idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
19,366
mindrot
85bdcd7c92fe7ff133bbc4e10a65c91810f88755
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
None
0
sig2name(int sig) { #define SSH_SIG(x) if (sig == SIG ## x) return #x SSH_SIG(ABRT); SSH_SIG(ALRM); SSH_SIG(FPE); SSH_SIG(HUP); SSH_SIG(ILL); SSH_SIG(INT); SSH_SIG(KILL); SSH_SIG(PIPE); SSH_SIG(QUIT); SSH_SIG(SEGV); SSH_SIG(TERM); SSH_SIG(USR1); SSH_SIG(USR2); #undef SSH_SIG return "SIG@openssh.com"; }
140,009,631,153,402,560,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-8325
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PREL...
https://nvd.nist.gov/vuln/detail/CVE-2015-8325
19,367
mindrot
85bdcd7c92fe7ff133bbc4e10a65c91810f88755
https://anongit.mindrot.org/openssh
https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755
None
0
xauth_valid_string(const char *s) { size_t i; for (i = 0; s[i] != '\0'; i++) { if (!isalnum((u_char)s[i]) && s[i] != '.' && s[i] != ':' && s[i] != '/' && s[i] != '-' && s[i] != '_') return 0; } return 1; }
221,108,870,764,606,240,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2015-8325
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PREL...
https://nvd.nist.gov/vuln/detail/CVE-2015-8325
19,368
openssl
1632ef744872edc2aa2a53d487d3e79c965a4ad3
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3
Fix for CVE-2014-0195 A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Fixed by adding consistency check for DTLS fragments. Thanks to Jüri Aedla for reporting this i...
0
dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) { unsigned char wire[DTLS1_HM_HEADER_LENGTH]; unsigned long len, frag_off, frag_len; int i,al; struct hm_header_st msg_hdr; /* see if we have the required fragment already */ if ((frag_len = dtls1_retrieve_buffered_fragment(s,max,ok)) || *o...
285,865,319,549,111,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-0195
The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application cras...
https://nvd.nist.gov/vuln/detail/CVE-2014-0195
19,414
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
get_kinfo_proc (pid_t pid, struct kinfo_proc *p) { int mib[4]; size_t len; len = 4; sysctlnametomib ("kern.proc.pid", mib, &len); len = sizeof (struct kinfo_proc); mib[3] = pid; if (sysctl (mib, 4, p, &len, NULL, 0) == -1) return FALSE; return TRUE; }
121,360,420,245,365,050,000,000,000,000,000,000,000
polkitunixprocess.c
61,429,076,644,480,410,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,415
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
get_kinfo_proc (gint pid, #ifdef HAVE_NETBSD struct kinfo_proc2 *p) #else struct kinfo_proc *p) #endif { int name[6]; u_int namelen; size_t sz; sz = sizeof(*p); namelen = 0; name[namelen++] = CTL_KERN; #ifdef HAVE_NETBSD name[namelen++] = KERN_PROC2; #else name[namelen++...
61,029,357,233,713,690,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,416
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
get_start_time_for_pid (pid_t pid, GError **error) { guint64 start_time; #if !defined(HAVE_FREEBSD) && !defined(HAVE_NETBSD) && !defined(HAVE_OPENBSD) gchar *filename; gchar *contents; size_t length; gchar **tokens; guint num_tokens; gchar *p; gchar *endp; start_time = 0; ...
155,210,173,169,560,260,000,000,000,000,000,000,000
polkitunixprocess.c
61,429,076,644,480,410,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,417
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
_polkit_subject_get_cmdline (PolkitSubject *subject) { PolkitSubject *process; gchar *ret; gint pid; gchar *filename; gchar *contents; gsize contents_len; GError *error; guint n; g_return_val_if_fail (subject != NULL, NULL); error = NULL; ret = NULL; process = NULL; filename = NULL; conte...
2,196,597,163,978,975,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,418
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
action_pool_changed (PolkitBackendActionPool *action_pool, PolkitBackendInteractiveAuthority *authority) { g_signal_emit_by_name (authority, "changed"); }
250,996,170,974,812,200,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,419
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
check_authorization_challenge_cb (AuthenticationAgent *agent, PolkitSubject *subject, PolkitIdentity *user_of_subject, PolkitSubject *caller, ...
320,598,776,113,933,400,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,420
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
identity_is_root_user (PolkitIdentity *user) { if (!POLKIT_IS_UNIX_USER (user)) return FALSE; return polkit_unix_user_get_uid (POLKIT_UNIX_USER (user)) == 0; }
294,236,199,830,994,900,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,421
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
may_identity_check_authorization (PolkitBackendInteractiveAuthority *interactive_authority, const gchar *action_id, PolkitIdentity *identity) { PolkitBackendInteractiveAuthorityPrivate *priv = POLKIT_BAC...
206,856,950,132,436,970,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,422
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
on_name_owner_changed_signal (GDBusConnection *connection, const gchar *sender_name, const gchar *object_path, const gchar *interface_name, const gchar *signal_name, ...
50,409,328,337,441,540,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,423
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
on_session_monitor_changed (PolkitBackendSessionMonitor *monitor, gpointer user_data) { PolkitBackendInteractiveAuthority *authority = POLKIT_BACKEND_INTERACTIVE_AUTHORITY (user_data); g_signal_emit_by_name (authority, "changed"); }
88,658,758,972,759,400,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,424
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_interactive_authority_check_authorization_finish (PolkitBackendAuthority *authority, GAsyncResult *res, GError **error) { GSimpleAsyncResult *sim...
100,431,620,153,859,820,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,425
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_interactive_authority_class_init (PolkitBackendInteractiveAuthorityClass *klass) { GObjectClass *gobject_class; PolkitBackendAuthorityClass *authority_class; gobject_class = G_OBJECT_CLASS (klass); authority_class = POLKIT_BACKEND_AUTHORITY_CLASS (klass); gobject_class->finalize = polkit_back...
337,845,285,912,032,160,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,426
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_interactive_authority_enumerate_actions (PolkitBackendAuthority *authority, PolkitSubject *caller, const gchar *interactivee, GEr...
267,467,628,968,238,180,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,427
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_interactive_authority_finalize (GObject *object) { PolkitBackendInteractiveAuthority *interactive_authority; PolkitBackendInteractiveAuthorityPrivate *priv; interactive_authority = POLKIT_BACKEND_INTERACTIVE_AUTHORITY (object); priv = POLKIT_BACKEND_INTERACTIVE_AUTHORITY_GET_PRIVATE (interactive...
70,994,017,392,969,660,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,428
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_interactive_authority_get_features (PolkitBackendAuthority *authority) { return POLKIT_AUTHORITY_FEATURES_TEMPORARY_AUTHORIZATION; }
103,100,868,939,961,700,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,429
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_interactive_authority_get_name (PolkitBackendAuthority *authority) { return "interactive"; }
276,117,684,526,525,100,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,430
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_interactive_authority_get_version (PolkitBackendAuthority *authority) { return PACKAGE_VERSION; }
25,402,582,531,352,135,000,000,000,000,000,000,000
polkitbackendinteractiveauthority.c
112,576,977,661,747,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,431
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_session_monitor_class_init (PolkitBackendSessionMonitorClass *klass) { GObjectClass *gobject_class; gobject_class = G_OBJECT_CLASS (klass); gobject_class->finalize = polkit_backend_session_monitor_finalize; /** * PolkitBackendSessionMonitor::changed: * @monitor: A #PolkitBackendSessionMo...
179,138,617,749,703,200,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,432
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_session_monitor_finalize (GObject *object) { PolkitBackendSessionMonitor *monitor = POLKIT_BACKEND_SESSION_MONITOR (object); if (monitor->system_bus != NULL) g_object_unref (monitor->system_bus); if (monitor->sd_source != NULL) { g_source_destroy (monitor->sd_source); g_source...
239,048,525,358,490,820,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,433
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_session_monitor_get_sessions (PolkitBackendSessionMonitor *monitor) { /* TODO */ return NULL; }
84,667,435,373,883,510,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,434
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_session_monitor_init (PolkitBackendSessionMonitor *monitor) { GError *error; error = NULL; monitor->system_bus = g_bus_get_sync (G_BUS_TYPE_SYSTEM, NULL, &error); if (monitor->system_bus == NULL) { g_printerr ("Error getting system bus: %s", error->message); g_error_free (error);...
230,599,272,602,377,700,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,435
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_session_monitor_new (void) { PolkitBackendSessionMonitor *monitor; monitor = POLKIT_BACKEND_SESSION_MONITOR (g_object_new (POLKIT_BACKEND_TYPE_SESSION_MONITOR, NULL)); return monitor; }
338,119,076,508,086,740,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,436
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
sd_source_check (GSource *source) { SdSource *sd_source = (SdSource *)source; return sd_source->pollfd.revents != 0; }
141,162,452,226,504,030,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,437
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
sd_source_dispatch (GSource *source, GSourceFunc callback, gpointer user_data) { SdSource *sd_source = (SdSource *)source; gboolean ret; g_warn_if_fail (callback != NULL); ret = (*callback) (user_data); sd_login_monitor_flush (sd_source->monitor); return...
339,008,291,908,412,900,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,438
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
sd_source_finalize (GSource *source) { SdSource *sd_source = (SdSource*)source; sd_login_monitor_unref (sd_source->monitor); }
29,335,573,548,944,553,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,439
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
sd_source_new (void) { GSource *source; SdSource *sd_source; int ret; source = g_source_new (&sd_source_funcs, sizeof (SdSource)); sd_source = (SdSource *)source; if ((ret = sd_login_monitor_new (NULL, &sd_source->monitor)) < 0) { g_printerr ("Error getting login monitor: %d", ret); } else...
52,069,093,429,155,440,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,440
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
sd_source_prepare (GSource *source, gint *timeout) { *timeout = -1; return FALSE; }
19,123,411,678,333,613,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,441
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
sessions_changed (gpointer user_data) { PolkitBackendSessionMonitor *monitor = POLKIT_BACKEND_SESSION_MONITOR (user_data); g_signal_emit (monitor, signals[CHANGED_SIGNAL], 0); return TRUE; }
228,641,602,035,788,820,000,000,000,000,000,000,000
polkitbackendsessionmonitor-systemd.c
161,053,302,992,073,550,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,442
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
ensure_database (PolkitBackendSessionMonitor *monitor, GError **error) { gboolean ret = FALSE; if (monitor->database != NULL) { struct stat statbuf; if (stat (CKDB_PATH, &statbuf) != 0) { g_set_error (error, G_IO_ERROR...
287,814,719,004,167,000,000,000,000,000,000,000,000
polkitbackendsessionmonitor.c
42,878,895,946,621,430,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,443
polkit
bc7ffad53643a9c80231fc41f5582d6a8931c32c
https://gitlab.freedesktop.org/polkit/polkit
https://cgit.freedesktop.org/polkit/commit/?id=bc7ffad5364
Fix CVE-2018-1116: Trusting client-supplied UID As part of CVE-2013-4288, the D-Bus clients were allowed (and encouraged) to submit the UID of the subject of authorization checks to avoid races against UID changes (notably using executables set-UID to root). However, that also allowed any client to submit an arbitrar...
0
polkit_backend_session_monitor_finalize (GObject *object) { PolkitBackendSessionMonitor *monitor = POLKIT_BACKEND_SESSION_MONITOR (object); if (monitor->system_bus != NULL) g_object_unref (monitor->system_bus); if (monitor->database_monitor != NULL) g_object_unref (monitor->database_monitor); if (mon...
76,251,119,522,909,160,000,000,000,000,000,000,000
polkitbackendsessionmonitor.c
42,878,895,946,621,430,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1116
A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-1116
19,444
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
av_cold void ff_h263_decode_init_vlc(void) { static int done = 0; if (!done) { done = 1; INIT_VLC_STATIC(&ff_h263_intra_MCBPC_vlc, INTRA_MCBPC_VLC_BITS, 9, ff_h263_intra_MCBPC_bits, 1, 1, ff_h263_intra_MCBPC_code, 1, 1, 72); INIT_VLC_STATIC(&ff_h263_in...
60,524,019,342,796,730,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,445
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
int ff_h263_decode_mb(MpegEncContext *s, int16_t block[6][64]) { int cbpc, cbpy, i, cbp, pred_x, pred_y, mx, my, dquant; int16_t *mot_val; const int xy= s->mb_x + s->mb_y * s->mb_stride; int cbpb = 0, pb_mv_count = 0; assert(!s->h263_pred); if (s->pict_type == AV_PICTURE_...
296,876,431,262,667,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,446
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
int ff_h263_decode_mba(MpegEncContext *s) { int i, mb_pos; for (i = 0; i < 6; i++) if (s->mb_num - 1 <= ff_mba_max[i]) break; mb_pos = get_bits(&s->gb, ff_mba_length[i]); s->mb_x = mb_pos % s->mb_width; s->mb_y = mb_pos / s->mb_width; return mb_pos; }
269,463,247,944,964,500,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,447
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
int ff_h263_decode_motion(MpegEncContext * s, int pred, int f_code) { int code, val, sign, shift; code = get_vlc2(&s->gb, mv_vlc.table, MV_VLC_BITS, 2); if (code == 0) return pred; if (code < 0) return 0xffff; sign = get_bits1(&s->gb); shift = f_code - 1; val = code; if...
204,967,726,313,454,650,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,448
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
const uint8_t *ff_h263_find_resync_marker(const uint8_t *restrict p, const uint8_t * restrict end) { assert(p < end); end-=2; p++; for(;p<end; p+=2){ if(!*p){ if (!p[-1] && p[1]) return p - 1; else if(!p[ 1] && p[2]) return p; } } return end+2; }
20,408,225,887,730,670,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,449
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
int ff_h263_resync(MpegEncContext *s){ int left, pos, ret; if(s->codec_id==AV_CODEC_ID_MPEG4){ skip_bits1(&s->gb); align_get_bits(&s->gb); } if(show_bits(&s->gb, 16)==0){ pos= get_bits_count(&s->gb); if(CONFIG_MPEG4_DECODER && s->codec_id==AV_CODEC_ID_MPEG4) ...
73,759,726,249,996,410,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,450
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
void ff_h263_show_pict_info(MpegEncContext *s){ if(s->avctx->debug&FF_DEBUG_PICT_INFO){ av_log(s->avctx, AV_LOG_DEBUG, "qp:%d %c size:%d rnd:%d%s%s%s%s%s%s%s%s%s %d/%d\n", s->qscale, av_get_picture_type_char(s->pict_type), s->gb.size_in_bits, 1-s->no_rounding, s->obmc ? " AP" : "", ...
83,792,803,968,444,330,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,451
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
static int h263_decode_block(MpegEncContext * s, int16_t * block, int n, int coded) { int code, level, i, j, last, run; RLTable *rl = &ff_h263_rl_inter; const uint8_t *scan_table; GetBitContext gb= s->gb; scan_table = s->intra_scantable.permutated; if (s->h263_aic &...
337,394,123,740,360,450,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,452
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
static void h263_decode_dquant(MpegEncContext *s){ static const int8_t quant_tab[4] = { -1, -2, 1, 2 }; if(s->modified_quant){ if(get_bits1(&s->gb)) s->qscale= ff_modified_quant_tab[get_bits1(&s->gb)][ s->qscale ]; else s->qscale= get_bits(&s->gb, 5); }else s...
216,862,156,611,792,000,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,453
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
static int h263_decode_gob_header(MpegEncContext *s) { unsigned int val, gob_number; int left; /* Check for GOB Start Code */ val = show_bits(&s->gb, 16); if(val) return -1; /* We have a GBSC probably with GSTUFF */ skip_bits(&s->gb, 16); /* Drop the zeros */ left= get_bits...
318,440,888,087,940,570,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,454
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
static int h263_get_modb(GetBitContext *gb, int pb_frame, int *cbpb) { int c, mv = 1; if (pb_frame < 3) { // h.263 Annex G and i263 PB-frame c = get_bits1(gb); if (pb_frame == 2 && c) mv = !get_bits1(gb); } else { // h.263 Annex M improved PB-frame mv = get_unary(gb, 0, ...
282,488,219,401,902,230,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,455
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
static int h263_skip_b_part(MpegEncContext *s, int cbp) { LOCAL_ALIGNED_16(int16_t, dblock, [64]); int i, mbi; /* we have to set s->mb_intra to zero to decode B-part of PB-frame correctly * but real value should be restored in order to be used later (in OBMC condition) */ mbi = s->mb_intra; ...
179,389,315,138,308,480,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,456
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
static int h263p_decode_umotion(MpegEncContext * s, int pred) { int code = 0, sign; if (get_bits1(&s->gb)) /* Motion difference = 0 */ return pred; code = 2 + get_bits1(&s->gb); while (get_bits1(&s->gb)) { code <<= 1; code += get_bits1(&s->gb); } sign = code & 1; code >>= 1;...
228,645,049,815,557,950,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,457
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
0
static void preview_obmc(MpegEncContext *s){ GetBitContext gb= s->gb; int cbpc, i, pred_x, pred_y, mx, my; int16_t *mot_val; const int xy= s->mb_x + 1 + s->mb_y * s->mb_stride; const int stride= s->b8_stride*2; for(i=0; i<4; i++) s->block_index[i]+= 2; for(i=4; i<6; i++) s-...
181,270,293,843,031,320,000,000,000,000,000,000,000
ituh263dec.c
147,680,788,278,147,430,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
19,458
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
JBIG2Bitmap::JBIG2Bitmap(Guint segNumA, JBIG2Bitmap *bitmap): JBIG2Segment(segNumA) { if (unlikely(bitmap == NULL)) { error(errSyntaxError, -1, "NULL bitmap in JBIG2Bitmap"); w = h = line = 0; data = NULL; return; } w = bitmap->w; h = bitmap->h; line = bitmap->line; if (w <= 0 || h <= 0 ...
221,358,081,815,381,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,459
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
JBIG2PatternDict::JBIG2PatternDict(Guint segNumA, Guint sizeA): JBIG2Segment(segNumA) { bitmaps = (JBIG2Bitmap **)gmallocn_checkoverflow(sizeA, sizeof(JBIG2Bitmap *)); if (bitmaps) { size = sizeA; } else { size = 0; error(errSyntaxError, -1, "JBIG2PatternDict: can't allocate bitmaps"); } }
170,657,393,743,200,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,460
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
JBIG2SymbolDict::JBIG2SymbolDict(Guint segNumA, Guint sizeA): JBIG2Segment(segNumA) { Guint i; size = sizeA; bitmaps = (JBIG2Bitmap **)gmallocn_checkoverflow(size, sizeof(JBIG2Bitmap *)); if (!bitmaps) size = 0; for (i = 0; i < size; ++i) { bitmaps[i] = NULL; } genericRegionStats = NULL; refineme...
276,621,976,345,033,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,461
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Bitmap::combine(JBIG2Bitmap *bitmap, int x, int y, Guint combOp) { int x0, x1, y0, y1, xx, yy; Guchar *srcPtr, *destPtr; Guint src0, src1, src, dest, s1, s2, m1, m2, m3; GBool oneByte; if (y < -0x7fffffff) { return; } if (y < 0) { y0 = -y; } else { y0 = 0; } if (y + bitma...
205,884,442,687,045,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,462
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Bitmap::expand(int newH, Guint pixel) { if (newH <= h || line <= 0 || newH >= (INT_MAX - 1) / line) { error(errSyntaxError, -1, "invalid width/height"); gfree(data); data = NULL; return; } data = (Guchar *)grealloc(data, newH * line + 1); if (pixel) { memset(data + h * line, 0xff, ...
319,545,970,387,155,250,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,463
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
int JBIG2MMRDecoder::get2DCode() { const CCITTCode *p; if (bufLen == 0) { buf = str->getChar() & 0xff; bufLen = 8; ++nBytesRead; p = &twoDimTab1[(buf >> 1) & 0x7f]; } else if (bufLen == 8) { p = &twoDimTab1[(buf >> 1) & 0x7f]; } else { p = &twoDimTab1[(buf << (7 - bufLen)) & 0x7f]; ...
286,972,036,665,301,370,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,464
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
JBIG2Bitmap *getBitmap(Guint idx) { return (idx < size) ? bitmaps[idx] : NULL; }
187,457,771,935,281,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,465
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
int JBIG2MMRDecoder::getBlackCode() { const CCITTCode *p; Guint code; if (bufLen == 0) { buf = str->getChar() & 0xff; bufLen = 8; ++nBytesRead; } while (1) { if (bufLen >= 10 && ((buf >> (bufLen - 6)) & 0x3f) == 0) { if (bufLen <= 13) { code = buf << (13 - bufLen); } else { code...
330,398,779,503,346,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,466
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
int JBIG2Stream::getChars(int nChars, Guchar *buffer) { int n, i; if (nChars <= 0) { return 0; } if (dataEnd - dataPtr < nChars) { n = (int)(dataEnd - dataPtr); } else { n = nChars; } for (i = 0; i < n; ++i) { buffer[i] = *dataPtr++ ^ 0xff; } return n; }
84,407,751,708,032,430,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,467
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
int getLineSize() { return line; }
227,973,286,913,387,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,468
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
inline void JBIG2Bitmap::getPixelPtr(int x, int y, JBIG2BitmapPtr *ptr) { if (y < 0 || y >= h || x >= w) { ptr->p = NULL; ptr->shift = 0; // make gcc happy ptr->x = 0; // make gcc happy } else if (x < 0) { ptr->p = &data[y * line]; ptr->shift = 7; ptr->x = x; } else { ptr->p = &data[y ...
168,956,940,134,359,650,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,469
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
JBIG2Bitmap *JBIG2Bitmap::getSlice(Guint x, Guint y, Guint wA, Guint hA) { JBIG2Bitmap *slice; Guint xx, yy; slice = new JBIG2Bitmap(0, wA, hA); if (slice->isOk()) { slice->clearToZero(); for (yy = 0; yy < hA; ++yy) { for (xx = 0; xx < wA; ++xx) { if (getPixel(x + xx, y + yy)) { slice-...
8,028,926,527,990,253,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,470
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
GBool isOk() { return bitmaps != NULL; }
118,885,301,795,350,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,471
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
inline void JBIG2Stream::mmrAddPixels(int a1, int blackPixels, int *codingLine, int *a0i, int w) { if (a1 > codingLine[*a0i]) { if (a1 > w) { error(errSyntaxError, curStr->getPos(), "JBIG2 MMR row is wrong length ({0:d})", a1); a1 = w; } if ((*a0i & 1) ^ blackPixels) { ++*a0i; ...
230,947,332,839,479,620,000,000,000,000,000,000,000
JBIG2Stream.cc
192,778,333,266,759,250,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,472
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readCodeTableSeg(Guint segNum, Guint length) { JBIG2HuffmanTable *huffTab; Guint flags, oob, prefixBits, rangeBits; int lowVal, highVal, val; Guint huffTabSize, i; if (!readUByte(&flags) || !readLong(&lowVal) || !readLong(&highVal)) { goto eofError; } oob = flags & 1; prefixBits =...
129,045,296,290,362,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,473
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readExtensionSeg(Guint length) { Guint i; for (i = 0; i < length; ++i) { if (curStr->getChar() == EOF) { break; } } }
226,133,444,695,076,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,474
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
JBIG2Bitmap *JBIG2Stream::readGenericBitmap(GBool mmr, int w, int h, int templ, GBool tpgdOn, GBool useSkip, JBIG2Bitmap *skip, int *atx, int *aty, int mmrDataLength) { JBIG2Bitmap *bitmap; GBool ltp; Guint ltpCX, cx, cx0, cx1, cx2; int *refLine, *codingLine; int code1, cod...
248,304,442,925,453,550,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,475
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
JBIG2Bitmap *JBIG2Stream::readGenericRefinementRegion(int w, int h, int templ, GBool tpgrOn, JBIG2Bitmap *refBitmap, int refDX, int refDY, int *atx, int *aty) { JBIG2Bitmap *bitmap; GBool ltp; Guint ltpCX, cx, cx0, cx2, cx3, cx4, tpgrCX0, tpgrCX1, tpgrCX2; JBIG2Bi...
175,958,574,310,734,740,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,476
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readGenericRegionSeg(Guint segNum, GBool imm, GBool lossless, Guint length) { JBIG2Bitmap *bitmap; Guint w, h, x, y, segInfoFlags, extCombOp, rowCount; Guint flags, mmr, templ, tpgdOn; int atx[4], aty[4]; if (!readULong(&w) || !readULong(&h) || !readULong(&x) || !readULong(...
106,642,152,085,832,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,477
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readHalftoneRegionSeg(Guint segNum, GBool imm, GBool lossless, Guint length, Guint *refSegs, Guint nRefSegs) { JBIG2Bitmap *bitmap; JBIG2Segment *seg; JBIG2PatternDict *patternDict; JBIG2Bitmap *skipBitmap; Guint *grayImg; JBIG2Bitmap *grayBitmap; JBIG2Bitmap *patternBitmap; ...
318,865,801,084,319,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,478
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readPageInfoSeg(Guint length) { Guint xRes, yRes, flags, striping; if (!readULong(&pageW) || !readULong(&pageH) || !readULong(&xRes) || !readULong(&yRes) || !readUByte(&flags) || !readUWord(&striping)) { goto eofError; } pageDefPixel = (flags >> 2) & 1; defCombOp = (flags >>...
117,296,778,481,369,060,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,479
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readPatternDictSeg(Guint segNum, Guint length) { JBIG2PatternDict *patternDict; JBIG2Bitmap *bitmap; Guint flags, patternW, patternH, grayMax, templ, mmr; int atx[4], aty[4]; Guint i, x; if (!readUByte(&flags) || !readUByte(&patternW) || !readUByte(&patternH) || !readULo...
310,051,254,106,397,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,480
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readProfilesSeg(Guint length) { Guint i; for (i = 0; i < length; ++i) { if (curStr->getChar() == EOF) { break; } } }
28,858,800,105,612,465,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
19,481
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
AddGPUScreen(Bool (*pfnInit) (ScreenPtr /*pScreen */ , int /*argc */ , char ** /*argv */ ), int argc, char **argv) { int i; ScreenPtr pScreen; Bool ret; i = screenInfo.numGPUScreens; if (i ==...
340,053,102,804,681,100,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,482
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
AddScreen(Bool (*pfnInit) (ScreenPtr /*pScreen */ , int /*argc */ , char ** /*argv */ ), int argc, char **argv) { int i; ScreenPtr pScreen; Bool ret; i = screenInfo.numScreens; if (i == MAXSCREENS) return -1; pScreen...
53,566,310,002,123,850,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,483
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
AttachOutputGPU(ScreenPtr pScreen, ScreenPtr new) { assert(new->isGPU); xorg_list_add(&new->output_head, &pScreen->output_slave_list); new->current_master = pScreen; }
330,645,498,791,034,070,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,484
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
AttachUnboundGPU(ScreenPtr pScreen, ScreenPtr new) { assert(new->isGPU); assert(!new->current_master); xorg_list_add(&new->unattached_head, &pScreen->unattached_list); new->current_master = pScreen; }
268,746,456,186,544,370,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,485
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
CloseDownClient(ClientPtr client) { Bool really_close_down = client->clientGone || client->closeDownMode == DestroyAll; if (!client->clientGone) { /* ungrab server if grabbing client dies */ if (grabState != GrabNone && grabClient == client) { UngrabServer(client); }...
99,389,757,598,354,580,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,486
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
CloseDownRetainedResources(void) { int i; ClientPtr client; for (i = 1; i < currentMaxClients; i++) { client = clients[i]; if (client && (client->closeDownMode == RetainTemporary) && (client->clientGone)) CloseDownClient(client); } }
197,361,538,003,983,950,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,487
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
DetachOffloadGPU(ScreenPtr slave) { assert(slave->isGPU); xorg_list_del(&slave->offload_head); slave->current_master = NULL; }
29,130,759,511,017,125,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,488
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
DetachOutputGPU(ScreenPtr slave) { assert(slave->isGPU); xorg_list_del(&slave->output_head); slave->current_master = NULL; }
4,881,906,700,345,664,300,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,489
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
DetachUnboundGPU(ScreenPtr slave) { assert(slave->isGPU); xorg_list_del(&slave->unattached_head); slave->current_master = NULL; }
27,555,220,169,276,690,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,490
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
DisableLimitedSchedulingLatency(void) { --SmartScheduleLatencyLimited; /* protect against bugs */ if (SmartScheduleLatencyLimited < 0) SmartScheduleLatencyLimited = 0; }
72,517,457,392,935,280,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,491
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
DoGetImage(ClientPtr client, int format, Drawable drawable, int x, int y, int width, int height, Mask planemask) { DrawablePtr pDraw, pBoundingDraw; int nlines, linesPerBuf, rc; int linesDone; /* coordinates relative to the bounding drawable */ int relx, rely; long widthBy...
145,220,615,437,933,330,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,492
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
GetGeometry(ClientPtr client, xGetGeometryReply * rep) { DrawablePtr pDraw; int rc; REQUEST(xResourceReq); REQUEST_SIZE_MATCH(xResourceReq); rc = dixLookupDrawable(&pDraw, stuff->id, client, M_ANY, DixGetAttrAccess); if (rc != Success) return rc; rep->type = X_Reply; rep->leng...
108,441,033,190,531,290,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,493
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
InitClient(ClientPtr client, int i, void *ospriv) { client->index = i; client->clientAsMask = ((Mask) i) << CLIENTOFFSET; client->closeDownMode = i ? DestroyAll : RetainPermanent; client->requestVector = InitialVector; client->osPrivate = ospriv; QueryMinMaxKeyCodes(&client->minKC, &client->maxK...
314,747,810,437,142,000,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,494
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
KillAllClients(void) { int i; for (i = 1; i < currentMaxClients; i++) if (clients[i]) { /* Make sure Retained clients are released. */ clients[i]->closeDownMode = DestroyAll; CloseDownClient(clients[i]); } }
140,596,000,810,575,890,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,495
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
MarkClientException(ClientPtr client) { client->noClientException = -1; }
203,745,377,824,212,570,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,496
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
NextAvailableClient(void *ospriv) { int i; ClientPtr client; xReq data; i = nextFreeClientID; if (i == MAXCLIENTS) return (ClientPtr) NULL; clients[i] = client = dixAllocateObjectWithPrivates(ClientRec, PRIVATE_CLIENT); if (!client) return (ClientPtr) NULL; InitC...
200,445,380,211,058,660,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,497
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcAllocColor(ClientPtr client) { ColormapPtr pmap; int rc; REQUEST(xAllocColorReq); REQUEST_SIZE_MATCH(xAllocColorReq); rc = dixLookupResourceByType((void **) &pmap, stuff->cmap, RT_COLORMAP, client, DixAddAccess); if (rc == Success) { xAllocColorRepl...
146,337,046,530,880,340,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,498
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcAllocColorCells(ClientPtr client) { ColormapPtr pcmp; int rc; REQUEST(xAllocColorCellsReq); REQUEST_SIZE_MATCH(xAllocColorCellsReq); rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP, client, DixAddAccess); if (rc == Success) { ...
145,189,783,479,051,750,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,499
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcAllocColorPlanes(ClientPtr client) { ColormapPtr pcmp; int rc; REQUEST(xAllocColorPlanesReq); REQUEST_SIZE_MATCH(xAllocColorPlanesReq); rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP, client, DixAddAccess); if (rc == Success) { ...
296,930,230,282,111,170,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,500
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcAllocNamedColor(ClientPtr client) { ColormapPtr pcmp; int rc; REQUEST(xAllocNamedColorReq); REQUEST_FIXED_SIZE(xAllocNamedColorReq, stuff->nbytes); rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP, client, DixAddAccess); if (rc == Succ...
190,560,949,677,218,000,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,501
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcBadRequest(ClientPtr client) { return BadRequest; }
250,071,740,634,778,570,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,502
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcChangeGC(ClientPtr client) { GC *pGC; int result; unsigned len; REQUEST(xChangeGCReq); REQUEST_AT_LEAST_SIZE(xChangeGCReq); result = dixLookupGC(&pGC, stuff->gc, client, DixSetAttrAccess); if (result != Success) return result; len = client->req_len - bytes_to_int32(sizeof(...
153,764,044,103,043,530,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,503
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcChangeHosts(ClientPtr client) { REQUEST(xChangeHostsReq); REQUEST_FIXED_SIZE(xChangeHostsReq, stuff->hostLength); if (stuff->mode == HostInsert) return AddHost(client, (int) stuff->hostFamily, stuff->hostLength, (void *) &stuff[1]); if (stuff->mode == HostDelete) ...
98,145,894,587,938,060,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,504
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcChangeSaveSet(ClientPtr client) { WindowPtr pWin; REQUEST(xChangeSaveSetReq); int rc; REQUEST_SIZE_MATCH(xChangeSaveSetReq); rc = dixLookupWindow(&pWin, stuff->window, client, DixManageAccess); if (rc != Success) return rc; if (client->clientAsMask == (CLIENT_BITS(pWin->drawabl...
7,356,048,300,020,943,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,505
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcChangeWindowAttributes(ClientPtr client) { WindowPtr pWin; REQUEST(xChangeWindowAttributesReq); int len, rc; Mask access_mode = 0; REQUEST_AT_LEAST_SIZE(xChangeWindowAttributesReq); access_mode |= (stuff->valueMask & CWEventMask) ? DixReceiveAccess : 0; access_mode |= (stuff->valueMask...
294,146,593,372,976,200,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,506
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcCirculateWindow(ClientPtr client) { WindowPtr pWin; REQUEST(xCirculateWindowReq); int rc; REQUEST_SIZE_MATCH(xCirculateWindowReq); if ((stuff->direction != RaiseLowest) && (stuff->direction != LowerHighest)) { client->errorValue = stuff->direction; return BadValue; } rc...
77,989,959,206,567,280,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,507
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcClearToBackground(ClientPtr client) { REQUEST(xClearAreaReq); WindowPtr pWin; int rc; REQUEST_SIZE_MATCH(xClearAreaReq); rc = dixLookupWindow(&pWin, stuff->window, client, DixWriteAccess); if (rc != Success) return rc; if (pWin->drawable.class == InputOnly) { client->err...
263,794,470,786,958,160,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,508
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcCloseFont(ClientPtr client) { FontPtr pFont; int rc; REQUEST(xResourceReq); REQUEST_SIZE_MATCH(xResourceReq); rc = dixLookupResourceByType((void **) &pFont, stuff->id, RT_FONT, client, DixDestroyAccess); if (rc == Success) { FreeResource(stuff->id, ...
54,028,835,034,888,190,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,509
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcConfigureWindow(ClientPtr client) { WindowPtr pWin; REQUEST(xConfigureWindowReq); int len, rc; REQUEST_AT_LEAST_SIZE(xConfigureWindowReq); rc = dixLookupWindow(&pWin, stuff->window, client, DixManageAccess | DixSetAttrAccess); if (rc != Success) return rc; ...
92,697,968,659,455,580,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418
19,510
xserver
dc777c346d5d452a53b13b917c45f6a1bad2f20b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
dix: Allow zero-height PutImage requests The length checking code validates PutImage height and byte width by making sure that byte-width >= INT32_MAX / height. If height is zero, this generates a divide by zero exception. Allow zero height requests explicitly, bypassing the INT32_MAX check. Signed-off-by: Keith Pack...
0
ProcCopyArea(ClientPtr client) { DrawablePtr pDst; DrawablePtr pSrc; GC *pGC; REQUEST(xCopyAreaReq); RegionPtr pRgn; int rc; REQUEST_SIZE_MATCH(xCopyAreaReq); VALIDATE_DRAWABLE_AND_GC(stuff->dstDrawable, pDst, DixWriteAccess); if (stuff->dstDrawable != stuff->srcDrawable) { ...
13,898,015,486,773,213,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2015-3418
The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3418