packet_get_string(NULL);
originator_port = packet_get_int();
packet_check_eom();
debug("server_request_direct_streamlocal: originator %s port %d, targ... | CVE-2016-10010 | CWE-264 | sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c. | https://github.com/openbsd/src/commit/c76fac666ea038753294f2ac94d310f8adece9ce | disable Unix-domain socket forwarding when privsep is disabled | serverloop.c | c | 2017-01-05T02:59:00Z |
static void check_cmd(AHCIState *s, int port)
{
AHCIPortRegs *pr = &s->dev[port].port_regs;
int slot;
if ((pr->cmd & PORT_CMD_START) && pr->cmd_issue) {
for (slot = 0; (slot < 32) && pr->cmd_issue; slot++) {
if ((pr->cmd_issue & (1 << slot)) &&
!handle_cmd(s, port, slot))... | static void check_cmd(AHCIState *s, int port)
{
AHCIPortRegs *pr = &s->dev[port].port_regs;
int slot;
if ((pr->cmd & PORT_CMD_START) && pr->cmd_issue) {
for (slot = 0; (slot < 32) && pr->cmd_issue; slot++) {
if ((pr->cmd_issue & (1U << slot)) &&
!handle_cmd(s, port, slot)... | null | null | null | qemu/commit/ee25595f0126de0f83da86cc29ba2365be7a50d2 | hw/ide/ahci.c: Avoid shift left into sign bit
Add U suffix to avoid shifting left into the sign bit, which
is undefined behaviour.
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru> | ./qemu/hw/ide/ahci.c | c | 2014-03-28T15:12:55Z |
static void vp5_parse_coeff(VP56Context *s)
{
VP56RangeCoder *c = &s->c;
VP56Model *model = s->modelp;
uint8_t *permute = s->idct_scantable;
uint8_t *model1, *model2;
int coeff, sign, coeff_idx;
int b, i, cg, idx, ctx, ctx_last;
int pt = 0;
for (b=0; b<6; b++) {
int ct = 1; ... | static int vp5_parse_coeff(VP56Context *s)
{
VP56RangeCoder *c = &s->c;
VP56Model *model = s->modelp;
uint8_t *permute = s->idct_scantable;
uint8_t *model1, *model2;
int coeff, sign, coeff_idx;
int b, i, cg, idx, ctx, ctx_last;
int pt = 0;
if (c->end >= c->buffer && c->bits >= 0) {
... | null | null | null | FFmpeg/commit/9e6a2427558a718be0c1fffacffd935f630a7a8d | avcodec/vp56: Check for the bitstream end, pass error codes on
Fixes timeout
Fixes: 446/fuzz-3-ffmpeg_VIDEO_AV_CODEC_ID_VP6_fuzzer
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ./ffmpeg/libavcodec/vp5.c | c | 2017-01-24T21:21:25Z |
apr_status_t h2_conn_run(conn_rec *c)
{
apr_status_t status;
int mpm_state = 0;
h2_session *session = h2_ctx_get_session(c);
ap_assert(session);
do {
if (c->cs) {
c->cs->sense = CONN_SENSE_DEFAULT;
c->cs->state = CONN_STATE_HANDLER;
}
status ... | apr_status_t h2_conn_run(conn_rec *c)
{
apr_status_t status;
int mpm_state = 0;
h2_session *session = h2_ctx_get_session(c);
ap_assert(session);
do {
if (c->cs) {
c->cs->sense = CONN_SENSE_DEFAULT;
c->cs->state = CONN_STATE_HANDLER;
}
status ... | CVE-2019-9516 | CWE-770 | Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and kee... | https://github.com/icing/mod_h2/commit/dd05d49abe0f67512ce9ed5ba422d7711effecfb | * fixes Timeout vs. KeepAliveTimeout behaviour, see PR 63534 (for trunk now,
mpm event backport to 2.4.x up for vote).
* Fixes stream cleanup when connection throttling is in place.
* Counts stream resets by client on streams initiated by client as cause
for connection throttling.
* Header length checks are no... | null | null | 2019-07-18T12:21:12Z |
@Override
@TruffleBoundary
public void setCursor(final int[] cursorWords, final int[] mask, final int width, final int height, final int depth, final int offsetX, final int offsetY) {
final Dimension bestCursorSize = TOOLKIT.getBestCursorSize(width, height);
final Cursor cursor;
if (best... | @Override
@TruffleBoundary
public void setCursor(final int[] cursorWords, final int[] mask, final int width, final int height, final int depth, final int offsetX, final int offsetY) {
final Dimension bestCursorSize = TOOLKIT.getBestCursorSize(width, height);
final Cursor cursor;
if (best... | null | null | null | https://github.com/hpi-swa/trufflesqueak/commit/8cfb5df03beeb14be63151e9f35c83dfde493339 | Fix a crash in primitiveBeCursor
Closes #151 | src/de.hpi.swa.trufflesqueak/src/de/hpi/swa/trufflesqueak/io/SqueakDisplay.java | java | 2021-11-01T18:30:42Z |
private double walkingPhase(double time) {
double timeHours = MarsClock.HOURS_PER_MILLISOL * time;
double speed = 0;
if (person != null) {
speed = person.calculateWalkSpeed();
}
else if (robot != null) {
speed = robot.calculateWalkSpeed();
}
else {
throw new IllegalStateException("Do not know... | private double walkingPhase(double time) {
double timeHours = MarsClock.HOURS_PER_MILLISOL * time;
double speed = 0;
if (person != null) {
speed = person.calculateWalkSpeed();
}
else if (robot != null) {
speed = robot.calculateWalkSpeed();
}
else {
throw new IllegalStateException("Do not know... | null | null | null | https://github.com/mars-sim/mars-sim/commit/15efb256a26aaa9e4518de304938fb98e507569a | Revise checking a person's settlement
r6360
2021-10-28
Note: since the last few commits, isInSettlement() will check
if a person is inside
## FIX
1. Avoid NPE
- Reorder the checking of a person's whereabout in
getCurrentMissionLocation() in Mission.
- Revise getEVASparePartsForTrip() in RoverMission.
## ... | mars-sim-core/src/main/java/org/mars_sim/msp/core/person/ai/task/WalkSettlementInterior.java | java | 2021-10-29T02:27:01Z |
parse_rfc1123_time(const char *buf, time_t *t)
{
struct tm tm;
char month[4];
char weekday[4];
int i, m;
unsigned tm_mday, tm_year, tm_hour, tm_min, tm_sec;
if (strlen(buf) != RFC1123_TIME_LEN)
return -1;
memset(&tm, 0, sizeof(tm));
if (tor_sscanf(buf, "%3s, %2u %3s %u %2u:%2u:%2u GMT", weekday,
... | parse_rfc1123_time(const char *buf, time_t *t)
{
struct tm tm;
char month[4];
char weekday[4];
int i, m;
unsigned tm_mday, tm_year, tm_hour, tm_min, tm_sec;
if (strlen(buf) != RFC1123_TIME_LEN)
return -1;
memset(&tm, 0, sizeof(tm));
if (tor_sscanf(buf, "%3s, %2u %3s %u %2u:%2u:%2u GMT", weekday,
... | CVE-2012-4419 | null | The compare_tor_addr_to_addr_policy function in or/policies.c in Tor before 0.2.2.39, and 0.2.3.x before 0.2.3.21-rc, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled during policy comparison. | https://gitweb.torproject.org/tor.git/commitdiff/973c18bf0e84d14d8006a9ae97fde7f7fb97e404 | Fix assertion failure in tor_timegm.
Fixes bug 6811. | null | null | null |
int dsdb_user_obj_set_primary_group_id(struct ldb_context *ldb, struct ldb_message *usr_obj,
uint32_t user_account_control, uint32_t *group_rid_p)
{
int ret;
uint32_t rid;
struct ldb_message_element *el;
rid = ds_uf2prim_group_rid(user_account_control);
ret = samdb_msg_add_uint(ldb, usr_obj, usr_obj,
... | int dsdb_user_obj_set_primary_group_id(struct ldb_context *ldb, struct ldb_message *usr_obj,
uint32_t user_account_control, uint32_t *group_rid_p)
{
int ret;
uint32_t rid;
rid = ds_uf2prim_group_rid(user_account_control);
ret = samdb_msg_add_uint_flags(ldb, usr_obj, usr_obj,
"primaryGroupID"... | null | CWE-200 | null | https://github.com/samba-team/samba/commit/0a3aa5f908e351201dc9c4d4807b09ed9eedff77 | CVE-2022-32746 ldb: Make use of functions for appending to an ldb_message
This aims to minimise usage of the error-prone pattern of searching for
a just-added message element in order to make modifications to it (and
potentially finding the wrong element).
BUG: https://bugzilla.samba.org/show_bug.cgi?id=15009
Signed... | null | null | 2022-02-21T03:27:37Z |
void av_get_channel_layout_string(char *buf, int buf_size,
int nb_channels, uint64_t channel_layout)
{
int i;
if (nb_channels <= 0)
nb_channels = av_get_channel_layout_nb_channels(channel_layout);
for (i = 0; channel_layout_map[i].name; i++)
if (nb_channels ... | void av_get_channel_layout_string(char *buf, int buf_size,
int nb_channels, uint64_t channel_layout)
{
int i;
if (nb_channels <= 0)
nb_channels = av_get_channel_layout_nb_channels(channel_layout);
for (i = 0; channel_layout_map[i].name; i++)
if (nb_channels ... | null | null | null | FFmpeg/commit/019dd2365729d44d66a5b629102e1ecb919f4f67 | Fix av_get_channel_layout_string() for positions >31
A value shifted left by >31 needs to have a 64-bit type.
As there are no defined channels in this range, the fix
is purely theoretical at this point, although it does
avoid some invalid shifts triggering the overflow
checker.
Signed-off-by: Mans Rullgard <mans@mans... | ./ffmpeg/libavutil/audioconvert.c | c | 2011-11-25T14:58:50Z |
napi_status napi_get_value_string_utf8(napi_env env,
napi_value value,
char* buf,
size_t bufsize,
size_t* result) {
CHECK_ENV(env);
CHECK_ARG(env, value);
v8... | napi_status napi_get_value_string_utf8(napi_env env,
napi_value value,
char* buf,
size_t bufsize,
size_t* result) {
CHECK_ENV(env);
CHECK_ARG(env, value);
v8... | CVE-2020-8174 | CWE-191 | napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0. | https://github.com/nodejs/node/commit/656260b4b65fec3b10f6da3fdc9f11fb941aafb5 | napi: fix memory corruption vulnerability
Fixes: https://hackerone.com/reports/784186
CVE-ID: CVE-2020-8174
PR-URL: https://github.com/nodejs-private/node-private/pull/195
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Gabriel Schulhof <gabriel.schulhof@intel.com>
Reviewed-By: Michael Dawson <michael_da... | null | null | 2020-01-27T17:38:36Z |
int x25_negotiate_facilities(struct sk_buff *skb, struct sock *sk,
struct x25_facilities *new, struct x25_dte_facilities *dte)
{
struct x25_sock *x25 = x25_sk(sk);
struct x25_facilities *ours = &x25->facilities;
struct x25_facilities theirs;
int len;
memset(&theirs, 0, sizeof(theirs));
memcpy(new, ours, siz... | int x25_negotiate_facilities(struct sk_buff *skb, struct sock *sk,
struct x25_facilities *new, struct x25_dte_facilities *dte)
{
struct x25_sock *x25 = x25_sk(sk);
struct x25_facilities *ours = &x25->facilities;
struct x25_facilities theirs;
int len;
memset(&theirs, 0, sizeof(theirs));
memcpy(new, ours, siz... | CVE-2016-4580 | CWE-200 | The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request. | https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8 | net: fix a kernel infoleak in x25 module
Stack object "dte_facilities" is allocated in x25_rx_call_request(),
which is supposed to be initialized in x25_negotiate_facilities.
However, 5 fields (8 bytes in total) are not initialized. This
object is then copied to userland via copy_to_user, thus infoleak
occurs.
Signed... | x25_facilities.c | c | 2016-05-08T16:10:14Z |
@Override
public void drawHSBBox(long vg, float x, float y, float width, float height, int colorTarget) {
drawRoundedRect(vg, x, y, width, height, colorTarget, 8f);
try (NVGPaint bg = NVGPaint.create();
NVGColor nvgColor = color(vg, -1);
NVGColor nvgColor2 = color(vg, Colo... | @Override
public void drawHSBBox(long vg, float x, float y, float width, float height, int colorTarget) {
drawRoundedRect(vg, x, y, width, height, colorTarget, 8f);
NVGPaint bg = NVGPaint.create();
nvgBeginPath(vg);
nvgRoundedRect(vg, x, y, width, height, 8f);
NVGColor nvgCo... | null | null | null | https://github.com/Polyfrost/OneConfig/commit/d25e0ec2f60896f1e41dc3947e0984630e63ae6b | new: put all gl text methods in `TextRenderer`
fix: fix the 1 year ticket
fix: fix color selector literally jvm crashing lmao | src/main/java/cc/polyfrost/oneconfig/internal/renderer/NanoVGHelperImpl.java | java | 2022-11-24T08:29:25Z |
static int path_set_perms(Item *i, const char *path) {
char fn[STRLEN("/proc/self/fd/") + DECIMAL_STR_MAX(int)];
_cleanup_close_ int fd = -1;
struct stat st;
assert(i);
assert(path);
if (!i->mode_set && !i->uid_set && !i->gid_set)
goto shortcut;
... | static int path_set_perms(Item *i, const char *path) {
_cleanup_close_ int fd = -1;
struct stat st;
assert(i);
assert(path);
fd = open(path, O_NOFOLLOW|O_CLOEXEC|O_PATH);
if (fd < 0) {
int level = LOG_ERR, r = -errno;
/* Option "e" opera... | null | null | null | https://github.com/systemd/systemd/commit/6fb2e9a08f273ec9f7ec46154052f2584f745dbd | tmpfiles: don't resolve pathnames when traversing recursively through directory trees
Otherwise we can be fooled if one path component is replaced underneath us.
The patch achieves that by always operating at file descriptor level (by using
*at() helpers) and by making sure we do not any path resolution when traversi... | src/tmpfiles/tmpfiles.c | c | 2018-03-02T16:19:32Z |
def change_password_for_user(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if (
current_user is not None
and not current_user.is_anonymous
and (current_user.get_name() == username or current_user.is_admin)
):
if "application/json" not in request.head... | def change_password_for_user(username):
if not userManager.enabled:
return jsonify(SUCCESS)
if (
current_user is not None
and not current_user.is_anonymous
and (
current_user.get_name() == username
or current_user.has_permission(Permissions.SETTINGS)
... | null | null | null | https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f | 🔒️ Require the current password for changing it
Admins may still change existing user account passwords without
having to enter the current one, however the regular user oriented
password change dialog has been adjusted to require entry of the
current password. The API has been locked down accordingly and
the passwor... | src/octoprint/server/api/access.py | py | 2022-08-18T15:23:11Z |
private function __simple_query($cmd)
{
if (!empty($this->__setup['resources'])) {
if (is_array($this->__setup['resources'])) {
foreach ($this->__setup['resources'] as $resource) {
$cmd .= " '" . $resource . "'";
}
} else {
... | private function __simple_query($cmd)
{
if (!empty($this->__setup['resources'])) {
$this->__request_object['search'] = $this->__setup['resources'];
}
$commandFile = $this->__generateCommandFile();
$results = shell_exec($cmd . ' --query_data ' . $commandFile);
unli... | CVE-2021-41326 | NVD-CWE-noinfo | In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call. | https://github.com/MISP/MISP/commit/e36f73947e741bc97320f0c42199acd1a94c7051 | chg: [opendata] updated and changed parameter handling | OpendataExport.php | php | 2021-09-17T18:15:00Z |
uint16_t
get_l2protocol(const u_char *pktdata, const int datalen, const int datalink)
{
uint16_t ether_type;
uint16_t eth_hdr_offset = 0;
if (!pktdata || !datalen) {
errx(-1, "invalid l2 parameters: pktdata=0x%p len=%d",
pktdata, datalen);
return 0;
}
switch (datali... | uint16_t
get_l2protocol(const u_char *pktdata, const int datalen, const int datalink)
{
uint16_t eth_hdr_offset = 0;
if (!pktdata || !datalen) {
errx(-1, "invalid l2 parameters: pktdata=0x%p len=%d",
pktdata, datalen);
return 0;
}
switch (datalink) {
case DLT_RAW:
... | null | null | null | https://github.com/appneta/tcpreplay/commit/58dfef91fa206f29e52fc5f7efeeb334eeaf37c6 | Bug #488 heap overflow csum replace4 (#496)
* Bug #488 check for available buffer space before any packet edits
* Bug #488 update CHANGELOG | src/common/get.c | c | 2018-10-20T11:16:08Z |
@RequestMapping(value = "/query/page/new", method = RequestMethod.POST)
public ResponseResult<PageBean<Map<String, Object>>> queryPagedJob(@RequestBody PagedJobQO pagedJobQO) {
List<String> roles = pagedJobQO.getRole();
List<String> status = pagedJobQO.getStatus();
if (roles != null) {
... | @RequestMapping(value = "/query/page/new", method = RequestMethod.POST)
public ResponseResult<PageBean<Map<String, Object>>> queryPagedJob(@RequestBody PagedJobQO pagedJobQO) {
ResponseResult responseResult = checkAppKey();
if (responseResult != null) return responseResult;
List<String> role... | null | null | null | https://github.com/FederatedAI/FATE-Board/commit/322309265731ada15d1075963744046785fd265e | add api unauthorized notice | src/main/java/com/webank/ai/fate/board/controller/JobManagerController.java | java | 2021-11-05T08:24:28Z |
protected void dumpKylinPropsAndMetadata(String prj, Set<String> dumpList, KylinConfig kylinConfig,
Configuration conf) throws IOException {
File tmp = File.createTempFile("kylin_job_meta", "");
FileUtils.forceDelete(tmp); // we need a directory, so delete the file first
File metaDi... | protected void dumpKylinPropsAndMetadata(String prj, Set<String> dumpList, KylinConfig kylinConfig,
Configuration conf) throws IOException {
File tmp = Files.createTempFile("kylin_job_meta", "").toFile();
FileUtils.forceDelete(tmp); // we need a directory, so delete the file first
F... | null | null | null | https://github.com/apache/kylin/commit/45341307d573c181fa343a34e95fc76b89a5e0ba | vuln-fix: Temporary File Information Disclosure
This fixes temporary file information disclosure vulnerability due to the use
of the vulnerable `File.createTempFile()` method. The vulnerability is fixed by
using the `Files.createTempFile()` method which sets the correct posix permissions.
Weakness: CWE-377: Insecur... | build-engine/src/main/java/org/apache/kylin/engine/mr/common/AbstractHadoopJob.java | java | 2022-11-18T22:53:02Z |
@Override
public void registerAuthenticationHandlerWithPrincipalResolvers(final Collection<AuthenticationHandler> handlers,
final PrincipalResolver principalResolver) {
handlers.forEach(h -> registerAuthenticationHandlerWithPrincipalResolve... | @Override
public void registerAuthenticationHandlerWithPrincipalResolvers(final Collection<AuthenticationHandler> handlers,
final PrincipalResolver principalResolver) {
handlers.stream().filter(BeanSupplier::isNotProxy).forEach(h -> registe... | null | null | null | https://github.com/apereo/cas/commit/b7ee8d12c6f1266e8ef6a1b040b6f0ae6d38351b | enable mfa provider populator for other mfa providers | core/cas-server-core-authentication-api/src/main/java/org/apereo/cas/authentication/DefaultAuthenticationEventExecutionPlan.java | java | 2022-03-07T07:12:26Z |
int lzxd_decompress(struct lzxd_stream *lzx, off_t out_bytes) {
/* bitstream and huffman reading variables */
register unsigned int bit_buffer;
register int bits_left, i=0;
unsigned char *i_ptr, *i_end;
register unsigned short sym;
int match_length, length_footer, extra, verbatim_bits, bytes_todo;
int th... | int lzxd_decompress(struct lzxd_stream *lzx, off_t out_bytes) {
/* bitstream and huffman reading variables */
register unsigned int bit_buffer;
register int bits_left, i=0;
unsigned char *i_ptr, *i_end;
register unsigned short sym;
int match_length, length_footer, extra, verbatim_bits, bytes_todo;
int th... | null | CWE-119, CWE-787 | null | https://github.com/vrtadmin/clamav-devel/commit/a83773682e856ad6529ba6db8d1792e6d515d7f1 | fixing potential OOB window write when unpacking chm files | null | null | 2017-03-29T18:55:26Z |
bool f2fs_init_extent_tree(struct inode *inode, struct f2fs_extent *i_ext)
{
struct f2fs_sb_info *sbi = F2FS_I_SB(inode);
struct extent_tree *et;
struct extent_node *en;
struct extent_info ei;
if (!f2fs_may_extent_tree(inode)) {
/* drop largest extent */
if (i_ext && i_ext->len) {
i_ext->len = 0;
return... | bool f2fs_init_extent_tree(struct inode *inode, struct f2fs_extent *i_ext)
{
bool ret = __f2fs_init_extent_tree(inode, i_ext);
if (!F2FS_I(inode)->extent_tree)
set_inode_flag(inode, FI_NO_EXTENT);
return ret;
} | null | CWE-119, CWE-787 | null | https://github.com/torvalds/linux/commit/dad48e73127ba10279ea33e6dbc8d3905c4d31c0 | f2fs: fix a bug caused by NULL extent tree
Thread A: Thread B:
-f2fs_remount
-sbi->mount_opt.opt = 0;
<--- -f2fs_iget
-do_read_inode
-f2fs_init_extent_tree
-F2FS_I(inode)->extent_tree is NULL
-default_options && parse_options
-remount return
... | null | null | 2017-05-19T07:06:12Z |
OM_uint32 KRB5_CALLCONV
gss_unwrap_iov (minor_status,
context_handle,
conf_state,
qop_state,
iov,
iov_count)
OM_uint32 * minor_status;
gss_ctx_id_t context_handle;
int * conf_state;
gss_qop_t *qop_state;
gss_iov_buffer_desc * iov;
int... | OM_uint32 KRB5_CALLCONV
gss_unwrap_iov (minor_status,
context_handle,
conf_state,
qop_state,
iov,
iov_count)
OM_uint32 * minor_status;
gss_ctx_id_t context_handle;
int * conf_state;
gss_qop_t *qop_state;
gss_iov_buffer_desc * iov;
int... | null | null | null | https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf | Preserve GSS context on init/accept failure
After gss_init_sec_context() or gss_accept_sec_context() has created a
context, don't delete the mechglue context on failures from subsequent
calls, even if the mechanism deletes the mech-specific context (which
is allowed by RFC 2744 but not preferred). Check for union con... | src/lib/gssapi/mechglue/g_unwrap_iov.c | c | 2017-07-14T17:02:46Z |
@Override
public void calculate(@NonNull Player target, @NonNull ContextConsumer consumer) {
ClaimCache claimCache = HuskTowns.getClaimCache();
PlayerCache playerCache = HuskTowns.getPlayerCache();
if (claimCache.hasLoaded() && playerCache.hasLoaded()) {
Location location = targe... | @Override
public void calculate(@NonNull Player target, @NonNull ContextConsumer consumer) {
ClaimCache claimCache = HuskTowns.getClaimCache();
PlayerCache playerCache = HuskTowns.getPlayerCache();
if (claimCache.hasLoaded() && playerCache.hasLoaded()) {
Location location = targe... | null | null | null | https://github.com/WiIIiam278/HuskTowns/commit/22e14b017edcfe232e215219dec08d52383d07c8 | Fix #87 - LuckPerms addon crash due to loading chunk async
Signed-off-by: William <will27528@gmail.com> | bukkit/src/main/java/me/william278/husktowns/integrations/luckperms/calculators/PlayerAccessCalculator.java | java | 2021-12-31T00:10:42Z |
static int decode_nal_sei_message(GetBitContext *gb, void *logctx, HEVCSEI *s,
const HEVCParamSets *ps, int nal_unit_type)
{
int payload_type = 0;
int payload_size = 0;
int byte = 0xFF;
av_log(logctx, AV_LOG_DEBUG, "Decoding SEI\n");
while (byte == 0xFF) {
b... | static int decode_nal_sei_message(GetBitContext *gb, void *logctx, HEVCSEI *s,
const HEVCParamSets *ps, int nal_unit_type)
{
int payload_type = 0;
int payload_size = 0;
int byte = 0xFF;
av_log(logctx, AV_LOG_DEBUG, "Decoding SEI\n");
while (byte == 0xFF) {
i... | null | null | null | FFmpeg/commit/991ef6e5b9a6a9d95e274ff6bff52db1c82b3808 | avcodec/hevc_sei: Fix integer overflows in decode_nal_sei_message()
Fixes: signed integer overflow: 2147483520 + 255 cannot be represented in type 'int'
Fixes: 4554/clusterfuzz-testcase-minimized-4843714515042304
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signe... | ./ffmpeg/libavcodec/hevc_sei.c | c | 2017-12-15T16:50:12Z |
snmp_engine(unsigned char *buff, uint32_t buff_len, unsigned char *out, uint32_t *out_len)
{
static snmp_header_t header;
static snmp_varbind_t varbinds[SNMP_MAX_NR_VALUES];
static uint32_t varbind_length = SNMP_MAX_NR_VALUES;
buff = snmp_message_decode(buff, buff_len, &header, varbinds, &varbind_length);
if... | snmp_engine(snmp_packet_t *snmp_packet)
{
snmp_header_t header;
snmp_varbind_t varbinds[SNMP_MAX_NR_VALUES];
memset(&header, 0, sizeof(header));
memset(varbinds, 0, sizeof(varbinds));
if(!snmp_message_decode(snmp_packet, &header, varbinds)) {
return 0;
}
if(header.version != SNMP_VERSION_1) {
i... | CVE-2020-12141 | CWE-125 | An out-of-bounds read in the SNMP stack in Contiki-NG 4.4 and earlier allows an attacker to cause a denial of service and potentially disclose information via crafted SNMP packets to snmp_ber_decode_string_len_buffer in os/net/app-layer/snmp/snmp-ber.c. | https://github.com/contiki-ng/contiki-ng/commit/12c824386ab60de757de5001974d73b32e19ad71 | Refactored SNMP engine after vulnerabilities | snmp-engine.c | c | 2021-10-19T16:15:00Z |
def deny_uploads_containing_script_tag(uploaded_file):
for chunk in uploaded_file.chunks(2048):
if chunk.lower().find(b"<script") > -1:
raise ValidationError(_("File contains forbidden <script> tag")) | def deny_uploads_containing_script_tag(uploaded_file):
for chunk in uploaded_file.chunks(2048):
if chunk.lower().find(b"<script") > -1:
raise ValidationError(_("File contains forbidden <script> tag"))
if chunk.lower().find(b"onload=") > -1:
raise ValidationError(_("File cont... | null | null | null | https://github.com/kiwitcms/Kiwi/commit/d789f4b51025de4f8c747c037d02e1b0da80b034 | Improve upload validation to check for dangerous attributes | tcms/kiwi_attachments/validators.py | py | 2023-05-30T15:42:30Z |
base_sock_create(struct net *net, struct socket *sock, int protocol, int kern)
{
struct sock *sk;
if (sock->type != SOCK_RAW)
return -ESOCKTNOSUPPORT;
sk = sk_alloc(net, PF_ISDN, GFP_KERNEL, &mISDN_proto, kern);
if (!sk)
return -ENOMEM;
sock_init_data(sock, sk);
sock->ops = &base_sock_ops;
sock->state = S... | base_sock_create(struct net *net, struct socket *sock, int protocol, int kern)
{
struct sock *sk;
if (sock->type != SOCK_RAW)
return -ESOCKTNOSUPPORT;
if (!capable(CAP_NET_RAW))
return -EPERM;
sk = sk_alloc(net, PF_ISDN, GFP_KERNEL, &mISDN_proto, kern);
if (!sk)
return -ENOMEM;
sock_init_data(sock, sk);
... | CVE-2019-17055 | CWE-862 | base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80 | mISDN: enforce CAP_NET_RAW for raw sockets
When creating a raw AF_ISDN socket, CAP_NET_RAW needs to be checked
first.
Signed-off-by: Ori Nimron <orinimron123@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | null | null | null |
def deliver!(mail)
if ::File.respond_to?(:makedirs)
::File.makedirs settings[:location]
else
::FileUtils.mkdir_p settings[:location]
end
mail.destinations.uniq.each do |to|
::File.open(::File.join(settings[:location], to), 'a') { |f| "#{f.write(mail.encoded)}\r\n\r\n" }
... | def deliver!(mail)
if ::File.respond_to?(:makedirs)
::File.makedirs settings[:location]
else
::FileUtils.mkdir_p settings[:location]
end
mail.destinations.uniq.each do |to|
::File.open(::File.join(settings[:location], File.basename(to.to_s)), 'a') { |f| "#{f.write(mail.e... | CVE-2012-2139 | CWE-22 | Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter. | https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f | Preventing file system traversal in file_delivery method | file_delivery.rb | rb | 2012-07-18T18:55:00Z |
int kvm_iommu_map_pages(struct kvm *kvm, struct kvm_memory_slot *slot)
{
gfn_t gfn, end_gfn;
pfn_t pfn;
int r = 0;
struct iommu_domain *domain = kvm->arch.iommu_domain;
int flags;
/* check if iommu exists and in use */
if (!domain)
return 0;
gfn = slot->base_gfn;
end_gfn = gfn + slot->npages;
flags =... | int kvm_iommu_map_pages(struct kvm *kvm, struct kvm_memory_slot *slot)
{
gfn_t gfn, end_gfn;
pfn_t pfn;
int r = 0;
struct iommu_domain *domain = kvm->arch.iommu_domain;
int flags;
/* check if iommu exists and in use */
if (!domain)
return 0;
gfn = slot->base_gfn;
end_gfn = gfn + slot->npages;
flags =... | CVE-2014-8369 | CWE-119 | The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privilege... | http://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=3d32e4dbe71374a6780eaf51d719d76f9a9bf22f | kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
The third parameter of kvm_unpin_pages() when called from
kvm_iommu_map_pages() is wrong, it should be the number of pages to un-pin
and not the page size.
This error was facilitated with an inconsistent API: kvm_pin_pages() takes
a size, but kvn_unpin_... | null | null | null |
double av_get_double(void *obj, const char *name, const AVOption **o_out)
{
int64_t intnum=1;
double num=1;
int den=1;
av_get_number(obj, name, o_out, &num, &den, &intnum);
return num*intnum/den;
} | double av_get_double(void *obj, const char *name, const AVOption **o_out)
{
int64_t intnum=1;
double num=1;
int den=1;
if (av_get_number(obj, name, o_out, &num, &den, &intnum) < 0)
return -1;
return num*intnum/den;
} | null | null | null | FFmpeg/commit/8089b7fa8c5b5a48cc7101daa4be891d0ead5a5e | avoptions: Check the return value from av_get_number
This avoids doing a division by zero if the option wasn't found,
or wasn't an option of an appropriate type.
Signed-off-by: Martin Storsjö <martin@martin.st> | ./ffmpeg/libavutil/opt.c | c | 2011-05-22T18:34:49Z |
static int qemu_chr_open_pipe(QemuOpts *opts, CharDriverState **_chr)
{
int fd_in, fd_out;
char filename_in[256], filename_out[256];
const char *filename = qemu_opt_get(opts, "path");
if (filename == NULL) {
fprintf(stderr, "chardev: pipe: no filename given\n");
return -EINVAL;
}
... | static CharDriverState *qemu_chr_open_pipe(QemuOpts *opts)
{
int fd_in, fd_out;
char filename_in[256], filename_out[256];
const char *filename = qemu_opt_get(opts, "path");
if (filename == NULL) {
fprintf(stderr, "chardev: pipe: no filename given\n");
return NULL;
}
snprintf(file... | null | null | null | qemu/commit/1f51470d044852592922f91000e741c381582cdc | Revert "qemu-char: Print strerror message on failure" and deps
The commit's purpose is laudable:
The only way for chardev drivers to communicate an error was to
return a NULL pointer, which resulted in an error message that
said _that_ something went wrong, but not _why_.
It attempts to achieve it by cha... | ./qemu/qemu-char.c | c | 2012-02-07T14:09:08Z |
static int fsmSetFCaps(int dirfd, const char *path, const char *captxt)
{
int rc = 0;
#if WITH_CAP
if (captxt && *captxt != '\0') {
cap_t fcaps = cap_from_text(captxt);
/* cap_set_file() doesn't support dirfd based operation */
if ((dirfd >= 0 && *path != '/') || fcaps == NULL)
rc = RPMERR_SETCAP_FAILE... | static int fsmSetFCaps(int fd, int dirfd, const char *path, const char *captxt)
{
int rc = 0;
#if WITH_CAP
if (captxt && *captxt != '\0') {
cap_t fcaps = cap_from_text(captxt);
if (fd >= 0) {
if (fcaps == NULL || cap_set_fd(fd, fcaps))
rc = RPMERR_SETCAP_FAILED;
} else {
if (fcaps == NULL || ca... | null | null | null | https://github.com/rpm-software-management/rpm/commit/4682bcffd8af58cd47385508d9432e313c5cdfd7 | Add support for fd-based file metadata setting
We need to support both fd-based and (dirfd+) path based operations
due to all the lovely mismatches in POSIX, so lotsa half-duplicated
tedious stuff here.
As of this commit, we only use fd based ops for regular files. | lib/fsm.c | c | 2022-02-14T12:23:51Z |
int MapOpenSSLErrorSSL() {
unsigned long error_code;
do {
error_code = ERR_get_error();
if (error_code == 0)
return ERR_SSL_PROTOCOL_ERROR;
} while (ERR_GET_LIB(error_code) != ERR_LIB_SSL);
DVLOG(1) << "OpenSSL SSL error, reason: " << ERR_GET_REASON(error_code)
<< ", name: " << ERR_err... | int MapOpenSSLErrorSSL() {
unsigned long error_code;
do {
error_code = ERR_get_error();
if (error_code == 0)
return ERR_SSL_PROTOCOL_ERROR;
} while (ERR_GET_LIB(error_code) != ERR_LIB_SSL);
DVLOG(1) << "OpenSSL SSL error, reason: " << ERR_GET_REASON(error_code)
<< ", name: " << ERR_err... | null | null | null | https://github.com/chromium/chromium/commit/b051cdb6465736e7233cd22b807e255554378206 | OpenSSL: don't allow the server certificate to change during renegotiation.
This mirrors r229611, but for OpenSSL.
BUG=306959
Review URL: https://codereview.chromium.org/177143004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@254022 0039d316-1c4b-4281-b951-d872f2087c98 | net/socket/ssl_client_socket_openssl.cc | cc | 2014-02-28T02:20:16Z |
static int set_hwframe_ctx(AVCodecContext *ctx, AVBufferRef *hw_device_ctx)
{
AVBufferRef *hw_frames_ref;
AVHWFramesContext *frames_ctx = NULL;
int err = 0;
if (!(hw_frames_ref = av_hwframe_ctx_alloc(hw_device_ctx))) {
fprintf(stderr, "Failed to create VAAPI frame context.\n");
return -1... | static int set_hwframe_ctx(AVCodecContext *ctx, AVBufferRef *hw_device_ctx)
{
AVBufferRef *hw_frames_ref;
AVHWFramesContext *frames_ctx = NULL;
int err = 0;
if (!(hw_frames_ref = av_hwframe_ctx_alloc(hw_device_ctx))) {
fprintf(stderr, "Failed to create VAAPI frame context.\n");
return -1... | null | null | null | FFmpeg/commit/a763d278274cfbda4e78e21b338b9b525fe22eab | examples/vaapi_encode: Fix leak on hwframe init failure
Fixes CID #1424882. | ./ffmpeg/doc/examples/vaapi_encode.c | c | 2017-12-01T21:06:42Z |
private void authorizeBulkItems(
RequestInfo requestInfo,
AuthorizationContext bulkAuthzContext,
AuthorizationEngine authzEngine,
AsyncSupplier<ResolvedIndices> resolvedIndicesAsyncSupplier,
Metadata metadata,
String requestId,
ActionListener<Void> listener
) ... | private void authorizeBulkItems(
RequestInfo requestInfo,
AuthorizationContext bulkAuthzContext,
AuthorizationEngine authzEngine,
AsyncSupplier<ResolvedIndices> resolvedIndicesAsyncSupplier,
Metadata metadata,
String requestId,
ActionListener<Void> listener
) ... | null | null | null | https://github.com/elastic/elasticsearch/commit/8bccf664b0c3d8814c485256a475e6a1857ede5c | Pre-authorize child search transport actions (#91886)
This PR aims to improve authorization performance of `indices:data/read/search`
action by avoiding authorizing the transport child actions on every node. The focus
is on index search child actions since they are accessing just a subset of parent's indices.
Some op... | x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/AuthorizationService.java | java | 2022-12-19T15:33:02Z |
void SSL_SESSION::CopyX509(X509* x)
{
if (x == 0) return;
X509_NAME* issuer = x->GetIssuer();
X509_NAME* subject = x->GetSubject();
ASN1_STRING* before = x->GetBefore();
ASN1_STRING* after = x->GetAfter();
peerX509_ = NEW_YS X509(issuer->GetName(), issuer->GetLength(),
subject->Get... | void SSL_SESSION::CopyX509(X509* x)
{
if (x == 0) return;
X509_NAME* issuer = x->GetIssuer();
X509_NAME* subject = x->GetSubject();
ASN1_STRING* before = x->GetBefore();
ASN1_STRING* after = x->GetAfter();
peerX509_ = NEW_YS X509(issuer->GetName(), issuer->GetLength(),
subject->Get... | CVE-2016-2047 | CWE-254 | The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Co... | https://github.com/mysql/mysql-server/commit/e7061f7e5a96c66cb2e0bf46bec7f6ff35801a69 | Bug #22738607: YASSL FUNCTION X509_NAME_GET_INDEX_BY_NID IS NOT WORKING AS EXPECTED. | null | null | 2016-02-26T06:23:56Z |
ztype(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
ref tnref;
int code = array_get(imemory, op, (long)r_btype(op - 1), &tnref);
if (code < 0)
return code;
if (!r_has_type(&tnref, t_name)) {
/* Must be either a stack underflow or a t_[a]struct. */
check_op(2);
{ ... | ztype(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
ref tnref;
int code = array_get(imemory, op, (long)r_btype(op - 1), &tnref);
if (code < 0)
return code;
if (!r_has_type(&tnref, t_name)) {
/* Must be either a stack underflow or a t_[a]struct. */
check_op(2);
{ ... | CVE-2018-16511 | CWE-704 | An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0edd3d6c634a577db261615a9dc2719bca7f6e01 | null | null | c | null |
public static void initializePermissionAPI()
{
if (PermissionAPI.activeHandler != null) throw new IllegalStateException("Tried to initialize PermissionAPI multiple times!");
PermissionGatherEvent.Handler handlerEvent = new PermissionGatherEvent.Handler();
MinecraftForge.EVENT_BUS.post(handl... | public static void initializePermissionAPI()
{
Class callerClass = StackWalker.getInstance(StackWalker.Option.RETAIN_CLASS_REFERENCE).getCallerClass();
if (callerClass != ServerLifecycleHooks.class)
{
LOGGER.warn("{} tried to initialize the PermissionAPI, this call will be ignore... | null | null | null | https://github.com/neoforged/NeoForge/commit/335cb5edc4467a213a01a315e75aad5aa3569f34 | Fix crash with PermissionsAPI (#8330)
Fixes a crash in singleplayer, when the internal server didn't shut down correctly between world loads. | src/main/java/net/minecraftforge/server/permission/PermissionAPI.java | java | 2022-01-02T18:43:07Z |
void ed_map_dst(ed_t p, const uint8_t *msg, int len, const uint8_t *dst, int dst_len) {
bn_t k;
fp_t t;
ed_t q;
/* enough space for two field elements plus extra bytes for uniformity */
const int len_per_elm = (FP_PRIME + ed_param_level() + 7) / 8;
uint8_t *pseudo_random_bytes = RLC_ALLOCA(uint8_t, 2 * len_per_el... | void ed_map_dst(ed_t p, const uint8_t *msg, size_t len, const uint8_t *dst,
size_t dst_len) {
bn_t k;
fp_t t;
ed_t q;
/* enough space for two field elements plus extra bytes for uniformity */
const int len_per_elm = (FP_PRIME + ed_param_level() + 7) / 8;
uint8_t *pseudo_random_bytes = RLC_ALLOCA(uint8_t, 2 * le... | null | null | null | https://github.com/relic-toolkit/relic/commit/34580d840469361ba9b5f001361cad659687b9ab | Huge commit improving the API to use size_t instead of int. | src/ed/relic_ed_map.c | c | 2022-11-14T20:47:12Z |
static inline void sem_lock_and_putref(struct sem_array *sma)
{
ipc_lock_by_ptr(&sma->sem_perm);
ipc_rcu_putref(sma);
} | static inline void sem_lock_and_putref(struct sem_array *sma)
{
rcu_read_lock();
sem_lock(sma, NULL, -1);
ipc_rcu_putref(sma);
} | null | CWE-703, CWE-189 | null | https://github.com/torvalds/linux/commit/6062a8dc0517bce23e3c2f7d2fea5e22411269a3 | ipc,sem: fine grained locking for semtimedop
Introduce finer grained locking for semtimedop, to handle the common case
of a program wanting to manipulate one semaphore from an array with
multiple semaphores.
If the call is a semop manipulating just one semaphore in an array with
multiple semaphores, only take the loc... | null | null | 2013-05-01T02:15:44Z |
static char* allocFromUTF16(const char16_t* in, size_t len)
{
if (len == 0) return getEmptyString();
const ssize_t bytes = utf16_to_utf8_length(in, len);
if (bytes < 0) {
return getEmptyString();
}
SharedBuffer* buf = SharedBuffer::alloc(bytes+1);
ALOG_ASSERT(buf, "Unable to al... | static char* allocFromUTF16(const char16_t* in, size_t len)
{
if (len == 0) return getEmptyString();
// Allow for closing '\0'
const ssize_t resultStrLen = utf16_to_utf8_length(in, len) + 1;
if (resultStrLen < 1) {
return getEmptyString();
}
SharedBuffer* buf = SharedBuffer::al... | CVE-2016-3861 | CWE-119,CWE-264 | LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffe... | https://android.googlesource.com/platform/system/core/+/ecf5fd58a8f50362ce9e8d4245a33d56f29f142b | libutils/Unicode.cpp: Correct length computation and add checks for utf16->utf8
Inconsistent behaviour between utf16_to_utf8 and utf16_to_utf8_length
is causing a heap overflow.
Correcting the length computation and adding bound checks to the
conversion functions.
Test: ran libutils_tests
Bug: 29250543
Change-Id: I6... | libutils/String8.cpp | cpp | null |
void update_rate_histogram(struct rate_hist *hist,
const vpx_codec_enc_cfg_t *cfg,
const vpx_codec_cx_pkt_t *pkt) {
int i;
int64_t then = 0;
int64_t avg_bitrate = 0;
int64_t sum_sz = 0;
const int64_t now = pkt->data.frame.pts * 1000 *
(uint64_t)cfg->g_timebase.num /
(uint64_t)cfg->g_timebase.den;
int idx = h... | void update_rate_histogram(struct rate_hist *hist,
const vpx_codec_enc_cfg_t *cfg,
const vpx_codec_cx_pkt_t *pkt) {
int i;
int64_t then = 0;
int64_t avg_bitrate = 0;
int64_t sum_sz = 0;
const int64_t now = pkt->data.frame.pts * 1000 *
(uint64_t)cfg->g_timebase.num /
(uint64_t)cfg->g_timebase.den;
int idx = h... | CVE-2016-1621 | CWE-119 | libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792. | https://android.googlesource.com/platform/external/libvpx/+/5a9753fca56f0eeb9f61e342b2fccffc364f9426 | Merge Conflict Fix CL to lmp-mr1-release for ag/849478
DO NOT MERGE - libvpx: Pull from upstream
Current HEAD: 7105df53d7dc13d5e575bc8df714ec8d1da36b06
BUG=23452792
Change-Id: Ic78176fc369e0bacc71d423e0e2e6075d004aaec | libvpx/rate_hist.c | c | null |
static void virtio_balloon_set_config(VirtIODevice *vdev,
const uint8_t *config_data)
{
VirtIOBalloon *dev = VIRTIO_BALLOON(vdev);
struct virtio_balloon_config config;
uint32_t oldactual = dev->actual;
memcpy(&config, config_data, 8);
dev->actual = le32_to_cpu(c... | static void virtio_balloon_set_config(VirtIODevice *vdev,
const uint8_t *config_data)
{
VirtIOBalloon *dev = VIRTIO_BALLOON(vdev);
struct virtio_balloon_config config;
uint32_t oldactual = dev->actual;
memcpy(&config, config_data, 8);
dev->actual = le32_to_cpu(c... | null | null | null | qemu/commit/dcc6ceffc066745777960a1f0d32f3a555924f65 | virtio-balloon: fix integer overflow in BALLOON_CHANGE QMP event
Because dev->actual is uint32_t, the expression 'dev->actual <<
VIRTIO_BALLOON_PFN_SHIFT' is truncated to 32 bits. This overflows when
dev->actual >= 1048576.
To reproduce:
1. Start a VM with a QMP socket and 5G of RAM
2. Connect to the QMP socket, n... | ./qemu/hw/virtio/virtio-balloon.c | c | 2013-04-18T15:53:32Z |
static int kvm_dirty_pages_log_change(target_phys_addr_t phys_addr, target_phys_addr_t end_addr,
unsigned flags,
unsigned mask)
{
KVMState *s = kvm_state;
KVMSlot *mem = kvm_lookup_slot(s, phys_addr);
if (mem == NULL) {
... | static int kvm_dirty_pages_log_change(target_phys_addr_t phys_addr,
ram_addr_t size, unsigned flags,
unsigned mask)
{
KVMState *s = kvm_state;
KVMSlot *mem = kvm_lookup_matching_slot(s, phys_addr, phys_addr + size);
if (mem == NULL)... | null | null | null | qemu/commit/d3f8d37fe2d0c24ec8bac9c94d5b0e2dc09c0d2a | kvm: Add sanity checks to slot management (Jan Kiszka)
Fail loudly if we run out of memory slot.
Make sure that dirty log start/stop works with consistent memory regions
by reporting invalid parameters. This reveals several inconsistencies in
the vga code, patch to fix them follows later in this series.
And, for sim... | ./qemu/kvm-all.c | c | 2009-04-17T14:26:29Z |
av_cold void ff_sws_init_input_funcs(SwsContext *c)
{
enum PixelFormat srcFormat = c->srcFormat;
c->chrToYV12 = NULL;
switch(srcFormat) {
case PIX_FMT_YUYV422 : c->chrToYV12 = yuy2ToUV_c; break;
case PIX_FMT_UYVY422 : c->chrToYV12 = uyvyToUV_c; break;
case PIX_FMT_NV12 : c->chr... | av_cold void ff_sws_init_input_funcs(SwsContext *c)
{
enum PixelFormat srcFormat = c->srcFormat;
c->chrToYV12 = NULL;
switch(srcFormat) {
case PIX_FMT_YUYV422 : c->chrToYV12 = yuy2ToUV_c; break;
case PIX_FMT_UYVY422 : c->chrToYV12 = uyvyToUV_c; break;
case PIX_FMT_NV12 : c->chr... | null | null | null | FFmpeg/commit/f972193a15026a99eb2b08e7913a03f2123663da | Support RGBA64 as input colour space.
Mostly fixes ticket #503,
opaque still overflows for RGBA64 -> RGBA conversion. | ./ffmpeg/libswscale/input.c | c | 2012-03-03T23:43:18Z |
static void sdl_audio_callback(void *opaque, Uint8 *stream, int len)
{
VideoState *is = opaque;
int audio_size, len1, silence = 0;
audio_callback_time = av_gettime_relative();
while (len > 0) {
if (is->audio_buf_index >= is->audio_buf_size) {
audio_size = audio_decode_frame(is);
... | static void sdl_audio_callback(void *opaque, Uint8 *stream, int len)
{
VideoState *is = opaque;
int audio_size, len1;
audio_callback_time = av_gettime_relative();
while (len > 0) {
if (is->audio_buf_index >= is->audio_buf_size) {
audio_size = audio_decode_frame(is);
if (aud... | null | null | null | FFmpeg/commit/a07934d51b40b0f48be531a359d39c091c414643 | ffplay: fix silence insertion on error or pause
Insertion of silence was a bit broken since
df34b700981de606ca4847e1ed0bfdf9ac3e9104 because the info whether or not the
source buffer supposed to be silence must be kept between callbacks. Failing to
do so causes rogue samples from the last buffer to be presented, I gue... | ./ffmpeg/ffplay.c | c | 2016-04-03T19:23:41Z |
static void WriteTo8BimProfile(Image *image,const char *name,
const StringInfo *profile)
{
const unsigned char
*datum,
*q;
register const unsigned char
*p;
size_t
length;
StringInfo
*profile_8bim;
ssize_t
count;
unsigned char
length_byte;
unsigned int
value;
uns... | static void WriteTo8BimProfile(Image *image,const char *name,
const StringInfo *profile)
{
const unsigned char
*datum,
*q;
register const unsigned char
*p;
size_t
length;
StringInfo
*profile_8bim;
ssize_t
count;
unsigned char
length_byte;
unsigned int
value;
uns... | CVE-2016-7536 | CWE-20 | magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile. | https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453 | Fixed SEGV reported in https://github.com/ImageMagick/ImageMagick/issues/130 | magick/profile.c | c | null |
static int unix_stream_connect(struct socket *sock, struct sockaddr *uaddr,
int addr_len, int flags)
{
struct sockaddr_un *sunaddr=(struct sockaddr_un *)uaddr;
struct sock *sk = sock->sk;
struct unix_sock *u = unix_sk(sk), *newu, *otheru;
struct sock *newsk = NULL;
struct sock *other = NULL;
struct sk_b... | static int unix_stream_connect(struct socket *sock, struct sockaddr *uaddr,
int addr_len, int flags)
{
struct sockaddr_un *sunaddr=(struct sockaddr_un *)uaddr;
struct sock *sk = sock->sk;
struct unix_sock *u = unix_sk(sk), *newu, *otheru;
struct sock *newsk = NULL;
struct sock *other = NULL;
struct sk_b... | CVE-2008-5029 | null | The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and ... | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=1fd05ba5a2f2aa8e7b9b52ef55df850e2e7d54c9 | [AF_UNIX]: Rewrite garbage collector, fixes race.
Throw out the old mark & sweep garbage collector and put in a
refcounting cycle detecting one.
The old one had a race with recvmsg, that resulted in false positives
and hence data loss. The old algorithm operated on all unix sockets
in the system, so any additional l... | null | null | null |
@Method(0x8001bbccL)
public static void FUN_8001bbcc(final int x, final int y) {
FUN_8001b92c();
final long s2 = _800bd700.getAddress();
long packet;
if(doubleBufferFrame_800bb108.get() != 0) {
//LAB_8001bf3c
GPU.queueCommand(6, new GpuCommandPoly(4)
.bpp(Bpp.BITS_15)
.vra... | @Method(0x8001bbccL)
public static void FUN_8001bbcc(final int x, final int y) {
FUN_8001b92c();
final long s2 = _800bd700.getAddress();
long packet;
if(doubleBufferFrame_800bb108.get() != 0) {
//LAB_8001bf3c
GPU.queueCommand(6, new GpuCommandPoly(4)
.bpp(Bpp.BITS_15)
.vra... | null | null | null | https://github.com/Legend-of-Dragoon-Modding/Severed-Chains/commit/f99608ab535148601d96a08d1dce2806342fd5dd | Cleanup; fix item list; fix addition squares not being red on counter-attack | src/main/java/legend/game/Scus94491BpeSegment.java | java | 2022-11-02T20:33:19Z |
static inline int get_amv(Mpeg4DecContext *ctx, int n)
{
MpegEncContext *s = &ctx->m;
int x, y, mb_v, sum, dx, dy, shift;
int len = 1 << (s->f_code + 4);
const int a = s->sprite_warping_accuracy;
if (s->workaround_bugs & FF_BUG_AMV)
len >>= s->quarter_sample;
if (s->real_sprite_warpi... | static inline int get_amv(Mpeg4DecContext *ctx, int n)
{
MpegEncContext *s = &ctx->m;
int x, y, mb_v, sum, dx, dy, shift;
int len = 1 << (s->f_code + 4);
const int a = s->sprite_warping_accuracy;
if (s->workaround_bugs & FF_BUG_AMV)
len >>= s->quarter_sample;
if (s->real_sprite_warpi... | null | null | null | FFmpeg/commit/6179dc8aa7e5fc5358b9614306f93f1adadf22a4 | avcodec/mpeg4video: Fix runtime error: left shift of negative value
Fixes: 644/clusterfuzz-testcase-4726434209726464
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | ./ffmpeg/libavcodec/mpeg4videodec.c | c | 2017-02-22T00:22:24Z |
static int flattenSubquery(
Parse *pParse, /* Parsing context */
Select *p, /* The parent or outer SELECT statement */
int iFrom, /* Index in p->pSrc->a[] of the inner subquery */
int isAgg /* True if outer SELECT uses aggregate functions */
){
const char *zSavedAuthContex... | static int flattenSubquery(
Parse *pParse, /* Parsing context */
Select *p, /* The parent or outer SELECT statement */
int iFrom, /* Index in p->pSrc->a[] of the inner subquery */
int isAgg /* True if outer SELECT uses aggregate functions */
){
const char *zSavedAuthContex... | null | CWE-476 | null | https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35 | Continue to back away from the LEFT JOIN optimization of check-in [41c27bc0ff1d3135]
by disallowing query flattening if the outer query is DISTINCT. Without this fix,
if an index scan is run on the table within the view on the right-hand side of the
LEFT JOIN, stale result registers might be accessed yielding incorrec... | null | null | 2019-12-18T20:51:58Z |
int snd_card_disconnect(struct snd_card *card)
{
struct snd_monitor_file *mfile;
if (!card)
return -EINVAL;
spin_lock(&card->files_lock);
if (card->shutdown) {
spin_unlock(&card->files_lock);
return 0;
}
card->shutdown = 1;
spin_unlock(&card->files_lock);
/* phase 1: disable fops (user space) operation... | int snd_card_disconnect(struct snd_card *card)
{
struct snd_monitor_file *mfile;
if (!card)
return -EINVAL;
spin_lock(&card->files_lock);
if (card->shutdown) {
spin_unlock(&card->files_lock);
return 0;
}
card->shutdown = 1;
spin_unlock(&card->files_lock);
/* replace file->f_op with special dummy operat... | CVE-2019-15214 | CWE-416 | An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac | ALSA: core: Fix card races between register and disconnect
There is a small race window in the card disconnection code that
allows the registration of another card with the very same card id.
This leads to a warning in procfs creation as caught by syzkaller.
The problem is that we delete snd_cards and snd_cards_lock ... | init.c | c | null |
@Override
public void tryLockAndAttack() {
super.tryLockAndAttack();
if (isAttacking() &&
(target.hasEffect(EntityEffect.NPC_ISH)
|| target.hasEffect(EntityEffect.ISH)
|| target.getHealth().hpDecreasedIn(3_000))
|| hero... | @Override
public void tryLockAndAttack() {
super.tryLockAndAttack();
if (!hasTarget()) return;
if (hero.distanceTo(target) > 1_000 || (isAttacking() && (
target.hasEffect(EntityEffect.NPC_ISH)
|| target.hasEffect(EntityEffect.ISH)
... | null | null | null | https://github.com/darkbot-reloaded/DarkBot/commit/3876b1c0f750ada2c2c35f302b717fdb30ac54fe | Update api, fix NPE on lock, beta 115 | src/main/java/com/github/manolo8/darkbot/modules/utils/AttackAPIImpl.java | java | 2022-12-24T16:00:02Z |
bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format,
int width, int height,
bool init_to_zero) {
if (!IsImageDataFormatSupported(format))
return false; // Only support this one format for now.
if (width <= 0 || height <= 0)
return false;
... | bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format,
int width, int height,
bool init_to_zero) {
if (!IsImageDataFormatSupported(format))
return false; // Only support this one format for now.
if (width <= 0 || height <= 0)
return false;
... | CVE-2012-5143 | CWE-190 | Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers. | https://github.com/chromium/chromium/commit/ad103a1564365c95f4ee4f10261f9604f91f686a | Security fix: integer overflow on checking image size
Test is left in another CL (codereview.chromiu,.org/11274036) to avoid conflict there. Hope it's fine.
BUG=160926
Review URL: https://chromiumcodereview.appspot.com/11410081
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@167882 0039d316-1c4b-4281-b951-d87... | webkit/plugins/ppapi/ppb_image_data_impl.cc | cc | 2012-11-15T07:27:55Z |
static void dump_table(char *table, char *db)
{
char ignore_flag;
char buf[200], table_buff[NAME_LEN+3];
DYNAMIC_STRING query_string;
char table_type[NAME_LEN];
char *result_table, table_buff2[NAME_LEN*2+3], *opt_quoted_table;
int error= 0;
ulong rownr, row_break, total_length, init_length;
uint... | static void dump_table(char *table, char *db)
{
char ignore_flag;
char buf[200], table_buff[NAME_LEN+3];
DYNAMIC_STRING query_string;
char table_type[NAME_LEN];
char *result_table, table_buff2[NAME_LEN*2+3], *opt_quoted_table;
int error= 0;
ulong rownr, row_break, total_length, init_length;
uint... | CVE-2017-3600 | null | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromis... | https://github.com/MariaDB/server/commit/5a43a31ee81bc181eeb5ef2bf0704befa6e0594d | mysqldump: comments and identifiers with new lines
don't let identifiers with new lines to break a comment | null | null | 2016-10-13T22:33:49Z |
bool IsConstantFoldable(
const Node* n,
const std::unordered_map<string, std::vector<PartialTensorShape>>*
shape_map,
const std::function<bool(const Node*)>& consider,
int64_t max_constant_size_in_bytes,
std::unordered_map<const Node*, std::vector<Tensor>>*
shape_replacement_map) {
... | bool IsConstantFoldable(
const Node* n,
const std::unordered_map<string, std::vector<PartialTensorShape>>*
shape_map,
const std::function<bool(const Node*)>& consider,
int64_t max_constant_size_in_bytes,
std::unordered_map<const Node*, std::vector<Tensor>>*
shape_replacement_map) {
... | CVE-2021-41204 | CWE-824 | TensorFlow is an open source platform for machine learning. In affected versions during TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change. The fix will be included in TensorFlow 2.7.0. We will als... | https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659 | Don't constant-fold DT_RESOURCE constants.
PiperOrigin-RevId: 391803952
Change-Id: I0ea3ec31d3e7dfda0f03b4027a237f08d00a3091 | constant_folding.cc | cc | 2021-08-19T18:25:32Z |
private void initialize(CustomConfigFields customConfigFields) {
//Create configuration file from defaults if it does not exist
File file = ConfigurationEngine.fileCreator(folderName, customConfigFields.getFilename());
//Get config file
FileConfiguration fileConfiguration = Configuration... | private void initialize(CustomConfigFields customConfigFields) {
//Create configuration file from defaults if it does not exist
File file = ConfigurationEngine.fileCreator(folderName, customConfigFields.getFilename());
//Get config file
FileConfiguration fileConfiguration = Configuration... | null | null | null | https://github.com/MagmaGuy/EliteMobs/commit/1ace0925399e412b9958744fe5dd8afbcbcf11d0 | EliteMobs 7.3.5-SNAPSHOT-3
- [Fix] Fixed error related to the Ground Pound power
- [Fix] Fixed error related to the Skeleton Pillar power
- [Fix] Fixed enum generation for config defaults in config files
- [Fix] Fixed crash when uninstalling world-based minidungeons
- [Fix] Schematic-based minidungeons now install corr... | src/main/java/com/magmaguy/elitemobs/config/CustomConfig.java | java | 2021-08-03T09:32:38Z |
private void handle(ServletRequestHandler pReqHandler,HttpServletRequest pReq, HttpServletResponse pResp) throws IOException {
JSONAware json = null;
try {
// Check access policy
requestHandler.checkAccess(allowDnsReverseLookup ? pReq.getRemoteHost() : null,
... | private void handle(ServletRequestHandler pReqHandler,HttpServletRequest pReq, HttpServletResponse pResp) throws IOException {
JSONAware json = null;
try {
// Check access policy
requestHandler.checkAccess(allowDnsReverseLookup ? pReq.getRemoteHost() : null,
... | CVE-2018-1000129 | CWE-79 | An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser. | https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f | fix: Verify a given 'mimeType' and/or 'callback' request parameter
So that only fixed values are possible, in order to avoid XSS attack
vectors. | AgentServlet.java | java | 2018-03-14T13:29:00Z |
@Override
public void init() {
if (this.minecraft.player == null) {
return;
}
this.render = this.itemRenderer;
// this.buttons.clear();
this.scrollList = new ScrollingBlockList((this.getWidth() / 2) - 37, this.getHeight() / 2 + 10, 203, 185, this.itemList, this);... | @Override
public void init() {
if (this.minecraft.player == null) {
return;
}
this.render = this.itemRenderer;
// this.buttons.clear();
this.scrollList = new ScrollingBlockList((this.getWidth() / 2) - 37, this.getHeight() / 2 + 10, 203, 185, this.itemList, this);... | null | null | null | https://github.com/AdvancedXRay/XRay-Fabric/commit/45218dd4536bfe70ccb329ef3759646109220ea4 | fix: crashing issues and other issues found during testing | src/main/java/pro/mikey/fabric/xray/screens/forge/GuiSelectionScreen.java | java | 2022-12-23T10:13:02Z |
@Override
public List<ITextComponent> getTooltipLines() {
List<ITextComponent> strings = new ArrayList<>();
strings.add(new StringTextComponent(TextFormatting.GOLD + new TranslationTextComponent("tooltip.titanium.tank.fluid").getString()).append(tank.getFluidInTank(tankSlot).isEmpty() ? new Translat... | @Override
public List<ITextComponent> getTooltipLines() {
List<ITextComponent> strings = new ArrayList<>();
strings.add(new StringTextComponent(TextFormatting.GOLD + new TranslationTextComponent("tooltip.titanium.tank.fluid").getString()).append(tank.getFluidInTank(tankSlot).isEmpty() ? new Translat... | null | null | null | https://github.com/InnovativeOnlineIndustries/Industrial-Foregoing/commit/4a6391d80a381ec1a808492f82a5f78e3538e4b9 | Fixed Tank GUI interaction bypassing bucket limits | src/main/java/com/buuz135/industrial/gui/component/ItemStackTankScreenAddon.java | java | 2021-05-29T20:42:17Z |
def _cliq_run(self, verb, cliq_args, check_exit_code=True):
"""Runs a CLIQ command over SSH, without doing any result parsing"""
cliq_arg_strings = []
for k, v in cliq_args.items():
cliq_arg_strings.append(" %s=%s" % (k, v))
cmd = verb + ''.join(cliq_arg_strings)
ret... | def _cliq_run(self, verb, cliq_args, check_exit_code=True):
"""Runs a CLIQ command over SSH, without doing any result parsing"""
cmd_list = [verb]
for k, v in cliq_args.items():
cmd_list.append("%s=%s" % (k, v))
return self._run_ssh(cmd_list, check_exit_code) | null | cwe-078 | null | github.com/thatsdone/cinder/commit/c55589b131828f3a595903f6796cb2d0babb772f | null | cinder/volume/drivers/san/hp_lefthand.py | py | 2013-07-18T15:05:43Z |
int ffio_ensure_seekback(AVIOContext *s, int64_t buf_size)
{
uint8_t *buffer;
int max_buffer_size = s->max_packet_size ?
s->max_packet_size : IO_BUFFER_SIZE;
int filled = s->buf_end - s->buffer;
ptrdiff_t checksum_ptr_offset = s->checksum_ptr ? s->checksum_ptr - s->buffer : -1;... | int ffio_ensure_seekback(AVIOContext *s, int64_t buf_size)
{
uint8_t *buffer;
int max_buffer_size = s->max_packet_size ?
s->max_packet_size : IO_BUFFER_SIZE;
int filled = s->buf_end - s->buffer;
ptrdiff_t checksum_ptr_offset = s->checksum_ptr ? s->checksum_ptr - s->buffer : -1;... | null | null | null | FFmpeg/commit/dc87758775e2ce8be84e4fe598e12416e83d2845 | avio: fix potential crashes when combining ffio_ensure_seekback + crc
Calling ffio_ensure_seekback() if ffio_init_checksum() has been called
on the same context can lead to out of bounds memory accesses and
crashes. The reason is that ffio_ensure_seekback() does not update
checksum_ptr after reallocating the buffer, r... | ./ffmpeg/libavformat/aviobuf.c | c | 2015-06-16T22:21:02Z |
@Modified
protected void modified(@Nullable Map<String, Object> properties) {
if (properties != null) {
Object value = properties.get(CONFIG_ALLOW_BASIC_AUTH);
allowBasicAuth = value != null && "true".equals(value.toString());
value = properties.get(CONFIG_IMPLICIT_USER_R... | @Modified
protected void modified(@Nullable Map<String, Object> properties) {
if (properties != null) {
allowBasicAuth = ConfigParser.valueAsOrElse(properties.get(CONFIG_ALLOW_BASIC_AUTH), Boolean.class, false);
implicitUserRole = ConfigParser.valueAsOrElse(properties.get(CONFIG_IMPL... | null | null | null | https://github.com/openhab/openhab-core/commit/ef3b13fce892e1092e295b8f82fa77e45d166924 | [auth] grant implicit user role by network address (#3106)
* [auth] grant implicit user role by network
Signed-off-by: Miguel Álvarez <miguelwork92@gmail.com> | bundles/org.openhab.core.io.rest.auth/src/main/java/org/openhab/core/io/rest/auth/internal/AuthFilter.java | java | 2022-10-13T06:09:23Z |
export function add_attribute(name, value, boolean) {
if (value == null || (boolean && !value)) return '';
const assignment = (boolean && value === true) ? '' : `="${escape_attribute_value(value.toString())}"`;
return ` ${name}${assignment}`;
} | export function add_attribute(name, value, boolean) {
if (value == null || (boolean && !value)) return '';
const assignment = (boolean && value === true) ? '' : `="${escape(value, true)}"`;
return ` ${name}${assignment}`;
} | CVE-2022-25875 | CWE-79 | The package svelte before 3.49.0 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function. | https://github.com/sveltejs/svelte/commit/f8605d6acbf66976da9b4547f76e90e163899907 | [fix] harden attribute escaping during ssr (#7530) | ssr.ts | ts | 2022-07-12T19:15:00Z |
int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info)
{
bool pr = false;
u32 msr = msr_info->index;
u64 data = msr_info->data;
switch (msr) {
case MSR_AMD64_NB_CFG:
case MSR_IA32_UCODE_REV:
case MSR_IA32_UCODE_WRITE:
case MSR_VM_HSAVE_PA:
case MSR_AMD64_PATCH_LOADER:
case MSR_AMD64_BU_CFG2... | int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info)
{
bool pr = false;
u32 msr = msr_info->index;
u64 data = msr_info->data;
switch (msr) {
case MSR_AMD64_NB_CFG:
case MSR_IA32_UCODE_REV:
case MSR_IA32_UCODE_WRITE:
case MSR_VM_HSAVE_PA:
case MSR_AMD64_PATCH_LOADER:
case MSR_AMD64_BU_CFG2... | CVE-2013-1797 | CWE-399 | Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memo... | https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1 | KVM: x86: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache functions (CVE-2013-1797)
There is a potential use after free issue with the handling of
MSR_KVM_SYSTEM_TIME. If the guest specifies a GPA in a movable or removable
memory such as frame buffers then KVM might continue to write to that
address even after it... | x86.c | c | 2013-03-22T11:59:00Z |
@SubscribeEvent
public void renderEnd(RenderTickEvent event) {
if (event.phase == Phase.END)
for (LittleLevelEntity animation : entities)
animation.getRenderManager().isInSight = null;
} | @SubscribeEvent
public void renderEnd(RenderTickEvent event) {
if (event.phase == Phase.END)
for (LittleLevelEntity animation : entities)
if (animation.hasLoaded())
animation.getRenderManager().isInSight = null;
} | null | null | null | https://github.com/CreativeMD/LittleTiles/commit/b3a2d78ead1f17396aa5a534a3138e38095483ef | Made as() in ServerChunkCacheMixin private @unique | src/main/java/team/creative/littletiles/client/level/LittleAnimationHandlerClient.java | java | 2022-11-28T17:25:44Z |
boolean processBinaryPackets(ByteBuffer applicationData) {
boolean requiresWriteOperation = false;
boolean hasMessage = false;
try {
while (isConnected()
&& ((expectPacket && (applicationData.remaining() > incomingCipherLength)) || (expectedBytes > 0 && applicationData
.hasRemaining())) && !requ... | boolean processBinaryPackets(ByteBuffer applicationData) {
boolean requiresWriteOperation = false;
boolean hasMessage = false;
try {
while (isConnected()
&& ((expectPacket && (applicationData.remaining() > incomingCipherLength)) || (expectedBytes > 0 && applicationData
.hasRemaining())) && !requ... | null | null | null | https://github.com/sshtools/maverick-synergy/commit/697f68b34499cee169b50957a3fd2af86dbde6ad | HOTFIX: Use remote address in logs. Fix for callback ConnectionManager OOM. | maverick-synergy-common/src/main/java/com/sshtools/synergy/ssh/TransportProtocol.java | java | 2021-12-01T14:04:13Z |
@Override
public void handle(Data data) {
OkHttpClient client = new OkHttpClient.Builder().build();
try {
Response request = client.newCall(
new Request.Builder()
.url("https://authserver.mojang.com/authenticate")
... | @Override
public void handle(Data data) {
OkHttpClient client = new OkHttpClient.Builder().build();
try {
Response request = client.newCall(
new Request.Builder()
.url("https://authserver.mojang.com/authenticate")
... | null | null | null | https://github.com/FTBTeam/FTB-App/commit/c52e11dc88332a9b61a2890e889f949bd4bd2a4d | fix: Mojang auth clientToken, resolved issue with refresh check | subprocess/src/main/java/net/creeperhost/creeperlauncher/api/handlers/profiles/AuthenticateMcProfileHandler.java | java | 2021-12-11T19:01:46Z |
public static Event getInstance(Runnable runnable) {
RunnableEvent instance = recycled.pop();
if (instance == null) {
instance = new RunnableEvent();
}
instance.runnable = runnable;
return instance;
} | public static Event getInstance(Runnable runnable) {
RunnableEvent instance = recycled.pop();
if (instance == null) {
instance = new RunnableEvent();
if (++instances > 100 && EventQueue.isImmediate()) {
EventQueue.setImmediate(false);
ViewHandler.postEvent(() ->
Toast.makeText(ContextHolder.get... | null | null | null | https://github.com/nikita36078/J2ME-Loader/commit/f78c98c8a5cb9639d18e026e476a387ca4c2014e | Disable immediate mode when RunnableEvent instance > 100 (workaround for StackOverFlow issue) | app/src/main/java/javax/microedition/lcdui/event/RunnableEvent.java | java | 2021-08-16T12:54:34Z |
@Override
public void onPlayerCollide(final Player player)
{
final IJob<?> job = getCitizenData().getJob();
if (job == null || !job.isGuard())
{
super.onPlayerCollide(player);
}
else
{
// guards push the player out of their way
... | @Override
public void onPlayerCollide(final Player player)
{
if (getCitizenData() == null)
{
super.onPlayerCollide(player);
return;
}
final IJob<?> job = getCitizenData().getJob();
if (job == null || !job.isGuard())
{
s... | null | null | null | https://github.com/ldtteam/minecolonies/commit/8f4a7812b4a1426553c4d666c89fb434517c4773 | new visitor and slight rework of loading (#8296)
Adds new Visitor Tobi
Queries the name off-thread as its very slow. Also avoids calling that too often if the player is offline or similar.
Properly use a player type model to display arms and legs correctly (and not just a mirror texture).
Jump of mount on unstuck
Fix ... | src/api/java/com/minecolonies/api/entity/citizen/AbstractEntityCitizen.java | java | 2022-04-28T23:14:57Z |
ast_type_reduce(PyObject *self, PyObject *unused)
{
PyObject *res;
_Py_IDENTIFIER(__dict__);
PyObject *dict = _PyObject_GetAttrId(self, &PyId___dict__);
if (dict == NULL) {
if (PyErr_ExceptionMatches(PyExc_AttributeError))
PyErr_Clear();
else
return NULL;
}
... | ast_type_reduce(PyObject *self, PyObject *unused)
{
_Py_IDENTIFIER(__dict__);
PyObject *dict;
if (lookup_attr_id(self, &PyId___dict__, &dict) < 0) {
return NULL;
}
if (dict) {
return Py_BuildValue("O()N", Py_TYPE(self), dict);
}
return Py_BuildValue("O()", Py_TYPE(self));
} | CVE-2019-19274 | CWE-125 | typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does ... | https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce | Fully incorporate the code from Python 3.7.2 (#78)
This is a full port, following the recipe in update_process.md. I've also tried to keep the recipe up to date and improved the automation (see tools/script). I haven't cleaned up the commits. As of #77 there are a few tests that sanity-check this (though it's far from... | parsetok.c | c | 2019-11-26T15:15:00Z |
static PCIDevice *do_pci_register_device(PCIDevice *pci_dev, PCIBus *bus,
const char *name, int devfn)
{
PCIDeviceClass *pc = PCI_DEVICE_GET_CLASS(pci_dev);
PCIConfigReadFunc *config_read = pc->config_read;
PCIConfigWriteFunc *config_write = pc->config_write;
Add... | static PCIDevice *do_pci_register_device(PCIDevice *pci_dev, PCIBus *bus,
const char *name, int devfn)
{
PCIDeviceClass *pc = PCI_DEVICE_GET_CLASS(pci_dev);
PCIConfigReadFunc *config_read = pc->config_read;
PCIConfigWriteFunc *config_write = pc->config_write;
Add... | null | null | null | qemu/commit/306077640a652e090779498aadbeb0c605feaacd | hw/pci: fix error flow in pci multifunction init
Scenario:
- There is a non multifunction pci device A on 00:0X.0.
- Hot-plug another multifunction pci device B at 00:0X.1.
- The operation will fail of course.
- Try to hot-plug the B device 2-3 more times, qemu will crash.
Reason: The error flow leaves the B'... | ./qemu/hw/pci/pci.c | c | 2014-01-21T16:37:51Z |
static GF_Err ttml_embed_data(GF_XMLNode *node, u8 *aux_data, u32 aux_data_size, u8 *subs_data, u32 subs_data_size)
{
u32 i=0;
GF_XMLNode *child;
u32 subs_idx=0;
GF_XMLAttribute *att;
Bool is_source = GF_FALSE;
Bool has_src_att = GF_FALSE;
if (!node || node->type) return GF_BAD_PARAM;
if (!strcmp(node->name, "... | static GF_Err ttml_embed_data(GF_XMLNode *node, u8 *aux_data, u32 aux_data_size, u8 *subs_data, u32 subs_data_size)
{
u32 i=0;
GF_XMLNode *child;
u32 subs_idx=0;
GF_XMLAttribute *att;
Bool is_source = GF_FALSE;
Bool has_src_att = GF_FALSE;
if (!node || node->type) return GF_BAD_PARAM;
if (!strcmp(node->name, "... | null | null | null | https://github.com/gpac/gpac/commit/ea1eca00fd92fa17f0e25ac25652622924a9a6a0 | fixed #2138 | src/filters/write_generic.c | c | 2022-03-10T14:43:11Z |
static av_cold int encode_init(AVCodecContext* avc_context)
{
theora_info t_info;
theora_comment t_comment;
ogg_packet o_packet;
unsigned int offset;
TheoraContext *h = avc_context->priv_data;
theora_info_init( &t_info );
t_info.width = FFALIGN(avc_context->width, 16);
t_info.height... | static av_cold int encode_init(AVCodecContext* avc_context)
{
theora_info t_info;
theora_comment t_comment;
ogg_packet o_packet;
unsigned int offset;
TheoraContext *h = avc_context->priv_data;
theora_info_init( &t_info );
t_info.width = FFALIGN(avc_context->width, 16);
t_info.height... | null | null | null | FFmpeg/commit/870ee6f71579f2f3f20dee93d6246d12871c280d | Fix memory leak in libtheora encoder
Patch by Art Clarke [aclark , xuggle . com]
Originally committed as revision 19423 to svn://svn.ffmpeg.org/ffmpeg/trunk | ./ffmpeg/libavcodec/libtheoraenc.c | c | 2009-07-13T01:59:45Z |
@Override
public boolean canSubmit(TeamData teamData, ServerPlayer player) {
return ((ServerLevel) player.level).structureFeatureManager().getStructureWithPieceAt(player.blockPosition(), structure).isValid();
} | @Override
public boolean canSubmit(TeamData teamData, ServerPlayer player) {
ServerLevel level = (ServerLevel) player.level;
return structure.map(
key -> level.structureFeatureManager().getStructureWithPieceAt(player.blockPosition(), key).isValid(),
tag -> {
var reg = level.registryAccess().registry(R... | null | null | null | https://github.com/FTBTeam/FTB-Quests/commit/47f753a018dd537f4051b08324f097f8741f2cf2 | feat: support structure tags in StructureTask
To use, prefix the structure with "#" as normal
- also fixes crashing on bad resource locations
https://github.com/FTBTeam/FTB-Mods-Issues/issues/491 | common/src/main/java/dev/ftb/mods/ftbquests/quest/task/StructureTask.java | java | 2022-10-11T09:38:46Z |
static void unzzip_cat_file(FILE* disk, char* name, FILE* out)
{
ZZIP_ENTRY_FILE* file = zzip_entry_ffile (disk, name);
if (file)
{
char buffer[1024]; int len;
while ((len = zzip_entry_fread (buffer, 1024, 1, file)))
fwrite (buffer, len, 1, out);
zzip_entry_fclose (file);
}
} | static void unzzip_cat_file(FILE* disk, char* name, FILE* out)
{
ZZIP_ENTRY_FILE* file = zzip_entry_ffile (disk, name);
if (file)
{
char buffer[1024]; int len;
while (0 < (len = zzip_entry_fread (buffer, 1024, 1, file)))
fwrite (buffer, len, 1, out);
zzip_entry_fclose (file);
}
} | null | null | null | https://github.com/gdraheim/zziplib/commit/d453977f59ca59c61bf59dec28dd724498828f2a | #68 return value of zzip_entry_fread is signed | bins/unzzipcat-big.c | c | 2021-01-04T20:51:12Z |
static void extract_arg(RAnal *anal, RAnalFunction *fcn, RAnalOp *op, const char *reg, const char *sign, char type) {
st64 ptr = 0;
char *addr, *esil_buf = NULL;
const st64 maxstackframe = 1024 * 8;
r_return_if_fail (anal && fcn && op && reg);
size_t i;
for (i = 0; i < R_ARRAY_SIZE (op->src); i++) {
if (op->... | static void extract_arg(RAnal *anal, RAnalFunction *fcn, RAnalOp *op, const char *reg, const char *sign, char type) {
st64 ptr = 0;
char *addr, *esil_buf = NULL;
const st64 maxstackframe = 1024 * 8;
r_return_if_fail (anal && fcn && op && reg);
size_t i;
for (i = 0; i < R_ARRAY_SIZE (op->src); i++) {
if (op->... | CVE-2022-1031 | CWE-416 | Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6. | https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb | Fix UAF in aaaa on arm/thumb switching ##crash
* Reported by @peacock-doris via huntr.dev
* Reproducer tests_65185
* This is a logic fix, but not the fully safe as changes in the code
can result on UAF again, to properly protect r2 from crashing we
need to break the ABI and add refcounting to RRegItem, which can't... | null | null | 2022-03-21T16:48:44Z |
getcmdline_int(
int firstc,
long count UNUSED, // only used for incremental search
int indent, // indent for inside conditionals
int clear_ccline) // clear ccline first
{
static int depth = 0; // call depth
int c;
int i;
int j;
int gotesc = FALSE; // TRUE when <ESC> just... | getcmdline_int(
int firstc,
long count UNUSED, // only used for incremental search
int indent, // indent for inside conditionals
int clear_ccline) // clear ccline first
{
static int depth = 0; // call depth
int c;
int i;
int j;
int gotesc = FALSE; // TRUE when <ESC> just... | CVE-2022-3235 | CWE-416 | Use After Free in GitHub repository vim/vim prior to 9.0.0490. | https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0 | patch 9.0.0490: using freed memory with cmdwin and BufEnter autocmd
Problem: Using freed memory with cmdwin and BufEnter autocmd.
Solution: Make sure pointer to b_p_iminsert is still valid. | ex_getln.c | c | 2022-09-17T18:43:23Z |
static int check_resource_valid(struct vrend_renderer_resource_create_args *args)
{
/* do not accept handle 0 */
if (args->handle == 0)
return -1;
/* limit the target */
if (args->target >= PIPE_MAX_TEXTURE_TYPES)
return -1;
if (args->format >= VIRGL_FORMAT_MAX)
return -1;
/* only... | static int check_resource_valid(struct vrend_renderer_resource_create_args *args)
{
/* do not accept handle 0 */
if (args->handle == 0)
return -1;
/* limit the target */
if (args->target >= PIPE_MAX_TEXTURE_TYPES)
return -1;
if (args->format >= VIRGL_FORMAT_MAX)
return -1;
bool for... | CVE-2019-18388 | CWE-476 | A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands. | https://gitlab.freedesktop.org/virgl/virglrenderer/commit/0d9a2c88dc3a70023541b3260b9f00c982abda16 | vrend: Check resource creation more thoroughly
While we are at it:
- free memory if texture allocation fails
Closes #144
Closes #145
Closes #146
v2: Move the error string creation to extra patch (Emil)
v3: Fix whitespace errors (Emil) and one logic error
Signed-off-by: Gert Wollny <gert.wollny@collabora.com>
Revi... | null | null | 2019-10-10T07:42:25Z |
do_parse_uri (parsed_uri_t uri, int only_local_part,
int no_scheme_check, int force_tls)
{
uri_tuple_t *tail;
char *p, *p2, *p3, *pp;
int n;
p = uri->buffer;
n = strlen (uri->buffer);
/* Initialize all fields to an empty string or an empty list. */
uri->scheme = uri->host = uri->path = p +... | do_parse_uri (parsed_uri_t uri, int only_local_part,
int no_scheme_check, int force_tls)
{
uri_tuple_t *tail;
char *p, *p2, *p3, *pp;
int n;
p = uri->buffer;
n = strlen (uri->buffer);
/* Initialize all fields to an empty string or an empty list. */
uri->scheme = uri->host = uri->path = p +... | CVE-2018-1000858 | CWE-352 | GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigm... | https://github.com/gpg/gnupg/commit/4a4bb874f63741026bd26264c43bb32b1099f060 | dirmngr: Avoid possible CSRF attacks via http redirects.
* dirmngr/http.h (parsed_uri_s): Add fields off_host and off_path.
(http_redir_info_t): New.
* dirmngr/http.c (do_parse_uri): Set new fields.
(same_host_p): New.
(http_prepare_redirect): New.
* dirmngr/t-http-basic.c: New test.
* dirmngr/ks-engine-hkp.c (send_re... | null | null | 2018-11-22T21:27:56Z |
static Image *ReadRGFImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
register IndexPacket
*indexes;
register PixelPacket
*q;
register ssize_t
i,
x;
register unsigned char
*p;
size_t
bit,
byte;
ssize_t
y;... | static Image *ReadRGFImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
register IndexPacket
*indexes;
register PixelPacket
*q;
register ssize_t
i,
x;
register unsigned char
*p;
size_t
bit,
byte;
ssize_t
y;... | CVE-2016-10066 | CWE-120 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | null | coders/rgf.c | c | null |
GF_Err gf_sm_load_init(GF_SceneLoader *load)
{
GF_Err e = GF_NOT_SUPPORTED;
char *ext, szExt[50];
/*we need at least a scene graph*/
if (!load || (!load->ctx && !load->scene_graph)
#ifndef GPAC_DISABLE_ISOM
|| (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) )
#endif
) return... | GF_Err gf_sm_load_init(GF_SceneLoader *load)
{
GF_Err e = GF_NOT_SUPPORTED;
char *ext, szExt[50];
/*we need at least a scene graph*/
if (!load || (!load->ctx && !load->scene_graph)
#ifndef GPAC_DISABLE_ISOM
|| (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) )
#endif
) return... | CVE-2018-20761 | CWE-119 | GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. | https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 | fix some overflows due to strcpy
fixes #1184, #1186, #1187 among other things | scene_manager.c | c | 2019-01-11T10:32:54Z |
public void updateUVs() {
BufferedImage atlasImage = texture.getAtlas().getImage();
int
textureX = texture.getX(),
textureY = texture.getY(),
textureWidth = texture.getWidth(),
textureHeight = texture.getHeight(),
atlasWidth... | public void updateUVs() {
if (texture != null) {
BufferedImage atlasImage = texture.getAtlas().getImage();
int
textureX = texture.getX(),
textureY = texture.getY(),
textureWidth = texture.getWidth(),
textureH... | null | null | null | https://github.com/ModificationStation/StationAPI/commit/2eb940e6cb777415a097fc565fd38e904fb9a442 | Refactored PR #15 | station-render-api-v0/src/main/java/net/modificationstation/stationapi/impl/client/model/JsonFaceData.java | java | 2021-09-18T22:09:51Z |
static int dv_read_seek(AVFormatContext *s, int stream_index,
int64_t timestamp, int flags)
{
RawDVContext *r = s->priv_data;
DVDemuxContext *c = r->dv_demux;
int64_t offset = dv_frame_offset(s, c, timestamp, flags);
dv_offset_reset(c, offset / c->sys->frame_size);
offset... | static int dv_read_seek(AVFormatContext *s, int stream_index,
int64_t timestamp, int flags)
{
RawDVContext *r = s->priv_data;
DVDemuxContext *c = r->dv_demux;
int64_t offset = dv_frame_offset(s, c, timestamp, flags);
if (avio_seek(s->pb, offset, SEEK_SET) < 0)
return ... | null | null | null | FFmpeg/commit/8332321c5737cf24ebad504bf10a03818424718d | dv: Check return value of avio_seek and avoid modifying state if it fails
Signed-off-by: Paul B Mahol <onemda@gmail.com>
Signed-off-by: Justin Ruggles <justin.ruggles@gmail.com> | ./ffmpeg/libavformat/dv.c | c | 2012-02-03T19:13:36Z |
DelChar(NCURSES_SP_DCLx int count)
{
TR(TRACE_UPDATE, ("DelChar(%p, %d) called, position = (%ld,%ld)",
(void *) SP_PARM, count,
(long) NewScreen(SP_PARM)->_cury,
(long) NewScreen(SP_PARM)->_curx));
if (parm_dch) {
TPUTS_TRACE("parm_dch");
NCURSES_SP_NAME(tputs) (NCURSES_SP_ARGx
TP... | DelChar(NCURSES_SP_DCLx int count)
{
TR(TRACE_UPDATE, ("DelChar(%p, %d) called, position = (%ld,%ld)",
(void *) SP_PARM, count,
(long) NewScreen(SP_PARM)->_cury,
(long) NewScreen(SP_PARM)->_curx));
if (parm_dch) {
TPUTS_TRACE("parm_dch");
NCURSES_SP_NAME(tputs) (NCURSES_SP_ARGx
TI... | null | null | null | null | ncurses 6.2 - patch 20200531
+ correct configure version-check/warnng for g++ to allow for 10.x
+ re-enable "bel" in konsole-base (report by Nia Huang)
+ add linux-s entry (patch by Alexandre Montaron).
+ drop long-obsolete convert_configure.pl
+ add test/test_parm.c, for checking tparm changes.
+ improve parameter-ch... | null | null | null |
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
const TfLiteTensor* input = GetInput(context, node, kInputTensor);
TfLiteTensor* output = GetOutput(context, node, kOutputTensor);
switch (input->type) {
case kTfLiteInt64:
reference_ops::Negate(
GetTensorShape(input), GetTensorData... | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
const TfLiteTensor* input;
TF_LITE_ENSURE_OK(context, GetInputSafe(context, node, kInputTensor, &input));
TfLiteTensor* output;
TF_LITE_ENSURE_OK(context,
GetOutputSafe(context, node, kOutputTensor, &output));
switch (input->typ... | CVE-2020-15211 | CWE-125,CWE-787 | In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, inde... | https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35 | [tflite]: Insert `nullptr` checks when obtaining tensors.
As part of ongoing refactoring, `tflite::GetInput`, `tflite::GetOutput`, `tflite::GetTemporary` and `tflite::GetIntermediates` will return `nullptr` in some cases. Hence, we insert the `nullptr` checks on all usages.
We also insert `nullptr` checks on usages o... | add_n.cc | cc | 2020-09-25T19:15:00Z |
@Override
public List<Long> retrieveSavingsIdsPendingEscheat(LocalDate tenantLocalDate) {
List<Long> ret = null;
StringBuilder sql = new StringBuilder("select sa.id ");
sql.append(" from m_savings_account as sa ");
sql.append(" inner join m_savings_product as sp on (sa.product_id = s... | @Override
public List<Long> retrieveSavingsIdsPendingEscheat(LocalDate tenantLocalDate) {
List<Long> ret = null;
StringBuilder sql = new StringBuilder("select sa.id ");
sql.append(" from m_savings_account as sa ");
sql.append(" inner join m_savings_product as sp on (sa.product_id = s... | null | null | null | https://github.com/apache/fineract/commit/a80f589ad4ad91a7b1c8abbd864e6a5129e8e2cf | fineract-1646 and fineract-1638 combined fix (#2457)
authored-by: Dhaval Maniyar <dhavalmaniyar@Dhavals-MacBook-Pro.local> | fineract-provider/src/main/java/org/apache/fineract/portfolio/savings/service/SavingsAccountReadPlatformServiceImpl.java | java | 2022-07-28T08:30:15Z |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.