Home
last modified time | relevance | path

Searched refs:overflow (Results 1 – 25 of 194) sorted by relevance

12345678

/openbmc/qemu/tests/unit/
H A Dtest-shift128.c18 bool overflow; member
112 bool overflow = false; in test_lshift() local
114 ulshift(&tmp.low, &tmp.high, tmp.shift, &overflow); in test_lshift()
117 g_assert_cmpuint(tmp.overflow, ==, overflow); in test_lshift()
/openbmc/openbmc/poky/meta/recipes-devtools/gcc/gcc/
H A D0026-fix-incorrect-preprocessor-line-numbers.patch33 large to cause overflow when computing location_t values. */
121 FAIL: gcc.dg/plugin/location-overflow-test-pr116047.c -fplugin=./location_overflow_plugin.so scan-…
123 FAIL: gcc.dg/plugin/location-overflow-test-pr116047.c -fplugin=./location_overflow_plugin.so scan-…
124 FAIL: gcc.dg/plugin/location-overflow-test-pr120061.c -fplugin=./location_overflow_plugin.so scan-…
239 * gcc.dg/plugin/plugin.exp: Add location-overflow-test-pr116047.c
240 and location-overflow-test-pr120061.c.
244 * gcc.dg/plugin/location-overflow-test-pr116047.c: New test.
245 * gcc.dg/plugin/location-overflow-test-pr116047-1.h: New test.
246 * gcc.dg/plugin/location-overflow-test-pr116047-2.h: New test.
247 * gcc.dg/plugin/location-overflow-test-pr120061.c: New test.
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/opensaf/opensaf/
H A D0002-configure-Disable-selected-warnings.patch21 -AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS=-Wno-error=format-overflow])
22 +AX_CHECK_COMPILE_FLAG([-Werror=format-overflow],[NOWARNINGS='-Wno-error=format-overflow'])
/openbmc/phosphor-webui/app/server-health/styles/
H A Dinventory.scss48 overflow: hidden;
57 overflow:auto;
58 overflow-wrap: break-word;
63 overflow: auto;
/openbmc/phosphor-webui/app/common/styles/elements/
H A Dfile-upload.scss6 overflow: hidden;
16 overflow: hidden;
17 text-overflow: ellipsis;
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/yajl/yajl/
H A DCVE-2022-24795.patch6 There was an integer overflow in yajl_buf_ensure_available() leading
9 yajl_buf_ensure_available(). Another result of the overflow was an
14 integer overflow, fortifying buffer allocations, and report the
24 This patch catches the integer overflow and terminates the process
49 + /* need would overflow. */
/openbmc/openbmc/poky/meta/recipes-extended/iputils/iputils/
H A DCVE-2025-47268.patch4 Subject: [PATCH] ping: Fix signed 64-bit integer overflow in RTT calculation
6 Crafted ICMP Echo Reply packet can cause signed integer overflow in
25 …../ping/ping_common.c:757:25: runtime error: signed integer overflow: -2513732689199106 * 1000000 …
26 …../ping/ping_common.c:757:12: runtime error: signed integer overflow: -4975495174606980224 + -6510…
27 …../ping/ping_common.c:769:47: runtime error: signed integer overflow: 6960633343677281965 * 696063…
32 …../ping/ping_common.c:265:16: runtime error: signed integer overflow: 6960633343677281965 * 2 cann…
37 …../ping/ping_common.c:940:42: runtime error: signed integer overflow: 1740158335919320832 * 174015…
40 To fix the overflow check allowed ranges of struct timeval members:
68 Link: https://github.com/Zephkek/ping-rtt-overflow/
/openbmc/qemu/scripts/coccinelle/
H A Doverflow_muldiv64.cocci1 // Find muldiv64(i64, i64, x) for potential overflow
16 cocci.print_main("potential muldiv64() overflow", p)
/openbmc/openbmc/poky/meta/recipes-bsp/grub/files/
H A DCVE-2024-45780.patch4 Subject: [PATCH] fs/tar: Integer overflow leads to heap OOB write
10 using grub_add() and checking for an overflow.
53 + return grub_error (GRUB_ERR_BAD_FS, N_("name size overflow"));
66 + return grub_error (GRUB_ERR_BAD_FS, N_("link size overflow"));
89 + return grub_error (GRUB_ERR_BAD_FS, N_("long name size overflow"));
H A DCVE-2024-45777.patch4 Subject: [PATCH] gettext: Integer overflow leads to heap OOB write
7 grub_gettext_getstr_from_position() may overflow
10 an overflow.
H A DCVE-2025-0690.patch4 Subject: [PATCH] commands/read: Fix an integer overflow when supplying more
62 + grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected"));
67 + grub_error (GRUB_ERR_OUT_OF_RANGE, N_("overflow is detected"));
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/audiofile/
H A Daudiofile_0.3.6.bb17 file://0005-clamp-index-values-to-fix-index-overflow-in-IMA.cpp.patch \
18 file://0006-Check-for-multiplication-overflow-in-sfconvert.patch \
20 file://0008-Check-for-multiplication-overflow-in-MSADPCM-decodeS.patch \
/openbmc/openbmc/meta-raspberrypi/recipes-graphics/userland/files/
H A D0021-cmake-Disable-format-overflow-warning-as-error.patch4 Subject: [PATCH] cmake: Disable format-overflow warning as error
8 …rface/vcos/vcos_logging.h:234:88: error: '%s' directive argument is null [-Werror=format-overflow=]
31 + add_definitions(-Wall -Werror -Wno-error=format-overflow)
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/bearssl/bearssl/
H A D0002-test-test_x509.c-fix-potential-overflow-issue.patch4 Subject: [PATCH 2/2] test/test_x509.c: fix potential overflow issue
6 Instead of doing a memcpy() which does static overflow checking, use
16 …in_memcpy' specified bound 4294967295 exceeds maximum object size 2147483647 [-Wstringop-overflow=]
/openbmc/qemu/util/
H A Dhexdump.c107 bool overflow = umul64_overflow(data_size, 2, &required_buffer_size); in qemu_hexdump_to_buffer() local
108 overflow |= uadd64_overflow(required_buffer_size, 1, &required_buffer_size); in qemu_hexdump_to_buffer()
109 assert(!overflow && buffer_size >= required_buffer_size); in qemu_hexdump_to_buffer()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/procmail/procmail/
H A DCVE-2014-3618.patch1 Description: Fix heap-overflow in formail
2 CVE-2014-3618: Heap-overflow in formail when processing
/openbmc/openbmc/poky/meta/recipes-extended/unzip/unzip/
H A D19-cve-2016-9844-zipinfo-buffer-overflow.patch2 Subject: Fix CVE-2016-9844, buffer overflow in zipinfo
20 + * Unexpectedly large compression methods overflow
H A D18-cve-2014-9913-unzip-buffer-overflow.patch2 Subject: Fix CVE-2014-9913, buffer overflow in unzip
21 + * Unexpectedly large compression methods overflow
/openbmc/openbmc/meta-openembedded/meta-multimedia/recipes-multimedia/gstreamer-1.0/gst-shark/
H A D0001-tracers-Fix-buffer-overflow.patch4 Subject: [PATCH] tracers: Fix buffer overflow
7 | ../../../git/plugins/tracers/gstcpuusagecompute.c:106:9: error: 'fscanf' may overflow; destinatio…
/openbmc/openbmc/poky/meta/recipes-extended/zip/zip-3.0/
H A D0001-fileio.c-fix-a-buffer-overflow-detected-issue.patch4 Subject: [PATCH] fileio.c: fix a buffer overflow detected issue
10 | *** buffer overflow detected ***: terminated
/openbmc/openbmc/poky/meta/recipes-multimedia/libsndfile/libsndfile1/
H A Dcve-2022-33065.patch4 Subject: [PATCH] mat4/mat5: fix int overflow in dataend calculation
6 The clang sanitizer warns of a possible signed integer overflow when
10 src/mat4.c:323:41: runtime error: signed integer overflow: 205 * -100663296 cannot be represented i…
12 src/mat4.c:323:48: runtime error: signed integer overflow: 838860800 * 4 cannot be represented in t…
46 Subject: [PATCH] au: avoid int overflow while calculating data_end
50 (int)au_fmt.datasize. This can overflow the implicit int_32 return value
99 Subject: [PATCH] avr: fix int overflow in avr_read_header()
102 enough numeric space to avoid an int-overflow.
128 Subject: [PATCH] sds: fix int overflow warning in sample calculations
133 fuzzers become concerned that the addition operation can overflow and
[all …]
/openbmc/webui-vue/src/assets/styles/bmc/custom/
H A D_sol.scss2 overflow: auto;
/openbmc/phosphor-webui/app/common/styles/directives/
H A Dapp-navigation.scss27 overflow-y: auto;
117 overflow: hidden;
140 overflow: visible;
/openbmc/qemu/tests/tcg/hexagon/
H A DMakefile.target45 HEX_TESTS += overflow
107 overflow: overflow.c hex_test.h
/openbmc/openbmc/poky/meta/recipes-extended/unzip/
H A Dunzip_6.0.bb14 file://09-cve-2014-8139-crc-overflow.patch \
20 file://18-cve-2014-9913-unzip-buffer-overflow.patch \
21 file://19-cve-2016-9844-zipinfo-buffer-overflow.patch \

12345678