idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
18,727
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
OsReleaseSignals (void) { #ifdef SIG_BLOCK if (--BlockedSignalCount == 0) { sigprocmask (SIG_SETMASK, &PreviousSignalMask, 0); } #endif }
334,570,342,218,495,060,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,728
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
OsSignal(int sig, OsSigHandlerPtr handler) { struct sigaction act, oact; sigemptyset(&act.sa_mask); if (handler != SIG_IGN) sigaddset(&act.sa_mask, sig); act.sa_flags = 0; act.sa_handler = handler; if (sigaction(sig, &act, &oact)) perror("sigaction"); return oact.sa_handler; }
2,834,914,625,228,485,700,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,729
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
Pclose(pointer iop) { struct pid *cur, *last; int pstat; int pid; DebugF("Pclose: fp = %p\n", iop); fclose(iop); for (last = NULL, cur = pidlist; cur; last = cur, cur = cur->next) if (cur->fp == iop) break; if (cur == NULL) return -1; do { pid = waitpid(cur->pid, &pstat, 0); ...
62,147,775,544,963,950,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,730
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
Popen(char *command, char *type) { struct pid *cur; FILE *iop; int pdes[2], pid; if (command == NULL || type == NULL) return NULL; if ((*type != 'r' && *type != 'w') || type[1]) return NULL; if ((cur = malloc(sizeof(struct pid))) == NULL) return NULL; if (pipe(pdes) < 0) { free(cur);...
275,539,418,488,871,740,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,731
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
SmartScheduleInit (void) { struct sigaction act; if (SmartScheduleDisable) return; memset((char *) &act, 0, sizeof(struct sigaction)); /* Set up the timer signal function */ act.sa_handler = SmartScheduleTimer; sigemptyset (&act.sa_mask); sigaddset (&act.sa_mask, SIGALRM); if (sigact...
286,719,142,697,429,800,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,732
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
SmartScheduleStopTimer (void) { struct itimerval timer; if (SmartScheduleDisable) return; timer.it_interval.tv_sec = 0; timer.it_interval.tv_usec = 0; timer.it_value.tv_sec = 0; timer.it_value.tv_usec = 0; (void) setitimer (ITIMER_REAL, &timer, 0); }
253,715,846,038,826,200,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,733
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
SmartScheduleTimer (int sig) { SmartScheduleTime += SmartScheduleInterval; }
89,345,936,898,260,560,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,734
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
System(char *command) { int pid, p; void (*csig)(int); int status; if (!command) return 1; csig = signal(SIGCHLD, SIG_DFL); if (csig == SIG_ERR) { perror("signal"); return -1; } DebugF("System: `%s'\n", command); switch (pid = fork()) { case -1: /* error */ p = -...
284,193,440,984,534,270,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,735
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
UnlockServer(void) { if (nolock) return; if (!StillLocking){ (void) unlink(LockFile); } }
241,445,917,684,814,530,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,736
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
void UseMsg(void) { ErrorF("use: X [:<display>] [option]\n"); ErrorF("-a # default pointer acceleration (factor)\n"); ErrorF("-ac disable access control restrictions\n"); ErrorF("-audit int set audit trail level\n"); ErrorF("-auth file se...
146,975,955,711,413,330,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,737
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
VerifyDisplayName(const char *d) { if ( d == (char *)0 ) return 0; /* null */ if ( *d == '\0' ) return 0; /* empty */ if ( *d == '-' ) return 0; /* could be confused for an option */ if ( *d == '.' ) return 0; /* must not equal "." or ".." */ if ( strchr(d, '/') != (char *)0 ) return 0; ...
160,750,868,335,341,850,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,738
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
XNFalloc(unsigned long amount) { void *ptr = malloc(amount); if (!ptr) FatalError("Out of memory"); return ptr; }
317,287,480,655,081,030,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,739
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
XNFcalloc(unsigned long amount) { void *ret = calloc(1, amount); if (!ret) FatalError("XNFcalloc: Out of memory"); return ret; }
218,186,922,804,885,830,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,740
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
XNFstrdup(const char *s) { char *ret; if (s == NULL) return NULL; ret = strdup(s); if (!ret) FatalError("XNFstrdup: Out of memory"); return ret; }
62,989,932,956,219,340,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,741
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
Xalloc(unsigned long amount) { /* * Xalloc used to return NULL when large amount of memory is requested. In * order to catch the buggy callers this warning has been added, slated to * removal by anyone who touches this code (or just looks at it) in 2011. * * -- Mikhail Gusarov */ i...
78,956,602,238,323,470,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,742
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
Xcalloc(unsigned long amount) { return calloc(1, amount); }
309,842,056,639,033,100,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,743
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
Xfree(void *ptr) { free(ptr); }
208,991,295,263,404,640,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,744
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
Xrealloc(void *ptr, unsigned long amount) { /* * Xrealloc used to return NULL when large amount of memory is requested. In * order to catch the buggy callers this warning has been added, slated to * removal by anyone who touches this code (or just looks at it) in 2011. * * -- Mikhail Gusaro...
10,913,728,964,208,476,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,745
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
Xstrdup(const char *s) { if (s == NULL) return NULL; return strdup(s); }
28,184,547,654,822,985,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,746
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
set_font_authorizations(char **authorizations, int *authlen, pointer client) { #define AUTHORIZATION_NAME "hp-hostname-1" #if defined(TCPCONN) || defined(STREAMSCONN) static char *result = NULL; static char *p = NULL; if (p == NULL) { char hname[1024], *hnameptr; unsigned int len; #if defined(IPv6) &...
149,762,056,771,785,060,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,747
xserver
b67581cf825940fdf52bf2e0af4330e695d724a4
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4
Fix CVE-2011-4029: File permission change vulnerability. Use fchmod() to change permissions of the lock file instead of chmod(), thus avoid the race that can be exploited to set a symbolic link to any file or directory in the system. Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr> Reviewed-by: Alan Coopersmith...
0
xstrtokenize(const char *str, const char *separators) { char **list, **nlist; char *tok, *tmp; unsigned num = 0, n; if (!str) return NULL; list = calloc(1, sizeof(*list)); if (!list) return NULL; tmp = strdup(str); if (!tmp) goto error; for (tok = strtok(tmp,...
167,568,798,332,087,240,000,000,000,000,000,000,000
utils.c
239,298,116,836,904,470,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2011-4029
The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
https://nvd.nist.gov/vuln/detail/CVE-2011-4029
18,748
libXpm
d1167418f0fd02a27f617ec5afd6db053afbe185
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
None
0
CreateColors( char **dataptr, unsigned int *data_size, XpmColor *colors, unsigned int ncolors, unsigned int cpp) { char buf[BUFSIZ]; unsigned int a, key, l; char *s, *s2; char **defaults; /* can ncolors be trusted here? */ for (a = 0; a < ncolors; a++, colors++, data...
243,416,250,055,797,160,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10164
Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which trig...
https://nvd.nist.gov/vuln/detail/CVE-2016-10164
18,749
libXpm
d1167418f0fd02a27f617ec5afd6db053afbe185
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
None
0
CreatePixels( char **dataptr, unsigned int data_size, unsigned int width, unsigned int height, unsigned int cpp, unsigned int *pixels, XpmColor *colors) { char *s; unsigned int x, y, h, offset; if(height <= 1) return; h = height - 1; offset = width * c...
7,640,310,667,273,543,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10164
Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which trig...
https://nvd.nist.gov/vuln/detail/CVE-2016-10164
18,750
libXpm
d1167418f0fd02a27f617ec5afd6db053afbe185
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185
None
0
XpmCreateDataFromImage( Display *display, char ***data_return, XImage *image, XImage *shapeimage, XpmAttributes *attributes) { XpmImage xpmimage; XpmInfo info; int ErrorStatus; /* initialize return value */ if (data_return) *data_return = NULL; /* create an Xpm...
63,458,199,657,731,650,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-10164
Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which trig...
https://nvd.nist.gov/vuln/detail/CVE-2016-10164
18,751
virglrenderer
747a293ff6055203e529f083896b823e22523fe7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7
vrend: fix a leak in context create internal Create a context more than once causes memory leak issue. Juest return if the context exists. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static int vrend_decode_create_ve(struct vrend_decode_ctx *ctx, uint32_t handle, uint16_t length) { struct pipe_vertex_element *ve = NULL; int num_elements; int i; int ret; if (length < 1) return EINVAL; if ((length - 1) % 4) return EINVAL; num_elements = (length - 1) / 4; if (nu...
305,016,948,834,834,430,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10163
Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
https://nvd.nist.gov/vuln/detail/CVE-2016-10163
18,752
virglrenderer
747a293ff6055203e529f083896b823e22523fe7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7
vrend: fix a leak in context create internal Create a context more than once causes memory leak issue. Juest return if the context exists. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
static int vrend_decode_set_framebuffer_state(struct vrend_decode_ctx *ctx, int length) { if (length < 2) return EINVAL; uint32_t nr_cbufs = get_buf_entry(ctx, VIRGL_SET_FRAMEBUFFER_STATE_NR_CBUFS); uint32_t zsurf_handle = get_buf_entry(ctx, VIRGL_SET_FRAMEBUFFER_STATE_NR_ZSURF_HANDLE); uint32_t surf...
52,346,146,532,812,080,000,000,000,000,000,000,000
vrend_decode.c
142,230,531,657,531,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10163
Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
https://nvd.nist.gov/vuln/detail/CVE-2016-10163
18,853
libav
ce7aee9b733134649a6ce2fa743e51733f33e67e
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e
dpcm: ignore extra unpaired bytes in stereo streams. Fixes: CVE-2011-3951 Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
0
static av_cold int dpcm_decode_init(AVCodecContext *avctx) { DPCMContext *s = avctx->priv_data; int i; if (avctx->channels < 1 || avctx->channels > 2) { av_log(avctx, AV_LOG_INFO, "invalid number of channels\n"); return AVERROR(EINVAL); } s->channels = avctx->channels; s->sampl...
30,486,710,245,222,960,000,000,000,000,000,000
dpcm.c
326,513,607,719,025,280,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3951
The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media...
https://nvd.nist.gov/vuln/detail/CVE-2011-3951
18,854
libav
2d1c0dea5f6b91bec7f5fa53ec050913d851e366
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=2d1c0dea5f6b91bec7f5fa53ec050913d851e366
dv: Fix small stack overread related to CVE-2011-3929 and CVE-2011-3936. Found with asan. Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind Signed-off-by: Alex Converse <alex.converse@gmail.com>
0
static inline uint16_t dv_audio_12to16(uint16_t sample) { uint16_t shift, result; sample = (sample < 0x800) ? sample : sample | 0xf000; shift = (sample & 0xf00) >> 8; if (shift < 0x2 || shift > 0xd) { result = sample; } else if (shift < 0x8) { shift--; result = (sample - (...
214,742,415,878,011,270,000,000,000,000,000,000,000
dv.c
204,870,324,012,624,250,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-3936
The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3936
18,855
libav
635bcfccd439480003b74a665b5aa7c872c1ad6b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=635bcfccd439480003b74a665b5aa7c872c1ad6b
dv: check stype dv: check stype Fixes part1 of CVE-2011-3929 Possibly fixes part of CVE-2011-3936 Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org> Signed-off-by: Michael Niedermayer <michaelni@gmx.at> Signed-off-by: Alex Converse <alex.converse@gmail.com>
0
static int dv_extract_audio(uint8_t* frame, uint8_t* ppcm[4], const DVprofile *sys) { int size, chan, i, j, d, of, smpls, freq, quant, half_ch; uint16_t lc, rc; const uint8_t* as_pack; uint8_t *pcm, ipcm; as_pack = dv_extract_pack(frame, dv_audio_source); if (!as_pac...
334,921,596,958,319,800,000,000,000,000,000,000,000
dv.c
204,870,324,012,624,250,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-3936
The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3936
18,856
libav
5a396bb3a66a61a68b80f2369d0249729bf85e04
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04
dv: Fix null pointer dereference due to ach=0 dv: Fix null pointer dereference due to ach=0 Fixes part2 of CVE-2011-3929 Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org> Signed-off-by: Michael Niedermayer <michaelni@gmx.at> Signed-off-by: Alex Converse <alex...
0
DVDemuxContext* avpriv_dv_init_demux(AVFormatContext *s) { DVDemuxContext *c; c = av_mallocz(sizeof(DVDemuxContext)); if (!c) return NULL; c->vst = avformat_new_stream(s, NULL); if (!c->vst) { av_free(c); return NULL; } c->sys = NULL; c->fctx = s; memset(c...
216,839,151,204,492,940,000,000,000,000,000,000,000
dv.c
204,870,324,012,624,250,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3929
The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly exe...
https://nvd.nist.gov/vuln/detail/CVE-2011-3929
18,857
libav
5a396bb3a66a61a68b80f2369d0249729bf85e04
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04
dv: Fix null pointer dereference due to ach=0 dv: Fix null pointer dereference due to ach=0 Fixes part2 of CVE-2011-3929 Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org> Signed-off-by: Michael Niedermayer <michaelni@gmx.at> Signed-off-by: Alex Converse <alex...
0
static int dv_extract_audio_info(DVDemuxContext* c, uint8_t* frame) { const uint8_t* as_pack; int freq, stype, smpls, quant, i, ach; as_pack = dv_extract_pack(frame, dv_audio_source); if (!as_pack || !c->sys) { /* No audio ? */ c->ach = 0; return 0; } smpls = as_pack[1] & 0...
61,212,474,104,764,950,000,000,000,000,000,000,000
dv.c
204,870,324,012,624,250,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3929
The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly exe...
https://nvd.nist.gov/vuln/detail/CVE-2011-3929
18,858
libav
5a396bb3a66a61a68b80f2369d0249729bf85e04
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04
dv: Fix null pointer dereference due to ach=0 dv: Fix null pointer dereference due to ach=0 Fixes part2 of CVE-2011-3929 Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org> Signed-off-by: Michael Niedermayer <michaelni@gmx.at> Signed-off-by: Alex Converse <alex...
0
static int dv_extract_video_info(DVDemuxContext *c, uint8_t* frame) { const uint8_t* vsc_pack; AVCodecContext* avctx; int apt, is16_9; int size = 0; if (c->sys) { avctx = c->vst->codec; avpriv_set_pts_info(c->vst, 64, c->sys->time_base.num, c->sys->time_base...
45,975,555,516,177,150,000,000,000,000,000,000,000
dv.c
204,870,324,012,624,250,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3929
The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly exe...
https://nvd.nist.gov/vuln/detail/CVE-2011-3929
18,859
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Do_ContextPos( GPOS_Instance* gpi, HB_UShort GlyphCount, HB_UShort PosCount, HB_PosLookupRecord* pos, HB_Buffer buffer, int nesting_level ) { HB_Error error; HB_UInt i, old_pos; i = 0; while ( i < GlyphCount ...
78,804,291,979,695,420,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,860
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ChainContextPos( HB_GPOS_SubTable* st ) { HB_ChainContextPos* ccp = &st->chain; switch ( ccp->PosFormat ) { case 1: Free_ChainContextPos1( &ccp->ccpf.ccpf1 ); break; case 2: Free_ChainContextPos2( &ccp->ccpf.ccpf2 ); break; case 3: Free_ChainContextPos3( &ccp->ccpf.ccpf3 ); break; d...
196,566,157,347,685,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,861
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ChainContextPos1( HB_ChainContextPosFormat1* ccpf1 ) { HB_UShort n, count; HB_ChainPosRuleSet* cprs; if ( ccpf1->ChainPosRuleSet ) { count = ccpf1->ChainPosRuleSetCount; cprs = ccpf1->ChainPosRuleSet; for ( n = 0; n < count; n++ ) Free_ChainPosRuleSet( &cpr...
249,697,178,775,522,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,862
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ChainContextPos3( HB_ChainContextPosFormat3* ccpf3 ) { HB_UShort n, count; HB_Coverage* c; FREE( ccpf3->PosLookupRecord ); if ( ccpf3->LookaheadCoverage ) { count = ccpf3->LookaheadGlyphCount; c = ccpf3->LookaheadCoverage; for ( n = 0; n < count; n++ ) _HB_O...
288,728,073,642,580,930,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,863
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ChainPosClassRule( HB_ChainPosClassRule* cpcr ) { FREE( cpcr->PosLookupRecord ); FREE( cpcr->Lookahead ); FREE( cpcr->Input ); FREE( cpcr->Backtrack ); }
290,598,471,355,290,870,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,864
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ChainPosRuleSet( HB_ChainPosRuleSet* cprs ) { HB_UShort n, count; HB_ChainPosRule* cpr; if ( cprs->ChainPosRule ) { count = cprs->ChainPosRuleCount; cpr = cprs->ChainPosRule; for ( n = 0; n < count; n++ ) Free_ChainPosRule( &cpr[n] ); FREE( cpr ); } }
102,615,054,337,050,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,865
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ContextPos( HB_GPOS_SubTable* st ) { HB_ContextPos* cp = &st->context; switch ( cp->PosFormat ) { case 1: Free_ContextPos1( &cp->cpf.cpf1 ); break; case 2: Free_ContextPos2( &cp->cpf.cpf2 ); break; case 3: Free_ContextPos3( &cp->cpf.cpf3 ); break; default: break; } }
203,522,514,342,845,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,866
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ContextPos1( HB_ContextPosFormat1* cpf1 ) { HB_UShort n, count; HB_PosRuleSet* prs; if ( cpf1->PosRuleSet ) { count = cpf1->PosRuleSetCount; prs = cpf1->PosRuleSet; for ( n = 0; n < count; n++ ) Free_PosRuleSet( &prs[n] ); FREE( prs ); } _HB_OPEN_Free...
203,380,439,546,006,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,867
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ContextPos2( HB_ContextPosFormat2* cpf2 ) { HB_UShort n, count; HB_PosClassSet* pcs; if ( cpf2->PosClassSet ) { count = cpf2->PosClassSetCount; pcs = cpf2->PosClassSet; for ( n = 0; n < count; n++ ) Free_PosClassSet( &pcs[n] ); FREE( pcs ); } _HB_OPE...
39,973,493,634,551,256,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,868
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_CursivePos( HB_GPOS_SubTable* st ) { HB_UShort n, count; HB_CursivePos* cp = &st->cursive; HB_EntryExitRecord* eer; if ( cp->EntryExitRecord ) { count = cp->EntryExitCount; eer = cp->EntryExitRecord; for ( n = 0; n < count; n++ ) { Free_Anchor( &eer[...
132,272,787,743,190,770,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,869
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_LigatureAttach( HB_LigatureAttach* lat, HB_UShort num_classes ) { HB_UShort m, n, count; HB_ComponentRecord* cr; HB_Anchor* lan; if ( lat->ComponentRecord ) { count = lat->ComponentCount; cr = lat->ComponentRecord; for ( m = 0; m < count...
336,781,950,612,107,720,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,870
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_Mark2Array( HB_Mark2Array* m2a, HB_UShort num_classes ) { HB_Mark2Record *m2r; HB_Anchor *m2ans; HB_UNUSED(num_classes); if ( m2a->Mark2Record ) { m2r = m2a->Mark2Record; if ( m2a->Mark2Count ) { m2ans = m2r[0].Mark2Anchor; FREE( m2ans ); ...
227,433,326,688,203,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,871
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_MarkArray( HB_MarkArray* ma ) { HB_UShort n, count; HB_MarkRecord* mr; if ( ma->MarkRecord ) { count = ma->MarkCount; mr = ma->MarkRecord; for ( n = 0; n < count; n++ ) Free_Anchor( &mr[n].MarkAnchor ); FREE( mr ); } }
47,394,928,258,282,410,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,872
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_MarkBasePos( HB_GPOS_SubTable* st ) { HB_MarkBasePos* mbp = &st->markbase; Free_BaseArray( &mbp->BaseArray, mbp->ClassCount ); Free_MarkArray( &mbp->MarkArray ); _HB_OPEN_Free_Coverage( &mbp->BaseCoverage ); _HB_OPEN_Free_Coverage( &mbp->MarkCoverage ); }
225,360,450,942,059,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,873
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_MarkMarkPos( HB_GPOS_SubTable* st) { HB_MarkMarkPos* mmp = &st->markmark; Free_Mark2Array( &mmp->Mark2Array, mmp->ClassCount ); Free_MarkArray( &mmp->Mark1Array ); _HB_OPEN_Free_Coverage( &mmp->Mark2Coverage ); _HB_OPEN_Free_Coverage( &mmp->Mark1Coverage ); }
179,059,377,645,848,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,874
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_PairPos( HB_GPOS_SubTable* st ) { HB_UShort format1, format2; HB_PairPos* pp = &st->pair; format1 = pp->ValueFormat1; format2 = pp->ValueFormat2; switch ( pp->PosFormat ) { case 1: Free_PairPos1( &pp->ppf.ppf1, format1, format2 ); break; case 2: Free_PairPos2( &pp-...
263,825,064,962,835,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,875
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_PairPos1( HB_PairPosFormat1* ppf1, HB_UShort format1, HB_UShort format2 ) { HB_UShort n, count; HB_PairSet* ps; if ( ppf1->PairSet ) { count = ppf1->PairSetCount; ps = ppf1->PairSet; for ( n = 0; n < count; n++ ) Free_PairSet( ...
42,252,931,294,035,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,876
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_PairPos2( HB_PairPosFormat2* ppf2, HB_UShort format1, HB_UShort format2) { HB_UShort m, n, count1, count2; HB_Class1Record* c1r; HB_Class2Record* c2r; if ( ppf2->Class1Record ) { c1r = ppf2->Class1Record; count1 = ppf2->Class1Coun...
81,240,588,323,073,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,877
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_PairSet( HB_PairSet* ps, HB_UShort format1, HB_UShort format2 ) { HB_UShort n, count; HB_PairValueRecord* pvr; if ( ps->PairValueRecord ) { count = ps->PairValueCount; pvr = ps->PairValueRecord; for ( n = 0; n < count; n++ ) { if ( ...
263,478,149,439,660,760,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,878
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_PosClassSet( HB_PosClassSet* pcs ) { HB_UShort n, count; HB_PosClassRule* pcr; if ( pcs->PosClassRule ) { count = pcs->PosClassRuleCount; pcr = pcs->PosClassRule; for ( n = 0; n < count; n++ ) Free_PosClassRule( &pcr[n] ); FREE( pcr ); } }
12,594,159,458,399,838,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,879
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_PosRule( HB_PosRule* pr ) { FREE( pr->PosLookupRecord ); FREE( pr->Input ); }
241,141,520,859,471,240,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,880
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_SinglePos( HB_GPOS_SubTable* st ) { HB_UShort n, count, format; HB_SinglePos* sp = &st->single; HB_ValueRecord* v; format = sp->ValueFormat; switch ( sp->PosFormat ) { case 1: Free_ValueRecord( &sp->spf.spf1.Value, format ); break; case 2: if ( sp->spf.spf2....
83,040,449,105,530,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,881
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static void Free_ValueRecord( HB_ValueRecord* vr, HB_UShort format ) { if ( format & HB_GPOS_FORMAT_HAVE_Y_ADVANCE_DEVICE ) _HB_OPEN_Free_Device( vr->DeviceTables[VR_Y_ADVANCE_DEVICE] ); if ( format & HB_GPOS_FORMAT_HAVE_X_ADVANCE_DEVICE ) _HB_OPEN_Free_Device( vr->DeviceTables[VR_X_ADVA...
35,054,132,665,916,196,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,882
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error GPOS_Do_Glyph_Lookup( GPOS_Instance* gpi, HB_UShort lookup_index, HB_Buffer buffer, HB_UShort context_length, int nesting_level ) { HB_Error error = HB_Err_Not_Covered; HB_UShort i, flags, loo...
99,389,851,916,933,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,883
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error GPOS_Do_String_Lookup( GPOS_Instance* gpi, HB_UShort lookup_index, HB_Buffer buffer ) { HB_Error error, retError = HB_Err_Not_Covered; HB_GPOSHeader* gpos = gpi->gpos; HB_UInt* properties = gpos->LookupList.Properties; const int nesting_level = ...
208,359,165,330,021,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,884
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Get_ValueRecord( GPOS_Instance* gpi, HB_ValueRecord* vr, HB_UShort format, HB_Position gd ) { HB_Short pixel_value; HB_Error error = HB_Err_Ok; #ifdef HB_SUPPORT_MULTIPLE_MASTER HB_GPOSHeader* gpos = gpi->gpos; HB_Fixed value; #endif...
42,685,882,775,261,840,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,885
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_Done_GPOS_Table( HB_GPOSHeader* gpos ) { _HB_OPEN_Free_LookupList( &gpos->LookupList, HB_Type_GPOS ); _HB_OPEN_Free_FeatureList( &gpos->FeatureList ); _HB_OPEN_Free_ScriptList( &gpos->ScriptList ); FREE( gpos ); return HB_Err_Ok; }
117,733,949,896,746,550,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,886
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_GPOS_Add_Feature( HB_GPOSHeader* gpos, HB_UShort feature_index, HB_UInt property ) { HB_UShort i; HB_Feature feature; HB_UInt* properties; HB_UShort* index; HB_UShort lookup_count; /* Each feature can only be added once */ if ( !gpos || ...
327,603,718,734,461,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,887
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_GPOS_Apply_String( HB_Font font, HB_GPOSHeader* gpos, HB_UShort load_flags, HB_Buffer buffer, HB_Bool dvi, HB_Bool r2l ) { HB_Error error, retError = HB_Err_Not_Covered; GPOS_Instance gpi; int i, j, lookup_coun...
168,907,622,495,326,560,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,888
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_GPOS_Query_Languages( HB_GPOSHeader* gpos, HB_UShort script_index, HB_UInt** language_tag_list ) { HB_Error error; HB_UShort n; HB_UInt* ltl; HB_ScriptList* sl; HB_ScriptRecord* sr; HB_ScriptTable* s; HB_LangSysRecord* lsr;...
320,284,416,808,882,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,889
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_GPOS_Query_Scripts( HB_GPOSHeader* gpos, HB_UInt** script_tag_list ) { HB_Error error; HB_UShort n; HB_UInt* stl; HB_ScriptList* sl; HB_ScriptRecord* sr; if ( !gpos || !script_tag_list ) return ERR(HB_Err_Invalid_Argument); sl = &gpos->Scrip...
232,346,702,932,894,770,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,890
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_GPOS_Register_MM_Function( HB_GPOSHeader* gpos, HB_MMFunction mmfunc, void* data ) { if ( !gpos ) return ERR(HB_Err_Invalid_Argument); gpos->mmfunc = mmfunc; gpos->data = data; return HB_Err_Ok; }
321,221,520,552,830,020,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,891
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_GPOS_Select_Feature( HB_GPOSHeader* gpos, HB_UInt feature_tag, HB_UShort script_index, HB_UShort language_index, HB_UShort* feature_index ) { HB_UShort n; HB_ScriptList* sl; HB_ScriptRecord* sr; HB_ScriptTable* s; HB_La...
247,993,875,820,906,030,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,892
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_GPOS_Select_Script( HB_GPOSHeader* gpos, HB_UInt script_tag, HB_UShort* script_index ) { HB_UShort n; HB_ScriptList* sl; HB_ScriptRecord* sr; if ( !gpos || !script_index ) return ERR(HB_Err_Invalid_Argument); sl = &gpos->ScriptList; sr = sl->ScriptR...
102,703,167,632,436,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,893
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
HB_Error HB_Load_GPOS_Table( HB_Stream stream, HB_GPOSHeader** retptr, HB_GDEFHeader* gdef, HB_Stream gdefStream ) { HB_UInt cur_offset, new_offset, base_offset; HB_GPOSHeader* gpos; HB_Error error; if ( !retptr ) return ERR(HB_Err_Invalid_Argument); if ...
40,168,826,508,339,003,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,894
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_Anchor( HB_Anchor* an, HB_Stream stream ) { HB_Error error; HB_UInt cur_offset, new_offset, base_offset; base_offset = FILE_Pos(); if ( ACCESS_Frame( 2L ) ) return error; an->PosFormat = GET_UShort(); FORGET_Frame(); switch ( an->PosFormat ) { case 1: ...
313,189,733,565,039,430,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,895
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_BaseArray( HB_BaseArray* ba, HB_UShort num_classes, HB_Stream stream ) { HB_Error error; HB_UShort m, n, count; HB_UInt cur_offset, new_offset, base_offset; HB_BaseRecord *br; HB_Anchor *ban, *bans; base_offset = FILE_Pos(); if ( ACCES...
267,278,214,023,993,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,896
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ChainContextPos( HB_GPOS_SubTable* st, HB_Stream stream ) { HB_Error error; HB_ChainContextPos* ccp = &st->chain; if ( ACCESS_Frame( 2L ) ) return error; ccp->PosFormat = GET_UShort(); FORGET_Frame(); switch ( ccp->PosFormat ) { case 1: return ...
203,938,010,782,665,850,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,897
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ChainContextPos1( HB_ChainContextPosFormat1* ccpf1, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_ChainPosRuleSet* cprs; base_offset = FILE_Pos() - 2L; if ( ACCESS_Fra...
312,264,329,098,438,250,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,898
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ChainContextPos3( HB_ChainContextPosFormat3* ccpf3, HB_Stream stream ) { HB_Error error; HB_UShort n, nb, ni, nl, m, count; HB_UShort backtrack_count, input_count, lookahead_count; HB_UInt cur_offset, new_offset, base_offset; ...
310,060,701,158,135,840,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,899
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ChainPosClassRule( HB_ChainContextPosFormat2* ccpf2, HB_ChainPosClassRule* cpcr, HB_Stream stream ) { HB_Error error; HB_UShort n, count; HB_UShort* b; HB_UShort* i; HB_UShort* l; HB_PosLookupRecor...
226,717,380,205,846,880,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,900
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ChainPosClassSet( HB_ChainContextPosFormat2* ccpf2, HB_ChainPosClassSet* cpcs, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_ChainPosClassRule* cpcr; ...
311,950,109,855,728,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,901
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ChainPosRule( HB_ChainPosRule* cpr, HB_Stream stream ) { HB_Error error; HB_UShort n, count; HB_UShort* b; HB_UShort* i; HB_UShort* l; HB_PosLookupRecord* plr; if ( ACCESS_Frame( 2L ) ) return error; cpr->Bac...
247,635,255,661,926,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,902
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ChainPosRuleSet( HB_ChainPosRuleSet* cprs, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_ChainPosRule* cpr; base_offset = FILE_Pos(); if ( ACCESS_Frame( 2L ) ) return err...
271,826,229,223,938,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,903
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ContextPos1( HB_ContextPosFormat1* cpf1, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_PosRuleSet* prs; base_offset = FILE_Pos() - 2L; if ( ACCESS_Frame( 2L ) ) return error; ...
325,848,341,092,888,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,904
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ContextPos2( HB_ContextPosFormat2* cpf2, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_PosClassSet* pcs; base_offset = FILE_Pos() - 2; if ( ACCESS_Frame( 2L ) ) return error;...
287,973,166,879,544,380,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,905
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ContextPos3( HB_ContextPosFormat3* cpf3, HB_Stream stream ) { HB_Error error; HB_UShort n, count; HB_UInt cur_offset, new_offset, base_offset; HB_Coverage* c; HB_PosLookupRecord* plr; base_offset = FILE_Pos() - 2L; if ( AC...
42,091,527,905,537,430,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,906
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_CursivePos( HB_GPOS_SubTable* st, HB_Stream stream ) { HB_Error error; HB_CursivePos* cp = &st->cursive; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_EntryExitRecord* eer; base_offset = FILE_Pos(); if ( ACCESS_Fr...
317,377,356,197,715,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,907
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_LigatureArray( HB_LigatureArray* la, HB_UShort num_classes, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_LigatureAttach* lat; base_offset = FILE_Pos(); if...
152,070,558,451,790,420,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,908
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_LigatureAttach( HB_LigatureAttach* lat, HB_UShort num_classes, HB_Stream stream ) { HB_Error error; HB_UShort m, n, k, count; HB_UInt cur_offset, new_offset, base_offset; HB_ComponentRecord* cr; HB_Anchor* ...
83,851,760,433,283,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,909
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_Mark2Array( HB_Mark2Array* m2a, HB_UShort num_classes, HB_Stream stream ) { HB_Error error; HB_UShort m, n, count; HB_UInt cur_offset, new_offset, base_offset; HB_Mark2Record *m2r; HB_Anchor *m2an, *m2ans; base_offset = FILE_Pos();...
193,371,125,516,969,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,910
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_MarkArray ( HB_MarkArray* ma, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_MarkRecord* mr; base_offset = FILE_Pos(); if ( ACCESS_Frame( 2L ) ) return error; count = ma->MarkCount = ...
320,030,286,323,029,650,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,911
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_MarkBasePos( HB_GPOS_SubTable* st, HB_Stream stream ) { HB_Error error; HB_MarkBasePos* mbp = &st->markbase; HB_UInt cur_offset, new_offset, base_offset; base_offset = FILE_Pos(); if ( ACCESS_Frame( 4L ) ) return error; mbp->PosFormat = GET_UShort(); new_off...
641,221,729,839,015,460,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,912
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_MarkMarkPos( HB_GPOS_SubTable* st, HB_Stream stream ) { HB_Error error; HB_MarkMarkPos* mmp = &st->markmark; HB_UInt cur_offset, new_offset, base_offset; base_offset = FILE_Pos(); if ( ACCESS_Frame( 4L ) ) return error; mmp->PosFormat = GET_UShort(); new_off...
48,483,135,527,955,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,913
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_PairPos( HB_GPOS_SubTable* st, HB_Stream stream ) { HB_Error error; HB_PairPos* pp = &st->pair; HB_UShort format1, format2; HB_UInt cur_offset, new_offset, base_offset; base_offset = FILE_Pos(); if ( ACCESS_Frame( 8L ) ) return error; pp->...
33,695,547,098,242,145,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,914
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_PairPos1( HB_PairPosFormat1* ppf1, HB_UShort format1, HB_UShort format2, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_PairSet* ps; base_offset = FILE_Pos() - 8L; ...
167,761,222,881,186,470,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,915
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_PairPos2( HB_PairPosFormat2* ppf2, HB_UShort format1, HB_UShort format2, HB_Stream stream ) { HB_Error error; HB_UShort m, n, k, count1, count2; HB_UInt cur_offset, new_offset1, new_offset2, base_offset; HB_Class1Record* ...
151,638,714,283,702,870,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,916
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_PairSet ( HB_PairSet* ps, HB_UShort format1, HB_UShort format2, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt base_offset; HB_PairValueRecord* pvr; base_offset = FILE_Pos(); if ( ACCESS_Frame( 2L ) ) ret...
227,044,943,980,068,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,917
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_PosClassRule( HB_ContextPosFormat2* cpf2, HB_PosClassRule* pcr, HB_Stream stream ) { HB_Error error; HB_UShort n, count; HB_UShort* c; HB_PosLookupRecord* plr; if ( ACCESS_Frame( 4L ) ) return error; pcr->GlyphCount...
213,823,860,070,485,830,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,918
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_PosClassSet( HB_ContextPosFormat2* cpf2, HB_PosClassSet* pcs, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_PosClassRule* pcr; base_offset = FILE_Pos(); if ( ACCE...
78,374,929,856,126,910,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,919
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_PosRuleSet( HB_PosRuleSet* prs, HB_Stream stream ) { HB_Error error; HB_UShort n, m, count; HB_UInt cur_offset, new_offset, base_offset; HB_PosRule* pr; base_offset = FILE_Pos(); if ( ACCESS_Frame( 2L ) ) return error; count = prs->PosRuleCount = GE...
295,609,825,764,005,570,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,920
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_SinglePos( HB_GPOS_SubTable* st, HB_Stream stream ) { HB_Error error; HB_SinglePos* sp = &st->single; HB_UShort n, m, count, format; HB_UInt cur_offset, new_offset, base_offset; HB_ValueRecord* vr; base_offset = FILE_Pos(); if ( ACCESS_Frame( 6L )...
229,852,091,832,682,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,921
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Load_ValueRecord( HB_ValueRecord* vr, HB_UShort format, HB_UInt base_offset, HB_Stream stream ) { HB_Error error; HB_UInt cur_offset, new_offset; if ( format & HB_GPOS_FORMAT_HAVE_X_PLACEMENT ) { if ( ACCESS_Frame( 2L ) ) return error...
281,817,123,329,977,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,922
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Lookup_ChainContextPos( GPOS_Instance* gpi, HB_GPOS_SubTable* st, HB_Buffer buffer, HB_UShort flags, HB_UShort context_length, int nesting_level ) { HB_ChainContextPos* ccp = &st->chain; switch ( ccp->PosFor...
310,661,155,411,065,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,923
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Lookup_ChainContextPos1( GPOS_Instance* gpi, HB_ChainContextPosFormat1* ccpf1, HB_Buffer buffer, HB_UShort flags, HB_UShort context_length, int nesting_level ) { HB_UShort ...
255,097,836,296,963,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,924
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Lookup_ChainContextPos2( GPOS_Instance* gpi, HB_ChainContextPosFormat2* ccpf2, HB_Buffer buffer, HB_UShort flags, HB_UShort context_length, int nesting_level ) { HB_UShort ...
240,593,709,834,353,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,925
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Lookup_ChainContextPos3( GPOS_Instance* gpi, HB_ChainContextPosFormat3* ccpf3, HB_Buffer buffer, HB_UShort flags, HB_UShort context_length, int nesting_level ) { HB_UShort ...
330,618,217,465,647,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193
18,926
harfbuzz
81c8ef785b079980ad5b46be4fe7c7bf156dbf65
https://github.com/behdad/harfbuzz
https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
None
0
static HB_Error Lookup_ContextPos( GPOS_Instance* gpi, HB_GPOS_SubTable* st, HB_Buffer buffer, HB_UShort flags, HB_UShort context_length, int nesting_level ) { HB_ContextPos* cp = &st->context; switch ( cp->PosFormat ) { case 1:...
302,074,790,779,867,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3193
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2011-3193