idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
13,868 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readAdobeMarker() {
int length, i;
char buf[12];
int c;
length = read16();
if (length < 14) {
goto err;
}
for (i = 0; i < 12; ++i) {
if ((c = str->getChar()) == EOF) {
goto err;
}
buf[i] = c;
}
if (strncmp(buf, "Adobe", 5)) {
goto err;
}
colorXform = buf... | 186,550,639,161,482,440,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,869 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | int DCTStream::readAmp(int size) {
int amp, bit;
int bits;
amp = 0;
for (bits = 0; bits < size; ++bits) {
if ((bit = readBit()) == EOF)
return 9999;
amp = (amp << 1) + bit;
}
if (amp < (1 << (size - 1)))
amp -= (1 << size) - 1;
return amp;
}
| 111,497,074,021,905,800,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,870 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readBaselineSOF() {
int length;
int prec;
int i;
int c;
length = read16();
prec = str->getChar();
height = read16();
width = read16();
numComps = str->getChar();
if (numComps <= 0 || numComps > 4) {
error(errSyntaxError, getPos(), "Bad number of components in DCT stream");
... | 39,717,489,081,261,520,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,871 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | int DCTStream::readBit() {
int bit;
int c, c2;
if (inputBits == 0) {
if ((c = str->getChar()) == EOF)
return EOF;
if (c == 0xff) {
do {
c2 = str->getChar();
} while (c2 == 0xff);
if (c2 != 0x00) {
error(errSyntaxError, getPos(), "Bad DCT data: missing 00 after ff");
return EOF;... | 128,188,133,316,809,200,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,872 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool FlateStream::readDynamicCodes() {
int numCodeLenCodes;
int numLitCodes;
int numDistCodes;
int codeLenCodeLengths[flateMaxCodeLenCodes];
FlateHuffmanTab codeLenCodeTab;
int len, repeat, code;
int i;
codeLenCodeTab.codes = NULL;
if ((numLitCodes = getCodeWord(5)) == EOF) {
goto err;
}
nu... | 195,271,112,125,936,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,873 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readHuffmanTables() {
DCTHuffTable *tbl;
int length;
int index;
Gushort code;
Guchar sym;
int i;
int c;
length = read16() - 2;
while (length > 0) {
index = str->getChar();
--length;
if ((index & 0x0f) >= 4) {
error(errSyntaxError, getPos(), "Bad DCT Huffman table");... | 268,503,579,746,817,130,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,874 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readJFIFMarker() {
int length, i;
char buf[5];
int c;
length = read16();
length -= 2;
if (length >= 5) {
for (i = 0; i < 5; ++i) {
if ((c = str->getChar()) == EOF) {
error(errSyntaxError, getPos(), "Bad DCT APP0 marker");
return gFalse;
}
buf[i] = c;
}
lengt... | 46,226,669,352,919,690,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,875 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readMCURow() {
int data1[64];
Guchar data2[64];
Guchar *p1, *p2;
int pY, pCb, pCr, pR, pG, pB;
int h, v, horiz, vert, hSub, vSub;
int x1, x2, y2, x3, y3, x4, y4, x5, y5, cc, i;
int c;
for (x1 = 0; x1 < width; x1 += mcuWidth) {
if (restartInterval > 0 && restartCtr == 0) {
c ... | 139,595,222,904,999,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,876 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | int DCTStream::readMarker() {
int c;
do {
do {
c = str->getChar();
} while (c != 0xff && c != EOF);
while (c == 0xff) {
c = str->getChar();
}
} while (c == 0x00);
return c;
}
| 55,997,670,536,341,670,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,877 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readProgressiveDataUnit(DCTHuffTable *dcHuffTable,
DCTHuffTable *acHuffTable,
int *prevDC, int data[64]) {
int run, size, amp, bit, c;
int i, j, k;
i = scanInfo.firstCoeff;
if (i == 0) {
if (scanInfo.ah == 0) {
if ((size = readHuffSym(dcHuffTable)) == 9999) {
return gFal... | 271,810,172,461,896,670,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,878 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readQuantTables() {
int length, prec, i, index;
length = read16() - 2;
while (length > 0) {
index = str->getChar();
prec = (index >> 4) & 0x0f;
index &= 0x0f;
if (prec > 1 || index >= 4) {
error(errSyntaxError, getPos(), "Bad DCT quantization table");
return gFalse;
... | 210,836,322,898,344,900,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,879 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readRestartInterval() {
int length;
length = read16();
if (length != 4) {
error(errSyntaxError, getPos(), "Bad DCT restart interval");
return gFalse;
}
restartInterval = read16();
return gTrue;
}
| 242,407,456,662,503,430,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,880 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void DCTStream::readScan() {
int data[64];
int x1, y1, dx1, dy1, x2, y2, y3, cc, i;
int h, v, horiz, vert, vSub;
int *p1;
int c;
if (scanInfo.numComps == 1) {
for (cc = 0; cc < numComps; ++cc) {
if (scanInfo.comp[cc]) {
break;
}
}
dx1 = mcuWidth / compInfo[cc].hSample;
dy1 = mc... | 328,314,076,742,108,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,881 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void FlateStream::readSome() {
int code1, code2;
int len, dist;
int i, j, k;
int c;
if (endOfBlock) {
if (!startBlock())
return;
}
if (compressedBlock) {
if ((code1 = getHuffmanCodeWord(&litCodeTab)) == EOF)
goto err;
if (code1 < 256) {
buf[index] = code1;
remain = 1;... | 232,217,302,658,866,670,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,882 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool DCTStream::readTrailer() {
int c;
c = readMarker();
if (c != 0xd9) { // EOI
error(errSyntaxError, getPos(), "Bad DCT trailer");
return gFalse;
}
return gTrue;
}
| 87,212,003,890,110,790,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,883 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void ImageStream::reset() {
str->reset();
}
| 62,220,805,208,610,230,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,884 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void FileStream::reset() {
#if HAVE_FSEEKO
savePos = (Guint)ftello(f);
fseeko(f, start, SEEK_SET);
#elif HAVE_FSEEK64
savePos = (Guint)ftell64(f);
fseek64(f, start, SEEK_SET);
#else
savePos = (Guint)ftell(f);
fseek(f, start, SEEK_SET);
#endif
saved = gTrue;
bufPtr = bufEnd = buf;
bufPos = start;
}
| 107,004,122,289,931,410,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,885 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void CachedFileStream::reset()
{
savePos = (Guint)cc->tell();
cc->seek(start, SEEK_SET);
saved = gTrue;
bufPtr = bufEnd = buf;
bufPos = start;
}
| 106,376,102,456,463,860,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,886 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void ASCIIHexStream::reset() {
str->reset();
buf = EOF;
eof = gFalse;
}
| 93,970,506,318,057,510,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,887 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void ASCII85Stream::reset() {
str->reset();
index = n = 0;
eof = gFalse;
}
| 238,078,907,306,310,750,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,888 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void LZWStream::reset() {
str->reset();
eof = gFalse;
inputBits = 0;
clearTable();
}
| 276,344,402,186,400,800,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,889 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void CCITTFaxStream::reset() {
int code1;
ccittReset(gFalse);
if (codingLine != NULL && refLine != NULL) {
eof = gFalse;
codingLine[0] = columns;
} else {
eof = gTrue;
}
while ((code1 = lookBits(12)) == 0) {
eatBits(1);
}
if (code1 == 0x001) {
eatBits(12);
endOfLine = gTrue;
... | 314,127,030,439,016,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,890 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void DCTStream::reset() {
int i, j;
dctReset(gFalse);
if (!readHeader()) {
y = height;
return;
}
if (numComps == 1) {
compInfo[0].hSample = compInfo[0].vSample = 1;
}
mcuWidth = compInfo[0].hSample;
mcuHeight = compInfo[0].vSample;
for (i = 1; i < numComps; ++i) {
if (compInfo[i].hS... | 143,998,398,800,329,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,891 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void FlateStream::reset() {
int cmf, flg;
flateReset(gFalse);
endOfBlock = eof = gTrue;
cmf = str->getChar();
flg = str->getChar();
if (cmf == EOF || flg == EOF)
return;
if ((cmf & 0x0f) != 0x08) {
error(errSyntaxError, getPos(), "Unknown compression method in flate stream");
return;
}
i... | 15,648,973,784,571,070,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,892 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void BufStream::reset() {
int i;
str->reset();
for (i = 0; i < bufSize; ++i) {
buf[i] = str->getChar();
}
}
| 309,627,053,664,666,640,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,893 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void FixedLengthEncoder::reset() {
str->reset();
count = 0;
}
| 152,034,079,827,620,600,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,894 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void ASCIIHexEncoder::reset() {
str->reset();
bufPtr = bufEnd = buf;
lineLen = 0;
eof = gFalse;
}
| 211,871,273,287,218,140,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,895 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void ASCII85Encoder::reset() {
str->reset();
bufPtr = bufEnd = buf;
lineLen = 0;
eof = gFalse;
}
| 144,647,009,444,224,010,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,896 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void RunLengthEncoder::reset() {
str->reset();
bufPtr = bufEnd = nextEnd = buf;
eof = gFalse;
}
| 255,505,010,277,236,960,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,897 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void CMYKGrayEncoder::reset() {
str->reset();
bufPtr = bufEnd = buf;
eof = gFalse;
}
| 323,581,558,247,967,920,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,898 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void RGBGrayEncoder::reset() {
str->reset();
bufPtr = bufEnd = buf;
eof = gFalse;
}
| 51,737,954,097,667,510,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,899 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void DCTStream::restart() {
int i;
inputBits = 0;
restartCtr = restartInterval;
for (i = 0; i < numComps; ++i) {
compInfo[i].prevDC = 0;
}
eobRun = 0;
}
| 175,923,610,902,124,160,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,900 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void FilterStream::setPos(Guint pos, int dir) {
error(errInternal, -1, "Internal: called setPos() on FilterStream");
}
| 203,565,435,180,007,080,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,901 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void FileStream::setPos(Guint pos, int dir) {
Guint size;
if (dir >= 0) {
#if HAVE_FSEEKO
fseeko(f, pos, SEEK_SET);
#elif HAVE_FSEEK64
fseek64(f, pos, SEEK_SET);
#else
fseek(f, pos, SEEK_SET);
#endif
bufPos = pos;
} else {
#if HAVE_FSEEKO
fseeko(f, 0, SEEK_END);
size = (Guint)ftello(f);
#... | 64,952,459,596,499,080,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,902 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void CachedFileStream::setPos(Guint pos, int dir)
{
Guint size;
if (dir >= 0) {
cc->seek(pos, SEEK_SET);
bufPos = pos;
} else {
cc->seek(0, SEEK_END);
size = (Guint)cc->tell();
if (pos > size)
pos = (Guint)size;
cc->seek(-(int)pos, SEEK_END);
bufPos = (Guint)cc->tell();
}
... | 258,587,322,253,694,600,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,903 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void MemStream::setPos(Guint pos, int dir) {
Guint i;
if (dir >= 0) {
i = pos;
} else {
i = start + length - pos;
}
if (i < start) {
i = start;
} else if (i > start + length) {
i = start + length;
}
bufPtr = buf + i;
}
| 96,263,108,667,742,990,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,904 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void EmbedStream::setPos(Guint pos, int dir) {
error(errInternal, -1, "Internal: called setPos() on EmbedStream");
}
| 243,142,746,724,916,580,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,905 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void ImageStream::skipLine() {
str->doGetChars(inputLineSize, inputLine);
}
| 288,810,199,929,447,470,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,906 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | GBool FlateStream::startBlock() {
int blockHdr;
int c;
int check;
if (litCodeTab.codes != fixedLitCodeTab.codes) {
gfree(litCodeTab.codes);
}
litCodeTab.codes = NULL;
if (distCodeTab.codes != fixedDistCodeTab.codes) {
gfree(distCodeTab.codes);
}
distCodeTab.codes = NULL;
blockHdr = getCode... | 230,839,638,076,542,220,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,907 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void DCTStream::transformDataUnit(Gushort *quantTable,
int dataIn[64], Guchar dataOut[64]) {
int v0, v1, v2, v3, v4, v5, v6, v7, t;
int *p;
int i;
for (i = 0; i < 64; ++i) {
dataIn[i] *= quantTable[i];
}
for (i = 0; i < 64; i += 8) {
p = dataIn + i;
if (p[1] == 0 && p[2] == 0 && p[3] ==... | 296,746,248,095,749,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,908 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void CCITTFaxStream::unfilteredReset() {
ccittReset(gTrue);
}
| 212,998,724,501,965,800,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,909 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void DCTStream::unfilteredReset() {
dctReset(gTrue);
}
| 69,175,735,782,439,090,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,910 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | void FlateStream::unfilteredReset() {
flateReset(gTrue);
}
| 133,071,212,733,506,700,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,911 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | ASCII85Encoder::~ASCII85Encoder() {
if (str->isEncoder())
delete str;
}
| 272,336,246,517,723,050,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,912 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | ASCII85Stream::~ASCII85Stream() {
delete str;
}
| 263,329,935,621,302,000,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,913 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | ASCIIHexEncoder::~ASCIIHexEncoder() {
if (str->isEncoder()) {
delete str;
}
}
| 189,094,742,275,088,100,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,914 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | BaseStream::~BaseStream() {
dict.free();
}
| 202,530,895,962,941,760,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,915 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | BufStream::~BufStream() {
gfree(buf);
delete str;
}
| 219,076,413,311,075,560,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,916 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | CCITTFaxStream::~CCITTFaxStream() {
delete str;
gfree(refLine);
gfree(codingLine);
}
| 254,867,456,336,364,300,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,917 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | CachedFileStream::~CachedFileStream()
{
close();
cc->decRefCnt();
}
| 211,811,500,429,023,000,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,918 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | DCTStream::~DCTStream() {
close();
delete str;
}
| 258,941,209,492,839,770,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,919 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | EOFStream::~EOFStream() {
delete str;
}
| 292,598,576,784,281,200,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,920 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | EmbedStream::~EmbedStream() {
}
| 304,682,167,336,887,240,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,921 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | FileStream::~FileStream() {
close();
}
| 127,420,857,969,537,000,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,922 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | FilterStream::~FilterStream() {
}
| 277,381,907,962,029,400,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,923 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | FixedLengthEncoder::~FixedLengthEncoder() {
if (str->isEncoder())
delete str;
}
| 288,006,330,895,440,400,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,924 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | FlateStream::~FlateStream() {
if (litCodeTab.codes != fixedLitCodeTab.codes) {
gfree(litCodeTab.codes);
}
if (distCodeTab.codes != fixedDistCodeTab.codes) {
gfree(distCodeTab.codes);
}
if (pred) {
delete pred;
}
delete str;
}
| 295,519,362,119,435,720,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,925 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | ImageStream::~ImageStream() {
if (imgLine != (Guchar *)inputLine) {
gfree(imgLine);
}
gfree(inputLine);
}
| 149,367,493,564,375,920,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,926 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | LZWStream::~LZWStream() {
if (pred) {
delete pred;
}
delete str;
}
| 260,979,274,030,304,430,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,927 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | MemStream::~MemStream() {
if (needFree) {
gfree(buf);
}
}
| 155,421,279,419,423,850,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,928 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | OutStream::~OutStream ()
{
}
| 94,242,566,679,294,990,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,929 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | RGBGrayEncoder::~RGBGrayEncoder() {
if (str->isEncoder())
delete str;
}
| 155,528,758,151,057,120,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,930 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | RunLengthEncoder::~RunLengthEncoder() {
if (str->isEncoder())
delete str;
}
| 69,343,108,356,172,590,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,931 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | RunLengthStream::~RunLengthStream() {
delete str;
}
| 203,716,026,811,443,760,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,932 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | Stream::~Stream() {
}
| 134,079,390,197,290,880,000,000,000,000,000,000,000 | Stream.cc | 200,737,020,042,868,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
13,933 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | Splash::Splash(SplashBitmap *bitmapA, GBool vectorAntialiasA,
SplashScreenParams *screenParams) {
int i;
bitmap = bitmapA;
vectorAntialias = vectorAntialiasA;
inShading = gFalse;
state = new SplashState(bitmap->width, bitmap->height, vectorAntialias,
screenParams);
if (vectorAntialias) {
a... | 78,445,102,574,565,460,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,934 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | Splash::Splash(SplashBitmap *bitmapA, GBool vectorAntialiasA,
SplashScreen *screenA) {
int i;
bitmap = bitmapA;
inShading = gFalse;
vectorAntialias = vectorAntialiasA;
state = new SplashState(bitmap->width, bitmap->height, vectorAntialias,
screenA);
if (vectorAntialias) {
aaBuf = new Splas... | 104,713,533,078,103,900,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,935 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashError Splash::arbitraryTransformImage(SplashImageSource src, void *srcData,
SplashColorMode srcMode, int nComps,
GBool srcAlpha,
int srcWidth, int srcHeight,
SplashCoord *mat, GBool interpolate,
GBool tilingPattern) {
SplashBitmap *scaledImg;
SplashClipResult c... | 40,143,756,312,744,210,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,936 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::blitImageClipped(SplashBitmap *src, GBool srcAlpha,
int xSrc, int ySrc, int xDest, int yDest,
int w, int h) {
SplashPipe pipe;
SplashColor pixel;
Guchar *ap;
int x, y;
if (vectorAntialias) {
pipeInit(&pipe, xDest, yDest, NULL, pixel,
(Guchar)splashRound(state->fillAlp... | 1,322,745,843,915,517,300,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,937 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashError Splash::blitTransparent(SplashBitmap *src, int xSrc, int ySrc,
int xDest, int yDest, int w, int h) {
SplashColorPtr p, sp;
Guchar *q;
int x, y, mask, srcMask;
if (src->mode != bitmap->mode) {
return splashErrModeMismatch;
}
switch (bitmap->mode) {
case splashModeMono1:
for (y... | 4,202,452,939,743,593,300,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,938 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::clear(SplashColorPtr color, Guchar alpha) {
SplashColorPtr row, p;
Guchar mono;
int x, y;
switch (bitmap->mode) {
case splashModeMono1:
mono = (color[0] & 0x80) ? 0xff : 0x00;
if (bitmap->rowSize < 0) {
memset(bitmap->data + bitmap->rowSize * (bitmap->height - 1),
mono, -bitm... | 266,747,213,691,409,030,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,939 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | static inline Guchar clip255(int x) {
return x < 0 ? 0 : x > 255 ? 255 : x;
}
| 228,539,417,576,044,980,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,940 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashError Splash::composite(SplashBitmap *src, int xSrc, int ySrc,
int xDest, int yDest, int w, int h,
GBool noClip, GBool nonIsolated,
GBool knockout, SplashCoord knockoutOpacity) {
SplashPipe pipe;
SplashColor pixel;
Guchar alpha;
Guchar *ap;
int x, y;
if (src->mode != bitmap... | 155,793,864,358,587,600,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,941 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::compositeBackground(SplashColorPtr color) {
SplashColorPtr p;
Guchar *q;
Guchar alpha, alpha1, c, color0, color1, color2;
#if SPLASH_CMYK
Guchar color3;
Guchar colorsp[SPOT_NCOMPS+4], cp;
#endif
int x, y, mask;
if (unlikely(bitmap->alpha == NULL)) {
error(errInternal, -1, "bitmap->alpha ... | 298,418,715,867,064,500,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,942 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | inline void Splash::drawAAPixel(SplashPipe *pipe, int x, int y) {
#if splashAASize == 4
static int bitCount4[16] = { 0, 1, 1, 2, 1, 2, 2, 3,
1, 2, 2, 3, 2, 3, 3, 4 };
int w;
#else
int xx, yy;
#endif
SplashColorPtr p;
int x0, x1, t;
if (x < 0 || x >= bitmap->width ||
y < state->clip->getYMin... | 4,767,476,607,220,140,500,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,943 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashError Splash::drawImage(SplashImageSource src, void *srcData,
SplashColorMode srcMode, GBool srcAlpha,
int w, int h, SplashCoord *mat, GBool interpolate,
GBool tilingPattern) {
GBool ok;
SplashBitmap *scaledImg;
SplashClipResult clipRes;
GBool minorAxisZero;
int x0, y0, x1, y1... | 60,185,444,837,233,980,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,944 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | inline void Splash::drawSpan(SplashPipe *pipe, int x0, int x1, int y,
GBool noClip) {
int x;
if (noClip) {
pipeSetXY(pipe, x0, y);
for (x = x0; x <= x1; ++x) {
(this->*pipe->run)(pipe);
}
updateModX(x0);
updateModX(x1);
updateModY(y);
} else {
if (x0 < state->clip->getXM... | 265,481,044,473,609,900,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,945 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::dumpXPath(SplashXPath *path) {
int i;
for (i = 0; i < path->length; ++i) {
printf(" %4d: x0=%8.2f y0=%8.2f x1=%8.2f y1=%8.2f %s%s%s\n",
i, (double)path->segs[i].x0, (double)path->segs[i].y0,
(double)path->segs[i].x1, (double)path->segs[i].y1,
(path->segs[i].flags & splashXPathHoriz) ?... | 313,973,587,989,428,050,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,946 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | static void expandRow(Guchar *srcBuf, Guchar *dstBuf, int srcWidth, int scaledWidth, int nComps)
{
double xStep = (double)srcWidth/scaledWidth;
double xSrc = 0.0;
double xFrac, xInt;
int p;
for (int i = 0; i < nComps; i++)
srcBuf[srcWidth*nComps + i] = srcBuf[(srcWidth-1)*nComps + i];
for (int x = 0; ... | 331,206,781,713,349,550,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,947 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::fillGlyph2(int x0, int y0, SplashGlyphBitmap *glyph, GBool noClip) {
SplashPipe pipe;
int alpha0;
Guchar alpha;
Guchar *p;
int x1, y1, xx, xx1, yy;
p = glyph->data;
int xStart = x0 - glyph->x;
int yStart = y0 - glyph->y;
int xxLimit = glyph->w;
int yyLimit = glyph->h;
int xShift = 0;... | 297,281,205,203,288,800,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,948 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::flattenCurve(SplashCoord x0, SplashCoord y0,
SplashCoord x1, SplashCoord y1,
SplashCoord x2, SplashCoord y2,
SplashCoord x3, SplashCoord y3,
SplashCoord *matrix, SplashCoord flatness2,
SplashPath *fPath) {
SplashCoord cx[splashMaxCurveSplits + 1][3];
SplashCoord cy[splashMaxCur... | 251,713,089,932,952,430,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,949 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | GBool Splash::getStrokeAdjust() {
return state->strokeAdjust;
}
| 172,246,401,092,770,000,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,950 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | static inline int imgCoordMungeLower(SplashCoord x) {
return splashFloor(x);
}
| 331,279,603,671,244,700,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,951 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | static inline int imgCoordMungeLowerC(SplashCoord x, GBool glyphMode) {
return glyphMode ? (splashCeil(x + 0.5) - 1) : splashFloor(x);
}
| 240,154,164,102,152,700,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,952 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | static inline int imgCoordMungeUpper(SplashCoord x) {
return splashFloor(x) + 1;
}
| 163,328,488,484,216,400,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,953 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | static inline int imgCoordMungeUpperC(SplashCoord x, GBool glyphMode) {
return glyphMode ? (splashCeil(x + 0.5) - 1) : (splashFloor(x) + 1);
}
| 201,240,767,136,669,260,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,954 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | static GBool isImageInterpolationRequired(int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
GBool interpolate) {
if (interpolate)
return gTrue;
/* When scale factor is >= 400% we don't interpolate. See bugs #25268... | 70,463,434,082,778,650,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,955 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashPath *Splash::makeStrokePath(SplashPath *path, SplashCoord w,
GBool flatten) {
SplashPath *pathIn, *dashPath, *pathOut;
SplashCoord d, dx, dy, wdx, wdy, dxNext, dyNext, wdxNext, wdyNext;
SplashCoord crossprod, dotprod, miter, m;
GBool first, last, closed;
int subpathStart0, subpathStart1, seg, i0,... | 78,502,745,724,167,460,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,956 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | GBool Splash::pathAllOutside(SplashPath *path) {
SplashCoord xMin1, yMin1, xMax1, yMax1;
SplashCoord xMin2, yMin2, xMax2, yMax2;
SplashCoord x, y;
int xMinI, yMinI, xMaxI, yMaxI;
int i;
xMin1 = xMax1 = path->pts[0].x;
yMin1 = yMax1 = path->pts[0].y;
for (i = 1; i < path->length; ++i) {
if (path->pt... | 173,685,632,315,474,150,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,957 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | inline void Splash::pipeIncX(SplashPipe *pipe) {
++pipe->x;
if (state->softMask) {
++pipe->softMaskPtr;
}
switch (bitmap->mode) {
case splashModeMono1:
if (!(pipe->destColorMask >>= 1)) {
pipe->destColorMask = 0x80;
++pipe->destColorPtr;
}
break;
case splashModeMono8:
++pipe-... | 31,827,998,554,647,810,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,958 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | inline void Splash::pipeInit(SplashPipe *pipe, int x, int y,
SplashPattern *pattern, SplashColorPtr cSrc,
Guchar aInput, GBool usesShape,
GBool nonIsolatedGroup,
GBool knockout, Guchar knockoutOpacity) {
pipeSetXY(pipe, x, y);
pipe->pattern = NULL;
if (pattern) {
if (pattern->... | 5,632,847,430,739,744,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,959 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRun(SplashPipe *pipe) {
Guchar aSrc, aDest, alphaI, alphaIm1, alpha0, aResult;
SplashColor cSrcNonIso, cDest, cBlend;
SplashColorPtr cSrc;
Guchar cResult0, cResult1, cResult2, cResult3;
int t;
#if SPLASH_CMYK
int cp, mask;
Guchar cResult[SPOT_NCOMPS+4];
#endif
if (pipe->pattern) {
... | 7,583,502,897,104,468,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,960 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunAABGR8(SplashPipe *pipe) {
Guchar aSrc, aDest, alpha2, aResult;
SplashColor cDest;
Guchar cResult0, cResult1, cResult2;
cDest[0] = pipe->destColorPtr[2];
cDest[1] = pipe->destColorPtr[1];
cDest[2] = pipe->destColorPtr[0];
aDest = *pipe->destAlphaPtr;
aSrc = div255(pipe->aInput * pi... | 266,571,143,205,810,420,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,961 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunAACMYK8(SplashPipe *pipe) {
Guchar aSrc, aDest, alpha2, aResult;
SplashColor cDest;
Guchar cResult0, cResult1, cResult2, cResult3;
cDest[0] = pipe->destColorPtr[0];
cDest[1] = pipe->destColorPtr[1];
cDest[2] = pipe->destColorPtr[2];
cDest[3] = pipe->destColorPtr[3];
aDest = *pipe->d... | 188,544,537,088,112,380,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,962 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunAADeviceN8(SplashPipe *pipe) {
Guchar aSrc, aDest, alpha2, aResult;
SplashColor cDest;
Guchar cResult[SPOT_NCOMPS+4];
int cp, mask;
for (cp=0; cp < SPOT_NCOMPS+4; cp++)
cDest[cp] = pipe->destColorPtr[cp];
aDest = *pipe->destAlphaPtr;
aSrc = div255(pipe->aInput * pipe->shape);
... | 71,307,428,410,861,780,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,963 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunAAMono1(SplashPipe *pipe) {
Guchar aSrc;
SplashColor cDest;
Guchar cResult0;
cDest[0] = (*pipe->destColorPtr & pipe->destColorMask) ? 0xff : 0x00;
aSrc = div255(pipe->aInput * pipe->shape);
cResult0 = state->grayTransfer[(Guchar)div255((0xff - aSrc) * cDest[0] +
aSrc * pipe->cSr... | 184,146,554,153,562,780,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,964 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunAAMono8(SplashPipe *pipe) {
Guchar aSrc, aDest, alpha2, aResult;
SplashColor cDest;
Guchar cResult0;
cDest[0] = *pipe->destColorPtr;
aDest = *pipe->destAlphaPtr;
aSrc = div255(pipe->aInput * pipe->shape);
aResult = aSrc + aDest - div255(aSrc * aDest);
alpha2 = aResult;
if (alph... | 157,893,347,885,560,310,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,965 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunAARGB8(SplashPipe *pipe) {
Guchar aSrc, aDest, alpha2, aResult;
SplashColor cDest;
Guchar cResult0, cResult1, cResult2;
cDest[0] = pipe->destColorPtr[0];
cDest[1] = pipe->destColorPtr[1];
cDest[2] = pipe->destColorPtr[2];
aDest = *pipe->destAlphaPtr;
aSrc = div255(pipe->aInput * pi... | 271,293,049,023,928,960,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,966 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunAAXBGR8(SplashPipe *pipe) {
Guchar aSrc, aDest, alpha2, aResult;
SplashColor cDest;
Guchar cResult0, cResult1, cResult2;
cDest[0] = pipe->destColorPtr[2];
cDest[1] = pipe->destColorPtr[1];
cDest[2] = pipe->destColorPtr[0];
aDest = *pipe->destAlphaPtr;
aSrc = div255(pipe->aInput * p... | 270,696,678,170,919,700,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,967 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunSimpleCMYK8(SplashPipe *pipe) {
if (state->overprintMask & 1) {
pipe->destColorPtr[0] = (state->overprintAdditive) ?
std::min<int>(pipe->destColorPtr[0] + state->cmykTransferC[pipe->cSrc[0]], 255) :
state->cmykTransferC[pipe->cSrc[0]];
}
if (state->overprintMas... | 157,625,503,262,964,080,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.