idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
18,727 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | OsReleaseSignals (void)
{
#ifdef SIG_BLOCK
if (--BlockedSignalCount == 0)
{
sigprocmask (SIG_SETMASK, &PreviousSignalMask, 0);
}
#endif
}
| 334,570,342,218,495,060,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,728 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | OsSignal(int sig, OsSigHandlerPtr handler)
{
struct sigaction act, oact;
sigemptyset(&act.sa_mask);
if (handler != SIG_IGN)
sigaddset(&act.sa_mask, sig);
act.sa_flags = 0;
act.sa_handler = handler;
if (sigaction(sig, &act, &oact))
perror("sigaction");
return oact.sa_handler;
}
| 2,834,914,625,228,485,700,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,729 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | Pclose(pointer iop)
{
struct pid *cur, *last;
int pstat;
int pid;
DebugF("Pclose: fp = %p\n", iop);
fclose(iop);
for (last = NULL, cur = pidlist; cur; last = cur, cur = cur->next)
if (cur->fp == iop)
break;
if (cur == NULL)
return -1;
do {
pid = waitpid(cur->pid, &pstat, 0);
... | 62,147,775,544,963,950,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,730 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | Popen(char *command, char *type)
{
struct pid *cur;
FILE *iop;
int pdes[2], pid;
if (command == NULL || type == NULL)
return NULL;
if ((*type != 'r' && *type != 'w') || type[1])
return NULL;
if ((cur = malloc(sizeof(struct pid))) == NULL)
return NULL;
if (pipe(pdes) < 0) {
free(cur);... | 275,539,418,488,871,740,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,731 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | SmartScheduleInit (void)
{
struct sigaction act;
if (SmartScheduleDisable)
return;
memset((char *) &act, 0, sizeof(struct sigaction));
/* Set up the timer signal function */
act.sa_handler = SmartScheduleTimer;
sigemptyset (&act.sa_mask);
sigaddset (&act.sa_mask, SIGALRM);
if (sigact... | 286,719,142,697,429,800,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,732 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | SmartScheduleStopTimer (void)
{
struct itimerval timer;
if (SmartScheduleDisable)
return;
timer.it_interval.tv_sec = 0;
timer.it_interval.tv_usec = 0;
timer.it_value.tv_sec = 0;
timer.it_value.tv_usec = 0;
(void) setitimer (ITIMER_REAL, &timer, 0);
}
| 253,715,846,038,826,200,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,733 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | SmartScheduleTimer (int sig)
{
SmartScheduleTime += SmartScheduleInterval;
}
| 89,345,936,898,260,560,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,734 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | System(char *command)
{
int pid, p;
void (*csig)(int);
int status;
if (!command)
return 1;
csig = signal(SIGCHLD, SIG_DFL);
if (csig == SIG_ERR) {
perror("signal");
return -1;
}
DebugF("System: `%s'\n", command);
switch (pid = fork()) {
case -1: /* error */
p = -... | 284,193,440,984,534,270,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,735 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | UnlockServer(void)
{
if (nolock) return;
if (!StillLocking){
(void) unlink(LockFile);
}
}
| 241,445,917,684,814,530,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,736 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | void UseMsg(void)
{
ErrorF("use: X [:<display>] [option]\n");
ErrorF("-a # default pointer acceleration (factor)\n");
ErrorF("-ac disable access control restrictions\n");
ErrorF("-audit int set audit trail level\n");
ErrorF("-auth file se... | 146,975,955,711,413,330,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,737 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | VerifyDisplayName(const char *d)
{
if ( d == (char *)0 ) return 0; /* null */
if ( *d == '\0' ) return 0; /* empty */
if ( *d == '-' ) return 0; /* could be confused for an option */
if ( *d == '.' ) return 0; /* must not equal "." or ".." */
if ( strchr(d, '/') != (char *)0 ) return 0; ... | 160,750,868,335,341,850,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,738 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | XNFalloc(unsigned long amount)
{
void *ptr = malloc(amount);
if (!ptr)
FatalError("Out of memory");
return ptr;
}
| 317,287,480,655,081,030,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,739 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | XNFcalloc(unsigned long amount)
{
void *ret = calloc(1, amount);
if (!ret)
FatalError("XNFcalloc: Out of memory");
return ret;
}
| 218,186,922,804,885,830,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,740 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | XNFstrdup(const char *s)
{
char *ret;
if (s == NULL)
return NULL;
ret = strdup(s);
if (!ret)
FatalError("XNFstrdup: Out of memory");
return ret;
}
| 62,989,932,956,219,340,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,741 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | Xalloc(unsigned long amount)
{
/*
* Xalloc used to return NULL when large amount of memory is requested. In
* order to catch the buggy callers this warning has been added, slated to
* removal by anyone who touches this code (or just looks at it) in 2011.
*
* -- Mikhail Gusarov
*/
i... | 78,956,602,238,323,470,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,742 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | Xcalloc(unsigned long amount)
{
return calloc(1, amount);
}
| 309,842,056,639,033,100,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,743 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | Xfree(void *ptr)
{
free(ptr);
}
| 208,991,295,263,404,640,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,744 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | Xrealloc(void *ptr, unsigned long amount)
{
/*
* Xrealloc used to return NULL when large amount of memory is requested. In
* order to catch the buggy callers this warning has been added, slated to
* removal by anyone who touches this code (or just looks at it) in 2011.
*
* -- Mikhail Gusaro... | 10,913,728,964,208,476,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,745 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | Xstrdup(const char *s)
{
if (s == NULL)
return NULL;
return strdup(s);
}
| 28,184,547,654,822,985,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,746 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | set_font_authorizations(char **authorizations, int *authlen, pointer client)
{
#define AUTHORIZATION_NAME "hp-hostname-1"
#if defined(TCPCONN) || defined(STREAMSCONN)
static char *result = NULL;
static char *p = NULL;
if (p == NULL)
{
char hname[1024], *hnameptr;
unsigned int len;
#if defined(IPv6) &... | 149,762,056,771,785,060,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,747 | xserver | b67581cf825940fdf52bf2e0af4330e695d724a4 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b67581cf825940fdf52bf2e0af4330e695d724a4 | Fix CVE-2011-4029: File permission change vulnerability.
Use fchmod() to change permissions of the lock file instead
of chmod(), thus avoid the race that can be exploited to set
a symbolic link to any file or directory in the system.
Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>
Reviewed-by: Alan Coopersmith... | 0 | xstrtokenize(const char *str, const char *separators)
{
char **list, **nlist;
char *tok, *tmp;
unsigned num = 0, n;
if (!str)
return NULL;
list = calloc(1, sizeof(*list));
if (!list)
return NULL;
tmp = strdup(str);
if (!tmp)
goto error;
for (tok = strtok(tmp,... | 167,568,798,332,087,240,000,000,000,000,000,000,000 | utils.c | 239,298,116,836,904,470,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2011-4029 | The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file. | https://nvd.nist.gov/vuln/detail/CVE-2011-4029 |
18,748 | libXpm | d1167418f0fd02a27f617ec5afd6db053afbe185 | https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 | https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 | None | 0 | CreateColors(
char **dataptr,
unsigned int *data_size,
XpmColor *colors,
unsigned int ncolors,
unsigned int cpp)
{
char buf[BUFSIZ];
unsigned int a, key, l;
char *s, *s2;
char **defaults;
/* can ncolors be trusted here? */
for (a = 0; a < ncolors; a++, colors++, data... | 243,416,250,055,797,160,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10164 | Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which trig... | https://nvd.nist.gov/vuln/detail/CVE-2016-10164 |
18,749 | libXpm | d1167418f0fd02a27f617ec5afd6db053afbe185 | https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 | https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 | None | 0 | CreatePixels(
char **dataptr,
unsigned int data_size,
unsigned int width,
unsigned int height,
unsigned int cpp,
unsigned int *pixels,
XpmColor *colors)
{
char *s;
unsigned int x, y, h, offset;
if(height <= 1)
return;
h = height - 1;
offset = width * c... | 7,640,310,667,273,543,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10164 | Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which trig... | https://nvd.nist.gov/vuln/detail/CVE-2016-10164 |
18,750 | libXpm | d1167418f0fd02a27f617ec5afd6db053afbe185 | https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 | https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 | None | 0 | XpmCreateDataFromImage(
Display *display,
char ***data_return,
XImage *image,
XImage *shapeimage,
XpmAttributes *attributes)
{
XpmImage xpmimage;
XpmInfo info;
int ErrorStatus;
/* initialize return value */
if (data_return)
*data_return = NULL;
/* create an Xpm... | 63,458,199,657,731,650,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-10164 | Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which trig... | https://nvd.nist.gov/vuln/detail/CVE-2016-10164 |
18,751 | virglrenderer | 747a293ff6055203e529f083896b823e22523fe7 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7 | vrend: fix a leak in context create internal
Create a context more than once causes memory leak issue.
Juest return if the context exists.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 0 | static int vrend_decode_create_ve(struct vrend_decode_ctx *ctx, uint32_t handle, uint16_t length)
{
struct pipe_vertex_element *ve = NULL;
int num_elements;
int i;
int ret;
if (length < 1)
return EINVAL;
if ((length - 1) % 4)
return EINVAL;
num_elements = (length - 1) / 4;
if (nu... | 305,016,948,834,834,430,000,000,000,000,000,000,000 | vrend_decode.c | 142,230,531,657,531,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10163 | Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context. | https://nvd.nist.gov/vuln/detail/CVE-2016-10163 |
18,752 | virglrenderer | 747a293ff6055203e529f083896b823e22523fe7 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7 | vrend: fix a leak in context create internal
Create a context more than once causes memory leak issue.
Juest return if the context exists.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 0 | static int vrend_decode_set_framebuffer_state(struct vrend_decode_ctx *ctx, int length)
{
if (length < 2)
return EINVAL;
uint32_t nr_cbufs = get_buf_entry(ctx, VIRGL_SET_FRAMEBUFFER_STATE_NR_CBUFS);
uint32_t zsurf_handle = get_buf_entry(ctx, VIRGL_SET_FRAMEBUFFER_STATE_NR_ZSURF_HANDLE);
uint32_t surf... | 52,346,146,532,812,080,000,000,000,000,000,000,000 | vrend_decode.c | 142,230,531,657,531,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10163 | Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context. | https://nvd.nist.gov/vuln/detail/CVE-2016-10163 |
18,853 | libav | ce7aee9b733134649a6ce2fa743e51733f33e67e | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e | dpcm: ignore extra unpaired bytes in stereo streams.
Fixes: CVE-2011-3951
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind | 0 | static av_cold int dpcm_decode_init(AVCodecContext *avctx)
{
DPCMContext *s = avctx->priv_data;
int i;
if (avctx->channels < 1 || avctx->channels > 2) {
av_log(avctx, AV_LOG_INFO, "invalid number of channels\n");
return AVERROR(EINVAL);
}
s->channels = avctx->channels;
s->sampl... | 30,486,710,245,222,960,000,000,000,000,000,000 | dpcm.c | 326,513,607,719,025,280,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3951 | The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media... | https://nvd.nist.gov/vuln/detail/CVE-2011-3951 |
18,854 | libav | 2d1c0dea5f6b91bec7f5fa53ec050913d851e366 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=2d1c0dea5f6b91bec7f5fa53ec050913d851e366 | dv: Fix small stack overread related to CVE-2011-3929 and CVE-2011-3936.
Found with asan.
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
Signed-off-by: Alex Converse <alex.converse@gmail.com> | 0 | static inline uint16_t dv_audio_12to16(uint16_t sample)
{
uint16_t shift, result;
sample = (sample < 0x800) ? sample : sample | 0xf000;
shift = (sample & 0xf00) >> 8;
if (shift < 0x2 || shift > 0xd) {
result = sample;
} else if (shift < 0x8) {
shift--;
result = (sample - (... | 214,742,415,878,011,270,000,000,000,000,000,000,000 | dv.c | 204,870,324,012,624,250,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3936 | The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3936 |
18,855 | libav | 635bcfccd439480003b74a665b5aa7c872c1ad6b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=635bcfccd439480003b74a665b5aa7c872c1ad6b | dv: check stype
dv: check stype
Fixes part1 of CVE-2011-3929
Possibly fixes part of CVE-2011-3936
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
Signed-off-by: Alex Converse <alex.converse@gmail.com> | 0 | static int dv_extract_audio(uint8_t* frame, uint8_t* ppcm[4],
const DVprofile *sys)
{
int size, chan, i, j, d, of, smpls, freq, quant, half_ch;
uint16_t lc, rc;
const uint8_t* as_pack;
uint8_t *pcm, ipcm;
as_pack = dv_extract_pack(frame, dv_audio_source);
if (!as_pac... | 334,921,596,958,319,800,000,000,000,000,000,000,000 | dv.c | 204,870,324,012,624,250,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3936 | The dv_extract_audio function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted DV file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3936 |
18,856 | libav | 5a396bb3a66a61a68b80f2369d0249729bf85e04 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04 | dv: Fix null pointer dereference due to ach=0
dv: Fix null pointer dereference due to ach=0
Fixes part2 of CVE-2011-3929
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
Signed-off-by: Alex Converse <alex... | 0 | DVDemuxContext* avpriv_dv_init_demux(AVFormatContext *s)
{
DVDemuxContext *c;
c = av_mallocz(sizeof(DVDemuxContext));
if (!c)
return NULL;
c->vst = avformat_new_stream(s, NULL);
if (!c->vst) {
av_free(c);
return NULL;
}
c->sys = NULL;
c->fctx = s;
memset(c... | 216,839,151,204,492,940,000,000,000,000,000,000,000 | dv.c | 204,870,324,012,624,250,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3929 | The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly exe... | https://nvd.nist.gov/vuln/detail/CVE-2011-3929 |
18,857 | libav | 5a396bb3a66a61a68b80f2369d0249729bf85e04 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04 | dv: Fix null pointer dereference due to ach=0
dv: Fix null pointer dereference due to ach=0
Fixes part2 of CVE-2011-3929
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
Signed-off-by: Alex Converse <alex... | 0 | static int dv_extract_audio_info(DVDemuxContext* c, uint8_t* frame)
{
const uint8_t* as_pack;
int freq, stype, smpls, quant, i, ach;
as_pack = dv_extract_pack(frame, dv_audio_source);
if (!as_pack || !c->sys) { /* No audio ? */
c->ach = 0;
return 0;
}
smpls = as_pack[1] & 0... | 61,212,474,104,764,950,000,000,000,000,000,000,000 | dv.c | 204,870,324,012,624,250,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3929 | The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly exe... | https://nvd.nist.gov/vuln/detail/CVE-2011-3929 |
18,858 | libav | 5a396bb3a66a61a68b80f2369d0249729bf85e04 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=5a396bb3a66a61a68b80f2369d0249729bf85e04 | dv: Fix null pointer dereference due to ach=0
dv: Fix null pointer dereference due to ach=0
Fixes part2 of CVE-2011-3929
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
Reviewed-by: Roman Shaposhnik <roman@shaposhnik.org>
Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
Signed-off-by: Alex Converse <alex... | 0 | static int dv_extract_video_info(DVDemuxContext *c, uint8_t* frame)
{
const uint8_t* vsc_pack;
AVCodecContext* avctx;
int apt, is16_9;
int size = 0;
if (c->sys) {
avctx = c->vst->codec;
avpriv_set_pts_info(c->vst, 64, c->sys->time_base.num,
c->sys->time_base... | 45,975,555,516,177,150,000,000,000,000,000,000,000 | dv.c | 204,870,324,012,624,250,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3929 | The avpriv_dv_produce_packet function in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly exe... | https://nvd.nist.gov/vuln/detail/CVE-2011-3929 |
18,859 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Do_ContextPos( GPOS_Instance* gpi,
HB_UShort GlyphCount,
HB_UShort PosCount,
HB_PosLookupRecord* pos,
HB_Buffer buffer,
int nesting_level )
{
HB_Error error;
HB_UInt i, old_pos;
i = 0;
while ( i < GlyphCount ... | 78,804,291,979,695,420,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,860 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ChainContextPos( HB_GPOS_SubTable* st )
{
HB_ChainContextPos* ccp = &st->chain;
switch ( ccp->PosFormat )
{
case 1: Free_ChainContextPos1( &ccp->ccpf.ccpf1 ); break;
case 2: Free_ChainContextPos2( &ccp->ccpf.ccpf2 ); break;
case 3: Free_ChainContextPos3( &ccp->ccpf.ccpf3 ); break;
d... | 196,566,157,347,685,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,861 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ChainContextPos1( HB_ChainContextPosFormat1* ccpf1 )
{
HB_UShort n, count;
HB_ChainPosRuleSet* cprs;
if ( ccpf1->ChainPosRuleSet )
{
count = ccpf1->ChainPosRuleSetCount;
cprs = ccpf1->ChainPosRuleSet;
for ( n = 0; n < count; n++ )
Free_ChainPosRuleSet( &cpr... | 249,697,178,775,522,050,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,862 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ChainContextPos3( HB_ChainContextPosFormat3* ccpf3 )
{
HB_UShort n, count;
HB_Coverage* c;
FREE( ccpf3->PosLookupRecord );
if ( ccpf3->LookaheadCoverage )
{
count = ccpf3->LookaheadGlyphCount;
c = ccpf3->LookaheadCoverage;
for ( n = 0; n < count; n++ )
_HB_O... | 288,728,073,642,580,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,863 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ChainPosClassRule( HB_ChainPosClassRule* cpcr )
{
FREE( cpcr->PosLookupRecord );
FREE( cpcr->Lookahead );
FREE( cpcr->Input );
FREE( cpcr->Backtrack );
}
| 290,598,471,355,290,870,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,864 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ChainPosRuleSet( HB_ChainPosRuleSet* cprs )
{
HB_UShort n, count;
HB_ChainPosRule* cpr;
if ( cprs->ChainPosRule )
{
count = cprs->ChainPosRuleCount;
cpr = cprs->ChainPosRule;
for ( n = 0; n < count; n++ )
Free_ChainPosRule( &cpr[n] );
FREE( cpr );
}
}
| 102,615,054,337,050,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,865 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ContextPos( HB_GPOS_SubTable* st )
{
HB_ContextPos* cp = &st->context;
switch ( cp->PosFormat )
{
case 1: Free_ContextPos1( &cp->cpf.cpf1 ); break;
case 2: Free_ContextPos2( &cp->cpf.cpf2 ); break;
case 3: Free_ContextPos3( &cp->cpf.cpf3 ); break;
default: break;
}
}
| 203,522,514,342,845,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,866 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ContextPos1( HB_ContextPosFormat1* cpf1 )
{
HB_UShort n, count;
HB_PosRuleSet* prs;
if ( cpf1->PosRuleSet )
{
count = cpf1->PosRuleSetCount;
prs = cpf1->PosRuleSet;
for ( n = 0; n < count; n++ )
Free_PosRuleSet( &prs[n] );
FREE( prs );
}
_HB_OPEN_Free... | 203,380,439,546,006,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,867 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ContextPos2( HB_ContextPosFormat2* cpf2 )
{
HB_UShort n, count;
HB_PosClassSet* pcs;
if ( cpf2->PosClassSet )
{
count = cpf2->PosClassSetCount;
pcs = cpf2->PosClassSet;
for ( n = 0; n < count; n++ )
Free_PosClassSet( &pcs[n] );
FREE( pcs );
}
_HB_OPE... | 39,973,493,634,551,256,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,868 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_CursivePos( HB_GPOS_SubTable* st )
{
HB_UShort n, count;
HB_CursivePos* cp = &st->cursive;
HB_EntryExitRecord* eer;
if ( cp->EntryExitRecord )
{
count = cp->EntryExitCount;
eer = cp->EntryExitRecord;
for ( n = 0; n < count; n++ )
{
Free_Anchor( &eer[... | 132,272,787,743,190,770,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,869 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_LigatureAttach( HB_LigatureAttach* lat,
HB_UShort num_classes )
{
HB_UShort m, n, count;
HB_ComponentRecord* cr;
HB_Anchor* lan;
if ( lat->ComponentRecord )
{
count = lat->ComponentCount;
cr = lat->ComponentRecord;
for ( m = 0; m < count... | 336,781,950,612,107,720,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,870 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_Mark2Array( HB_Mark2Array* m2a,
HB_UShort num_classes )
{
HB_Mark2Record *m2r;
HB_Anchor *m2ans;
HB_UNUSED(num_classes);
if ( m2a->Mark2Record )
{
m2r = m2a->Mark2Record;
if ( m2a->Mark2Count )
{
m2ans = m2r[0].Mark2Anchor;
FREE( m2ans );
... | 227,433,326,688,203,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,871 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_MarkArray( HB_MarkArray* ma )
{
HB_UShort n, count;
HB_MarkRecord* mr;
if ( ma->MarkRecord )
{
count = ma->MarkCount;
mr = ma->MarkRecord;
for ( n = 0; n < count; n++ )
Free_Anchor( &mr[n].MarkAnchor );
FREE( mr );
}
}
| 47,394,928,258,282,410,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,872 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_MarkBasePos( HB_GPOS_SubTable* st )
{
HB_MarkBasePos* mbp = &st->markbase;
Free_BaseArray( &mbp->BaseArray, mbp->ClassCount );
Free_MarkArray( &mbp->MarkArray );
_HB_OPEN_Free_Coverage( &mbp->BaseCoverage );
_HB_OPEN_Free_Coverage( &mbp->MarkCoverage );
}
| 225,360,450,942,059,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,873 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_MarkMarkPos( HB_GPOS_SubTable* st)
{
HB_MarkMarkPos* mmp = &st->markmark;
Free_Mark2Array( &mmp->Mark2Array, mmp->ClassCount );
Free_MarkArray( &mmp->Mark1Array );
_HB_OPEN_Free_Coverage( &mmp->Mark2Coverage );
_HB_OPEN_Free_Coverage( &mmp->Mark1Coverage );
}
| 179,059,377,645,848,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,874 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_PairPos( HB_GPOS_SubTable* st )
{
HB_UShort format1, format2;
HB_PairPos* pp = &st->pair;
format1 = pp->ValueFormat1;
format2 = pp->ValueFormat2;
switch ( pp->PosFormat )
{
case 1:
Free_PairPos1( &pp->ppf.ppf1, format1, format2 );
break;
case 2:
Free_PairPos2( &pp-... | 263,825,064,962,835,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,875 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_PairPos1( HB_PairPosFormat1* ppf1,
HB_UShort format1,
HB_UShort format2 )
{
HB_UShort n, count;
HB_PairSet* ps;
if ( ppf1->PairSet )
{
count = ppf1->PairSetCount;
ps = ppf1->PairSet;
for ( n = 0; n < count; n++ )
Free_PairSet( ... | 42,252,931,294,035,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,876 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_PairPos2( HB_PairPosFormat2* ppf2,
HB_UShort format1,
HB_UShort format2)
{
HB_UShort m, n, count1, count2;
HB_Class1Record* c1r;
HB_Class2Record* c2r;
if ( ppf2->Class1Record )
{
c1r = ppf2->Class1Record;
count1 = ppf2->Class1Coun... | 81,240,588,323,073,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,877 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_PairSet( HB_PairSet* ps,
HB_UShort format1,
HB_UShort format2 )
{
HB_UShort n, count;
HB_PairValueRecord* pvr;
if ( ps->PairValueRecord )
{
count = ps->PairValueCount;
pvr = ps->PairValueRecord;
for ( n = 0; n < count; n++ )
{
if ( ... | 263,478,149,439,660,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,878 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_PosClassSet( HB_PosClassSet* pcs )
{
HB_UShort n, count;
HB_PosClassRule* pcr;
if ( pcs->PosClassRule )
{
count = pcs->PosClassRuleCount;
pcr = pcs->PosClassRule;
for ( n = 0; n < count; n++ )
Free_PosClassRule( &pcr[n] );
FREE( pcr );
}
}
| 12,594,159,458,399,838,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,879 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_PosRule( HB_PosRule* pr )
{
FREE( pr->PosLookupRecord );
FREE( pr->Input );
}
| 241,141,520,859,471,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,880 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_SinglePos( HB_GPOS_SubTable* st )
{
HB_UShort n, count, format;
HB_SinglePos* sp = &st->single;
HB_ValueRecord* v;
format = sp->ValueFormat;
switch ( sp->PosFormat )
{
case 1:
Free_ValueRecord( &sp->spf.spf1.Value, format );
break;
case 2:
if ( sp->spf.spf2.... | 83,040,449,105,530,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,881 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static void Free_ValueRecord( HB_ValueRecord* vr,
HB_UShort format )
{
if ( format & HB_GPOS_FORMAT_HAVE_Y_ADVANCE_DEVICE )
_HB_OPEN_Free_Device( vr->DeviceTables[VR_Y_ADVANCE_DEVICE] );
if ( format & HB_GPOS_FORMAT_HAVE_X_ADVANCE_DEVICE )
_HB_OPEN_Free_Device( vr->DeviceTables[VR_X_ADVA... | 35,054,132,665,916,196,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,882 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error GPOS_Do_Glyph_Lookup( GPOS_Instance* gpi,
HB_UShort lookup_index,
HB_Buffer buffer,
HB_UShort context_length,
int nesting_level )
{
HB_Error error = HB_Err_Not_Covered;
HB_UShort i, flags, loo... | 99,389,851,916,933,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,883 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error GPOS_Do_String_Lookup( GPOS_Instance* gpi,
HB_UShort lookup_index,
HB_Buffer buffer )
{
HB_Error error, retError = HB_Err_Not_Covered;
HB_GPOSHeader* gpos = gpi->gpos;
HB_UInt* properties = gpos->LookupList.Properties;
const int nesting_level = ... | 208,359,165,330,021,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,884 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Get_ValueRecord( GPOS_Instance* gpi,
HB_ValueRecord* vr,
HB_UShort format,
HB_Position gd )
{
HB_Short pixel_value;
HB_Error error = HB_Err_Ok;
#ifdef HB_SUPPORT_MULTIPLE_MASTER
HB_GPOSHeader* gpos = gpi->gpos;
HB_Fixed value;
#endif... | 42,685,882,775,261,840,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,885 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_Done_GPOS_Table( HB_GPOSHeader* gpos )
{
_HB_OPEN_Free_LookupList( &gpos->LookupList, HB_Type_GPOS );
_HB_OPEN_Free_FeatureList( &gpos->FeatureList );
_HB_OPEN_Free_ScriptList( &gpos->ScriptList );
FREE( gpos );
return HB_Err_Ok;
}
| 117,733,949,896,746,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,886 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_GPOS_Add_Feature( HB_GPOSHeader* gpos,
HB_UShort feature_index,
HB_UInt property )
{
HB_UShort i;
HB_Feature feature;
HB_UInt* properties;
HB_UShort* index;
HB_UShort lookup_count;
/* Each feature can only be added once */
if ( !gpos ||
... | 327,603,718,734,461,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,887 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_GPOS_Apply_String( HB_Font font,
HB_GPOSHeader* gpos,
HB_UShort load_flags,
HB_Buffer buffer,
HB_Bool dvi,
HB_Bool r2l )
{
HB_Error error, retError = HB_Err_Not_Covered;
GPOS_Instance gpi;
int i, j, lookup_coun... | 168,907,622,495,326,560,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,888 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_GPOS_Query_Languages( HB_GPOSHeader* gpos,
HB_UShort script_index,
HB_UInt** language_tag_list )
{
HB_Error error;
HB_UShort n;
HB_UInt* ltl;
HB_ScriptList* sl;
HB_ScriptRecord* sr;
HB_ScriptTable* s;
HB_LangSysRecord* lsr;... | 320,284,416,808,882,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,889 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_GPOS_Query_Scripts( HB_GPOSHeader* gpos,
HB_UInt** script_tag_list )
{
HB_Error error;
HB_UShort n;
HB_UInt* stl;
HB_ScriptList* sl;
HB_ScriptRecord* sr;
if ( !gpos || !script_tag_list )
return ERR(HB_Err_Invalid_Argument);
sl = &gpos->Scrip... | 232,346,702,932,894,770,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,890 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_GPOS_Register_MM_Function( HB_GPOSHeader* gpos,
HB_MMFunction mmfunc,
void* data )
{
if ( !gpos )
return ERR(HB_Err_Invalid_Argument);
gpos->mmfunc = mmfunc;
gpos->data = data;
return HB_Err_Ok;
}
| 321,221,520,552,830,020,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,891 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_GPOS_Select_Feature( HB_GPOSHeader* gpos,
HB_UInt feature_tag,
HB_UShort script_index,
HB_UShort language_index,
HB_UShort* feature_index )
{
HB_UShort n;
HB_ScriptList* sl;
HB_ScriptRecord* sr;
HB_ScriptTable* s;
HB_La... | 247,993,875,820,906,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,892 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_GPOS_Select_Script( HB_GPOSHeader* gpos,
HB_UInt script_tag,
HB_UShort* script_index )
{
HB_UShort n;
HB_ScriptList* sl;
HB_ScriptRecord* sr;
if ( !gpos || !script_index )
return ERR(HB_Err_Invalid_Argument);
sl = &gpos->ScriptList;
sr = sl->ScriptR... | 102,703,167,632,436,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,893 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | HB_Error HB_Load_GPOS_Table( HB_Stream stream,
HB_GPOSHeader** retptr,
HB_GDEFHeader* gdef,
HB_Stream gdefStream )
{
HB_UInt cur_offset, new_offset, base_offset;
HB_GPOSHeader* gpos;
HB_Error error;
if ( !retptr )
return ERR(HB_Err_Invalid_Argument);
if ... | 40,168,826,508,339,003,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,894 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_Anchor( HB_Anchor* an,
HB_Stream stream )
{
HB_Error error;
HB_UInt cur_offset, new_offset, base_offset;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 2L ) )
return error;
an->PosFormat = GET_UShort();
FORGET_Frame();
switch ( an->PosFormat )
{
case 1:
... | 313,189,733,565,039,430,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,895 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_BaseArray( HB_BaseArray* ba,
HB_UShort num_classes,
HB_Stream stream )
{
HB_Error error;
HB_UShort m, n, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_BaseRecord *br;
HB_Anchor *ban, *bans;
base_offset = FILE_Pos();
if ( ACCES... | 267,278,214,023,993,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,896 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ChainContextPos( HB_GPOS_SubTable* st,
HB_Stream stream )
{
HB_Error error;
HB_ChainContextPos* ccp = &st->chain;
if ( ACCESS_Frame( 2L ) )
return error;
ccp->PosFormat = GET_UShort();
FORGET_Frame();
switch ( ccp->PosFormat )
{
case 1:
return ... | 203,938,010,782,665,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,897 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ChainContextPos1( HB_ChainContextPosFormat1* ccpf1,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_ChainPosRuleSet* cprs;
base_offset = FILE_Pos() - 2L;
if ( ACCESS_Fra... | 312,264,329,098,438,250,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,898 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ChainContextPos3( HB_ChainContextPosFormat3* ccpf3,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, nb, ni, nl, m, count;
HB_UShort backtrack_count, input_count, lookahead_count;
HB_UInt cur_offset, new_offset, base_offset;
... | 310,060,701,158,135,840,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,899 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ChainPosClassRule(
HB_ChainContextPosFormat2* ccpf2,
HB_ChainPosClassRule* cpcr,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, count;
HB_UShort* b;
HB_UShort* i;
HB_UShort* l;
HB_PosLookupRecor... | 226,717,380,205,846,880,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,900 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ChainPosClassSet(
HB_ChainContextPosFormat2* ccpf2,
HB_ChainPosClassSet* cpcs,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_ChainPosClassRule* cpcr;
... | 311,950,109,855,728,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,901 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ChainPosRule( HB_ChainPosRule* cpr,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, count;
HB_UShort* b;
HB_UShort* i;
HB_UShort* l;
HB_PosLookupRecord* plr;
if ( ACCESS_Frame( 2L ) )
return error;
cpr->Bac... | 247,635,255,661,926,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,902 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ChainPosRuleSet( HB_ChainPosRuleSet* cprs,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_ChainPosRule* cpr;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 2L ) )
return err... | 271,826,229,223,938,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,903 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ContextPos1( HB_ContextPosFormat1* cpf1,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_PosRuleSet* prs;
base_offset = FILE_Pos() - 2L;
if ( ACCESS_Frame( 2L ) )
return error;
... | 325,848,341,092,888,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,904 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ContextPos2( HB_ContextPosFormat2* cpf2,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_PosClassSet* pcs;
base_offset = FILE_Pos() - 2;
if ( ACCESS_Frame( 2L ) )
return error;... | 287,973,166,879,544,380,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,905 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ContextPos3( HB_ContextPosFormat3* cpf3,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_Coverage* c;
HB_PosLookupRecord* plr;
base_offset = FILE_Pos() - 2L;
if ( AC... | 42,091,527,905,537,430,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,906 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_CursivePos( HB_GPOS_SubTable* st,
HB_Stream stream )
{
HB_Error error;
HB_CursivePos* cp = &st->cursive;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_EntryExitRecord* eer;
base_offset = FILE_Pos();
if ( ACCESS_Fr... | 317,377,356,197,715,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,907 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_LigatureArray( HB_LigatureArray* la,
HB_UShort num_classes,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_LigatureAttach* lat;
base_offset = FILE_Pos();
if... | 152,070,558,451,790,420,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,908 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_LigatureAttach( HB_LigatureAttach* lat,
HB_UShort num_classes,
HB_Stream stream )
{
HB_Error error;
HB_UShort m, n, k, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_ComponentRecord* cr;
HB_Anchor* ... | 83,851,760,433,283,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,909 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_Mark2Array( HB_Mark2Array* m2a,
HB_UShort num_classes,
HB_Stream stream )
{
HB_Error error;
HB_UShort m, n, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_Mark2Record *m2r;
HB_Anchor *m2an, *m2ans;
base_offset = FILE_Pos();... | 193,371,125,516,969,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,910 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_MarkArray ( HB_MarkArray* ma,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_MarkRecord* mr;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 2L ) )
return error;
count = ma->MarkCount = ... | 320,030,286,323,029,650,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,911 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_MarkBasePos( HB_GPOS_SubTable* st,
HB_Stream stream )
{
HB_Error error;
HB_MarkBasePos* mbp = &st->markbase;
HB_UInt cur_offset, new_offset, base_offset;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 4L ) )
return error;
mbp->PosFormat = GET_UShort();
new_off... | 641,221,729,839,015,460,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,912 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_MarkMarkPos( HB_GPOS_SubTable* st,
HB_Stream stream )
{
HB_Error error;
HB_MarkMarkPos* mmp = &st->markmark;
HB_UInt cur_offset, new_offset, base_offset;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 4L ) )
return error;
mmp->PosFormat = GET_UShort();
new_off... | 48,483,135,527,955,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,913 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_PairPos( HB_GPOS_SubTable* st,
HB_Stream stream )
{
HB_Error error;
HB_PairPos* pp = &st->pair;
HB_UShort format1, format2;
HB_UInt cur_offset, new_offset, base_offset;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 8L ) )
return error;
pp->... | 33,695,547,098,242,145,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,914 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_PairPos1( HB_PairPosFormat1* ppf1,
HB_UShort format1,
HB_UShort format2,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_PairSet* ps;
base_offset = FILE_Pos() - 8L;
... | 167,761,222,881,186,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,915 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_PairPos2( HB_PairPosFormat2* ppf2,
HB_UShort format1,
HB_UShort format2,
HB_Stream stream )
{
HB_Error error;
HB_UShort m, n, k, count1, count2;
HB_UInt cur_offset, new_offset1, new_offset2, base_offset;
HB_Class1Record* ... | 151,638,714,283,702,870,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,916 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_PairSet ( HB_PairSet* ps,
HB_UShort format1,
HB_UShort format2,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt base_offset;
HB_PairValueRecord* pvr;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 2L ) )
ret... | 227,044,943,980,068,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,917 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_PosClassRule( HB_ContextPosFormat2* cpf2,
HB_PosClassRule* pcr,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, count;
HB_UShort* c;
HB_PosLookupRecord* plr;
if ( ACCESS_Frame( 4L ) )
return error;
pcr->GlyphCount... | 213,823,860,070,485,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,918 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_PosClassSet( HB_ContextPosFormat2* cpf2,
HB_PosClassSet* pcs,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_PosClassRule* pcr;
base_offset = FILE_Pos();
if ( ACCE... | 78,374,929,856,126,910,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,919 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_PosRuleSet( HB_PosRuleSet* prs,
HB_Stream stream )
{
HB_Error error;
HB_UShort n, m, count;
HB_UInt cur_offset, new_offset, base_offset;
HB_PosRule* pr;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 2L ) )
return error;
count = prs->PosRuleCount = GE... | 295,609,825,764,005,570,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,920 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_SinglePos( HB_GPOS_SubTable* st,
HB_Stream stream )
{
HB_Error error;
HB_SinglePos* sp = &st->single;
HB_UShort n, m, count, format;
HB_UInt cur_offset, new_offset, base_offset;
HB_ValueRecord* vr;
base_offset = FILE_Pos();
if ( ACCESS_Frame( 6L )... | 229,852,091,832,682,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,921 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Load_ValueRecord( HB_ValueRecord* vr,
HB_UShort format,
HB_UInt base_offset,
HB_Stream stream )
{
HB_Error error;
HB_UInt cur_offset, new_offset;
if ( format & HB_GPOS_FORMAT_HAVE_X_PLACEMENT )
{
if ( ACCESS_Frame( 2L ) )
return error... | 281,817,123,329,977,050,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,922 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Lookup_ChainContextPos(
GPOS_Instance* gpi,
HB_GPOS_SubTable* st,
HB_Buffer buffer,
HB_UShort flags,
HB_UShort context_length,
int nesting_level )
{
HB_ChainContextPos* ccp = &st->chain;
switch ( ccp->PosFor... | 310,661,155,411,065,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,923 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Lookup_ChainContextPos1(
GPOS_Instance* gpi,
HB_ChainContextPosFormat1* ccpf1,
HB_Buffer buffer,
HB_UShort flags,
HB_UShort context_length,
int nesting_level )
{
HB_UShort ... | 255,097,836,296,963,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,924 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Lookup_ChainContextPos2(
GPOS_Instance* gpi,
HB_ChainContextPosFormat2* ccpf2,
HB_Buffer buffer,
HB_UShort flags,
HB_UShort context_length,
int nesting_level )
{
HB_UShort ... | 240,593,709,834,353,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,925 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Lookup_ChainContextPos3(
GPOS_Instance* gpi,
HB_ChainContextPosFormat3* ccpf3,
HB_Buffer buffer,
HB_UShort flags,
HB_UShort context_length,
int nesting_level )
{
HB_UShort ... | 330,618,217,465,647,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
18,926 | harfbuzz | 81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | https://github.com/behdad/harfbuzz | https://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65 | None | 0 | static HB_Error Lookup_ContextPos( GPOS_Instance* gpi,
HB_GPOS_SubTable* st,
HB_Buffer buffer,
HB_UShort flags,
HB_UShort context_length,
int nesting_level )
{
HB_ContextPos* cp = &st->context;
switch ( cp->PosFormat )
{
case 1:... | 302,074,790,779,867,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3193 | Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2011-3193 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.