idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
11,834
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashPath *Splash::makeDashedPath(SplashPath *path) { SplashPath *dPath; SplashCoord lineDashTotal; SplashCoord lineDashStartPhase, lineDashDist, segLen; SplashCoord x0, y0, x1, y1, xa, ya; GBool lineDashStartOn, lineDashOn, newPath; int lineDashStartIdx, lineDashIdx; int i, j, k; lineDashTotal = 0; ...
88,248,060,996,658,960,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,835
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashPath *Splash::makeStrokePath(SplashPath *path, GBool flatten) { SplashPath *pathIn, *pathOut; SplashCoord w, d, dx, dy, wdx, wdy, dxNext, dyNext, wdxNext, wdyNext; SplashCoord crossprod, dotprod, miter, m; GBool first, last, closed; int subpathStart, next, i; int left0, left1, left2, right0, right1, r...
86,000,409,344,513,740,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,836
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
inline void Splash::pipeIncX(SplashPipe *pipe) { ++pipe->x; if (state->softMask) { ++pipe->softMaskPtr; } switch (bitmap->mode) { case splashModeMono1: if (!(pipe->destColorMask >>= 1)) { pipe->destColorMask = 0x80; ++pipe->destColorPtr; } break; case splashModeMono8: ++pipe-...
14,296,923,385,789,374,000,000,000,000,000,000,000
Splash.cc
78,848,113,375,722,580,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,837
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
inline void Splash::pipeInit(SplashPipe *pipe, int x, int y, SplashPattern *pattern, SplashColorPtr cSrc, SplashCoord aInput, GBool usesShape, GBool nonIsolatedGroup) { pipeSetXY(pipe, x, y); pipe->pattern = NULL; if (pattern) { if (pattern->isStatic()) { pattern->getColor(x, y,...
159,922,125,480,731,900,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,838
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
inline void Splash::pipeSetXY(SplashPipe *pipe, int x, int y) { pipe->x = x; pipe->y = y; if (state->softMask) { pipe->softMaskPtr = &state->softMask->data[y * state->softMask->rowSize + x]; } switch (bitmap->mode) { case splashModeMono1: pipe->destColorPtr = &bitmap->data[y * bitmap->rowSiz...
36,373,996,578,061,240,000,000,000,000,000,000,000
Splash.cc
78,848,113,375,722,580,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,839
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashError Splash::restoreState() { SplashState *oldState; if (!state->next) { return splashErrNoSave; } oldState = state; state = state->next; delete oldState; return splashOk; }
191,945,892,238,815,880,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,840
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::saveState() { SplashState *newState; newState = state->copy(); newState->next = state; state = newState; }
31,886,546,540,723,920,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,841
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setBlendFunc(SplashBlendFunc func) { state->blendFunc = func; }
147,471,288,843,710,400,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,842
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setFillAlpha(SplashCoord alpha) { state->fillAlpha = alpha; }
301,800,440,859,542,900,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,843
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setFlatness(SplashCoord flatness) { if (flatness < 1) { state->flatness = 1; } else { state->flatness = flatness; } }
165,131,756,379,540,400,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,844
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setInNonIsolatedGroup(SplashBitmap *alpha0BitmapA, int alpha0XA, int alpha0YA) { alpha0Bitmap = alpha0BitmapA; alpha0X = alpha0XA; alpha0Y = alpha0YA; state->inNonIsolatedGroup = gTrue; }
153,802,814,772,855,310,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,845
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setLineCap(int lineCap) { state->lineCap = lineCap; }
230,265,990,436,766,100,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,846
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setLineDash(SplashCoord *lineDash, int lineDashLength, SplashCoord lineDashPhase) { state->setLineDash(lineDash, lineDashLength, lineDashPhase); }
75,164,341,005,425,020,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,847
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setLineWidth(SplashCoord lineWidth) { state->lineWidth = lineWidth; }
132,538,238,172,379,580,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,848
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setMatrix(SplashCoord *matrix) { memcpy(state->matrix, matrix, 6 * sizeof(SplashCoord)); }
330,330,999,593,770,860,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,849
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setMiterLimit(SplashCoord miterLimit) { state->miterLimit = miterLimit; }
68,932,454,016,672,895,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,850
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setScreen(SplashScreen *screen) { state->setScreen(screen); }
36,533,782,453,958,920,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,851
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setSoftMask(SplashBitmap *softMask) { state->setSoftMask(softMask); }
114,620,345,886,024,400,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,852
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setStrokeAdjust(GBool strokeAdjust) { state->strokeAdjust = strokeAdjust; }
276,111,082,441,053,420,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,853
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setStrokeAlpha(SplashCoord alpha) { state->strokeAlpha = alpha; }
307,400,608,459,041,360,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,854
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::setStrokePattern(SplashPattern *strokePattern) { state->setStrokePattern(strokePattern); }
105,562,664,655,747,970,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,855
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashError Splash::stroke(SplashPath *path) { SplashPath *path2, *dPath; if (debugMode) { printf("stroke [dash:%d] [width:%.2f]:\n", state->lineDashLength, (double)state->lineWidth); dumpPath(path); } opClipRes = splashClipAllOutside; if (path->length == 0) { return splashErrEmptyPath; } ...
171,903,303,592,689,030,000,000,000,000,000,000,000
Splash.cc
78,848,113,375,722,580,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,856
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::strokeNarrow(SplashPath *path) { SplashPipe pipe; SplashXPath *xPath; SplashXPathSeg *seg; int x0, x1, x2, x3, y0, y1, x, y, t; SplashCoord dx, dy, dxdy; SplashClipResult clipRes; int nClipRes[3]; int i; nClipRes[0] = nClipRes[1] = nClipRes[2] = 0; xPath = new SplashXPath(path, state-...
4,074,488,222,446,596,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,857
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void Splash::strokeWide(SplashPath *path) { SplashPath *path2; path2 = makeStrokePath(path, gFalse); fillWithPattern(path2, gFalse, state->strokePattern, state->strokeAlpha); delete path2; }
227,124,125,196,968,200,000,000,000,000,000,000,000
Splash.cc
78,848,113,375,722,580,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,858
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
inline void Splash::transform(SplashCoord *matrix, SplashCoord xi, SplashCoord yi, SplashCoord *xo, SplashCoord *yo) { *xo = xi * matrix[0] + yi * matrix[2] + matrix[4]; *yo = xi * matrix[1] + yi * matrix[3] + matrix[5]; }
184,701,872,749,877,500,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,859
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
inline void Splash::updateModX(int x) { if (x < modXMin) { modXMin = x; } if (x > modXMax) { modXMax = x; } }
137,815,396,482,762,900,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,860
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
inline void Splash::updateModY(int y) { if (y < modYMin) { modYMin = y; } if (y > modYMax) { modYMax = y; } }
208,117,186,804,662,360,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,861
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
Splash::~Splash() { while (state->next) { restoreState(); } delete state; if (vectorAntialias) { delete aaBuf; } }
174,418,230,808,922,700,000,000,000,000,000,000,000
Splash.cc
194,369,238,932,957,330,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,862
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
Guchar SplashBitmap::getAlpha(int x, int y) { return alpha[y * width + x]; }
207,580,560,695,459,900,000,000,000,000,000,000,000
SplashBitmap.cc
237,844,712,823,874,840,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,863
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
void SplashBitmap::getPixel(int x, int y, SplashColorPtr pixel) { SplashColorPtr p; if (y < 0 || y >= height || x < 0 || x >= width) { return; } switch (mode) { case splashModeMono1: p = &data[y * rowSize + (x >> 3)]; pixel[0] = (p[0] & (0x80 >> (x & 7))) ? 0xff : 0x00; break; case splashMo...
84,823,488,781,850,350,000,000,000,000,000,000,000
SplashBitmap.cc
237,844,712,823,874,840,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,864
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashError SplashBitmap::writePNMFile(char *fileName) { FILE *f; SplashError e; if (!(f = fopen(fileName, "wb"))) { return splashErrOpenFile; } e = this->writePNMFile(f); fclose(f); return e; }
220,484,713,321,913,030,000,000,000,000,000,000,000
SplashBitmap.cc
237,844,712,823,874,840,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,865
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashError SplashBitmap::writePNMFile(FILE *f) { SplashColorPtr row, p; int x, y; switch (mode) { case splashModeMono1: fprintf(f, "P4\n%d %d\n", width, height); row = data; for (y = 0; y < height; ++y) { p = row; for (x = 0; x < width; x += 8) { fputc(*p ^ 0xff, f); ++p; } ...
219,731,902,730,694,820,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,866
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashBitmap::~SplashBitmap() { if (rowSize < 0) { gfree(data + (height - 1) * rowSize); } else { gfree(data); } gfree(alpha); }
281,171,151,705,053,400,000,000,000,000,000,000,000
SplashBitmap.cc
237,844,712,823,874,840,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,867
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
GBool SplashFTFont::getGlyph(int c, int xFrac, int yFrac, SplashGlyphBitmap *bitmap, int x0, int y0, SplashClip *clip, SplashClipResult *clipRes) { return SplashFont::getGlyph(c, xFrac, 0, bitmap, x0, y0, clip, clipRes); }
115,630,052,649,730,020,000,000,000,000,000,000,000
SplashFTFont.cc
199,466,044,819,785,240,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,868
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
double SplashFTFont::getGlyphAdvance(int c) { SplashFTFontFile *ff; FT_Vector offset; FT_UInt gid; FT_Matrix identityMatrix; ff = (SplashFTFontFile *)fontFile; identityMatrix.xx = 65536; // 1 in 16.16 format identityMatrix.xy = 0; identityMatrix.yx = 0; identityMatrix.yy = 65536; // 1 in 16.16 forma...
67,871,971,198,538,870,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,869
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashPath *SplashFTFont::getGlyphPath(int c) { static FT_Outline_Funcs outlineFuncs = { #if FREETYPE_MINOR <= 1 (int (*)(FT_Vector *, void *))&glyphPathMoveTo, (int (*)(FT_Vector *, void *))&glyphPathLineTo, (int (*)(FT_Vector *, FT_Vector *, void *))&glyphPathConicTo, (int (*)(FT_Vector *, FT_Vector...
307,726,210,061,055,300,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,870
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
static int glyphPathConicTo(const FT_Vector *ctrl, const FT_Vector *pt, void *path) { SplashFTFontPath *p = (SplashFTFontPath *)path; SplashCoord x0, y0, x1, y1, x2, y2, x3, y3, xc, yc; if (!p->path->getCurPt(&x0, &y0)) { return 0; } xc = (SplashCoord)ctrl->x * p->textScale / 64.0; yc = (SplashC...
148,376,250,420,087,910,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,871
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
static int glyphPathLineTo(const FT_Vector *pt, void *path) { SplashFTFontPath *p = (SplashFTFontPath *)path; p->path->lineTo((SplashCoord)pt->x * p->textScale / 64.0, (SplashCoord)pt->y * p->textScale / 64.0); p->needClose = gTrue; return 0; }
128,316,937,912,033,300,000,000,000,000,000,000,000
SplashFTFont.cc
199,466,044,819,785,240,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,872
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
static int glyphPathMoveTo(const FT_Vector *pt, void *path) { SplashFTFontPath *p = (SplashFTFontPath *)path; if (p->needClose) { p->path->close(); p->needClose = gFalse; } p->path->moveTo((SplashCoord)pt->x * p->textScale / 64.0, (SplashCoord)pt->y * p->textScale / 64.0); return 0; }
2,224,360,542,294,480,000,000,000,000,000,000,000
SplashFTFont.cc
199,466,044,819,785,240,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,873
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
0
SplashFTFont::~SplashFTFont() { }
58,980,233,399,151,990,000,000,000,000,000,000,000
SplashFTFont.cc
199,466,044,819,785,240,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,874
poppler
284a92899602daa4a7f429e61849e794569310b5
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=284a92899602daa4a7f429e61849e794569310b5
Did a mistake in the gmalloc -> gmallocn commit, it's a 4 here not a 3
0
char *copyString(char *s) { char *s1; s1 = (char *)gmalloc(strlen(s) + 1); strcpy(s1, s); return s1; }
273,163,565,827,591,130,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,875
poppler
284a92899602daa4a7f429e61849e794569310b5
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=284a92899602daa4a7f429e61849e794569310b5
Did a mistake in the gmalloc -> gmallocn commit, it's a 4 here not a 3
0
void gMemReport(FILE *f) { GMemHdr *p; fprintf(f, "%d memory allocations in all\n", gMemIndex); if (gMemAlloc > 0) { fprintf(f, "%d memory blocks left allocated:\n", gMemAlloc); fprintf(f, " index size\n"); fprintf(f, "-------- --------\n"); for (p = gMemHead; p; p = p->next) { fprintf(...
179,933,766,916,516,030,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,876
poppler
284a92899602daa4a7f429e61849e794569310b5
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=284a92899602daa4a7f429e61849e794569310b5
Did a mistake in the gmalloc -> gmallocn commit, it's a 4 here not a 3
0
char *gstrndup(const char *s, size_t n) { char *s1 = (char*)gmalloc(n + 1); /* cannot return NULL for size > 0 */ s1[n] = '\0'; memcpy(s1, s, n); return s1; }
168,444,376,239,453,470,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
11,877
shibboleth
6182b0acf2df670e75423c2ed7afe6950ef11c9d
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d
None
0
pair<const EntityDescriptor*,const RoleDescriptor*> DynamicMetadataProvider::getEntityDescriptor(const Criteria& criteria) const { Category& log = Category::getInstance(SAML_LOGCAT ".MetadataProvider.Dynamic"); bool writeLocked = false; pair<const EntityDescriptor*,const RoleDescriptor*> entity = Abstract...
245,703,341,626,389,900,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16853
The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che...
https://nvd.nist.gov/vuln/detail/CVE-2017-16853
11,878
shibboleth
6182b0acf2df670e75423c2ed7afe6950ef11c9d
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d
None
0
const XMLObject* DynamicMetadataProvider::getMetadata() const { throw MetadataException("getMetadata operation not implemented on this provider."); }
321,304,436,941,987,460,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16853
The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che...
https://nvd.nist.gov/vuln/detail/CVE-2017-16853
11,879
shibboleth
6182b0acf2df670e75423c2ed7afe6950ef11c9d
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d
None
0
void DynamicMetadataProvider::init() { }
327,561,513,303,132,600,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16853
The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che...
https://nvd.nist.gov/vuln/detail/CVE-2017-16853
11,880
shibboleth
6182b0acf2df670e75423c2ed7afe6950ef11c9d
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d
None
0
Lockable* DynamicMetadataProvider::lock() { m_lock->rdlock(); return this; }
278,558,332,855,813,030,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16853
The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che...
https://nvd.nist.gov/vuln/detail/CVE-2017-16853
11,881
shibboleth
6182b0acf2df670e75423c2ed7afe6950ef11c9d
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d
None
0
EntityDescriptor* DynamicMetadataProvider::resolve(const Criteria& criteria) const { string name; if (criteria.entityID_ascii) { name = criteria.entityID_ascii; } else if (criteria.entityID_unicode) { auto_ptr_char temp(criteria.entityID_unicode); name = temp.get(); } els...
9,500,884,790,770,483,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16853
The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che...
https://nvd.nist.gov/vuln/detail/CVE-2017-16853
11,882
shibboleth
6182b0acf2df670e75423c2ed7afe6950ef11c9d
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d
None
0
void DynamicMetadataProvider::unlock() { m_lock->unlock(); }
250,155,342,306,252,640,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16853
The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che...
https://nvd.nist.gov/vuln/detail/CVE-2017-16853
11,883
shibboleth
6182b0acf2df670e75423c2ed7afe6950ef11c9d
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d
None
0
DynamicMetadataProvider::~DynamicMetadataProvider() { clearDescriptorIndex(true); if (m_cleanup_thread) { m_shutdown = true; m_cleanup_wait->signal(); m_cleanup_thread->join(nullptr); delete m_cleanup_thread; delete m_cleanup_wait; m_cleanup_thread = nullptr; ...
271,575,071,435,776,750,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16853
The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che...
https://nvd.nist.gov/vuln/detail/CVE-2017-16853
11,884
shibboleth
b66cceb0e992c351ad5e2c665229ede82f261b16
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=b66cceb0e992c351ad5e2c665229ede82f261b16
None
0
saml2md::MetadataProvider* SHIBSP_DLLLOCAL DynamicMetadataProviderFactory(const DOMElement* const & e) { return new DynamicMetadataProvider(e); }
217,788,948,376,924,830,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16852
shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other check...
https://nvd.nist.gov/vuln/detail/CVE-2017-16852
11,885
shibboleth
b66cceb0e992c351ad5e2c665229ede82f261b16
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=b66cceb0e992c351ad5e2c665229ede82f261b16
None
0
saml2md::EntityDescriptor* DynamicMetadataProvider::resolve(const saml2md::MetadataProvider::Criteria& criteria) const { #ifdef _DEBUG xmltooling::NDC("resolve"); #endif Category& log=Category::getInstance(SHIBSP_LOGCAT ".MetadataProvider.Dynamic"); string name; if (criteria.entityID_ascii) { n...
256,368,339,488,494,800,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16852
shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other check...
https://nvd.nist.gov/vuln/detail/CVE-2017-16852
11,886
shibboleth
b66cceb0e992c351ad5e2c665229ede82f261b16
https://git.shibboleth.net/view/?p=cpp-opensaml
https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=b66cceb0e992c351ad5e2c665229ede82f261b16
None
0
virtual ~DynamicMetadataProvider() {}
227,235,960,368,711,060,000,000,000,000,000,000,000
None
null
[ "CWE-347" ]
CVE-2017-16852
shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other check...
https://nvd.nist.gov/vuln/detail/CVE-2017-16852
11,887
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static __be32 *__xdr_inline_decode(struct xdr_stream *xdr, size_t nbytes) { __be32 *p = xdr->p; __be32 *q = p + XDR_QUADLEN(nbytes); if (q > xdr->end || q < p) return NULL; xdr->p = q; return p; }
233,065,251,648,475,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,888
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int decode_filename(struct xdr_stream *xdr, char *name, u32 *length) { __be32 *p; u32 count; p = xdr_inline_decode(xdr, 4); if (!p) goto out_overflow; count = ntoh32(net_read_uint32(p)); if (count > 255) goto out_nametoolong; p = xdr_inline_decode(xdr, count); if (!p) goto out_overflow; memcpy(na...
231,352,033,946,484,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,889
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static uint32_t *nfs_add_filename(uint32_t *p, uint32_t filename_len, const char *filename) { *p++ = hton32(filename_len); /* zero padding */ if (filename_len & 3) p[filename_len / 4] = 0; memcpy(p, filename, filename_len); p += DIV_ROUND_UP(filename_len, 4); return p; }
127,082,484,813,897,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,890
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static uint32_t *nfs_add_uint32(uint32_t *p, uint32_t val) { *p++ = hton32(val); return p; }
63,366,735,390,379,510,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,891
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static uint32_t *nfs_add_uint64(uint32_t *p, uint64_t val) { uint64_t nval = hton64(val); memcpy(p, &nval, 8); return p + 2; }
29,017,986,689,839,480,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,892
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static struct inode *nfs_alloc_inode(struct super_block *sb) { struct nfs_inode *node; node = xzalloc(sizeof(*node)); if (!node) return NULL; return &node->inode; }
268,861,505,658,563,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,893
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_close(struct device_d *dev, FILE *file) { struct file_priv *priv = file->priv; nfs_do_close(priv); return 0; }
202,905,033,130,912,260,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,894
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_fattr3_to_stat(uint32_t *p, struct inode *inode) { uint32_t mode; size_t i; if (!inode) return 0; /* offsetof(struct fattr3, type) = 0 */ switch (ntoh32(net_read_uint32(p + 0))) { case NF3REG: inode->i_mode = S_IFREG; break; case NF3DIR: inode->i_mode = S_IFDIR; break; case NF3BLK: ...
221,639,015,850,859,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,895
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static const char *nfs_get_link(struct dentry *dentry, struct inode *inode) { struct nfs_inode *ninode = nfsi(inode); struct nfs_priv *npriv = ninode->npriv; int ret; ret = nfs_readlink_req(npriv, &ninode->fh, &inode->i_link); if (ret) return ERR_PTR(ret); return inode->i_link; }
321,873,762,240,462,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,896
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_init(void) { rootnfsopts = xstrdup("v3,tcp"); globalvar_add_simple_string("linux.rootnfsopts", &rootnfsopts); return register_fs_driver(&nfs_driver); }
271,115,272,517,942,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,897
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_init_inode(struct nfs_priv *npriv, struct inode *inode, unsigned int mode) { struct nfs_inode *ninode = nfsi(inode); ninode->npriv = npriv; inode->i_ino = get_next_ino(); inode->i_mode = mode; switch (inode->i_mode & S_IFMT) { default: return -EINVAL; case S_IFREG: inode->i_op = &nfs_f...
62,355,229,576,207,790,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,898
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_iterate(struct file *file, struct dir_context *ctx) { struct dentry *dentry = file->f_path.dentry; struct inode *dir = d_inode(dentry); struct nfs_priv *npriv = nfsi(dir)->npriv; void *buf = NULL; struct nfs_dir *ndir; struct xdr_stream *xdr; int ret; uint32_t *p, len; ndir = xzalloc(sizeof(*nd...
242,698,931,901,695,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,899
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_lookup_req(struct nfs_priv *npriv, struct nfs_fh *fh, const char *filename, struct inode *inode) { struct nfs_inode *ninode = nfsi(inode); uint32_t data[1024]; uint32_t *p; int len; struct packet *nfs_packet; /* * struct LOOKUP3args { * diropargs3 what; * }; * * struct LOOKUP3resok...
245,532,982,720,186,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,900
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_mount_req(struct nfs_priv *npriv) { uint32_t data[1024]; uint32_t *p; int len; int pathlen; struct packet *nfs_packet; pathlen = strlen(npriv->path); debug("%s: %s\n", __func__, npriv->path); p = &(data[0]); p = rpc_add_credentials(p); *p++ = hton32(pathlen); if (pathlen & 3) *(p + pathl...
331,875,816,005,275,680,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,901
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_open(struct device_d *dev, FILE *file, const char *filename) { struct inode *inode = file->f_inode; struct nfs_inode *ninode = nfsi(inode); struct nfs_priv *npriv = ninode->npriv; struct file_priv *priv; priv = xzalloc(sizeof(*priv)); priv->fh = ninode->fh; priv->npriv = npriv; file->priv = priv...
161,059,901,228,751,380,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,902
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_probe(struct device_d *dev) { struct fs_device_d *fsdev = dev_to_fs_device(dev); struct nfs_priv *npriv = xzalloc(sizeof(struct nfs_priv)); struct super_block *sb = &fsdev->sb; char *tmp = xstrdup(fsdev->backingstore); char *path; struct inode *inode; int ret; dev->priv = npriv; debug("nfs: mo...
80,684,074,025,251,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,903
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_read(struct device_d *dev, FILE *file, void *buf, size_t insize) { struct file_priv *priv = file->priv; if (insize > 1024) insize = 1024; if (insize && !kfifo_len(priv->fifo)) { int ret = nfs_read_req(priv, file->pos, insize); if (ret) return ret; } return kfifo_get(priv->fifo, buf, insi...
198,562,974,233,193,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,904
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_read_req(struct file_priv *priv, uint64_t offset, uint32_t readlen) { uint32_t data[1024]; uint32_t *p; int len; struct packet *nfs_packet; uint32_t rlen, eof; /* * struct READ3args { * nfs_fh3 file; * offset3 offset; * count3 count; * }; * * struct READ3resok { * post_op_att...
134,039,819,511,446,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,905
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static void *nfs_readdirattr_req(struct nfs_priv *npriv, struct nfs_dir *dir) { uint32_t data[1024]; uint32_t *p; int len; struct packet *nfs_packet; void *buf; /* * struct READDIR3args { * nfs_fh3 dir; * cookie3 cookie; * cookieverf3 cookieverf; * count3 count; * }; * * struct entry3 { * ...
33,111,516,012,839,590,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,906
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static void nfs_remove(struct device_d *dev) { struct nfs_priv *npriv = dev->priv; nfs_umount_req(npriv); net_unregister(npriv->con); free(npriv->path); free(npriv); }
284,031,430,208,650,250,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,907
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static void nfs_set_fh(struct inode *inode, struct nfs_fh *fh) { struct nfs_inode *ninode = nfsi(inode); ninode->fh = *fh; }
58,378,847,057,308,960,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,908
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static void nfs_set_rootarg(struct nfs_priv *npriv, struct fs_device_d *fsdev) { char *str, *tmp; const char *bootargs; str = basprintf("root=/dev/nfs nfsroot=%pI4:%s%s%s", &npriv->server, npriv->path, rootnfsopts[0] ? "," : "", rootnfsopts); /* forward specific mount options on demand */ if (npriv->manual_...
76,552,307,264,996,820,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,909
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_truncate(struct device_d *dev, FILE *f, loff_t size) { return -ENOSYS; }
167,515,336,626,266,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,910
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static void nfs_umount_req(struct nfs_priv *npriv) { uint32_t data[1024]; uint32_t *p; int len; int pathlen; struct packet *nfs_packet; pathlen = strlen(npriv->path); p = &(data[0]); p = rpc_add_credentials(p); p = nfs_add_filename(p, pathlen, npriv->path); len = p - &(data[0]); nfs_packet = rpc_req(npr...
82,748,209,556,622,680,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,911
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int nfs_write(struct device_d *_dev, FILE *file, const void *inbuf, size_t insize) { return -ENOSYS; }
279,952,202,357,027,380,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,912
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static inline struct nfs_inode *nfsi(struct inode *inode) { return container_of(inode, struct nfs_inode, inode); }
121,329,833,098,091,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,913
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static uint32_t *rpc_add_credentials(uint32_t *p) { /* * *BSD refuses AUTH_NONE, so use AUTH_UNIX. An empty hostname is OK for * both Linux and *BSD. */ /* Provide an AUTH_UNIX credential. */ *p++ = hton32(1); /* AUTH_UNIX */ *p++ = hton32(20); /* auth length: 20 + strlen(hostname) */ *p++ = hton32(0); ...
246,397,334,779,844,030,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,914
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int rpc_check_reply(struct packet *pkt, int rpc_prog, uint32_t rpc_id, int *nfserr) { uint32_t *data; struct rpc_reply rpc; *nfserr = 0; if (!pkt) return -EAGAIN; memcpy(&rpc, pkt->data, sizeof(rpc)); if (ntoh32(rpc.id) != rpc_id) { if (rpc_id - ntoh32(rpc.id) == 1) /* stale packet, wait a...
68,859,461,336,354,030,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,915
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static int rpc_lookup_req(struct nfs_priv *npriv, uint32_t prog, uint32_t ver) { uint32_t data[16]; struct packet *nfs_packet; uint32_t port; data[0] = 0; data[1] = 0; /* auth credential */ data[2] = 0; data[3] = 0; /* auth verifier */ data[4] = hton32(prog); data[5] = hton32(ver); data[6] = hton32(17); /* IP_...
326,798,859,938,033,470,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,916
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static struct packet *rpc_req(struct nfs_priv *npriv, int rpc_prog, int rpc_proc, uint32_t *data, int datalen) { struct rpc_call pkt; unsigned short dport; int ret; unsigned char *payload = net_udp_get_payload(npriv->con); int nfserr; int tries = 0; npriv->rpc_id++; pkt.id = hton32(npriv->rpc_id); p...
71,434,467,066,008,010,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,917
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static void xdr_init(struct xdr_stream *stream, void *buf, int len) { stream->p = stream->buf = buf; stream->end = stream->buf + len; }
62,474,850,152,458,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,918
pengutronix
574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
None
0
static __be32 *xdr_inline_decode(struct xdr_stream *xdr, size_t nbytes) { __be32 *p; if (nbytes == 0) return xdr->p; if (xdr->p == xdr->end) return NULL; p = __xdr_inline_decode(xdr, nbytes); return p; }
214,492,938,239,788,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15938
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15938
11,919
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static void nfs_lookup_req(char *fname) { uint32_t data[1024]; uint32_t *p; int len; int fnamelen; fnamelen = strlen (fname); p = &(data[0]); p = rpc_add_credentials(p); memcpy (p, dirfh, NFS_FHSIZE); p += (NFS_FHSIZE / 4); *p++ = htonl(fnamelen); if (fnamelen & 3) *(p + fnamelen / 4) = 0; memcpy (p, f...
229,388,027,153,035,260,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,920
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static int nfs_mount_reply(unsigned char *pkt, unsigned len) { int ret; ret = rpc_check_reply(pkt, 1); if (ret) return ret; memcpy(dirfh, pkt + sizeof(struct rpc_reply) + 4, NFS_FHSIZE); return 0; }
208,931,578,812,008,920,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,921
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static void nfs_mount_req(char *path) { uint32_t data[1024]; uint32_t *p; int len; int pathlen; pathlen = strlen (path); p = &(data[0]); p = rpc_add_credentials(p); *p++ = htonl(pathlen); if (pathlen & 3) *(p + pathlen / 4) = 0; memcpy (p, path, pathlen); p += (pathlen + 3) / 4; len = p - &(data[0]); ...
63,151,979,744,923,880,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,922
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static void nfs_read_req(int offset, int readlen) { uint32_t data[1024]; uint32_t *p; int len; p = &(data[0]); p = rpc_add_credentials(p); memcpy (p, filefh, NFS_FHSIZE); p += (NFS_FHSIZE / 4); *p++ = htonl(offset); *p++ = htonl(readlen); *p++ = 0; len = p - &(data[0]); rpc_req(PROG_NFS, NFS_READ, data,...
139,608,681,964,795,410,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,923
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static void nfs_readlink_req(void) { uint32_t data[1024]; uint32_t *p; int len; p = &(data[0]); p = rpc_add_credentials(p); memcpy (p, filefh, NFS_FHSIZE); p += (NFS_FHSIZE / 4); len = p - &(data[0]); rpc_req(PROG_NFS, NFS_READLINK, data, len); }
184,989,573,467,561,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,924
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static void nfs_send(void) { debug("%s\n", __func__); switch (nfs_state) { case STATE_PRCLOOKUP_PROG_MOUNT_REQ: rpc_lookup_req(PROG_MOUNT, 1); break; case STATE_PRCLOOKUP_PROG_NFS_REQ: rpc_lookup_req(PROG_NFS, 2); break; case STATE_MOUNT_REQ: nfs_mount_req(nfs_path); break; case STATE_UMOUNT_REQ: n...
96,255,136,318,655,960,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,925
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static int nfs_umountall_reply(unsigned char *pkt, unsigned len) { int ret; ret = rpc_check_reply(pkt, 0); if (ret) return ret; memset(dirfh, 0, sizeof(dirfh)); return 0; }
117,262,003,008,172,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,926
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static void nfs_umountall_req(void) { uint32_t data[1024]; uint32_t *p; int len; if (nfs_server_mount_port < 0) /* Nothing mounted, nothing to umount */ return; p = &(data[0]); p = rpc_add_credentials(p); len = p - &(data[0]); rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len); }
159,565,096,898,999,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,927
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static uint32_t *rpc_add_credentials(uint32_t *p) { int hl; int hostnamelen = 0; /* Here's the executive summary on authentication requirements of the * various NFS server implementations: Linux accepts both AUTH_NONE * and AUTH_UNIX authentication (also accepts an empty hostname field * in the AUTH_UNIX sche...
5,186,934,943,151,252,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,928
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static int rpc_lookup_reply(int prog, unsigned char *pkt, unsigned len) { uint32_t port; int ret; ret = rpc_check_reply(pkt, 0); if (ret) return ret; port = net_read_uint32((uint32_t *)(pkt + sizeof(struct rpc_reply))); switch (prog) { case PROG_MOUNT: nfs_server_mount_port = ntohl(port); break; case PR...
30,532,075,050,965,066,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,929
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static void rpc_lookup_req(int prog, int ver) { uint32_t data[16]; data[0] = 0; data[1] = 0; /* auth credential */ data[2] = 0; data[3] = 0; /* auth verifier */ data[4] = htonl(prog); data[5] = htonl(ver); data[6] = htonl(17); /* IP_UDP */ data[7] = 0; rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8); }
46,118,774,964,237,510,000,000,000,000,000,000,000
nfs.c
114,322,917,047,956,380,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,930
pengutronix
84986ca024462058574432b5483f4bf9136c538d
https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d
None
0
static int rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen) { struct rpc_call pkt; unsigned long id; int sport; int ret; unsigned char *payload = net_udp_get_payload(nfs_con); id = ++rpc_id; pkt.id = htonl(id); pkt.type = htonl(MSG_CALL); pkt.rpcvers = htonl(2); /* use RPC version 2 */ pkt.pr...
292,489,349,805,107,140,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-15937
Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy.
https://nvd.nist.gov/vuln/detail/CVE-2019-15937
11,998
ghostscript
661e8d8fb8248c38d67958beda32f3a5876d0c3f
http://git.ghostscript.com/?p=mupdf
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=661e8d8fb8248c38d67958beda32f3a5876d0c3f
None
0
static void invalidate_stack_devices(i_ctx_t *i_ctx_p) { os_ptr op = osbot; while (op != ostop) { if (r_has_type(op, t_device)) op->value.pdevice = 0; op++; } }
229,119,428,316,359,630,000,000,000,000,000,000,000
zdevice.c
42,923,383,415,485,950,000,000,000,000,000,000,000
[]
CVE-2018-19409
An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
https://nvd.nist.gov/vuln/detail/CVE-2018-19409
11,999
ghostscript
661e8d8fb8248c38d67958beda32f3a5876d0c3f
http://git.ghostscript.com/?p=mupdf
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=661e8d8fb8248c38d67958beda32f3a5876d0c3f
None
0
zcopydevice2(i_ctx_t *i_ctx_p) { os_ptr op = osp; gx_device *new_dev; int code; check_read_type(op[-1], t_device); check_type(*op, t_boolean); if (op[-1].value.pdevice == NULL) /* This can happen if we invalidated devices on the stack by calling nulldevice after they were pushed */ ...
114,567,689,831,721,010,000,000,000,000,000,000,000
zdevice.c
42,923,383,415,485,950,000,000,000,000,000,000,000
[]
CVE-2018-19409
An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
https://nvd.nist.gov/vuln/detail/CVE-2018-19409
12,000
ghostscript
661e8d8fb8248c38d67958beda32f3a5876d0c3f
http://git.ghostscript.com/?p=mupdf
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=661e8d8fb8248c38d67958beda32f3a5876d0c3f
None
0
zcurrentdevice(i_ctx_t *i_ctx_p) { os_ptr op = osp; gx_device *dev = gs_currentdevice(igs); gs_ref_memory_t *mem = (gs_ref_memory_t *) dev->memory; push(1); make_tav(op, t_device, (mem == 0 ? avm_foreign : imemory_space(mem)) | a_all, pdevice, dev); return 0; }
49,910,706,268,464,585,000,000,000,000,000,000,000
zdevice.c
42,923,383,415,485,950,000,000,000,000,000,000,000
[]
CVE-2018-19409
An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
https://nvd.nist.gov/vuln/detail/CVE-2018-19409