idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
14,099 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_cached (User *user,
gboolean cached)
{
user->cached = cached;
}
| 93,835,444,693,327,080,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,100 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_email (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *email)
{
User *user = (User*)auser;
int uid;
const gchar *action_id;
if (!get_caller_uid (context, &uid)) {
throw_error (context, ERROR_FA... | 202,056,304,285,824,830,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,101 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_home_directory (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *home_dir)
{
User *user = (User*)auser;
daemon_local_check_auth (user->daemon,
user,
... | 212,453,878,884,401,250,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,102 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_language (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *language)
{
User *user = (User*)auser;
int uid;
const gchar *action_id;
if (!get_caller_uid (context, &uid)) {
throw_error (conte... | 190,886,607,344,552,500,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,103 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_location (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *location)
{
User *user = (User*)auser;
int uid;
const gchar *action_id;
if (!get_caller_uid (context, &uid)) {
throw_error (conte... | 3,025,851,872,292,114,400,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,104 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_real_name (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *real_name)
{
User *user = (User*)auser;
int uid;
const gchar *action_id;
if (!get_caller_uid (context, &uid)) {
throw_error (c... | 317,444,593,625,086,200,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,105 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_shell (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *shell)
{
User *user = (User*)auser;
daemon_local_check_auth (user->daemon,
user,
"org.freedesktop.account... | 90,099,126,044,317,610,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,106 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_user_name (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *user_name)
{
User *user = (User*)auser;
daemon_local_check_auth (user->daemon,
user,
"org.fre... | 25,525,954,407,716,895,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,107 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_set_x_session (AccountsUser *auser,
GDBusMethodInvocation *context,
const gchar *x_session)
{
User *user = (User*)auser;
int uid;
const gchar *action_id;
if (!get_caller_uid (context, &uid)) {
throw_error (c... | 261,395,270,350,669,530,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,108 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_update_from_pwent (User *user,
struct passwd *pwent,
struct spwd *spent)
{
g_autofree gchar *real_name = NULL;
gboolean is_system_account;
const gchar *passwd;
gboolean locked;
PasswordMode mode;
AccountType ... | 298,597,407,408,596,100,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,109 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_update_local_account_property (User *user,
gboolean local)
{
accounts_user_set_local_account (ACCOUNTS_USER (user), local);
}
| 184,184,782,023,301,640,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,110 | accountsservice | f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a | None | 0 | user_update_system_account_property (User *user,
gboolean system)
{
accounts_user_set_system_account (ACCOUNTS_USER (user), system);
}
| 244,445,600,182,306,700,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2018-14036 | Directory Traversal with ../ sequences occurs in AccountsService before 0.6.50 because of an insufficient path check in user_change_icon_file_authorized_cb() in user.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14036 |
14,133 | xserver | 05442de962d3dc624f79fc1a00eca3ffc5489ced | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=05442de962d3dc624f79fc1a00eca3ffc5489ced | Xi: Zero target buffer in SProcXSendExtensionEvent.
Make sure that the xEvent eventT is initialized with zeros, the same way as
in SProcSendEvent.
Some event swapping functions do not overwrite all 32 bytes of xEvent
structure, for example XSecurityAuthorizationRevoked. Two cooperating
clients, one swapped and the ot... | 0 | ProcXSendExtensionEvent(ClientPtr client)
{
int ret;
DeviceIntPtr dev;
xEvent *first;
XEventClass *list;
struct tmask tmp[EMASKSIZE];
REQUEST(xSendExtensionEventReq);
REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq);
if (stuff->length !=
bytes_to_int32(sizeof(xSendExtensionEventRe... | 16,354,133,801,685,040,000,000,000,000,000,000,000 | sendexev.c | 261,021,984,177,706,700,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2017-10972 | Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server. | https://nvd.nist.gov/vuln/detail/CVE-2017-10972 |
14,134 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ActivateEnterGrab(DeviceIntPtr dev, WindowPtr old, WindowPtr win)
{
BOOL rc = FALSE;
DeviceEvent event;
if (dev->deviceGrab.grab) {
if (!dev->deviceGrab.fromPassiveGrab ||
dev->deviceGrab.grab->type != XI_Enter ||
dev->deviceGrab.grab->window == win ||
IsParent(d... | 310,764,000,798,863,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,135 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ActivateFocusInGrab(DeviceIntPtr dev, WindowPtr old, WindowPtr win)
{
BOOL rc = FALSE;
DeviceEvent event;
if (dev->deviceGrab.grab) {
if (!dev->deviceGrab.fromPassiveGrab ||
dev->deviceGrab.grab->type != XI_FocusIn ||
dev->deviceGrab.grab->window == win ||
IsPare... | 117,557,174,841,693,980,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,136 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ActivateImplicitGrab(DeviceIntPtr dev, ClientPtr client, WindowPtr win,
xEvent *event, Mask deliveryMask)
{
GrabPtr tempGrab;
OtherInputMasks *inputMasks;
CARD8 type = event->u.u.type;
enum InputLevel grabtype;
if (type == ButtonPress)
grabtype = CORE;
else if (type... | 287,576,525,687,428,520,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,137 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | BorderSizeNotEmpty(DeviceIntPtr pDev, WindowPtr pWin)
{
if (RegionNotEmpty(&pWin->borderSize))
return TRUE;
#ifdef PANORAMIX
if (!noPanoramiXExtension && XineramaSetWindowPntrs(pDev, pWin)) {
int i;
FOR_NSCREENS_FORWARD_SKIP(i) {
if (RegionNotEmpty
(&pDev->s... | 155,975,422,825,886,240,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,138 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ChangeToCursor(DeviceIntPtr pDev, CursorPtr cursor)
{
SpritePtr pSprite = pDev->spriteInfo->sprite;
ScreenPtr pScreen;
if (cursor != pSprite->current) {
if ((pSprite->current->bits->xhot != cursor->bits->xhot) ||
(pSprite->current->bits->yhot != cursor->bits->yhot))
CheckPhy... | 57,966,206,963,003,330,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,139 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CheckCursorConfinement(WindowPtr pWin)
{
GrabPtr grab;
WindowPtr confineTo;
DeviceIntPtr pDev;
#ifdef PANORAMIX
if (!noPanoramiXExtension && pWin->drawable.pScreen->myNum)
return;
#endif
for (pDev = inputInfo.devices; pDev; pDev = pDev->next) {
if (DevHasCursor(pDev)) {
... | 235,511,009,915,269,020,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,140 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CheckDeviceGrabs(DeviceIntPtr device, DeviceEvent *event, WindowPtr ancestor)
{
int i;
WindowPtr pWin = NULL;
FocusClassPtr focus =
IsPointerEvent((InternalEvent *) event) ? NULL : device->focus;
BOOL sendCore = (IsMaster(device) && device->coreEvents);
Bool ret = FALSE;
if (event->type... | 265,941,148,617,535,460,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,141 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CheckGrabForSyncs(DeviceIntPtr thisDev, Bool thisMode, Bool otherMode)
{
GrabPtr grab = thisDev->deviceGrab.grab;
DeviceIntPtr dev;
if (thisMode == GrabModeSync)
thisDev->deviceGrab.sync.state = FROZEN_NO_EVENT;
else { /* free both if same client owns both */
thisDe... | 331,992,876,810,819,650,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,142 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CheckMotion(DeviceEvent *ev, DeviceIntPtr pDev)
{
WindowPtr prevSpriteWin, newSpriteWin;
SpritePtr pSprite = pDev->spriteInfo->sprite;
verify_internal_event((InternalEvent *) ev);
prevSpriteWin = pSprite->win;
if (ev && !syncEvents.playingEvents) {
/* GetPointerEvents() guarantees that po... | 190,762,934,579,171,700,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,143 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CheckPassiveGrabsOnWindow(WindowPtr pWin,
DeviceIntPtr device,
InternalEvent *event, BOOL checkCore, BOOL activate)
{
GrabPtr grab = wPassiveGrabs(pWin);
GrabPtr tempGrab;
if (!grab)
return NULL;
tempGrab = AllocGrab(NULL);
if (tempGrab =... | 115,520,753,183,459,020,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,144 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CheckPhysLimits(DeviceIntPtr pDev, CursorPtr cursor, Bool generateEvents,
Bool confineToScreen, /* unused if PanoramiX on */
ScreenPtr pScreen) /* unused if PanoramiX on */
{
HotSpot new;
SpritePtr pSprite = pDev->spriteInfo->sprite;
if (!cursor)
return;
new =... | 148,169,726,953,776,310,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,145 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CheckVirtualMotion(DeviceIntPtr pDev, QdEventPtr qe, WindowPtr pWin)
{
SpritePtr pSprite = pDev->spriteInfo->sprite;
RegionPtr reg = NULL;
DeviceEvent *ev = NULL;
if (qe) {
ev = &qe->event->device_event;
switch (ev->type) {
case ET_Motion:
case ET_ButtonPress:
ca... | 303,827,368,090,062,300,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,146 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ComputeFreezes(void)
{
DeviceIntPtr replayDev = syncEvents.replayDev;
WindowPtr w;
GrabPtr grab;
DeviceIntPtr dev;
for (dev = inputInfo.devices; dev; dev = dev->next)
FreezeThaw(dev, dev->deviceGrab.sync.other ||
(dev->deviceGrab.sync.state >= FROZEN));
if (syncEvents... | 56,850,251,818,535,890,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,147 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ConfineCursorToWindow(DeviceIntPtr pDev, WindowPtr pWin, Bool generateEvents,
Bool confineToScreen)
{
SpritePtr pSprite = pDev->spriteInfo->sprite;
if (syncEvents.playingEvents) {
CheckVirtualMotion(pDev, (QdEventPtr) NULL, pWin);
SyntheticMotion(pDev, pSprite->hot.x, pSpr... | 53,902,682,552,584,000,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,148 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CoreEnterLeaveEvent(DeviceIntPtr mouse,
int type,
int mode, int detail, WindowPtr pWin, Window child)
{
xEvent event = {
.u.u.type = type,
.u.u.detail = detail
};
WindowPtr focus;
DeviceIntPtr keybd;
GrabPtr grab = mouse->deviceGrab.grab;
M... | 288,990,784,560,741,300,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,149 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | CoreGrabInterferes(DeviceIntPtr device, GrabPtr grab)
{
DeviceIntPtr other;
BOOL interfering = FALSE;
for (other = inputInfo.devices; other; other = other->next) {
GrabPtr othergrab = other->deviceGrab.grab;
if (othergrab && othergrab->grabtype == CORE &&
SameClient(grab, rClie... | 279,664,670,475,682,400,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,150 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeactivateKeyboardGrab(DeviceIntPtr keybd)
{
GrabPtr grab = keybd->deviceGrab.grab;
DeviceIntPtr dev;
WindowPtr focusWin;
Bool wasImplicit = (keybd->deviceGrab.fromPassiveGrab &&
keybd->deviceGrab.implicitGrab);
if (keybd->valuator)
keybd->valuator->motionHintWindow ... | 91,848,748,754,885,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,151 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeactivatePointerGrab(DeviceIntPtr mouse)
{
GrabPtr grab = mouse->deviceGrab.grab;
DeviceIntPtr dev;
Bool wasPassive = mouse->deviceGrab.fromPassiveGrab;
Bool wasImplicit = (mouse->deviceGrab.fromPassiveGrab &&
mouse->deviceGrab.implicitGrab);
XID grab_resource = grab->resour... | 113,053,371,792,080,070,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,152 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeleteWindowFromAnyEvents(WindowPtr pWin, Bool freeResources)
{
WindowPtr parent;
DeviceIntPtr mouse = inputInfo.pointer;
DeviceIntPtr keybd = inputInfo.keyboard;
FocusClassPtr focus;
OtherClientsPtr oc;
GrabPtr passive;
GrabPtr grab;
/* Deactivate any grabs performed on this window, be... | 48,171,675,053,037,330,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,153 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverDeviceEvents(WindowPtr pWin, InternalEvent *event, GrabPtr grab,
WindowPtr stopAt, DeviceIntPtr dev)
{
Window child = None;
int deliveries = 0;
int mask;
verify_internal_event(event);
while (pWin) {
if ((mask = EventIsDeliverable(dev, event->any.type, pWin))) {
... | 175,214,632,192,640,840,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,154 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverEvent(DeviceIntPtr dev, xEvent *xE, int count,
WindowPtr win, Window child, GrabPtr grab)
{
SpritePtr pSprite = dev->spriteInfo->sprite;
Mask filter;
int deliveries = 0;
if (XaceHook(XACE_SEND_ACCESS, NULL, dev, win, xE, count) == Success) {
filter = GetEventFilter(dev, xE);... | 156,757,289,742,666,780,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,155 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverEventToInputClients(DeviceIntPtr dev, InputClients * inputclients,
WindowPtr win, xEvent *events,
int count, Mask filter, GrabPtr grab,
ClientPtr *client_return, Mask *mask_return)
{
int attempt;
enum EventDeliveryState rc =... | 175,781,116,931,120,520,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,156 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverEventToWindowMask(DeviceIntPtr dev, WindowPtr win, xEvent *events,
int count, Mask filter, GrabPtr grab,
ClientPtr *client_return, Mask *mask_return)
{
InputClients *iclients;
if (!GetClientsForDelivery(dev, win, events, filter, &iclients))
retur... | 255,864,634,497,394,900,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,157 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverEvents(WindowPtr pWin, xEvent *xE, int count, WindowPtr otherParent)
{
DeviceIntRec dummy;
int deliveries;
#ifdef PANORAMIX
if (!noPanoramiXExtension && pWin->drawable.pScreen->myNum)
return count;
#endif
if (!count)
return 0;
dummy.id = XIAllDevices;
switch (xE->u.u.t... | 63,068,032,615,312,010,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,158 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverEventsToWindow(DeviceIntPtr pDev, WindowPtr pWin, xEvent
*pEvents, int count, Mask filter, GrabPtr grab)
{
int deliveries = 0, nondeliveries = 0;
ClientPtr client = NullClient;
Mask deliveryMask = 0; /* If a grab occurs due to a button press, then
... | 330,816,484,605,075,300,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,159 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverFocusedEvent(DeviceIntPtr keybd, InternalEvent *event, WindowPtr window)
{
DeviceIntPtr ptr;
WindowPtr focus = keybd->focus->win;
BOOL sendCore = (IsMaster(keybd) && keybd->coreEvents);
xEvent *core = NULL, *xE = NULL, *xi2 = NULL;
int count, rc;
int deliveries = 0;
if (focus == Foll... | 11,750,225,649,018,174,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,160 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverGrabbedEvent(InternalEvent *event, DeviceIntPtr thisDev,
Bool deactivateGrab)
{
GrabPtr grab;
GrabInfoPtr grabinfo;
int deliveries = 0;
DeviceIntPtr dev;
SpritePtr pSprite = thisDev->spriteInfo->sprite;
BOOL sendCore = FALSE;
grabinfo = &thisDev->deviceGrab;
g... | 89,549,567,524,780,960,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,161 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverOneEvent(InternalEvent *event, DeviceIntPtr dev, enum InputLevel level,
WindowPtr win, Window child, GrabPtr grab)
{
xEvent *xE = NULL;
int count = 0;
int deliveries = 0;
int rc;
switch (level) {
case XI2:
rc = EventToXI2(event, &xE);
count = 1;
br... | 17,074,917,434,293,073,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,162 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverOneGrabbedEvent(InternalEvent *event, DeviceIntPtr dev,
enum InputLevel level)
{
SpritePtr pSprite = dev->spriteInfo->sprite;
int rc;
xEvent *xE = NULL;
int count = 0;
int deliveries = 0;
Mask mask;
GrabInfoPtr grabinfo = &dev->deviceGrab;
GrabPtr grab = gra... | 128,537,988,576,518,300,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,163 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverRawEvent(RawDeviceEvent *ev, DeviceIntPtr device)
{
GrabPtr grab = device->deviceGrab.grab;
xEvent *xi;
int i, rc;
int filter;
rc = EventToXI2((InternalEvent *) ev, (xEvent **) &xi);
if (rc != Success) {
ErrorF("[Xi] %s: XI2 conversion failed in %s (%d)\n",
__func_... | 339,298,248,772,283,340,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,164 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeliverToWindowOwner(DeviceIntPtr dev, WindowPtr win,
xEvent *events, int count, Mask filter, GrabPtr grab)
{
/* if nobody ever wants to see this event, skip some work */
if (filter != CantBeFiltered &&
!((wOtherEventMasks(win) | win->eventMask) & filter))
return EVENT_SKIP;... | 265,332,668,437,560,600,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,165 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DetachFromMaster(DeviceIntPtr dev)
{
if (IsFloating(dev))
return;
dev->saved_master_id = GetMaster(dev, MASTER_ATTACHED)->id;
AttachDevice(NULL, dev, NULL);
}
| 103,893,757,163,923,120,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,166 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DevHasCursor(DeviceIntPtr pDev)
{
return pDev->spriteInfo->spriteOwner;
}
| 244,927,386,741,081,450,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,167 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | DeviceEnterLeaveEvent(DeviceIntPtr mouse,
int sourceid,
int type,
int mode, int detail, WindowPtr pWin, Window child)
{
GrabPtr grab = mouse->deviceGrab.grab;
xXIEnterEvent *event;
WindowPtr focus;
int filter;
int btlen, len, i;
D... | 167,672,791,942,257,370,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,168 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | EnqueueEvent(InternalEvent *ev, DeviceIntPtr device)
{
QdEventPtr tail = NULL;
QdEventPtr qe;
SpritePtr pSprite = device->spriteInfo->sprite;
int eventlen;
DeviceEvent *event = &ev->device_event;
if (!xorg_list_is_empty(&syncEvents.pending))
tail = xorg_list_last_entry(&syncEvents.pendi... | 178,094,459,811,799,000,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,169 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | EventIsDeliverable(DeviceIntPtr dev, int evtype, WindowPtr win)
{
int rc = 0;
int filter = 0;
int type;
OtherInputMasks *inputMasks = wOtherInputMasks(win);
if ((type = GetXI2Type(evtype)) != 0) {
if (inputMasks && xi2mask_isset(inputMasks->xi2mask, dev, type))
rc |= EVENT_XI2_M... | 61,598,720,681,529,270,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,170 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | EventMaskForClient(WindowPtr pWin, ClientPtr client)
{
OtherClientsPtr other;
if (wClient(pWin) == client)
return pWin->eventMask;
for (other = wOtherClients(pWin); other; other = other->next) {
if (SameClient(other, client))
return other->mask;
}
return 0;
}
| 336,897,168,350,731,750,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,171 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | EventSelectForWindow(WindowPtr pWin, ClientPtr client, Mask mask)
{
Mask check;
OtherClients *others;
DeviceIntPtr dev;
int rc;
if (mask & ~AllEventMasks) {
client->errorValue = mask;
return BadValue;
}
check = (mask & ManagerMask);
if (check) {
rc = XaceHook(XAC... | 153,148,657,227,145,750,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,172 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | EventSuppressForWindow(WindowPtr pWin, ClientPtr client,
Mask mask, Bool *checkOptional)
{
int i, freed;
if (mask & ~PropagateMask) {
client->errorValue = mask;
return BadValue;
}
if (pWin->dontPropagate)
DontPropagateRefCnts[pWin->dontPropagate]--;
if... | 180,023,074,845,227,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,173 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | FilterRawEvents(const ClientPtr client, const GrabPtr grab, WindowPtr root)
{
XIClientPtr client_xi_version;
int cmp;
/* device not grabbed -> don't filter */
if (!grab)
return FALSE;
client_xi_version =
dixLookupPrivate(&client->devPrivates, XIClientPrivateKey);
cmp = version... | 64,216,634,761,367,110,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,174 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | FindChildForEvent(SpritePtr pSprite, WindowPtr event)
{
WindowPtr w = DeepestSpriteWin(pSprite);
Window child = None;
/* If the search ends up past the root should the child field be
set to none or should the value in the argument be passed
through. It probably doesn't matter since everyone c... | 321,603,801,219,312,000,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,175 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | FixUpEventFromWindow(SpritePtr pSprite,
xEvent *xE, WindowPtr pWin, Window child, Bool calcChild)
{
int evtype;
if (calcChild)
child = FindChildForEvent(pSprite, pWin);
if ((evtype = xi2_get_type(xE))) {
xXIDeviceEvent *event = (xXIDeviceEvent *) xE;
switch (e... | 28,995,535,140,075,290,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,176 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | void FreeSprite(DeviceIntPtr dev)
{
if (DevHasCursor(dev) && dev->spriteInfo->sprite) {
if (dev->spriteInfo->sprite->current)
FreeCursor(dev->spriteInfo->sprite->current, None);
free(dev->spriteInfo->sprite->spriteTrace);
free(dev->spriteInfo->sprite);
}
dev->spriteInfo->... | 32,980,899,859,740,370,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,177 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | FreezeThaw(DeviceIntPtr dev, Bool frozen)
{
dev->deviceGrab.sync.frozen = frozen;
if (frozen)
dev->public.processInputProc = dev->public.enqueueInputProc;
else
dev->public.processInputProc = dev->public.realInputProc;
}
| 338,647,188,297,326,700,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,178 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GetClientsForDelivery(DeviceIntPtr dev, WindowPtr win,
xEvent *events, Mask filter, InputClients ** iclients)
{
int rc = 0;
if (core_get_type(events) != 0)
*iclients = (InputClients *) wOtherClients(win);
else if (xi2_get_type(events) != 0) {
OtherInputMasks *inputMask... | 138,428,823,658,900,440,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,179 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GetCurrentRootWindow(DeviceIntPtr dev)
{
return RootWindow(dev->spriteInfo->sprite);
}
| 135,115,455,705,273,040,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,180 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GetEventFilter(DeviceIntPtr dev, xEvent *event)
{
int evtype = 0;
if (event->u.u.type != GenericEvent)
return event_get_filter_from_type(dev, event->u.u.type);
else if ((evtype = xi2_get_type(event)))
return event_get_filter_from_xi2type(evtype);
ErrorF("[dix] Unknown event type %d. No ... | 229,178,083,046,782,530,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,181 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GetEventMask(DeviceIntPtr dev, xEvent *event, InputClients * other)
{
int evtype;
/* XI2 filters are only ever 8 bit, so let's return a 8 bit mask */
if ((evtype = xi2_get_type(event))) {
return GetXI2MaskByte(other->xi2mask, dev, evtype);
}
else if (core_get_type(event) != 0)
retur... | 290,585,758,285,158,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,182 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GetSpriteCursor(DeviceIntPtr pDev)
{
return pDev->spriteInfo->sprite->current;
}
| 287,014,511,772,214,500,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,183 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GetSpriteWindow(DeviceIntPtr pDev)
{
return pDev->spriteInfo->sprite->win;
}
| 225,133,995,907,733,100,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,184 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GetXI2MaskByte(XI2Mask *mask, DeviceIntPtr dev, int event_type)
{
/* we just return the matching filter because that's the only use
* for this mask anyway.
*/
if (xi2mask_isset(mask, dev, event_type))
return event_get_filter_from_xi2type(event_type);
else
return 0;
}
| 296,266,103,100,436,700,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,185 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | GrabDevice(ClientPtr client, DeviceIntPtr dev,
unsigned pointer_mode, unsigned keyboard_mode, Window grabWindow,
unsigned ownerEvents, Time ctime, GrabMask *mask,
int grabtype, Cursor curs, Window confineToWin, CARD8 *status)
{
WindowPtr pWin, confineTo;
GrabPtr grab;
TimeSt... | 12,400,977,270,467,442,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,186 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | InitEvents(void)
{
int i;
QdEventPtr qe, tmp;
inputInfo.numDevices = 0;
inputInfo.devices = (DeviceIntPtr) NULL;
inputInfo.off_devices = (DeviceIntPtr) NULL;
inputInfo.keyboard = (DeviceIntPtr) NULL;
inputInfo.pointer = (DeviceIntPtr) NULL;
for (i = 0; i < MAXDEVICES; i++) {
De... | 85,548,204,846,167,550,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,187 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | InitializeSprite(DeviceIntPtr pDev, WindowPtr pWin)
{
SpritePtr pSprite;
ScreenPtr pScreen;
CursorPtr pCursor;
if (!pDev->spriteInfo->sprite) {
DeviceIntPtr it;
pDev->spriteInfo->sprite = (SpritePtr) calloc(1, sizeof(SpriteRec));
if (!pDev->spriteInfo->sprite)
Fatal... | 327,338,750,098,915,840,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,188 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | IsFloating(DeviceIntPtr dev)
{
return !IsMaster(dev) && GetMaster(dev, MASTER_KEYBOARD) == NULL;
}
| 312,159,217,024,697,650,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,189 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | IsInterferingGrab(ClientPtr client, DeviceIntPtr dev, xEvent *event)
{
DeviceIntPtr it = inputInfo.devices;
switch (event->u.u.type) {
case KeyPress:
case KeyRelease:
case ButtonPress:
case ButtonRelease:
case MotionNotify:
case EnterNotify:
case LeaveNotify:
break;
defa... | 149,929,277,386,806,150,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,190 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | IsMaster(DeviceIntPtr dev)
{
return dev->type == MASTER_POINTER || dev->type == MASTER_KEYBOARD;
}
| 94,429,415,478,680,300,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,191 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | IsParent(WindowPtr a, WindowPtr b)
{
for (b = b->parent; b; b = b->parent)
if (b == a)
return TRUE;
return FALSE;
}
| 261,286,635,553,132,470,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,192 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | IsPointerDevice(DeviceIntPtr dev)
{
return (dev->type == MASTER_POINTER) ||
(dev->valuator && dev->button) || (dev->valuator && !dev->key);
}
| 169,713,065,485,073,200,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,193 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | IsWrongPointerBarrierClient(ClientPtr client, DeviceIntPtr dev, xEvent *event)
{
xXIBarrierEvent *ev = (xXIBarrierEvent*)event;
if (ev->type != GenericEvent || ev->extension != IReqCode)
return FALSE;
if (ev->evtype != XI_BarrierHit && ev->evtype != XI_BarrierLeave)
return FALSE;
retu... | 205,442,773,712,729,070,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,194 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | LastEventTime(int deviceid)
{
return lastDeviceEventTime[deviceid].time;
}
| 214,301,110,817,323,070,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,195 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | LastEventTimeToggleResetFlag(int deviceid, Bool state)
{
lastDeviceEventTime[deviceid].reset = state;
}
| 59,069,230,695,196,120,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,196 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | MatchForType(const GrabPtr grab, GrabPtr tmp, enum InputLevel level,
int event_type)
{
enum MatchFlags match;
BOOL ignore_device = FALSE;
int grabtype;
int evtype;
switch (level) {
case XI2:
grabtype = XI2;
evtype = GetXI2Type(event_type);
BUG_WARN(!evtype);... | 77,373,537,097,078,980,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,197 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | MaybeDeliverEventsToClient(WindowPtr pWin, xEvent *pEvents,
int count, Mask filter, ClientPtr dontClient)
{
OtherClients *other;
if (pWin->eventMask & filter) {
if (wClient(pWin) == dontClient)
return 0;
#ifdef PANORAMIX
if (!noPanoramiXExtension && pWin->... | 241,861,243,737,152,470,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,198 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | MonthChangedOrBadTime(CARD32 *ms)
{
/* If the ddx/OS is careless about not processing timestamped events from
* different sources in sorted order, then it's possible for time to go
* backwards when it should not. Here we ensure a decent time.
*/
if ((currentTime.milliseconds - *ms) > TIMESLOP)
... | 77,013,258,929,277,670,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,199 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | NewCurrentScreen(DeviceIntPtr pDev, ScreenPtr newScreen, int x, int y)
{
DeviceIntPtr ptr;
SpritePtr pSprite;
ptr =
IsFloating(pDev) ? pDev :
GetXTestDevice(GetMaster(pDev, MASTER_POINTER));
pSprite = ptr->spriteInfo->sprite;
pSprite->hotPhys.x = x;
pSprite->hotPhys.y = y;
#ifd... | 171,227,094,224,445,270,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,200 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | NoticeEventTime(InternalEvent *ev, DeviceIntPtr dev)
{
if (!syncEvents.playingEvents)
NoticeTimeMillis(dev, &ev->any.time);
}
| 47,804,015,947,911,050,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,201 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | NoticeTimeMillis(const DeviceIntPtr dev, CARD32 *ms)
{
TimeStamp time;
if (*ms < currentTime.milliseconds)
MonthChangedOrBadTime(ms);
time.months = currentTime.months;
time.milliseconds = *ms;
NoticeTime(dev, time);
}
| 111,197,224,379,956,680,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,202 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | OtherClientGone(void *value, XID id)
{
OtherClientsPtr other, prev;
WindowPtr pWin = (WindowPtr) value;
prev = 0;
for (other = wOtherClients(pWin); other; other = other->next) {
if (other->resource == id) {
if (prev)
prev->next = other->next;
else {
... | 199,418,680,520,852,100,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,203 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | PickKeyboard(ClientPtr client)
{
DeviceIntPtr ptr = PickPointer(client);
DeviceIntPtr kbd = GetMaster(ptr, MASTER_KEYBOARD);
if (!kbd) {
ErrorF("[dix] ClientPointer not paired with a keyboard. This "
"is a bug.\n");
}
return kbd;
}
| 64,015,664,191,970,160,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,204 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | PickPointer(ClientPtr client)
{
DeviceIntPtr it = inputInfo.devices;
/* First, check if the client currently has a grab on a device. Even
* keyboards count. */
for (it = inputInfo.devices; it; it = it->next) {
GrabPtr grab = it->deviceGrab.grab;
if (grab && grab->grabtype == CORE && S... | 119,352,210,000,201,420,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,205 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | PlayReleasedEvents(void)
{
QdEventPtr tmp;
QdEventPtr qe;
DeviceIntPtr dev;
DeviceIntPtr pDev;
restart:
xorg_list_for_each_entry_safe(qe, tmp, &syncEvents.pending, next) {
if (!qe->device->deviceGrab.sync.frozen) {
xorg_list_del(&qe->next);
pDev = qe->device;
... | 202,488,564,926,995,540,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,206 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | PointInBorderSize(WindowPtr pWin, int x, int y)
{
BoxRec box;
if (RegionContainsPoint(&pWin->borderSize, x, y, &box))
return TRUE;
#ifdef PANORAMIX
if (!noPanoramiXExtension &&
XineramaSetWindowPntrs(inputInfo.pointer, pWin)) {
SpritePtr pSprite = inputInfo.pointer->spriteInfo->spr... | 252,582,043,917,654,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,207 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | PointerConfinedToScreen(DeviceIntPtr pDev)
{
return pDev->spriteInfo->sprite->confined;
}
| 298,368,165,346,979,330,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,208 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | PostNewCursor(DeviceIntPtr pDev)
{
WindowPtr win;
GrabPtr grab = pDev->deviceGrab.grab;
SpritePtr pSprite = pDev->spriteInfo->sprite;
CursorPtr pCursor;
if (syncEvents.playingEvents)
return;
if (grab) {
if (grab->cursor) {
ChangeToCursor(pDev, grab->cursor);
... | 216,731,138,440,242,360,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,209 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcAllowEvents(ClientPtr client)
{
TimeStamp time;
DeviceIntPtr mouse = NULL;
DeviceIntPtr keybd = NULL;
REQUEST(xAllowEventsReq);
REQUEST_SIZE_MATCH(xAllowEventsReq);
UpdateCurrentTime();
time = ClientTimeToServerTime(stuff->time);
mouse = PickPointer(client);
keybd = PickKeyboa... | 38,257,844,072,682,053,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,210 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcGetInputFocus(ClientPtr client)
{
DeviceIntPtr kbd = PickKeyboard(client);
xGetInputFocusReply rep;
FocusClassPtr focus = kbd->focus;
int rc;
/* REQUEST(xReq); */
REQUEST_SIZE_MATCH(xReq);
rc = XaceHook(XACE_DEVICE_ACCESS, client, kbd, DixGetFocusAccess);
if (rc != Success)
... | 321,778,625,258,512,600,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,211 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcGrabButton(ClientPtr client)
{
WindowPtr pWin, confineTo;
REQUEST(xGrabButtonReq);
CursorPtr cursor;
GrabPtr grab;
DeviceIntPtr ptr, modifierDevice;
Mask access_mode = DixGrabAccess;
GrabMask mask;
GrabParameters param;
int rc;
REQUEST_SIZE_MATCH(xGrabButtonReq);
Update... | 138,615,871,691,001,890,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,212 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcGrabKey(ClientPtr client)
{
WindowPtr pWin;
REQUEST(xGrabKeyReq);
GrabPtr grab;
DeviceIntPtr keybd = PickKeyboard(client);
int rc;
GrabParameters param;
GrabMask mask;
REQUEST_SIZE_MATCH(xGrabKeyReq);
param = (GrabParameters) {
.grabtype = CORE,
.ownerEvents = ... | 298,605,698,480,000,240,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,213 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcGrabKeyboard(ClientPtr client)
{
xGrabKeyboardReply rep;
BYTE status;
REQUEST(xGrabKeyboardReq);
int result;
DeviceIntPtr keyboard = PickKeyboard(client);
GrabMask mask;
REQUEST_SIZE_MATCH(xGrabKeyboardReq);
UpdateCurrentTime();
mask.core = KeyPressMask | KeyReleaseMask;
... | 285,234,108,020,962,300,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,214 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcGrabPointer(ClientPtr client)
{
xGrabPointerReply rep;
DeviceIntPtr device = PickPointer(client);
GrabPtr grab;
GrabMask mask;
WindowPtr confineTo;
BYTE status;
REQUEST(xGrabPointerReq);
int rc;
REQUEST_SIZE_MATCH(xGrabPointerReq);
UpdateCurrentTime();
if (stuff->event... | 230,014,728,994,219,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,215 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcQueryPointer(ClientPtr client)
{
xQueryPointerReply rep;
WindowPtr pWin, t;
DeviceIntPtr mouse = PickPointer(client);
DeviceIntPtr keyboard;
SpritePtr pSprite;
int rc;
REQUEST(xResourceReq);
REQUEST_SIZE_MATCH(xResourceReq);
rc = dixLookupWindow(&pWin, stuff->id, client, DixGet... | 55,325,646,750,645,730,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,216 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcSetInputFocus(ClientPtr client)
{
DeviceIntPtr kbd = PickKeyboard(client);
REQUEST(xSetInputFocusReq);
REQUEST_SIZE_MATCH(xSetInputFocusReq);
return SetInputFocus(client, kbd, stuff->focus,
stuff->revertTo, stuff->time, FALSE);
}
| 32,199,449,218,672,470,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,217 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcUngrabButton(ClientPtr client)
{
REQUEST(xUngrabButtonReq);
WindowPtr pWin;
GrabPtr tempGrab;
int rc;
DeviceIntPtr ptr;
REQUEST_SIZE_MATCH(xUngrabButtonReq);
UpdateCurrentTime();
if ((stuff->modifiers != AnyModifier) &&
(stuff->modifiers & ~AllModifiersMask)) {
clien... | 249,717,625,191,781,500,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,218 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcUngrabKey(ClientPtr client)
{
REQUEST(xUngrabKeyReq);
WindowPtr pWin;
GrabPtr tempGrab;
DeviceIntPtr keybd = PickKeyboard(client);
int rc;
REQUEST_SIZE_MATCH(xUngrabKeyReq);
rc = dixLookupWindow(&pWin, stuff->grabWindow, client, DixGetAttrAccess);
if (rc != Success)
return r... | 274,883,821,681,775,000,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,219 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcUngrabKeyboard(ClientPtr client)
{
DeviceIntPtr device = PickKeyboard(client);
GrabPtr grab;
TimeStamp time;
REQUEST(xResourceReq);
REQUEST_SIZE_MATCH(xResourceReq);
UpdateCurrentTime();
grab = device->deviceGrab.grab;
time = ClientTimeToServerTime(stuff->id);
if ((CompareTim... | 217,383,550,858,505,800,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
14,220 | xserver | 215f894965df5fb0bb45b107d84524e700d2073c | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c | dix: Disallow GenericEvent in SendEvent request.
The SendEvent request holds xEvent which is exactly 32 bytes long, no more,
no less. Both ProcSendEvent and SProcSendEvent verify that the received data
exactly match the request size. However nothing stops the client from passing
in event with xEvent::type = GenericEve... | 0 | ProcUngrabPointer(ClientPtr client)
{
DeviceIntPtr device = PickPointer(client);
GrabPtr grab;
TimeStamp time;
REQUEST(xResourceReq);
REQUEST_SIZE_MATCH(xResourceReq);
UpdateCurrentTime();
grab = device->deviceGrab.grab;
time = ClientTimeToServerTime(stuff->id);
if ((CompareTimeSt... | 49,507,302,223,894,300,000,000,000,000,000,000,000 | events.c | 251,339,050,777,169,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10971 | In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. | https://nvd.nist.gov/vuln/detail/CVE-2017-10971 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.