idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
20,656 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_malloc (void)
{
struct eXosip_t *ptr = (struct eXosip_t *) osip_malloc (sizeof (eXosip_t));
if (ptr)
memset (ptr, 0, sizeof (eXosip_t));
return ptr;
}
| 119,347,376,253,613,920,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,657 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_masquerade_contact (struct eXosip_t *excontext, const char *public_address, int port)
{
if (excontext->eXtl_transport.tl_masquerade_contact == NULL) {
OSIP_TRACE (osip_trace (__FILE__, __LINE__, OSIP_WARNING, NULL, "no transport protocol selected!\n"));
if (public_address == NULL || public_address[0] =... | 222,949,173,814,351,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,658 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_quit (struct eXosip_t *excontext)
{
jauthinfo_t *jauthinfo;
eXosip_call_t *jc;
eXosip_reg_t *jreg;
#ifndef MINISIZE
eXosip_notify_t *jn;
eXosip_subscribe_t *js;
eXosip_pub_t *jpub;
#endif
#ifndef OSIP_MONOTHREAD
int i;
#endif
if (excontext == NULL)
return;
if (excontext->j_stop_ua == -1)... | 257,139,699,523,287,400,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,659 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_reset_transports (struct eXosip_t *excontext)
{
int i = OSIP_WRONG_STATE;
if (excontext->eXtl_transport.tl_reset)
i = excontext->eXtl_transport.tl_reset (excontext);
return i;
}
| 258,185,143,670,083,730,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,660 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | eXosip_set_cbsip_message (struct eXosip_t *excontext, CbSipCallback cbsipCallback)
{
excontext->cbsipCallback = cbsipCallback;
return 0;
}
| 259,327,908,814,076,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,661 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | _tcp_tl_check_connected (struct eXosip_t *excontext)
{
struct eXtltcp *reserved = (struct eXtltcp *) excontext->eXtltcp_reserved;
int pos;
int res;
for (pos = 0; pos < EXOSIP_MAX_SOCKETS; pos++) {
if (reserved->socket_tab[pos].invalid > 0) {
OSIP_TRACE (osip_trace
(__FILE__, __LINE_... | 233,632,940,255,677,300,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,662 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | _tcp_tl_close_sockinfo (struct _tcp_stream *sockinfo)
{
closesocket (sockinfo->socket);
if (sockinfo->buf != NULL)
osip_free (sockinfo->buf);
if (sockinfo->sendbuf != NULL)
osip_free (sockinfo->sendbuf);
#ifdef MULTITASKING_ENABLED
if (sockinfo->readStream != NULL) {
CFReadStreamClose (sockinfo->rea... | 45,783,143,951,652,000,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,663 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | RSA_generate_key (int bits, unsigned long e_value, void (*callback) (int, int, void *), void *cb_arg)
{
BN_GENCB cb;
int i;
RSA *rsa = RSA_new ();
BIGNUM *e = BN_new ();
if (!rsa || !e)
goto err;
/* The problem is when building with 8, 16, or 32 BN_ULONG, ... | 55,063,379,573,537,340,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,664 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | _tls_add_certificates (SSL_CTX * ctx)
{
int count = 0;
#ifdef HAVE_WINCRYPT_H
PCCERT_CONTEXT pCertCtx;
X509 *cert = NULL;
HCERTSTORE hStore = CertOpenSystemStore (0, L"CA");
for (pCertCtx = CertEnumCertificatesInStore (hStore, NULL); pCertCtx != NULL; pCertCtx = CertEnumCertificatesInStore (hStore, pCertCtx... | 112,948,784,670,386,730,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,665 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | _tls_set_certificate (SSL_CTX * ctx, const char *cn)
{
#ifdef HAVE_WINCRYPT_H
PCCERT_CONTEXT pCertCtx;
X509 *cert = NULL;
HCERTSTORE hStore = CertOpenSystemStore (0, L"CA");
for (pCertCtx = CertEnumCertificatesInStore (hStore, NULL); pCertCtx != NULL; pCertCtx = CertEnumCertificatesInStore (hStore, pCertCtx)) ... | 72,620,908,281,379,055,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,666 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | _tls_tl_check_connected (struct eXosip_t *excontext)
{
struct eXtltls *reserved = (struct eXtltls *) excontext->eXtltls_reserved;
int pos;
int res;
for (pos = 0; pos < EXOSIP_MAX_SOCKETS; pos++) {
if (reserved->socket_tab[pos].invalid > 0) {
OSIP_TRACE (osip_trace
(__FILE__, __LINE_... | 331,165,779,659,033,750,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
20,667 | savannah | 2549e421c14aff886629b8482c14af800f411070 | https://git.savannah.gnu.org/gitweb/?p=gnutls | http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 | None | 0 | _tls_tl_close_sockinfo (struct _tls_stream *sockinfo)
{
if (sockinfo->socket > 0) {
if (sockinfo->ssl_conn != NULL) {
SSL_shutdown (sockinfo->ssl_conn);
SSL_shutdown (sockinfo->ssl_conn);
SSL_free (sockinfo->ssl_conn);
}
if (sockinfo->ssl_ctx != NULL)
SSL_CTX_free (sockinfo->ssl_ct... | 124,451,084,888,004,460,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-10375 | handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. | https://nvd.nist.gov/vuln/detail/CVE-2014-10375 |
21,035 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | static struct PointerBarrierDevice *AllocBarrierDevice(void)
{
struct PointerBarrierDevice *pbd = NULL;
pbd = malloc(sizeof(struct PointerBarrierDevice));
if (!pbd)
return NULL;
pbd->deviceid = -1; /* must be set by caller */
pbd->barrier_event_id = 1;
pbd->release_event_id = 0;
pb... | 52,391,885,590,960,410,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,036 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | BarrierFreeBarrier(void *data, XID id)
{
struct PointerBarrierClient *c;
Time ms = GetTimeInMillis();
DeviceIntPtr dev = NULL;
ScreenPtr screen;
c = container_of(data, struct PointerBarrierClient, barrier);
screen = c->screen;
for (dev = inputInfo.devices; dev; dev = dev->next) {
s... | 318,439,306,105,200,470,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,037 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | CreatePointerBarrierClient(ClientPtr client,
xXFixesCreatePointerBarrierReq * stuff,
PointerBarrierClientPtr *client_out)
{
WindowPtr pWin;
ScreenPtr screen;
BarrierScreenPtr cs;
int err;
int size;
int i;
struct PointerBarrierClient *ret;... | 248,955,629,470,600,420,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,038 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | static struct PointerBarrierDevice *GetBarrierDevice(struct PointerBarrierClient *c, int deviceid)
{
struct PointerBarrierDevice *pbd = NULL;
xorg_list_for_each_entry(pbd, &c->per_device, entry) {
if (pbd->deviceid == deviceid)
break;
}
BUG_WARN(!pbd);
return pbd;
}
| 270,765,627,569,473,600,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,039 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | void XIBarrierNewMasterDevice(ClientPtr client, int deviceid)
{
FindClientResourcesByType(client, PointerBarrierType, add_master_func, &deviceid);
}
| 148,191,264,223,078,470,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,040 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | void XIBarrierRemoveMasterDevice(ClientPtr client, int deviceid)
{
FindClientResourcesByType(client, PointerBarrierType, remove_master_func, &deviceid);
}
| 327,226,229,428,243,430,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,041 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | XICreatePointerBarrier(ClientPtr client,
xXFixesCreatePointerBarrierReq * stuff)
{
int err;
struct PointerBarrierClient *barrier;
struct PointerBarrier b;
b.x1 = stuff->x1;
b.x2 = stuff->x2;
b.y1 = stuff->y1;
b.y2 = stuff->y2;
if (!barrier_is_horizontal(&b) && !b... | 169,000,433,563,185,530,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,042 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | XIDestroyPointerBarrier(ClientPtr client,
xXFixesDestroyPointerBarrierReq * stuff)
{
int err;
void *barrier;
err = dixLookupResourceByType((void **) &barrier, stuff->barrier,
PointerBarrierType, client, DixDestroyAccess);
if (err != Success) {
... | 306,074,093,692,238,040,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,043 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_blocks_device(struct PointerBarrierClient *client,
DeviceIntPtr dev)
{
int i;
int master_id;
/* Clients with no devices are treated as
* if they specified XIAllDevices. */
if (client->num_devices == 0)
return TRUE;
master_id = GetMaster(dev, POINTER_OR_FL... | 214,753,430,064,181,530,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,044 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_clamp_to_barrier(struct PointerBarrier *barrier, int dir, int *x,
int *y)
{
if (barrier_is_vertical(barrier)) {
if ((dir & BarrierNegativeX) & ~barrier->directions)
*x = barrier->x1;
if ((dir & BarrierPositiveX) & ~barrier->directions)
*x = ba... | 132,183,661,240,289,530,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,045 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_find_nearest(BarrierScreenPtr cs, DeviceIntPtr dev,
int dir,
int x1, int y1, int x2, int y2)
{
struct PointerBarrierClient *c, *nearest = NULL;
double min_distance = INT_MAX; /* can't get higher than that in X anyway */
xorg_list_for_each_entry(c, &cs-... | 254,671,910,612,446,350,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,046 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_get_direction(int x1, int y1, int x2, int y2)
{
int direction = 0;
/* which way are we trying to go */
if (x2 > x1)
direction |= BarrierPositiveX;
if (x2 < x1)
direction |= BarrierNegativeX;
if (y2 > y1)
direction |= BarrierPositiveY;
if (y2 < y1)
directi... | 21,015,683,198,050,120,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,047 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_inside_hit_box(struct PointerBarrier *barrier, int x, int y)
{
int x1, x2, y1, y2;
int dir;
x1 = barrier->x1;
x2 = barrier->x2;
y1 = barrier->y1;
y2 = barrier->y2;
dir = ~(barrier->directions);
if (barrier_is_vertical(barrier)) {
if (dir & BarrierPositiveX)
... | 277,580,284,206,260,150,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,048 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_is_blocking(const struct PointerBarrier * barrier,
int x1, int y1, int x2, int y2, double *distance)
{
if (barrier_is_vertical(barrier)) {
float t, y;
t = T(barrier->x1, x1, x2);
if (t < 0 || t > 1)
return FALSE;
/* Edge case: moving away from... | 64,178,165,409,025,900,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,049 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_is_blocking_direction(const struct PointerBarrier * barrier,
int direction)
{
/* Barriers define which way is ok, not which way is blocking */
return (barrier->directions & direction) != direction;
}
| 52,592,440,788,363,380,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,050 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | barrier_is_horizontal(const struct PointerBarrier *barrier)
{
return barrier->y1 == barrier->y2;
}
| 195,753,363,187,408,300,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,051 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | input_constrain_cursor(DeviceIntPtr dev, ScreenPtr screen,
int current_x, int current_y,
int dest_x, int dest_y,
int *out_x, int *out_y,
int *nevents, InternalEvent* events)
{
/* Clamped coordinates here refer to screen edge... | 197,191,068,636,829,400,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,052 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | inside_segment(int v, int v1, int v2)
{
if (v1 < 0 && v2 < 0) /* line */
return TRUE;
else if (v1 < 0) /* ray */
return v <= v2;
else if (v2 < 0) /* ray */
return v >= v1;
else /* line segment */
return v >= v1 && v <= v2;
}
| 208,330,519,196,524,300,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,053 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | static void remove_master_func(void *res, XID id, void *devid)
{
struct PointerBarrierDevice *pbd;
struct PointerBarrierClient *barrier;
struct PointerBarrier *b;
DeviceIntPtr dev;
int *deviceid = devid;
int rc;
Time ms = GetTimeInMillis();
rc = dixLookupDevice(&dev, *deviceid, serverCl... | 186,576,114,996,689,040,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,054 | xserver | d088e3c1286b548a58e62afdc70bb40981cdb9e8 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8 | Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer
[jcristau: originally this patch fixed the same issue as commit
211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the
addition of these checks]
This addresses CVE-2017-12179
Reviewed-by: Alan Coopersmith <alan.coopersmith... | 0 | sort_min_max(INT16 *a, INT16 *b)
{
INT16 A, B;
if (*a < 0 || *b < 0)
return;
A = *a;
B = *b;
*a = min(A, B);
*b = max(A, B);
}
| 319,687,121,507,072,370,000,000,000,000,000,000,000 | xibarriers.c | 227,650,435,667,700,770,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12179 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12179 |
21,055 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 0 | SProcXIChangeHierarchy(ClientPtr client)
{
REQUEST(xXIChangeHierarchyReq);
swaps(&stuff->length);
return (ProcXIChangeHierarchy(client));
}
| 151,588,207,778,704,030,000,000,000,000,000,000,000 | xichangehierarchy.c | 151,192,785,260,135,340,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
21,056 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 0 | XISendDeviceHierarchyEvent(int flags[MAXDEVICES])
{
xXIHierarchyEvent *ev;
xXIHierarchyInfo *info;
DeviceIntRec dummyDev;
DeviceIntPtr dev;
int i;
if (!flags)
return;
ev = calloc(1, sizeof(xXIHierarchyEvent) +
MAXDEVICES * sizeof(xXIHierarchyInfo));
if (!ev)
... | 128,527,047,175,427,930,000,000,000,000,000,000,000 | xichangehierarchy.c | 151,192,785,260,135,340,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
21,057 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 0 | add_master(ClientPtr client, xXIAddMasterInfo * c, int flags[MAXDEVICES])
{
DeviceIntPtr ptr, keybd, XTestptr, XTestkeybd;
char *name;
int rc;
name = calloc(c->name_len + 1, sizeof(char));
if (name == NULL) {
rc = BadAlloc;
goto unwind;
}
strncpy(name, (char *) &c[1], c->nam... | 330,517,371,243,454,800,000,000,000,000,000,000,000 | xichangehierarchy.c | 151,192,785,260,135,340,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
21,058 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 0 | attach_slave(ClientPtr client, xXIAttachSlaveInfo * c, int flags[MAXDEVICES])
{
DeviceIntPtr dev;
DeviceIntPtr newmaster;
int rc;
rc = dixLookupDevice(&dev, c->deviceid, client, DixManageAccess);
if (rc != Success)
goto unwind;
if (IsMaster(dev)) {
client->errorValue = c->devic... | 4,881,263,826,589,777,000,000,000,000,000,000,000 | xichangehierarchy.c | 151,192,785,260,135,340,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
21,059 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 0 | detach_slave(ClientPtr client, xXIDetachSlaveInfo * c, int flags[MAXDEVICES])
{
DeviceIntPtr dev;
int rc;
rc = dixLookupDevice(&dev, c->deviceid, client, DixManageAccess);
if (rc != Success)
goto unwind;
if (IsMaster(dev)) {
client->errorValue = c->deviceid;
rc = BadDevice;... | 71,567,213,285,784,320,000,000,000,000,000,000,000 | xichangehierarchy.c | 151,192,785,260,135,340,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
21,060 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 0 | disable_clientpointer(DeviceIntPtr dev)
{
int i;
for (i = 0; i < currentMaxClients; i++) {
ClientPtr client = clients[i];
if (client && client->clientPtr == dev)
client->clientPtr = NULL;
}
}
| 235,010,871,100,365,400,000,000,000,000,000,000,000 | xichangehierarchy.c | 151,192,785,260,135,340,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
21,061 | xserver | 859b08d523307eebde7724fd1a0789c44813e821 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821 | Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cris... | 0 | remove_master(ClientPtr client, xXIRemoveMasterInfo * r, int flags[MAXDEVICES])
{
DeviceIntPtr ptr, keybd, XTestptr, XTestkeybd;
int rc = Success;
if (r->return_mode != XIAttachToMaster && r->return_mode != XIFloating)
return BadValue;
rc = dixLookupDevice(&ptr, r->deviceid, client, DixDestroy... | 201,063,796,683,789,950,000,000,000,000,000,000,000 | xichangehierarchy.c | 151,192,785,260,135,340,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12178 | xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12178 |
21,062 | xserver | 4ca68b878e851e2136c234f40a25008297d8d831 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831 | dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
v2: Protect against integer overflow (Alan Coopersmith)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off... | 0 | DbeStubScreen(DbeScreenPrivPtr pDbeScreenPriv, int *nStubbedScreens)
{
/* Stub DIX. */
pDbeScreenPriv->SetupBackgroundPainter = NULL;
/* Do not unwrap PositionWindow nor DestroyWindow. If the DDX
* initialization function failed, we assume that it did not wrap
* PositionWindow. Also, DestroyWin... | 200,980,536,693,733,900,000,000,000,000,000,000,000 | dbe.c | 293,406,963,263,941,080,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12177 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12177 |
21,063 | xserver | 4ca68b878e851e2136c234f40a25008297d8d831 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831 | dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
v2: Protect against integer overflow (Alan Coopersmith)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off... | 0 | ProcDbeAllocateBackBufferName(ClientPtr client)
{
REQUEST(xDbeAllocateBackBufferNameReq);
WindowPtr pWin;
DbeScreenPrivPtr pDbeScreenPriv;
DbeWindowPrivPtr pDbeWindowPriv;
XdbeScreenVisualInfo scrVisInfo;
register int i;
Bool visualMatched = FALSE;
xDbeSwapAction swapAction;
VisualID... | 130,250,592,307,160,170,000,000,000,000,000,000,000 | dbe.c | 293,406,963,263,941,080,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12177 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12177 |
21,064 | xserver | 4ca68b878e851e2136c234f40a25008297d8d831 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831 | dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
v2: Protect against integer overflow (Alan Coopersmith)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off... | 0 | ProcDbeDeallocateBackBufferName(ClientPtr client)
{
REQUEST(xDbeDeallocateBackBufferNameReq);
DbeWindowPrivPtr pDbeWindowPriv;
int rc, i;
void *val;
REQUEST_SIZE_MATCH(xDbeDeallocateBackBufferNameReq);
/* Buffer name must be valid */
rc = dixLookupResourceByType((void **) &pDbeWindowPriv, ... | 259,622,595,836,792,240,000,000,000,000,000,000,000 | dbe.c | 293,406,963,263,941,080,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12177 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12177 |
21,065 | xserver | 4ca68b878e851e2136c234f40a25008297d8d831 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831 | dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
v2: Protect against integer overflow (Alan Coopersmith)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off... | 0 | ProcDbeGetVersion(ClientPtr client)
{
/* REQUEST(xDbeGetVersionReq); */
xDbeGetVersionReply rep = {
.type = X_Reply,
.sequenceNumber = client->sequence,
.length = 0,
.majorVersion = DBE_MAJOR_VERSION,
.minorVersion = DBE_MINOR_VERSION
};
REQUEST_SIZE_MATCH(xDbeGe... | 93,471,372,799,731,820,000,000,000,000,000,000,000 | dbe.c | 293,406,963,263,941,080,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12177 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12177 |
21,066 | xserver | 4ca68b878e851e2136c234f40a25008297d8d831 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831 | dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177)
v2: Protect against integer overflow (Alan Coopersmith)
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off... | 0 | ProcDbeSwapBuffers(ClientPtr client)
{
REQUEST(xDbeSwapBuffersReq);
WindowPtr pWin;
DbeScreenPrivPtr pDbeScreenPriv;
DbeSwapInfoPtr swapInfo;
xDbeSwapInfo *dbeSwapInfo;
int error;
unsigned int i, j;
unsigned int nStuff;
int nStuff_i; /* DDX API requires int for nStuff */
R... | 197,625,319,734,588,600,000,000,000,000,000,000,000 | dbe.c | 293,406,963,263,941,080,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-12177 | xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12177 |
21,067 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | AddGPUScreen(Bool (*pfnInit) (ScreenPtr /*pScreen */ ,
int /*argc */ ,
char ** /*argv */
),
int argc, char **argv)
{
int i;
ScreenPtr pScreen;
Bool ret;
i = screenInfo.numGPUScreens;
if (i ==... | 25,294,382,655,014,096,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,068 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | AttachOffloadGPU(ScreenPtr pScreen, ScreenPtr new)
{
assert(new->isGPU);
assert(!new->is_offload_slave);
assert(new->current_master == pScreen);
new->is_offload_slave = TRUE;
}
| 221,839,721,472,826,180,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,069 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | AttachOutputGPU(ScreenPtr pScreen, ScreenPtr new)
{
assert(new->isGPU);
assert(!new->is_output_slave);
assert(new->current_master == pScreen);
new->is_output_slave = TRUE;
new->current_master->output_slaves++;
}
| 243,600,936,019,244,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,070 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | AttachUnboundGPU(ScreenPtr pScreen, ScreenPtr new)
{
assert(new->isGPU);
assert(!new->current_master);
xorg_list_add(&new->slave_head, &pScreen->slave_list);
new->current_master = pScreen;
}
| 2,900,029,019,971,603,500,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,071 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | DetachOffloadGPU(ScreenPtr slave)
{
assert(slave->isGPU);
assert(slave->is_offload_slave);
slave->is_offload_slave = FALSE;
}
| 75,422,183,075,461,910,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,072 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | DetachOutputGPU(ScreenPtr slave)
{
assert(slave->isGPU);
assert(slave->is_output_slave);
slave->current_master->output_slaves--;
slave->is_output_slave = FALSE;
}
| 227,252,403,474,410,970,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,073 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | DoGetImage(ClientPtr client, int format, Drawable drawable,
int x, int y, int width, int height,
Mask planemask)
{
DrawablePtr pDraw, pBoundingDraw;
int nlines, linesPerBuf, rc;
int linesDone;
/* coordinates relative to the bounding drawable */
int relx, rely;
long widthBy... | 119,717,234,889,048,780,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,074 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | InitClient(ClientPtr client, int i, void *ospriv)
{
client->index = i;
xorg_list_init(&client->ready);
xorg_list_init(&client->output_pending);
client->clientAsMask = ((Mask) i) << CLIENTOFFSET;
client->closeDownMode = i ? DestroyAll : RetainPermanent;
client->requestVector = InitialVector;
... | 122,987,494,928,604,440,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,075 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | NextAvailableClient(void *ospriv)
{
int i;
ClientPtr client;
xReq data;
i = nextFreeClientID;
if (i == LimitClients)
return (ClientPtr) NULL;
clients[i] = client =
dixAllocateObjectWithPrivates(ClientRec, PRIVATE_CLIENT);
if (!client)
return (ClientPtr) NULL;
Ini... | 123,699,560,960,988,940,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,076 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | ProcCreateCursor(ClientPtr client)
{
CursorPtr pCursor;
PixmapPtr src;
PixmapPtr msk;
unsigned char *srcbits;
unsigned char *mskbits;
unsigned short width, height;
long n;
CursorMetricRec cm;
int rc;
REQUEST(xCreateCursorReq);
REQUEST_SIZE_MATCH(xCreateCursorReq);
LEGAL... | 303,617,917,191,133,660,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,077 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | ProcPutImage(ClientPtr client)
{
GC *pGC;
DrawablePtr pDraw;
long length; /* length of scanline server padded */
long lengthProto; /* length of scanline protocol padded */
char *tmpImage;
REQUEST(xPutImageReq);
REQUEST_AT_LEAST_SIZE(xPutImageReq);
VALIDATE_DRAW... | 97,339,890,494,009,170,000,000,000,000,000,000,000 | dispatch.c | 310,582,469,526,667,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,078 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | ProcQueryColors(ClientPtr client)
{
ColormapPtr pcmp;
int rc;
REQUEST(xQueryColorsReq);
REQUEST_AT_LEAST_SIZE(xQueryColorsReq);
rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP,
client, DixReadAccess);
if (rc == Success) {
int coun... | 197,335,492,267,048,700,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,079 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | SmartScheduleClient(void)
{
ClientPtr pClient, best = NULL;
int bestRobin, robin;
long now = SmartScheduleTime;
long idle;
int nready = 0;
bestRobin = 0;
idle = 2 * SmartScheduleSlice;
xorg_list_for_each_entry(pClient, &ready_clients, ready) {
nready++;
/* Praise clien... | 51,244,744,150,255,510,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,080 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | UpdateCurrentTime(void)
{
TimeStamp systime;
/* To avoid time running backwards, we must call GetTimeInMillis before
* calling ProcessInputEvents.
*/
systime.months = currentTime.months;
systime.milliseconds = GetTimeInMillis();
if (systime.milliseconds < currentTime.milliseconds)
... | 44,276,265,191,931,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,081 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | clients_are_ready(void)
{
return !xorg_list_is_empty(&ready_clients);
}
| 72,077,724,606,036,880,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,082 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | init_client_ready(void)
{
xorg_list_init(&ready_clients);
xorg_list_init(&saved_ready_clients);
xorg_list_init(&output_pending_clients);
}
| 111,579,814,893,666,330,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,083 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | static int init_screen(ScreenPtr pScreen, int i, Bool gpu)
{
int scanlinepad, format, depth, bitsPerPixel, j, k;
dixInitScreenSpecificPrivates(pScreen);
if (!dixAllocatePrivates(&pScreen->devPrivates, PRIVATE_SCREEN)) {
return -1;
}
pScreen->myNum = i;
if (gpu) {
pScreen->myNum... | 329,130,515,365,493,530,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,084 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | mark_client_grab(ClientPtr grab)
{
ClientPtr client, tmp;
xorg_list_for_each_entry_safe(client, tmp, &ready_clients, ready) {
if (client != grab) {
xorg_list_del(&client->ready);
xorg_list_append(&client->ready, &saved_ready_clients);
}
}
}
| 35,203,987,213,492,264,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,085 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | mark_client_not_ready(ClientPtr client)
{
xorg_list_del(&client->ready);
}
| 156,710,401,626,701,550,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,086 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | mark_client_ready(ClientPtr client)
{
if (xorg_list_is_empty(&client->ready))
xorg_list_append(&client->ready, &ready_clients);
}
| 188,140,501,925,557,930,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,087 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | void mark_client_saved_ready(ClientPtr client)
{
if (xorg_list_is_empty(&client->ready))
xorg_list_append(&client->ready, &saved_ready_clients);
}
| 209,812,763,740,301,670,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,088 | xserver | b747da5e25be944337a9cd1415506fc06b70aa81 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81 | Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Nathan Kidd <nkidd@opentext.com>
Signed-off-by: Julien Cristau <jcristau@debian.org> | 0 | mark_client_ungrab(void)
{
ClientPtr client, tmp;
xorg_list_for_each_entry_safe(client, tmp, &saved_ready_clients, ready) {
xorg_list_del(&client->ready);
xorg_list_append(&client->ready, &ready_clients);
}
}
| 272,767,719,129,746,800,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12176 | xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2017-12176 |
21,090 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | check_exponent (void *arg, gcry_mpi_t a)
{
gcry_mpi_t e = arg;
gcry_mpi_t tmp;
int result;
mpi_sub_ui (a, a, 1);
tmp = _gcry_mpi_alloc_like (a);
result = !mpi_gcd(tmp, e, a); /* GCD is not 1. */
_gcry_mpi_release (tmp);
mpi_add_ui (a, a, 1);
return result;
}
| 183,984,573,864,703,660,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,091 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | check_secret_key( RSA_secret_key *sk )
{
int rc;
gcry_mpi_t temp = mpi_alloc( mpi_get_nlimbs(sk->p)*2 );
mpi_mul(temp, sk->p, sk->q );
rc = mpi_cmp( temp, sk->n );
mpi_free(temp);
return !rc;
}
| 315,325,822,763,304,240,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,092 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | compute_keygrip (gcry_md_hd_t md, gcry_sexp_t keyparam)
{
gcry_sexp_t l1;
const char *data;
size_t datalen;
l1 = sexp_find_token (keyparam, "n", 1);
if (!l1)
return GPG_ERR_NO_OBJ;
data = sexp_nth_data (l1, 1, &datalen);
if (!data)
{
sexp_release (l1);
return GPG_ERR_NO_OBJ;
}
... | 74,186,054,665,646,860,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,093 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | extract_a_from_sexp (gcry_sexp_t encr_data)
{
gcry_sexp_t l1, l2, l3;
gcry_mpi_t a_value;
l1 = sexp_find_token (encr_data, "enc-val", 0);
if (!l1)
return NULL;
l2 = sexp_find_token (l1, "rsa", 0);
sexp_release (l1);
if (!l2)
return NULL;
l3 = sexp_find_token (l2, "a", 0);
sexp_release (l2);
... | 215,759,708,030,745,900,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,094 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | gen_x931_parm_xp (unsigned int nbits)
{
gcry_mpi_t xp;
xp = mpi_snew (nbits);
_gcry_mpi_randomize (xp, nbits, GCRY_VERY_STRONG_RANDOM);
/* The requirement for Xp is:
sqrt{2}*2^{nbits-1} <= xp <= 2^{nbits} - 1
We set the two high order bits to 1 to satisfy the lower bound.
By using mpi_set_h... | 43,429,330,159,036,190,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,095 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | generate_fips (RSA_secret_key *sk, unsigned int nbits, unsigned long use_e,
gcry_sexp_t testparms, int transient_key)
{
gcry_mpi_t p, q; /* the two primes */
gcry_mpi_t d; /* the private key */
gcry_mpi_t u;
gcry_mpi_t p1, q1;
gcry_mpi_t n; /* the public key */
gcry_mpi_t e; /* the e... | 277,547,781,036,446,100,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,096 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | generate_std (RSA_secret_key *sk, unsigned int nbits, unsigned long use_e,
int transient_key)
{
gcry_mpi_t p, q; /* the two primes */
gcry_mpi_t d; /* the private key */
gcry_mpi_t u;
gcry_mpi_t t1, t2;
gcry_mpi_t n; /* the public key */
gcry_mpi_t e; /* the exponent */
gcry_mpi_t p... | 88,053,191,098,020,450,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,097 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | generate_x931 (RSA_secret_key *sk, unsigned int nbits, unsigned long e_value,
gcry_sexp_t deriveparms, int *swapped)
{
gcry_mpi_t p, q; /* The two primes. */
gcry_mpi_t e; /* The public exponent. */
gcry_mpi_t n; /* The public key. */
gcry_mpi_t d; /* The private key */
gcry_mpi_t u... | 278,904,187,810,734,830,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,098 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | rsa_check_secret_key (gcry_sexp_t keyparms)
{
gcry_err_code_t rc;
RSA_secret_key sk = {NULL, NULL, NULL, NULL, NULL, NULL};
/* To check the key we need the optional parameters. */
rc = sexp_extract_param (keyparms, NULL, "nedpqu",
&sk.n, &sk.e, &sk.d, &sk.p, &sk.q, &sk.u,
... | 257,304,098,317,075,100,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,099 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | rsa_decrypt (gcry_sexp_t *r_plain, gcry_sexp_t s_data, gcry_sexp_t keyparms)
{
gpg_err_code_t rc;
struct pk_encoding_ctx ctx;
gcry_sexp_t l1 = NULL;
gcry_mpi_t data = NULL;
RSA_secret_key sk = {NULL, NULL, NULL, NULL, NULL, NULL};
gcry_mpi_t plain = NULL;
unsigned char *unpad = NULL;
size_t unpadlen = ... | 55,613,975,922,848,150,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,100 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | rsa_generate (const gcry_sexp_t genparms, gcry_sexp_t *r_skey)
{
gpg_err_code_t ec;
unsigned int nbits;
unsigned long evalue;
RSA_secret_key sk;
gcry_sexp_t deriveparms;
int flags = 0;
gcry_sexp_t l1;
gcry_sexp_t swap_info = NULL;
memset (&sk, 0, sizeof sk);
ec = _gcry_pk_util_get_nbits (genparms,... | 232,925,298,167,635,870,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,101 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | rsa_get_nbits (gcry_sexp_t parms)
{
gcry_sexp_t l1;
gcry_mpi_t n;
unsigned int nbits;
l1 = sexp_find_token (parms, "n", 1);
if (!l1)
return 0; /* Parameter N not found. */
n = sexp_nth_mpi (l1, 1, GCRYMPI_FMT_USG);
sexp_release (l1);
nbits = n? mpi_get_nbits (n) : 0;
_gcry_mpi_release (n);
re... | 273,403,735,316,675,600,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,102 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | rsa_verify (gcry_sexp_t s_sig, gcry_sexp_t s_data, gcry_sexp_t keyparms)
{
gcry_err_code_t rc;
struct pk_encoding_ctx ctx;
gcry_sexp_t l1 = NULL;
gcry_mpi_t sig = NULL;
gcry_mpi_t data = NULL;
RSA_public_key pk = { NULL, NULL };
gcry_mpi_t result = NULL;
_gcry_pk_util_init_encoding_ctx (&ctx, PUBKEY_OP... | 318,162,301,287,815,330,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,103 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | secret_blinded (gcry_mpi_t output, gcry_mpi_t input,
RSA_secret_key *sk, unsigned int nbits)
{
gcry_mpi_t r; /* Random number needed for blinding. */
gcry_mpi_t ri; /* Modular multiplicative inverse of r. */
gcry_mpi_t bldata; /* Blinded data to decrypt. */
/* First, we n... | 5,910,033,938,634,461,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,104 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | secret_core_std (gcry_mpi_t M, gcry_mpi_t C,
gcry_mpi_t D, gcry_mpi_t N)
{
mpi_powm (M, C, D, N);
}
| 172,728,213,920,417,870,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,105 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | selftest_encr_2048 (gcry_sexp_t pkey, gcry_sexp_t skey)
{
const char *errtxt = NULL;
gcry_error_t err;
static const char plaintext[] =
"Jim quickly realized that the beautiful gowns are expensive.";
gcry_sexp_t plain = NULL;
gcry_sexp_t encr = NULL;
gcry_mpi_t ciphertext = NULL;
gcry_sexp_t decr = ... | 198,460,565,883,435,730,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,106 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | selftest_sign_2048 (gcry_sexp_t pkey, gcry_sexp_t skey)
{
static const char sample_data[] =
"(data (flags pkcs1)"
" (hash sha256 #11223344556677889900aabbccddeeff"
/**/ "102030405060708090a0b0c0d0f01121#))";
static const char sample_data_bad[] =
"(data (flags pkcs1)"
" (hash sha256 #11... | 88,161,481,589,891,440,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,107 | gnupg | 8725c99ffa41778f382ca97233183bcd687bb0ce | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | None | 0 | test_keys (RSA_secret_key *sk, unsigned int nbits)
{
int result = -1; /* Default to failure. */
RSA_public_key pk;
gcry_mpi_t plaintext = mpi_new (nbits);
gcry_mpi_t ciphertext = mpi_new (nbits);
gcry_mpi_t decr_plaintext = mpi_new (nbits);
gcry_mpi_t signature = mpi_new (nbits);
/* Put the relevant par... | 132,048,012,475,950,140,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
21,109 | libXdmcp | 0554324ec6bbc2071f5d1f8ad211a1643e29eb1f | https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f | https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f | None | 0 | getbits (long data, unsigned char *dst)
{
dst[0] = (data ) & 0xff;
dst[1] = (data >> 8) & 0xff;
dst[2] = (data >> 16) & 0xff;
dst[3] = (data >> 24) & 0xff;
}
| 179,633,996,986,797,700,000,000,000,000,000,000,000 | None | null | [
"CWE-320"
] | CVE-2017-2625 | It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions. | https://nvd.nist.gov/vuln/detail/CVE-2017-2625 |
21,110 | savannah | a0d7fe4589651c64bd16ddaaa634030bb0455866 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866 | None | 0 | intuit_diff_type (bool need_header, mode_t *p_file_type)
{
file_offset this_line = 0;
file_offset first_command_line = -1;
char first_ed_command_letter = 0;
lin fcl_line = 0; /* Pacify 'gcc -W'. */
bool this_is_a_command = false;
bool stars_this_line = false;
bool extended_headers = false;
... | 235,965,757,670,257,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10713 | An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10713 |
21,156 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_alloc(Jbig2Allocator *allocator, size_t size, size_t num)
{
/* check for integer multiplication overflow */
if (num > 0 && size >= (size_t) - 0x100 / num)
return NULL;
return allocator->alloc(allocator, size * num);
}
| 228,960,041,740,743,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,157 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_ctx_free(Jbig2Ctx *ctx)
{
Jbig2Allocator *ca = ctx->allocator;
int i;
jbig2_free(ca, ctx->buf);
if (ctx->segments != NULL) {
for (i = 0; i < ctx->n_segments; i++)
jbig2_free_segment(ctx, ctx->segments[i]);
jbig2_free(ca, ctx->segments);
}
if (ctx->pages != NUL... | 232,748,035,956,896,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,158 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_ctx_new(Jbig2Allocator *allocator, Jbig2Options options, Jbig2GlobalCtx *global_ctx, Jbig2ErrorCallback error_callback, void *error_callback_data)
{
Jbig2Ctx *result;
if (allocator == NULL)
allocator = &jbig2_default_allocator;
if (error_callback == NULL)
error_callback = &jbig2_defau... | 93,314,152,941,624,510,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,159 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_data_in(Jbig2Ctx *ctx, const unsigned char *data, size_t size)
{
const size_t initial_buf_size = 1024;
if (ctx->buf == NULL) {
size_t buf_size = initial_buf_size;
do
buf_size <<= 1;
while (buf_size < size);
ctx->buf = jbig2_new(ctx, byte, buf_size);
if... | 178,965,359,815,438,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,160 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_default_alloc(Jbig2Allocator *allocator, size_t size)
{
return malloc(size);
}
| 128,264,347,617,606,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,161 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_default_free(Jbig2Allocator *allocator, void *p)
{
free(p);
}
| 119,358,466,020,106,220,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,162 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_default_realloc(Jbig2Allocator *allocator, void *p, size_t size)
{
return realloc(p, size);
}
| 240,229,970,288,126,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,163 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_error(Jbig2Ctx *ctx, Jbig2Severity severity, int32_t segment_number, const char *fmt, ...)
{
char buf[1024];
va_list ap;
int n;
int code;
va_start(ap, fmt);
n = vsnprintf(buf, sizeof(buf), fmt, ap);
va_end(ap);
if (n < 0 || n == sizeof(buf))
strncpy(buf, "jbig2_error: erro... | 195,498,855,624,327,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,164 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_free(Jbig2Allocator *allocator, void *p)
{
allocator->free(allocator, p);
}
| 264,313,529,897,637,950,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,165 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_get_int16(const byte *bptr)
{
return get_int16(bptr);
}
| 140,496,427,547,154,020,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,166 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_get_int32(const byte *bptr)
{
return ((int32_t) get_int16(bptr) << 16) | get_uint16(bptr + 2);
}
| 222,897,373,549,311,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,167 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_get_uint16(const byte *bptr)
{
return get_uint16(bptr);
}
| 113,727,890,109,299,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,168 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_get_uint32(const byte *bptr)
{
return ((uint32_t) get_uint16(bptr) << 16) | get_uint16(bptr + 2);
}
| 201,882,280,127,440,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,169 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_global_ctx_free(Jbig2GlobalCtx *global_ctx)
{
jbig2_ctx_free((Jbig2Ctx *) global_ctx);
}
| 82,898,874,906,833,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.