idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
12,849
samba
1ba49b8f389eda3414b14410c7fbcb4041ca06b1
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
CVE-2015-5296: s3:libsmb: force signing when requiring encryption in SMBC_server_internal() BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
SMBC_get_auth_data(const char *server, const char *share, char *workgroup_buf, int workgroup_buf_len, char *username_buf, int username_buf_len, char *password_buf, int password_buf_len) { /* Default function just uses provided data. Nothing to do. */ }
14,491,558,458,970,472,000,000,000,000,000,000,000
libsmb_server.c
299,000,512,541,787,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,850
samba
1ba49b8f389eda3414b14410c7fbcb4041ca06b1
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1
CVE-2015-5296: s3:libsmb: force signing when requiring encryption in SMBC_server_internal() BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
0
SMBC_remove_unused_server(SMBCCTX * context, SMBCSRV * srv) { SMBCFILE * file; /* are we being fooled ? */ if (!context || !context->internal->initialized || !srv) { return 1; } /* Check all open files/directories for a relation with this server */ for (file = co...
172,785,748,671,956,130,000,000,000,000,000,000,000
libsmb_server.c
299,000,512,541,787,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
12,851
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
NTSTATUS smb_register_vfs(int version, const char *name, const struct vfs_fn_pointers *fns) { struct vfs_init_function_entry *entry = backends; if ((version != SMB_VFS_INTERFACE_VERSION)) { DEBUG(0, ("Failed to register vfs module.\n" "The module was compiled against SMB_VFS_INTERFACE_VERSION %d,...
305,820,852,490,683,500,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,852
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
bool smbd_vfs_init(connection_struct *conn) { const char **vfs_objects; unsigned int i = 0; int j = 0; /* Normal share - initialise with disk access functions */ vfs_init_default(conn); /* No need to load vfs modules for printer connections */ if (conn->printer) { return True; } vfs_objects = lp_vfs_objec...
154,450,861,878,316,400,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,853
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
int vfs_ChDir(connection_struct *conn, const char *path) { int ret; if (!LastDir) { LastDir = SMB_STRDUP(""); } if (ISDOT(path)) { return 0; } if (*path == '/' && strcsequal(LastDir,path)) { return 0; } DEBUG(4,("vfs_ChDir to %s\n",path)); ret = SMB_VFS_CHDIR(conn,path); if (ret == 0) { /* Global...
77,613,381,715,032,910,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,854
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
char *vfs_GetWd(TALLOC_CTX *ctx, connection_struct *conn) { char *current_dir = NULL; char *result = NULL; DATA_BLOB cache_value; struct file_id key; struct smb_filename *smb_fname_dot = NULL; struct smb_filename *smb_fname_full = NULL; if (!lp_getwd_cache()) { goto nocache; } smb_fname_dot = synthe...
180,229,742,828,571,260,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,855
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
void *vfs_add_fsp_extension_notype(vfs_handle_struct *handle, files_struct *fsp, size_t ext_size, void (*destroy_fn)(void *p_data)) { struct vfs_fsp_data *ext; void * ext_data; /* Prevent VFS modules adding multiple extensions. */ if ((ext_data = vfs_fetch_fsp_extension(handle, fsp))) { return ext_...
65,958,113,257,050,075,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,856
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
int vfs_allocate_file_space(files_struct *fsp, uint64_t len) { int ret; connection_struct *conn = fsp->conn; uint64_t space_avail; uint64_t bsize,dfree,dsize; NTSTATUS status; /* * Actually try and commit the space on disk.... */ DEBUG(10,("vfs_allocate_file_space: file %s, len %.0f\n", fsp_str_dbg(fsp...
326,849,536,891,401,200,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,857
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
void *vfs_fetch_fsp_extension(vfs_handle_struct *handle, files_struct *fsp) { struct vfs_fsp_data *head; head = (struct vfs_fsp_data *)vfs_memctx_fsp_extension(handle, fsp); if (head != NULL) { return EXT_DATA_AREA(head); } return NULL; }
142,206,023,076,453,120,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,858
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
NTSTATUS vfs_file_exist(connection_struct *conn, struct smb_filename *smb_fname) { /* Only return OK if stat was successful and S_ISREG */ if ((SMB_VFS_STAT(conn, smb_fname) != -1) && S_ISREG(smb_fname->st.st_ex_mode)) { return NT_STATUS_OK; } return NT_STATUS_OBJECT_NAME_NOT_FOUND; }
326,352,798,746,098,200,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,859
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
int vfs_fill_sparse(files_struct *fsp, off_t len) { int ret; NTSTATUS status; off_t offset; size_t num_to_write; status = vfs_stat_fsp(fsp); if (!NT_STATUS_IS_OK(status)) { return -1; } if (len <= fsp->fsp_name->st.st_ex_size) { return 0; } #ifdef S_ISFIFO if (S_ISFIFO(fsp->fsp_name->st.st_ex_mode)) { ...
285,342,743,341,522,080,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,860
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
static struct vfs_init_function_entry *vfs_find_backend_entry(const char *name) { struct vfs_init_function_entry *entry = backends; DEBUG(10, ("vfs_find_backend_entry called for %s\n", name)); while(entry) { if (strcmp(entry->name, name)==0) return entry; entry = entry->next; } return NULL; }
41,583,423,039,035,294,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,861
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
static void vfs_init_default(connection_struct *conn) { DEBUG(3, ("Initialising default vfs hooks\n")); vfs_init_custom(conn, DEFAULT_VFS_MODULE_NAME); }
139,340,171,800,392,920,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,862
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
void *vfs_memctx_fsp_extension(vfs_handle_struct *handle, files_struct *fsp) { struct vfs_fsp_data *head; for (head = fsp->vfs_extension; head; head = head->next) { if (head->owner == handle) { return head; } } return NULL; }
107,681,528,240,492,030,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,863
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
static ssize_t vfs_pread_fn(void *file, void *buf, size_t len, off_t offset) { struct files_struct *fsp = (struct files_struct *)file; return SMB_VFS_PREAD(fsp, buf, len, offset); }
264,849,568,431,931,100,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,864
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
ssize_t vfs_pwrite_data(struct smb_request *req, files_struct *fsp, const char *buffer, size_t N, off_t offset) { size_t total=0; ssize_t ret; if (req && req->unread_bytes) { int sockfd = req->xconn->transport.sock; SMB_ASSERT(req->unread_bytes == N); /* VFS_RECVFILE must drain the socket * bef...
286,706,200,622,483,130,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,865
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
static ssize_t vfs_pwrite_fn(void *file, const void *buf, size_t len, off_t offset) { struct files_struct *fsp = (struct files_struct *)file; return SMB_VFS_PWRITE(fsp, buf, len, offset); }
12,151,740,774,815,795,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,866
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
ssize_t vfs_read_data(files_struct *fsp, char *buf, size_t byte_count) { size_t total=0; while (total < byte_count) { ssize_t ret = SMB_VFS_READ(fsp, buf + total, byte_count - total); if (ret == 0) return total; if (ret == -1) { if (errno == EINTR) continue; else return -1; } total ...
137,294,150,240,286,900,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,867
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
const char *vfs_readdirname(connection_struct *conn, void *p, SMB_STRUCT_STAT *sbuf, char **talloced) { struct dirent *ptr= NULL; const char *dname; char *translated; NTSTATUS status; if (!p) return(NULL); ptr = SMB_VFS_READDIR(conn, (DIR *)p, sbuf); if (!ptr) return(NULL); dname = ptr->d_name; ...
312,628,252,079,778,840,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,868
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
void vfs_remove_fsp_extension(vfs_handle_struct *handle, files_struct *fsp) { struct vfs_fsp_data *curr; struct vfs_fsp_data *prev; for (curr = fsp->vfs_extension, prev = NULL; curr; prev = curr, curr = curr->next) { if (curr->owner == handle) { if (prev) { prev->next = curr->next; ...
62,577,659,619,870,440,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,869
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
int vfs_set_filelen(files_struct *fsp, off_t len) { int ret; contend_level2_oplocks_begin(fsp, LEVEL2_CONTEND_SET_FILE_LEN); DEBUG(10,("vfs_set_filelen: ftruncate %s to len %.0f\n", fsp_str_dbg(fsp), (double)len)); flush_write_cache(fsp, SAMBA_SIZECHANGE_FLUSH); if ((ret = SMB_VFS_FTRUNCATE(fsp, len)) != -1)...
5,779,533,107,458,427,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,870
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
int vfs_slow_fallocate(files_struct *fsp, off_t offset, off_t len) { ssize_t pwrite_ret; size_t total = 0; if (!sparse_buf) { sparse_buf = SMB_CALLOC_ARRAY(char, SPARSE_BUF_WRITE_SIZE); if (!sparse_buf) { errno = ENOMEM; return -1; } } while (total < len) { size_t curr_write_size = MIN(SPARSE_BUF_W...
102,098,134,014,334,890,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,871
samba
4278ef25f64d5fdbf432ff1534e275416ec9561e
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e
CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share). Ensure matching component ends in '/' or '\0'. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395 Signed-off-by: Jeremy Allison <jra@samba.org> Reviewed-by: Volker Lendecke <vl@samba.org>
0
off_t vfs_transfer_file(files_struct *in, files_struct *out, off_t n) { return transfer_file_internal((void *)in, (void *)out, n, vfs_pread_fn, vfs_pwrite_fn); }
146,103,509,210,130,400,000,000,000,000,000,000,000
vfs.c
141,386,651,199,010,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-5252
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
https://nvd.nist.gov/vuln/detail/CVE-2015-5252
12,872
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
another_hunk (enum diff difftype, bool rev) { char *s; lin context = 0; size_t chars_read; char numbuf0[LINENUM_LENGTH_BOUND + 1]; char numbuf1[LINENUM_LENGTH_BOUND + 1]; char numbuf2[LINENUM_LENGTH_BOUND + 1]; char numbuf3[LINENUM_LENGTH_BOUND + 1]; set_hunkmax(); while (p_end >= ...
156,789,205,795,336,020,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,873
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
best_name (char *const *name, int const *ignore) { enum nametype i; int components[3]; int components_min = INT_MAX; size_t basename_len[3]; size_t basename_len_min = SIZE_MAX; size_t len[3]; size_t len_min = SIZE_MAX; for (i = OLD; i <= INDEX; i++) if (name[i] && !ignore[i]) { /* Take the...
9,509,497,684,600,765,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,874
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
fetchmode (char const *str) { const char *s; mode_t mode; while (ISSPACE ((unsigned char) *str)) str++; for (s = str, mode = 0; s < str + 6; s++) { if (*s >= '0' && *s <= '7') mode = (mode << 3) + (*s - '0'); else { mode = 0; break; } } if (*s == '\r') s++; i...
77,035,898,437,383,170,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,875
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
get_ed_command_letter (char const *line) { char const *p = line; char letter; bool pair = false; if (ISDIGIT (*p)) { while (ISDIGIT (*++p)) /* do nothing */ ; if (*p == ',') { if (! ISDIGIT (*++p)) return 0; while (ISDIGIT (*++p)) /* do nothing */ ; pair = true; } } ...
278,989,658,672,877,030,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,876
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
get_line (void) { return pget_line (p_indent, p_rfc934_nesting, p_strip_trailing_cr, p_pass_comments_through); }
196,387,020,486,838,570,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,877
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
get_sha1(char **sha1, char const *start, char const *end) { unsigned int len = end - start; *sha1 = xmalloc (len + 1); memcpy (*sha1, start, len); (*sha1)[len] = 0; }
240,374,617,207,334,120,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,878
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
grow_hunkmax (void) { hunkmax *= 2; assert (p_line && p_len && p_Char); if ((p_line = realloc (p_line, hunkmax * sizeof (*p_line))) && (p_len = realloc (p_len, hunkmax * sizeof (*p_len))) && (p_Char = realloc (p_Char, hunkmax * sizeof (*p_Char)))) return true; if (!using_plan_a) xalloc_die...
216,403,562,209,770,570,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,879
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
incomplete_line (void) { FILE *fp = pfp; int c; file_offset line_beginning = file_tell (fp); if (getc (fp) == '\\') { while ((c = getc (fp)) != '\n' && c != EOF) /* do nothing */ ; return true; } else { /* We don't trust ungetc. */ Fseek (pfp, line_beginning, SEEK_SET)...
142,473,767,899,011,460,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,880
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
malformed (void) { char numbuf[LINENUM_LENGTH_BOUND + 1]; fatal ("malformed patch at line %s: %s", format_linenum (numbuf, p_input_line), buf); /* about as informative as "Syntax error" in C */ }
325,628,780,710,024,540,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,881
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
maybe_reverse (char const *name, bool nonexistent, bool is_empty) { bool looks_reversed = (! is_empty) < p_says_nonexistent[reverse ^ is_empty]; /* Allow to create and delete empty files when we know that they are empty: in the "diff --git" format, we know that from the index header. */ if (is_empty ...
111,851,605,719,924,570,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,882
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
name_is_valid (char const *name) { int i; bool is_valid = true; for (i = 0; i < ARRAY_SIZE (invalid_names); i++) { if (! invalid_names[i]) break; if (! strcmp (invalid_names[i], name)) return false; } is_valid = filename_is_safe (name); /* Allow any filename if we are in the filesyste...
79,862,950,876,850,190,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,883
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
next_intuit_at (file_offset file_pos, lin file_line) { p_base = file_pos; p_bline = file_line; }
176,657,823,479,154,770,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,884
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
open_patch_file (char const *filename) { file_offset file_pos = 0; file_offset pos; struct stat st; if (!filename || !*filename || strEQ (filename, "-")) pfp = stdin; else { pfp = fopen (filename, binary_transput ? "rb" : "r"); if (!pfp) pfatal ("Can't open patch file %s", quotearg...
182,153,303,616,941,000,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,885
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_char (lin line) { return p_Char[line]; }
113,189,287,940,409,640,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,886
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_end (void) { return p_end; }
213,575,755,474,852,100,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,887
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_git_diff (void) { return p_git_diff; }
285,589,485,354,817,060,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,888
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_hunk_beg (void) { return p_hunk_beg; }
87,020,067,448,146,860,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,889
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_line_len (lin line) { return p_len[line]; }
171,183,517,600,254,400,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,890
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_mode (bool which) { return p_mode[which]; }
4,349,191,385,757,603,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,891
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_name (enum nametype type) { return type == NONE ? NULL : p_name[type]; }
62,647,585,479,943,300,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,892
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_newfirst (void) { return p_newfirst; }
86,801,142,811,887,160,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,893
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_prefix_context (void) { return p_prefix_context; }
254,261,737,676,717,750,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,894
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
bool pch_rename (void) { return p_rename[OLD] && p_rename[NEW]; }
278,740,633,775,403,630,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,895
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_repl_lines (void) { return p_repl_lines; }
116,134,114,917,841,580,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,896
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_says_nonexistent (bool which) { return p_says_nonexistent[which]; }
226,208,491,458,555,400,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,897
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_sha1 (bool which) { return p_sha1[which]; }
285,361,766,700,519,930,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,898
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_suffix_context (void) { return p_suffix_context; }
256,839,133,313,721,450,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,899
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pch_timestr (bool which) { return p_timestr[which]; }
298,705,250,631,110,860,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,900
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
pget_line (size_t indent, int rfc934_nesting, bool strip_trailing_cr, bool pass_comments_through) { FILE *fp = pfp; int c; size_t i; char *b; size_t s; do { i = 0; for (;;) { c = getc (fp); if (c == EOF) { if (ferror (fp)) read_fatal (); return 0; } i...
327,183,863,968,774,400,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,901
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
prefix_components (char *filename, bool checkdirs) { int count = 0; struct stat stat_buf; int stat_result; char *f = filename + FILE_SYSTEM_PREFIX_LEN (filename); if (*f) while (*++f) if (ISSLASH (f[0]) && ! ISSLASH (f[-1])) { if (checkdirs) { *f = '\0'; stat_result = safe_st...
292,061,560,741,285,400,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,902
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
re_patch (void) { p_first = 0; p_newfirst = 0; p_ptrn_lines = 0; p_repl_lines = 0; p_end = -1; p_max = 0; p_indent = 0; p_strip_trailing_cr = false; }
76,447,009,485,079,840,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,903
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
set_hunkmax (void) { if (!p_line) p_line = xmalloc (hunkmax * sizeof *p_line); if (!p_len) p_len = xmalloc (hunkmax * sizeof *p_len); if (!p_Char) p_Char = xmalloc (hunkmax * sizeof *p_Char); }
309,383,105,853,887,740,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,904
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
skip_hex_digits (char const *str) { char const *s; for (s = str; (*s >= '0' && *s <= '9') || (*s >= 'a' && *s <= 'f'); s++) /* do nothing */ ; return s == str ? NULL : s; }
167,687,049,359,867,990,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,905
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
skip_to (file_offset file_pos, lin file_line) { FILE *i = pfp; FILE *o = stdout; int c; assert(p_base <= file_pos); if ((verbosity == VERBOSE || !inname) && p_base < file_pos) { Fseek (i, p_base, SEEK_SET); say ("The text leading up to this was:\n--------------------------\n"); while (file_tell...
118,079,717,602,775,590,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,906
savannah
3fcd042d26d70856e826a42b5f93dc4854d80bf0
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
None
0
there_is_another_patch (bool need_header, mode_t *file_type) { if (p_base != 0 && p_base >= p_filesize) { if (verbosity == VERBOSE) say ("done\n"); return false; } if (verbosity == VERBOSE) say ("Hmm..."); diff_type = intuit_diff_type (need_header, file_type); if (diff_type == NO_DIFF) { if...
130,862,108,197,889,130,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-13638
GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.
https://nvd.nist.gov/vuln/detail/CVE-2019-13638
12,907
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
get_input_file (char const *filename, char const *outname, mode_t file_type) { bool elsewhere = strcmp (filename, outname) != 0; char const *cs; char *diffbuf; char *getbuf; if (inerrno == -1) inerrno = stat_file (filename, &instat); /* Perhaps look for RCS or SCCS versions. */ if (...
228,721,102,025,008,530,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,908
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
re_input (void) { if (using_plan_a) { if (i_buffer) { free (i_buffer); i_buffer = 0; free (i_ptr); } } else { if (tifd >= 0) close (tifd); tifd = -1; if (tibuf[0]) { free (tibuf[0]); tibuf[0] = 0; } tiline[0] = tiline[1] = -1; tireclen = 0; } }
74,690,872,128,934,890,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,909
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
report_revision (bool found_revision) { char const *rev = quotearg (revision); if (found_revision) { if (verbosity == VERBOSE) say ("Good. This file appears to be the %s version.\n", rev); } else if (force) { if (verbosity != SILENT) say ("Warning: this file doesn't appear to be the %s...
226,103,584,018,110,450,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,910
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
too_many_lines (char const *filename) { fatal ("File %s has too many lines", quotearg (filename)); }
36,215,866,788,484,940,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,911
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
Fseek (FILE *stream, file_offset offset, int ptrname) { if (file_seek (stream, offset, ptrname) != 0) pfatal ("fseek"); }
18,322,165,002,801,752,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,912
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
__insert_file_id (struct stat const *st, enum file_id_type type) { file_id *p; static file_id *next_slot; if (!next_slot) next_slot = xmalloc (sizeof *next_slot); next_slot->dev = st->st_dev; next_slot->ino = st->st_ino; next_slot->queued_output = false; p = hash_insert (file_id_table, next_s...
88,520,534,876,390,840,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,913
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
__lookup_file_id (struct stat const *st) { file_id f; f.dev = st->st_dev; f.ino = st->st_ino; return hash_lookup (file_id_table, &f); }
102,006,220,852,737,820,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,914
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
contains_slash (const char *s) { for (; *s; s++) if (ISSLASH(*s)) return true; return false; }
132,215,065,949,111,180,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,915
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
copy_attr (char const *src_path, char const *dst_path) { return 0; }
138,597,939,216,080,310,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,916
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
copy_attr_check (const char *name, struct error_context *ctx) { int action = attr_copy_action (name, ctx); return action == 0 || action == ATTR_ACTION_PERMISSIONS; }
235,290,618,994,882,140,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,917
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
copy_attr_error (struct error_context *ctx, char const *fmt, ...) { int err = errno; va_list ap; if (err != ENOSYS && err != ENOTSUP && err != EPERM) { /* use verror module to print error message */ va_start (ap, fmt); verror (0, err, fmt, ap); va_end (ap); } }
314,615,643,859,749,870,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,918
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
copy_attr_free (struct error_context *ctx, char const *str) { }
282,182,550,043,181,700,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,919
savannah
dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://git.savannah.gnu.org/gitweb/?p=gnutls
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
None
0
copy_attr_quote (struct error_context *ctx, char const *str) { return quotearg (str); }
220,758,973,781,350,270,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
12,920
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_cache_check (DBusHeader *header, int field) { _dbus_assert (field <= DBUS_HEADER_FIELD_LAST); if (header->fields[field].value_pos == _DBUS_HEADER_FIELD_VALUE_UNKNOWN) _dbus_header_cache_revalidate (header); if (header->fields[field].value_pos == _DBUS_HEA...
144,020,075,076,020,670,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,921
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_cache_invalidate_all (DBusHeader *header) { int i; i = 0; while (i <= DBUS_HEADER_FIELD_LAST) { header->fields[i].value_pos = _DBUS_HEADER_FIELD_VALUE_UNKNOWN; ++i; } }
317,582,301,025,191,700,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,922
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_cache_known_nonexistent (DBusHeader *header, int field) { _dbus_assert (field <= DBUS_HEADER_FIELD_LAST); return (header->fields[field].value_pos == _DBUS_HEADER_FIELD_VALUE_NONEXISTENT); }
211,413,715,981,418,800,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,923
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_cache_one (DBusHeader *header, int field_code, DBusTypeReader *variant_reader) { header->fields[field_code].value_pos = _dbus_type_reader_get_value_pos (variant_reader); #if 0 _dbus_verbose ("cached value_pos %d for field %d\n", ...
126,355,070,039,433,650,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,924
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_cache_revalidate (DBusHeader *header) { DBusTypeReader array; DBusTypeReader reader; int i; i = 0; while (i <= DBUS_HEADER_FIELD_LAST) { header->fields[i].value_pos = _DBUS_HEADER_FIELD_VALUE_NONEXISTENT; ++i; } _dbus_type_reader_init (&reader, he...
322,166,570,115,088,650,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,925
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_copy (const DBusHeader *header, DBusHeader *dest) { *dest = *header; if (!_dbus_string_init_preallocated (&dest->data, _dbus_string_get_length (&header->data))) return FALSE; if (!_dbus_string_copy (&header->data, 0, &dest->data, 0...
266,154,531,972,123,830,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,926
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_create (DBusHeader *header, int message_type, const char *destination, const char *path, const char *interface, const char *member, const char *error_name) { unsign...
39,794,338,453,660,150,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,927
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_delete_field (DBusHeader *header, int field) { DBusTypeReader reader; DBusTypeReader realign_root; if (_dbus_header_cache_known_nonexistent (header, field)) return TRUE; /* nothing to do */ /* Scan to the field we want, delete and realign, reappend * padd...
336,313,583,656,515,600,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,928
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_free (DBusHeader *header) { _dbus_string_free (&header->data); }
220,017,667,161,735,040,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,929
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_get_field_raw (DBusHeader *header, int field, const DBusString **str, int *pos) { if (!_dbus_header_cache_check (header, field)) return FALSE; if (str) *str = &header->data; ...
263,602,942,192,859,130,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,930
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_get_flag (DBusHeader *header, dbus_uint32_t flag) { const unsigned char *flags_p; flags_p = _dbus_string_get_const_data_len (&header->data, FLAGS_OFFSET, 1); return (*flags_p & flag) != 0; }
16,736,606,330,099,790,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,931
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_get_serial (DBusHeader *header) { return _dbus_marshal_read_uint32 (&header->data, SERIAL_OFFSET, header->byte_order, NULL); }
154,746,899,092,142,130,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,932
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_have_message_untrusted (int max_message_length, DBusValidity *validity, int *byte_order, int *fields_array_len, ...
176,748,178,290,246,840,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,933
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_init (DBusHeader *header, int byte_order) { if (!_dbus_string_init_preallocated (&header->data, 32)) return FALSE; _dbus_header_reinit (header, byte_order); return TRUE; }
246,051,285,141,552,220,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,934
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_reinit (DBusHeader *header, int byte_order) { _dbus_string_set_length (&header->data, 0); header->byte_order = byte_order; header->padding = 0; _dbus_header_cache_invalidate_all (header); }
165,059,247,421,556,400,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,935
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_set_field_basic (DBusHeader *header, int field, int type, const void *value) { _dbus_assert (field <= DBUS_HEADER_FIELD_LAST); if (!reserve_header_padding (header)) ret...
309,199,238,343,700,400,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,936
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_set_serial (DBusHeader *header, dbus_uint32_t serial) { /* we use this function to set the serial on outgoing * messages, and to reset the serial in dbus_message_copy; * this assertion should catch a double-set on outgoing. */ _dbus_assert (_dbus_header_get_serial ...
265,991,713,160,041,630,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,937
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_toggle_flag (DBusHeader *header, dbus_uint32_t flag, dbus_bool_t value) { unsigned char *flags_p; flags_p = _dbus_string_get_data_len (&header->data, FLAGS_OFFSET, 1); if (value) *flags_p |= flag; else *flags_p &= ~flag; }
339,161,512,677,815,220,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,938
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_header_update_lengths (DBusHeader *header, int body_len) { _dbus_marshal_set_uint32 (&header->data, BODY_LENGTH_OFFSET, body_len, header->byte_order); }
236,862,773,916,220,600,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,939
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
_dbus_marshal_header_test (void) { return TRUE; }
254,669,144,716,916,200,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,940
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
find_field_for_modification (DBusHeader *header, int field, DBusTypeReader *reader, DBusTypeReader *realign_root) { dbus_bool_t retval; retval = FALSE; _dbus_type_reader_init (realign_root, ...
108,606,903,235,215,720,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,941
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
reserve_header_padding (DBusHeader *header) { _dbus_assert (header->padding <= MAX_POSSIBLE_HEADER_PADDING); if (!_dbus_string_lengthen (&header->data, MAX_POSSIBLE_HEADER_PADDING - header->padding)) return FALSE; header->padding = MAX_POSSIBLE_HEADER_PADDING; return TRUE; }
152,445,938,804,848,390,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,942
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
set_basic_field (DBusTypeReader *reader, int field, int type, const void *value, const DBusTypeReader *realign_root) { DBusTypeReader sub; DBusTypeReader variant; _dbus_type_reader_recurse (rea...
199,355,673,086,836,480,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,943
dbus
c3223ba6c401ba81df1305851312a47c485e6cd7
http://gitweb.freedesktop.org/?p=dbus/dbus
https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7
_dbus_header_byteswap: change the first byte of the message, not just the struct member This has been wrong approximately forever, for instance see: http://lists.freedesktop.org/archives/dbus/2007-March/007357.html Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120 Bug-Debian: http://bugs.debian.org/cgi-bin/bugr...
0
write_basic_field (DBusTypeWriter *writer, int field, int type, const void *value) { DBusTypeWriter sub; DBusTypeWriter variant; int start; int padding; unsigned char field_byte; DBusString contained_type; char buf[2]; ...
176,741,231,719,318,750,000,000,000,000,000,000,000
dbus-marshal-header.c
208,185,001,665,072,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-2200
The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct...
https://nvd.nist.gov/vuln/detail/CVE-2011-2200
12,953
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
static RELOC_PTRS_WITH(device_reloc_ptrs, gx_device *dev) { dev->parent = gx_device_reloc_ptr(dev->parent, gcst); dev->child = gx_device_reloc_ptr(dev->child, gcst); }
304,114,002,168,998,000,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,954
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
static RELOC_PTRS_WITH(device_forward_reloc_ptrs, gx_device_forward *fdev) { fdev->target = gx_device_reloc_ptr(fdev->target, gcst); }
219,901,455,457,111,800,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,955
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_closedevice(gx_device * dev) { int code = 0; if (dev->is_open) { code = (*dev_proc(dev, close_device))(dev); dev->is_open = false; if (code < 0) return_error(code); } return code; }
241,688,701,805,302,860,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,956
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_copydevice2(gx_device ** pnew_dev, const gx_device * dev, bool keep_open, gs_memory_t * mem) { gx_device *new_dev; const gs_memory_struct_type_t *std = dev->stype; const gs_memory_struct_type_t *new_std; gs_memory_struct_type_t *a_std = 0; int code; if (dev->stype_is_dynamic) ...
307,728,776,456,067,800,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,957
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_copypage(gs_gstate * pgs) { return gs_output_page(pgs, 1, 0); }
273,863,276,612,510,720,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863