func_before stringlengths 10 482k | func_after stringlengths 14 484k | cve_id stringlengths 13 28 ⌀ | cwe_id stringclasses 776
values | cve_description stringlengths 30 3.31k ⌀ | commit_link stringlengths 48 164 ⌀ | commit_message stringlengths 1 30.3k ⌀ | file_name stringlengths 4 244 ⌀ | extension stringclasses 20
values | datetime stringdate 1999-11-10 02:42:49 2024-01-29 16:00:57 ⌀ |
|---|---|---|---|---|---|---|---|---|---|
init: function() {
// Load saved config
var _self = this,
fields = [
'html', 'xhtmlOut', 'breaks', 'langPrefix', 'linkify', 'typographer'
],
defaults = {
'html': false,
'xhtmlOut': true,
'breaks': true,
'langPrefix': 'language-',
'linkify': true,
'typogra... | init: function() {
// Load saved config
var _self = this,
fields = [
'html', 'xhtmlOut', 'breaks', 'langPrefix', 'linkify', 'typographer'
],
defaults = {
'html': false,
'xhtmlOut': true,
'breaks': true,
'langPrefix': 'language-',
'linkify': true,
'typogra... | CVE-2015-3296 | CWE-79 | Multiple cross-site scripting (XSS) vulnerabilities in NodeBB before 0.7 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) javascript: or (2) data: URLs. | https://github.com/julianlam/nodebb-plugin-markdown/commit/ab7f2684750882f7baefbfa31db8d5aac71e6ec3 | updated plugin to use markdown-it instead of remarkable, and updated validateLink method to discard all data-uris, until a solution is developed upstream. | index.js | js | 2017-09-21T14:29:00Z |
void Display::startAuth(const QString &user, const QString &password, const Session &session) {
m_passPhrase = password;
// sanity check
if (!session.isValid()) {
qCritical() << "Invalid session" << session.fileName();
return;
}
if (session.xdgSessionType... | void Display::startAuth(const QString &user, const QString &password, const Session &session) {
m_passPhrase = password;
// sanity check
if (!session.isValid()) {
qCritical() << "Invalid session" << session.fileName();
return;
}
if (session.xdgSessionType... | CVE-2018-14345 | CWE-284 | An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp. | https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 | Fix authentication when reusing an existing session
- Check the success value before unlocking the session
- Don't attempt to use the nonexistant "sddm-check" PAM service | Display.cpp | cpp | 2018-07-11T17:45:40Z |
func NewReader(src io.Reader, size int64, md5Hex, sha256Hex string) (*Reader, error) {
if _, ok := src.(*Reader); ok {
return nil, errNestedReader
}
sha256sum, err := hex.DecodeString(sha256Hex)
if err != nil {
return nil, SHA256Mismatch{}
}
md5sum, err := hex.DecodeString(md5Hex)
if err != nil {
return ... | func NewReader(src io.Reader, size int64, md5Hex, sha256Hex string) (*Reader, error) {
if _, ok := src.(*Reader); ok {
return nil, errNestedReader
}
sha256sum, err := hex.DecodeString(sha256Hex)
if err != nil {
return nil, SHA256Mismatch{}
}
md5sum, err := hex.DecodeString(md5Hex)
if err != nil {
return ... | CVE-2018-1000538 | CWE-774 | Minio Inc. Minio S3 server version prior to RELEASE.2018-05-16T23-35-33Z contains a Allocation of Memory Without Limits or Throttling (similar to CWE-774) vulnerability in write-to-RAM that can result in Denial of Service. This attack appear to be exploitable via Sending V4-(pre)signed requests with large bodies . This... | https://github.com/minio/minio/commit/9c8b7306f55f2c8c0a5c7cea9a8db9d34be8faa7 | security: fix write-to-RAM DoS vulnerability (#5957)
This commit fixes a DoS vulnerability for certain APIs using
signature V4 by verifying the content-md5 and/or content-sha56 of
the request body in a streaming mode.
The issue was caused by reading the entire body of the request into
memory to verify the content-md5... | auth-handler.go | go | 2018-06-26T16:29:00Z |
static uint64_t get_vb(ByteIOContext *bc){
uint64_t val=0;
int i= get_v(bc);
if(i>8)
return UINT64_MAX;
while(i--)
val = (val<<8) + get_byte(bc);
return val;
} | static uint64_t get_vb(ByteIOContext *bc){
uint64_t val=0;
unsigned int i= get_v(bc);
if(i>8)
return UINT64_MAX;
while(i--)
val = (val<<8) + get_byte(bc);
return val;
} | null | null | null | FFmpeg/commit/568e18b15e2ddf494fd8926707d34ca08c8edce5 | integer overflows, heap corruption
possible arbitrary code execution cannot be ruled out in some cases
precautionary checks
Originally committed as revision 3813 to svn://svn.ffmpeg.org/ffmpeg/trunk | ./ffmpeg/libavformat/nut.c | c | 2005-01-08T14:21:33Z |
function PMA_TRI_getRowForList($trigger, $rowclass = '')
{
global $ajax_class, $url_query, $db, $table, $titles;
$retval = " <tr class='noclick $rowclass'>\n";
$retval .= " <td>\n";
$retval .= " <span class='drop_sql hide'>"
. htmlspecialchars($trigger['drop'])... | function PMA_TRI_getRowForList($trigger, $rowclass = '')
{
global $ajax_class, $url_query, $db, $table, $titles;
$retval = " <tr class='noclick $rowclass'>\n";
$retval .= " <td>\n";
$retval .= " <span class='drop_sql hide'>"
. htmlspecialchars($trigger['drop'])... | CVE-2014-4955 | CWE-79 | Cross-site scripting (XSS) vulnerability in the PMA_TRI_getRowForList function in libraries/rte/rte_list.lib.php in phpMyAdmin 4.0.x before 4.0.10.1, 4.1.x before 4.1.14.2, and 4.2.x before 4.2.6 allows remote authenticated users to inject arbitrary web script or HTML via a crafted trigger name that is improperly handl... | https://github.com/phpmyadmin/phpmyadmin/commit/10014d4dc596b9e3a491bf04f3e708cf1887d5e1 | bug #4488 [security] XSS injection due to unescaped table name (triggers)
Signed-off-by: Marc Delisle <marc@infomarc.info> | rte_list.lib.php | php | 2014-07-20T11:12:00Z |
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
const TfLitePackParams* data =
reinterpret_cast<TfLitePackParams*>(node->builtin_data);
TfLiteTensor* output = GetOutput(context, node, kOutputTensor);
switch (output->type) {
case kTfLiteFloat32: {
return PackImpl<float>(context, node... | TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) {
const TfLitePackParams* data =
reinterpret_cast<TfLitePackParams*>(node->builtin_data);
TfLiteTensor* output;
TF_LITE_ENSURE_OK(context,
GetOutputSafe(context, node, kOutputTensor, &output));
switch (output->type) {
cas... | CVE-2020-15211 | CWE-125,CWE-787 | In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, inde... | https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35 | [tflite]: Insert `nullptr` checks when obtaining tensors.
As part of ongoing refactoring, `tflite::GetInput`, `tflite::GetOutput`, `tflite::GetTemporary` and `tflite::GetIntermediates` will return `nullptr` in some cases. Hence, we insert the `nullptr` checks on all usages.
We also insert `nullptr` checks on usages o... | add_n.cc | cc | 2020-09-25T19:15:00Z |
poly_in(PG_FUNCTION_ARGS)
{
char *str = PG_GETARG_CSTRING(0);
POLYGON *poly;
int npts;
int size;
int isopen;
char *s;
if ((npts = pair_count(str, ',')) <= 0)
ereport(ERROR,
(errcode(ERRCODE_INVALID_TEXT_REPRESENTATION),
errmsg("invalid input syntax for type polygon: \"%s\"", str)));
... | poly_in(PG_FUNCTION_ARGS)
{
char *str = PG_GETARG_CSTRING(0);
POLYGON *poly;
int npts;
int size;
int base_size;
int isopen;
char *s;
if ((npts = pair_count(str, ',')) <= 0)
ereport(ERROR,
(errcode(ERRCODE_INVALID_TEXT_REPRESENTATION),
errmsg("invalid input syntax for type polygon: \... | CVE-2014-0064 | CWE-189 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | txid.c | c | 2014-02-17T14:33:31Z |
public void encodeHeadersAndProperties(final ByteBuf buffer) {
final TypedProperties properties = getProperties();
messageIDPosition = buffer.writerIndex();
buffer.writeLong(messageID);
SimpleString.writeNullableSimpleString(buffer, address);
if (userID == null) {
buffer.writeByte... | public void encodeHeadersAndProperties(final ByteBuf buffer) {
final TypedProperties properties = getProperties();
final int initialWriterIndex = buffer.writerIndex();
messageIDPosition = initialWriterIndex;
final UUID userID = this.userID;
final int userIDEncodedSize = userID == null ? By... | null | null | null | https://github.com/apache/activemq-artemis/commit/ad4f6a133af9130f206a78e43ad387d4e3ee5f8f | ARTEMIS-3021 OOM due to wrong CORE clustered message memory estimation | artemis-core-client/src/main/java/org/apache/activemq/artemis/core/message/impl/CoreMessage.java | java | 2020-12-05T23:07:29Z |
int libsoc_pwm_get_polarity(pwm *pwm)
{
int polarity;
char path[STR_BUF];
char tmp_str[1];
if (pwm == NULL)
{
libsoc_pwm_debug(__func__, -1, -1, "invalid pwm pointer");
return EXIT_FAILURE;
}
sprintf(path, "/sys/class/pwm/pwmchip%d/pwm%d/polarity", pwm->chip, pwm->pwm);
if (file_read_str(path... | int libsoc_pwm_get_polarity(pwm *pwm)
{
int polarity;
char path[STR_BUF];
char tmp_str[1];
if (pwm == NULL)
{
libsoc_pwm_debug(__func__, -1, -1, "invalid pwm pointer");
return EXIT_FAILURE;
}
sprintf(path, "/sys/class/pwm/pwmchip%d/pwm%d/polarity", pwm->chip, pwm->pwm);
if (file_read_str(path... | null | cwe-119 | null | github.com/jackmitch/libsoc/commit/f4e262dd1de930388f22b779b8ab13d5b89db31e | pwm: fix subscription error
tmp_str array has a size of 1, so tmp_str[1] access is out of range.
Besides file_read_str() reads only one byte and strncmp() compares only
one byte too.
Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com> | pwm.c | c | 2014-01-26T10:19:05Z |
static void unzzip_cat_file(ZZIP_DIR* disk, char* name, FILE* out)
{
ZZIP_FILE* file = zzip_fopen(name, "rb");
if (file)
{
char buffer[1024]; int len;
while ((len = zzip_fread (buffer, 1, 1024, file)))
{
fwrite (buffer, 1, len, out);
}
zzip_fclose (file);
}
} | static void unzzip_cat_file(ZZIP_DIR* disk, char* name, FILE* out)
{
ZZIP_FILE* file = zzip_fopen(name, "rb");
if (file)
{
char buffer[1024]; int len;
while (0 < (len = zzip_fread (buffer, 1, 1024, file)))
{
fwrite (buffer, 1, len, out);
}
zzip_fclose (file);
}
} | null | null | null | https://github.com/gdraheim/zziplib/commit/a34a96fbda1e58fbec5c79f4c0b5063e031ce11d | #68 return value of zzip_fread is signed | bins/unzzipcat-mix.c | c | 2021-01-04T20:52:47Z |
static void gen_spr_74xx (CPUPPCState *env)
{
spr_register(env, SPR_PIR, "PIR",
SPR_NOACCESS, SPR_NOACCESS,
&spr_read_generic, &spr_write_pir,
0x00000000);
spr_register(env, SPR_MMCR2, "MMCR2",
SPR_NOACCESS, SPR_NOACCESS,
... | static void gen_spr_74xx (CPUPPCState *env)
{
spr_register(env, SPR_PIR, "PIR",
SPR_NOACCESS, SPR_NOACCESS,
&spr_read_generic, &spr_write_pir,
0x00000000);
spr_register(env, SPR_MMCR2, "MMCR2",
SPR_NOACCESS, SPR_NOACCESS,
... | null | null | null | qemu/commit/9633fcc6a02f23e3ef00aa5fe3fe9c41f57c3456 | PPC: Fix L2CR write accesses
Commit 2345f1c01 was supposed to render L2CR writes into noops. Instead,
it made them illegal instruction traps which apparently didn't confuse
XNU, but can easily confuse other OSs.
Fix it up by actually doing nothing when we write to L2CR.
Reported-by: Julio Guerra <guerr@julio.in>
Sig... | ./qemu/target-ppc/translate_init.c | c | 2013-09-25T13:41:12Z |
server_client_create(int fd)
{
struct client *c;
setblocking(fd, 0);
c = xcalloc(1, sizeof *c);
c->references = 1;
c->peer = proc_add_peer(server_proc, fd, server_client_dispatch, c);
if (gettimeofday(&c->creation_time, NULL) != 0)
fatal("gettimeofday failed");
memcpy(&c->activity_time, &c->creation_time, s... | server_client_create(int fd)
{
struct client *c;
setblocking(fd, 0);
c = xcalloc(1, sizeof *c);
c->references = 1;
c->peer = proc_add_peer(server_proc, fd, server_client_dispatch, c);
if (gettimeofday(&c->creation_time, NULL) != 0)
fatal("gettimeofday failed");
memcpy(&c->activity_time, &c->creation_time, s... | CVE-2018-19387 | null | null | https://github.com/openbsd/src/commit/b32e1d34e10a0da806823f57f02a4ae6e93d756e | evbuffer_new and bufferevent_new can both fail (when malloc fails) and
return NULL. GitHub issue 1547. | null | null | 2018-11-19T13:35:40Z |
static js_Ast *callexp(js_State *J)
{
js_Ast *a = newexp(J);
loop:
if (jsP_accept(J, '.')) { a = EXP2(MEMBER, a, identifiername(J)); goto loop; }
if (jsP_accept(J, '[')) { a = EXP2(INDEX, a, expression(J, 0)); jsP_expect(J, ']'); goto loop; }
if (jsP_accept(J, '(')) { a = EXP2(CALL, a,... | static js_Ast *callexp(js_State *J)
{
js_Ast *a = newexp(J);
SAVEREC();
loop:
INCREC();
if (jsP_accept(J, '.')) { a = EXP2(MEMBER, a, identifiername(J)); goto loop; }
if (jsP_accept(J, '[')) { a = EXP2(INDEX, a, expression(J, 0)); jsP_expect(J, ']'); goto loop; }
if (jsP_... | CVE-2018-5759 | CWE-674 | jsparse.c in Artifex MuJS through 1.0.2 does not properly maintain the AST depth for binary expressions, which allows remote attackers to cause a denial of service (excessive recursion) via a crafted file. | http://git.ghostscript.com/?p=mujs.git;a=commit;h=4d45a96e57fbabf00a7378b337d0ddcace6f38c1 | null | null | c | null |
async def get_resolved_ref(self):
if hasattr(self, 'resolved_ref'):
return self.resolved_ref
try:
# Check if the reference is a valid SHA hash
self.sha1_validate(self.unresolved_ref)
except ValueError:
# The ref is a head/tag and we resolve it usi... | async def get_resolved_ref(self):
if hasattr(self, 'resolved_ref'):
return self.resolved_ref
try:
# Check if the reference is a valid SHA hash
self.sha1_validate(self.unresolved_ref)
except ValueError:
# The ref is a head/tag and we resolve it usi... | CVE-2021-39159 | CWE-78,CWE-94 | BinderHub is a kubernetes-based cloud service that allows users to share reproducible interactive computing environments from code repositories. In affected versions a remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the... | https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182 | Explicitly separate git-ls-remote options from positional arguments | repoproviders.py | py | 2021-08-25T19:15:00Z |
int imagetotif(opj_image_t * image, const char *outfile)
{
int width, height;
int bps,adjust, sgnd;
int tiPhoto;
TIFF *tif;
tdata_t buf;
tsize_t strip_size;
OPJ_UINT32 i, numcomps;
OPJ_SIZE_T rowStride;
OPJ_INT32* buffer32s = NULL;
OPJ_INT32 const* planes[4];
convert_32s_PXCX cvtPxToCx = NULL;
convert_32sXX... | int imagetotif(opj_image_t * image, const char *outfile)
{
uint32 width, height, bps, tiPhoto;
int adjust, sgnd;
TIFF *tif;
tdata_t buf;
tmsize_t strip_size, rowStride;
OPJ_UINT32 i, numcomps;
OPJ_INT32* buffer32s = NULL;
OPJ_INT32 const* planes[4];
convert_32s_PXCX cvtPxToCx = NULL;
convert_32sXXx_C1R cvt32s... | null | null | null | https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255 | These changes repair bugs of #871 and #872 | src/bin/jp2/converttif.c | c | 2016-12-09T07:29:55Z |
static void gen_add_carry(TCGv dest, TCGv t0, TCGv t1)
{
TCGv tmp;
tcg_gen_add_i32(dest, t0, t1);
tmp = load_cpu_field(CF);
tcg_gen_add_i32(dest, dest, tmp);
dead_tmp(tmp);
} | static void gen_add_carry(TCGv dest, TCGv t0, TCGv t1)
{
TCGv tmp;
tcg_gen_add_i32(dest, t0, t1);
tmp = load_cpu_field(CF);
tcg_gen_add_i32(dest, dest, tmp);
tcg_temp_free_i32(tmp);
} | null | null | null | qemu/commit/7d1b0095bff7157e856d1d0e6c4295641ced2752 | target-arm: Remove ad-hoc leak checking code
This commit removes the ad-hoc resource leak checking code from
target-arm. This includes replacing all uses of new_tmp() with
tcg_temp_new_i32() and all uses of dead_tmp() with
tcg_temp_free_i32().
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Aur... | ./qemu/target-arm/translate.c | c | 2011-03-06T21:39:54Z |
static public function getInstanceOf($_usernfo, $_tid) {
if (!isset(self::$tickets[$_tid])) {
self::$tickets[$_tid] = new ticket($_usernfo, $_tid);
}
return self::$tickets[$_tid];
} | static public function getInstanceOf($_usernfo, $_tid)
{
if (! isset(self::$tickets[$_tid . '-' . $_usernfo['userid']])) {
self::$tickets[$_tid . '-' . $_usernfo['userid']] = new ticket($_usernfo, $_tid);
}
return self::$tickets[$_tid . '-' . $_usernfo['userid']];
} | CVE-2018-12642 | CWE-732 | Froxlor through 0.9.39.5 has Incorrect Access Control for tickets not owned by the current user. | https://github.com/Froxlor/Froxlor/commit/aa881560cc996c38cbf8c20ee62854e27f72c73c | deny access to tickets not owned by current user, thx to chbi
Signed-off-by: Michael Kaufmann <michael.kaufmann@aixit.com> | class.ticket.php | php | 2018-06-22T12:29:00Z |
@Override
public void handleBatch(List<ChangeEvent<Object, Object>> records,
RecordCommitter<ChangeEvent<Object, Object>> committer)
throws InterruptedException {
LOGGER.trace("Event Hubs sink adapter processing change events");
CreateBatchOptions op = new Cr... | @Override
public void handleBatch(List<ChangeEvent<Object, Object>> records,
RecordCommitter<ChangeEvent<Object, Object>> committer)
throws InterruptedException {
LOGGER.trace("Event Hubs sink adapter processing change events");
CreateBatchOptions op = new Cr... | null | null | null | https://github.com/debezium/debezium-server/commit/2b018d022f694e705b80b27b179940f5095ebb22 | DBZ-4277 Prevent infinite loop | debezium-server/debezium-server-eventhubs/src/main/java/io/debezium/server/eventhubs/EventHubsChangeConsumer.java | java | 2021-11-16T00:38:30Z |
int ff_lzw_decode(LZWState *p, uint8_t *buf, int len){
int l, c, code, oc, fc;
uint8_t *sp;
struct LZWState *s = (struct LZWState *)p;
if (s->end_code < 0)
return 0;
l = len;
sp = s->sp;
oc = s->oc;
fc = s->fc;
for (;;) {
while (sp > s->stack) {
*buf++ = *... | int ff_lzw_decode(LZWState *p, uint8_t *buf, int len){
int l, c, code, oc, fc;
uint8_t *sp;
struct LZWState *s = (struct LZWState *)p;
if (s->end_code < 0)
return 0;
l = len;
sp = s->sp;
oc = s->oc;
fc = s->fc;
for (;;) {
while (sp > s->stack) {
*buf++ = *... | null | null | null | FFmpeg/commit/0cb7f8a26094c533b7dbe25897198953b6660f15 | check input validity, this prevents a few variables from reachin odd values which might have lead to out of array writes and thus might have been exploitable
Originally committed as revision 8522 to svn://svn.ffmpeg.org/ffmpeg/trunk | ./ffmpeg/libavcodec/lzw.c | c | 2007-03-25T23:37:38Z |
static __init int hardware_setup(void)
{
int r = -ENOMEM, i, msr;
rdmsrl_safe(MSR_EFER, &host_efer);
for (i = 0; i < ARRAY_SIZE(vmx_msr_index); ++i)
kvm_define_shared_msr(i, vmx_msr_index[i]);
vmx_io_bitmap_a = (unsigned long *)__get_free_page(GFP_KERNEL);
if (!vmx_io_bitmap_a)
return r;
vmx_io_bitmap_b =... | static __init int hardware_setup(void)
{
int r = -ENOMEM, i, msr;
rdmsrl_safe(MSR_EFER, &host_efer);
for (i = 0; i < ARRAY_SIZE(vmx_msr_index); ++i)
kvm_define_shared_msr(i, vmx_msr_index[i]);
vmx_io_bitmap_a = (unsigned long *)__get_free_page(GFP_KERNEL);
if (!vmx_io_bitmap_a)
return r;
vmx_io_bitmap_b =... | CVE-2016-4440 | CWE-264 | arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode. | https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f | kvm:vmx: more complete state update on APICv on/off
The function to update APICv on/off state (in particular, to deactivate
it when enabling Hyper-V SynIC) is incomplete: it doesn't adjust
APICv-related fields among secondary processor-based VM-execution
controls. As a result, Windows 2012 guests get stuck when SynIC... | vmx.c | c | 2016-05-18T14:48:20Z |
static void hash_object_file_literally(const struct git_hash_algo *algo,
const void *buf, unsigned long len,
const char *type, struct object_id *oid)
{
char hdr[MAX_HEADER_LEN];
int hdrlen = sizeof(hdr);
write_object_file_prepare_literally(algo, buf, len, type, oid, hdr, &hdrlen);
} | static void hash_object_file_literally(const struct git_hash_algo *algo,
const void *buf, size_t len,
const char *type, struct object_id *oid)
{
char hdr[MAX_HEADER_LEN];
size_t hdrlen = sizeof(hdr);
write_object_file_prepare_literally(algo, buf, len, type, oid, hdr, &hdrlen);
} | null | null | null | https://github.com/git-for-windows/git/commit/eb57df146ead141de019c33d4fc3f4afd729b89a | object-file.c: use size_t for header lengths
Continue walking the code path for the >4GB `hash-object --literally`
test. The `hash_object_file_literally()` function internally uses both
`hash_object_file()` and `write_object_file_prepare()`. Both function
signatures use `unsigned long` rather than `size_t` for the mem... | object-file.c | c | 2021-11-12T21:14:50Z |
fn load_constant64_full(&mut self, value: u64) -> Reg {
// If the top 32 bits are zero, use 32-bit `mov` operations.
let (num_half_words, size, negated) = if value >> 32 == 0 {
(2, OperandSize::Size32, (!value << 32) >> 32)
} else {
(4, OperandSize::Size64, !value)
... | fn load_constant64_full(
&mut self,
ty: Type,
extend: &generated_code::ImmExtend,
value: u64,
) -> Reg {
let bits = ty.bits();
let value = if bits < 64 {
if *extend == generated_code::ImmExtend::Sign {
let shift = 64 - bits;
... | CVE-2022-31169 | CWE-682 | Wasmtime is a standalone runtime for WebAssembly. There is a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors can result in incorrect division results at runtime. This affects Wasmtime prior to version 0.38.2 and Cranelift prior to 0.85.2. This issue only affects the AArch64 plat... | https://github.com/bytecodealliance/wasmtime/commit/2ba4bce5cc719e5a74e571a534424614e62ecc41 | Merge pull request from GHSA-7f6x-jwh5-m9r4
Copyright (c) 2022, Arm Limited. | isle.rs | rs | 2022-07-22T04:15:00Z |
@Override
public synchronized void close() throws IOException {
super.close();
if (in != null) {
in.close();
in = null;
}
if (out != null) {
out.close();
out = null;
}
} | @Override
public synchronized void close() throws IOException {
super.close();
if (in != null) {
CompressedInputStream inStream = in;
in = null;
inStream.close();
}
if (out != null) {
CompressedOutputStream outStream = out;
... | null | null | null | https://github.com/lsfusion/platform/commit/7a0c030d43940f1d828378cc101e1ba7c11ddff8 | Prevent stack overflow for Java 16
(cherry picked from commit f46d52f0a4b26400ab5b9026d9c3578c7e094dba) | api/src/main/java/lsfusion/base/remote/CountZipSocket.java | java | 2021-08-11T11:12:41Z |
@Override
public void onExit(int exitCode) {
if (exitCode != 0) {
JVMCrashActivity.startCrashActivity(activity, exitCode);
Logging.LOG.log(Level.INFO, "JVM crashed, start jvm crash activity to show errors now!");
}
} | @Override
public void onExit(int exitCode) {
if (exitCode != 0) {
JVMCrashActivity.startCrashActivity(activity, exitCode);
Logging.LOG.log(Level.INFO, "JVM crashed, start jvm crash activity to show errors now!");
android.os.Process.killProcess(android.os.Process.myPid());... | null | null | null | https://github.com/FCL-Team/FoldCraftLauncher/commit/c96f76fad9799f4acd79c2a0d4f679b5ecb78905 | fix crash activity not start | FCL/src/main/java/com/tungsten/fcl/control/GameMenu.java | java | 2023-01-14T17:27:09Z |
static AuthorizedIndices resolveAuthorizedIndicesFromRole(
Role role,
RequestInfo requestInfo,
Map<String, IndexAbstraction> lookup,
Supplier<Consumer<Collection<String>>> timerSupplier
) {
Predicate<IndexAbstraction> predicate = role.allowedIndicesMatcher(requestInfo.getActi... | static AuthorizedIndices resolveAuthorizedIndicesFromRole(
Role role,
RequestInfo requestInfo,
Map<String, IndexAbstraction> lookup,
Supplier<Consumer<Collection<String>>> timerSupplier
) {
IsResourceAuthorizedPredicate predicate = role.allowedIndicesMatcher(requestInfo.getAc... | null | null | null | https://github.com/elastic/elasticsearch/commit/54a78c3777de16a9b2cae94f5561ea7f994f1fed | Fix Security's expression resolver to not remove unavailable but authorized names (#92625)
For non-wildcard resource names in expressions from requests with the
`ignoreUnavailable` request option set to `true`, the Security filter
removes names for "unavailable" resources. This behavior is
theoretically correct, but i... | x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/RBACEngine.java | java | 2023-01-19T14:41:06Z |
static void *getMcontextEip(ucontext_t *uc) {
#define NOT_SUPPORTED() do {\
UNUSED(uc);\
return NULL;\
} while(0)
#if defined(__APPLE__) && !defined(MAC_OS_X_VERSION_10_6)
/* OSX < 10.6 */
#if defined(__x86_64__)
return (void*) uc->uc_mcontext->__ss.__rip;
#elif defined(__i386__)
return (voi... | static void* getAndSetMcontextEip(ucontext_t *uc, void *eip) {
#define NOT_SUPPORTED() do {\
UNUSED(uc);\
UNUSED(eip);\
return NULL;\
} while(0)
#define GET_SET_RETURN(target_var, new_val) do {\
void *old_val = (void*)target_var; \
if (new_val) { \
void **temp = (void**)&target_var; \
... | null | null | null | https://github.com/redis/redis/commit/0bf90d944313919eb8e63d3588bf63a367f020a3 | Avoid crash on crash report when a bad function pointer was called (#11298)
If Redis crashes due to calling an invalid function pointer,
the `backtrace` function will try to dereference this invalid pointer
which will cause a crash inside the crash report and will kill
the processes without having all the crash report... | src/debug.c | c | 2022-09-29T05:58:58Z |
@Override
protected Object getPreAuthenticatedPrincipal(HttpServletRequest request) {
try {
if (this.trustedProxies.contains(InetAddress.getByName(request.getRemoteAddr()))) {
String username = request.getHeader(AUTH_HEADER);
if (username != null) {
... | @Override
protected Object getPreAuthenticatedPrincipal(HttpServletRequest request) {
try {
if (this.trustedProxies.contains(InetAddress.getByName(request.getRemoteAddr()))) {
String username = request.getHeader(AUTH_HEADER);
if (username != null) {
... | null | null | null | https://github.com/georchestra/georchestra/commit/b9637b7a4cee6fedf0fba7dcc9996e4dd5732499 | Set pre-auth as a property of the request, not the session
Using the http Session object to hold a per-request property can result
in a race condition and a security attack vector.
ProxyTrustAnotherProxy works on a per-request basis, so it makes all
sense to set the pre-auth attribute on the request instead. | security-proxy/src/main/java/org/georchestra/security/ProxyTrustAnotherProxy.java | java | 2021-04-20T21:40:04Z |
static int rxrpc_krb5_decode_principal(struct krb5_principal *princ,
const __be32 **_xdr,
unsigned int *_toklen)
{
const __be32 *xdr = *_xdr;
unsigned int toklen = *_toklen, n_parts, loop, tmp;
/* there must be at least one name, and at least #names+1 length
* words */
if (toklen <= 12)
r... | static int rxrpc_krb5_decode_principal(struct krb5_principal *princ,
const __be32 **_xdr,
unsigned int *_toklen)
{
const __be32 *xdr = *_xdr;
unsigned int toklen = *_toklen, n_parts, loop, tmp, paddedlen;
/* there must be at least one name, and at least #names+1 length
* words */
if (toklen... | CVE-2017-7482 | CWE-190 | In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escal... | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f2f97656ada8d811d3c1bef503ced266fcd53a0 | rxrpc: Fix several cases where a padded len isn't checked in ticket decode
This fixes CVE-2017-7482.
When a kerberos 5 ticket is being decoded so that it can be loaded into an
rxrpc-type key, there are several places in which the length of a
variable-length field is checked to make sure that it's not going to
overrun... | null | null | null |
public void uncaughtException(@NonNull Thread t, @NonNull Throwable e) {
// Collect info
StackTraceElement[] arr = e.getStackTrace();
StringBuilder report = new StringBuilder(e.toString() + "\n");
for (StackTraceElement traceElement : arr) {
report.append(" at ").append(tr... | public void uncaughtException(@NonNull Thread t, @NonNull Throwable e) {
// Collect info
StackTraceElement[] arr = e.getStackTrace();
StringBuilder report = new StringBuilder(e.toString() + "\n");
for (StackTraceElement traceElement : arr) {
report.append(" at ").append(tr... | null | null | null | https://github.com/MuntashirAkon/AppManager/commit/b73a7e1a3b407b0832e8e3ed454efc59a770b32d | [Refactor] Update LibADB to 1.0.1
Signed-off-by: Muntashir Al-Islam <muntashirakon@riseup.net> | app/src/main/java/io/github/muntashirakon/AppManager/misc/AMExceptionHandler.java | java | 2021-12-14T07:19:34Z |
@Inject(at = @At("HEAD"), method = "isEnchanted()Z", cancellable = true)
private void isEnchanted(CallbackInfoReturnable<Boolean> callback) {
if (getItem() instanceof IModularItem) {
ItemStack itemStack = getInstance();
IModularItem item = (IModularItem) getItem();
callb... | @Inject(at = @At("HEAD"), method = "isEnchanted()Z", cancellable = true)
private void isEnchanted(CallbackInfoReturnable<Boolean> callback) {
if (getItem() instanceof IModularItem) {
ItemStack itemStack = getInstance();
callback.setReturnValue(itemStack.hasTag()
&... | null | null | null | https://github.com/mickelus/tetra/commit/df98e4186a3958478fc03e5fdd5297529a55fef3 | fix: fixed mod compat crash related to checking for enchanted tetra items | src/main/java/se/mickelus/tetra/mixin/MixinItemStack.java | java | 2021-06-16T18:46:05Z |
public void receivedInputEvent(InputEvent event) {
if (isProcessingEvents) {
Log.trace(InputEvent.class, "received event {}, adding to backlog", event);
eventBacklog.add(event);
} else {
Log.trace(InputEvent.class, "received event {}, adding to main", event);
... | public synchronized void receivedInputEvent(InputEvent event) {
if (isProcessingEvents) {
try {
wait();
} catch (InterruptedException exception) {
throw new IllegalStateException(exception);
}
}
receivedInputEvents.add(event);
... | null | null | null | https://github.com/fastjengine/FastJ/commit/3cf252b71786d782a98fdfb976eba13154e57757 | fixed a ton of concurrency issues
New Additions
- `Drawable#isDestroyed` -- boolean for checking if a given `Drawable` has been destroyed
- This boolean also effects the outcome of `Drawable#shouldRender` -- if the `Drawable` is destroyed, then it will not be rendered
- `ManagedList` -- a type of `List` with conve... | src/main/java/tech/fastj/input/InputManager.java | java | 2021-12-20T17:24:53Z |
private void switchScarpetRuleIfNeeded(CommandSourceStack source, CarpetRule<?> carpetRule) //TODO remove. This should be handled by the rule
{
if (carpetRule instanceof ParsedRule<?> rule && !rule.scarpetApp.isEmpty())
{
if (RuleHelper.getBooleanValue(rule) || (rule.type() == String.cla... | private void switchScarpetRuleIfNeeded(CommandSourceStack source, CarpetRule<?> carpetRule) //TODO remove. This should be handled by the rule
{
if (carpetRule instanceof ParsedRule<?> rule && !rule.scarpetApp.isEmpty() && CarpetServer.scriptServer != null) // null check because we may be in server init
... | null | null | null | https://github.com/gnembon/fabric-carpet/commit/24385f28c2d8d199424a8b75eef8f8b33ae4bfe2 | Fix crash when scarpet rules are set permanently
Fixes #1562 | src/main/java/carpet/api/settings/SettingsManager.java | java | 2022-10-05T08:21:07Z |
pkcs11rsa_fromlabel(dst_key_t *key, const char *engine, const char *label,
const char *pin)
{
CK_RV rv;
CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
CK_OBJECT_CLASS keyClass = CKO_PUBLIC_KEY;
CK_KEY_TYPE keyType = CKK_RSA;
CK_ATTRIBUTE searchTemplate[] =
{
{ CKA_CLASS, &keyClass, (CK_ULONG) sizeof(keyClass)... | pkcs11rsa_fromlabel(dst_key_t *key, const char *engine, const char *label,
const char *pin)
{
CK_RV rv;
CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE;
CK_OBJECT_CLASS keyClass = CKO_PUBLIC_KEY;
CK_KEY_TYPE keyType = CKK_RSA;
CK_ATTRIBUTE searchTemplate[] =
{
{ CKA_CLASS, &keyClass, (CK_ULONG) sizeof(keyClass)... | CVE-2020-8623 | CWE-617 | In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with ... | https://gitlab.isc.org/isc-projects/bind9/-/commit/8d807cc21655eaa6e6a08afafeec3682c0f3f2ab | Fix crash in pk11_numbits() when native-pkcs11 is used
When pk11_numbits() is passed a user provided input that contains all
zeroes (via crafted DNS message), it would crash with assertion
failure. Fix that by properly handling such input. | null | null | 2020-07-21T12:42:47Z |
VirtIODevice *virtio_serial_init(DeviceState *dev, virtio_serial_conf *conf)
{
VirtIOSerial *vser;
VirtIODevice *vdev;
uint32_t i, max_supported_ports;
if (!conf->max_virtserial_ports)
return NULL;
max_supported_ports = VIRTIO_PCI_QUEUE_MAX / 2 - 1;
if (conf->max_virtserial_ports > ... | VirtIODevice *virtio_serial_init(DeviceState *dev, virtio_serial_conf *conf)
{
VirtIOSerial *vser;
VirtIODevice *vdev;
uint32_t i, max_supported_ports;
if (!conf->max_virtserial_ports)
return NULL;
max_supported_ports = VIRTIO_PCI_QUEUE_MAX / 2 - 1;
if (conf->max_virtserial_ports > ... | null | null | null | qemu/commit/5e52e5f903b2648c59030637e1610b32e965d615 | virtio-serial: Plug memory leak on qdev exit()
virtio_serial_init() allocates the VirtIOSerialBus dynamically, but
virtio_serial_exit() doesn't free it.
Fix by getting rid of the allocation.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Amit Shah <amit.shah@redhat.com> | ./qemu/hw/virtio-serial-bus.c | c | 2011-05-25T12:21:10Z |
urlParams.pages||1<U.pages.length||Editor.pagesVisible)?"inline-block":"none"};var S=function(){ra.innerHTML="";if(null!=U.currentPage){mxUtils.write(ra,U.currentPage.getName());var ua=null!=U.pages?U.pages.length:1,ya=U.getPageIndex(U.currentPage);ya=null!=ya?ya+1:1;var Na=U.currentPage.getId();ra.setAttribute("title"... | urlParams.pages||1<U.pages.length||Editor.pagesVisible)?"inline-block":"none"};var S=function(){ra.innerText="";if(null!=U.currentPage){mxUtils.write(ra,U.currentPage.getName());var ua=null!=U.pages?U.pages.length:1,ya=U.getPageIndex(U.currentPage);ya=null!=ya?ya+1:1;var Na=U.currentPage.getId();ra.setAttribute("title"... | CVE-2022-2014 | CWE-94,CWE-94 | Code Injection in GitHub repository jgraph/drawio prior to 19.0.2. | https://github.com/jgraph/drawio/commit/3d3f819d7a04da7d53b37cc0ca4269c157ba2825 | 19.0.2 release | service-worker.js | js | 2022-06-09T17:15:00Z |
TPM2B_MAX_NV_BUFFER_Marshal(TPM2B_MAX_NV_BUFFER *source, BYTE **buffer, INT32 *size)
{
UINT16 written = 0;
written += TPM2B_Marshal(&source->b, buffer, size);
return written;
} | TPM2B_MAX_NV_BUFFER_Marshal(TPM2B_MAX_NV_BUFFER *source, BYTE **buffer, INT32 *size)
{
UINT16 written = 0;
written += TPM2B_Marshal(&source->b, sizeof(source->t.buffer), buffer, size); // libtpms changed
return written;
} | null | CWE-787 | null | https://github.com/stefanberger/libtpms/commit/3ef9b26cb9f28bd64d738bff9505a20d4eb56acd | tpm2: Add maxSize parameter to TPM2B_Marshal for sanity checks
Add maxSize parameter to TPM2B_Marshal and assert on it checking
the size of the data intended to be marshaled versus the maximum
buffer size.
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> | null | null | 2021-06-21T19:10:14Z |
@Override
protected void handleProducer(final CommandProducer cmdProducer) {
checkArgument(state == State.Connected);
final long producerId = cmdProducer.getProducerId();
final long requestId = cmdProducer.getRequestId();
// Use producer name provided by client if present
fin... | @Override
protected void handleProducer(final CommandProducer cmdProducer) {
checkArgument(state == State.Connected);
final long producerId = cmdProducer.getProducerId();
final long requestId = cmdProducer.getRequestId();
// Use producer name provided by client if present
fin... | null | null | null | https://github.com/apache/pulsar/commit/422588782146bc60721f532f8a4f7c2e1a91f1f2 | Avoid AuthenticationDataSource mutation for subscription name (#16065)
The `authenticationData` field in `ServerCnx` is being mutated to add the `subscription` field that will be passed on to the authorization plugin. The problem is that `authenticationData` is scoped to the whole connection and it should be getting m... | pulsar-broker/src/main/java/org/apache/pulsar/broker/service/ServerCnx.java | java | 2022-06-15T07:00:28Z |
private static void writeHvdcTopologicalNodes(Network network, String cimNamespace, XMLStreamWriter writer, CgmesExportContext context) throws XMLStreamException {
for (HvdcLine line : network.getHvdcLines()) {
Bus b1 = line.getConverterStation1().getTerminal().getBusView().getBus();
for... | private static void writeHvdcTopologicalNodes(Network network, String cimNamespace, XMLStreamWriter writer, CgmesExportContext context) throws XMLStreamException {
for (HvdcLine line : network.getHvdcLines()) {
Bus b1 = line.getConverterStation1().getTerminal().getBusView().getBus();
if ... | null | null | null | https://github.com/powsybl/powsybl-core/commit/9700c0a66b35e728391ed3597fdfef3fec3d9335 | Fix: does not crash during CGMES export when a terminal is disconnected (#2050)
* Fix: Connectable buses used for bus bar sections connectivity in CGMES EQ export
* Fix: for switches, if there is no equivalent terminal, we consider the bus of bus view as null => fictitious topological node is created
* Fix: fictitious... | cgmes/cgmes-conversion/src/main/java/com/powsybl/cgmes/conversion/export/TopologyExport.java | java | 2022-04-06T08:19:33Z |
int der_decode_utf8_string(const unsigned char *in, unsigned long inlen,
wchar_t *out, unsigned long *outlen)
{
wchar_t tmp;
unsigned long x, y, z, len;
int err;
LTC_ARGCHK(in != NULL);
LTC_ARGCHK(out != NULL);
LTC_ARGCHK(outlen != NULL);
/* mu... | int der_decode_utf8_string(const unsigned char *in, unsigned long inlen,
wchar_t *out, unsigned long *outlen)
{
wchar_t tmp;
unsigned long x, y, z, len;
int err;
LTC_ARGCHK(in != NULL);
LTC_ARGCHK(out != NULL);
LTC_ARGCHK(outlen != NULL);
/* mu... | null | null | null | https://github.com/libtom/libtomcrypt/commit/25c26a3b7a9ad8192ccc923e15cf62bf0108ef94 | Fixes #507 | src/pk/asn1/der/utf8/der_decode_utf8_string.c | c | 2019-10-03T17:57:10Z |
@Override
public void render(ScribesTile tile, float partialTicks, MatrixStack stack, IRenderTypeBuffer bufferIn, int packedLightIn) {
if(tile.getLevel().getBlockState(tile.getBlockPos()).getValue(ScribesBlock.PART) != BedPart.HEAD)
return;
Direction direction = tile.getLevel().getBlockS... | @Override
public void render(ScribesTile tile, float partialTicks, MatrixStack stack, IRenderTypeBuffer bufferIn, int packedLightIn) {
try{
if(tile.getLevel().getBlockState(tile.getBlockPos()).getBlock() != BlockRegistry.SCRIBES_BLOCK)
return;
if(tile.getLevel().getBl... | null | null | null | https://github.com/baileyholl/Ars-Nouveau/commit/a49fac12cbf6cf7c65c2dc85901803e44b35bb03 | Block piston movement for quark | src/main/java/com/hollingsworth/arsnouveau/client/renderer/tile/ScribesRenderer.java | java | 2021-06-23T01:12:10Z |
reverseSamplesBytes (uint16 spp, uint16 bps, uint32 width,
uint8 *src, uint8 *dst)
{
int i;
uint32 col, bytes_per_pixel, col_offset;
uint8 bytebuff1;
unsigned char swapbuff[32];
if ((src == NULL) || (dst == NULL))
{
TIFFError("reverseSamplesBytes","Invalid input or output... | reverseSamplesBytes (uint16 spp, uint16 bps, uint32 width,
uint8 *src, uint8 *dst)
{
int i;
uint32 col, bytes_per_pixel, col_offset;
uint8 bytebuff1;
unsigned char swapbuff[32];
if ((src == NULL) || (dst == NULL))
{
TIFFError("reverseSamplesBytes","Invalid input or output... | CVE-2016-9537 | CWE-119,CWE-787 | tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096, and MSVR 35097. | https://github.com/vadz/libtiff/commit/83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f | * tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities
in heap or stack allocated buffers. Reported as MSVR 35093,
MSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal
Chauhan from the MSRC Vulnerabilities & Mitigations team.
* tools/tiff2pdf.c: fix out-of-bounds write vulnerabilities in
heap a... | tools/tiffcrop.c | c | 2016-09-23T22:12:18Z |
0<fa.length&&b.pickFolder(b.mode,function(sa){b.createFile(fa,Q,null!=T&&0<T.length?T:null,null,function(){b.hideDialog()},null,sa,null,null!=P&&0<P.length?P:null)},b.mode!=App.MODE_GOOGLE||null==b.stateArg||null==b.stateArg.folderId)}}function u(fa,sa,xa,wa,ua,va,ia){null!=S&&(S.style.backgroundColor="transparent",S.s... | mxResources.get("ok"),aa,ia,function(ta){var ka=null!=ta&&0<ta.length;return ka&&y?(aa(ta),!1):ka},null,null,null,la,x?null:[]),b.showDialog(ia.container,350,80,!0,!0),ia.init())}}function D(ia){Ba.innerHTML=mxUtils.htmlEntities(mxResources.get(Z||ia?"create":"copy"));ia=ia?"none":"";p&&(Ea.style.display=ia);for(var ra... | CVE-2022-2014 | CWE-94,CWE-94 | Code Injection in GitHub repository jgraph/drawio prior to 19.0.2. | https://github.com/jgraph/drawio/commit/3d3f819d7a04da7d53b37cc0ca4269c157ba2825 | 19.0.2 release | service-worker.js | js | 2022-06-09T17:15:00Z |
@Override
public void process(NetworkEvent.Context context)
{
context.enqueueWork(() -> {
if(context.getDirection().getReceptionSide().isServer())
{
//Send it off, servers are just proxies for these.
ServerPlayerEntity player = context.getSender();... | @Override
public void process(NetworkEvent.Context context)
{
context.enqueueWork(() -> {
if(context.getDirection().getReceptionSide().isServer())
{
//Send it off, servers are just proxies for these.
ServerPlayerEntity player = context.getSender();... | null | null | null | https://github.com/iChun/Tabula/commit/644cf651269ea9a18a02e6f4c1cf403608cc4e8c | Added plugin support (for Hats).
Fix crash when removing a texture in MP.
Fix crash when removing a part in MP.
Double clicking a part now opens the edit meta window.
Make autosaves enabled by default.
Set the config to a client config. | src/main/java/me/ichun/mods/tabula/common/packet/PacketProjectFragment.java | java | 2021-03-11T22:22:41Z |
krb5_error_code
kdc_process_s4u2proxy_req(kdc_realm_t *kdc_active_realm,
krb5_kdc_req *request,
const krb5_enc_tkt_part *t2enc,
const krb5_db_entry *server,
krb5_const_principal server_princ,
... | krb5_error_code
kdc_process_s4u2proxy_req(kdc_realm_t *kdc_active_realm,
krb5_kdc_req *request,
const krb5_enc_tkt_part *t2enc,
const krb5_db_entry *server,
krb5_const_principal server_princ,
... | null | null | null | https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 | Prevent KDC unset status assertion failures
Assign status values if S4U2Self padata fails to decode, if an
S4U2Proxy request uses invalid KDC options, or if an S4U2Proxy request
uses an evidence ticket which does not match the canonicalized request
server principal name. Reported by Samuel Cabrero.
If a status value... | src/kdc/kdc_util.c | c | 2017-07-13T16:14:20Z |
@Deprecated
public static void renderStar(float time, int starFrags, float r, float g, float b, float a, boolean star) {
Tessellator tessellator = Tessellator.getInstance();
BufferBuilder bufferBuilder = tessellator.getBuffer();
GlStateManager.disableTexture();
GlStateManager.shadeModel(GL11.GL_SMOOTH);
GlStat... | @Deprecated
public static void renderStar(float time, int starFrags, float r, float g, float b, float a, boolean star) {
GlStateManager.pushMatrix();
Tessellator tessellator = Tessellator.getInstance();
BufferBuilder bufferBuilder = tessellator.getBuffer();
GlStateManager.disableTexture();
GlStateManager.shade... | null | null | null | https://github.com/aurilisdev/Electrodynamics/commit/1f40728713f63d603ded02ec4a8cc7b7f0e9f497 | Fix render bug & solar panel crash | src/main/java/electrodynamics/api/utilities/RenderUtilities.java | java | 2021-03-10T20:35:37Z |
void esp_reg_write(ESPState *s, uint32_t saddr, uint64_t val)
{
trace_esp_mem_writeb(saddr, s->wregs[saddr], val);
switch (saddr) {
case ESP_TCHI:
s->tchi_written = true;
/* fall through */
case ESP_TCLO:
case ESP_TCMID:
s->rregs[ESP_RSTAT] &= ~STAT_TC;
break;
cas... | void esp_reg_write(ESPState *s, uint32_t saddr, uint64_t val)
{
trace_esp_mem_writeb(saddr, s->wregs[saddr], val);
switch (saddr) {
case ESP_TCHI:
s->tchi_written = true;
/* fall through */
case ESP_TCLO:
case ESP_TCMID:
s->rregs[ESP_RSTAT] &= ~STAT_TC;
break;
cas... | null | CWE-787 | null | null | scsi: esp: make cmdbuf big enough for maximum CDB size
While doing DMA read into ESP command buffer 's->cmdbuf', it could
write past the 's->cmdbuf' area, if it was transferring more than 16
bytes. Increase the command buffer size to 32, which is maximum when
's->do_cmd' is set, and add a check on 'len' to avoid OOB ... | null | null | null |
static int vmdk_init_tables(BlockDriverState *bs, VmdkExtent *extent,
Error **errp)
{
int ret;
int l1_size, i;
l1_size = extent->l1_size * sizeof(uint32_t);
extent->l1_table = g_try_malloc(l1_size);
if (l1_size && extent->l1_table == NULL) {
return -ENOMEM;
... | static int vmdk_init_tables(BlockDriverState *bs, VmdkExtent *extent,
Error **errp)
{
int ret;
size_t l1_size;
int i;
l1_size = extent->l1_size * sizeof(uint32_t);
extent->l1_table = g_try_malloc(l1_size);
if (l1_size && extent->l1_table == NULL) {
return... | null | null | null | qemu/commit/13c4941cdd8685d28c7e3a09e393a5579b58db46 | vmdk: Fix overflow if l1_size is 0x20000000
Richard Jones caught this bug with afl fuzzer.
In fact, that's the only possible value to overflow (extent->l1_size =
0x20000000) l1_size:
l1_size = extent->l1_size * sizeof(long) => 0x80000000
g_try_malloc returns NULL because l1_size is interpreted as negative
during ty... | ./qemu/block/vmdk.c | c | 2015-05-05T09:28:13Z |
static int module_clone(int argc, const char **argv, const char *prefix)
{
const char *name = NULL, *url = NULL, *depth = NULL;
int quiet = 0;
int progress = 0;
char *p, *path = NULL, *sm_gitdir;
struct strbuf sb = STRBUF_INIT;
struct string_list reference = STRING_LIST_INIT_NODUP;
int require_init = 0;
char *s... | static int module_clone(int argc, const char **argv, const char *prefix)
{
const char *name = NULL, *url = NULL, *depth = NULL;
int quiet = 0;
int progress = 0;
char *p, *path = NULL, *sm_gitdir;
struct strbuf sb = STRBUF_INIT;
struct string_list reference = STRING_LIST_INIT_NODUP;
int require_init = 0;
char *s... | CVE-2019-1387 | null | An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursiv... | https://git.kernel.org/pub/scm/git/git.git/commit/?id=a8dee3ca610f5a1d403634492136c887f83b59d2 | Disallow dubiously-nested submodule git directories
Currently it is technically possible to let a submodule's git
directory point right into the git dir of a sibling submodule.
Example: the git directories of two submodules with the names `hippo`
and `hippo/hooks` would be `.git/modules/hippo/` and
`.git/modules/hipp... | null | null | null |
int ping_common_sendmsg(int family, struct msghdr *msg, size_t len,
void *user_icmph, size_t icmph_len) {
u8 type, code;
if (len > 0xFFFF)
return -EMSGSIZE;
/*
* Check the flags.
*/
/* Mirror BSD error message compatibility */
if (msg->msg_flags & MSG_OOB)
return -EOPNOTSUPP;
/*
* Fetch the ICMP ... | int ping_common_sendmsg(int family, struct msghdr *msg, size_t len,
void *user_icmph, size_t icmph_len) {
u8 type, code;
if (len > 0xFFFF)
return -EMSGSIZE;
/* Must have at least a full ICMP header. */
if (len < icmph_len)
return -EINVAL;
/*
* Check the flags.
*/
/* Mirror BSD error message compati... | CVE-2016-8399 | CWE-284 | An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access... | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0eab121ef8750a5c8637d51534d5e9143fb0633f | net: ping: check minimum size on ICMP header length
Prior to commit c0371da6047a ("put iov_iter into msghdr") in v3.19, there
was no check that the iovec contained enough bytes for an ICMP header,
and the read loop would walk across neighboring stack contents. Since the
iov_iter conversion, bad arguments are noticed, ... | null | null | null |
private Docket baseDocket() {
Docket baseDocket = new Docket(DocumentationType.OAS_30)
.select()
.apis(apiSelector::test)
.paths(PathSelectors.any())
.build();
if (apiInfo != null) {
baseDocket.apiInfo(apiInfo);
}
baseDock... | private Docket baseDocket() {
Docket baseDocket = new Docket(DocumentationType.OAS_30)
.select()
.apis(apiSelector::test)
.paths(PathSelectors.any())
.build();
if (apiInfo != null) {
baseDocket.apiInfo(apiInfo);
}
baseDock... | null | null | null | https://github.com/Activiti/activiti-cloud/commit/0d83bb8be7393eacca5f82627fc5d0b4f8c5bae1 | Add authentication flow in swagger UI (#507)
* add token authentication
* fix token authentication
* use JWT_BEARER_BUILDER
* implement implicit flow auth | activiti-cloud-service-common/activiti-cloud-services-swagger/src/main/java/org/activiti/cloud/common/swagger/SwaggerDocketBuilder.java | java | 2021-11-09T11:21:53Z |
static void imdct36(int *out, int *buf, int *in, int *win)
{
int i, j, t0, t1, t2, t3, s0, s1, s2, s3;
int tmp[18], *tmp1, *in1;
for(i=17;i>=1;i--)
in[i] += in[i-1];
for(i=17;i>=3;i-=2)
in[i] += in[i-2];
for(j=0;j<2;j++) {
tmp1 = tmp + j;
in1 = in + j;
#if 0
i... | static void imdct36(int *out, int *buf, int *in, int *win)
{
int i, j, t0, t1, t2, t3, s0, s1, s2, s3;
int tmp[18], *tmp1, *in1;
for(i=17;i>=1;i--)
in[i] += in[i-1];
for(i=17;i>=3;i-=2)
in[i] += in[i-2];
for(j=0;j<2;j++) {
tmp1 = tmp + j;
in1 = in + j;
#if 0
i... | null | null | null | FFmpeg/commit/44f1698a3824836d32708ae93e78ac1f2310a07e | merge a few shifts into the dequantization, faster and more accurate, lets hope it doesnt overflow
Originally committed as revision 3930 to svn://svn.ffmpeg.org/ffmpeg/trunk | ./ffmpeg/libavcodec/mpegaudiodec.c | c | 2005-02-03T03:28:27Z |
void virtio_queue_update_rings(VirtIODevice *vdev, int n)
{
VRing *vring = &vdev->vq[n].vring;
if (!vring->desc) {
return;
}
vring->avail = vring->desc + vring->num * sizeof(VRingDesc);
vring->used = vring_align(vring->avail +
offsetof(VRingAvail, ring[... | void virtio_queue_update_rings(VirtIODevice *vdev, int n)
{
VRing *vring = &vdev->vq[n].vring;
if (!vring->num || !vring->desc || !vring->align) {
return;
}
vring->avail = vring->desc + vring->num * sizeof(VRingDesc);
vring->used = vring_align(vring->avail +
... | null | null | null | qemu/commit/758ead31c7e17bf17a9ef2e0ca1c3e86ab296b43 | virtio: check VirtQueue Vring object is set
A guest could attempt to use an uninitialised VirtQueue object
or unset Vring.align leading to a arithmetic exception. Add check
to avoid it.
Reported-by: Zhangboxian <zhangboxian@huawei.com>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Reviewed-by: Michael S. Tsi... | ./qemu/hw/virtio/virtio.c | c | 2017-11-29T17:44:27Z |
public void onMockedRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) {
if (requestCode == CaptureManager.getCameraPermissionReqCode()) {
showCameraPermissionMissingText(grantResults[0] != PackageManager.PERMISSION_GRANTED);
} else if (requ... | public void onMockedRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) {
boolean granted = grantResults.length > 0 && grantResults[0] == PackageManager.PERMISSION_GRANTED;
if (requestCode == CaptureManager.getCameraPermissionReqCode()) {
sh... | null | null | null | https://github.com/CatimaLoyalty/Android/commit/614753303fa8c642049b173e1626dbc476f9491a | Fix crash when permissionRequestResult gets cancelled | app/src/main/java/protect/card_locker/ScanActivity.java | java | 2023-01-25T17:30:47Z |
static void _CONSTRUCTOR lib_init(void)
{
int ret;
const char *e;
if (_gnutls_global_init_skip() != 0)
return;
e = getenv("GNUTLS_NO_EXPLICIT_INIT");
if (e != NULL) {
ret = atoi(e);
if (ret == 1)
return;
}
ret = gnutls_global_init();
if (ret < 0) {
fprintf(stderr, "Error in GnuTLS initialization: %s... | static void _CONSTRUCTOR lib_init(void)
{
int ret;
const char *e;
if (_gnutls_global_init_skip() != 0)
return;
e = secure_getenv("GNUTLS_NO_EXPLICIT_INIT");
if (e != NULL) {
ret = atoi(e);
if (ret == 1)
return;
}
ret = gnutls_global_init();
if (ret < 0) {
fprintf(stderr, "Error in GnuTLS initializat... | CVE-2016-4456 | CWE-20 | The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem. | https://gitlab.com/gnutls/gnutls/commit/b0a3048e56611a2deee4976aeba3b8c0740655a6 | env: use secure_getenv when reading environment variables | null | null | 2016-05-27T20:26:02Z |
def get_multi(self, keys, server_key):
"""
Gets multiple values from memcache for the given keys.
:param keys: keys for values to be retrieved from memcache
:param servery_key: key to use in determining which server in the ring
is used
:returns: list ... | def get_multi(self, keys, server_key):
"""
Gets multiple values from memcache for the given keys.
:param keys: keys for values to be retrieved from memcache
:param servery_key: key to use in determining which server in the ring
is used
:returns: list ... | CVE-2012-4406 | CWE-502 | OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object. | https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a | Do not use pickle for serialization in memcache, but JSON
We don't want to use pickle as it can execute arbitrary code. JSON is
safer. However, note that it supports serialization for only some
specific subset of object types; this should be enough for what we need,
though.
To avoid issues on upgrades (unability to r... | memcached.py | py | 2012-10-22T23:55:00Z |
Status V2UserDocumentParser::checkValidUserDocument(const BSONObj& doc) const {
BSONElement userElement = doc[AuthorizationManager::USER_NAME_FIELD_NAME];
BSONElement userDBElement = doc[AuthorizationManager::USER_DB_FIELD_NAME];
BSONElement credentialsElement = doc[CREDENTIALS_FIELD_NAME];
BSONElement ... | Status V2UserDocumentParser::checkValidUserDocument(const BSONObj& doc) const {
auto userIdElement = doc[AuthorizationManager::USERID_FIELD_NAME];
auto userElement = doc[AuthorizationManager::USER_NAME_FIELD_NAME];
auto userDBElement = doc[AuthorizationManager::USER_DB_FIELD_NAME];
auto credentialsEleme... | CVE-2019-2386 | CWE-613 | After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects MongoDB Server v4.0 versions prior to 4.0.9; MongoDB Server v3.6 versi... | https://github.com/mongodb/mongo/commit/db19e7ce84cfd702a4ba9983ee2ea5019f470f82 | SERVER-38984 Validate unique User ID on UserCache hit
(cherry picked from commit e55d6e2292e5dbe2f97153251d8193d1cc89f5d7) | null | null | 2019-03-29T16:15:10Z |
static int qcow2_co_readv(BlockDriverState *bs, int64_t sector_num,
int remaining_sectors, QEMUIOVector *qiov)
{
BDRVQcowState *s = bs->opaque;
int index_in_cluster, n1;
int ret;
int cur_nr_sectors;
uint64_t cluster_offset = 0;
uint64_t bytes_done = 0;
QEMUIOVector... | static int qcow2_co_readv(BlockDriverState *bs, int64_t sector_num,
int remaining_sectors, QEMUIOVector *qiov)
{
BDRVQcowState *s = bs->opaque;
int index_in_cluster, n1;
int ret;
int cur_nr_sectors;
uint64_t cluster_offset = 0;
uint64_t bytes_done = 0;
QEMUIOVector... | null | null | null | qemu/commit/ab0997e0afdcb272fd04784a280b2df46b0c759f | qcow2: remove memory leak
Signed-off-by: Frediano Ziglio <freddy77@gmail.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com> | ./qemu/block/qcow2.c | c | 2011-08-23T13:21:20Z |
generateRandomFile (int partCount, const std::string & fn)
{
//
// Init data.
//
Array2D<half> halfData;
Array2D<float> floatData;
Array2D<unsigned int> uintData;
fillPixels<unsigned int>(uintData, width, height);
fillPixels<half>(halfData, width, height);
fillPixels<float>(floatData... | generateRandomFile (int partCount, const std::string & fn)
{
//
// Init data.
//
Array2D<half> halfData;
Array2D<float> floatData;
Array2D<unsigned int> uintData;
fillPixels<unsigned int>(uintData, width, height);
fillPixels<half>(halfData, width, height);
fillPixels<float>(floatData... | null | CWE-125 | null | null | fix memory leaks and invalid memory accesses
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | null | null | null |
static inline void aio_poll_complete(struct aio_kiocb *iocb, __poll_t mask)
{
struct file *file = iocb->poll.file;
aio_complete(iocb, mangle_poll(mask), 0);
fput(file);
} | static inline void aio_poll_complete(struct aio_kiocb *iocb, __poll_t mask)
{
aio_complete(iocb, mangle_poll(mask), 0);
} | CVE-2019-10125 | CWE-416 | An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=84c4e1f89fefe70554da0ab33be72c9be7994379 | aio: simplify - and fix - fget/fput for io_submit()
Al Viro root-caused a race where the IOCB_CMD_POLL handling of
fget/fput() could cause us to access the file pointer after it had
already been freed:
"In more details - normally IOCB_CMD_POLL handling looks so:
1) io_submit(2) allocates aio_kiocb instance and p... | null | null | null |
doit (void)
{
char *p;
int rc;
size_t i;
if (!stringprep_check_version (STRINGPREP_VERSION))
fail ("stringprep_check_version failed (header %s runtime %s)\n",
STRINGPREP_VERSION, stringprep_check_version (NULL));
if (!stringprep_check_version (NULL))
fail ("stringprep_check_version(NULL) failed\n... | doit (void)
{
char *badutf8 = strdup ("\x7e\x64\x61\x72\x10\x2f\x2f\xf9\x2b\x71"
"\x60\x79\x7b\x2e\x63\x75\x2b\x61\x65\x72"
"\x75\x65\x56\x66\x7f\x62\xc5\x76\xe5\x00");
char *s = NULL;
int rc;
rc = idna_to_ascii_8z (badutf8, &s, 0);
free (badutf8);
if (rc != IDNA_ICONV_ERROR)
fail ("rc %d\n",... | null | null | null | null | libidn: stringprep_utf8_to_ucs4 now rejects invalid UTF-8. CVE-2015-2059 | null | null | null |
static inline void set_pte_at(struct mm_struct *mm, unsigned long addr,
pte_t *ptep, pte_t pte)
{
if (pte_valid_ng(pte)) {
if (!pte_special(pte) && pte_exec(pte))
__sync_icache_dcache(pte, addr);
if (pte_dirty(pte) && pte_write(pte))
pte_val(pte) &= ~PTE_RDONLY;
else
pte_val(pte) |= PTE_RDONLY;... | static inline void set_pte_at(struct mm_struct *mm, unsigned long addr,
pte_t *ptep, pte_t pte)
{
if (pte_valid_user(pte)) {
if (!pte_special(pte) && pte_exec(pte))
__sync_icache_dcache(pte, addr);
if (pte_dirty(pte) && pte_write(pte))
pte_val(pte) &= ~PTE_RDONLY;
else
pte_val(pte) |= PTE_RDONL... | CVE-2014-9803 | CWE-19 | arch/arm64/include/asm/pgtable.h in the Linux kernel before 3.15-rc5-next-20140519, as used in Android before 2016-07-05 on Nexus 5X and 6P devices, mishandles execute-only pages, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28557020. | https://github.com/torvalds/linux/commit/5a0fdfada3a2aa50d7b947a2e958bf00cbe0d830 | Revert "arm64: Introduce execute-only page access permissions"
This reverts commit bc07c2c6e9ed125d362af0214b6313dca180cb08.
While the aim is increased security for --x memory maps, it does not
protect against kernel level reads. Until SECCOMP is implemented for
arm64, revert this patch to avoid giving a false idea o... | fault.c | c | 2014-05-16T15:44:32Z |
static void termsig_handler(int signum)
{
state = TERMINATE;
qemu_notify_event();
} | static void termsig_handler(int signum)
{
atomic_cmpxchg(&state, RUNNING, TERMINATE);
qemu_notify_event();
} | null | null | null | qemu/commit/23994a5f524aa575c7a4b2e5250f17b127d2cf2f | nbd: fix assert() on qemu-nbd stop
From time to time qemu-nbd is crashing on the following assert:
assert(state == TERMINATING)
nbd_export_closed
nbd_export_put
main
and the state at the moment of the crash is evaluated to TERMINATE.
During shutdown process of the client the nbd_client_thread thread s... | ./qemu/qemu-nbd.c | c | 2016-04-14T10:20:15Z |
@RequiresPermission(android.Manifest.permission.SET_WALLPAPER)
public int setStream(InputStream bitmapData, Rect visibleCropHint,
boolean allowBackup, @SetWallpaperFlags int which)
throws IOException {
validateRect(visibleCropHint);
if (sGlobals.mService == null) {
... | @RequiresPermission(android.Manifest.permission.SET_WALLPAPER)
public int setStream(InputStream bitmapData, Rect visibleCropHint,
boolean allowBackup, @SetWallpaperFlags int which)
throws IOException {
validateRect(visibleCropHint);
if (sGlobals.mService == null) {
... | null | null | null | https://github.com/PixelExperience/frameworks_base/commit/d4e49cbca57e2f4f2dee74138b56fe3fbcaf0261 | DO NOT MERGE: Decode the input of both setStream and setResource calls first
The size of the input of both setStream and setResource may very big
that system server got oom while handling it, so we try to decode it
first before copying it to the wallpaper path, if the decoding fails, we
treat the input as an invalid i... | core/java/android/app/WallpaperManager.java | java | 2021-12-02T08:23:26Z |
public Response parse(String samlXml)
throws IOException, SAXException, ParserConfigurationException {
Response response;
Element root;
StringReader reader = new StringReader(samlXml);
InputSource is = new InputSource(reader);
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstanc... | public Response parse(String samlXml)
throws IOException, SAXException, ParserConfigurationException {
Response response;
Element root;
StringReader reader = new StringReader(samlXml);
InputSource is = new InputSource(reader);
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstanc... | null | null | null | https://github.com/indigo-iam/iam/commit/2323f7d9da89d804564f940c549fa2a4750b397c | Fix vulnerabilities
by disabling access to external entities in XML parsing | iam-login-service/src/main/java/it/infn/mw/iam/util/SamlDecryptUtil.java | java | 2022-03-08T15:55:59Z |
readconf_main(void)
{
int sep = 0;
struct stat statbuf;
uschar *s, *filename;
const uschar *list = config_main_filelist;
/* Loop through the possible file names */
while((filename = string_nextinlist(&list, &sep, big_buffer, big_buffer_size))
!= NULL)
{
/* Cut out all the fancy processing unless specifical... | readconf_main(void)
{
int sep = 0;
struct stat statbuf;
uschar *s, *filename;
const uschar *list = config_main_filelist;
/* Loop through the possible file names */
while((filename = string_nextinlist(&list, &sep, big_buffer, big_buffer_size))
!= NULL)
{
/* To avoid confusion: Exim changes to / at the very... | CVE-2016-1531 | CWE-264 | Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument. | http://git.exim.org/exim.git/commitdiff/43ba2742c700d625dcdcdaf7bbadc2f72776854a | Fix CVE-2016-1531
Add keep_environment, add_environment.
Change the working directory to "/" during the early startup
phase.
(cherry picked from commit bc3c7bb7d4aba3e563434e5627fe1f2176aa18c0)
(cherry picked from commit 2b92b67bfc33efe05e6ff2ea3852731ac2273832)
(cherry picked from commit 14b82c8b736c8ed24eda... | null | null | null |
void vm_stop(int reason)
{
do_vm_stop(reason);
} | void vm_stop(int reason)
{
if (!qemu_thread_is_self(&io_thread)) {
qemu_system_vmstop_request(reason);
cpu_stop_current();
return;
}
do_vm_stop(reason);
} | null | null | null | qemu/commit/12d4536f7d911b6d87a766ad7300482ea663cea2 | main: force enabling of I/O thread
Enabling the I/O thread by default seems like an important part of declaring
1.0. Besides allowing true SMP support with KVM, the I/O thread means that the
TCG VCPU doesn't have to multiplex itself with the I/O dispatch routines which
currently requires a (racey) signal based alarm ... | ./qemu/cpus.c | c | 2011-08-22T13:24:58Z |
TPM_EO_Unmarshal(TPM_EO *target, BYTE **buffer, INT32 *size)
{
TPM_RC rc = TPM_RC_SUCCESS;
if (rc == TPM_RC_SUCCESS) {
rc = UINT16_Unmarshal(target, buffer, size);
}
if (rc == TPM_RC_SUCCESS) {
switch (*target) {
case TPM_EO_EQ:
case TPM_EO_NEQ:
case TPM_EO_SIGNED_GT:
case TPM_EO_UNSIGN... | TPM_EO_Unmarshal(TPM_EO *target, BYTE **buffer, INT32 *size)
{
TPM_RC rc = TPM_RC_SUCCESS;
TPM_EO orig_target = *target; // libtpms added
if (rc == TPM_RC_SUCCESS) {
rc = UINT16_Unmarshal(target, buffer, size);
}
if (rc == TPM_RC_SUCCESS) {
switch (*target) {
case TPM_EO_EQ:
case TPM_EO_N... | null | CWE-787 | null | https://github.com/stefanberger/libtpms/commit/5cc98a62dc6f204dcf5b87c2ee83ac742a6a319b | tpm2: Restore original value if unmarshalled value was illegal
Restore the original value of the memory location where data from
a stream was unmarshalled and the unmarshalled value was found to
be illegal. The goal is to not keep illegal values in memory.
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> | null | null | 2021-06-24T00:54:44Z |
~AES128GCM_OnWireTxHandler() override {
::ceph::crypto::zeroize_for_security(&nonce, sizeof(nonce));
} | ~AES128GCM_OnWireTxHandler() override {
::ceph::crypto::zeroize_for_security(&nonce, sizeof(nonce));
::ceph::crypto::zeroize_for_security(&initial_nonce, sizeof(initial_nonce));
} | CVE-2020-1759 | CWE-323 | A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a se... | https://github.com/ceph/ceph/commit/20b7bb685c5ea74c651ca1ea547ac66b0fee7035 | msg/async/ProtocolV2: avoid AES-GCM nonce reuse vulnerabilities
The secure mode uses AES-128-GCM with 96-bit nonces consisting of a
32-bit counter followed by a 64-bit salt. The counter is incremented
after processing each frame, the salt is fixed for the duration of
the session. Both are initialized from the sessio... | null | null | 2020-03-06T19:16:45Z |
public AppDetailsPermissionItem getPermissionItem(String permissionName, boolean isGranted) {
try {
PermissionInfo permissionInfo = PermissionCompat.getPermissionInfo(permissionName,
mPackageInfo.packageName, PackageManager.GET_META_DATA);
if (permissionInfo == null) ... | @Nullable
private AppDetailsPermissionItem getPermissionItem(@NonNull String permissionName, boolean isGranted) {
PackageInfo packageInfo = getPackageInfoInternal();
if (packageInfo == null) return null;
try {
PermissionInfo permissionInfo = PermissionCompat.getPermissionInfo(per... | null | null | null | https://github.com/MuntashirAkon/AppManager/commit/fb2512cfad489b3b1aa56b1e48f1e2fa36c3d4bd | [AppDetails] Fix crashing when it takes too long to load ApkFile
Signed-off-by: Muntashir Al-Islam <muntashirakon@riseup.net> | app/src/main/java/io/github/muntashirakon/AppManager/details/AppDetailsViewModel.java | java | 2023-01-14T08:54:05Z |
static struct audit_chunk *alloc_chunk(int count)
{
struct audit_chunk *chunk;
size_t size;
int i;
size = offsetof(struct audit_chunk, owners) + count * sizeof(struct node);
chunk = kzalloc(size, GFP_KERNEL);
if (!chunk)
return NULL;
INIT_LIST_HEAD(&chunk->hash);
INIT_LIST_HEAD(&chunk->trees);
chunk->count... | static struct audit_chunk *alloc_chunk(int count)
{
struct audit_chunk *chunk;
size_t size;
int i;
size = offsetof(struct audit_chunk, owners) + count * sizeof(struct node);
chunk = kzalloc(size, GFP_KERNEL);
if (!chunk)
return NULL;
INIT_LIST_HEAD(&chunk->hash);
INIT_LIST_HEAD(&chunk->trees);
chunk->count... | CVE-2008-5182 | CWE-362 | The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount. | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8f7b0ba1c853919b85b54774775f567f30006107 | Fix inotify watch removal/umount races
Inotify watch removals suck violently.
To kick the watch out we need (in this order) inode->inotify_mutex and
ih->mutex. That's fine if we have a hold on inode; however, for all
other cases we need to make damn sure we don't race with umount. We can
*NOT* just grab a reference... | null | null | null |
xsltNumberFormatTokenize(const xmlChar *format,
xsltFormatPtr tokens)
{
int ix = 0;
int j;
int val;
int len;
default_token.token = DEFAULT_TOKEN;
default_token.width = 1;
default_token.separator = BAD_CAST(DEFAULT_SEPARATOR);
tokens->start = NULL;
tokens->tokens[0].separator =... | xsltNumberFormatTokenize(const xmlChar *format,
xsltFormatPtr tokens)
{
int ix = 0;
int j;
int val;
int len;
default_token.token = DEFAULT_TOKEN;
default_token.width = 1;
default_token.separator = BAD_CAST(DEFAULT_SEPARATOR);
tokens->start = NULL;
tokens->tokens[0].separator =... | CVE-2019-13117 | CWE-908 | In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character. | https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1 | Fix uninitialized read of xsl:number token
Found by OSS-Fuzz. | null | null | 2019-04-27T09:19:48Z |
do_uncompress( compress_filter_context_t *zfx, z_stream *zs,
IOBUF a, size_t *ret_len )
{
int zrc;
int rc=0;
size_t n;
int nread, count;
int refill = !zs->avail_in;
if( DBG_FILTER )
log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n",
(unsigned)zs->avail_in, (... | do_uncompress( compress_filter_context_t *zfx, z_stream *zs,
IOBUF a, size_t *ret_len )
{
int zrc;
int rc = 0;
int leave = 0;
size_t n;
int nread, count;
int refill = !zs->avail_in;
if( DBG_FILTER )
log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n",
(uns... | CVE-2014-4617 | CWE-20 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | null | null | c | null |
static void rpc_init_task(struct rpc_task *task, const struct rpc_task_setup *task_setup_data)
{
memset(task, 0, sizeof(*task));
atomic_set(&task->tk_count, 1);
task->tk_flags = task_setup_data->flags;
task->tk_ops = task_setup_data->callback_ops;
task->tk_calldata = task_setup_data->callback_data;
INIT_LIST_HEA... | static void rpc_init_task(struct rpc_task *task, const struct rpc_task_setup *task_setup_data)
{
memset(task, 0, sizeof(*task));
atomic_set(&task->tk_count, 1);
task->tk_flags = task_setup_data->flags;
task->tk_ops = task_setup_data->callback_ops;
task->tk_calldata = task_setup_data->callback_data;
INIT_LIST_HEA... | null | null | null | https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f | NLM: Don't hang forever on NLM unlock requests
If the NLM daemon is killed on the NFS server, we can currently end up
hanging forever on an 'unlock' request, instead of aborting. Basically,
if the rpcbind request fails, or the server keeps returning garbage, we
really want to quit instead of retrying.
Tested-by: Vasi... | net/sunrpc/sched.c | c | 2011-05-31T19:15:34Z |
MagickExport Image *WaveImage(const Image *image,const double amplitude,
const double wave_length,ExceptionInfo *exception)
{
#define WaveImageTag "Wave/Image"
CacheView
*image_view,
*wave_view;
float
*sine_map;
Image
*wave_image;
MagickBooleanType
status;
MagickOffsetType
prog... | MagickExport Image *WaveImage(const Image *image,const double amplitude,
const double wave_length,ExceptionInfo *exception)
{
#define WaveImageTag "Wave/Image"
CacheView
*image_view,
*wave_view;
float
*sine_map;
Image
*wave_image;
MagickBooleanType
status;
MagickOffsetType
prog... | CVE-2021-20309 | CWE-369 | A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability. | https://github.com/ImageMagick/ImageMagick6/commit/f1e68d22d1b35459421710587a0dcbab6900b51f | https://github.com/ImageMagick/ImageMagick/issues/3296 | null | null | 2021-02-26T00:34:36Z |
static int mpeg4_decode_sprite_trajectory(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
int a = 2 << s->sprite_warping_accuracy;
int rho = 3 - s->sprite_warping_accuracy;
int r = 16 / a;
int alpha = 0;
int beta = 0;
int w = s->width;
int h = ... | static int mpeg4_decode_sprite_trajectory(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
int a = 2 << s->sprite_warping_accuracy;
int rho = 3 - s->sprite_warping_accuracy;
int r = 16 / a;
int alpha = 0;
int beta = 0;
int w = s->width;
int h = ... | null | null | null | FFmpeg/commit/76ba09d18245a2a41dc5f93a60fd00cdf358cb1f | avcodec/mpeg4videodec: Check the other 3 sprite points for intermediate overflows
This is not necessarily specific to fuzzed files
Fixes: Multiple integer overflows
Fixes: 656/clusterfuzz-testcase-6463814516080640
Fixes: 658/clusterfuzz-testcase-6691260146384896
Found-by: continuous fuzzing process https://github.co... | ./ffmpeg/libavcodec/mpeg4videodec.c | c | 2017-02-23T21:33:16Z |
echo '<input type="hidden" name="' . esc_attr( $field ) . '" value="' . esc_attr( wp_unslash( $_POST[ $field ] ) ) . '" />';
} | echo '<input type="hidden" name="' . esc_attr( $field ) . '" value="' . esc_attr( $submitted_form[ $field ] ) . '" />';
}
?>
<p class="request-filesystem-credentials-action-buttons">
<?php wp_nonce_field( 'filesystem-credentials', '_fs_nonce', false, true ); ?>
<button class="button cancel-button" data-js-action="... | CVE-2017-9064 | CWE-352 | In WordPress before 4.7.5, a Cross Site Request Forgery (CSRF) vulnerability exists in the filesystem credentials dialog because a nonce is not required for updating credentials. | https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67 | Add nonce for updating file system credentials.
Built from https://develop.svn.wordpress.org/trunk@40723
git-svn-id: http://core.svn.wordpress.org/trunk@40581 1a063a9b-81f0-0310-95a4-ce76da25c4cd | updates.min.js | js | 2017-05-18T14:29:00Z |
snmp_mib_find_next(uint32_t *oid)
{
snmp_mib_resource_t *resource;
resource = NULL;
for(resource = list_head(snmp_mib);
resource; resource = resource->next) {
if(snmp_oid_cmp_oid(resource->oid, oid) > 0) {
return resource;
}
}
return NULL;
} | snmp_mib_find_next(snmp_oid_t *oid)
{
snmp_mib_resource_t *resource;
resource = NULL;
for(resource = list_head(snmp_mib);
resource; resource = resource->next) {
if(snmp_mib_cmp_oid(&resource->oid, oid) > 0) {
return resource;
}
}
return NULL;
} | CVE-2020-12141 | CWE-125 | An out-of-bounds read in the SNMP stack in Contiki-NG 4.4 and earlier allows an attacker to cause a denial of service and potentially disclose information via crafted SNMP packets to snmp_ber_decode_string_len_buffer in os/net/app-layer/snmp/snmp-ber.c. | https://github.com/contiki-ng/contiki-ng/commit/12c824386ab60de757de5001974d73b32e19ad71 | Refactored SNMP engine after vulnerabilities | snmp-engine.c | c | 2021-10-19T16:15:00Z |
static int aac_adtstoasc_filter(AVBitStreamFilterContext *bsfc,
AVCodecContext *avctx, const char *args,
uint8_t **poutbuf, int *poutbuf_size,
const uint8_t *buf, int buf_size,
int keyfr... | static int aac_adtstoasc_filter(AVBitStreamFilterContext *bsfc,
AVCodecContext *avctx, const char *args,
uint8_t **poutbuf, int *poutbuf_size,
const uint8_t *buf, int buf_size,
int keyfr... | null | null | null | FFmpeg/commit/889afca369ef3a939c68592ef2b1a1756667ce21 | avcodec/aac_adtstoasc_bsf: Fix memory leak
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | ./ffmpeg/libavcodec/aac_adtstoasc_bsf.c | c | 2014-02-03T01:16:01Z |
static void build_dirs(char *src, char *dst, size_t src_prefix_len, size_t dst_prefix_len) {
char *p = src + src_prefix_len + 1;
char *q = dst + dst_prefix_len + 1;
char *r = dst + dst_prefix_len;
struct stat s;
bool last = false;
*r = '\0';
for (; !last; p++, q++) {
if (*p == '\0') {
last = true;
}
if ... | static void build_dirs(char *src, char *dst, size_t src_prefix_len, size_t dst_prefix_len) {
char *p = src + src_prefix_len + 1;
char *q = dst + dst_prefix_len + 1;
char *r = dst + dst_prefix_len;
struct stat s;
bool last = false;
*r = '\0';
for (; !last; p++, q++) {
if (*p == '\0') {
last = true;
}
if ... | CVE-2022-31214 | CWE-94 | A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user namespace is still the initial user namespace, the NO_NEW_PRIVS... | https://github.com/netblue30/firejail/commit/1884ea22a90d225950d81c804f1771b42ae55f54 | CVE-2022-31214: fixing the fix, one more time
the previous commit "CVE-2022-31214: fixing the fix"
made private-etc=fonts,fonts and similar commands
fail with an error
fix that regression by tolerating already existing
directories | null | null | 2022-06-08T13:42:35Z |
sendDigest(username, lastSeenAt, email) {
return ajax("/admin/email/send-digest.json", {
data: { last_seen_at: lastSeenAt || oneWeekAgo(), username, email },
});
} | sendDigest(username, lastSeenAt, email) {
return ajax("/admin/email/send-digest.json", {
type: "POST",
data: { last_seen_at: lastSeenAt || oneWeekAgo(), username, email },
});
} | CVE-2022-23546 | CWE-200,CWE-200 | In version 2.9.0.beta14 of Discourse, an open-source discussion platform, maliciously embedded urls can leak an admin's digest of recent topics, possibly exposing private information. A patch is available for version 2.9.0.beta15. There are no known workarounds for this issue. | https://github.com/discourse/discourse/commit/cf862e736565c6fa905c12b5dbe63d0bd056efb8 | SECURITY: Convert send_digest to a post request (#19746)
Co-authored-by: Isaac Janzen <isaac.janzen@discourse.org> | app/assets/javascripts/admin/addon/models/email-preview.js | js | 2023-01-04T22:57:12Z |
void svc_rdma_send_error(struct svcxprt_rdma *xprt, struct rpcrdma_msg *rmsgp,
int status)
{
struct ib_send_wr err_wr;
struct page *p;
struct svc_rdma_op_ctxt *ctxt;
enum rpcrdma_errcode err;
__be32 *va;
int length;
int ret;
ret = svc_rdma_repost_recv(xprt, GFP_KERNEL);
if (ret)
return;
p = alloc_page(G... | void svc_rdma_send_error(struct svcxprt_rdma *xprt, struct rpcrdma_msg *rmsgp, | CVE-2017-9059 | CWE-404 | The NFSv4 implementation in the Linux kernel through 4.11.1 allows local users to cause a denial of service (resource consumption) by leveraging improper channel callback shutdown when unmounting an NFSv4 filesystem, aka a "module reference and kernel daemon" leak. | https://github.com/torvalds/linux/commit/c70422f760c120480fee4de6c38804c72aa26bc1 | Merge tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux
Pull nfsd updates from Bruce Fields:
"Another RDMA update from Chuck Lever, and a bunch of miscellaneous
bugfixes"
* tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux: (26 commits)
nfsd: Fix up the "supattr_exclcreat" attributes
nfsd: encoders mus... | net/sunrpc/xprtrdma/svc_rdma_sendto.c | c | 2017-05-10T20:29:23Z |
SCSIDevice *scsi_bus_legacy_add_drive(SCSIBus *bus, DriveInfo *dinfo, int unit)
{
const char *driver;
DeviceState *dev;
driver = bdrv_is_sg(dinfo->bdrv) ? "scsi-generic" : "scsi-disk";
dev = qdev_create(&bus->qbus, driver);
qdev_prop_set_uint32(dev, "scsi-id", unit);
qdev_prop_set_drive(dev, "dr... | SCSIDevice *scsi_bus_legacy_add_drive(SCSIBus *bus, DriveInfo *dinfo, int unit)
{
const char *driver;
DeviceState *dev;
driver = bdrv_is_sg(dinfo->bdrv) ? "scsi-generic" : "scsi-disk";
dev = qdev_create(&bus->qbus, driver);
qdev_prop_set_uint32(dev, "scsi-id", unit);
qdev_prop_set_drive(dev, "dr... | null | null | null | qemu/commit/33e66b86d89040f0a9e99aa53deb74ce8936a649 | Check return value of qdev_init()
But do so only where it may actually fail. Leave the rest for the
next commit.
Patchworks-ID: 35167
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com> | ./qemu/hw/scsi-bus.c | c | 2009-10-06T23:15:57Z |
PKL_ReplyLength(CMD_Reply *r)
{
int type;
type = ntohs(r->reply);
/* Note that reply type codes start from 1, not 0 */
if (type < 1 || type >= N_REPLY_TYPES) {
return 0;
} else {
switch (type) {
case RPY_NULL:
return offsetof(CMD_Reply, data.null.EOR);
case RPY_N_SOURCES:
r... | PKL_ReplyLength(CMD_Reply *r)
{
int type;
type = ntohs(r->reply);
/* Note that reply type codes start from 1, not 0 */
if (type < 1 || type >= N_REPLY_TYPES) {
return 0;
} else {
switch (type) {
case RPY_NULL:
return offsetof(CMD_Reply, data.null.EOR);
case RPY_N_SOURCES:
r... | CVE-2012-4502 | CWE-189 | Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACC... | http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git;a=commitdiff;h=7712455d9aa33d0db0945effaa07e900b85987b1 | Fix buffer overflow when processing crafted command packets
When the length of the REQ_SUBNETS_ACCESSED, REQ_CLIENT_ACCESSES
command requests and the RPY_SUBNETS_ACCESSED, RPY_CLIENT_ACCESSES,
RPY_CLIENT_ACCESSES_BY_INDEX, RPY_MANUAL_LIST command replies is
calculated, the number of items stored in the packet is not v... | null | null | null |
if (typeof content === 'string') {
return renderHTML(content);
} | if (typeof content === 'string') {
return renderHTML(sanitize(content));
} | CVE-2021-25990 | CWE-79,CWE-79 | In “ifme”, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe. | https://github.com/ifmeorg/ifme/commit/83fd44ef8921a8dcf394a012e44901ab08596bdc | [#2052] Sanitize string content in renderContent | client/app/utils/index.js | js | 2021-11-18T23:03:30Z |
eap_request(esp, inp, id, len)
eap_state *esp;
u_char *inp;
int id;
int len;
{
u_char typenum;
u_char vallen;
int secret_len;
char secret[MAXWORDLEN];
char rhostname[256];
MD5_CTX mdContext;
u_char hash[MD5_SIGNATURE_SIZE];
#ifdef USE_SRP
struct t_client *tc;
struct t_num sval, gval, Nval, *Ap, Bval;
u_char v... | eap_request(esp, inp, id, len)
eap_state *esp;
u_char *inp;
int id;
int len;
{
u_char typenum;
u_char vallen;
int secret_len;
char secret[MAXWORDLEN];
char rhostname[256];
MD5_CTX mdContext;
u_char hash[MD5_SIGNATURE_SIZE];
#ifdef USE_SRP
struct t_client *tc;
struct t_num sval, gval, Nval, *Ap, Bval;
u_char v... | CVE-2020-8597 | CWE-120 | eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions. | https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426 | pppd: Fix bounds check in EAP code
Given that we have just checked vallen < len, it can never be the case
that vallen >= len + sizeof(rhostname). This fixes the check so we
actually avoid overflowing the rhostname array.
Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by: Paul Mackerras <paulus... | eap.c | c | 2020-02-03T04:53:28Z |
public function view($id = FALSE)
{
$this->template->header->this_page = 'reports';
$this->template->content = new View('reports/detail');
// Load Akismet API Key (Spam Blocker)
$api_akismet = Kohana::config('settings.api_akismet');
// Sanitize the report id before proceeding
$id = intval($id);
if ($i... | public function view($id = FALSE)
{
$this->template->header->this_page = 'reports';
$this->template->content = new View('reports/detail');
// Load Akismet API Key (Spam Blocker)
$api_akismet = Kohana::config('settings.api_akismet');
// Sanitize the report id before proceeding
$id = intval($id);
if ($i... | CVE-2013-2025 | CWE-79 | Cross-site scripting (XSS) vulnerability in Ushahidi Platform 2.5.x through 2.6.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | https://github.com/rjmackay/Ushahidi_Web/commit/593719ff805a302e3ab2f2e535c875f90a04ea56 | Better XSS protection
* Add HTMLPurifier library (LGPL)
* Add helper functions to html helper
* Set default encoding header to UTF-8
* Make sure the doctype is the same everywhere (admin/members/frontend)
* Remove use of strip_tags() and htmlspecialchars()
* Replace vanilla htmlentities with html::escape() - make sure... | actions.php | php | 2014-04-25T17:12:00Z |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t count = m->str... | private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t count = m->str... | CVE-2014-1943 | CWE-755 | Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file. | https://github.com/glensc/file/commit/c0c0032b9e9eb57b91fefef905a3b018bab492d9 | Fix memory leak (Anatol Belski) | softmagic.c | c | 2014-02-21T14:32:48Z |
@Packet
public void onFlying(WrappedInFlyingPacket packet, long timeStamp) {
if(packet.isPos()) {
//We check if the player is in ground, since theoretically the y should be zero.
double lDeltaY = data.playerInfo.lClientGround ? 0 : data.playerInfo.lDeltaY;
double predicte... | @Packet
public void onFlying(WrappedInFlyingPacket packet, long timeStamp) {
if(packet.isPos()) {
//We check if the player is in ground, since theoretically the y should be zero.
double lDeltaY = data.playerInfo.lClientGround ? 0 : data.playerInfo.lDeltaY;
double predicte... | null | null | null | https://github.com/funkemunky/Kauri/commit/adf2ce7af96a807e24dda13081b8578a7a25aa2f | Disabler fix, speed bypass fix, webhook impl | Regular/src/main/java/dev/brighten/anticheat/check/impl/movement/fly/FlyB.java | java | 2021-03-06T16:10:51Z |
@NonNull
public static String ascii(String string) {
return string.replaceAll("[\\x00-\\x1F\\x2F\\x7F]", "");
} | @NonNull
public static String ascii(String string) {
return string == null ? "Unknown" : string.replaceAll("[\\x00-\\x1F\\x2F\\x7F]", "");
} | null | null | null | https://github.com/dkanada/gelli/commit/24cb549681145171b27a9cce929531db5ada4bd8 | possible fix for null value crash | app/src/main/java/com/dkanada/gramophone/util/MusicUtil.java | java | 2021-06-06T07:17:19Z |
static ssize_t prevent_suspend_time_ms_show(struct device *dev,
struct device_attribute *attr,
char *buf)
{
struct wakeup_source *ws = dev_get_drvdata(dev);
ktime_t prevent_sleep_time = ws->prevent_sleep_time;
if (ws->active && ws->autosleep_enabled) {
prevent_sleep_time = ktime_add(prevent_slee... | static ssize_t prevent_suspend_time_ms_show(struct device *dev,
struct device_attribute *attr,
char *buf)
{
struct wakeup_source *ws = dev_get_drvdata(dev);
ktime_t prevent_sleep_time = ws->prevent_sleep_time;
if (ws->active && ws->autosleep_enabled) {
prevent_sleep_time = ktime_add(prevent_slee... | null | CWE-787 | null | https://github.com/torvalds/linux/commit/aa838896d87af561a33ecefea1caa4c15a68bc47 | drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions
Convert the various sprintf fmaily calls in sysfs device show functions
to sysfs_emit and sysfs_emit_at for PAGE_SIZE buffer safety.
Done with:
$ spatch -sp-file sysfs_emit_dev.cocci --in-place --max-width=80 .
And cocci script:
$ cat s... | null | null | 2020-09-16T20:40:39Z |
int ssl3_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf,
int len, int peek)
{
int al, i, j, ret;
unsigned int n, curr_rec, num_recs, read_bytes;
SSL3_RECORD *rr;
SSL3_BUFFER *rbuf;
void (*cb) (const SSL *ssl, int type2, int val) = NULL;
rbuf = &s->rlayer.rb... | int ssl3_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf,
int len, int peek)
{
int al, i, j, ret;
unsigned int n, curr_rec, num_recs, read_bytes;
SSL3_RECORD *rr;
SSL3_BUFFER *rbuf;
void (*cb) (const SSL *ssl, int type2, int val) = NULL;
rbuf = &s->rlayer.rb... | CVE-2016-6305 | CWE-20 | The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call. | https://git.openssl.org/?p=openssl.git;a=commitdiff;h=63658103d4441924f8dbfc517b99bb54758a98b9 | Fix a hang with SSL_peek()
If while calling SSL_peek() we read an empty record then we go into an
infinite loop, continually trying to read data from the empty record and
never making any progress. This could be exploited by a malicious peer in
a Denial Of Service attack.
CVE-2016-6305
GitHub Issue #1563
Reviewed-b... | null | null | null |
def queryRuntimeInformationMultiple(self, info_name, setup_codes, values):
info_name = self.plugin_name.replace("-", "_") + "_" + info_name
if info_name in self._runtime_information_cache:
return self._runtime_information_cache[info_name]
keys = []
query_codes = []
... | def queryRuntimeInformationMultiple(self, info_name, setup_codes, values):
info_name = self.plugin_name.replace("-", "_") + "_" + info_name
if info_name in self._runtime_information_cache:
return self._runtime_information_cache[info_name]
keys = []
query_codes = []
... | null | null | null | https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcad | Cleanup, avoid using "eval" where "ast.literal_eval" can be used. | nuitka/plugins/PluginBase.py | py | 2022-06-09T13:06:57Z |
sp<MediaSource> MPEG4Extractor::getTrack(size_t index) {
status_t err;
if ((err = readMetaData()) != OK) {
return NULL;
}
Track *track = mFirstTrack;
while (index > 0) {
if (track == NULL) {
return NULL;
}
track = track->next;
--index;
}
if (track == NULL) {
return NULL;
}
Trex *trex = NULL;... | sp<MediaSource> MPEG4Extractor::getTrack(size_t index) {
status_t err;
if ((err = readMetaData()) != OK) {
return NULL;
}
Track *track = mFirstTrack;
while (index > 0) {
if (track == NULL) {
return NULL;
}
track = track->next;
--index;
}
if (track == NULL) {
return NULL;
}
Trex *trex = NULL;... | CVE-2016-2508 | CWE-119 | media/libmediaplayerservice/nuplayer/GenericSource.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate certain track data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafte... | https://android.googlesource.com/platform/frameworks/av/+/f81038006b4c59a5a148dcad887371206033c28f | MPEG4Extractor: ensure kKeyTrackID exists before creating an MPEG4Source as track.
GenericSource: return error when no track exists.
SampleIterator: make sure mSamplesPerChunk is not zero before using it as divisor.
Bug: 21657957
Bug: 23705695
Bug: 22802344
Bug: 28799341
Change-Id: I7664992ade90b935d3f255dcd43ecc289... | media/libstagefright/MPEG4Extractor.cpp | cpp | null |
static void new_pes_packet(PESContext *pes, AVPacket *pkt)
{
av_init_packet(pkt);
pkt->destruct = av_destruct_packet;
pkt->data = pes->buffer;
pkt->size = pes->data_index;
memset(pkt->data+pkt->size, 0, FF_INPUT_BUFFER_PADDING_SIZE);
if (pes->sub_st && pes->stream_type == 0x83 && pes->exten... | static void new_pes_packet(PESContext *pes, AVPacket *pkt)
{
av_init_packet(pkt);
pkt->destruct = av_destruct_packet;
pkt->data = pes->buffer;
pkt->size = pes->data_index;
memset(pkt->data+pkt->size, 0, FF_INPUT_BUFFER_PADDING_SIZE);
if (pes->sub_st && pes->stream_type == 0x83 && pes->exten... | null | null | null | FFmpeg/commit/ce9e31655e5b8f8db3bb4f13f436fc836062a514 | mpegts: Mark corrupted packets
Signed-off-by: Zohar Kelrich <lumimies@gmail.com>
Signed-off-by: Luca Barbato <lu_zero@gentoo.org> | ./ffmpeg/libavformat/mpegts.c | c | 2011-07-24T08:13:50Z |
stringprep_utf8_to_ucs4 (const char *str, ssize_t len, size_t * items_written)
{
return g_utf8_to_ucs4_fast (str, (glong) len, (glong *) items_written);
} | stringprep_utf8_to_ucs4 (const char *str, ssize_t len, size_t * items_written)
{
size_t n;
if (len < 0)
n = strlen (str);
else
n = len;
if (u8_check ((const uint8_t *) str, n))
return NULL;
return g_utf8_to_ucs4_fast (str, (glong) len, (glong *) items_written);
} | null | null | null | null | libidn: stringprep_utf8_to_ucs4 now rejects invalid UTF-8. CVE-2015-2059 | null | null | null |
static int toneport_setup(struct usb_line6_toneport *toneport)
{
u32 *ticks;
struct usb_line6 *line6 = &toneport->line6;
struct usb_device *usbdev = line6->usbdev;
ticks = kmalloc(sizeof(*ticks), GFP_KERNEL);
if (!ticks)
return -ENOMEM;
/* sync time on device with host: */
/* note: 32-bit timestamps overflow... | static int toneport_setup(struct usb_line6_toneport *toneport)
{
u32 *ticks;
struct usb_line6 *line6 = &toneport->line6;
struct usb_device *usbdev = line6->usbdev;
ticks = kmalloc(sizeof(*ticks), GFP_KERNEL);
if (!ticks)
return -ENOMEM;
/* sync time on device with host: */
/* note: 32-bit timestamps overflow... | CVE-2019-15223 | CWE-476 | An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/driver.c driver. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b074ab7fc0d575247b9cc9f93bb7e007ca38840 | ALSA: line6: Assure canceling delayed work at disconnection
The current code performs the cancel of a delayed work at the late
stage of disconnection procedure, which may lead to the access to the
already cleared state.
This patch assures to call cancel_delayed_work_sync() at the beginning
of the disconnection proced... | null | null | null |
static void _php_do_opendir(INTERNAL_FUNCTION_PARAMETERS, int createobject)
{
char *dirname;
int dir_len;
zval *zcontext = NULL;
php_stream_context *context = NULL;
php_stream *dirp;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|r", &dirname, &dir_len, &zcontext) == FAILURE) {
RETURN_NULL();
}
con... | static void _php_do_opendir(INTERNAL_FUNCTION_PARAMETERS, int createobject)
{
char *dirname;
int dir_len;
zval *zcontext = NULL;
php_stream_context *context = NULL;
php_stream *dirp;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "p|r", &dirname, &dir_len, &zcontext) == FAILURE) {
RETURN_NULL();
}
con... | CVE-2015-4025 | CWE-19 | PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) ... | http://git.php.net/?p=php-src.git;a=commitdiff;h=be9b2a95adb504abd5acdc092d770444ad6f6854 | Fixed bug #69418 - more s->p fixes for filenames | null | null | null |
rsvg_new_text (void)
{
RsvgNodeText *text;
text = g_new (RsvgNodeText, 1);
_rsvg_node_init (&text->super);
text->super.draw = _rsvg_node_text_draw;
text->super.set_atts = _rsvg_node_text_set_atts;
text->x = text->y = text->dx = text->dy = _rsvg_css_parse_length ("0");
return &text->super;
} | rsvg_new_text (void)
{
RsvgNodeText *text;
text = g_new (RsvgNodeText, 1);
_rsvg_node_init (&text->super, RSVG_NODE_TYPE_TEXT);
text->super.draw = _rsvg_node_text_draw;
text->super.set_atts = _rsvg_node_text_set_atts;
text->x = text->y = text->dx = text->dy = _rsvg_css_parse_length ("0");
re... | CVE-2011-3146 | null | librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive... | http://git.gnome.org/browse/librsvg/commit/?id=34c95743ca692ea0e44778e41a7c0a129363de84 | Store node type separately in RsvgNode
The node name (formerly RsvgNode:type) cannot be used to infer
the sub-type of RsvgNode that we're dealing with, since for unknown
elements we put type = node-name. This lead to a (potentially exploitable)
crash e.g. when the element name started with "fe" which tricked
the old c... | null | null | null |
static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern,
const String& replacement,
const String& str,
const String& option,
... | static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern,
const String& replacement,
const String& str,
const String& option,
... | CVE-2019-11935 | CWE-120,CWE-125 | Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1. | https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7 | Fix buffer overflow in mb_ereg_replace
Summary:
This diff has already been landed to release and to open-source branches. We're now landing it on master.
CVE-2019-11935
Reviewed By: jjergus
Differential Revision: D18177934
fbshipit-source-id: d108a59e38c67f5f5e835febd7255307605ba62c | ext_mbstring.cpp | cpp | 2019-10-29T03:20:37Z |
int getDescFlags(final int i) throws MemoryAccessException {
return (int) memoryMap.load(descIndexToAddress(i) + VIRTQ_DESC_FLAGS, Sizes.SIZE_16_LOG2) & 0xFFFF;
} | short getDescFlags(final int i) throws MemoryAccessException {
return (short) memoryMap.load(descIndexToAddress(i) + VIRTQ_DESC_FLAGS, Sizes.SIZE_16_LOG2);
} | null | null | null | https://github.com/fnuecke/sedna/commit/ae93820014397840d62f2572e720b710ac368276 | Use shorts where we actually have shorts, fixes potential infinite loop when next available index is exactly the wrap point (0x8000, which as int will never equal a short value). | src/main/java/li/cil/sedna/device/virtio/AbstractVirtIODevice.java | java | 2022-07-19T21:31:56Z |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.