func_before
stringlengths
10
482k
func_after
stringlengths
14
484k
cve_id
stringlengths
13
28
cwe_id
stringclasses
776 values
cve_description
stringlengths
30
3.31k
commit_link
stringlengths
48
164
commit_message
stringlengths
1
30.3k
file_name
stringlengths
4
244
extension
stringclasses
20 values
datetime
stringdate
1999-11-10 02:42:49
2024-01-29 16:00:57
init: function() { // Load saved config var _self = this, fields = [ 'html', 'xhtmlOut', 'breaks', 'langPrefix', 'linkify', 'typographer' ], defaults = { 'html': false, 'xhtmlOut': true, 'breaks': true, 'langPrefix': 'language-', 'linkify': true, 'typogra...
init: function() { // Load saved config var _self = this, fields = [ 'html', 'xhtmlOut', 'breaks', 'langPrefix', 'linkify', 'typographer' ], defaults = { 'html': false, 'xhtmlOut': true, 'breaks': true, 'langPrefix': 'language-', 'linkify': true, 'typogra...
CVE-2015-3296
CWE-79
Multiple cross-site scripting (XSS) vulnerabilities in NodeBB before 0.7 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) javascript: or (2) data: URLs.
https://github.com/julianlam/nodebb-plugin-markdown/commit/ab7f2684750882f7baefbfa31db8d5aac71e6ec3
updated plugin to use markdown-it instead of remarkable, and updated validateLink method to discard all data-uris, until a solution is developed upstream.
index.js
js
2017-09-21T14:29:00Z
void Display::startAuth(const QString &user, const QString &password, const Session &session) { m_passPhrase = password; // sanity check if (!session.isValid()) { qCritical() << "Invalid session" << session.fileName(); return; } if (session.xdgSessionType...
void Display::startAuth(const QString &user, const QString &password, const Session &session) { m_passPhrase = password; // sanity check if (!session.isValid()) { qCritical() << "Invalid session" << session.fileName(); return; } if (session.xdgSessionType...
CVE-2018-14345
CWE-284
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98
Fix authentication when reusing an existing session - Check the success value before unlocking the session - Don't attempt to use the nonexistant "sddm-check" PAM service
Display.cpp
cpp
2018-07-11T17:45:40Z
func NewReader(src io.Reader, size int64, md5Hex, sha256Hex string) (*Reader, error) { if _, ok := src.(*Reader); ok { return nil, errNestedReader } sha256sum, err := hex.DecodeString(sha256Hex) if err != nil { return nil, SHA256Mismatch{} } md5sum, err := hex.DecodeString(md5Hex) if err != nil { return ...
func NewReader(src io.Reader, size int64, md5Hex, sha256Hex string) (*Reader, error) { if _, ok := src.(*Reader); ok { return nil, errNestedReader } sha256sum, err := hex.DecodeString(sha256Hex) if err != nil { return nil, SHA256Mismatch{} } md5sum, err := hex.DecodeString(md5Hex) if err != nil { return ...
CVE-2018-1000538
CWE-774
Minio Inc. Minio S3 server version prior to RELEASE.2018-05-16T23-35-33Z contains a Allocation of Memory Without Limits or Throttling (similar to CWE-774) vulnerability in write-to-RAM that can result in Denial of Service. This attack appear to be exploitable via Sending V4-(pre)signed requests with large bodies . This...
https://github.com/minio/minio/commit/9c8b7306f55f2c8c0a5c7cea9a8db9d34be8faa7
security: fix write-to-RAM DoS vulnerability (#5957) This commit fixes a DoS vulnerability for certain APIs using signature V4 by verifying the content-md5 and/or content-sha56 of the request body in a streaming mode. The issue was caused by reading the entire body of the request into memory to verify the content-md5...
auth-handler.go
go
2018-06-26T16:29:00Z
static uint64_t get_vb(ByteIOContext *bc){ uint64_t val=0; int i= get_v(bc); if(i>8) return UINT64_MAX; while(i--) val = (val<<8) + get_byte(bc); return val; }
static uint64_t get_vb(ByteIOContext *bc){ uint64_t val=0; unsigned int i= get_v(bc); if(i>8) return UINT64_MAX; while(i--) val = (val<<8) + get_byte(bc); return val; }
null
null
null
FFmpeg/commit/568e18b15e2ddf494fd8926707d34ca08c8edce5
integer overflows, heap corruption possible arbitrary code execution cannot be ruled out in some cases precautionary checks Originally committed as revision 3813 to svn://svn.ffmpeg.org/ffmpeg/trunk
./ffmpeg/libavformat/nut.c
c
2005-01-08T14:21:33Z
function PMA_TRI_getRowForList($trigger, $rowclass = '') { global $ajax_class, $url_query, $db, $table, $titles; $retval = " <tr class='noclick $rowclass'>\n"; $retval .= " <td>\n"; $retval .= " <span class='drop_sql hide'>" . htmlspecialchars($trigger['drop'])...
function PMA_TRI_getRowForList($trigger, $rowclass = '') { global $ajax_class, $url_query, $db, $table, $titles; $retval = " <tr class='noclick $rowclass'>\n"; $retval .= " <td>\n"; $retval .= " <span class='drop_sql hide'>" . htmlspecialchars($trigger['drop'])...
CVE-2014-4955
CWE-79
Cross-site scripting (XSS) vulnerability in the PMA_TRI_getRowForList function in libraries/rte/rte_list.lib.php in phpMyAdmin 4.0.x before 4.0.10.1, 4.1.x before 4.1.14.2, and 4.2.x before 4.2.6 allows remote authenticated users to inject arbitrary web script or HTML via a crafted trigger name that is improperly handl...
https://github.com/phpmyadmin/phpmyadmin/commit/10014d4dc596b9e3a491bf04f3e708cf1887d5e1
bug #4488 [security] XSS injection due to unescaped table name (triggers) Signed-off-by: Marc Delisle <marc@infomarc.info>
rte_list.lib.php
php
2014-07-20T11:12:00Z
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { const TfLitePackParams* data = reinterpret_cast<TfLitePackParams*>(node->builtin_data); TfLiteTensor* output = GetOutput(context, node, kOutputTensor); switch (output->type) { case kTfLiteFloat32: { return PackImpl<float>(context, node...
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { const TfLitePackParams* data = reinterpret_cast<TfLitePackParams*>(node->builtin_data); TfLiteTensor* output; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, kOutputTensor, &output)); switch (output->type) { cas...
CVE-2020-15211
CWE-125,CWE-787
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, inde...
https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35
[tflite]: Insert `nullptr` checks when obtaining tensors. As part of ongoing refactoring, `tflite::GetInput`, `tflite::GetOutput`, `tflite::GetTemporary` and `tflite::GetIntermediates` will return `nullptr` in some cases. Hence, we insert the `nullptr` checks on all usages. We also insert `nullptr` checks on usages o...
add_n.cc
cc
2020-09-25T19:15:00Z
poly_in(PG_FUNCTION_ARGS) { char *str = PG_GETARG_CSTRING(0); POLYGON *poly; int npts; int size; int isopen; char *s; if ((npts = pair_count(str, ',')) <= 0) ereport(ERROR, (errcode(ERRCODE_INVALID_TEXT_REPRESENTATION), errmsg("invalid input syntax for type polygon: \"%s\"", str))); ...
poly_in(PG_FUNCTION_ARGS) { char *str = PG_GETARG_CSTRING(0); POLYGON *poly; int npts; int size; int base_size; int isopen; char *s; if ((npts = pair_count(str, ',')) <= 0) ereport(ERROR, (errcode(ERRCODE_INVALID_TEXT_REPRESENTATION), errmsg("invalid input syntax for type polygon: \...
CVE-2014-0064
CWE-189
Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif...
https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a
Predict integer overflow to avoid buffer overruns. Several functions, mostly type input functions, calculated an allocation size such that the calculation wrapped to a small positive value when arguments implied a sufficiently-large requirement. Writes past the end of the inadvertent small allocation followed shortly...
txid.c
c
2014-02-17T14:33:31Z
public void encodeHeadersAndProperties(final ByteBuf buffer) { final TypedProperties properties = getProperties(); messageIDPosition = buffer.writerIndex(); buffer.writeLong(messageID); SimpleString.writeNullableSimpleString(buffer, address); if (userID == null) { buffer.writeByte...
public void encodeHeadersAndProperties(final ByteBuf buffer) { final TypedProperties properties = getProperties(); final int initialWriterIndex = buffer.writerIndex(); messageIDPosition = initialWriterIndex; final UUID userID = this.userID; final int userIDEncodedSize = userID == null ? By...
null
null
null
https://github.com/apache/activemq-artemis/commit/ad4f6a133af9130f206a78e43ad387d4e3ee5f8f
ARTEMIS-3021 OOM due to wrong CORE clustered message memory estimation
artemis-core-client/src/main/java/org/apache/activemq/artemis/core/message/impl/CoreMessage.java
java
2020-12-05T23:07:29Z
int libsoc_pwm_get_polarity(pwm *pwm) { int polarity; char path[STR_BUF]; char tmp_str[1]; if (pwm == NULL) { libsoc_pwm_debug(__func__, -1, -1, "invalid pwm pointer"); return EXIT_FAILURE; } sprintf(path, "/sys/class/pwm/pwmchip%d/pwm%d/polarity", pwm->chip, pwm->pwm); if (file_read_str(path...
int libsoc_pwm_get_polarity(pwm *pwm) { int polarity; char path[STR_BUF]; char tmp_str[1]; if (pwm == NULL) { libsoc_pwm_debug(__func__, -1, -1, "invalid pwm pointer"); return EXIT_FAILURE; } sprintf(path, "/sys/class/pwm/pwmchip%d/pwm%d/polarity", pwm->chip, pwm->pwm); if (file_read_str(path...
null
cwe-119
null
github.com/jackmitch/libsoc/commit/f4e262dd1de930388f22b779b8ab13d5b89db31e
pwm: fix subscription error tmp_str array has a size of 1, so tmp_str[1] access is out of range. Besides file_read_str() reads only one byte and strncmp() compares only one byte too. Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
pwm.c
c
2014-01-26T10:19:05Z
static void unzzip_cat_file(ZZIP_DIR* disk, char* name, FILE* out) { ZZIP_FILE* file = zzip_fopen(name, "rb"); if (file) { char buffer[1024]; int len; while ((len = zzip_fread (buffer, 1, 1024, file))) { fwrite (buffer, 1, len, out); } zzip_fclose (file); } }
static void unzzip_cat_file(ZZIP_DIR* disk, char* name, FILE* out) { ZZIP_FILE* file = zzip_fopen(name, "rb"); if (file) { char buffer[1024]; int len; while (0 < (len = zzip_fread (buffer, 1, 1024, file))) { fwrite (buffer, 1, len, out); } zzip_fclose (file); } }
null
null
null
https://github.com/gdraheim/zziplib/commit/a34a96fbda1e58fbec5c79f4c0b5063e031ce11d
#68 return value of zzip_fread is signed
bins/unzzipcat-mix.c
c
2021-01-04T20:52:47Z
static void gen_spr_74xx (CPUPPCState *env) { spr_register(env, SPR_PIR, "PIR", SPR_NOACCESS, SPR_NOACCESS, &spr_read_generic, &spr_write_pir, 0x00000000); spr_register(env, SPR_MMCR2, "MMCR2", SPR_NOACCESS, SPR_NOACCESS, ...
static void gen_spr_74xx (CPUPPCState *env) { spr_register(env, SPR_PIR, "PIR", SPR_NOACCESS, SPR_NOACCESS, &spr_read_generic, &spr_write_pir, 0x00000000); spr_register(env, SPR_MMCR2, "MMCR2", SPR_NOACCESS, SPR_NOACCESS, ...
null
null
null
qemu/commit/9633fcc6a02f23e3ef00aa5fe3fe9c41f57c3456
PPC: Fix L2CR write accesses Commit 2345f1c01 was supposed to render L2CR writes into noops. Instead, it made them illegal instruction traps which apparently didn't confuse XNU, but can easily confuse other OSs. Fix it up by actually doing nothing when we write to L2CR. Reported-by: Julio Guerra <guerr@julio.in> Sig...
./qemu/target-ppc/translate_init.c
c
2013-09-25T13:41:12Z
server_client_create(int fd) { struct client *c; setblocking(fd, 0); c = xcalloc(1, sizeof *c); c->references = 1; c->peer = proc_add_peer(server_proc, fd, server_client_dispatch, c); if (gettimeofday(&c->creation_time, NULL) != 0) fatal("gettimeofday failed"); memcpy(&c->activity_time, &c->creation_time, s...
server_client_create(int fd) { struct client *c; setblocking(fd, 0); c = xcalloc(1, sizeof *c); c->references = 1; c->peer = proc_add_peer(server_proc, fd, server_client_dispatch, c); if (gettimeofday(&c->creation_time, NULL) != 0) fatal("gettimeofday failed"); memcpy(&c->activity_time, &c->creation_time, s...
CVE-2018-19387
null
null
https://github.com/openbsd/src/commit/b32e1d34e10a0da806823f57f02a4ae6e93d756e
evbuffer_new and bufferevent_new can both fail (when malloc fails) and return NULL. GitHub issue 1547.
null
null
2018-11-19T13:35:40Z
static js_Ast *callexp(js_State *J) { js_Ast *a = newexp(J); loop: if (jsP_accept(J, '.')) { a = EXP2(MEMBER, a, identifiername(J)); goto loop; } if (jsP_accept(J, '[')) { a = EXP2(INDEX, a, expression(J, 0)); jsP_expect(J, ']'); goto loop; } if (jsP_accept(J, '(')) { a = EXP2(CALL, a,...
static js_Ast *callexp(js_State *J) { js_Ast *a = newexp(J); SAVEREC(); loop: INCREC(); if (jsP_accept(J, '.')) { a = EXP2(MEMBER, a, identifiername(J)); goto loop; } if (jsP_accept(J, '[')) { a = EXP2(INDEX, a, expression(J, 0)); jsP_expect(J, ']'); goto loop; } if (jsP_...
CVE-2018-5759
CWE-674
jsparse.c in Artifex MuJS through 1.0.2 does not properly maintain the AST depth for binary expressions, which allows remote attackers to cause a denial of service (excessive recursion) via a crafted file.
http://git.ghostscript.com/?p=mujs.git;a=commit;h=4d45a96e57fbabf00a7378b337d0ddcace6f38c1
null
null
c
null
async def get_resolved_ref(self): if hasattr(self, 'resolved_ref'): return self.resolved_ref try: # Check if the reference is a valid SHA hash self.sha1_validate(self.unresolved_ref) except ValueError: # The ref is a head/tag and we resolve it usi...
async def get_resolved_ref(self): if hasattr(self, 'resolved_ref'): return self.resolved_ref try: # Check if the reference is a valid SHA hash self.sha1_validate(self.unresolved_ref) except ValueError: # The ref is a head/tag and we resolve it usi...
CVE-2021-39159
CWE-78,CWE-94
BinderHub is a kubernetes-based cloud service that allows users to share reproducible interactive computing environments from code repositories. In affected versions a remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the...
https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182
Explicitly separate git-ls-remote options from positional arguments
repoproviders.py
py
2021-08-25T19:15:00Z
int imagetotif(opj_image_t * image, const char *outfile) { int width, height; int bps,adjust, sgnd; int tiPhoto; TIFF *tif; tdata_t buf; tsize_t strip_size; OPJ_UINT32 i, numcomps; OPJ_SIZE_T rowStride; OPJ_INT32* buffer32s = NULL; OPJ_INT32 const* planes[4]; convert_32s_PXCX cvtPxToCx = NULL; convert_32sXX...
int imagetotif(opj_image_t * image, const char *outfile) { uint32 width, height, bps, tiPhoto; int adjust, sgnd; TIFF *tif; tdata_t buf; tmsize_t strip_size, rowStride; OPJ_UINT32 i, numcomps; OPJ_INT32* buffer32s = NULL; OPJ_INT32 const* planes[4]; convert_32s_PXCX cvtPxToCx = NULL; convert_32sXXx_C1R cvt32s...
null
null
null
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
These changes repair bugs of #871 and #872
src/bin/jp2/converttif.c
c
2016-12-09T07:29:55Z
static void gen_add_carry(TCGv dest, TCGv t0, TCGv t1) { TCGv tmp; tcg_gen_add_i32(dest, t0, t1); tmp = load_cpu_field(CF); tcg_gen_add_i32(dest, dest, tmp); dead_tmp(tmp); }
static void gen_add_carry(TCGv dest, TCGv t0, TCGv t1) { TCGv tmp; tcg_gen_add_i32(dest, t0, t1); tmp = load_cpu_field(CF); tcg_gen_add_i32(dest, dest, tmp); tcg_temp_free_i32(tmp); }
null
null
null
qemu/commit/7d1b0095bff7157e856d1d0e6c4295641ced2752
target-arm: Remove ad-hoc leak checking code This commit removes the ad-hoc resource leak checking code from target-arm. This includes replacing all uses of new_tmp() with tcg_temp_new_i32() and all uses of dead_tmp() with tcg_temp_free_i32(). Signed-off-by: Peter Maydell <peter.maydell@linaro.org> Signed-off-by: Aur...
./qemu/target-arm/translate.c
c
2011-03-06T21:39:54Z
static public function getInstanceOf($_usernfo, $_tid) { if (!isset(self::$tickets[$_tid])) { self::$tickets[$_tid] = new ticket($_usernfo, $_tid); } return self::$tickets[$_tid]; }
static public function getInstanceOf($_usernfo, $_tid) { if (! isset(self::$tickets[$_tid . '-' . $_usernfo['userid']])) { self::$tickets[$_tid . '-' . $_usernfo['userid']] = new ticket($_usernfo, $_tid); } return self::$tickets[$_tid . '-' . $_usernfo['userid']]; }
CVE-2018-12642
CWE-732
Froxlor through 0.9.39.5 has Incorrect Access Control for tickets not owned by the current user.
https://github.com/Froxlor/Froxlor/commit/aa881560cc996c38cbf8c20ee62854e27f72c73c
deny access to tickets not owned by current user, thx to chbi Signed-off-by: Michael Kaufmann <michael.kaufmann@aixit.com>
class.ticket.php
php
2018-06-22T12:29:00Z
@Override public void handleBatch(List<ChangeEvent<Object, Object>> records, RecordCommitter<ChangeEvent<Object, Object>> committer) throws InterruptedException { LOGGER.trace("Event Hubs sink adapter processing change events"); CreateBatchOptions op = new Cr...
@Override public void handleBatch(List<ChangeEvent<Object, Object>> records, RecordCommitter<ChangeEvent<Object, Object>> committer) throws InterruptedException { LOGGER.trace("Event Hubs sink adapter processing change events"); CreateBatchOptions op = new Cr...
null
null
null
https://github.com/debezium/debezium-server/commit/2b018d022f694e705b80b27b179940f5095ebb22
DBZ-4277 Prevent infinite loop
debezium-server/debezium-server-eventhubs/src/main/java/io/debezium/server/eventhubs/EventHubsChangeConsumer.java
java
2021-11-16T00:38:30Z
int ff_lzw_decode(LZWState *p, uint8_t *buf, int len){ int l, c, code, oc, fc; uint8_t *sp; struct LZWState *s = (struct LZWState *)p; if (s->end_code < 0) return 0; l = len; sp = s->sp; oc = s->oc; fc = s->fc; for (;;) { while (sp > s->stack) { *buf++ = *...
int ff_lzw_decode(LZWState *p, uint8_t *buf, int len){ int l, c, code, oc, fc; uint8_t *sp; struct LZWState *s = (struct LZWState *)p; if (s->end_code < 0) return 0; l = len; sp = s->sp; oc = s->oc; fc = s->fc; for (;;) { while (sp > s->stack) { *buf++ = *...
null
null
null
FFmpeg/commit/0cb7f8a26094c533b7dbe25897198953b6660f15
check input validity, this prevents a few variables from reachin odd values which might have lead to out of array writes and thus might have been exploitable Originally committed as revision 8522 to svn://svn.ffmpeg.org/ffmpeg/trunk
./ffmpeg/libavcodec/lzw.c
c
2007-03-25T23:37:38Z
static __init int hardware_setup(void) { int r = -ENOMEM, i, msr; rdmsrl_safe(MSR_EFER, &host_efer); for (i = 0; i < ARRAY_SIZE(vmx_msr_index); ++i) kvm_define_shared_msr(i, vmx_msr_index[i]); vmx_io_bitmap_a = (unsigned long *)__get_free_page(GFP_KERNEL); if (!vmx_io_bitmap_a) return r; vmx_io_bitmap_b =...
static __init int hardware_setup(void) { int r = -ENOMEM, i, msr; rdmsrl_safe(MSR_EFER, &host_efer); for (i = 0; i < ARRAY_SIZE(vmx_msr_index); ++i) kvm_define_shared_msr(i, vmx_msr_index[i]); vmx_io_bitmap_a = (unsigned long *)__get_free_page(GFP_KERNEL); if (!vmx_io_bitmap_a) return r; vmx_io_bitmap_b =...
CVE-2016-4440
CWE-264
arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
kvm:vmx: more complete state update on APICv on/off The function to update APICv on/off state (in particular, to deactivate it when enabling Hyper-V SynIC) is incomplete: it doesn't adjust APICv-related fields among secondary processor-based VM-execution controls. As a result, Windows 2012 guests get stuck when SynIC...
vmx.c
c
2016-05-18T14:48:20Z
static void hash_object_file_literally(const struct git_hash_algo *algo, const void *buf, unsigned long len, const char *type, struct object_id *oid) { char hdr[MAX_HEADER_LEN]; int hdrlen = sizeof(hdr); write_object_file_prepare_literally(algo, buf, len, type, oid, hdr, &hdrlen); }
static void hash_object_file_literally(const struct git_hash_algo *algo, const void *buf, size_t len, const char *type, struct object_id *oid) { char hdr[MAX_HEADER_LEN]; size_t hdrlen = sizeof(hdr); write_object_file_prepare_literally(algo, buf, len, type, oid, hdr, &hdrlen); }
null
null
null
https://github.com/git-for-windows/git/commit/eb57df146ead141de019c33d4fc3f4afd729b89a
object-file.c: use size_t for header lengths Continue walking the code path for the >4GB `hash-object --literally` test. The `hash_object_file_literally()` function internally uses both `hash_object_file()` and `write_object_file_prepare()`. Both function signatures use `unsigned long` rather than `size_t` for the mem...
object-file.c
c
2021-11-12T21:14:50Z
fn load_constant64_full(&mut self, value: u64) -> Reg { // If the top 32 bits are zero, use 32-bit `mov` operations. let (num_half_words, size, negated) = if value >> 32 == 0 { (2, OperandSize::Size32, (!value << 32) >> 32) } else { (4, OperandSize::Size64, !value) ...
fn load_constant64_full( &mut self, ty: Type, extend: &generated_code::ImmExtend, value: u64, ) -> Reg { let bits = ty.bits(); let value = if bits < 64 { if *extend == generated_code::ImmExtend::Sign { let shift = 64 - bits; ...
CVE-2022-31169
CWE-682
Wasmtime is a standalone runtime for WebAssembly. There is a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors can result in incorrect division results at runtime. This affects Wasmtime prior to version 0.38.2 and Cranelift prior to 0.85.2. This issue only affects the AArch64 plat...
https://github.com/bytecodealliance/wasmtime/commit/2ba4bce5cc719e5a74e571a534424614e62ecc41
Merge pull request from GHSA-7f6x-jwh5-m9r4 Copyright (c) 2022, Arm Limited.
isle.rs
rs
2022-07-22T04:15:00Z
@Override public synchronized void close() throws IOException { super.close(); if (in != null) { in.close(); in = null; } if (out != null) { out.close(); out = null; } }
@Override public synchronized void close() throws IOException { super.close(); if (in != null) { CompressedInputStream inStream = in; in = null; inStream.close(); } if (out != null) { CompressedOutputStream outStream = out; ...
null
null
null
https://github.com/lsfusion/platform/commit/7a0c030d43940f1d828378cc101e1ba7c11ddff8
Prevent stack overflow for Java 16 (cherry picked from commit f46d52f0a4b26400ab5b9026d9c3578c7e094dba)
api/src/main/java/lsfusion/base/remote/CountZipSocket.java
java
2021-08-11T11:12:41Z
@Override public void onExit(int exitCode) { if (exitCode != 0) { JVMCrashActivity.startCrashActivity(activity, exitCode); Logging.LOG.log(Level.INFO, "JVM crashed, start jvm crash activity to show errors now!"); } }
@Override public void onExit(int exitCode) { if (exitCode != 0) { JVMCrashActivity.startCrashActivity(activity, exitCode); Logging.LOG.log(Level.INFO, "JVM crashed, start jvm crash activity to show errors now!"); android.os.Process.killProcess(android.os.Process.myPid());...
null
null
null
https://github.com/FCL-Team/FoldCraftLauncher/commit/c96f76fad9799f4acd79c2a0d4f679b5ecb78905
fix crash activity not start
FCL/src/main/java/com/tungsten/fcl/control/GameMenu.java
java
2023-01-14T17:27:09Z
static AuthorizedIndices resolveAuthorizedIndicesFromRole( Role role, RequestInfo requestInfo, Map<String, IndexAbstraction> lookup, Supplier<Consumer<Collection<String>>> timerSupplier ) { Predicate<IndexAbstraction> predicate = role.allowedIndicesMatcher(requestInfo.getActi...
static AuthorizedIndices resolveAuthorizedIndicesFromRole( Role role, RequestInfo requestInfo, Map<String, IndexAbstraction> lookup, Supplier<Consumer<Collection<String>>> timerSupplier ) { IsResourceAuthorizedPredicate predicate = role.allowedIndicesMatcher(requestInfo.getAc...
null
null
null
https://github.com/elastic/elasticsearch/commit/54a78c3777de16a9b2cae94f5561ea7f994f1fed
Fix Security's expression resolver to not remove unavailable but authorized names (#92625) For non-wildcard resource names in expressions from requests with the `ignoreUnavailable` request option set to `true`, the Security filter removes names for "unavailable" resources. This behavior is theoretically correct, but i...
x-pack/plugin/security/src/main/java/org/elasticsearch/xpack/security/authz/RBACEngine.java
java
2023-01-19T14:41:06Z
static void *getMcontextEip(ucontext_t *uc) { #define NOT_SUPPORTED() do {\ UNUSED(uc);\ return NULL;\ } while(0) #if defined(__APPLE__) && !defined(MAC_OS_X_VERSION_10_6) /* OSX < 10.6 */ #if defined(__x86_64__) return (void*) uc->uc_mcontext->__ss.__rip; #elif defined(__i386__) return (voi...
static void* getAndSetMcontextEip(ucontext_t *uc, void *eip) { #define NOT_SUPPORTED() do {\ UNUSED(uc);\ UNUSED(eip);\ return NULL;\ } while(0) #define GET_SET_RETURN(target_var, new_val) do {\ void *old_val = (void*)target_var; \ if (new_val) { \ void **temp = (void**)&target_var; \ ...
null
null
null
https://github.com/redis/redis/commit/0bf90d944313919eb8e63d3588bf63a367f020a3
Avoid crash on crash report when a bad function pointer was called (#11298) If Redis crashes due to calling an invalid function pointer, the `backtrace` function will try to dereference this invalid pointer which will cause a crash inside the crash report and will kill the processes without having all the crash report...
src/debug.c
c
2022-09-29T05:58:58Z
@Override protected Object getPreAuthenticatedPrincipal(HttpServletRequest request) { try { if (this.trustedProxies.contains(InetAddress.getByName(request.getRemoteAddr()))) { String username = request.getHeader(AUTH_HEADER); if (username != null) { ...
@Override protected Object getPreAuthenticatedPrincipal(HttpServletRequest request) { try { if (this.trustedProxies.contains(InetAddress.getByName(request.getRemoteAddr()))) { String username = request.getHeader(AUTH_HEADER); if (username != null) { ...
null
null
null
https://github.com/georchestra/georchestra/commit/b9637b7a4cee6fedf0fba7dcc9996e4dd5732499
Set pre-auth as a property of the request, not the session Using the http Session object to hold a per-request property can result in a race condition and a security attack vector. ProxyTrustAnotherProxy works on a per-request basis, so it makes all sense to set the pre-auth attribute on the request instead.
security-proxy/src/main/java/org/georchestra/security/ProxyTrustAnotherProxy.java
java
2021-04-20T21:40:04Z
static int rxrpc_krb5_decode_principal(struct krb5_principal *princ, const __be32 **_xdr, unsigned int *_toklen) { const __be32 *xdr = *_xdr; unsigned int toklen = *_toklen, n_parts, loop, tmp; /* there must be at least one name, and at least #names+1 length * words */ if (toklen <= 12) r...
static int rxrpc_krb5_decode_principal(struct krb5_principal *princ, const __be32 **_xdr, unsigned int *_toklen) { const __be32 *xdr = *_xdr; unsigned int toklen = *_toklen, n_parts, loop, tmp, paddedlen; /* there must be at least one name, and at least #names+1 length * words */ if (toklen...
CVE-2017-7482
CWE-190
In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escal...
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f2f97656ada8d811d3c1bef503ced266fcd53a0
rxrpc: Fix several cases where a padded len isn't checked in ticket decode This fixes CVE-2017-7482. When a kerberos 5 ticket is being decoded so that it can be loaded into an rxrpc-type key, there are several places in which the length of a variable-length field is checked to make sure that it's not going to overrun...
null
null
null
public void uncaughtException(@NonNull Thread t, @NonNull Throwable e) { // Collect info StackTraceElement[] arr = e.getStackTrace(); StringBuilder report = new StringBuilder(e.toString() + "\n"); for (StackTraceElement traceElement : arr) { report.append(" at ").append(tr...
public void uncaughtException(@NonNull Thread t, @NonNull Throwable e) { // Collect info StackTraceElement[] arr = e.getStackTrace(); StringBuilder report = new StringBuilder(e.toString() + "\n"); for (StackTraceElement traceElement : arr) { report.append(" at ").append(tr...
null
null
null
https://github.com/MuntashirAkon/AppManager/commit/b73a7e1a3b407b0832e8e3ed454efc59a770b32d
[Refactor] Update LibADB to 1.0.1 Signed-off-by: Muntashir Al-Islam <muntashirakon@riseup.net>
app/src/main/java/io/github/muntashirakon/AppManager/misc/AMExceptionHandler.java
java
2021-12-14T07:19:34Z
@Inject(at = @At("HEAD"), method = "isEnchanted()Z", cancellable = true) private void isEnchanted(CallbackInfoReturnable<Boolean> callback) { if (getItem() instanceof IModularItem) { ItemStack itemStack = getInstance(); IModularItem item = (IModularItem) getItem(); callb...
@Inject(at = @At("HEAD"), method = "isEnchanted()Z", cancellable = true) private void isEnchanted(CallbackInfoReturnable<Boolean> callback) { if (getItem() instanceof IModularItem) { ItemStack itemStack = getInstance(); callback.setReturnValue(itemStack.hasTag() &...
null
null
null
https://github.com/mickelus/tetra/commit/df98e4186a3958478fc03e5fdd5297529a55fef3
fix: fixed mod compat crash related to checking for enchanted tetra items
src/main/java/se/mickelus/tetra/mixin/MixinItemStack.java
java
2021-06-16T18:46:05Z
public void receivedInputEvent(InputEvent event) { if (isProcessingEvents) { Log.trace(InputEvent.class, "received event {}, adding to backlog", event); eventBacklog.add(event); } else { Log.trace(InputEvent.class, "received event {}, adding to main", event); ...
public synchronized void receivedInputEvent(InputEvent event) { if (isProcessingEvents) { try { wait(); } catch (InterruptedException exception) { throw new IllegalStateException(exception); } } receivedInputEvents.add(event); ...
null
null
null
https://github.com/fastjengine/FastJ/commit/3cf252b71786d782a98fdfb976eba13154e57757
fixed a ton of concurrency issues New Additions - `Drawable#isDestroyed` -- boolean for checking if a given `Drawable` has been destroyed - This boolean also effects the outcome of `Drawable#shouldRender` -- if the `Drawable` is destroyed, then it will not be rendered - `ManagedList` -- a type of `List` with conve...
src/main/java/tech/fastj/input/InputManager.java
java
2021-12-20T17:24:53Z
private void switchScarpetRuleIfNeeded(CommandSourceStack source, CarpetRule<?> carpetRule) //TODO remove. This should be handled by the rule { if (carpetRule instanceof ParsedRule<?> rule && !rule.scarpetApp.isEmpty()) { if (RuleHelper.getBooleanValue(rule) || (rule.type() == String.cla...
private void switchScarpetRuleIfNeeded(CommandSourceStack source, CarpetRule<?> carpetRule) //TODO remove. This should be handled by the rule { if (carpetRule instanceof ParsedRule<?> rule && !rule.scarpetApp.isEmpty() && CarpetServer.scriptServer != null) // null check because we may be in server init ...
null
null
null
https://github.com/gnembon/fabric-carpet/commit/24385f28c2d8d199424a8b75eef8f8b33ae4bfe2
Fix crash when scarpet rules are set permanently Fixes #1562
src/main/java/carpet/api/settings/SettingsManager.java
java
2022-10-05T08:21:07Z
pkcs11rsa_fromlabel(dst_key_t *key, const char *engine, const char *label, const char *pin) { CK_RV rv; CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; CK_OBJECT_CLASS keyClass = CKO_PUBLIC_KEY; CK_KEY_TYPE keyType = CKK_RSA; CK_ATTRIBUTE searchTemplate[] = { { CKA_CLASS, &keyClass, (CK_ULONG) sizeof(keyClass)...
pkcs11rsa_fromlabel(dst_key_t *key, const char *engine, const char *label, const char *pin) { CK_RV rv; CK_OBJECT_HANDLE hKey = CK_INVALID_HANDLE; CK_OBJECT_CLASS keyClass = CKO_PUBLIC_KEY; CK_KEY_TYPE keyType = CKK_RSA; CK_ATTRIBUTE searchTemplate[] = { { CKA_CLASS, &keyClass, (CK_ULONG) sizeof(keyClass)...
CVE-2020-8623
CWE-617
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with ...
https://gitlab.isc.org/isc-projects/bind9/-/commit/8d807cc21655eaa6e6a08afafeec3682c0f3f2ab
Fix crash in pk11_numbits() when native-pkcs11 is used When pk11_numbits() is passed a user provided input that contains all zeroes (via crafted DNS message), it would crash with assertion failure. Fix that by properly handling such input.
null
null
2020-07-21T12:42:47Z
VirtIODevice *virtio_serial_init(DeviceState *dev, virtio_serial_conf *conf) { VirtIOSerial *vser; VirtIODevice *vdev; uint32_t i, max_supported_ports; if (!conf->max_virtserial_ports) return NULL; max_supported_ports = VIRTIO_PCI_QUEUE_MAX / 2 - 1; if (conf->max_virtserial_ports > ...
VirtIODevice *virtio_serial_init(DeviceState *dev, virtio_serial_conf *conf) { VirtIOSerial *vser; VirtIODevice *vdev; uint32_t i, max_supported_ports; if (!conf->max_virtserial_ports) return NULL; max_supported_ports = VIRTIO_PCI_QUEUE_MAX / 2 - 1; if (conf->max_virtserial_ports > ...
null
null
null
qemu/commit/5e52e5f903b2648c59030637e1610b32e965d615
virtio-serial: Plug memory leak on qdev exit() virtio_serial_init() allocates the VirtIOSerialBus dynamically, but virtio_serial_exit() doesn't free it. Fix by getting rid of the allocation. Signed-off-by: Markus Armbruster <armbru@redhat.com> Signed-off-by: Amit Shah <amit.shah@redhat.com>
./qemu/hw/virtio-serial-bus.c
c
2011-05-25T12:21:10Z
urlParams.pages||1<U.pages.length||Editor.pagesVisible)?"inline-block":"none"};var S=function(){ra.innerHTML="";if(null!=U.currentPage){mxUtils.write(ra,U.currentPage.getName());var ua=null!=U.pages?U.pages.length:1,ya=U.getPageIndex(U.currentPage);ya=null!=ya?ya+1:1;var Na=U.currentPage.getId();ra.setAttribute("title"...
urlParams.pages||1<U.pages.length||Editor.pagesVisible)?"inline-block":"none"};var S=function(){ra.innerText="";if(null!=U.currentPage){mxUtils.write(ra,U.currentPage.getName());var ua=null!=U.pages?U.pages.length:1,ya=U.getPageIndex(U.currentPage);ya=null!=ya?ya+1:1;var Na=U.currentPage.getId();ra.setAttribute("title"...
CVE-2022-2014
CWE-94,CWE-94
Code Injection in GitHub repository jgraph/drawio prior to 19.0.2.
https://github.com/jgraph/drawio/commit/3d3f819d7a04da7d53b37cc0ca4269c157ba2825
19.0.2 release
service-worker.js
js
2022-06-09T17:15:00Z
TPM2B_MAX_NV_BUFFER_Marshal(TPM2B_MAX_NV_BUFFER *source, BYTE **buffer, INT32 *size) { UINT16 written = 0; written += TPM2B_Marshal(&source->b, buffer, size); return written; }
TPM2B_MAX_NV_BUFFER_Marshal(TPM2B_MAX_NV_BUFFER *source, BYTE **buffer, INT32 *size) { UINT16 written = 0; written += TPM2B_Marshal(&source->b, sizeof(source->t.buffer), buffer, size); // libtpms changed return written; }
null
CWE-787
null
https://github.com/stefanberger/libtpms/commit/3ef9b26cb9f28bd64d738bff9505a20d4eb56acd
tpm2: Add maxSize parameter to TPM2B_Marshal for sanity checks Add maxSize parameter to TPM2B_Marshal and assert on it checking the size of the data intended to be marshaled versus the maximum buffer size. Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
null
null
2021-06-21T19:10:14Z
@Override protected void handleProducer(final CommandProducer cmdProducer) { checkArgument(state == State.Connected); final long producerId = cmdProducer.getProducerId(); final long requestId = cmdProducer.getRequestId(); // Use producer name provided by client if present fin...
@Override protected void handleProducer(final CommandProducer cmdProducer) { checkArgument(state == State.Connected); final long producerId = cmdProducer.getProducerId(); final long requestId = cmdProducer.getRequestId(); // Use producer name provided by client if present fin...
null
null
null
https://github.com/apache/pulsar/commit/422588782146bc60721f532f8a4f7c2e1a91f1f2
Avoid AuthenticationDataSource mutation for subscription name (#16065) The `authenticationData` field in `ServerCnx` is being mutated to add the `subscription` field that will be passed on to the authorization plugin. The problem is that `authenticationData` is scoped to the whole connection and it should be getting m...
pulsar-broker/src/main/java/org/apache/pulsar/broker/service/ServerCnx.java
java
2022-06-15T07:00:28Z
private static void writeHvdcTopologicalNodes(Network network, String cimNamespace, XMLStreamWriter writer, CgmesExportContext context) throws XMLStreamException { for (HvdcLine line : network.getHvdcLines()) { Bus b1 = line.getConverterStation1().getTerminal().getBusView().getBus(); for...
private static void writeHvdcTopologicalNodes(Network network, String cimNamespace, XMLStreamWriter writer, CgmesExportContext context) throws XMLStreamException { for (HvdcLine line : network.getHvdcLines()) { Bus b1 = line.getConverterStation1().getTerminal().getBusView().getBus(); if ...
null
null
null
https://github.com/powsybl/powsybl-core/commit/9700c0a66b35e728391ed3597fdfef3fec3d9335
Fix: does not crash during CGMES export when a terminal is disconnected (#2050) * Fix: Connectable buses used for bus bar sections connectivity in CGMES EQ export * Fix: for switches, if there is no equivalent terminal, we consider the bus of bus view as null => fictitious topological node is created * Fix: fictitious...
cgmes/cgmes-conversion/src/main/java/com/powsybl/cgmes/conversion/export/TopologyExport.java
java
2022-04-06T08:19:33Z
int der_decode_utf8_string(const unsigned char *in, unsigned long inlen, wchar_t *out, unsigned long *outlen) { wchar_t tmp; unsigned long x, y, z, len; int err; LTC_ARGCHK(in != NULL); LTC_ARGCHK(out != NULL); LTC_ARGCHK(outlen != NULL); /* mu...
int der_decode_utf8_string(const unsigned char *in, unsigned long inlen, wchar_t *out, unsigned long *outlen) { wchar_t tmp; unsigned long x, y, z, len; int err; LTC_ARGCHK(in != NULL); LTC_ARGCHK(out != NULL); LTC_ARGCHK(outlen != NULL); /* mu...
null
null
null
https://github.com/libtom/libtomcrypt/commit/25c26a3b7a9ad8192ccc923e15cf62bf0108ef94
Fixes #507
src/pk/asn1/der/utf8/der_decode_utf8_string.c
c
2019-10-03T17:57:10Z
@Override public void render(ScribesTile tile, float partialTicks, MatrixStack stack, IRenderTypeBuffer bufferIn, int packedLightIn) { if(tile.getLevel().getBlockState(tile.getBlockPos()).getValue(ScribesBlock.PART) != BedPart.HEAD) return; Direction direction = tile.getLevel().getBlockS...
@Override public void render(ScribesTile tile, float partialTicks, MatrixStack stack, IRenderTypeBuffer bufferIn, int packedLightIn) { try{ if(tile.getLevel().getBlockState(tile.getBlockPos()).getBlock() != BlockRegistry.SCRIBES_BLOCK) return; if(tile.getLevel().getBl...
null
null
null
https://github.com/baileyholl/Ars-Nouveau/commit/a49fac12cbf6cf7c65c2dc85901803e44b35bb03
Block piston movement for quark
src/main/java/com/hollingsworth/arsnouveau/client/renderer/tile/ScribesRenderer.java
java
2021-06-23T01:12:10Z
reverseSamplesBytes (uint16 spp, uint16 bps, uint32 width, uint8 *src, uint8 *dst) { int i; uint32 col, bytes_per_pixel, col_offset; uint8 bytebuff1; unsigned char swapbuff[32]; if ((src == NULL) || (dst == NULL)) { TIFFError("reverseSamplesBytes","Invalid input or output...
reverseSamplesBytes (uint16 spp, uint16 bps, uint32 width, uint8 *src, uint8 *dst) { int i; uint32 col, bytes_per_pixel, col_offset; uint8 bytebuff1; unsigned char swapbuff[32]; if ((src == NULL) || (dst == NULL)) { TIFFError("reverseSamplesBytes","Invalid input or output...
CVE-2016-9537
CWE-119,CWE-787
tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096, and MSVR 35097.
https://github.com/vadz/libtiff/commit/83a4b92815ea04969d494416eaae3d4c6b338e4a#diff-c8b4b355f9b5c06d585b23138e1c185f
* tools/tiffcrop.c: fix various out-of-bounds write vulnerabilities in heap or stack allocated buffers. Reported as MSVR 35093, MSVR 35096 and MSVR 35097. Discovered by Axel Souchet and Vishal Chauhan from the MSRC Vulnerabilities & Mitigations team. * tools/tiff2pdf.c: fix out-of-bounds write vulnerabilities in heap a...
tools/tiffcrop.c
c
2016-09-23T22:12:18Z
0<fa.length&&b.pickFolder(b.mode,function(sa){b.createFile(fa,Q,null!=T&&0<T.length?T:null,null,function(){b.hideDialog()},null,sa,null,null!=P&&0<P.length?P:null)},b.mode!=App.MODE_GOOGLE||null==b.stateArg||null==b.stateArg.folderId)}}function u(fa,sa,xa,wa,ua,va,ia){null!=S&&(S.style.backgroundColor="transparent",S.s...
mxResources.get("ok"),aa,ia,function(ta){var ka=null!=ta&&0<ta.length;return ka&&y?(aa(ta),!1):ka},null,null,null,la,x?null:[]),b.showDialog(ia.container,350,80,!0,!0),ia.init())}}function D(ia){Ba.innerHTML=mxUtils.htmlEntities(mxResources.get(Z||ia?"create":"copy"));ia=ia?"none":"";p&&(Ea.style.display=ia);for(var ra...
CVE-2022-2014
CWE-94,CWE-94
Code Injection in GitHub repository jgraph/drawio prior to 19.0.2.
https://github.com/jgraph/drawio/commit/3d3f819d7a04da7d53b37cc0ca4269c157ba2825
19.0.2 release
service-worker.js
js
2022-06-09T17:15:00Z
@Override public void process(NetworkEvent.Context context) { context.enqueueWork(() -> { if(context.getDirection().getReceptionSide().isServer()) { //Send it off, servers are just proxies for these. ServerPlayerEntity player = context.getSender();...
@Override public void process(NetworkEvent.Context context) { context.enqueueWork(() -> { if(context.getDirection().getReceptionSide().isServer()) { //Send it off, servers are just proxies for these. ServerPlayerEntity player = context.getSender();...
null
null
null
https://github.com/iChun/Tabula/commit/644cf651269ea9a18a02e6f4c1cf403608cc4e8c
Added plugin support (for Hats). Fix crash when removing a texture in MP. Fix crash when removing a part in MP. Double clicking a part now opens the edit meta window. Make autosaves enabled by default. Set the config to a client config.
src/main/java/me/ichun/mods/tabula/common/packet/PacketProjectFragment.java
java
2021-03-11T22:22:41Z
krb5_error_code kdc_process_s4u2proxy_req(kdc_realm_t *kdc_active_realm, krb5_kdc_req *request, const krb5_enc_tkt_part *t2enc, const krb5_db_entry *server, krb5_const_principal server_princ, ...
krb5_error_code kdc_process_s4u2proxy_req(kdc_realm_t *kdc_active_realm, krb5_kdc_req *request, const krb5_enc_tkt_part *t2enc, const krb5_db_entry *server, krb5_const_principal server_princ, ...
null
null
null
https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970
Prevent KDC unset status assertion failures Assign status values if S4U2Self padata fails to decode, if an S4U2Proxy request uses invalid KDC options, or if an S4U2Proxy request uses an evidence ticket which does not match the canonicalized request server principal name. Reported by Samuel Cabrero. If a status value...
src/kdc/kdc_util.c
c
2017-07-13T16:14:20Z
@Deprecated public static void renderStar(float time, int starFrags, float r, float g, float b, float a, boolean star) { Tessellator tessellator = Tessellator.getInstance(); BufferBuilder bufferBuilder = tessellator.getBuffer(); GlStateManager.disableTexture(); GlStateManager.shadeModel(GL11.GL_SMOOTH); GlStat...
@Deprecated public static void renderStar(float time, int starFrags, float r, float g, float b, float a, boolean star) { GlStateManager.pushMatrix(); Tessellator tessellator = Tessellator.getInstance(); BufferBuilder bufferBuilder = tessellator.getBuffer(); GlStateManager.disableTexture(); GlStateManager.shade...
null
null
null
https://github.com/aurilisdev/Electrodynamics/commit/1f40728713f63d603ded02ec4a8cc7b7f0e9f497
Fix render bug & solar panel crash
src/main/java/electrodynamics/api/utilities/RenderUtilities.java
java
2021-03-10T20:35:37Z
void esp_reg_write(ESPState *s, uint32_t saddr, uint64_t val) { trace_esp_mem_writeb(saddr, s->wregs[saddr], val); switch (saddr) { case ESP_TCHI: s->tchi_written = true; /* fall through */ case ESP_TCLO: case ESP_TCMID: s->rregs[ESP_RSTAT] &= ~STAT_TC; break; cas...
void esp_reg_write(ESPState *s, uint32_t saddr, uint64_t val) { trace_esp_mem_writeb(saddr, s->wregs[saddr], val); switch (saddr) { case ESP_TCHI: s->tchi_written = true; /* fall through */ case ESP_TCLO: case ESP_TCMID: s->rregs[ESP_RSTAT] &= ~STAT_TC; break; cas...
null
CWE-787
null
null
scsi: esp: make cmdbuf big enough for maximum CDB size While doing DMA read into ESP command buffer 's->cmdbuf', it could write past the 's->cmdbuf' area, if it was transferring more than 16 bytes. Increase the command buffer size to 32, which is maximum when 's->do_cmd' is set, and add a check on 'len' to avoid OOB ...
null
null
null
static int vmdk_init_tables(BlockDriverState *bs, VmdkExtent *extent, Error **errp) { int ret; int l1_size, i; l1_size = extent->l1_size * sizeof(uint32_t); extent->l1_table = g_try_malloc(l1_size); if (l1_size && extent->l1_table == NULL) { return -ENOMEM; ...
static int vmdk_init_tables(BlockDriverState *bs, VmdkExtent *extent, Error **errp) { int ret; size_t l1_size; int i; l1_size = extent->l1_size * sizeof(uint32_t); extent->l1_table = g_try_malloc(l1_size); if (l1_size && extent->l1_table == NULL) { return...
null
null
null
qemu/commit/13c4941cdd8685d28c7e3a09e393a5579b58db46
vmdk: Fix overflow if l1_size is 0x20000000 Richard Jones caught this bug with afl fuzzer. In fact, that's the only possible value to overflow (extent->l1_size = 0x20000000) l1_size: l1_size = extent->l1_size * sizeof(long) => 0x80000000 g_try_malloc returns NULL because l1_size is interpreted as negative during ty...
./qemu/block/vmdk.c
c
2015-05-05T09:28:13Z
static int module_clone(int argc, const char **argv, const char *prefix) { const char *name = NULL, *url = NULL, *depth = NULL; int quiet = 0; int progress = 0; char *p, *path = NULL, *sm_gitdir; struct strbuf sb = STRBUF_INIT; struct string_list reference = STRING_LIST_INIT_NODUP; int require_init = 0; char *s...
static int module_clone(int argc, const char **argv, const char *prefix) { const char *name = NULL, *url = NULL, *depth = NULL; int quiet = 0; int progress = 0; char *p, *path = NULL, *sm_gitdir; struct strbuf sb = STRBUF_INIT; struct string_list reference = STRING_LIST_INIT_NODUP; int require_init = 0; char *s...
CVE-2019-1387
null
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursiv...
https://git.kernel.org/pub/scm/git/git.git/commit/?id=a8dee3ca610f5a1d403634492136c887f83b59d2
Disallow dubiously-nested submodule git directories Currently it is technically possible to let a submodule's git directory point right into the git dir of a sibling submodule. Example: the git directories of two submodules with the names `hippo` and `hippo/hooks` would be `.git/modules/hippo/` and `.git/modules/hipp...
null
null
null
int ping_common_sendmsg(int family, struct msghdr *msg, size_t len, void *user_icmph, size_t icmph_len) { u8 type, code; if (len > 0xFFFF) return -EMSGSIZE; /* * Check the flags. */ /* Mirror BSD error message compatibility */ if (msg->msg_flags & MSG_OOB) return -EOPNOTSUPP; /* * Fetch the ICMP ...
int ping_common_sendmsg(int family, struct msghdr *msg, size_t len, void *user_icmph, size_t icmph_len) { u8 type, code; if (len > 0xFFFF) return -EMSGSIZE; /* Must have at least a full ICMP header. */ if (len < icmph_len) return -EINVAL; /* * Check the flags. */ /* Mirror BSD error message compati...
CVE-2016-8399
CWE-284
An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access...
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0eab121ef8750a5c8637d51534d5e9143fb0633f
net: ping: check minimum size on ICMP header length Prior to commit c0371da6047a ("put iov_iter into msghdr") in v3.19, there was no check that the iovec contained enough bytes for an ICMP header, and the read loop would walk across neighboring stack contents. Since the iov_iter conversion, bad arguments are noticed, ...
null
null
null
private Docket baseDocket() { Docket baseDocket = new Docket(DocumentationType.OAS_30) .select() .apis(apiSelector::test) .paths(PathSelectors.any()) .build(); if (apiInfo != null) { baseDocket.apiInfo(apiInfo); } baseDock...
private Docket baseDocket() { Docket baseDocket = new Docket(DocumentationType.OAS_30) .select() .apis(apiSelector::test) .paths(PathSelectors.any()) .build(); if (apiInfo != null) { baseDocket.apiInfo(apiInfo); } baseDock...
null
null
null
https://github.com/Activiti/activiti-cloud/commit/0d83bb8be7393eacca5f82627fc5d0b4f8c5bae1
Add authentication flow in swagger UI (#507) * add token authentication * fix token authentication * use JWT_BEARER_BUILDER * implement implicit flow auth
activiti-cloud-service-common/activiti-cloud-services-swagger/src/main/java/org/activiti/cloud/common/swagger/SwaggerDocketBuilder.java
java
2021-11-09T11:21:53Z
static void imdct36(int *out, int *buf, int *in, int *win) { int i, j, t0, t1, t2, t3, s0, s1, s2, s3; int tmp[18], *tmp1, *in1; for(i=17;i>=1;i--) in[i] += in[i-1]; for(i=17;i>=3;i-=2) in[i] += in[i-2]; for(j=0;j<2;j++) { tmp1 = tmp + j; in1 = in + j; #if 0 i...
static void imdct36(int *out, int *buf, int *in, int *win) { int i, j, t0, t1, t2, t3, s0, s1, s2, s3; int tmp[18], *tmp1, *in1; for(i=17;i>=1;i--) in[i] += in[i-1]; for(i=17;i>=3;i-=2) in[i] += in[i-2]; for(j=0;j<2;j++) { tmp1 = tmp + j; in1 = in + j; #if 0 i...
null
null
null
FFmpeg/commit/44f1698a3824836d32708ae93e78ac1f2310a07e
merge a few shifts into the dequantization, faster and more accurate, lets hope it doesnt overflow Originally committed as revision 3930 to svn://svn.ffmpeg.org/ffmpeg/trunk
./ffmpeg/libavcodec/mpegaudiodec.c
c
2005-02-03T03:28:27Z
void virtio_queue_update_rings(VirtIODevice *vdev, int n) { VRing *vring = &vdev->vq[n].vring; if (!vring->desc) { return; } vring->avail = vring->desc + vring->num * sizeof(VRingDesc); vring->used = vring_align(vring->avail + offsetof(VRingAvail, ring[...
void virtio_queue_update_rings(VirtIODevice *vdev, int n) { VRing *vring = &vdev->vq[n].vring; if (!vring->num || !vring->desc || !vring->align) { return; } vring->avail = vring->desc + vring->num * sizeof(VRingDesc); vring->used = vring_align(vring->avail + ...
null
null
null
qemu/commit/758ead31c7e17bf17a9ef2e0ca1c3e86ab296b43
virtio: check VirtQueue Vring object is set A guest could attempt to use an uninitialised VirtQueue object or unset Vring.align leading to a arithmetic exception. Add check to avoid it. Reported-by: Zhangboxian <zhangboxian@huawei.com> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Reviewed-by: Michael S. Tsi...
./qemu/hw/virtio/virtio.c
c
2017-11-29T17:44:27Z
public void onMockedRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) { if (requestCode == CaptureManager.getCameraPermissionReqCode()) { showCameraPermissionMissingText(grantResults[0] != PackageManager.PERMISSION_GRANTED); } else if (requ...
public void onMockedRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) { boolean granted = grantResults.length > 0 && grantResults[0] == PackageManager.PERMISSION_GRANTED; if (requestCode == CaptureManager.getCameraPermissionReqCode()) { sh...
null
null
null
https://github.com/CatimaLoyalty/Android/commit/614753303fa8c642049b173e1626dbc476f9491a
Fix crash when permissionRequestResult gets cancelled
app/src/main/java/protect/card_locker/ScanActivity.java
java
2023-01-25T17:30:47Z
static void _CONSTRUCTOR lib_init(void) { int ret; const char *e; if (_gnutls_global_init_skip() != 0) return; e = getenv("GNUTLS_NO_EXPLICIT_INIT"); if (e != NULL) { ret = atoi(e); if (ret == 1) return; } ret = gnutls_global_init(); if (ret < 0) { fprintf(stderr, "Error in GnuTLS initialization: %s...
static void _CONSTRUCTOR lib_init(void) { int ret; const char *e; if (_gnutls_global_init_skip() != 0) return; e = secure_getenv("GNUTLS_NO_EXPLICIT_INIT"); if (e != NULL) { ret = atoi(e); if (ret == 1) return; } ret = gnutls_global_init(); if (ret < 0) { fprintf(stderr, "Error in GnuTLS initializat...
CVE-2016-4456
CWE-20
The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.
https://gitlab.com/gnutls/gnutls/commit/b0a3048e56611a2deee4976aeba3b8c0740655a6
env: use secure_getenv when reading environment variables
null
null
2016-05-27T20:26:02Z
def get_multi(self, keys, server_key): """ Gets multiple values from memcache for the given keys. :param keys: keys for values to be retrieved from memcache :param servery_key: key to use in determining which server in the ring is used :returns: list ...
def get_multi(self, keys, server_key): """ Gets multiple values from memcache for the given keys. :param keys: keys for values to be retrieved from memcache :param servery_key: key to use in determining which server in the ring is used :returns: list ...
CVE-2012-4406
CWE-502
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
Do not use pickle for serialization in memcache, but JSON We don't want to use pickle as it can execute arbitrary code. JSON is safer. However, note that it supports serialization for only some specific subset of object types; this should be enough for what we need, though. To avoid issues on upgrades (unability to r...
memcached.py
py
2012-10-22T23:55:00Z
Status V2UserDocumentParser::checkValidUserDocument(const BSONObj& doc) const { BSONElement userElement = doc[AuthorizationManager::USER_NAME_FIELD_NAME]; BSONElement userDBElement = doc[AuthorizationManager::USER_DB_FIELD_NAME]; BSONElement credentialsElement = doc[CREDENTIALS_FIELD_NAME]; BSONElement ...
Status V2UserDocumentParser::checkValidUserDocument(const BSONObj& doc) const { auto userIdElement = doc[AuthorizationManager::USERID_FIELD_NAME]; auto userElement = doc[AuthorizationManager::USER_NAME_FIELD_NAME]; auto userDBElement = doc[AuthorizationManager::USER_DB_FIELD_NAME]; auto credentialsEleme...
CVE-2019-2386
CWE-613
After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones. This issue affects MongoDB Server v4.0 versions prior to 4.0.9; MongoDB Server v3.6 versi...
https://github.com/mongodb/mongo/commit/db19e7ce84cfd702a4ba9983ee2ea5019f470f82
SERVER-38984 Validate unique User ID on UserCache hit (cherry picked from commit e55d6e2292e5dbe2f97153251d8193d1cc89f5d7)
null
null
2019-03-29T16:15:10Z
static int qcow2_co_readv(BlockDriverState *bs, int64_t sector_num, int remaining_sectors, QEMUIOVector *qiov) { BDRVQcowState *s = bs->opaque; int index_in_cluster, n1; int ret; int cur_nr_sectors; uint64_t cluster_offset = 0; uint64_t bytes_done = 0; QEMUIOVector...
static int qcow2_co_readv(BlockDriverState *bs, int64_t sector_num, int remaining_sectors, QEMUIOVector *qiov) { BDRVQcowState *s = bs->opaque; int index_in_cluster, n1; int ret; int cur_nr_sectors; uint64_t cluster_offset = 0; uint64_t bytes_done = 0; QEMUIOVector...
null
null
null
qemu/commit/ab0997e0afdcb272fd04784a280b2df46b0c759f
qcow2: remove memory leak Signed-off-by: Frediano Ziglio <freddy77@gmail.com> Signed-off-by: Kevin Wolf <kwolf@redhat.com>
./qemu/block/qcow2.c
c
2011-08-23T13:21:20Z
generateRandomFile (int partCount, const std::string & fn) { // // Init data. // Array2D<half> halfData; Array2D<float> floatData; Array2D<unsigned int> uintData; fillPixels<unsigned int>(uintData, width, height); fillPixels<half>(halfData, width, height); fillPixels<float>(floatData...
generateRandomFile (int partCount, const std::string & fn) { // // Init data. // Array2D<half> halfData; Array2D<float> floatData; Array2D<unsigned int> uintData; fillPixels<unsigned int>(uintData, width, height); fillPixels<half>(halfData, width, height); fillPixels<float>(floatData...
null
CWE-125
null
null
fix memory leaks and invalid memory accesses Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
null
null
null
static inline void aio_poll_complete(struct aio_kiocb *iocb, __poll_t mask) { struct file *file = iocb->poll.file; aio_complete(iocb, mangle_poll(mask), 0); fput(file); }
static inline void aio_poll_complete(struct aio_kiocb *iocb, __poll_t mask) { aio_complete(iocb, mangle_poll(mask), 0); }
CVE-2019-10125
CWE-416
An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=84c4e1f89fefe70554da0ab33be72c9be7994379
aio: simplify - and fix - fget/fput for io_submit() Al Viro root-caused a race where the IOCB_CMD_POLL handling of fget/fput() could cause us to access the file pointer after it had already been freed: "In more details - normally IOCB_CMD_POLL handling looks so: 1) io_submit(2) allocates aio_kiocb instance and p...
null
null
null
doit (void) { char *p; int rc; size_t i; if (!stringprep_check_version (STRINGPREP_VERSION)) fail ("stringprep_check_version failed (header %s runtime %s)\n", STRINGPREP_VERSION, stringprep_check_version (NULL)); if (!stringprep_check_version (NULL)) fail ("stringprep_check_version(NULL) failed\n...
doit (void) { char *badutf8 = strdup ("\x7e\x64\x61\x72\x10\x2f\x2f\xf9\x2b\x71" "\x60\x79\x7b\x2e\x63\x75\x2b\x61\x65\x72" "\x75\x65\x56\x66\x7f\x62\xc5\x76\xe5\x00"); char *s = NULL; int rc; rc = idna_to_ascii_8z (badutf8, &s, 0); free (badutf8); if (rc != IDNA_ICONV_ERROR) fail ("rc %d\n",...
null
null
null
null
libidn: stringprep_utf8_to_ucs4 now rejects invalid UTF-8. CVE-2015-2059
null
null
null
static inline void set_pte_at(struct mm_struct *mm, unsigned long addr, pte_t *ptep, pte_t pte) { if (pte_valid_ng(pte)) { if (!pte_special(pte) && pte_exec(pte)) __sync_icache_dcache(pte, addr); if (pte_dirty(pte) && pte_write(pte)) pte_val(pte) &= ~PTE_RDONLY; else pte_val(pte) |= PTE_RDONLY;...
static inline void set_pte_at(struct mm_struct *mm, unsigned long addr, pte_t *ptep, pte_t pte) { if (pte_valid_user(pte)) { if (!pte_special(pte) && pte_exec(pte)) __sync_icache_dcache(pte, addr); if (pte_dirty(pte) && pte_write(pte)) pte_val(pte) &= ~PTE_RDONLY; else pte_val(pte) |= PTE_RDONL...
CVE-2014-9803
CWE-19
arch/arm64/include/asm/pgtable.h in the Linux kernel before 3.15-rc5-next-20140519, as used in Android before 2016-07-05 on Nexus 5X and 6P devices, mishandles execute-only pages, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28557020.
https://github.com/torvalds/linux/commit/5a0fdfada3a2aa50d7b947a2e958bf00cbe0d830
Revert "arm64: Introduce execute-only page access permissions" This reverts commit bc07c2c6e9ed125d362af0214b6313dca180cb08. While the aim is increased security for --x memory maps, it does not protect against kernel level reads. Until SECCOMP is implemented for arm64, revert this patch to avoid giving a false idea o...
fault.c
c
2014-05-16T15:44:32Z
static void termsig_handler(int signum) { state = TERMINATE; qemu_notify_event(); }
static void termsig_handler(int signum) { atomic_cmpxchg(&state, RUNNING, TERMINATE); qemu_notify_event(); }
null
null
null
qemu/commit/23994a5f524aa575c7a4b2e5250f17b127d2cf2f
nbd: fix assert() on qemu-nbd stop From time to time qemu-nbd is crashing on the following assert: assert(state == TERMINATING) nbd_export_closed nbd_export_put main and the state at the moment of the crash is evaluated to TERMINATE. During shutdown process of the client the nbd_client_thread thread s...
./qemu/qemu-nbd.c
c
2016-04-14T10:20:15Z
@RequiresPermission(android.Manifest.permission.SET_WALLPAPER) public int setStream(InputStream bitmapData, Rect visibleCropHint, boolean allowBackup, @SetWallpaperFlags int which) throws IOException { validateRect(visibleCropHint); if (sGlobals.mService == null) { ...
@RequiresPermission(android.Manifest.permission.SET_WALLPAPER) public int setStream(InputStream bitmapData, Rect visibleCropHint, boolean allowBackup, @SetWallpaperFlags int which) throws IOException { validateRect(visibleCropHint); if (sGlobals.mService == null) { ...
null
null
null
https://github.com/PixelExperience/frameworks_base/commit/d4e49cbca57e2f4f2dee74138b56fe3fbcaf0261
DO NOT MERGE: Decode the input of both setStream and setResource calls first The size of the input of both setStream and setResource may very big that system server got oom while handling it, so we try to decode it first before copying it to the wallpaper path, if the decoding fails, we treat the input as an invalid i...
core/java/android/app/WallpaperManager.java
java
2021-12-02T08:23:26Z
public Response parse(String samlXml) throws IOException, SAXException, ParserConfigurationException { Response response; Element root; StringReader reader = new StringReader(samlXml); InputSource is = new InputSource(reader); DocumentBuilderFactory factory = DocumentBuilderFactory.newInstanc...
public Response parse(String samlXml) throws IOException, SAXException, ParserConfigurationException { Response response; Element root; StringReader reader = new StringReader(samlXml); InputSource is = new InputSource(reader); DocumentBuilderFactory factory = DocumentBuilderFactory.newInstanc...
null
null
null
https://github.com/indigo-iam/iam/commit/2323f7d9da89d804564f940c549fa2a4750b397c
Fix vulnerabilities by disabling access to external entities in XML parsing
iam-login-service/src/main/java/it/infn/mw/iam/util/SamlDecryptUtil.java
java
2022-03-08T15:55:59Z
readconf_main(void) { int sep = 0; struct stat statbuf; uschar *s, *filename; const uschar *list = config_main_filelist; /* Loop through the possible file names */ while((filename = string_nextinlist(&list, &sep, big_buffer, big_buffer_size)) != NULL) { /* Cut out all the fancy processing unless specifical...
readconf_main(void) { int sep = 0; struct stat statbuf; uschar *s, *filename; const uschar *list = config_main_filelist; /* Loop through the possible file names */ while((filename = string_nextinlist(&list, &sep, big_buffer, big_buffer_size)) != NULL) { /* To avoid confusion: Exim changes to / at the very...
CVE-2016-1531
CWE-264
Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
http://git.exim.org/exim.git/commitdiff/43ba2742c700d625dcdcdaf7bbadc2f72776854a
Fix CVE-2016-1531 Add keep_environment, add_environment. Change the working directory to "/" during the early startup phase. (cherry picked from commit bc3c7bb7d4aba3e563434e5627fe1f2176aa18c0) (cherry picked from commit 2b92b67bfc33efe05e6ff2ea3852731ac2273832) (cherry picked from commit 14b82c8b736c8ed24eda...
null
null
null
void vm_stop(int reason) { do_vm_stop(reason); }
void vm_stop(int reason) { if (!qemu_thread_is_self(&io_thread)) { qemu_system_vmstop_request(reason); cpu_stop_current(); return; } do_vm_stop(reason); }
null
null
null
qemu/commit/12d4536f7d911b6d87a766ad7300482ea663cea2
main: force enabling of I/O thread Enabling the I/O thread by default seems like an important part of declaring 1.0. Besides allowing true SMP support with KVM, the I/O thread means that the TCG VCPU doesn't have to multiplex itself with the I/O dispatch routines which currently requires a (racey) signal based alarm ...
./qemu/cpus.c
c
2011-08-22T13:24:58Z
TPM_EO_Unmarshal(TPM_EO *target, BYTE **buffer, INT32 *size) { TPM_RC rc = TPM_RC_SUCCESS; if (rc == TPM_RC_SUCCESS) { rc = UINT16_Unmarshal(target, buffer, size); } if (rc == TPM_RC_SUCCESS) { switch (*target) { case TPM_EO_EQ: case TPM_EO_NEQ: case TPM_EO_SIGNED_GT: case TPM_EO_UNSIGN...
TPM_EO_Unmarshal(TPM_EO *target, BYTE **buffer, INT32 *size) { TPM_RC rc = TPM_RC_SUCCESS; TPM_EO orig_target = *target; // libtpms added if (rc == TPM_RC_SUCCESS) { rc = UINT16_Unmarshal(target, buffer, size); } if (rc == TPM_RC_SUCCESS) { switch (*target) { case TPM_EO_EQ: case TPM_EO_N...
null
CWE-787
null
https://github.com/stefanberger/libtpms/commit/5cc98a62dc6f204dcf5b87c2ee83ac742a6a319b
tpm2: Restore original value if unmarshalled value was illegal Restore the original value of the memory location where data from a stream was unmarshalled and the unmarshalled value was found to be illegal. The goal is to not keep illegal values in memory. Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
null
null
2021-06-24T00:54:44Z
~AES128GCM_OnWireTxHandler() override { ::ceph::crypto::zeroize_for_security(&nonce, sizeof(nonce)); }
~AES128GCM_OnWireTxHandler() override { ::ceph::crypto::zeroize_for_security(&nonce, sizeof(nonce)); ::ceph::crypto::zeroize_for_security(&initial_nonce, sizeof(initial_nonce)); }
CVE-2020-1759
CWE-323
A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a se...
https://github.com/ceph/ceph/commit/20b7bb685c5ea74c651ca1ea547ac66b0fee7035
msg/async/ProtocolV2: avoid AES-GCM nonce reuse vulnerabilities The secure mode uses AES-128-GCM with 96-bit nonces consisting of a 32-bit counter followed by a 64-bit salt. The counter is incremented after processing each frame, the salt is fixed for the duration of the session. Both are initialized from the sessio...
null
null
2020-03-06T19:16:45Z
public AppDetailsPermissionItem getPermissionItem(String permissionName, boolean isGranted) { try { PermissionInfo permissionInfo = PermissionCompat.getPermissionInfo(permissionName, mPackageInfo.packageName, PackageManager.GET_META_DATA); if (permissionInfo == null) ...
@Nullable private AppDetailsPermissionItem getPermissionItem(@NonNull String permissionName, boolean isGranted) { PackageInfo packageInfo = getPackageInfoInternal(); if (packageInfo == null) return null; try { PermissionInfo permissionInfo = PermissionCompat.getPermissionInfo(per...
null
null
null
https://github.com/MuntashirAkon/AppManager/commit/fb2512cfad489b3b1aa56b1e48f1e2fa36c3d4bd
[AppDetails] Fix crashing when it takes too long to load ApkFile Signed-off-by: Muntashir Al-Islam <muntashirakon@riseup.net>
app/src/main/java/io/github/muntashirakon/AppManager/details/AppDetailsViewModel.java
java
2023-01-14T08:54:05Z
static struct audit_chunk *alloc_chunk(int count) { struct audit_chunk *chunk; size_t size; int i; size = offsetof(struct audit_chunk, owners) + count * sizeof(struct node); chunk = kzalloc(size, GFP_KERNEL); if (!chunk) return NULL; INIT_LIST_HEAD(&chunk->hash); INIT_LIST_HEAD(&chunk->trees); chunk->count...
static struct audit_chunk *alloc_chunk(int count) { struct audit_chunk *chunk; size_t size; int i; size = offsetof(struct audit_chunk, owners) + count * sizeof(struct node); chunk = kzalloc(size, GFP_KERNEL); if (!chunk) return NULL; INIT_LIST_HEAD(&chunk->hash); INIT_LIST_HEAD(&chunk->trees); chunk->count...
CVE-2008-5182
CWE-362
The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8f7b0ba1c853919b85b54774775f567f30006107
Fix inotify watch removal/umount races Inotify watch removals suck violently. To kick the watch out we need (in this order) inode->inotify_mutex and ih->mutex. That's fine if we have a hold on inode; however, for all other cases we need to make damn sure we don't race with umount. We can *NOT* just grab a reference...
null
null
null
xsltNumberFormatTokenize(const xmlChar *format, xsltFormatPtr tokens) { int ix = 0; int j; int val; int len; default_token.token = DEFAULT_TOKEN; default_token.width = 1; default_token.separator = BAD_CAST(DEFAULT_SEPARATOR); tokens->start = NULL; tokens->tokens[0].separator =...
xsltNumberFormatTokenize(const xmlChar *format, xsltFormatPtr tokens) { int ix = 0; int j; int val; int len; default_token.token = DEFAULT_TOKEN; default_token.width = 1; default_token.separator = BAD_CAST(DEFAULT_SEPARATOR); tokens->start = NULL; tokens->tokens[0].separator =...
CVE-2019-13117
CWE-908
In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1
Fix uninitialized read of xsl:number token Found by OSS-Fuzz.
null
null
2019-04-27T09:19:48Z
do_uncompress( compress_filter_context_t *zfx, z_stream *zs, IOBUF a, size_t *ret_len ) { int zrc; int rc=0; size_t n; int nread, count; int refill = !zs->avail_in; if( DBG_FILTER ) log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n", (unsigned)zs->avail_in, (...
do_uncompress( compress_filter_context_t *zfx, z_stream *zs, IOBUF a, size_t *ret_len ) { int zrc; int rc = 0; int leave = 0; size_t n; int nread, count; int refill = !zs->avail_in; if( DBG_FILTER ) log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n", (uns...
CVE-2014-4617
CWE-20
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
null
null
c
null
static void rpc_init_task(struct rpc_task *task, const struct rpc_task_setup *task_setup_data) { memset(task, 0, sizeof(*task)); atomic_set(&task->tk_count, 1); task->tk_flags = task_setup_data->flags; task->tk_ops = task_setup_data->callback_ops; task->tk_calldata = task_setup_data->callback_data; INIT_LIST_HEA...
static void rpc_init_task(struct rpc_task *task, const struct rpc_task_setup *task_setup_data) { memset(task, 0, sizeof(*task)); atomic_set(&task->tk_count, 1); task->tk_flags = task_setup_data->flags; task->tk_ops = task_setup_data->callback_ops; task->tk_calldata = task_setup_data->callback_data; INIT_LIST_HEA...
null
null
null
https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f
NLM: Don't hang forever on NLM unlock requests If the NLM daemon is killed on the NFS server, we can currently end up hanging forever on an 'unlock' request, instead of aborting. Basically, if the rpcbind request fails, or the server keeps returning garbage, we really want to quit instead of retrying. Tested-by: Vasi...
net/sunrpc/sched.c
c
2011-05-31T19:15:34Z
MagickExport Image *WaveImage(const Image *image,const double amplitude, const double wave_length,ExceptionInfo *exception) { #define WaveImageTag "Wave/Image" CacheView *image_view, *wave_view; float *sine_map; Image *wave_image; MagickBooleanType status; MagickOffsetType prog...
MagickExport Image *WaveImage(const Image *image,const double amplitude, const double wave_length,ExceptionInfo *exception) { #define WaveImageTag "Wave/Image" CacheView *image_view, *wave_view; float *sine_map; Image *wave_image; MagickBooleanType status; MagickOffsetType prog...
CVE-2021-20309
CWE-369
A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to system availability.
https://github.com/ImageMagick/ImageMagick6/commit/f1e68d22d1b35459421710587a0dcbab6900b51f
https://github.com/ImageMagick/ImageMagick/issues/3296
null
null
2021-02-26T00:34:36Z
static int mpeg4_decode_sprite_trajectory(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; int a = 2 << s->sprite_warping_accuracy; int rho = 3 - s->sprite_warping_accuracy; int r = 16 / a; int alpha = 0; int beta = 0; int w = s->width; int h = ...
static int mpeg4_decode_sprite_trajectory(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; int a = 2 << s->sprite_warping_accuracy; int rho = 3 - s->sprite_warping_accuracy; int r = 16 / a; int alpha = 0; int beta = 0; int w = s->width; int h = ...
null
null
null
FFmpeg/commit/76ba09d18245a2a41dc5f93a60fd00cdf358cb1f
avcodec/mpeg4videodec: Check the other 3 sprite points for intermediate overflows This is not necessarily specific to fuzzed files Fixes: Multiple integer overflows Fixes: 656/clusterfuzz-testcase-6463814516080640 Fixes: 658/clusterfuzz-testcase-6691260146384896 Found-by: continuous fuzzing process https://github.co...
./ffmpeg/libavcodec/mpeg4videodec.c
c
2017-02-23T21:33:16Z
echo '<input type="hidden" name="' . esc_attr( $field ) . '" value="' . esc_attr( wp_unslash( $_POST[ $field ] ) ) . '" />'; }
echo '<input type="hidden" name="' . esc_attr( $field ) . '" value="' . esc_attr( $submitted_form[ $field ] ) . '" />'; } ?> <p class="request-filesystem-credentials-action-buttons"> <?php wp_nonce_field( 'filesystem-credentials', '_fs_nonce', false, true ); ?> <button class="button cancel-button" data-js-action="...
CVE-2017-9064
CWE-352
In WordPress before 4.7.5, a Cross Site Request Forgery (CSRF) vulnerability exists in the filesystem credentials dialog because a nonce is not required for updating credentials.
https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
Add nonce for updating file system credentials. Built from https://develop.svn.wordpress.org/trunk@40723 git-svn-id: http://core.svn.wordpress.org/trunk@40581 1a063a9b-81f0-0310-95a4-ce76da25c4cd
updates.min.js
js
2017-05-18T14:29:00Z
snmp_mib_find_next(uint32_t *oid) { snmp_mib_resource_t *resource; resource = NULL; for(resource = list_head(snmp_mib); resource; resource = resource->next) { if(snmp_oid_cmp_oid(resource->oid, oid) > 0) { return resource; } } return NULL; }
snmp_mib_find_next(snmp_oid_t *oid) { snmp_mib_resource_t *resource; resource = NULL; for(resource = list_head(snmp_mib); resource; resource = resource->next) { if(snmp_mib_cmp_oid(&resource->oid, oid) > 0) { return resource; } } return NULL; }
CVE-2020-12141
CWE-125
An out-of-bounds read in the SNMP stack in Contiki-NG 4.4 and earlier allows an attacker to cause a denial of service and potentially disclose information via crafted SNMP packets to snmp_ber_decode_string_len_buffer in os/net/app-layer/snmp/snmp-ber.c.
https://github.com/contiki-ng/contiki-ng/commit/12c824386ab60de757de5001974d73b32e19ad71
Refactored SNMP engine after vulnerabilities
snmp-engine.c
c
2021-10-19T16:15:00Z
static int aac_adtstoasc_filter(AVBitStreamFilterContext *bsfc, AVCodecContext *avctx, const char *args, uint8_t **poutbuf, int *poutbuf_size, const uint8_t *buf, int buf_size, int keyfr...
static int aac_adtstoasc_filter(AVBitStreamFilterContext *bsfc, AVCodecContext *avctx, const char *args, uint8_t **poutbuf, int *poutbuf_size, const uint8_t *buf, int buf_size, int keyfr...
null
null
null
FFmpeg/commit/889afca369ef3a939c68592ef2b1a1756667ce21
avcodec/aac_adtstoasc_bsf: Fix memory leak Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
./ffmpeg/libavcodec/aac_adtstoasc_bsf.c
c
2014-02-03T01:16:01Z
static void build_dirs(char *src, char *dst, size_t src_prefix_len, size_t dst_prefix_len) { char *p = src + src_prefix_len + 1; char *q = dst + dst_prefix_len + 1; char *r = dst + dst_prefix_len; struct stat s; bool last = false; *r = '\0'; for (; !last; p++, q++) { if (*p == '\0') { last = true; } if ...
static void build_dirs(char *src, char *dst, size_t src_prefix_len, size_t dst_prefix_len) { char *p = src + src_prefix_len + 1; char *q = dst + dst_prefix_len + 1; char *r = dst + dst_prefix_len; struct stat s; bool last = false; *r = '\0'; for (; !last; p++, q++) { if (*p == '\0') { last = true; } if ...
CVE-2022-31214
CWE-94
A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user namespace is still the initial user namespace, the NO_NEW_PRIVS...
https://github.com/netblue30/firejail/commit/1884ea22a90d225950d81c804f1771b42ae55f54
CVE-2022-31214: fixing the fix, one more time the previous commit "CVE-2022-31214: fixing the fix" made private-etc=fonts,fonts and similar commands fail with an error fix that regression by tolerating already existing directories
null
null
2022-06-08T13:42:35Z
sendDigest(username, lastSeenAt, email) { return ajax("/admin/email/send-digest.json", { data: { last_seen_at: lastSeenAt || oneWeekAgo(), username, email }, }); }
sendDigest(username, lastSeenAt, email) { return ajax("/admin/email/send-digest.json", { type: "POST", data: { last_seen_at: lastSeenAt || oneWeekAgo(), username, email }, }); }
CVE-2022-23546
CWE-200,CWE-200
In version 2.9.0.beta14 of Discourse, an open-source discussion platform, maliciously embedded urls can leak an admin's digest of recent topics, possibly exposing private information. A patch is available for version 2.9.0.beta15. There are no known workarounds for this issue.
https://github.com/discourse/discourse/commit/cf862e736565c6fa905c12b5dbe63d0bd056efb8
SECURITY: Convert send_digest to a post request (#19746) Co-authored-by: Isaac Janzen <isaac.janzen@discourse.org>
app/assets/javascripts/admin/addon/models/email-preview.js
js
2023-01-04T22:57:12Z
void svc_rdma_send_error(struct svcxprt_rdma *xprt, struct rpcrdma_msg *rmsgp, int status) { struct ib_send_wr err_wr; struct page *p; struct svc_rdma_op_ctxt *ctxt; enum rpcrdma_errcode err; __be32 *va; int length; int ret; ret = svc_rdma_repost_recv(xprt, GFP_KERNEL); if (ret) return; p = alloc_page(G...
void svc_rdma_send_error(struct svcxprt_rdma *xprt, struct rpcrdma_msg *rmsgp,
CVE-2017-9059
CWE-404
The NFSv4 implementation in the Linux kernel through 4.11.1 allows local users to cause a denial of service (resource consumption) by leveraging improper channel callback shutdown when unmounting an NFSv4 filesystem, aka a "module reference and kernel daemon" leak.
https://github.com/torvalds/linux/commit/c70422f760c120480fee4de6c38804c72aa26bc1
Merge tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux Pull nfsd updates from Bruce Fields: "Another RDMA update from Chuck Lever, and a bunch of miscellaneous bugfixes" * tag 'nfsd-4.12' of git://linux-nfs.org/~bfields/linux: (26 commits) nfsd: Fix up the "supattr_exclcreat" attributes nfsd: encoders mus...
net/sunrpc/xprtrdma/svc_rdma_sendto.c
c
2017-05-10T20:29:23Z
SCSIDevice *scsi_bus_legacy_add_drive(SCSIBus *bus, DriveInfo *dinfo, int unit) { const char *driver; DeviceState *dev; driver = bdrv_is_sg(dinfo->bdrv) ? "scsi-generic" : "scsi-disk"; dev = qdev_create(&bus->qbus, driver); qdev_prop_set_uint32(dev, "scsi-id", unit); qdev_prop_set_drive(dev, "dr...
SCSIDevice *scsi_bus_legacy_add_drive(SCSIBus *bus, DriveInfo *dinfo, int unit) { const char *driver; DeviceState *dev; driver = bdrv_is_sg(dinfo->bdrv) ? "scsi-generic" : "scsi-disk"; dev = qdev_create(&bus->qbus, driver); qdev_prop_set_uint32(dev, "scsi-id", unit); qdev_prop_set_drive(dev, "dr...
null
null
null
qemu/commit/33e66b86d89040f0a9e99aa53deb74ce8936a649
Check return value of qdev_init() But do so only where it may actually fail. Leave the rest for the next commit. Patchworks-ID: 35167 Signed-off-by: Markus Armbruster <armbru@redhat.com> Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
./qemu/hw/scsi-bus.c
c
2009-10-06T23:15:57Z
PKL_ReplyLength(CMD_Reply *r) { int type; type = ntohs(r->reply); /* Note that reply type codes start from 1, not 0 */ if (type < 1 || type >= N_REPLY_TYPES) { return 0; } else { switch (type) { case RPY_NULL: return offsetof(CMD_Reply, data.null.EOR); case RPY_N_SOURCES: r...
PKL_ReplyLength(CMD_Reply *r) { int type; type = ntohs(r->reply); /* Note that reply type codes start from 1, not 0 */ if (type < 1 || type >= N_REPLY_TYPES) { return 0; } else { switch (type) { case RPY_NULL: return offsetof(CMD_Reply, data.null.EOR); case RPY_N_SOURCES: r...
CVE-2012-4502
CWE-189
Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACC...
http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git;a=commitdiff;h=7712455d9aa33d0db0945effaa07e900b85987b1
Fix buffer overflow when processing crafted command packets When the length of the REQ_SUBNETS_ACCESSED, REQ_CLIENT_ACCESSES command requests and the RPY_SUBNETS_ACCESSED, RPY_CLIENT_ACCESSES, RPY_CLIENT_ACCESSES_BY_INDEX, RPY_MANUAL_LIST command replies is calculated, the number of items stored in the packet is not v...
null
null
null
if (typeof content === 'string') { return renderHTML(content); }
if (typeof content === 'string') { return renderHTML(sanitize(content)); }
CVE-2021-25990
CWE-79,CWE-79
In “ifme”, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe.
https://github.com/ifmeorg/ifme/commit/83fd44ef8921a8dcf394a012e44901ab08596bdc
[#2052] Sanitize string content in renderContent
client/app/utils/index.js
js
2021-11-18T23:03:30Z
eap_request(esp, inp, id, len) eap_state *esp; u_char *inp; int id; int len; { u_char typenum; u_char vallen; int secret_len; char secret[MAXWORDLEN]; char rhostname[256]; MD5_CTX mdContext; u_char hash[MD5_SIGNATURE_SIZE]; #ifdef USE_SRP struct t_client *tc; struct t_num sval, gval, Nval, *Ap, Bval; u_char v...
eap_request(esp, inp, id, len) eap_state *esp; u_char *inp; int id; int len; { u_char typenum; u_char vallen; int secret_len; char secret[MAXWORDLEN]; char rhostname[256]; MD5_CTX mdContext; u_char hash[MD5_SIGNATURE_SIZE]; #ifdef USE_SRP struct t_client *tc; struct t_num sval, gval, Nval, *Ap, Bval; u_char v...
CVE-2020-8597
CWE-120
eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
https://github.com/paulusmack/ppp/commit/8d7970b8f3db727fe798b65f3377fe6787575426
pppd: Fix bounds check in EAP code Given that we have just checked vallen < len, it can never be the case that vallen >= len + sizeof(rhostname). This fixes the check so we actually avoid overflowing the rhostname array. Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com> Signed-off-by: Paul Mackerras <paulus...
eap.c
c
2020-02-03T04:53:28Z
public function view($id = FALSE) { $this->template->header->this_page = 'reports'; $this->template->content = new View('reports/detail'); // Load Akismet API Key (Spam Blocker) $api_akismet = Kohana::config('settings.api_akismet'); // Sanitize the report id before proceeding $id = intval($id); if ($i...
public function view($id = FALSE) { $this->template->header->this_page = 'reports'; $this->template->content = new View('reports/detail'); // Load Akismet API Key (Spam Blocker) $api_akismet = Kohana::config('settings.api_akismet'); // Sanitize the report id before proceeding $id = intval($id); if ($i...
CVE-2013-2025
CWE-79
Cross-site scripting (XSS) vulnerability in Ushahidi Platform 2.5.x through 2.6.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
https://github.com/rjmackay/Ushahidi_Web/commit/593719ff805a302e3ab2f2e535c875f90a04ea56
Better XSS protection * Add HTMLPurifier library (LGPL) * Add helper functions to html helper * Set default encoding header to UTF-8 * Make sure the doctype is the same everywhere (admin/members/frontend) * Remove use of strip_tags() and htmlspecialchars() * Replace vanilla htmlentities with html::escape() - make sure...
actions.php
php
2014-04-25T17:12:00Z
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, int recursion_level, int *printed_something, int *need_separator, int *returnval) { uint32_t soffset, offset = ms->offset; uint32_t count = m->str...
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, int recursion_level, int *printed_something, int *need_separator, int *returnval) { uint32_t soffset, offset = ms->offset; uint32_t count = m->str...
CVE-2014-1943
CWE-755
Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
https://github.com/glensc/file/commit/c0c0032b9e9eb57b91fefef905a3b018bab492d9
Fix memory leak (Anatol Belski)
softmagic.c
c
2014-02-21T14:32:48Z
@Packet public void onFlying(WrappedInFlyingPacket packet, long timeStamp) { if(packet.isPos()) { //We check if the player is in ground, since theoretically the y should be zero. double lDeltaY = data.playerInfo.lClientGround ? 0 : data.playerInfo.lDeltaY; double predicte...
@Packet public void onFlying(WrappedInFlyingPacket packet, long timeStamp) { if(packet.isPos()) { //We check if the player is in ground, since theoretically the y should be zero. double lDeltaY = data.playerInfo.lClientGround ? 0 : data.playerInfo.lDeltaY; double predicte...
null
null
null
https://github.com/funkemunky/Kauri/commit/adf2ce7af96a807e24dda13081b8578a7a25aa2f
Disabler fix, speed bypass fix, webhook impl
Regular/src/main/java/dev/brighten/anticheat/check/impl/movement/fly/FlyB.java
java
2021-03-06T16:10:51Z
@NonNull public static String ascii(String string) { return string.replaceAll("[\\x00-\\x1F\\x2F\\x7F]", ""); }
@NonNull public static String ascii(String string) { return string == null ? "Unknown" : string.replaceAll("[\\x00-\\x1F\\x2F\\x7F]", ""); }
null
null
null
https://github.com/dkanada/gelli/commit/24cb549681145171b27a9cce929531db5ada4bd8
possible fix for null value crash
app/src/main/java/com/dkanada/gramophone/util/MusicUtil.java
java
2021-06-06T07:17:19Z
static ssize_t prevent_suspend_time_ms_show(struct device *dev, struct device_attribute *attr, char *buf) { struct wakeup_source *ws = dev_get_drvdata(dev); ktime_t prevent_sleep_time = ws->prevent_sleep_time; if (ws->active && ws->autosleep_enabled) { prevent_sleep_time = ktime_add(prevent_slee...
static ssize_t prevent_suspend_time_ms_show(struct device *dev, struct device_attribute *attr, char *buf) { struct wakeup_source *ws = dev_get_drvdata(dev); ktime_t prevent_sleep_time = ws->prevent_sleep_time; if (ws->active && ws->autosleep_enabled) { prevent_sleep_time = ktime_add(prevent_slee...
null
CWE-787
null
https://github.com/torvalds/linux/commit/aa838896d87af561a33ecefea1caa4c15a68bc47
drivers core: Use sysfs_emit and sysfs_emit_at for show(device *...) functions Convert the various sprintf fmaily calls in sysfs device show functions to sysfs_emit and sysfs_emit_at for PAGE_SIZE buffer safety. Done with: $ spatch -sp-file sysfs_emit_dev.cocci --in-place --max-width=80 . And cocci script: $ cat s...
null
null
2020-09-16T20:40:39Z
int ssl3_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf, int len, int peek) { int al, i, j, ret; unsigned int n, curr_rec, num_recs, read_bytes; SSL3_RECORD *rr; SSL3_BUFFER *rbuf; void (*cb) (const SSL *ssl, int type2, int val) = NULL; rbuf = &s->rlayer.rb...
int ssl3_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf, int len, int peek) { int al, i, j, ret; unsigned int n, curr_rec, num_recs, read_bytes; SSL3_RECORD *rr; SSL3_BUFFER *rbuf; void (*cb) (const SSL *ssl, int type2, int val) = NULL; rbuf = &s->rlayer.rb...
CVE-2016-6305
CWE-20
The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=63658103d4441924f8dbfc517b99bb54758a98b9
Fix a hang with SSL_peek() If while calling SSL_peek() we read an empty record then we go into an infinite loop, continually trying to read data from the empty record and never making any progress. This could be exploited by a malicious peer in a Denial Of Service attack. CVE-2016-6305 GitHub Issue #1563 Reviewed-b...
null
null
null
def queryRuntimeInformationMultiple(self, info_name, setup_codes, values): info_name = self.plugin_name.replace("-", "_") + "_" + info_name if info_name in self._runtime_information_cache: return self._runtime_information_cache[info_name] keys = [] query_codes = [] ...
def queryRuntimeInformationMultiple(self, info_name, setup_codes, values): info_name = self.plugin_name.replace("-", "_") + "_" + info_name if info_name in self._runtime_information_cache: return self._runtime_information_cache[info_name] keys = [] query_codes = [] ...
null
null
null
https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcad
Cleanup, avoid using "eval" where "ast.literal_eval" can be used.
nuitka/plugins/PluginBase.py
py
2022-06-09T13:06:57Z
sp<MediaSource> MPEG4Extractor::getTrack(size_t index) { status_t err; if ((err = readMetaData()) != OK) { return NULL; } Track *track = mFirstTrack; while (index > 0) { if (track == NULL) { return NULL; } track = track->next; --index; } if (track == NULL) { return NULL; } Trex *trex = NULL;...
sp<MediaSource> MPEG4Extractor::getTrack(size_t index) { status_t err; if ((err = readMetaData()) != OK) { return NULL; } Track *track = mFirstTrack; while (index > 0) { if (track == NULL) { return NULL; } track = track->next; --index; } if (track == NULL) { return NULL; } Trex *trex = NULL;...
CVE-2016-2508
CWE-119
media/libmediaplayerservice/nuplayer/GenericSource.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate certain track data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafte...
https://android.googlesource.com/platform/frameworks/av/+/f81038006b4c59a5a148dcad887371206033c28f
MPEG4Extractor: ensure kKeyTrackID exists before creating an MPEG4Source as track. GenericSource: return error when no track exists. SampleIterator: make sure mSamplesPerChunk is not zero before using it as divisor. Bug: 21657957 Bug: 23705695 Bug: 22802344 Bug: 28799341 Change-Id: I7664992ade90b935d3f255dcd43ecc289...
media/libstagefright/MPEG4Extractor.cpp
cpp
null
static void new_pes_packet(PESContext *pes, AVPacket *pkt) { av_init_packet(pkt); pkt->destruct = av_destruct_packet; pkt->data = pes->buffer; pkt->size = pes->data_index; memset(pkt->data+pkt->size, 0, FF_INPUT_BUFFER_PADDING_SIZE); if (pes->sub_st && pes->stream_type == 0x83 && pes->exten...
static void new_pes_packet(PESContext *pes, AVPacket *pkt) { av_init_packet(pkt); pkt->destruct = av_destruct_packet; pkt->data = pes->buffer; pkt->size = pes->data_index; memset(pkt->data+pkt->size, 0, FF_INPUT_BUFFER_PADDING_SIZE); if (pes->sub_st && pes->stream_type == 0x83 && pes->exten...
null
null
null
FFmpeg/commit/ce9e31655e5b8f8db3bb4f13f436fc836062a514
mpegts: Mark corrupted packets Signed-off-by: Zohar Kelrich <lumimies@gmail.com> Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
./ffmpeg/libavformat/mpegts.c
c
2011-07-24T08:13:50Z
stringprep_utf8_to_ucs4 (const char *str, ssize_t len, size_t * items_written) { return g_utf8_to_ucs4_fast (str, (glong) len, (glong *) items_written); }
stringprep_utf8_to_ucs4 (const char *str, ssize_t len, size_t * items_written) { size_t n; if (len < 0) n = strlen (str); else n = len; if (u8_check ((const uint8_t *) str, n)) return NULL; return g_utf8_to_ucs4_fast (str, (glong) len, (glong *) items_written); }
null
null
null
null
libidn: stringprep_utf8_to_ucs4 now rejects invalid UTF-8. CVE-2015-2059
null
null
null
static int toneport_setup(struct usb_line6_toneport *toneport) { u32 *ticks; struct usb_line6 *line6 = &toneport->line6; struct usb_device *usbdev = line6->usbdev; ticks = kmalloc(sizeof(*ticks), GFP_KERNEL); if (!ticks) return -ENOMEM; /* sync time on device with host: */ /* note: 32-bit timestamps overflow...
static int toneport_setup(struct usb_line6_toneport *toneport) { u32 *ticks; struct usb_line6 *line6 = &toneport->line6; struct usb_device *usbdev = line6->usbdev; ticks = kmalloc(sizeof(*ticks), GFP_KERNEL); if (!ticks) return -ENOMEM; /* sync time on device with host: */ /* note: 32-bit timestamps overflow...
CVE-2019-15223
CWE-476
An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/driver.c driver.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b074ab7fc0d575247b9cc9f93bb7e007ca38840
ALSA: line6: Assure canceling delayed work at disconnection The current code performs the cancel of a delayed work at the late stage of disconnection procedure, which may lead to the access to the already cleared state. This patch assures to call cancel_delayed_work_sync() at the beginning of the disconnection proced...
null
null
null
static void _php_do_opendir(INTERNAL_FUNCTION_PARAMETERS, int createobject) { char *dirname; int dir_len; zval *zcontext = NULL; php_stream_context *context = NULL; php_stream *dirp; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|r", &dirname, &dir_len, &zcontext) == FAILURE) { RETURN_NULL(); } con...
static void _php_do_opendir(INTERNAL_FUNCTION_PARAMETERS, int createobject) { char *dirname; int dir_len; zval *zcontext = NULL; php_stream_context *context = NULL; php_stream *dirp; if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "p|r", &dirname, &dir_len, &zcontext) == FAILURE) { RETURN_NULL(); } con...
CVE-2015-4025
CWE-19
PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) ...
http://git.php.net/?p=php-src.git;a=commitdiff;h=be9b2a95adb504abd5acdc092d770444ad6f6854
Fixed bug #69418 - more s->p fixes for filenames
null
null
null
rsvg_new_text (void) { RsvgNodeText *text; text = g_new (RsvgNodeText, 1); _rsvg_node_init (&text->super); text->super.draw = _rsvg_node_text_draw; text->super.set_atts = _rsvg_node_text_set_atts; text->x = text->y = text->dx = text->dy = _rsvg_css_parse_length ("0"); return &text->super; }
rsvg_new_text (void) { RsvgNodeText *text; text = g_new (RsvgNodeText, 1); _rsvg_node_init (&text->super, RSVG_NODE_TYPE_TEXT); text->super.draw = _rsvg_node_text_draw; text->super.set_atts = _rsvg_node_text_set_atts; text->x = text->y = text->dx = text->dy = _rsvg_css_parse_length ("0"); re...
CVE-2011-3146
null
librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive...
http://git.gnome.org/browse/librsvg/commit/?id=34c95743ca692ea0e44778e41a7c0a129363de84
Store node type separately in RsvgNode The node name (formerly RsvgNode:type) cannot be used to infer the sub-type of RsvgNode that we're dealing with, since for unknown elements we put type = node-name. This lead to a (potentially exploitable) crash e.g. when the element name started with "fe" which tricked the old c...
null
null
null
static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern, const String& replacement, const String& str, const String& option, ...
static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern, const String& replacement, const String& str, const String& option, ...
CVE-2019-11935
CWE-120,CWE-125
Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7
Fix buffer overflow in mb_ereg_replace Summary: This diff has already been landed to release and to open-source branches. We're now landing it on master. CVE-2019-11935 Reviewed By: jjergus Differential Revision: D18177934 fbshipit-source-id: d108a59e38c67f5f5e835febd7255307605ba62c
ext_mbstring.cpp
cpp
2019-10-29T03:20:37Z
int getDescFlags(final int i) throws MemoryAccessException { return (int) memoryMap.load(descIndexToAddress(i) + VIRTQ_DESC_FLAGS, Sizes.SIZE_16_LOG2) & 0xFFFF; }
short getDescFlags(final int i) throws MemoryAccessException { return (short) memoryMap.load(descIndexToAddress(i) + VIRTQ_DESC_FLAGS, Sizes.SIZE_16_LOG2); }
null
null
null
https://github.com/fnuecke/sedna/commit/ae93820014397840d62f2572e720b710ac368276
Use shorts where we actually have shorts, fixes potential infinite loop when next available index is exactly the wrap point (0x8000, which as int will never equal a short value).
src/main/java/li/cil/sedna/device/virtio/AbstractVirtIODevice.java
java
2022-07-19T21:31:56Z