idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
13,968 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunSimpleDeviceN8(SplashPipe *pipe) {
int mask = 1;
for (int cp = 0; cp < SPOT_NCOMPS+4; cp++) {
if (state->overprintMask & mask) {
pipe->destColorPtr[cp] = state->deviceNTransfer[cp][pipe->cSrc[cp]];
}
mask <<=1;
}
pipe->destColorPtr += (SPOT_NCOMPS+4);
*pipe->destAlphaPtr+... | 294,183,302,448,922,380,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,969 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunSimpleMono1(SplashPipe *pipe) {
Guchar cResult0;
cResult0 = state->grayTransfer[pipe->cSrc[0]];
if (state->screen->test(pipe->x, pipe->y, cResult0)) {
*pipe->destColorPtr |= pipe->destColorMask;
} else {
*pipe->destColorPtr &= ~pipe->destColorMask;
}
if (!(pipe->destColorMask >>... | 98,959,696,726,793,570,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,970 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunSimpleMono8(SplashPipe *pipe) {
*pipe->destColorPtr++ = state->grayTransfer[pipe->cSrc[0]];
*pipe->destAlphaPtr++ = 255;
++pipe->x;
}
| 294,222,332,945,490,600,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,971 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunSimpleRGB8(SplashPipe *pipe) {
*pipe->destColorPtr++ = state->rgbTransferR[pipe->cSrc[0]];
*pipe->destColorPtr++ = state->rgbTransferG[pipe->cSrc[1]];
*pipe->destColorPtr++ = state->rgbTransferB[pipe->cSrc[2]];
*pipe->destAlphaPtr++ = 255;
++pipe->x;
}
| 264,840,721,384,559,700,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,972 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::pipeRunSimpleXBGR8(SplashPipe *pipe) {
*pipe->destColorPtr++ = state->rgbTransferB[pipe->cSrc[2]];
*pipe->destColorPtr++ = state->rgbTransferG[pipe->cSrc[1]];
*pipe->destColorPtr++ = state->rgbTransferR[pipe->cSrc[0]];
*pipe->destColorPtr++ = 255;
*pipe->destAlphaPtr++ = 255;
++pipe->x;
}
| 315,841,449,867,752,400,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,973 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | inline void Splash::pipeSetXY(SplashPipe *pipe, int x, int y) {
pipe->x = x;
pipe->y = y;
if (state->softMask) {
pipe->softMaskPtr =
&state->softMask->data[y * state->softMask->rowSize + x];
}
switch (bitmap->mode) {
case splashModeMono1:
pipe->destColorPtr = &bitmap->data[y * bitmap->rowSiz... | 202,919,000,982,924,700,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,974 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashBitmap *Splash::scaleImage(SplashImageSource src, void *srcData,
SplashColorMode srcMode, int nComps,
GBool srcAlpha, int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight, GBool interpolate) {
SplashBitmap *dest;
dest = new SplashBitmap(scaledWidth, scaledHeight, 1, srcMode, srcAlpha... | 51,947,996,966,085,840,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,975 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleImageYdXd(SplashImageSource src, void *srcData,
SplashColorMode srcMode, int nComps,
GBool srcAlpha, int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf, *alphaLineBuf;
Guint *pixBuf, *alphaPixBuf;
Guint pix0, pix1, pi... | 98,872,947,474,802,500,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,976 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleImageYdXu(SplashImageSource src, void *srcData,
SplashColorMode srcMode, int nComps,
GBool srcAlpha, int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf, *alphaLineBuf;
Guint *pixBuf, *alphaPixBuf;
Guint pix[splashMaxC... | 46,070,095,541,694,170,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,977 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleImageYuXd(SplashImageSource src, void *srcData,
SplashColorMode srcMode, int nComps,
GBool srcAlpha, int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf, *alphaLineBuf;
Guint pix[splashMaxColorComps];
Guint alpha;
Gu... | 81,051,940,170,692,060,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,978 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleImageYuXuBilinear(SplashImageSource src, void *srcData,
SplashColorMode srcMode, int nComps,
GBool srcAlpha, int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
... | 111,577,181,566,435,800,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,979 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashBitmap *Splash::scaleMask(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight) {
SplashBitmap *dest;
dest = new SplashBitmap(scaledWidth, scaledHeight, 1, splashModeMono8,
gFalse);
if (scaledHeight < srcHeight) {
if (scaledWidth < srcWid... | 172,606,292,554,745,700,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,980 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleMaskYdXd(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint *pixBuf;
Guint pix;
Guchar *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, xx, d, d0, d1;
int i, j;
... | 331,252,980,996,686,200,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,981 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleMaskYdXu(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint *pixBuf;
Guint pix;
Guchar *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, d;
int i, j;
yp = srcHei... | 201,240,678,830,433,840,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,982 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleMaskYuXd(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint pix;
Guchar *destPtr0, *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, xx, d, d0, d1;
int i;
yp = sca... | 88,736,844,546,603,860,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,983 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::scaleMaskYuXu(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint pix;
Guchar *destPtr0, *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, xx;
int i, j;
destPtr0 = dest-... | 172,587,218,735,562,920,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,984 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::setOverprintMask(Guint overprintMask, GBool additive) {
state->overprintMask = overprintMask;
state->overprintAdditive = additive;
}
| 177,966,026,090,103,070,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,985 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::setOverprintMode(int opm) {
state->overprintMode = opm;
}
| 63,804,503,654,104,660,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,986 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::setStrokeOverprint(GBool gop) {
state->strokeOverprint = gop;
}
| 103,975,319,963,052,200,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,987 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::setTransfer(Guchar *red, Guchar *green, Guchar *blue,
Guchar *gray) {
state->setTransfer(red, green, blue, gray);
}
| 208,300,420,433,997,340,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,988 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashError Splash::shadedFill(SplashPath *path, GBool hasBBox,
SplashPattern *pattern) {
SplashPipe pipe;
SplashXPath *xPath;
SplashXPathScanner *scanner;
int xMinI, yMinI, xMaxI, yMaxI, x0, x1, y;
SplashClipResult clipRes;
if (vectorAntialias && aaBuf == NULL) { // should n... | 16,539,090,734,049,885,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,989 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashError Splash::stroke(SplashPath *path) {
SplashPath *path2, *dPath;
SplashCoord d1, d2, t1, t2, w;
if (debugMode) {
printf("stroke [dash:%d] [width:%.2f]:\n",
state->lineDashLength, (double)state->lineWidth);
dumpPath(path);
}
opClipRes = splashClipAllOutside;
if (path->length == 0) {
... | 17,457,670,276,741,736,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,990 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::strokeNarrow(SplashPath *path) {
SplashPipe pipe;
SplashXPath *xPath;
SplashXPathSeg *seg;
int x0, x1, y0, y1, xa, xb, y;
SplashCoord dxdy;
SplashClipResult clipRes;
int nClipRes[3];
int i;
nClipRes[0] = nClipRes[1] = nClipRes[2] = 0;
xPath = new SplashXPath(path, state->matrix, state... | 172,645,296,861,949,530,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,991 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::strokeWide(SplashPath *path, SplashCoord w) {
SplashPath *path2;
path2 = makeStrokePath(path, w, gFalse);
fillWithPattern(path2, gFalse, state->strokePattern, state->strokeAlpha);
delete path2;
}
| 296,678,347,658,039,460,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,992 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | void Splash::vertFlipImage(SplashBitmap *img, int width, int height,
int nComps) {
Guchar *lineBuf;
Guchar *p0, *p1;
int w;
w = width * nComps;
lineBuf = (Guchar *)gmalloc(w);
for (p0 = img->data, p1 = img->data + (height - 1) * w;
p0 < p1;
p0 += w, p1 -= w) {
memcpy(lineBuf, p0, w)... | 173,881,635,335,238,560,000,000,000,000,000,000,000 | Splash.cc | 186,046,208,096,924,120,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,993 | poppler | a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a9b8ab4657dec65b8b86c225d12c533ad7e984e2 | Fix crash in broken file 1031.pdf.asan.48.15 | 0 | SplashError Splash::xorFill(SplashPath *path, GBool eo) {
SplashPipe pipe;
SplashXPath *xPath;
SplashXPathScanner *scanner;
int xMinI, yMinI, xMaxI, yMaxI, x0, x1, y;
SplashClipResult clipRes, clipRes2;
SplashBlendFunc origBlendFunc;
if (path->length == 0) {
return splashErrEmptyPath;
}
xPath = n... | 10,910,927,582,143,465,000,000,000,000,000,000,000 | None | null | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,994 | poppler | a205e71a2dbe0c8d4f4905a76a3f79ec522eacec | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec | Do not crash in broken documents like 1007.pdf.asan.48.4 | 0 | static inline int imgCoordMungeLower(SplashCoord x) {
return splashCeil(x + 0.5) - 1;
}
| 148,892,087,862,231,680,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
13,995 | poppler | a205e71a2dbe0c8d4f4905a76a3f79ec522eacec | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=a205e71a2dbe0c8d4f4905a76a3f79ec522eacec | Do not crash in broken documents like 1007.pdf.asan.48.4 | 0 | static inline int imgCoordMungeUpper(SplashCoord x) {
return splashCeil(x + 0.5) - 1;
}
| 84,030,816,362,664,570,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [] | CVE-2013-1789 | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | https://nvd.nist.gov/vuln/detail/CVE-2013-1789 |
14,001 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 0 | void Splash::arbitraryTransformMask(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
SplashCoord *mat, GBool glyphMode) {
SplashBitmap *scaledMask;
SplashClipResult clipRes, clipRes2;
SplashPipe pipe;
int scaledWidth, scaledHeight, t0, t1;
SplashCoord r00, r01, r10, r11, ... | 53,868,594,213,493,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
14,002 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 0 | void Splash::blitMask(SplashBitmap *src, int xDest, int yDest,
SplashClipResult clipRes) {
SplashPipe pipe;
Guchar *p;
int w, h, x, y;
w = src->getWidth();
h = src->getHeight();
p = src->getDataPtr();
if (p == NULL) {
error(errInternal, -1, "src->getDataPtr() is NULL in Splash::blitMask");
... | 310,125,584,350,330,300,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
14,003 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 0 | void Splash::scaleMaskYdXu(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint *pixBuf;
Guint pix;
Guchar *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, d;
int i, j;
destPtr =... | 72,877,343,906,408,340,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
14,004 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 0 | void Splash::scaleMaskYuXd(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint pix;
Guchar *destPtr0, *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, xx, d, d0, d1;
int i;
destPt... | 131,271,799,793,382,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
14,005 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 0 | void Splash::vertFlipImage(SplashBitmap *img, int width, int height,
int nComps) {
Guchar *lineBuf;
Guchar *p0, *p1;
int w;
if (unlikely(img->data == NULL)) {
error(errInternal, -1, "img->data is NULL in Splash::vertFlipImage");
return;
}
w = width * nComps;
lineBuf = (Guchar *)gmalloc(w... | 73,968,369,994,911,790,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
14,006 | ghostscript | 671fd59eb657743aa86fbc1895cb15872a317caa | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=671fd59eb657743aa86fbc1895cb15872a317caa | None | 0 | ztoken(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
switch (r_type(op)) {
default:
return_op_typecheck(op);
case t_file: {
stream *s;
scanner_state state;
check_read_file(i_ctx_p, s, op);
check_ostack(1);
gs_scanner_init(&state, o... | 186,060,198,617,707,040,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-11714 | psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function... | https://nvd.nist.gov/vuln/detail/CVE-2017-11714 |
14,007 | ghostscript | 671fd59eb657743aa86fbc1895cb15872a317caa | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=671fd59eb657743aa86fbc1895cb15872a317caa | None | 0 | ztoken_continue(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
scanner_state *pstate;
check_stype(*op, st_scanner_state_dynamic);
pstate = r_ptr(op, scanner_state);
return token_continue(i_ctx_p, pstate, false);
}
| 121,537,570,233,652,100,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-11714 | psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function... | https://nvd.nist.gov/vuln/detail/CVE-2017-11714 |
14,031 | savannah | 79972af4f0485a11dcb19551356c45245749fc5b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b | None | 0 | ft_smooth_init( FT_Renderer render )
{
FT_Library library = FT_MODULE_LIBRARY( render );
render->clazz->raster_class->raster_reset( render->raster,
library->raster_pool,
library->raster_pool_size );
return... | 333,930,115,796,430,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,032 | savannah | 79972af4f0485a11dcb19551356c45245749fc5b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b | None | 0 | ft_smooth_render_lcd( FT_Renderer render,
FT_GlyphSlot slot,
FT_Render_Mode mode,
const FT_Vector* origin )
{
FT_Error error;
error = ft_smooth_render_generic( render, slot, mode, origin,
... | 332,568,802,186,551,820,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,033 | savannah | 79972af4f0485a11dcb19551356c45245749fc5b | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=79972af4f0485a11dcb19551356c45245749fc5b | None | 0 | ft_smooth_transform( FT_Renderer render,
FT_GlyphSlot slot,
const FT_Matrix* matrix,
const FT_Vector* delta )
{
FT_Error error = Smooth_Err_Ok;
if ( slot->format != render->glyph_format )
{
error = Smooth_Err_Inva... | 326,856,207,379,722,740,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,034 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | CFF_Done_FD_Select( CFF_FDSelect fdselect,
FT_Stream stream )
{
if ( fdselect->data )
FT_FRAME_RELEASE( fdselect->data );
fdselect->data_size = 0;
fdselect->format = 0;
fdselect->range_count = 0;
}
| 16,246,825,373,085,922,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,035 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | CFF_Load_FD_Select( CFF_FDSelect fdselect,
FT_UInt num_glyphs,
FT_Stream stream,
FT_ULong offset )
{
FT_Error error;
FT_Byte format;
FT_UInt num_ranges;
/* read format */
if ( FT_STREAM_SEEK( offset ) || FT_... | 1,035,452,282,895,958,700,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,036 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_charset_compute_cids( CFF_Charset charset,
FT_UInt num_glyphs,
FT_Memory memory )
{
FT_Error error = FT_Err_Ok;
FT_UInt i;
FT_UShort max_cid = 0;
if ( charset->max_cid > 0 )
goto Exit;
for ( i = 0; i < num_glyp... | 181,735,454,281,632,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,037 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_charset_done( CFF_Charset charset,
FT_Stream stream )
{
FT_Memory memory = stream->memory;
cff_charset_free_cids( charset, memory );
FT_FREE( charset->sids );
charset->format = 0;
charset->offset = 0;
}
| 159,808,335,612,598,450,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,038 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_access_element( CFF_Index idx,
FT_UInt element,
FT_Byte** pbytes,
FT_ULong* pbyte_len )
{
FT_Error error = CFF_Err_Ok;
if ( idx && idx->count > element )
{
/* compute start and end offsets */
... | 285,726,082,407,551,570,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,039 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_done( CFF_Index idx )
{
if ( idx->stream )
{
FT_Stream stream = idx->stream;
FT_Memory memory = stream->memory;
if ( idx->bytes )
FT_FRAME_RELEASE( idx->bytes );
FT_FREE( idx->offsets );
FT_MEM_ZERO( idx, sizeof ( *idx ) );
}
}
| 28,998,855,043,956,360,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,040 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_forget_element( CFF_Index idx,
FT_Byte** pbytes )
{
if ( idx->bytes == 0 )
{
FT_Stream stream = idx->stream;
FT_FRAME_RELEASE( *pbytes );
}
}
| 281,020,700,941,670,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,041 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_get_name( CFF_Index idx,
FT_UInt element )
{
FT_Memory memory = idx->stream->memory;
FT_Byte* bytes;
FT_ULong byte_len;
FT_Error error;
FT_String* name = 0;
error = cff_index_access_element( idx, element, &bytes, &byte_len );
if ( error )... | 206,880,918,287,827,670,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,042 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_get_pointers( CFF_Index idx,
FT_Byte*** table )
{
FT_Error error = CFF_Err_Ok;
FT_Memory memory = idx->stream->memory;
FT_ULong n, offset, old_offset;
FT_Byte** t;
*table = 0;
if ( idx->offsets == NULL )
{
error = cff_index_load_offs... | 53,156,076,161,113,570,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,043 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_get_sid_string( CFF_Index idx,
FT_UInt sid,
FT_Service_PsCMaps psnames )
{
/* value 0xFFFFU indicates a missing dictionary entry */
if ( sid == 0xFFFFU )
return 0;
/* if it is not a standard string, return it... | 53,787,111,964,103,080,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,044 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_init( CFF_Index idx,
FT_Stream stream,
FT_Bool load )
{
FT_Error error;
FT_Memory memory = stream->memory;
FT_UShort count;
FT_MEM_ZERO( idx, sizeof ( *idx ) );
idx->stream = stream;
idx->start = FT_STREAM_POS();
if ( !FT_READ_US... | 151,190,671,554,467,490,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,045 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_load_offsets( CFF_Index idx )
{
FT_Error error = CFF_Err_Ok;
FT_Stream stream = idx->stream;
FT_Memory memory = stream->memory;
if ( idx->count > 0 && idx->offsets == NULL )
{
FT_Byte offsize = idx->off_size;
FT_ULong data_size;
FT_Byte* p;
FT_Byt... | 288,129,415,303,749,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,046 | savannah | 0545ec1ca36b27cb928128870a83e5f668980bc5 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0545ec1ca36b27cb928128870a83e5f668980bc5 | None | 0 | cff_index_read_offset( CFF_Index idx,
FT_Error *errorp )
{
FT_Error error;
FT_Stream stream = idx->stream;
FT_Byte tmp[4];
FT_ULong result = 0;
if ( !FT_STREAM_READ( tmp, idx->off_size ) )
{
FT_Int nn;
for ( nn = 0; nn < idx->off_size; nn++... | 282,304,742,809,806,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0946 | Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c. | https://nvd.nist.gov/vuln/detail/CVE-2009-0946 |
14,050 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | int add_argv(const char *what, int quoted)
{
DEBUGP("add_argv: %s\n", what);
if (what && newargc + 1 < ARRAY_SIZE(newargv)) {
newargv[newargc] = strdup(what);
newargvattr[newargc] = quoted;
newargv[++newargc] = NULL;
return 1;
} else {
xtables_error(PARAMETER_PROBLEM,
"Parser cannot handle more ar... | 162,720,684,723,775,940,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,051 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | int command_default(struct iptables_command_state *cs,
struct xtables_globals *gl)
{
struct xtables_rule_match *matchp;
struct xtables_match *m;
if (cs->target != NULL &&
(cs->target->parse != NULL || cs->target->x6_parse != NULL) &&
cs->c >= cs->target->option_offset &&
cs->c < cs->target->opt... | 33,676,885,978,020,098,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,052 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | struct xtables_match *load_proto(struct iptables_command_state *cs)
{
if (!should_load_proto(cs))
return NULL;
return find_proto(cs->protocol, XTF_TRY_LOAD,
cs->options & OPT_NUMERIC, &cs->matches);
}
| 129,411,396,992,575,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,053 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | int parse_counters(const char *string, struct xt_counters *ctr)
{
int ret;
if (!string)
return 0;
ret = sscanf(string, "[%llu:%llu]",
(unsigned long long *)&ctr->pcnt,
(unsigned long long *)&ctr->bcnt);
return ret == 2;
}
| 297,908,644,461,134,730,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,054 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | void parse_wait_interval(int argc, char *argv[], struct timeval *wait_interval)
{
const char *arg;
unsigned int usec;
int ret;
if (optarg)
arg = optarg;
else if (xs_has_arg(argc, argv))
arg = argv[optind++];
else
xtables_error(PARAMETER_PROBLEM, "wait interval value required");
ret = sscanf(arg, "%u", &u... | 131,444,983,154,441,050,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,055 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | int parse_wait_time(int argc, char *argv[])
{
int wait = -1;
if (optarg) {
if (sscanf(optarg, "%i", &wait) != 1)
xtables_error(PARAMETER_PROBLEM,
"wait seconds not numeric");
} else if (xs_has_arg(argc, argv))
if (sscanf(argv[optind++], "%i", &wait) != 1)
xtables_error(PARAMETER_PROBLEM,
"wait sec... | 8,642,189,109,324,793,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,056 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | proto_to_name(uint8_t proto, int nolookup)
{
unsigned int i;
if (proto && !nolookup) {
struct protoent *pent = getprotobynumber(proto);
if (pent)
return pent->p_name;
}
for (i = 0; xtables_chain_protos[i].name != NULL; ++i)
if (xtables_chain_protos[i].num == proto)
return xtables_chain_protos[i].name;... | 192,746,779,829,712,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,057 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | void save_argv(void)
{
unsigned int i;
while (oldargc)
free(oldargv[--oldargc]);
oldargc = newargc;
newargc = 0;
for (i = 0; i < oldargc; i++) {
oldargv[i] = newargv[i];
}
}
| 77,957,370,754,273,640,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,058 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | static bool should_load_proto(struct iptables_command_state *cs)
{
if (cs->protocol == NULL)
return false;
if (find_proto(cs->protocol, XTF_DONT_LOAD,
cs->options & OPT_NUMERIC, NULL) == NULL)
return true;
return !cs->proto_used;
}
| 274,051,001,644,225,050,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,059 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | static mainfunc_t subcmd_get(const char *cmd, const struct subcommand *cb)
{
for (; cb->name != NULL; ++cb)
if (strcmp(cb->name, cmd) == 0)
return cb->main;
return NULL;
}
| 50,591,564,199,938,720,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,060 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | int subcmd_main(int argc, char **argv, const struct subcommand *cb)
{
const char *cmd = basename(*argv);
mainfunc_t f = subcmd_get(cmd, cb);
if (f == NULL && argc > 1) {
/*
* Unable to find a main method for our command name?
* Let's try again with the first argument!
*/
++argv;
--argc;
f = subcmd_... | 81,269,695,548,406,430,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,061 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | void xs_init_match(struct xtables_match *match)
{
if (match->udata_size != 0) {
/*
* As soon as a subsequent instance of the same match
* is used, e.g. "-m time -m time", the first instance
* is no longer reachable anyway, so we can free udata.
* Same goes for target.
*/
free(match->udata);
match-... | 316,882,609,649,434,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,062 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | void xs_init_target(struct xtables_target *target)
{
if (target->udata_size != 0) {
free(target->udata);
target->udata = calloc(1, target->udata_size);
if (target->udata == NULL)
xtables_error(RESOURCE_PROBLEM, "malloc");
}
if (target->init != NULL)
target->init(target->t);
}
| 54,456,866,721,453,750,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,063 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | static int xtables_lock(int wait, struct timeval *wait_interval)
{
struct timeval time_left, wait_time;
int fd, i = 0;
time_left.tv_sec = wait;
time_left.tv_usec = 0;
fd = open(XT_LOCK_NAME, O_CREAT, 0600);
if (fd < 0) {
fprintf(stderr, "Fatal: can't open lock file %s: %s\n",
XT_LOCK_NAME, strerror(errno))... | 272,542,059,682,519,430,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,064 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | int xtables_lock_or_exit(int wait, struct timeval *wait_interval)
{
int lock = xtables_lock(wait, wait_interval);
if (lock == XT_LOCK_FAILED) {
xtables_free_opts(1);
exit(RESOURCE_PROBLEM);
}
if (lock == XT_LOCK_BUSY) {
fprintf(stderr, "Another app is currently holding the xtables lock. ");
if (wait == 0)... | 93,497,947,127,060,650,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,065 | netfilter | 2ae1099a42e6a0f06de305ca13a842ac83d4683e | https://git.netfilter.org/conntrack-tools | https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | None | 0 | void xtables_unlock(int lock)
{
if (lock >= 0)
close(lock);
}
| 6,255,170,613,108,467,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-11360 | A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11360 |
14,066 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | account_type_from_pwent (struct passwd *pwent)
{
struct group *grp;
gint i;
if (pwent->pw_uid == 0) {
g_debug ("user is root so account type is administrator");
return ACCOUNT_TYPE_ADMINISTRATOR;
}
grp = getgrnam (ADMIN_GROUP);
if (grp ==... | 39,326,430,275,807,140,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,067 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | become_user (gpointer data)
{
struct passwd *pw = data;
if (pw == NULL ||
initgroups (pw->pw_name, pw->pw_gid) != 0 ||
setgid (pw->pw_gid) != 0 ||
setuid (pw->pw_uid) != 0) {
exit (1);
}
}
| 194,823,919,778,646,060,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,068 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | compute_object_path (User *user)
{
gchar *object_path;
object_path = g_strdup_printf ("/org/freedesktop/Accounts/User%lu",
(gulong) accounts_user_get_uid (ACCOUNTS_USER (user)));
return object_path;
}
| 260,863,659,108,403,460,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,069 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | move_extra_data (const gchar *old_name,
const gchar *new_name)
{
g_autofree gchar *old_filename = NULL;
g_autofree gchar *new_filename = NULL;
old_filename = g_build_filename (USERDIR,
old_name, NULL);
new_filename = g_build_file... | 273,419,458,062,204,660,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,070 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | on_user_changed_timeout (User *user)
{
user->changed_timeout_id = 0;
accounts_user_emit_changed (ACCOUNTS_USER (user));
return G_SOURCE_REMOVE;
}
| 245,692,697,222,034,400,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,071 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | on_user_property_notify (User *user)
{
if (user->changed_timeout_id != 0)
return;
user->changed_timeout_id = g_timeout_add (250, (GSourceFunc) on_user_changed_timeout, user);
}
| 176,629,112,429,088,140,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,072 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | throw_error (GDBusMethodInvocation *context,
gint error_code,
const gchar *format,
...)
{
va_list args;
g_autofree gchar *message = NULL;
va_start (args, format);
message = g_strdup_vprintf (format, args);
va_end... | 77,123,739,619,731,010,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,073 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_change_email_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
gchar *email = data;
if (g_strcmp0 (accounts_us... | 125,775,174,497,338,500,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,074 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_change_language_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
gchar *language = data;
if (g_strcm... | 273,741,808,729,824,000,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,075 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_change_location_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
gchar *location = data;
if (g_strcm... | 207,127,574,345,521,270,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,076 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_change_shell_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
gchar *shell = data;
g_autoptr(GError) error = N... | 307,862,992,214,178,380,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,077 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_change_user_name_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
gchar *name = data;
gchar *old_n... | 310,183,387,764,856,280,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,078 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_change_x_session_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer data)
{
gchar *x_session = data;
if (g_... | 244,844,007,740,252,400,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,079 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_changed (User *user)
{
accounts_user_emit_changed (ACCOUNTS_USER (user));
}
| 64,158,597,288,451,050,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,080 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_extension_get_property (User *user,
Daemon *daemon,
GDBusInterfaceInfo *interface,
GDBusMethodInvocation *invocation)
{
const GDBusPropertyInfo *property = g_dbus_method_invocation_get_... | 188,375,470,006,073,400,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,081 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_extension_get_value (User *user,
GDBusInterfaceInfo *interface,
const GDBusPropertyInfo *property)
{
const GVariantType *type = G_VARIANT_TYPE (property->signature);
GVariant *value;
g_autofree gchar *printed = NULL... | 80,665,750,204,484,030,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,082 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_extension_method_call (GDBusConnection *connection,
const gchar *sender,
const gchar *object_path,
const gchar *interface_name,
const gchar *method_name,
... | 206,831,850,210,362,540,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,083 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_extension_set_property (User *user,
Daemon *daemon,
GDBusInterfaceInfo *interface,
GDBusMethodInvocation *invocation)
{
const GDBusPropertyInfo *property = g_dbus_method_invocation_get_... | 190,183,611,934,001,300,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,084 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_cached (User *user)
{
return user->cached;
}
| 339,469,545,157,022,900,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,085 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_local_account (User *user)
{
return accounts_user_get_local_account (ACCOUNTS_USER (user));;
}
| 18,999,398,490,271,697,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,086 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_object_path (User *user)
{
return g_dbus_interface_skeleton_get_object_path (G_DBUS_INTERFACE_SKELETON (user));
}
| 324,422,271,745,622,870,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,087 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_password_expiration_policy (AccountsUser *auser,
GDBusMethodInvocation *context)
{
User *user = (User*)auser;
int uid;
const gchar *action_id;
if (!get_caller_uid (context, &uid)) {
throw_error (context, ERROR_FAILED... | 302,108,569,165,661,900,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,088 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_password_expiration_policy_authorized_cb (Daemon *daemon,
User *user,
GDBusMethodInvocation *context,
gpointer d... | 168,371,657,731,584,100,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,089 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_shell(User *user)
{
return accounts_user_get_shell (ACCOUNTS_USER (user));
}
| 216,444,429,414,257,330,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,090 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_system_account (User *user)
{
return accounts_user_get_system_account (ACCOUNTS_USER (user));
}
| 220,127,698,156,697,440,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,091 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_uid (User *user)
{
return accounts_user_get_uid (ACCOUNTS_USER (user));
}
| 95,913,204,745,355,800,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,092 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_get_user_name (User *user)
{
return accounts_user_get_user_name (ACCOUNTS_USER (user));
}
| 229,152,589,638,390,950,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,093 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_new (Daemon *daemon,
uid_t uid)
{
User *user;
user = g_object_new (TYPE_USER, NULL);
user->daemon = daemon;
accounts_user_set_uid (ACCOUNTS_USER (user), uid);
return user;
}
| 46,636,584,897,342,280,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,094 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_register (User *user)
{
g_autoptr(GError) error = NULL;
g_autofree gchar *object_path = NULL;
user->system_bus_connection = g_bus_get_sync (G_BUS_TYPE_SYSTEM, NULL, &error);
if (user->system_bus_connection == NULL) {
if (error != NULL)
g_crit... | 289,846,237,182,680,000,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,095 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_register_extensions (User *user)
{
static const GDBusInterfaceVTable vtable = {
user_extension_method_call,
NULL /* get_property */,
NULL /* set_property */
};
GHashTable *extensions;
GHashTableIter iter;
gpointer iface;
... | 261,771,619,278,714,600,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,096 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_reset_icon_file (User *user)
{
const char *icon_file;
gboolean icon_is_default;
const char *home_dir;
icon_file = accounts_user_get_icon_file (ACCOUNTS_USER (user));
if (icon_file == NULL || g_strcmp0 (icon_file, user->default_icon_file) == 0) {
icon_is_... | 226,630,585,675,615,740,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,097 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_save (User *user)
{
save_extra_data (user);
}
| 215,777,660,546,480,450,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,098 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_save_to_keyfile (User *user,
GKeyFile *keyfile)
{
g_key_file_remove_group (keyfile, "User", NULL);
if (accounts_user_get_email (ACCOUNTS_USER (user)))
g_key_file_set_string (keyfile, "User", "Email", accounts_user_get_email (ACCOUNTS_USER (user)));
... | 143,160,279,148,006,520,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.