idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
11,834 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashPath *Splash::makeDashedPath(SplashPath *path) {
SplashPath *dPath;
SplashCoord lineDashTotal;
SplashCoord lineDashStartPhase, lineDashDist, segLen;
SplashCoord x0, y0, x1, y1, xa, ya;
GBool lineDashStartOn, lineDashOn, newPath;
int lineDashStartIdx, lineDashIdx;
int i, j, k;
lineDashTotal = 0;
... | 88,248,060,996,658,960,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,835 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashPath *Splash::makeStrokePath(SplashPath *path, GBool flatten) {
SplashPath *pathIn, *pathOut;
SplashCoord w, d, dx, dy, wdx, wdy, dxNext, dyNext, wdxNext, wdyNext;
SplashCoord crossprod, dotprod, miter, m;
GBool first, last, closed;
int subpathStart, next, i;
int left0, left1, left2, right0, right1, r... | 86,000,409,344,513,740,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,836 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | inline void Splash::pipeIncX(SplashPipe *pipe) {
++pipe->x;
if (state->softMask) {
++pipe->softMaskPtr;
}
switch (bitmap->mode) {
case splashModeMono1:
if (!(pipe->destColorMask >>= 1)) {
pipe->destColorMask = 0x80;
++pipe->destColorPtr;
}
break;
case splashModeMono8:
++pipe-... | 14,296,923,385,789,374,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,837 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | inline void Splash::pipeInit(SplashPipe *pipe, int x, int y,
SplashPattern *pattern, SplashColorPtr cSrc,
SplashCoord aInput, GBool usesShape,
GBool nonIsolatedGroup) {
pipeSetXY(pipe, x, y);
pipe->pattern = NULL;
if (pattern) {
if (pattern->isStatic()) {
pattern->getColor(x, y,... | 159,922,125,480,731,900,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,838 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | inline void Splash::pipeSetXY(SplashPipe *pipe, int x, int y) {
pipe->x = x;
pipe->y = y;
if (state->softMask) {
pipe->softMaskPtr =
&state->softMask->data[y * state->softMask->rowSize + x];
}
switch (bitmap->mode) {
case splashModeMono1:
pipe->destColorPtr = &bitmap->data[y * bitmap->rowSiz... | 36,373,996,578,061,240,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,839 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashError Splash::restoreState() {
SplashState *oldState;
if (!state->next) {
return splashErrNoSave;
}
oldState = state;
state = state->next;
delete oldState;
return splashOk;
}
| 191,945,892,238,815,880,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,840 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::saveState() {
SplashState *newState;
newState = state->copy();
newState->next = state;
state = newState;
}
| 31,886,546,540,723,920,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,841 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setBlendFunc(SplashBlendFunc func) {
state->blendFunc = func;
}
| 147,471,288,843,710,400,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,842 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setFillAlpha(SplashCoord alpha) {
state->fillAlpha = alpha;
}
| 301,800,440,859,542,900,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,843 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setFlatness(SplashCoord flatness) {
if (flatness < 1) {
state->flatness = 1;
} else {
state->flatness = flatness;
}
}
| 165,131,756,379,540,400,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,844 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setInNonIsolatedGroup(SplashBitmap *alpha0BitmapA,
int alpha0XA, int alpha0YA) {
alpha0Bitmap = alpha0BitmapA;
alpha0X = alpha0XA;
alpha0Y = alpha0YA;
state->inNonIsolatedGroup = gTrue;
}
| 153,802,814,772,855,310,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,845 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setLineCap(int lineCap) {
state->lineCap = lineCap;
}
| 230,265,990,436,766,100,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,846 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setLineDash(SplashCoord *lineDash, int lineDashLength,
SplashCoord lineDashPhase) {
state->setLineDash(lineDash, lineDashLength, lineDashPhase);
}
| 75,164,341,005,425,020,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,847 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setLineWidth(SplashCoord lineWidth) {
state->lineWidth = lineWidth;
}
| 132,538,238,172,379,580,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,848 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setMatrix(SplashCoord *matrix) {
memcpy(state->matrix, matrix, 6 * sizeof(SplashCoord));
}
| 330,330,999,593,770,860,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,849 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setMiterLimit(SplashCoord miterLimit) {
state->miterLimit = miterLimit;
}
| 68,932,454,016,672,895,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,850 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setScreen(SplashScreen *screen) {
state->setScreen(screen);
}
| 36,533,782,453,958,920,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,851 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setSoftMask(SplashBitmap *softMask) {
state->setSoftMask(softMask);
}
| 114,620,345,886,024,400,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,852 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setStrokeAdjust(GBool strokeAdjust) {
state->strokeAdjust = strokeAdjust;
}
| 276,111,082,441,053,420,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,853 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setStrokeAlpha(SplashCoord alpha) {
state->strokeAlpha = alpha;
}
| 307,400,608,459,041,360,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,854 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::setStrokePattern(SplashPattern *strokePattern) {
state->setStrokePattern(strokePattern);
}
| 105,562,664,655,747,970,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,855 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashError Splash::stroke(SplashPath *path) {
SplashPath *path2, *dPath;
if (debugMode) {
printf("stroke [dash:%d] [width:%.2f]:\n",
state->lineDashLength, (double)state->lineWidth);
dumpPath(path);
}
opClipRes = splashClipAllOutside;
if (path->length == 0) {
return splashErrEmptyPath;
}
... | 171,903,303,592,689,030,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,856 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::strokeNarrow(SplashPath *path) {
SplashPipe pipe;
SplashXPath *xPath;
SplashXPathSeg *seg;
int x0, x1, x2, x3, y0, y1, x, y, t;
SplashCoord dx, dy, dxdy;
SplashClipResult clipRes;
int nClipRes[3];
int i;
nClipRes[0] = nClipRes[1] = nClipRes[2] = 0;
xPath = new SplashXPath(path, state-... | 4,074,488,222,446,596,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,857 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void Splash::strokeWide(SplashPath *path) {
SplashPath *path2;
path2 = makeStrokePath(path, gFalse);
fillWithPattern(path2, gFalse, state->strokePattern, state->strokeAlpha);
delete path2;
}
| 227,124,125,196,968,200,000,000,000,000,000,000,000 | Splash.cc | 78,848,113,375,722,580,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,858 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | inline void Splash::transform(SplashCoord *matrix,
SplashCoord xi, SplashCoord yi,
SplashCoord *xo, SplashCoord *yo) {
*xo = xi * matrix[0] + yi * matrix[2] + matrix[4];
*yo = xi * matrix[1] + yi * matrix[3] + matrix[5];
}
| 184,701,872,749,877,500,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,859 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | inline void Splash::updateModX(int x) {
if (x < modXMin) {
modXMin = x;
}
if (x > modXMax) {
modXMax = x;
}
}
| 137,815,396,482,762,900,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,860 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | inline void Splash::updateModY(int y) {
if (y < modYMin) {
modYMin = y;
}
if (y > modYMax) {
modYMax = y;
}
}
| 208,117,186,804,662,360,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,861 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | Splash::~Splash() {
while (state->next) {
restoreState();
}
delete state;
if (vectorAntialias) {
delete aaBuf;
}
}
| 174,418,230,808,922,700,000,000,000,000,000,000,000 | Splash.cc | 194,369,238,932,957,330,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,862 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | Guchar SplashBitmap::getAlpha(int x, int y) {
return alpha[y * width + x];
}
| 207,580,560,695,459,900,000,000,000,000,000,000,000 | SplashBitmap.cc | 237,844,712,823,874,840,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,863 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | void SplashBitmap::getPixel(int x, int y, SplashColorPtr pixel) {
SplashColorPtr p;
if (y < 0 || y >= height || x < 0 || x >= width) {
return;
}
switch (mode) {
case splashModeMono1:
p = &data[y * rowSize + (x >> 3)];
pixel[0] = (p[0] & (0x80 >> (x & 7))) ? 0xff : 0x00;
break;
case splashMo... | 84,823,488,781,850,350,000,000,000,000,000,000,000 | SplashBitmap.cc | 237,844,712,823,874,840,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,864 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashError SplashBitmap::writePNMFile(char *fileName) {
FILE *f;
SplashError e;
if (!(f = fopen(fileName, "wb"))) {
return splashErrOpenFile;
}
e = this->writePNMFile(f);
fclose(f);
return e;
}
| 220,484,713,321,913,030,000,000,000,000,000,000,000 | SplashBitmap.cc | 237,844,712,823,874,840,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,865 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashError SplashBitmap::writePNMFile(FILE *f) {
SplashColorPtr row, p;
int x, y;
switch (mode) {
case splashModeMono1:
fprintf(f, "P4\n%d %d\n", width, height);
row = data;
for (y = 0; y < height; ++y) {
p = row;
for (x = 0; x < width; x += 8) {
fputc(*p ^ 0xff, f);
++p;
}
... | 219,731,902,730,694,820,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,866 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashBitmap::~SplashBitmap() {
if (rowSize < 0) {
gfree(data + (height - 1) * rowSize);
} else {
gfree(data);
}
gfree(alpha);
}
| 281,171,151,705,053,400,000,000,000,000,000,000,000 | SplashBitmap.cc | 237,844,712,823,874,840,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,867 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | GBool SplashFTFont::getGlyph(int c, int xFrac, int yFrac,
SplashGlyphBitmap *bitmap, int x0, int y0, SplashClip *clip, SplashClipResult *clipRes) {
return SplashFont::getGlyph(c, xFrac, 0, bitmap, x0, y0, clip, clipRes);
}
| 115,630,052,649,730,020,000,000,000,000,000,000,000 | SplashFTFont.cc | 199,466,044,819,785,240,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,868 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | double SplashFTFont::getGlyphAdvance(int c)
{
SplashFTFontFile *ff;
FT_Vector offset;
FT_UInt gid;
FT_Matrix identityMatrix;
ff = (SplashFTFontFile *)fontFile;
identityMatrix.xx = 65536; // 1 in 16.16 format
identityMatrix.xy = 0;
identityMatrix.yx = 0;
identityMatrix.yy = 65536; // 1 in 16.16 forma... | 67,871,971,198,538,870,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,869 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashPath *SplashFTFont::getGlyphPath(int c) {
static FT_Outline_Funcs outlineFuncs = {
#if FREETYPE_MINOR <= 1
(int (*)(FT_Vector *, void *))&glyphPathMoveTo,
(int (*)(FT_Vector *, void *))&glyphPathLineTo,
(int (*)(FT_Vector *, FT_Vector *, void *))&glyphPathConicTo,
(int (*)(FT_Vector *, FT_Vector... | 307,726,210,061,055,300,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,870 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | static int glyphPathConicTo(const FT_Vector *ctrl, const FT_Vector *pt,
void *path) {
SplashFTFontPath *p = (SplashFTFontPath *)path;
SplashCoord x0, y0, x1, y1, x2, y2, x3, y3, xc, yc;
if (!p->path->getCurPt(&x0, &y0)) {
return 0;
}
xc = (SplashCoord)ctrl->x * p->textScale / 64.0;
yc = (SplashC... | 148,376,250,420,087,910,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,871 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | static int glyphPathLineTo(const FT_Vector *pt, void *path) {
SplashFTFontPath *p = (SplashFTFontPath *)path;
p->path->lineTo((SplashCoord)pt->x * p->textScale / 64.0,
(SplashCoord)pt->y * p->textScale / 64.0);
p->needClose = gTrue;
return 0;
}
| 128,316,937,912,033,300,000,000,000,000,000,000,000 | SplashFTFont.cc | 199,466,044,819,785,240,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,872 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | static int glyphPathMoveTo(const FT_Vector *pt, void *path) {
SplashFTFontPath *p = (SplashFTFontPath *)path;
if (p->needClose) {
p->path->close();
p->needClose = gFalse;
}
p->path->moveTo((SplashCoord)pt->x * p->textScale / 64.0,
(SplashCoord)pt->y * p->textScale / 64.0);
return 0;
}
| 2,224,360,542,294,480,000,000,000,000,000,000,000 | SplashFTFont.cc | 199,466,044,819,785,240,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,873 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashFTFont::~SplashFTFont() {
}
| 58,980,233,399,151,990,000,000,000,000,000,000,000 | SplashFTFont.cc | 199,466,044,819,785,240,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,874 | poppler | 284a92899602daa4a7f429e61849e794569310b5 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=284a92899602daa4a7f429e61849e794569310b5 | Did a mistake in the gmalloc -> gmallocn commit, it's a 4 here not a 3 | 0 | char *copyString(char *s) {
char *s1;
s1 = (char *)gmalloc(strlen(s) + 1);
strcpy(s1, s);
return s1;
}
| 273,163,565,827,591,130,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,875 | poppler | 284a92899602daa4a7f429e61849e794569310b5 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=284a92899602daa4a7f429e61849e794569310b5 | Did a mistake in the gmalloc -> gmallocn commit, it's a 4 here not a 3 | 0 | void gMemReport(FILE *f) {
GMemHdr *p;
fprintf(f, "%d memory allocations in all\n", gMemIndex);
if (gMemAlloc > 0) {
fprintf(f, "%d memory blocks left allocated:\n", gMemAlloc);
fprintf(f, " index size\n");
fprintf(f, "-------- --------\n");
for (p = gMemHead; p; p = p->next) {
fprintf(... | 179,933,766,916,516,030,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,876 | poppler | 284a92899602daa4a7f429e61849e794569310b5 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=284a92899602daa4a7f429e61849e794569310b5 | Did a mistake in the gmalloc -> gmallocn commit, it's a 4 here not a 3 | 0 | char *gstrndup(const char *s, size_t n) {
char *s1 = (char*)gmalloc(n + 1); /* cannot return NULL for size > 0 */
s1[n] = '\0';
memcpy(s1, s, n);
return s1;
}
| 168,444,376,239,453,470,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
11,877 | shibboleth | 6182b0acf2df670e75423c2ed7afe6950ef11c9d | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d | None | 0 | pair<const EntityDescriptor*,const RoleDescriptor*> DynamicMetadataProvider::getEntityDescriptor(const Criteria& criteria) const
{
Category& log = Category::getInstance(SAML_LOGCAT ".MetadataProvider.Dynamic");
bool writeLocked = false;
pair<const EntityDescriptor*,const RoleDescriptor*> entity = Abstract... | 245,703,341,626,389,900,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16853 | The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che... | https://nvd.nist.gov/vuln/detail/CVE-2017-16853 |
11,878 | shibboleth | 6182b0acf2df670e75423c2ed7afe6950ef11c9d | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d | None | 0 | const XMLObject* DynamicMetadataProvider::getMetadata() const
{
throw MetadataException("getMetadata operation not implemented on this provider.");
}
| 321,304,436,941,987,460,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16853 | The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che... | https://nvd.nist.gov/vuln/detail/CVE-2017-16853 |
11,879 | shibboleth | 6182b0acf2df670e75423c2ed7afe6950ef11c9d | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d | None | 0 | void DynamicMetadataProvider::init()
{
}
| 327,561,513,303,132,600,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16853 | The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che... | https://nvd.nist.gov/vuln/detail/CVE-2017-16853 |
11,880 | shibboleth | 6182b0acf2df670e75423c2ed7afe6950ef11c9d | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d | None | 0 | Lockable* DynamicMetadataProvider::lock()
{
m_lock->rdlock();
return this;
}
| 278,558,332,855,813,030,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16853 | The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che... | https://nvd.nist.gov/vuln/detail/CVE-2017-16853 |
11,881 | shibboleth | 6182b0acf2df670e75423c2ed7afe6950ef11c9d | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d | None | 0 | EntityDescriptor* DynamicMetadataProvider::resolve(const Criteria& criteria) const
{
string name;
if (criteria.entityID_ascii) {
name = criteria.entityID_ascii;
}
else if (criteria.entityID_unicode) {
auto_ptr_char temp(criteria.entityID_unicode);
name = temp.get();
}
els... | 9,500,884,790,770,483,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16853 | The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che... | https://nvd.nist.gov/vuln/detail/CVE-2017-16853 |
11,882 | shibboleth | 6182b0acf2df670e75423c2ed7afe6950ef11c9d | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d | None | 0 | void DynamicMetadataProvider::unlock()
{
m_lock->unlock();
}
| 250,155,342,306,252,640,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16853 | The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che... | https://nvd.nist.gov/vuln/detail/CVE-2017-16853 |
11,883 | shibboleth | 6182b0acf2df670e75423c2ed7afe6950ef11c9d | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d | None | 0 | DynamicMetadataProvider::~DynamicMetadataProvider()
{
clearDescriptorIndex(true);
if (m_cleanup_thread) {
m_shutdown = true;
m_cleanup_wait->signal();
m_cleanup_thread->join(nullptr);
delete m_cleanup_thread;
delete m_cleanup_wait;
m_cleanup_thread = nullptr;
... | 271,575,071,435,776,750,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16853 | The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other che... | https://nvd.nist.gov/vuln/detail/CVE-2017-16853 |
11,884 | shibboleth | b66cceb0e992c351ad5e2c665229ede82f261b16 | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=b66cceb0e992c351ad5e2c665229ede82f261b16 | None | 0 | saml2md::MetadataProvider* SHIBSP_DLLLOCAL DynamicMetadataProviderFactory(const DOMElement* const & e)
{
return new DynamicMetadataProvider(e);
}
| 217,788,948,376,924,830,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16852 | shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other check... | https://nvd.nist.gov/vuln/detail/CVE-2017-16852 |
11,885 | shibboleth | b66cceb0e992c351ad5e2c665229ede82f261b16 | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=b66cceb0e992c351ad5e2c665229ede82f261b16 | None | 0 | saml2md::EntityDescriptor* DynamicMetadataProvider::resolve(const saml2md::MetadataProvider::Criteria& criteria) const
{
#ifdef _DEBUG
xmltooling::NDC("resolve");
#endif
Category& log=Category::getInstance(SHIBSP_LOGCAT ".MetadataProvider.Dynamic");
string name;
if (criteria.entityID_ascii) {
n... | 256,368,339,488,494,800,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16852 | shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other check... | https://nvd.nist.gov/vuln/detail/CVE-2017-16852 |
11,886 | shibboleth | b66cceb0e992c351ad5e2c665229ede82f261b16 | https://git.shibboleth.net/view/?p=cpp-opensaml | https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=b66cceb0e992c351ad5e2c665229ede82f261b16 | None | 0 | virtual ~DynamicMetadataProvider() {}
| 227,235,960,368,711,060,000,000,000,000,000,000,000 | None | null | [
"CWE-347"
] | CVE-2017-16852 | shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other check... | https://nvd.nist.gov/vuln/detail/CVE-2017-16852 |
11,887 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static __be32 *__xdr_inline_decode(struct xdr_stream *xdr, size_t nbytes)
{
__be32 *p = xdr->p;
__be32 *q = p + XDR_QUADLEN(nbytes);
if (q > xdr->end || q < p)
return NULL;
xdr->p = q;
return p;
}
| 233,065,251,648,475,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,888 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int decode_filename(struct xdr_stream *xdr, char *name, u32 *length)
{
__be32 *p;
u32 count;
p = xdr_inline_decode(xdr, 4);
if (!p)
goto out_overflow;
count = ntoh32(net_read_uint32(p));
if (count > 255)
goto out_nametoolong;
p = xdr_inline_decode(xdr, count);
if (!p)
goto out_overflow;
memcpy(na... | 231,352,033,946,484,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,889 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static uint32_t *nfs_add_filename(uint32_t *p,
uint32_t filename_len, const char *filename)
{
*p++ = hton32(filename_len);
/* zero padding */
if (filename_len & 3)
p[filename_len / 4] = 0;
memcpy(p, filename, filename_len);
p += DIV_ROUND_UP(filename_len, 4);
return p;
}
| 127,082,484,813,897,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,890 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static uint32_t *nfs_add_uint32(uint32_t *p, uint32_t val)
{
*p++ = hton32(val);
return p;
}
| 63,366,735,390,379,510,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,891 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static uint32_t *nfs_add_uint64(uint32_t *p, uint64_t val)
{
uint64_t nval = hton64(val);
memcpy(p, &nval, 8);
return p + 2;
}
| 29,017,986,689,839,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,892 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static struct inode *nfs_alloc_inode(struct super_block *sb)
{
struct nfs_inode *node;
node = xzalloc(sizeof(*node));
if (!node)
return NULL;
return &node->inode;
}
| 268,861,505,658,563,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,893 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_close(struct device_d *dev, FILE *file)
{
struct file_priv *priv = file->priv;
nfs_do_close(priv);
return 0;
}
| 202,905,033,130,912,260,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,894 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_fattr3_to_stat(uint32_t *p, struct inode *inode)
{
uint32_t mode;
size_t i;
if (!inode)
return 0;
/* offsetof(struct fattr3, type) = 0 */
switch (ntoh32(net_read_uint32(p + 0))) {
case NF3REG:
inode->i_mode = S_IFREG;
break;
case NF3DIR:
inode->i_mode = S_IFDIR;
break;
case NF3BLK:
... | 221,639,015,850,859,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,895 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static const char *nfs_get_link(struct dentry *dentry, struct inode *inode)
{
struct nfs_inode *ninode = nfsi(inode);
struct nfs_priv *npriv = ninode->npriv;
int ret;
ret = nfs_readlink_req(npriv, &ninode->fh, &inode->i_link);
if (ret)
return ERR_PTR(ret);
return inode->i_link;
}
| 321,873,762,240,462,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,896 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_init(void)
{
rootnfsopts = xstrdup("v3,tcp");
globalvar_add_simple_string("linux.rootnfsopts", &rootnfsopts);
return register_fs_driver(&nfs_driver);
}
| 271,115,272,517,942,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,897 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_init_inode(struct nfs_priv *npriv, struct inode *inode,
unsigned int mode)
{
struct nfs_inode *ninode = nfsi(inode);
ninode->npriv = npriv;
inode->i_ino = get_next_ino();
inode->i_mode = mode;
switch (inode->i_mode & S_IFMT) {
default:
return -EINVAL;
case S_IFREG:
inode->i_op = &nfs_f... | 62,355,229,576,207,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,898 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_iterate(struct file *file, struct dir_context *ctx)
{
struct dentry *dentry = file->f_path.dentry;
struct inode *dir = d_inode(dentry);
struct nfs_priv *npriv = nfsi(dir)->npriv;
void *buf = NULL;
struct nfs_dir *ndir;
struct xdr_stream *xdr;
int ret;
uint32_t *p, len;
ndir = xzalloc(sizeof(*nd... | 242,698,931,901,695,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,899 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_lookup_req(struct nfs_priv *npriv, struct nfs_fh *fh,
const char *filename, struct inode *inode)
{
struct nfs_inode *ninode = nfsi(inode);
uint32_t data[1024];
uint32_t *p;
int len;
struct packet *nfs_packet;
/*
* struct LOOKUP3args {
* diropargs3 what;
* };
*
* struct LOOKUP3resok... | 245,532,982,720,186,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,900 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_mount_req(struct nfs_priv *npriv)
{
uint32_t data[1024];
uint32_t *p;
int len;
int pathlen;
struct packet *nfs_packet;
pathlen = strlen(npriv->path);
debug("%s: %s\n", __func__, npriv->path);
p = &(data[0]);
p = rpc_add_credentials(p);
*p++ = hton32(pathlen);
if (pathlen & 3)
*(p + pathl... | 331,875,816,005,275,680,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,901 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_open(struct device_d *dev, FILE *file, const char *filename)
{
struct inode *inode = file->f_inode;
struct nfs_inode *ninode = nfsi(inode);
struct nfs_priv *npriv = ninode->npriv;
struct file_priv *priv;
priv = xzalloc(sizeof(*priv));
priv->fh = ninode->fh;
priv->npriv = npriv;
file->priv = priv... | 161,059,901,228,751,380,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,902 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_probe(struct device_d *dev)
{
struct fs_device_d *fsdev = dev_to_fs_device(dev);
struct nfs_priv *npriv = xzalloc(sizeof(struct nfs_priv));
struct super_block *sb = &fsdev->sb;
char *tmp = xstrdup(fsdev->backingstore);
char *path;
struct inode *inode;
int ret;
dev->priv = npriv;
debug("nfs: mo... | 80,684,074,025,251,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,903 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_read(struct device_d *dev, FILE *file, void *buf, size_t insize)
{
struct file_priv *priv = file->priv;
if (insize > 1024)
insize = 1024;
if (insize && !kfifo_len(priv->fifo)) {
int ret = nfs_read_req(priv, file->pos, insize);
if (ret)
return ret;
}
return kfifo_get(priv->fifo, buf, insi... | 198,562,974,233,193,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,904 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_read_req(struct file_priv *priv, uint64_t offset,
uint32_t readlen)
{
uint32_t data[1024];
uint32_t *p;
int len;
struct packet *nfs_packet;
uint32_t rlen, eof;
/*
* struct READ3args {
* nfs_fh3 file;
* offset3 offset;
* count3 count;
* };
*
* struct READ3resok {
* post_op_att... | 134,039,819,511,446,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,905 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static void *nfs_readdirattr_req(struct nfs_priv *npriv, struct nfs_dir *dir)
{
uint32_t data[1024];
uint32_t *p;
int len;
struct packet *nfs_packet;
void *buf;
/*
* struct READDIR3args {
* nfs_fh3 dir;
* cookie3 cookie;
* cookieverf3 cookieverf;
* count3 count;
* };
*
* struct entry3 {
* ... | 33,111,516,012,839,590,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,906 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static void nfs_remove(struct device_d *dev)
{
struct nfs_priv *npriv = dev->priv;
nfs_umount_req(npriv);
net_unregister(npriv->con);
free(npriv->path);
free(npriv);
}
| 284,031,430,208,650,250,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,907 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static void nfs_set_fh(struct inode *inode, struct nfs_fh *fh)
{
struct nfs_inode *ninode = nfsi(inode);
ninode->fh = *fh;
}
| 58,378,847,057,308,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,908 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static void nfs_set_rootarg(struct nfs_priv *npriv, struct fs_device_d *fsdev)
{
char *str, *tmp;
const char *bootargs;
str = basprintf("root=/dev/nfs nfsroot=%pI4:%s%s%s", &npriv->server, npriv->path,
rootnfsopts[0] ? "," : "", rootnfsopts);
/* forward specific mount options on demand */
if (npriv->manual_... | 76,552,307,264,996,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,909 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_truncate(struct device_d *dev, FILE *f, loff_t size)
{
return -ENOSYS;
}
| 167,515,336,626,266,230,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,910 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static void nfs_umount_req(struct nfs_priv *npriv)
{
uint32_t data[1024];
uint32_t *p;
int len;
int pathlen;
struct packet *nfs_packet;
pathlen = strlen(npriv->path);
p = &(data[0]);
p = rpc_add_credentials(p);
p = nfs_add_filename(p, pathlen, npriv->path);
len = p - &(data[0]);
nfs_packet = rpc_req(npr... | 82,748,209,556,622,680,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,911 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int nfs_write(struct device_d *_dev, FILE *file, const void *inbuf,
size_t insize)
{
return -ENOSYS;
}
| 279,952,202,357,027,380,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,912 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static inline struct nfs_inode *nfsi(struct inode *inode)
{
return container_of(inode, struct nfs_inode, inode);
}
| 121,329,833,098,091,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,913 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static uint32_t *rpc_add_credentials(uint32_t *p)
{
/*
* *BSD refuses AUTH_NONE, so use AUTH_UNIX. An empty hostname is OK for
* both Linux and *BSD.
*/
/* Provide an AUTH_UNIX credential. */
*p++ = hton32(1); /* AUTH_UNIX */
*p++ = hton32(20); /* auth length: 20 + strlen(hostname) */
*p++ = hton32(0); ... | 246,397,334,779,844,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,914 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int rpc_check_reply(struct packet *pkt, int rpc_prog,
uint32_t rpc_id, int *nfserr)
{
uint32_t *data;
struct rpc_reply rpc;
*nfserr = 0;
if (!pkt)
return -EAGAIN;
memcpy(&rpc, pkt->data, sizeof(rpc));
if (ntoh32(rpc.id) != rpc_id) {
if (rpc_id - ntoh32(rpc.id) == 1)
/* stale packet, wait a... | 68,859,461,336,354,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,915 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static int rpc_lookup_req(struct nfs_priv *npriv, uint32_t prog, uint32_t ver)
{
uint32_t data[16];
struct packet *nfs_packet;
uint32_t port;
data[0] = 0; data[1] = 0; /* auth credential */
data[2] = 0; data[3] = 0; /* auth verifier */
data[4] = hton32(prog);
data[5] = hton32(ver);
data[6] = hton32(17); /* IP_... | 326,798,859,938,033,470,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,916 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static struct packet *rpc_req(struct nfs_priv *npriv, int rpc_prog,
int rpc_proc, uint32_t *data, int datalen)
{
struct rpc_call pkt;
unsigned short dport;
int ret;
unsigned char *payload = net_udp_get_payload(npriv->con);
int nfserr;
int tries = 0;
npriv->rpc_id++;
pkt.id = hton32(npriv->rpc_id);
p... | 71,434,467,066,008,010,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,917 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static void xdr_init(struct xdr_stream *stream, void *buf, int len)
{
stream->p = stream->buf = buf;
stream->end = stream->buf + len;
}
| 62,474,850,152,458,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,918 | pengutronix | 574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | None | 0 | static __be32 *xdr_inline_decode(struct xdr_stream *xdr, size_t nbytes)
{
__be32 *p;
if (nbytes == 0)
return xdr->p;
if (xdr->p == xdr->end)
return NULL;
p = __xdr_inline_decode(xdr, nbytes);
return p;
}
| 214,492,938,239,788,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15938 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_req in fs/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15938 |
11,919 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static void nfs_lookup_req(char *fname)
{
uint32_t data[1024];
uint32_t *p;
int len;
int fnamelen;
fnamelen = strlen (fname);
p = &(data[0]);
p = rpc_add_credentials(p);
memcpy (p, dirfh, NFS_FHSIZE);
p += (NFS_FHSIZE / 4);
*p++ = htonl(fnamelen);
if (fnamelen & 3)
*(p + fnamelen / 4) = 0;
memcpy (p, f... | 229,388,027,153,035,260,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,920 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static int nfs_mount_reply(unsigned char *pkt, unsigned len)
{
int ret;
ret = rpc_check_reply(pkt, 1);
if (ret)
return ret;
memcpy(dirfh, pkt + sizeof(struct rpc_reply) + 4, NFS_FHSIZE);
return 0;
}
| 208,931,578,812,008,920,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,921 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static void nfs_mount_req(char *path)
{
uint32_t data[1024];
uint32_t *p;
int len;
int pathlen;
pathlen = strlen (path);
p = &(data[0]);
p = rpc_add_credentials(p);
*p++ = htonl(pathlen);
if (pathlen & 3)
*(p + pathlen / 4) = 0;
memcpy (p, path, pathlen);
p += (pathlen + 3) / 4;
len = p - &(data[0]);
... | 63,151,979,744,923,880,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,922 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static void nfs_read_req(int offset, int readlen)
{
uint32_t data[1024];
uint32_t *p;
int len;
p = &(data[0]);
p = rpc_add_credentials(p);
memcpy (p, filefh, NFS_FHSIZE);
p += (NFS_FHSIZE / 4);
*p++ = htonl(offset);
*p++ = htonl(readlen);
*p++ = 0;
len = p - &(data[0]);
rpc_req(PROG_NFS, NFS_READ, data,... | 139,608,681,964,795,410,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,923 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static void nfs_readlink_req(void)
{
uint32_t data[1024];
uint32_t *p;
int len;
p = &(data[0]);
p = rpc_add_credentials(p);
memcpy (p, filefh, NFS_FHSIZE);
p += (NFS_FHSIZE / 4);
len = p - &(data[0]);
rpc_req(PROG_NFS, NFS_READLINK, data, len);
}
| 184,989,573,467,561,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,924 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static void nfs_send(void)
{
debug("%s\n", __func__);
switch (nfs_state) {
case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
rpc_lookup_req(PROG_MOUNT, 1);
break;
case STATE_PRCLOOKUP_PROG_NFS_REQ:
rpc_lookup_req(PROG_NFS, 2);
break;
case STATE_MOUNT_REQ:
nfs_mount_req(nfs_path);
break;
case STATE_UMOUNT_REQ:
n... | 96,255,136,318,655,960,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,925 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static int nfs_umountall_reply(unsigned char *pkt, unsigned len)
{
int ret;
ret = rpc_check_reply(pkt, 0);
if (ret)
return ret;
memset(dirfh, 0, sizeof(dirfh));
return 0;
}
| 117,262,003,008,172,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,926 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static void nfs_umountall_req(void)
{
uint32_t data[1024];
uint32_t *p;
int len;
if (nfs_server_mount_port < 0)
/* Nothing mounted, nothing to umount */
return;
p = &(data[0]);
p = rpc_add_credentials(p);
len = p - &(data[0]);
rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len);
}
| 159,565,096,898,999,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,927 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static uint32_t *rpc_add_credentials(uint32_t *p)
{
int hl;
int hostnamelen = 0;
/* Here's the executive summary on authentication requirements of the
* various NFS server implementations: Linux accepts both AUTH_NONE
* and AUTH_UNIX authentication (also accepts an empty hostname field
* in the AUTH_UNIX sche... | 5,186,934,943,151,252,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,928 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static int rpc_lookup_reply(int prog, unsigned char *pkt, unsigned len)
{
uint32_t port;
int ret;
ret = rpc_check_reply(pkt, 0);
if (ret)
return ret;
port = net_read_uint32((uint32_t *)(pkt + sizeof(struct rpc_reply)));
switch (prog) {
case PROG_MOUNT:
nfs_server_mount_port = ntohl(port);
break;
case PR... | 30,532,075,050,965,066,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,929 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static void rpc_lookup_req(int prog, int ver)
{
uint32_t data[16];
data[0] = 0; data[1] = 0; /* auth credential */
data[2] = 0; data[3] = 0; /* auth verifier */
data[4] = htonl(prog);
data[5] = htonl(ver);
data[6] = htonl(17); /* IP_UDP */
data[7] = 0;
rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8);
}
| 46,118,774,964,237,510,000,000,000,000,000,000,000 | nfs.c | 114,322,917,047,956,380,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,930 | pengutronix | 84986ca024462058574432b5483f4bf9136c538d | https://git.pengutronix.de/cgit/barebox/commit/fs/nfs.c?h=next&id=574ce994016107ad8ab0f845a785f28d7eaa5208 | https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=84986ca024462058574432b5483f4bf9136c538d | None | 0 | static int rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen)
{
struct rpc_call pkt;
unsigned long id;
int sport;
int ret;
unsigned char *payload = net_udp_get_payload(nfs_con);
id = ++rpc_id;
pkt.id = htonl(id);
pkt.type = htonl(MSG_CALL);
pkt.rpcvers = htonl(2); /* use RPC version 2 */
pkt.pr... | 292,489,349,805,107,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15937 | Pengutronix barebox through 2019.08.1 has a remote buffer overflow in nfs_readlink_reply in net/nfs.c because a length field is directly used for a memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2019-15937 |
11,998 | ghostscript | 661e8d8fb8248c38d67958beda32f3a5876d0c3f | http://git.ghostscript.com/?p=mupdf | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=661e8d8fb8248c38d67958beda32f3a5876d0c3f | None | 0 | static void invalidate_stack_devices(i_ctx_t *i_ctx_p)
{
os_ptr op = osbot;
while (op != ostop) {
if (r_has_type(op, t_device))
op->value.pdevice = 0;
op++;
}
}
| 229,119,428,316,359,630,000,000,000,000,000,000,000 | zdevice.c | 42,923,383,415,485,950,000,000,000,000,000,000,000 | [] | CVE-2018-19409 | An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used. | https://nvd.nist.gov/vuln/detail/CVE-2018-19409 |
11,999 | ghostscript | 661e8d8fb8248c38d67958beda32f3a5876d0c3f | http://git.ghostscript.com/?p=mupdf | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=661e8d8fb8248c38d67958beda32f3a5876d0c3f | None | 0 | zcopydevice2(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
gx_device *new_dev;
int code;
check_read_type(op[-1], t_device);
check_type(*op, t_boolean);
if (op[-1].value.pdevice == NULL)
/* This can happen if we invalidated devices on the stack by calling nulldevice after they were pushed */
... | 114,567,689,831,721,010,000,000,000,000,000,000,000 | zdevice.c | 42,923,383,415,485,950,000,000,000,000,000,000,000 | [] | CVE-2018-19409 | An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used. | https://nvd.nist.gov/vuln/detail/CVE-2018-19409 |
12,000 | ghostscript | 661e8d8fb8248c38d67958beda32f3a5876d0c3f | http://git.ghostscript.com/?p=mupdf | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=661e8d8fb8248c38d67958beda32f3a5876d0c3f | None | 0 | zcurrentdevice(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
gx_device *dev = gs_currentdevice(igs);
gs_ref_memory_t *mem = (gs_ref_memory_t *) dev->memory;
push(1);
make_tav(op, t_device,
(mem == 0 ? avm_foreign : imemory_space(mem)) | a_all,
pdevice, dev);
return 0;
}
| 49,910,706,268,464,585,000,000,000,000,000,000,000 | zdevice.c | 42,923,383,415,485,950,000,000,000,000,000,000,000 | [] | CVE-2018-19409 | An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used. | https://nvd.nist.gov/vuln/detail/CVE-2018-19409 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.