idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
20,656
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_malloc (void) { struct eXosip_t *ptr = (struct eXosip_t *) osip_malloc (sizeof (eXosip_t)); if (ptr) memset (ptr, 0, sizeof (eXosip_t)); return ptr; }
119,347,376,253,613,920,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,657
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_masquerade_contact (struct eXosip_t *excontext, const char *public_address, int port) { if (excontext->eXtl_transport.tl_masquerade_contact == NULL) { OSIP_TRACE (osip_trace (__FILE__, __LINE__, OSIP_WARNING, NULL, "no transport protocol selected!\n")); if (public_address == NULL || public_address[0] =...
222,949,173,814,351,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,658
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_quit (struct eXosip_t *excontext) { jauthinfo_t *jauthinfo; eXosip_call_t *jc; eXosip_reg_t *jreg; #ifndef MINISIZE eXosip_notify_t *jn; eXosip_subscribe_t *js; eXosip_pub_t *jpub; #endif #ifndef OSIP_MONOTHREAD int i; #endif if (excontext == NULL) return; if (excontext->j_stop_ua == -1)...
257,139,699,523,287,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,659
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_reset_transports (struct eXosip_t *excontext) { int i = OSIP_WRONG_STATE; if (excontext->eXtl_transport.tl_reset) i = excontext->eXtl_transport.tl_reset (excontext); return i; }
258,185,143,670,083,730,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,660
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
eXosip_set_cbsip_message (struct eXosip_t *excontext, CbSipCallback cbsipCallback) { excontext->cbsipCallback = cbsipCallback; return 0; }
259,327,908,814,076,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,661
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
_tcp_tl_check_connected (struct eXosip_t *excontext) { struct eXtltcp *reserved = (struct eXtltcp *) excontext->eXtltcp_reserved; int pos; int res; for (pos = 0; pos < EXOSIP_MAX_SOCKETS; pos++) { if (reserved->socket_tab[pos].invalid > 0) { OSIP_TRACE (osip_trace (__FILE__, __LINE_...
233,632,940,255,677,300,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,662
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
_tcp_tl_close_sockinfo (struct _tcp_stream *sockinfo) { closesocket (sockinfo->socket); if (sockinfo->buf != NULL) osip_free (sockinfo->buf); if (sockinfo->sendbuf != NULL) osip_free (sockinfo->sendbuf); #ifdef MULTITASKING_ENABLED if (sockinfo->readStream != NULL) { CFReadStreamClose (sockinfo->rea...
45,783,143,951,652,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,663
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
RSA_generate_key (int bits, unsigned long e_value, void (*callback) (int, int, void *), void *cb_arg) { BN_GENCB cb; int i; RSA *rsa = RSA_new (); BIGNUM *e = BN_new (); if (!rsa || !e) goto err; /* The problem is when building with 8, 16, or 32 BN_ULONG, ...
55,063,379,573,537,340,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,664
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
_tls_add_certificates (SSL_CTX * ctx) { int count = 0; #ifdef HAVE_WINCRYPT_H PCCERT_CONTEXT pCertCtx; X509 *cert = NULL; HCERTSTORE hStore = CertOpenSystemStore (0, L"CA"); for (pCertCtx = CertEnumCertificatesInStore (hStore, NULL); pCertCtx != NULL; pCertCtx = CertEnumCertificatesInStore (hStore, pCertCtx...
112,948,784,670,386,730,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,665
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
_tls_set_certificate (SSL_CTX * ctx, const char *cn) { #ifdef HAVE_WINCRYPT_H PCCERT_CONTEXT pCertCtx; X509 *cert = NULL; HCERTSTORE hStore = CertOpenSystemStore (0, L"CA"); for (pCertCtx = CertEnumCertificatesInStore (hStore, NULL); pCertCtx != NULL; pCertCtx = CertEnumCertificatesInStore (hStore, pCertCtx)) ...
72,620,908,281,379,055,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,666
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
_tls_tl_check_connected (struct eXosip_t *excontext) { struct eXtltls *reserved = (struct eXtltls *) excontext->eXtltls_reserved; int pos; int res; for (pos = 0; pos < EXOSIP_MAX_SOCKETS; pos++) { if (reserved->socket_tab[pos].invalid > 0) { OSIP_TRACE (osip_trace (__FILE__, __LINE_...
331,165,779,659,033,750,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
20,667
savannah
2549e421c14aff886629b8482c14af800f411070
https://git.savannah.gnu.org/gitweb/?p=gnutls
http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070
None
0
_tls_tl_close_sockinfo (struct _tls_stream *sockinfo) { if (sockinfo->socket > 0) { if (sockinfo->ssl_conn != NULL) { SSL_shutdown (sockinfo->ssl_conn); SSL_shutdown (sockinfo->ssl_conn); SSL_free (sockinfo->ssl_conn); } if (sockinfo->ssl_ctx != NULL) SSL_CTX_free (sockinfo->ssl_ct...
124,451,084,888,004,460,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-10375
handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.
https://nvd.nist.gov/vuln/detail/CVE-2014-10375
21,035
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
static struct PointerBarrierDevice *AllocBarrierDevice(void) { struct PointerBarrierDevice *pbd = NULL; pbd = malloc(sizeof(struct PointerBarrierDevice)); if (!pbd) return NULL; pbd->deviceid = -1; /* must be set by caller */ pbd->barrier_event_id = 1; pbd->release_event_id = 0; pb...
52,391,885,590,960,410,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,036
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
BarrierFreeBarrier(void *data, XID id) { struct PointerBarrierClient *c; Time ms = GetTimeInMillis(); DeviceIntPtr dev = NULL; ScreenPtr screen; c = container_of(data, struct PointerBarrierClient, barrier); screen = c->screen; for (dev = inputInfo.devices; dev; dev = dev->next) { s...
318,439,306,105,200,470,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,037
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
CreatePointerBarrierClient(ClientPtr client, xXFixesCreatePointerBarrierReq * stuff, PointerBarrierClientPtr *client_out) { WindowPtr pWin; ScreenPtr screen; BarrierScreenPtr cs; int err; int size; int i; struct PointerBarrierClient *ret;...
248,955,629,470,600,420,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,038
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
static struct PointerBarrierDevice *GetBarrierDevice(struct PointerBarrierClient *c, int deviceid) { struct PointerBarrierDevice *pbd = NULL; xorg_list_for_each_entry(pbd, &c->per_device, entry) { if (pbd->deviceid == deviceid) break; } BUG_WARN(!pbd); return pbd; }
270,765,627,569,473,600,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,039
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
void XIBarrierNewMasterDevice(ClientPtr client, int deviceid) { FindClientResourcesByType(client, PointerBarrierType, add_master_func, &deviceid); }
148,191,264,223,078,470,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,040
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
void XIBarrierRemoveMasterDevice(ClientPtr client, int deviceid) { FindClientResourcesByType(client, PointerBarrierType, remove_master_func, &deviceid); }
327,226,229,428,243,430,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,041
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
XICreatePointerBarrier(ClientPtr client, xXFixesCreatePointerBarrierReq * stuff) { int err; struct PointerBarrierClient *barrier; struct PointerBarrier b; b.x1 = stuff->x1; b.x2 = stuff->x2; b.y1 = stuff->y1; b.y2 = stuff->y2; if (!barrier_is_horizontal(&b) && !b...
169,000,433,563,185,530,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,042
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
XIDestroyPointerBarrier(ClientPtr client, xXFixesDestroyPointerBarrierReq * stuff) { int err; void *barrier; err = dixLookupResourceByType((void **) &barrier, stuff->barrier, PointerBarrierType, client, DixDestroyAccess); if (err != Success) { ...
306,074,093,692,238,040,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,043
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_blocks_device(struct PointerBarrierClient *client, DeviceIntPtr dev) { int i; int master_id; /* Clients with no devices are treated as * if they specified XIAllDevices. */ if (client->num_devices == 0) return TRUE; master_id = GetMaster(dev, POINTER_OR_FL...
214,753,430,064,181,530,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,044
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_clamp_to_barrier(struct PointerBarrier *barrier, int dir, int *x, int *y) { if (barrier_is_vertical(barrier)) { if ((dir & BarrierNegativeX) & ~barrier->directions) *x = barrier->x1; if ((dir & BarrierPositiveX) & ~barrier->directions) *x = ba...
132,183,661,240,289,530,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,045
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_find_nearest(BarrierScreenPtr cs, DeviceIntPtr dev, int dir, int x1, int y1, int x2, int y2) { struct PointerBarrierClient *c, *nearest = NULL; double min_distance = INT_MAX; /* can't get higher than that in X anyway */ xorg_list_for_each_entry(c, &cs-...
254,671,910,612,446,350,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,046
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_get_direction(int x1, int y1, int x2, int y2) { int direction = 0; /* which way are we trying to go */ if (x2 > x1) direction |= BarrierPositiveX; if (x2 < x1) direction |= BarrierNegativeX; if (y2 > y1) direction |= BarrierPositiveY; if (y2 < y1) directi...
21,015,683,198,050,120,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,047
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_inside_hit_box(struct PointerBarrier *barrier, int x, int y) { int x1, x2, y1, y2; int dir; x1 = barrier->x1; x2 = barrier->x2; y1 = barrier->y1; y2 = barrier->y2; dir = ~(barrier->directions); if (barrier_is_vertical(barrier)) { if (dir & BarrierPositiveX) ...
277,580,284,206,260,150,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,048
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_is_blocking(const struct PointerBarrier * barrier, int x1, int y1, int x2, int y2, double *distance) { if (barrier_is_vertical(barrier)) { float t, y; t = T(barrier->x1, x1, x2); if (t < 0 || t > 1) return FALSE; /* Edge case: moving away from...
64,178,165,409,025,900,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,049
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_is_blocking_direction(const struct PointerBarrier * barrier, int direction) { /* Barriers define which way is ok, not which way is blocking */ return (barrier->directions & direction) != direction; }
52,592,440,788,363,380,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,050
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
barrier_is_horizontal(const struct PointerBarrier *barrier) { return barrier->y1 == barrier->y2; }
195,753,363,187,408,300,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,051
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
input_constrain_cursor(DeviceIntPtr dev, ScreenPtr screen, int current_x, int current_y, int dest_x, int dest_y, int *out_x, int *out_y, int *nevents, InternalEvent* events) { /* Clamped coordinates here refer to screen edge...
197,191,068,636,829,400,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,052
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
inside_segment(int v, int v1, int v2) { if (v1 < 0 && v2 < 0) /* line */ return TRUE; else if (v1 < 0) /* ray */ return v <= v2; else if (v2 < 0) /* ray */ return v >= v1; else /* line segment */ return v >= v1 && v <= v2; }
208,330,519,196,524,300,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,053
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
static void remove_master_func(void *res, XID id, void *devid) { struct PointerBarrierDevice *pbd; struct PointerBarrierClient *barrier; struct PointerBarrier *b; DeviceIntPtr dev; int *deviceid = devid; int rc; Time ms = GetTimeInMillis(); rc = dixLookupDevice(&dev, *deviceid, serverCl...
186,576,114,996,689,040,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,054
xserver
d088e3c1286b548a58e62afdc70bb40981cdb9e8
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer [jcristau: originally this patch fixed the same issue as commit 211e05ac85 "Xi: Test exact size of XIBarrierReleasePointer", with the addition of these checks] This addresses CVE-2017-12179 Reviewed-by: Alan Coopersmith <alan.coopersmith...
0
sort_min_max(INT16 *a, INT16 *b) { INT16 A, B; if (*a < 0 || *b < 0) return; A = *a; B = *b; *a = min(A, B); *b = max(A, B); }
319,687,121,507,072,370,000,000,000,000,000,000,000
xibarriers.c
227,650,435,667,700,770,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12179
21,055
xserver
859b08d523307eebde7724fd1a0789c44813e821
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cris...
0
SProcXIChangeHierarchy(ClientPtr client) { REQUEST(xXIChangeHierarchyReq); swaps(&stuff->length); return (ProcXIChangeHierarchy(client)); }
151,588,207,778,704,030,000,000,000,000,000,000,000
xichangehierarchy.c
151,192,785,260,135,340,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12178
21,056
xserver
859b08d523307eebde7724fd1a0789c44813e821
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cris...
0
XISendDeviceHierarchyEvent(int flags[MAXDEVICES]) { xXIHierarchyEvent *ev; xXIHierarchyInfo *info; DeviceIntRec dummyDev; DeviceIntPtr dev; int i; if (!flags) return; ev = calloc(1, sizeof(xXIHierarchyEvent) + MAXDEVICES * sizeof(xXIHierarchyInfo)); if (!ev) ...
128,527,047,175,427,930,000,000,000,000,000,000,000
xichangehierarchy.c
151,192,785,260,135,340,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12178
21,057
xserver
859b08d523307eebde7724fd1a0789c44813e821
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cris...
0
add_master(ClientPtr client, xXIAddMasterInfo * c, int flags[MAXDEVICES]) { DeviceIntPtr ptr, keybd, XTestptr, XTestkeybd; char *name; int rc; name = calloc(c->name_len + 1, sizeof(char)); if (name == NULL) { rc = BadAlloc; goto unwind; } strncpy(name, (char *) &c[1], c->nam...
330,517,371,243,454,800,000,000,000,000,000,000,000
xichangehierarchy.c
151,192,785,260,135,340,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12178
21,058
xserver
859b08d523307eebde7724fd1a0789c44813e821
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cris...
0
attach_slave(ClientPtr client, xXIAttachSlaveInfo * c, int flags[MAXDEVICES]) { DeviceIntPtr dev; DeviceIntPtr newmaster; int rc; rc = dixLookupDevice(&dev, c->deviceid, client, DixManageAccess); if (rc != Success) goto unwind; if (IsMaster(dev)) { client->errorValue = c->devic...
4,881,263,826,589,777,000,000,000,000,000,000,000
xichangehierarchy.c
151,192,785,260,135,340,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12178
21,059
xserver
859b08d523307eebde7724fd1a0789c44813e821
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cris...
0
detach_slave(ClientPtr client, xXIDetachSlaveInfo * c, int flags[MAXDEVICES]) { DeviceIntPtr dev; int rc; rc = dixLookupDevice(&dev, c->deviceid, client, DixManageAccess); if (rc != Success) goto unwind; if (IsMaster(dev)) { client->errorValue = c->deviceid; rc = BadDevice;...
71,567,213,285,784,320,000,000,000,000,000,000,000
xichangehierarchy.c
151,192,785,260,135,340,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12178
21,060
xserver
859b08d523307eebde7724fd1a0789c44813e821
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cris...
0
disable_clientpointer(DeviceIntPtr dev) { int i; for (i = 0; i < currentMaxClients; i++) { ClientPtr client = clients[i]; if (client && client->clientPtr == dev) client->clientPtr = NULL; } }
235,010,871,100,365,400,000,000,000,000,000,000,000
xichangehierarchy.c
151,192,785,260,135,340,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12178
21,061
xserver
859b08d523307eebde7724fd1a0789c44813e821
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cris...
0
remove_master(ClientPtr client, xXIRemoveMasterInfo * r, int flags[MAXDEVICES]) { DeviceIntPtr ptr, keybd, XTestptr, XTestkeybd; int rc = Success; if (r->return_mode != XIAttachToMaster && r->return_mode != XIFloating) return BadValue; rc = dixLookupDevice(&ptr, r->deviceid, client, DixDestroy...
201,063,796,683,789,950,000,000,000,000,000,000,000
xichangehierarchy.c
151,192,785,260,135,340,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12178
21,062
xserver
4ca68b878e851e2136c234f40a25008297d8d831
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177) v2: Protect against integer overflow (Alan Coopersmith) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off...
0
DbeStubScreen(DbeScreenPrivPtr pDbeScreenPriv, int *nStubbedScreens) { /* Stub DIX. */ pDbeScreenPriv->SetupBackgroundPainter = NULL; /* Do not unwrap PositionWindow nor DestroyWindow. If the DDX * initialization function failed, we assume that it did not wrap * PositionWindow. Also, DestroyWin...
200,980,536,693,733,900,000,000,000,000,000,000,000
dbe.c
293,406,963,263,941,080,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12177
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12177
21,063
xserver
4ca68b878e851e2136c234f40a25008297d8d831
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177) v2: Protect against integer overflow (Alan Coopersmith) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off...
0
ProcDbeAllocateBackBufferName(ClientPtr client) { REQUEST(xDbeAllocateBackBufferNameReq); WindowPtr pWin; DbeScreenPrivPtr pDbeScreenPriv; DbeWindowPrivPtr pDbeWindowPriv; XdbeScreenVisualInfo scrVisInfo; register int i; Bool visualMatched = FALSE; xDbeSwapAction swapAction; VisualID...
130,250,592,307,160,170,000,000,000,000,000,000,000
dbe.c
293,406,963,263,941,080,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12177
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12177
21,064
xserver
4ca68b878e851e2136c234f40a25008297d8d831
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177) v2: Protect against integer overflow (Alan Coopersmith) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off...
0
ProcDbeDeallocateBackBufferName(ClientPtr client) { REQUEST(xDbeDeallocateBackBufferNameReq); DbeWindowPrivPtr pDbeWindowPriv; int rc, i; void *val; REQUEST_SIZE_MATCH(xDbeDeallocateBackBufferNameReq); /* Buffer name must be valid */ rc = dixLookupResourceByType((void **) &pDbeWindowPriv, ...
259,622,595,836,792,240,000,000,000,000,000,000,000
dbe.c
293,406,963,263,941,080,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12177
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12177
21,065
xserver
4ca68b878e851e2136c234f40a25008297d8d831
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177) v2: Protect against integer overflow (Alan Coopersmith) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off...
0
ProcDbeGetVersion(ClientPtr client) { /* REQUEST(xDbeGetVersionReq); */ xDbeGetVersionReply rep = { .type = X_Reply, .sequenceNumber = client->sequence, .length = 0, .majorVersion = DBE_MAJOR_VERSION, .minorVersion = DBE_MINOR_VERSION }; REQUEST_SIZE_MATCH(xDbeGe...
93,471,372,799,731,820,000,000,000,000,000,000,000
dbe.c
293,406,963,263,941,080,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12177
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12177
21,066
xserver
4ca68b878e851e2136c234f40a25008297d8d831
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177) v2: Protect against integer overflow (Alan Coopersmith) Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com> Reviewed-by: Jeremy Huddleston Sequoia <jeremyhu@apple.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off...
0
ProcDbeSwapBuffers(ClientPtr client) { REQUEST(xDbeSwapBuffersReq); WindowPtr pWin; DbeScreenPrivPtr pDbeScreenPriv; DbeSwapInfoPtr swapInfo; xDbeSwapInfo *dbeSwapInfo; int error; unsigned int i, j; unsigned int nStuff; int nStuff_i; /* DDX API requires int for nStuff */ R...
197,625,319,734,588,600,000,000,000,000,000,000,000
dbe.c
293,406,963,263,941,080,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-12177
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12177
21,067
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
AddGPUScreen(Bool (*pfnInit) (ScreenPtr /*pScreen */ , int /*argc */ , char ** /*argv */ ), int argc, char **argv) { int i; ScreenPtr pScreen; Bool ret; i = screenInfo.numGPUScreens; if (i ==...
25,294,382,655,014,096,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,068
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
AttachOffloadGPU(ScreenPtr pScreen, ScreenPtr new) { assert(new->isGPU); assert(!new->is_offload_slave); assert(new->current_master == pScreen); new->is_offload_slave = TRUE; }
221,839,721,472,826,180,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,069
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
AttachOutputGPU(ScreenPtr pScreen, ScreenPtr new) { assert(new->isGPU); assert(!new->is_output_slave); assert(new->current_master == pScreen); new->is_output_slave = TRUE; new->current_master->output_slaves++; }
243,600,936,019,244,300,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,070
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
AttachUnboundGPU(ScreenPtr pScreen, ScreenPtr new) { assert(new->isGPU); assert(!new->current_master); xorg_list_add(&new->slave_head, &pScreen->slave_list); new->current_master = pScreen; }
2,900,029,019,971,603,500,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,071
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
DetachOffloadGPU(ScreenPtr slave) { assert(slave->isGPU); assert(slave->is_offload_slave); slave->is_offload_slave = FALSE; }
75,422,183,075,461,910,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,072
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
DetachOutputGPU(ScreenPtr slave) { assert(slave->isGPU); assert(slave->is_output_slave); slave->current_master->output_slaves--; slave->is_output_slave = FALSE; }
227,252,403,474,410,970,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,073
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
DoGetImage(ClientPtr client, int format, Drawable drawable, int x, int y, int width, int height, Mask planemask) { DrawablePtr pDraw, pBoundingDraw; int nlines, linesPerBuf, rc; int linesDone; /* coordinates relative to the bounding drawable */ int relx, rely; long widthBy...
119,717,234,889,048,780,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,074
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
InitClient(ClientPtr client, int i, void *ospriv) { client->index = i; xorg_list_init(&client->ready); xorg_list_init(&client->output_pending); client->clientAsMask = ((Mask) i) << CLIENTOFFSET; client->closeDownMode = i ? DestroyAll : RetainPermanent; client->requestVector = InitialVector; ...
122,987,494,928,604,440,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,075
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
NextAvailableClient(void *ospriv) { int i; ClientPtr client; xReq data; i = nextFreeClientID; if (i == LimitClients) return (ClientPtr) NULL; clients[i] = client = dixAllocateObjectWithPrivates(ClientRec, PRIVATE_CLIENT); if (!client) return (ClientPtr) NULL; Ini...
123,699,560,960,988,940,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,076
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
ProcCreateCursor(ClientPtr client) { CursorPtr pCursor; PixmapPtr src; PixmapPtr msk; unsigned char *srcbits; unsigned char *mskbits; unsigned short width, height; long n; CursorMetricRec cm; int rc; REQUEST(xCreateCursorReq); REQUEST_SIZE_MATCH(xCreateCursorReq); LEGAL...
303,617,917,191,133,660,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,077
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
ProcPutImage(ClientPtr client) { GC *pGC; DrawablePtr pDraw; long length; /* length of scanline server padded */ long lengthProto; /* length of scanline protocol padded */ char *tmpImage; REQUEST(xPutImageReq); REQUEST_AT_LEAST_SIZE(xPutImageReq); VALIDATE_DRAW...
97,339,890,494,009,170,000,000,000,000,000,000,000
dispatch.c
310,582,469,526,667,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,078
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
ProcQueryColors(ClientPtr client) { ColormapPtr pcmp; int rc; REQUEST(xQueryColorsReq); REQUEST_AT_LEAST_SIZE(xQueryColorsReq); rc = dixLookupResourceByType((void **) &pcmp, stuff->cmap, RT_COLORMAP, client, DixReadAccess); if (rc == Success) { int coun...
197,335,492,267,048,700,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,079
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
SmartScheduleClient(void) { ClientPtr pClient, best = NULL; int bestRobin, robin; long now = SmartScheduleTime; long idle; int nready = 0; bestRobin = 0; idle = 2 * SmartScheduleSlice; xorg_list_for_each_entry(pClient, &ready_clients, ready) { nready++; /* Praise clien...
51,244,744,150,255,510,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,080
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
UpdateCurrentTime(void) { TimeStamp systime; /* To avoid time running backwards, we must call GetTimeInMillis before * calling ProcessInputEvents. */ systime.months = currentTime.months; systime.milliseconds = GetTimeInMillis(); if (systime.milliseconds < currentTime.milliseconds) ...
44,276,265,191,931,400,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,081
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
clients_are_ready(void) { return !xorg_list_is_empty(&ready_clients); }
72,077,724,606,036,880,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,082
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
init_client_ready(void) { xorg_list_init(&ready_clients); xorg_list_init(&saved_ready_clients); xorg_list_init(&output_pending_clients); }
111,579,814,893,666,330,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,083
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
static int init_screen(ScreenPtr pScreen, int i, Bool gpu) { int scanlinepad, format, depth, bitsPerPixel, j, k; dixInitScreenSpecificPrivates(pScreen); if (!dixAllocatePrivates(&pScreen->devPrivates, PRIVATE_SCREEN)) { return -1; } pScreen->myNum = i; if (gpu) { pScreen->myNum...
329,130,515,365,493,530,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,084
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
mark_client_grab(ClientPtr grab) { ClientPtr client, tmp; xorg_list_for_each_entry_safe(client, tmp, &ready_clients, ready) { if (client != grab) { xorg_list_del(&client->ready); xorg_list_append(&client->ready, &saved_ready_clients); } } }
35,203,987,213,492,264,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,085
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
mark_client_not_ready(ClientPtr client) { xorg_list_del(&client->ready); }
156,710,401,626,701,550,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,086
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
mark_client_ready(ClientPtr client) { if (xorg_list_is_empty(&client->ready)) xorg_list_append(&client->ready, &ready_clients); }
188,140,501,925,557,930,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,087
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
void mark_client_saved_ready(ClientPtr client) { if (xorg_list_is_empty(&client->ready)) xorg_list_append(&client->ready, &saved_ready_clients); }
209,812,763,740,301,670,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,088
xserver
b747da5e25be944337a9cd1415506fc06b70aa81
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176) Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Nathan Kidd <nkidd@opentext.com> Signed-off-by: Julien Cristau <jcristau@debian.org>
0
mark_client_ungrab(void) { ClientPtr client, tmp; xorg_list_for_each_entry_safe(client, tmp, &saved_ready_clients, ready) { xorg_list_del(&client->ready); xorg_list_append(&client->ready, &ready_clients); } }
272,767,719,129,746,800,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-12176
21,090
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
check_exponent (void *arg, gcry_mpi_t a) { gcry_mpi_t e = arg; gcry_mpi_t tmp; int result; mpi_sub_ui (a, a, 1); tmp = _gcry_mpi_alloc_like (a); result = !mpi_gcd(tmp, e, a); /* GCD is not 1. */ _gcry_mpi_release (tmp); mpi_add_ui (a, a, 1); return result; }
183,984,573,864,703,660,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,091
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
check_secret_key( RSA_secret_key *sk ) { int rc; gcry_mpi_t temp = mpi_alloc( mpi_get_nlimbs(sk->p)*2 ); mpi_mul(temp, sk->p, sk->q ); rc = mpi_cmp( temp, sk->n ); mpi_free(temp); return !rc; }
315,325,822,763,304,240,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,092
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
compute_keygrip (gcry_md_hd_t md, gcry_sexp_t keyparam) { gcry_sexp_t l1; const char *data; size_t datalen; l1 = sexp_find_token (keyparam, "n", 1); if (!l1) return GPG_ERR_NO_OBJ; data = sexp_nth_data (l1, 1, &datalen); if (!data) { sexp_release (l1); return GPG_ERR_NO_OBJ; } ...
74,186,054,665,646,860,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,093
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
extract_a_from_sexp (gcry_sexp_t encr_data) { gcry_sexp_t l1, l2, l3; gcry_mpi_t a_value; l1 = sexp_find_token (encr_data, "enc-val", 0); if (!l1) return NULL; l2 = sexp_find_token (l1, "rsa", 0); sexp_release (l1); if (!l2) return NULL; l3 = sexp_find_token (l2, "a", 0); sexp_release (l2); ...
215,759,708,030,745,900,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,094
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
gen_x931_parm_xp (unsigned int nbits) { gcry_mpi_t xp; xp = mpi_snew (nbits); _gcry_mpi_randomize (xp, nbits, GCRY_VERY_STRONG_RANDOM); /* The requirement for Xp is: sqrt{2}*2^{nbits-1} <= xp <= 2^{nbits} - 1 We set the two high order bits to 1 to satisfy the lower bound. By using mpi_set_h...
43,429,330,159,036,190,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,095
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
generate_fips (RSA_secret_key *sk, unsigned int nbits, unsigned long use_e, gcry_sexp_t testparms, int transient_key) { gcry_mpi_t p, q; /* the two primes */ gcry_mpi_t d; /* the private key */ gcry_mpi_t u; gcry_mpi_t p1, q1; gcry_mpi_t n; /* the public key */ gcry_mpi_t e; /* the e...
277,547,781,036,446,100,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,096
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
generate_std (RSA_secret_key *sk, unsigned int nbits, unsigned long use_e, int transient_key) { gcry_mpi_t p, q; /* the two primes */ gcry_mpi_t d; /* the private key */ gcry_mpi_t u; gcry_mpi_t t1, t2; gcry_mpi_t n; /* the public key */ gcry_mpi_t e; /* the exponent */ gcry_mpi_t p...
88,053,191,098,020,450,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,097
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
generate_x931 (RSA_secret_key *sk, unsigned int nbits, unsigned long e_value, gcry_sexp_t deriveparms, int *swapped) { gcry_mpi_t p, q; /* The two primes. */ gcry_mpi_t e; /* The public exponent. */ gcry_mpi_t n; /* The public key. */ gcry_mpi_t d; /* The private key */ gcry_mpi_t u...
278,904,187,810,734,830,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,098
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
rsa_check_secret_key (gcry_sexp_t keyparms) { gcry_err_code_t rc; RSA_secret_key sk = {NULL, NULL, NULL, NULL, NULL, NULL}; /* To check the key we need the optional parameters. */ rc = sexp_extract_param (keyparms, NULL, "nedpqu", &sk.n, &sk.e, &sk.d, &sk.p, &sk.q, &sk.u, ...
257,304,098,317,075,100,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,099
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
rsa_decrypt (gcry_sexp_t *r_plain, gcry_sexp_t s_data, gcry_sexp_t keyparms) { gpg_err_code_t rc; struct pk_encoding_ctx ctx; gcry_sexp_t l1 = NULL; gcry_mpi_t data = NULL; RSA_secret_key sk = {NULL, NULL, NULL, NULL, NULL, NULL}; gcry_mpi_t plain = NULL; unsigned char *unpad = NULL; size_t unpadlen = ...
55,613,975,922,848,150,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,100
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
rsa_generate (const gcry_sexp_t genparms, gcry_sexp_t *r_skey) { gpg_err_code_t ec; unsigned int nbits; unsigned long evalue; RSA_secret_key sk; gcry_sexp_t deriveparms; int flags = 0; gcry_sexp_t l1; gcry_sexp_t swap_info = NULL; memset (&sk, 0, sizeof sk); ec = _gcry_pk_util_get_nbits (genparms,...
232,925,298,167,635,870,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,101
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
rsa_get_nbits (gcry_sexp_t parms) { gcry_sexp_t l1; gcry_mpi_t n; unsigned int nbits; l1 = sexp_find_token (parms, "n", 1); if (!l1) return 0; /* Parameter N not found. */ n = sexp_nth_mpi (l1, 1, GCRYMPI_FMT_USG); sexp_release (l1); nbits = n? mpi_get_nbits (n) : 0; _gcry_mpi_release (n); re...
273,403,735,316,675,600,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,102
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
rsa_verify (gcry_sexp_t s_sig, gcry_sexp_t s_data, gcry_sexp_t keyparms) { gcry_err_code_t rc; struct pk_encoding_ctx ctx; gcry_sexp_t l1 = NULL; gcry_mpi_t sig = NULL; gcry_mpi_t data = NULL; RSA_public_key pk = { NULL, NULL }; gcry_mpi_t result = NULL; _gcry_pk_util_init_encoding_ctx (&ctx, PUBKEY_OP...
318,162,301,287,815,330,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,103
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
secret_blinded (gcry_mpi_t output, gcry_mpi_t input, RSA_secret_key *sk, unsigned int nbits) { gcry_mpi_t r; /* Random number needed for blinding. */ gcry_mpi_t ri; /* Modular multiplicative inverse of r. */ gcry_mpi_t bldata; /* Blinded data to decrypt. */ /* First, we n...
5,910,033,938,634,461,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,104
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
secret_core_std (gcry_mpi_t M, gcry_mpi_t C, gcry_mpi_t D, gcry_mpi_t N) { mpi_powm (M, C, D, N); }
172,728,213,920,417,870,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,105
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
selftest_encr_2048 (gcry_sexp_t pkey, gcry_sexp_t skey) { const char *errtxt = NULL; gcry_error_t err; static const char plaintext[] = "Jim quickly realized that the beautiful gowns are expensive."; gcry_sexp_t plain = NULL; gcry_sexp_t encr = NULL; gcry_mpi_t ciphertext = NULL; gcry_sexp_t decr = ...
198,460,565,883,435,730,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,106
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
selftest_sign_2048 (gcry_sexp_t pkey, gcry_sexp_t skey) { static const char sample_data[] = "(data (flags pkcs1)" " (hash sha256 #11223344556677889900aabbccddeeff" /**/ "102030405060708090a0b0c0d0f01121#))"; static const char sample_data_bad[] = "(data (flags pkcs1)" " (hash sha256 #11...
88,161,481,589,891,440,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,107
gnupg
8725c99ffa41778f382ca97233183bcd687bb0ce
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
None
0
test_keys (RSA_secret_key *sk, unsigned int nbits) { int result = -1; /* Default to failure. */ RSA_public_key pk; gcry_mpi_t plaintext = mpi_new (nbits); gcry_mpi_t ciphertext = mpi_new (nbits); gcry_mpi_t decr_plaintext = mpi_new (nbits); gcry_mpi_t signature = mpi_new (nbits); /* Put the relevant par...
132,048,012,475,950,140,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
21,109
libXdmcp
0554324ec6bbc2071f5d1f8ad211a1643e29eb1f
https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f
https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f
None
0
getbits (long data, unsigned char *dst) { dst[0] = (data ) & 0xff; dst[1] = (data >> 8) & 0xff; dst[2] = (data >> 16) & 0xff; dst[3] = (data >> 24) & 0xff; }
179,633,996,986,797,700,000,000,000,000,000,000,000
None
null
[ "CWE-320" ]
CVE-2017-2625
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
https://nvd.nist.gov/vuln/detail/CVE-2017-2625
21,110
savannah
a0d7fe4589651c64bd16ddaaa634030bb0455866
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/src/pch.c?id=a0d7fe4589651c64bd16ddaaa634030bb0455866
None
0
intuit_diff_type (bool need_header, mode_t *p_file_type) { file_offset this_line = 0; file_offset first_command_line = -1; char first_ed_command_letter = 0; lin fcl_line = 0; /* Pacify 'gcc -W'. */ bool this_is_a_command = false; bool stars_this_line = false; bool extended_headers = false; ...
235,965,757,670,257,980,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10713
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10713
21,156
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_alloc(Jbig2Allocator *allocator, size_t size, size_t num) { /* check for integer multiplication overflow */ if (num > 0 && size >= (size_t) - 0x100 / num) return NULL; return allocator->alloc(allocator, size * num); }
228,960,041,740,743,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,157
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_ctx_free(Jbig2Ctx *ctx) { Jbig2Allocator *ca = ctx->allocator; int i; jbig2_free(ca, ctx->buf); if (ctx->segments != NULL) { for (i = 0; i < ctx->n_segments; i++) jbig2_free_segment(ctx, ctx->segments[i]); jbig2_free(ca, ctx->segments); } if (ctx->pages != NUL...
232,748,035,956,896,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,158
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_ctx_new(Jbig2Allocator *allocator, Jbig2Options options, Jbig2GlobalCtx *global_ctx, Jbig2ErrorCallback error_callback, void *error_callback_data) { Jbig2Ctx *result; if (allocator == NULL) allocator = &jbig2_default_allocator; if (error_callback == NULL) error_callback = &jbig2_defau...
93,314,152,941,624,510,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,159
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_data_in(Jbig2Ctx *ctx, const unsigned char *data, size_t size) { const size_t initial_buf_size = 1024; if (ctx->buf == NULL) { size_t buf_size = initial_buf_size; do buf_size <<= 1; while (buf_size < size); ctx->buf = jbig2_new(ctx, byte, buf_size); if...
178,965,359,815,438,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,160
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_default_alloc(Jbig2Allocator *allocator, size_t size) { return malloc(size); }
128,264,347,617,606,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,161
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_default_free(Jbig2Allocator *allocator, void *p) { free(p); }
119,358,466,020,106,220,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,162
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_default_realloc(Jbig2Allocator *allocator, void *p, size_t size) { return realloc(p, size); }
240,229,970,288,126,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,163
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_error(Jbig2Ctx *ctx, Jbig2Severity severity, int32_t segment_number, const char *fmt, ...) { char buf[1024]; va_list ap; int n; int code; va_start(ap, fmt); n = vsnprintf(buf, sizeof(buf), fmt, ap); va_end(ap); if (n < 0 || n == sizeof(buf)) strncpy(buf, "jbig2_error: erro...
195,498,855,624,327,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,164
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_free(Jbig2Allocator *allocator, void *p) { allocator->free(allocator, p); }
264,313,529,897,637,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,165
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_get_int16(const byte *bptr) { return get_int16(bptr); }
140,496,427,547,154,020,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,166
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_get_int32(const byte *bptr) { return ((int32_t) get_int16(bptr) << 16) | get_uint16(bptr + 2); }
222,897,373,549,311,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,167
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_get_uint16(const byte *bptr) { return get_uint16(bptr); }
113,727,890,109,299,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,168
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_get_uint32(const byte *bptr) { return ((uint32_t) get_uint16(bptr) << 16) | get_uint16(bptr + 2); }
201,882,280,127,440,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,169
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_global_ctx_free(Jbig2GlobalCtx *global_ctx) { jbig2_ctx_free((Jbig2Ctx *) global_ctx); }
82,898,874,906,833,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601