idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
19,366 | mindrot | 85bdcd7c92fe7ff133bbc4e10a65c91810f88755 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755 | None | 0 | sig2name(int sig)
{
#define SSH_SIG(x) if (sig == SIG ## x) return #x
SSH_SIG(ABRT);
SSH_SIG(ALRM);
SSH_SIG(FPE);
SSH_SIG(HUP);
SSH_SIG(ILL);
SSH_SIG(INT);
SSH_SIG(KILL);
SSH_SIG(PIPE);
SSH_SIG(QUIT);
SSH_SIG(SEGV);
SSH_SIG(TERM);
SSH_SIG(USR1);
SSH_SIG(USR2);
#undef SSH_SIG
return "SIG@openssh.com";
}
| 140,009,631,153,402,560,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-8325 | The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PREL... | https://nvd.nist.gov/vuln/detail/CVE-2015-8325 |
19,367 | mindrot | 85bdcd7c92fe7ff133bbc4e10a65c91810f88755 | https://anongit.mindrot.org/openssh | https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755 | None | 0 | xauth_valid_string(const char *s)
{
size_t i;
for (i = 0; s[i] != '\0'; i++) {
if (!isalnum((u_char)s[i]) &&
s[i] != '.' && s[i] != ':' && s[i] != '/' &&
s[i] != '-' && s[i] != '_')
return 0;
}
return 1;
}
| 221,108,870,764,606,240,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-8325 | The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PREL... | https://nvd.nist.gov/vuln/detail/CVE-2015-8325 |
19,368 | openssl | 1632ef744872edc2aa2a53d487d3e79c965a4ad3 | https://github.com/openssl/openssl | https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3 | Fix for CVE-2014-0195
A buffer overrun attack can be triggered by sending invalid DTLS fragments
to an OpenSSL DTLS client or server. This is potentially exploitable to
run arbitrary code on a vulnerable client or server.
Fixed by adding consistency check for DTLS fragments.
Thanks to Jüri Aedla for reporting this i... | 0 | dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok)
{
unsigned char wire[DTLS1_HM_HEADER_LENGTH];
unsigned long len, frag_off, frag_len;
int i,al;
struct hm_header_st msg_hdr;
/* see if we have the required fragment already */
if ((frag_len = dtls1_retrieve_buffered_fragment(s,max,ok)) || *o... | 285,865,319,549,111,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-0195 | The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application cras... | https://nvd.nist.gov/vuln/detail/CVE-2014-0195 |
19,414 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | get_kinfo_proc (pid_t pid, struct kinfo_proc *p)
{
int mib[4];
size_t len;
len = 4;
sysctlnametomib ("kern.proc.pid", mib, &len);
len = sizeof (struct kinfo_proc);
mib[3] = pid;
if (sysctl (mib, 4, p, &len, NULL, 0) == -1)
return FALSE;
return TRUE;
}
| 121,360,420,245,365,050,000,000,000,000,000,000,000 | polkitunixprocess.c | 61,429,076,644,480,410,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,415 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | get_kinfo_proc (gint pid,
#ifdef HAVE_NETBSD
struct kinfo_proc2 *p)
#else
struct kinfo_proc *p)
#endif
{
int name[6];
u_int namelen;
size_t sz;
sz = sizeof(*p);
namelen = 0;
name[namelen++] = CTL_KERN;
#ifdef HAVE_NETBSD
name[namelen++] = KERN_PROC2;
#else
name[namelen++... | 61,029,357,233,713,690,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,416 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | get_start_time_for_pid (pid_t pid,
GError **error)
{
guint64 start_time;
#if !defined(HAVE_FREEBSD) && !defined(HAVE_NETBSD) && !defined(HAVE_OPENBSD)
gchar *filename;
gchar *contents;
size_t length;
gchar **tokens;
guint num_tokens;
gchar *p;
gchar *endp;
start_time = 0;
... | 155,210,173,169,560,260,000,000,000,000,000,000,000 | polkitunixprocess.c | 61,429,076,644,480,410,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,417 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | _polkit_subject_get_cmdline (PolkitSubject *subject)
{
PolkitSubject *process;
gchar *ret;
gint pid;
gchar *filename;
gchar *contents;
gsize contents_len;
GError *error;
guint n;
g_return_val_if_fail (subject != NULL, NULL);
error = NULL;
ret = NULL;
process = NULL;
filename = NULL;
conte... | 2,196,597,163,978,975,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,418 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | action_pool_changed (PolkitBackendActionPool *action_pool,
PolkitBackendInteractiveAuthority *authority)
{
g_signal_emit_by_name (authority, "changed");
}
| 250,996,170,974,812,200,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,419 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | check_authorization_challenge_cb (AuthenticationAgent *agent,
PolkitSubject *subject,
PolkitIdentity *user_of_subject,
PolkitSubject *caller,
... | 320,598,776,113,933,400,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,420 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | identity_is_root_user (PolkitIdentity *user)
{
if (!POLKIT_IS_UNIX_USER (user))
return FALSE;
return polkit_unix_user_get_uid (POLKIT_UNIX_USER (user)) == 0;
}
| 294,236,199,830,994,900,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,421 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | may_identity_check_authorization (PolkitBackendInteractiveAuthority *interactive_authority,
const gchar *action_id,
PolkitIdentity *identity)
{
PolkitBackendInteractiveAuthorityPrivate *priv = POLKIT_BAC... | 206,856,950,132,436,970,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,422 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | on_name_owner_changed_signal (GDBusConnection *connection,
const gchar *sender_name,
const gchar *object_path,
const gchar *interface_name,
const gchar *signal_name,
... | 50,409,328,337,441,540,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,423 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | on_session_monitor_changed (PolkitBackendSessionMonitor *monitor,
gpointer user_data)
{
PolkitBackendInteractiveAuthority *authority = POLKIT_BACKEND_INTERACTIVE_AUTHORITY (user_data);
g_signal_emit_by_name (authority, "changed");
}
| 88,658,758,972,759,400,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,424 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_interactive_authority_check_authorization_finish (PolkitBackendAuthority *authority,
GAsyncResult *res,
GError **error)
{
GSimpleAsyncResult *sim... | 100,431,620,153,859,820,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,425 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_interactive_authority_class_init (PolkitBackendInteractiveAuthorityClass *klass)
{
GObjectClass *gobject_class;
PolkitBackendAuthorityClass *authority_class;
gobject_class = G_OBJECT_CLASS (klass);
authority_class = POLKIT_BACKEND_AUTHORITY_CLASS (klass);
gobject_class->finalize = polkit_back... | 337,845,285,912,032,160,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,426 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_interactive_authority_enumerate_actions (PolkitBackendAuthority *authority,
PolkitSubject *caller,
const gchar *interactivee,
GEr... | 267,467,628,968,238,180,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,427 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_interactive_authority_finalize (GObject *object)
{
PolkitBackendInteractiveAuthority *interactive_authority;
PolkitBackendInteractiveAuthorityPrivate *priv;
interactive_authority = POLKIT_BACKEND_INTERACTIVE_AUTHORITY (object);
priv = POLKIT_BACKEND_INTERACTIVE_AUTHORITY_GET_PRIVATE (interactive... | 70,994,017,392,969,660,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,428 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_interactive_authority_get_features (PolkitBackendAuthority *authority)
{
return POLKIT_AUTHORITY_FEATURES_TEMPORARY_AUTHORIZATION;
}
| 103,100,868,939,961,700,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,429 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_interactive_authority_get_name (PolkitBackendAuthority *authority)
{
return "interactive";
}
| 276,117,684,526,525,100,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,430 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_interactive_authority_get_version (PolkitBackendAuthority *authority)
{
return PACKAGE_VERSION;
}
| 25,402,582,531,352,135,000,000,000,000,000,000,000 | polkitbackendinteractiveauthority.c | 112,576,977,661,747,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,431 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_session_monitor_class_init (PolkitBackendSessionMonitorClass *klass)
{
GObjectClass *gobject_class;
gobject_class = G_OBJECT_CLASS (klass);
gobject_class->finalize = polkit_backend_session_monitor_finalize;
/**
* PolkitBackendSessionMonitor::changed:
* @monitor: A #PolkitBackendSessionMo... | 179,138,617,749,703,200,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,432 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_session_monitor_finalize (GObject *object)
{
PolkitBackendSessionMonitor *monitor = POLKIT_BACKEND_SESSION_MONITOR (object);
if (monitor->system_bus != NULL)
g_object_unref (monitor->system_bus);
if (monitor->sd_source != NULL)
{
g_source_destroy (monitor->sd_source);
g_source... | 239,048,525,358,490,820,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,433 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_session_monitor_get_sessions (PolkitBackendSessionMonitor *monitor)
{
/* TODO */
return NULL;
}
| 84,667,435,373,883,510,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,434 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_session_monitor_init (PolkitBackendSessionMonitor *monitor)
{
GError *error;
error = NULL;
monitor->system_bus = g_bus_get_sync (G_BUS_TYPE_SYSTEM, NULL, &error);
if (monitor->system_bus == NULL)
{
g_printerr ("Error getting system bus: %s", error->message);
g_error_free (error);... | 230,599,272,602,377,700,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,435 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_session_monitor_new (void)
{
PolkitBackendSessionMonitor *monitor;
monitor = POLKIT_BACKEND_SESSION_MONITOR (g_object_new (POLKIT_BACKEND_TYPE_SESSION_MONITOR, NULL));
return monitor;
}
| 338,119,076,508,086,740,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,436 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | sd_source_check (GSource *source)
{
SdSource *sd_source = (SdSource *)source;
return sd_source->pollfd.revents != 0;
}
| 141,162,452,226,504,030,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,437 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | sd_source_dispatch (GSource *source,
GSourceFunc callback,
gpointer user_data)
{
SdSource *sd_source = (SdSource *)source;
gboolean ret;
g_warn_if_fail (callback != NULL);
ret = (*callback) (user_data);
sd_login_monitor_flush (sd_source->monitor);
return... | 339,008,291,908,412,900,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,438 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | sd_source_finalize (GSource *source)
{
SdSource *sd_source = (SdSource*)source;
sd_login_monitor_unref (sd_source->monitor);
}
| 29,335,573,548,944,553,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,439 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | sd_source_new (void)
{
GSource *source;
SdSource *sd_source;
int ret;
source = g_source_new (&sd_source_funcs, sizeof (SdSource));
sd_source = (SdSource *)source;
if ((ret = sd_login_monitor_new (NULL, &sd_source->monitor)) < 0)
{
g_printerr ("Error getting login monitor: %d", ret);
}
else... | 52,069,093,429,155,440,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,440 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | sd_source_prepare (GSource *source,
gint *timeout)
{
*timeout = -1;
return FALSE;
}
| 19,123,411,678,333,613,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,441 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | sessions_changed (gpointer user_data)
{
PolkitBackendSessionMonitor *monitor = POLKIT_BACKEND_SESSION_MONITOR (user_data);
g_signal_emit (monitor, signals[CHANGED_SIGNAL], 0);
return TRUE;
}
| 228,641,602,035,788,820,000,000,000,000,000,000,000 | polkitbackendsessionmonitor-systemd.c | 161,053,302,992,073,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,442 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | ensure_database (PolkitBackendSessionMonitor *monitor,
GError **error)
{
gboolean ret = FALSE;
if (monitor->database != NULL)
{
struct stat statbuf;
if (stat (CKDB_PATH, &statbuf) != 0)
{
g_set_error (error,
G_IO_ERROR... | 287,814,719,004,167,000,000,000,000,000,000,000,000 | polkitbackendsessionmonitor.c | 42,878,895,946,621,430,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,443 | polkit | bc7ffad53643a9c80231fc41f5582d6a8931c32c | https://gitlab.freedesktop.org/polkit/polkit | https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364 | Fix CVE-2018-1116: Trusting client-supplied UID
As part of CVE-2013-4288, the D-Bus clients were allowed (and
encouraged) to submit the UID of the subject of authorization checks
to avoid races against UID changes (notably using executables
set-UID to root).
However, that also allowed any client to submit an arbitrar... | 0 | polkit_backend_session_monitor_finalize (GObject *object)
{
PolkitBackendSessionMonitor *monitor = POLKIT_BACKEND_SESSION_MONITOR (object);
if (monitor->system_bus != NULL)
g_object_unref (monitor->system_bus);
if (monitor->database_monitor != NULL)
g_object_unref (monitor->database_monitor);
if (mon... | 76,251,119,522,909,160,000,000,000,000,000,000,000 | polkitbackendsessionmonitor.c | 42,878,895,946,621,430,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1116 | A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-1116 |
19,444 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | av_cold void ff_h263_decode_init_vlc(void)
{
static int done = 0;
if (!done) {
done = 1;
INIT_VLC_STATIC(&ff_h263_intra_MCBPC_vlc, INTRA_MCBPC_VLC_BITS, 9,
ff_h263_intra_MCBPC_bits, 1, 1,
ff_h263_intra_MCBPC_code, 1, 1, 72);
INIT_VLC_STATIC(&ff_h263_in... | 60,524,019,342,796,730,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,445 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | int ff_h263_decode_mb(MpegEncContext *s,
int16_t block[6][64])
{
int cbpc, cbpy, i, cbp, pred_x, pred_y, mx, my, dquant;
int16_t *mot_val;
const int xy= s->mb_x + s->mb_y * s->mb_stride;
int cbpb = 0, pb_mv_count = 0;
assert(!s->h263_pred);
if (s->pict_type == AV_PICTURE_... | 296,876,431,262,667,800,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,446 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | int ff_h263_decode_mba(MpegEncContext *s)
{
int i, mb_pos;
for (i = 0; i < 6; i++)
if (s->mb_num - 1 <= ff_mba_max[i])
break;
mb_pos = get_bits(&s->gb, ff_mba_length[i]);
s->mb_x = mb_pos % s->mb_width;
s->mb_y = mb_pos / s->mb_width;
return mb_pos;
}
| 269,463,247,944,964,500,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,447 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | int ff_h263_decode_motion(MpegEncContext * s, int pred, int f_code)
{
int code, val, sign, shift;
code = get_vlc2(&s->gb, mv_vlc.table, MV_VLC_BITS, 2);
if (code == 0)
return pred;
if (code < 0)
return 0xffff;
sign = get_bits1(&s->gb);
shift = f_code - 1;
val = code;
if... | 204,967,726,313,454,650,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,448 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | const uint8_t *ff_h263_find_resync_marker(const uint8_t *restrict p, const uint8_t * restrict end)
{
assert(p < end);
end-=2;
p++;
for(;p<end; p+=2){
if(!*p){
if (!p[-1] && p[1]) return p - 1;
else if(!p[ 1] && p[2]) return p;
}
}
return end+2;
}
| 20,408,225,887,730,670,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,449 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | int ff_h263_resync(MpegEncContext *s){
int left, pos, ret;
if(s->codec_id==AV_CODEC_ID_MPEG4){
skip_bits1(&s->gb);
align_get_bits(&s->gb);
}
if(show_bits(&s->gb, 16)==0){
pos= get_bits_count(&s->gb);
if(CONFIG_MPEG4_DECODER && s->codec_id==AV_CODEC_ID_MPEG4)
... | 73,759,726,249,996,410,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,450 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | void ff_h263_show_pict_info(MpegEncContext *s){
if(s->avctx->debug&FF_DEBUG_PICT_INFO){
av_log(s->avctx, AV_LOG_DEBUG, "qp:%d %c size:%d rnd:%d%s%s%s%s%s%s%s%s%s %d/%d\n",
s->qscale, av_get_picture_type_char(s->pict_type),
s->gb.size_in_bits, 1-s->no_rounding,
s->obmc ? " AP" : "",
... | 83,792,803,968,444,330,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,451 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | static int h263_decode_block(MpegEncContext * s, int16_t * block,
int n, int coded)
{
int code, level, i, j, last, run;
RLTable *rl = &ff_h263_rl_inter;
const uint8_t *scan_table;
GetBitContext gb= s->gb;
scan_table = s->intra_scantable.permutated;
if (s->h263_aic &... | 337,394,123,740,360,450,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,452 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | static void h263_decode_dquant(MpegEncContext *s){
static const int8_t quant_tab[4] = { -1, -2, 1, 2 };
if(s->modified_quant){
if(get_bits1(&s->gb))
s->qscale= ff_modified_quant_tab[get_bits1(&s->gb)][ s->qscale ];
else
s->qscale= get_bits(&s->gb, 5);
}else
s... | 216,862,156,611,792,000,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,453 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | static int h263_decode_gob_header(MpegEncContext *s)
{
unsigned int val, gob_number;
int left;
/* Check for GOB Start Code */
val = show_bits(&s->gb, 16);
if(val)
return -1;
/* We have a GBSC probably with GSTUFF */
skip_bits(&s->gb, 16); /* Drop the zeros */
left= get_bits... | 318,440,888,087,940,570,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,454 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | static int h263_get_modb(GetBitContext *gb, int pb_frame, int *cbpb)
{
int c, mv = 1;
if (pb_frame < 3) { // h.263 Annex G and i263 PB-frame
c = get_bits1(gb);
if (pb_frame == 2 && c)
mv = !get_bits1(gb);
} else { // h.263 Annex M improved PB-frame
mv = get_unary(gb, 0, ... | 282,488,219,401,902,230,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,455 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | static int h263_skip_b_part(MpegEncContext *s, int cbp)
{
LOCAL_ALIGNED_16(int16_t, dblock, [64]);
int i, mbi;
/* we have to set s->mb_intra to zero to decode B-part of PB-frame correctly
* but real value should be restored in order to be used later (in OBMC condition)
*/
mbi = s->mb_intra;
... | 179,389,315,138,308,480,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,456 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | static int h263p_decode_umotion(MpegEncContext * s, int pred)
{
int code = 0, sign;
if (get_bits1(&s->gb)) /* Motion difference = 0 */
return pred;
code = 2 + get_bits1(&s->gb);
while (get_bits1(&s->gb))
{
code <<= 1;
code += get_bits1(&s->gb);
}
sign = code & 1;
code >>= 1;... | 228,645,049,815,557,950,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,457 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | static void preview_obmc(MpegEncContext *s){
GetBitContext gb= s->gb;
int cbpc, i, pred_x, pred_y, mx, my;
int16_t *mot_val;
const int xy= s->mb_x + 1 + s->mb_y * s->mb_stride;
const int stride= s->b8_stride*2;
for(i=0; i<4; i++)
s->block_index[i]+= 2;
for(i=4; i<6; i++)
s-... | 181,270,293,843,031,320,000,000,000,000,000,000,000 | ituh263dec.c | 147,680,788,278,147,430,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
19,458 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | JBIG2Bitmap::JBIG2Bitmap(Guint segNumA, JBIG2Bitmap *bitmap):
JBIG2Segment(segNumA)
{
if (unlikely(bitmap == NULL)) {
error(errSyntaxError, -1, "NULL bitmap in JBIG2Bitmap");
w = h = line = 0;
data = NULL;
return;
}
w = bitmap->w;
h = bitmap->h;
line = bitmap->line;
if (w <= 0 || h <= 0 ... | 221,358,081,815,381,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,459 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | JBIG2PatternDict::JBIG2PatternDict(Guint segNumA, Guint sizeA):
JBIG2Segment(segNumA)
{
bitmaps = (JBIG2Bitmap **)gmallocn_checkoverflow(sizeA, sizeof(JBIG2Bitmap *));
if (bitmaps) {
size = sizeA;
} else {
size = 0;
error(errSyntaxError, -1, "JBIG2PatternDict: can't allocate bitmaps");
}
}
| 170,657,393,743,200,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,460 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | JBIG2SymbolDict::JBIG2SymbolDict(Guint segNumA, Guint sizeA):
JBIG2Segment(segNumA)
{
Guint i;
size = sizeA;
bitmaps = (JBIG2Bitmap **)gmallocn_checkoverflow(size, sizeof(JBIG2Bitmap *));
if (!bitmaps) size = 0;
for (i = 0; i < size; ++i) {
bitmaps[i] = NULL;
}
genericRegionStats = NULL;
refineme... | 276,621,976,345,033,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,461 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Bitmap::combine(JBIG2Bitmap *bitmap, int x, int y,
Guint combOp) {
int x0, x1, y0, y1, xx, yy;
Guchar *srcPtr, *destPtr;
Guint src0, src1, src, dest, s1, s2, m1, m2, m3;
GBool oneByte;
if (y < -0x7fffffff) {
return;
}
if (y < 0) {
y0 = -y;
} else {
y0 = 0;
}
if (y + bitma... | 205,884,442,687,045,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,462 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Bitmap::expand(int newH, Guint pixel) {
if (newH <= h || line <= 0 || newH >= (INT_MAX - 1) / line) {
error(errSyntaxError, -1, "invalid width/height");
gfree(data);
data = NULL;
return;
}
data = (Guchar *)grealloc(data, newH * line + 1);
if (pixel) {
memset(data + h * line, 0xff, ... | 319,545,970,387,155,250,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,463 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | int JBIG2MMRDecoder::get2DCode() {
const CCITTCode *p;
if (bufLen == 0) {
buf = str->getChar() & 0xff;
bufLen = 8;
++nBytesRead;
p = &twoDimTab1[(buf >> 1) & 0x7f];
} else if (bufLen == 8) {
p = &twoDimTab1[(buf >> 1) & 0x7f];
} else {
p = &twoDimTab1[(buf << (7 - bufLen)) & 0x7f];
... | 286,972,036,665,301,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,464 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | JBIG2Bitmap *getBitmap(Guint idx) { return (idx < size) ? bitmaps[idx] : NULL; }
| 187,457,771,935,281,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,465 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | int JBIG2MMRDecoder::getBlackCode() {
const CCITTCode *p;
Guint code;
if (bufLen == 0) {
buf = str->getChar() & 0xff;
bufLen = 8;
++nBytesRead;
}
while (1) {
if (bufLen >= 10 && ((buf >> (bufLen - 6)) & 0x3f) == 0) {
if (bufLen <= 13) {
code = buf << (13 - bufLen);
} else {
code... | 330,398,779,503,346,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,466 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | int JBIG2Stream::getChars(int nChars, Guchar *buffer) {
int n, i;
if (nChars <= 0) {
return 0;
}
if (dataEnd - dataPtr < nChars) {
n = (int)(dataEnd - dataPtr);
} else {
n = nChars;
}
for (i = 0; i < n; ++i) {
buffer[i] = *dataPtr++ ^ 0xff;
}
return n;
}
| 84,407,751,708,032,430,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,467 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | int getLineSize() { return line; }
| 227,973,286,913,387,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,468 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | inline void JBIG2Bitmap::getPixelPtr(int x, int y, JBIG2BitmapPtr *ptr) {
if (y < 0 || y >= h || x >= w) {
ptr->p = NULL;
ptr->shift = 0; // make gcc happy
ptr->x = 0; // make gcc happy
} else if (x < 0) {
ptr->p = &data[y * line];
ptr->shift = 7;
ptr->x = x;
} else {
ptr->p = &data[y ... | 168,956,940,134,359,650,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,469 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | JBIG2Bitmap *JBIG2Bitmap::getSlice(Guint x, Guint y, Guint wA, Guint hA) {
JBIG2Bitmap *slice;
Guint xx, yy;
slice = new JBIG2Bitmap(0, wA, hA);
if (slice->isOk()) {
slice->clearToZero();
for (yy = 0; yy < hA; ++yy) {
for (xx = 0; xx < wA; ++xx) {
if (getPixel(x + xx, y + yy)) {
slice-... | 8,028,926,527,990,253,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,470 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | GBool isOk() { return bitmaps != NULL; }
| 118,885,301,795,350,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,471 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | inline void JBIG2Stream::mmrAddPixels(int a1, int blackPixels,
int *codingLine, int *a0i, int w) {
if (a1 > codingLine[*a0i]) {
if (a1 > w) {
error(errSyntaxError, curStr->getPos(), "JBIG2 MMR row is wrong length ({0:d})", a1);
a1 = w;
}
if ((*a0i & 1) ^ blackPixels) {
++*a0i;
... | 230,947,332,839,479,620,000,000,000,000,000,000,000 | JBIG2Stream.cc | 192,778,333,266,759,250,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,472 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readCodeTableSeg(Guint segNum, Guint length) {
JBIG2HuffmanTable *huffTab;
Guint flags, oob, prefixBits, rangeBits;
int lowVal, highVal, val;
Guint huffTabSize, i;
if (!readUByte(&flags) || !readLong(&lowVal) || !readLong(&highVal)) {
goto eofError;
}
oob = flags & 1;
prefixBits =... | 129,045,296,290,362,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,473 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readExtensionSeg(Guint length) {
Guint i;
for (i = 0; i < length; ++i) {
if (curStr->getChar() == EOF) {
break;
}
}
}
| 226,133,444,695,076,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,474 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | JBIG2Bitmap *JBIG2Stream::readGenericBitmap(GBool mmr, int w, int h,
int templ, GBool tpgdOn,
GBool useSkip, JBIG2Bitmap *skip,
int *atx, int *aty,
int mmrDataLength) {
JBIG2Bitmap *bitmap;
GBool ltp;
Guint ltpCX, cx, cx0, cx1, cx2;
int *refLine, *codingLine;
int code1, cod... | 248,304,442,925,453,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,475 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | JBIG2Bitmap *JBIG2Stream::readGenericRefinementRegion(int w, int h,
int templ, GBool tpgrOn,
JBIG2Bitmap *refBitmap,
int refDX, int refDY,
int *atx, int *aty) {
JBIG2Bitmap *bitmap;
GBool ltp;
Guint ltpCX, cx, cx0, cx2, cx3, cx4, tpgrCX0, tpgrCX1, tpgrCX2;
JBIG2Bi... | 175,958,574,310,734,740,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,476 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readGenericRegionSeg(Guint segNum, GBool imm,
GBool lossless, Guint length) {
JBIG2Bitmap *bitmap;
Guint w, h, x, y, segInfoFlags, extCombOp, rowCount;
Guint flags, mmr, templ, tpgdOn;
int atx[4], aty[4];
if (!readULong(&w) || !readULong(&h) ||
!readULong(&x) || !readULong(... | 106,642,152,085,832,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,477 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readHalftoneRegionSeg(Guint segNum, GBool imm,
GBool lossless, Guint length,
Guint *refSegs, Guint nRefSegs) {
JBIG2Bitmap *bitmap;
JBIG2Segment *seg;
JBIG2PatternDict *patternDict;
JBIG2Bitmap *skipBitmap;
Guint *grayImg;
JBIG2Bitmap *grayBitmap;
JBIG2Bitmap *patternBitmap;
... | 318,865,801,084,319,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,478 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readPageInfoSeg(Guint length) {
Guint xRes, yRes, flags, striping;
if (!readULong(&pageW) || !readULong(&pageH) ||
!readULong(&xRes) || !readULong(&yRes) ||
!readUByte(&flags) || !readUWord(&striping)) {
goto eofError;
}
pageDefPixel = (flags >> 2) & 1;
defCombOp = (flags >>... | 117,296,778,481,369,060,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,479 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readPatternDictSeg(Guint segNum, Guint length) {
JBIG2PatternDict *patternDict;
JBIG2Bitmap *bitmap;
Guint flags, patternW, patternH, grayMax, templ, mmr;
int atx[4], aty[4];
Guint i, x;
if (!readUByte(&flags) ||
!readUByte(&patternW) ||
!readUByte(&patternH) ||
!readULo... | 310,051,254,106,397,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,480 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readProfilesSeg(Guint length) {
Guint i;
for (i = 0; i < length; ++i) {
if (curStr->getChar() == EOF) {
break;
}
}
}
| 28,858,800,105,612,465,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
19,481 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | AddGPUScreen(Bool (*pfnInit) (ScreenPtr /*pScreen */ ,
int /*argc */ ,
char ** /*argv */
),
int argc, char **argv)
{
int i;
ScreenPtr pScreen;
Bool ret;
i = screenInfo.numGPUScreens;
if (i ==... | 340,053,102,804,681,100,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,482 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | AddScreen(Bool (*pfnInit) (ScreenPtr /*pScreen */ ,
int /*argc */ ,
char ** /*argv */
), int argc, char **argv)
{
int i;
ScreenPtr pScreen;
Bool ret;
i = screenInfo.numScreens;
if (i == MAXSCREENS)
return -1;
pScreen... | 53,566,310,002,123,850,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,483 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | AttachOutputGPU(ScreenPtr pScreen, ScreenPtr new)
{
assert(new->isGPU);
xorg_list_add(&new->output_head, &pScreen->output_slave_list);
new->current_master = pScreen;
}
| 330,645,498,791,034,070,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,484 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | AttachUnboundGPU(ScreenPtr pScreen, ScreenPtr new)
{
assert(new->isGPU);
assert(!new->current_master);
xorg_list_add(&new->unattached_head, &pScreen->unattached_list);
new->current_master = pScreen;
}
| 268,746,456,186,544,370,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,485 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | CloseDownClient(ClientPtr client)
{
Bool really_close_down = client->clientGone ||
client->closeDownMode == DestroyAll;
if (!client->clientGone) {
/* ungrab server if grabbing client dies */
if (grabState != GrabNone && grabClient == client) {
UngrabServer(client);
}... | 99,389,757,598,354,580,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,486 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | CloseDownRetainedResources(void)
{
int i;
ClientPtr client;
for (i = 1; i < currentMaxClients; i++) {
client = clients[i];
if (client && (client->closeDownMode == RetainTemporary)
&& (client->clientGone))
CloseDownClient(client);
}
}
| 197,361,538,003,983,950,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,487 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | DetachOffloadGPU(ScreenPtr slave)
{
assert(slave->isGPU);
xorg_list_del(&slave->offload_head);
slave->current_master = NULL;
}
| 29,130,759,511,017,125,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,488 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | DetachOutputGPU(ScreenPtr slave)
{
assert(slave->isGPU);
xorg_list_del(&slave->output_head);
slave->current_master = NULL;
}
| 4,881,906,700,345,664,300,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,489 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | DetachUnboundGPU(ScreenPtr slave)
{
assert(slave->isGPU);
xorg_list_del(&slave->unattached_head);
slave->current_master = NULL;
}
| 27,555,220,169,276,690,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,490 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | DisableLimitedSchedulingLatency(void)
{
--SmartScheduleLatencyLimited;
/* protect against bugs */
if (SmartScheduleLatencyLimited < 0)
SmartScheduleLatencyLimited = 0;
}
| 72,517,457,392,935,280,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,491 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | DoGetImage(ClientPtr client, int format, Drawable drawable,
int x, int y, int width, int height,
Mask planemask)
{
DrawablePtr pDraw, pBoundingDraw;
int nlines, linesPerBuf, rc;
int linesDone;
/* coordinates relative to the bounding drawable */
int relx, rely;
long widthBy... | 145,220,615,437,933,330,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,492 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | GetGeometry(ClientPtr client, xGetGeometryReply * rep)
{
DrawablePtr pDraw;
int rc;
REQUEST(xResourceReq);
REQUEST_SIZE_MATCH(xResourceReq);
rc = dixLookupDrawable(&pDraw, stuff->id, client, M_ANY, DixGetAttrAccess);
if (rc != Success)
return rc;
rep->type = X_Reply;
rep->leng... | 108,441,033,190,531,290,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,493 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | InitClient(ClientPtr client, int i, void *ospriv)
{
client->index = i;
client->clientAsMask = ((Mask) i) << CLIENTOFFSET;
client->closeDownMode = i ? DestroyAll : RetainPermanent;
client->requestVector = InitialVector;
client->osPrivate = ospriv;
QueryMinMaxKeyCodes(&client->minKC, &client->maxK... | 314,747,810,437,142,000,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,494 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | KillAllClients(void)
{
int i;
for (i = 1; i < currentMaxClients; i++)
if (clients[i]) {
/* Make sure Retained clients are released. */
clients[i]->closeDownMode = DestroyAll;
CloseDownClient(clients[i]);
}
}
| 140,596,000,810,575,890,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,495 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | MarkClientException(ClientPtr client)
{
client->noClientException = -1;
}
| 203,745,377,824,212,570,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,496 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | NextAvailableClient(void *ospriv)
{
int i;
ClientPtr client;
xReq data;
i = nextFreeClientID;
if (i == MAXCLIENTS)
return (ClientPtr) NULL;
clients[i] = client =
dixAllocateObjectWithPrivates(ClientRec, PRIVATE_CLIENT);
if (!client)
return (ClientPtr) NULL;
InitC... | 200,445,380,211,058,660,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,497 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcAllocColor(ClientPtr client)
{
ColormapPtr pmap;
int rc;
REQUEST(xAllocColorReq);
REQUEST_SIZE_MATCH(xAllocColorReq);
rc = dixLookupResourceByType((void **) &pmap, stuff->cmap, RT_COLORMAP,
client, DixAddAccess);
if (rc == Success) {
xAllocColorRepl... | 146,337,046,530,880,340,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,498 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcAllocColorCells(ClientPtr client)
{
ColormapPtr pcmp;
int rc;
REQUEST(xAllocColorCellsReq);
REQUEST_SIZE_MATCH(xAllocColorCellsReq);
rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP,
client, DixAddAccess);
if (rc == Success) {
... | 145,189,783,479,051,750,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,499 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcAllocColorPlanes(ClientPtr client)
{
ColormapPtr pcmp;
int rc;
REQUEST(xAllocColorPlanesReq);
REQUEST_SIZE_MATCH(xAllocColorPlanesReq);
rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP,
client, DixAddAccess);
if (rc == Success) {
... | 296,930,230,282,111,170,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,500 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcAllocNamedColor(ClientPtr client)
{
ColormapPtr pcmp;
int rc;
REQUEST(xAllocNamedColorReq);
REQUEST_FIXED_SIZE(xAllocNamedColorReq, stuff->nbytes);
rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP,
client, DixAddAccess);
if (rc == Succ... | 190,560,949,677,218,000,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,501 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcBadRequest(ClientPtr client)
{
return BadRequest;
}
| 250,071,740,634,778,570,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,502 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcChangeGC(ClientPtr client)
{
GC *pGC;
int result;
unsigned len;
REQUEST(xChangeGCReq);
REQUEST_AT_LEAST_SIZE(xChangeGCReq);
result = dixLookupGC(&pGC, stuff->gc, client, DixSetAttrAccess);
if (result != Success)
return result;
len = client->req_len - bytes_to_int32(sizeof(... | 153,764,044,103,043,530,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,503 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcChangeHosts(ClientPtr client)
{
REQUEST(xChangeHostsReq);
REQUEST_FIXED_SIZE(xChangeHostsReq, stuff->hostLength);
if (stuff->mode == HostInsert)
return AddHost(client, (int) stuff->hostFamily,
stuff->hostLength, (void *) &stuff[1]);
if (stuff->mode == HostDelete)
... | 98,145,894,587,938,060,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,504 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcChangeSaveSet(ClientPtr client)
{
WindowPtr pWin;
REQUEST(xChangeSaveSetReq);
int rc;
REQUEST_SIZE_MATCH(xChangeSaveSetReq);
rc = dixLookupWindow(&pWin, stuff->window, client, DixManageAccess);
if (rc != Success)
return rc;
if (client->clientAsMask == (CLIENT_BITS(pWin->drawabl... | 7,356,048,300,020,943,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,505 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcChangeWindowAttributes(ClientPtr client)
{
WindowPtr pWin;
REQUEST(xChangeWindowAttributesReq);
int len, rc;
Mask access_mode = 0;
REQUEST_AT_LEAST_SIZE(xChangeWindowAttributesReq);
access_mode |= (stuff->valueMask & CWEventMask) ? DixReceiveAccess : 0;
access_mode |= (stuff->valueMask... | 294,146,593,372,976,200,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,506 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcCirculateWindow(ClientPtr client)
{
WindowPtr pWin;
REQUEST(xCirculateWindowReq);
int rc;
REQUEST_SIZE_MATCH(xCirculateWindowReq);
if ((stuff->direction != RaiseLowest) && (stuff->direction != LowerHighest)) {
client->errorValue = stuff->direction;
return BadValue;
}
rc... | 77,989,959,206,567,280,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,507 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcClearToBackground(ClientPtr client)
{
REQUEST(xClearAreaReq);
WindowPtr pWin;
int rc;
REQUEST_SIZE_MATCH(xClearAreaReq);
rc = dixLookupWindow(&pWin, stuff->window, client, DixWriteAccess);
if (rc != Success)
return rc;
if (pWin->drawable.class == InputOnly) {
client->err... | 263,794,470,786,958,160,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,508 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcCloseFont(ClientPtr client)
{
FontPtr pFont;
int rc;
REQUEST(xResourceReq);
REQUEST_SIZE_MATCH(xResourceReq);
rc = dixLookupResourceByType((void **) &pFont, stuff->id, RT_FONT,
client, DixDestroyAccess);
if (rc == Success) {
FreeResource(stuff->id, ... | 54,028,835,034,888,190,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,509 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcConfigureWindow(ClientPtr client)
{
WindowPtr pWin;
REQUEST(xConfigureWindowReq);
int len, rc;
REQUEST_AT_LEAST_SIZE(xConfigureWindowReq);
rc = dixLookupWindow(&pWin, stuff->window, client,
DixManageAccess | DixSetAttrAccess);
if (rc != Success)
return rc;
... | 92,697,968,659,455,580,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
19,510 | xserver | dc777c346d5d452a53b13b917c45f6a1bad2f20b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b | dix: Allow zero-height PutImage requests
The length checking code validates PutImage height and byte width by
making sure that byte-width >= INT32_MAX / height. If height is zero,
this generates a divide by zero exception. Allow zero height requests
explicitly, bypassing the INT32_MAX check.
Signed-off-by: Keith Pack... | 0 | ProcCopyArea(ClientPtr client)
{
DrawablePtr pDst;
DrawablePtr pSrc;
GC *pGC;
REQUEST(xCopyAreaReq);
RegionPtr pRgn;
int rc;
REQUEST_SIZE_MATCH(xCopyAreaReq);
VALIDATE_DRAWABLE_AND_GC(stuff->dstDrawable, pDst, DixWriteAccess);
if (stuff->dstDrawable != stuff->srcDrawable) {
... | 13,898,015,486,773,213,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2015-3418 | The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3418 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.