idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
12,849 | samba | 1ba49b8f389eda3414b14410c7fbcb4041ca06b1 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1 | CVE-2015-5296: s3:libsmb: force signing when requiring encryption in SMBC_server_internal()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org> | 0 | SMBC_get_auth_data(const char *server, const char *share,
char *workgroup_buf, int workgroup_buf_len,
char *username_buf, int username_buf_len,
char *password_buf, int password_buf_len)
{
/* Default function just uses provided data. Nothing to do. */
}
| 14,491,558,458,970,472,000,000,000,000,000,000,000 | libsmb_server.c | 299,000,512,541,787,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-5296 | Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b... | https://nvd.nist.gov/vuln/detail/CVE-2015-5296 |
12,850 | samba | 1ba49b8f389eda3414b14410c7fbcb4041ca06b1 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1 | CVE-2015-5296: s3:libsmb: force signing when requiring encryption in SMBC_server_internal()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org> | 0 | SMBC_remove_unused_server(SMBCCTX * context,
SMBCSRV * srv)
{
SMBCFILE * file;
/* are we being fooled ? */
if (!context || !context->internal->initialized || !srv) {
return 1;
}
/* Check all open files/directories for a relation with this server */
for (file = co... | 172,785,748,671,956,130,000,000,000,000,000,000,000 | libsmb_server.c | 299,000,512,541,787,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-5296 | Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b... | https://nvd.nist.gov/vuln/detail/CVE-2015-5296 |
12,851 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | NTSTATUS smb_register_vfs(int version, const char *name,
const struct vfs_fn_pointers *fns)
{
struct vfs_init_function_entry *entry = backends;
if ((version != SMB_VFS_INTERFACE_VERSION)) {
DEBUG(0, ("Failed to register vfs module.\n"
"The module was compiled against SMB_VFS_INTERFACE_VERSION %d,... | 305,820,852,490,683,500,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,852 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | bool smbd_vfs_init(connection_struct *conn)
{
const char **vfs_objects;
unsigned int i = 0;
int j = 0;
/* Normal share - initialise with disk access functions */
vfs_init_default(conn);
/* No need to load vfs modules for printer connections */
if (conn->printer) {
return True;
}
vfs_objects = lp_vfs_objec... | 154,450,861,878,316,400,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,853 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | int vfs_ChDir(connection_struct *conn, const char *path)
{
int ret;
if (!LastDir) {
LastDir = SMB_STRDUP("");
}
if (ISDOT(path)) {
return 0;
}
if (*path == '/' && strcsequal(LastDir,path)) {
return 0;
}
DEBUG(4,("vfs_ChDir to %s\n",path));
ret = SMB_VFS_CHDIR(conn,path);
if (ret == 0) {
/* Global... | 77,613,381,715,032,910,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,854 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | char *vfs_GetWd(TALLOC_CTX *ctx, connection_struct *conn)
{
char *current_dir = NULL;
char *result = NULL;
DATA_BLOB cache_value;
struct file_id key;
struct smb_filename *smb_fname_dot = NULL;
struct smb_filename *smb_fname_full = NULL;
if (!lp_getwd_cache()) {
goto nocache;
}
smb_fname_dot = synthe... | 180,229,742,828,571,260,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,855 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | void *vfs_add_fsp_extension_notype(vfs_handle_struct *handle,
files_struct *fsp, size_t ext_size,
void (*destroy_fn)(void *p_data))
{
struct vfs_fsp_data *ext;
void * ext_data;
/* Prevent VFS modules adding multiple extensions. */
if ((ext_data = vfs_fetch_fsp_extension(handle, fsp))) {
return ext_... | 65,958,113,257,050,075,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,856 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | int vfs_allocate_file_space(files_struct *fsp, uint64_t len)
{
int ret;
connection_struct *conn = fsp->conn;
uint64_t space_avail;
uint64_t bsize,dfree,dsize;
NTSTATUS status;
/*
* Actually try and commit the space on disk....
*/
DEBUG(10,("vfs_allocate_file_space: file %s, len %.0f\n",
fsp_str_dbg(fsp... | 326,849,536,891,401,200,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,857 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | void *vfs_fetch_fsp_extension(vfs_handle_struct *handle, files_struct *fsp)
{
struct vfs_fsp_data *head;
head = (struct vfs_fsp_data *)vfs_memctx_fsp_extension(handle, fsp);
if (head != NULL) {
return EXT_DATA_AREA(head);
}
return NULL;
}
| 142,206,023,076,453,120,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,858 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | NTSTATUS vfs_file_exist(connection_struct *conn, struct smb_filename *smb_fname)
{
/* Only return OK if stat was successful and S_ISREG */
if ((SMB_VFS_STAT(conn, smb_fname) != -1) &&
S_ISREG(smb_fname->st.st_ex_mode)) {
return NT_STATUS_OK;
}
return NT_STATUS_OBJECT_NAME_NOT_FOUND;
}
| 326,352,798,746,098,200,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,859 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | int vfs_fill_sparse(files_struct *fsp, off_t len)
{
int ret;
NTSTATUS status;
off_t offset;
size_t num_to_write;
status = vfs_stat_fsp(fsp);
if (!NT_STATUS_IS_OK(status)) {
return -1;
}
if (len <= fsp->fsp_name->st.st_ex_size) {
return 0;
}
#ifdef S_ISFIFO
if (S_ISFIFO(fsp->fsp_name->st.st_ex_mode)) {
... | 285,342,743,341,522,080,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,860 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | static struct vfs_init_function_entry *vfs_find_backend_entry(const char *name)
{
struct vfs_init_function_entry *entry = backends;
DEBUG(10, ("vfs_find_backend_entry called for %s\n", name));
while(entry) {
if (strcmp(entry->name, name)==0) return entry;
entry = entry->next;
}
return NULL;
}
| 41,583,423,039,035,294,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,861 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | static void vfs_init_default(connection_struct *conn)
{
DEBUG(3, ("Initialising default vfs hooks\n"));
vfs_init_custom(conn, DEFAULT_VFS_MODULE_NAME);
}
| 139,340,171,800,392,920,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,862 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | void *vfs_memctx_fsp_extension(vfs_handle_struct *handle, files_struct *fsp)
{
struct vfs_fsp_data *head;
for (head = fsp->vfs_extension; head; head = head->next) {
if (head->owner == handle) {
return head;
}
}
return NULL;
}
| 107,681,528,240,492,030,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,863 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | static ssize_t vfs_pread_fn(void *file, void *buf, size_t len, off_t offset)
{
struct files_struct *fsp = (struct files_struct *)file;
return SMB_VFS_PREAD(fsp, buf, len, offset);
}
| 264,849,568,431,931,100,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,864 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | ssize_t vfs_pwrite_data(struct smb_request *req,
files_struct *fsp,
const char *buffer,
size_t N,
off_t offset)
{
size_t total=0;
ssize_t ret;
if (req && req->unread_bytes) {
int sockfd = req->xconn->transport.sock;
SMB_ASSERT(req->unread_bytes == N);
/* VFS_RECVFILE must drain the socket
* bef... | 286,706,200,622,483,130,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,865 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | static ssize_t vfs_pwrite_fn(void *file, const void *buf, size_t len, off_t offset)
{
struct files_struct *fsp = (struct files_struct *)file;
return SMB_VFS_PWRITE(fsp, buf, len, offset);
}
| 12,151,740,774,815,795,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,866 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | ssize_t vfs_read_data(files_struct *fsp, char *buf, size_t byte_count)
{
size_t total=0;
while (total < byte_count)
{
ssize_t ret = SMB_VFS_READ(fsp, buf + total,
byte_count - total);
if (ret == 0) return total;
if (ret == -1) {
if (errno == EINTR)
continue;
else
return -1;
}
total ... | 137,294,150,240,286,900,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,867 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | const char *vfs_readdirname(connection_struct *conn, void *p,
SMB_STRUCT_STAT *sbuf, char **talloced)
{
struct dirent *ptr= NULL;
const char *dname;
char *translated;
NTSTATUS status;
if (!p)
return(NULL);
ptr = SMB_VFS_READDIR(conn, (DIR *)p, sbuf);
if (!ptr)
return(NULL);
dname = ptr->d_name;
... | 312,628,252,079,778,840,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,868 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | void vfs_remove_fsp_extension(vfs_handle_struct *handle, files_struct *fsp)
{
struct vfs_fsp_data *curr;
struct vfs_fsp_data *prev;
for (curr = fsp->vfs_extension, prev = NULL;
curr;
prev = curr, curr = curr->next) {
if (curr->owner == handle) {
if (prev) {
prev->next = curr->next;
... | 62,577,659,619,870,440,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,869 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | int vfs_set_filelen(files_struct *fsp, off_t len)
{
int ret;
contend_level2_oplocks_begin(fsp, LEVEL2_CONTEND_SET_FILE_LEN);
DEBUG(10,("vfs_set_filelen: ftruncate %s to len %.0f\n",
fsp_str_dbg(fsp), (double)len));
flush_write_cache(fsp, SAMBA_SIZECHANGE_FLUSH);
if ((ret = SMB_VFS_FTRUNCATE(fsp, len)) != -1)... | 5,779,533,107,458,427,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,870 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | int vfs_slow_fallocate(files_struct *fsp, off_t offset, off_t len)
{
ssize_t pwrite_ret;
size_t total = 0;
if (!sparse_buf) {
sparse_buf = SMB_CALLOC_ARRAY(char, SPARSE_BUF_WRITE_SIZE);
if (!sparse_buf) {
errno = ENOMEM;
return -1;
}
}
while (total < len) {
size_t curr_write_size = MIN(SPARSE_BUF_W... | 102,098,134,014,334,890,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,871 | samba | 4278ef25f64d5fdbf432ff1534e275416ec9561e | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=4278ef25f64d5fdbf432ff1534e275416ec9561e | CVE-2015-5252: s3: smbd: Fix symlink verification (file access outside the share).
Ensure matching component ends in '/' or '\0'.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11395
Signed-off-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org> | 0 | off_t vfs_transfer_file(files_struct *in, files_struct *out, off_t n)
{
return transfer_file_internal((void *)in, (void *)out, n,
vfs_pread_fn, vfs_pwrite_fn);
}
| 146,103,509,210,130,400,000,000,000,000,000,000,000 | vfs.c | 141,386,651,199,010,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-5252 | vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share. | https://nvd.nist.gov/vuln/detail/CVE-2015-5252 |
12,872 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | another_hunk (enum diff difftype, bool rev)
{
char *s;
lin context = 0;
size_t chars_read;
char numbuf0[LINENUM_LENGTH_BOUND + 1];
char numbuf1[LINENUM_LENGTH_BOUND + 1];
char numbuf2[LINENUM_LENGTH_BOUND + 1];
char numbuf3[LINENUM_LENGTH_BOUND + 1];
set_hunkmax();
while (p_end >= ... | 156,789,205,795,336,020,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,873 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | best_name (char *const *name, int const *ignore)
{
enum nametype i;
int components[3];
int components_min = INT_MAX;
size_t basename_len[3];
size_t basename_len_min = SIZE_MAX;
size_t len[3];
size_t len_min = SIZE_MAX;
for (i = OLD; i <= INDEX; i++)
if (name[i] && !ignore[i])
{
/* Take the... | 9,509,497,684,600,765,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,874 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | fetchmode (char const *str)
{
const char *s;
mode_t mode;
while (ISSPACE ((unsigned char) *str))
str++;
for (s = str, mode = 0; s < str + 6; s++)
{
if (*s >= '0' && *s <= '7')
mode = (mode << 3) + (*s - '0');
else
{
mode = 0;
break;
}
}
if (*s == '\r')
s++;
i... | 77,035,898,437,383,170,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,875 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | get_ed_command_letter (char const *line)
{
char const *p = line;
char letter;
bool pair = false;
if (ISDIGIT (*p))
{
while (ISDIGIT (*++p))
/* do nothing */ ;
if (*p == ',')
{
if (! ISDIGIT (*++p))
return 0;
while (ISDIGIT (*++p))
/* do nothing */ ;
pair = true;
}
}
... | 278,989,658,672,877,030,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,876 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | get_line (void)
{
return pget_line (p_indent, p_rfc934_nesting, p_strip_trailing_cr,
p_pass_comments_through);
}
| 196,387,020,486,838,570,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,877 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | get_sha1(char **sha1, char const *start, char const *end)
{
unsigned int len = end - start;
*sha1 = xmalloc (len + 1);
memcpy (*sha1, start, len);
(*sha1)[len] = 0;
}
| 240,374,617,207,334,120,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,878 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | grow_hunkmax (void)
{
hunkmax *= 2;
assert (p_line && p_len && p_Char);
if ((p_line = realloc (p_line, hunkmax * sizeof (*p_line)))
&& (p_len = realloc (p_len, hunkmax * sizeof (*p_len)))
&& (p_Char = realloc (p_Char, hunkmax * sizeof (*p_Char))))
return true;
if (!using_plan_a)
xalloc_die... | 216,403,562,209,770,570,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,879 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | incomplete_line (void)
{
FILE *fp = pfp;
int c;
file_offset line_beginning = file_tell (fp);
if (getc (fp) == '\\')
{
while ((c = getc (fp)) != '\n' && c != EOF)
/* do nothing */ ;
return true;
}
else
{
/* We don't trust ungetc. */
Fseek (pfp, line_beginning, SEEK_SET)... | 142,473,767,899,011,460,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,880 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | malformed (void)
{
char numbuf[LINENUM_LENGTH_BOUND + 1];
fatal ("malformed patch at line %s: %s",
format_linenum (numbuf, p_input_line), buf);
/* about as informative as "Syntax error" in C */
}
| 325,628,780,710,024,540,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,881 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | maybe_reverse (char const *name, bool nonexistent, bool is_empty)
{
bool looks_reversed = (! is_empty) < p_says_nonexistent[reverse ^ is_empty];
/* Allow to create and delete empty files when we know that they are empty:
in the "diff --git" format, we know that from the index header. */
if (is_empty
... | 111,851,605,719,924,570,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,882 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | name_is_valid (char const *name)
{
int i;
bool is_valid = true;
for (i = 0; i < ARRAY_SIZE (invalid_names); i++)
{
if (! invalid_names[i])
break;
if (! strcmp (invalid_names[i], name))
return false;
}
is_valid = filename_is_safe (name);
/* Allow any filename if we are in the filesyste... | 79,862,950,876,850,190,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,883 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | next_intuit_at (file_offset file_pos, lin file_line)
{
p_base = file_pos;
p_bline = file_line;
}
| 176,657,823,479,154,770,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,884 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | open_patch_file (char const *filename)
{
file_offset file_pos = 0;
file_offset pos;
struct stat st;
if (!filename || !*filename || strEQ (filename, "-"))
pfp = stdin;
else
{
pfp = fopen (filename, binary_transput ? "rb" : "r");
if (!pfp)
pfatal ("Can't open patch file %s", quotearg... | 182,153,303,616,941,000,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,885 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_char (lin line)
{
return p_Char[line];
}
| 113,189,287,940,409,640,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,886 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_end (void)
{
return p_end;
}
| 213,575,755,474,852,100,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,887 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_git_diff (void)
{
return p_git_diff;
}
| 285,589,485,354,817,060,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,888 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_hunk_beg (void)
{
return p_hunk_beg;
}
| 87,020,067,448,146,860,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,889 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_line_len (lin line)
{
return p_len[line];
}
| 171,183,517,600,254,400,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,890 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_mode (bool which)
{
return p_mode[which];
}
| 4,349,191,385,757,603,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,891 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_name (enum nametype type)
{
return type == NONE ? NULL : p_name[type];
}
| 62,647,585,479,943,300,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,892 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_newfirst (void)
{
return p_newfirst;
}
| 86,801,142,811,887,160,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,893 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_prefix_context (void)
{
return p_prefix_context;
}
| 254,261,737,676,717,750,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,894 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | bool pch_rename (void)
{
return p_rename[OLD] && p_rename[NEW];
}
| 278,740,633,775,403,630,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,895 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_repl_lines (void)
{
return p_repl_lines;
}
| 116,134,114,917,841,580,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,896 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_says_nonexistent (bool which)
{
return p_says_nonexistent[which];
}
| 226,208,491,458,555,400,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,897 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_sha1 (bool which)
{
return p_sha1[which];
}
| 285,361,766,700,519,930,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,898 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_suffix_context (void)
{
return p_suffix_context;
}
| 256,839,133,313,721,450,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,899 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pch_timestr (bool which)
{
return p_timestr[which];
}
| 298,705,250,631,110,860,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,900 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | pget_line (size_t indent, int rfc934_nesting, bool strip_trailing_cr,
bool pass_comments_through)
{
FILE *fp = pfp;
int c;
size_t i;
char *b;
size_t s;
do
{
i = 0;
for (;;)
{
c = getc (fp);
if (c == EOF)
{
if (ferror (fp))
read_fatal ();
return 0;
}
i... | 327,183,863,968,774,400,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,901 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | prefix_components (char *filename, bool checkdirs)
{
int count = 0;
struct stat stat_buf;
int stat_result;
char *f = filename + FILE_SYSTEM_PREFIX_LEN (filename);
if (*f)
while (*++f)
if (ISSLASH (f[0]) && ! ISSLASH (f[-1]))
{
if (checkdirs)
{
*f = '\0';
stat_result = safe_st... | 292,061,560,741,285,400,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,902 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | re_patch (void)
{
p_first = 0;
p_newfirst = 0;
p_ptrn_lines = 0;
p_repl_lines = 0;
p_end = -1;
p_max = 0;
p_indent = 0;
p_strip_trailing_cr = false;
}
| 76,447,009,485,079,840,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,903 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | set_hunkmax (void)
{
if (!p_line)
p_line = xmalloc (hunkmax * sizeof *p_line);
if (!p_len)
p_len = xmalloc (hunkmax * sizeof *p_len);
if (!p_Char)
p_Char = xmalloc (hunkmax * sizeof *p_Char);
}
| 309,383,105,853,887,740,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,904 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | skip_hex_digits (char const *str)
{
char const *s;
for (s = str; (*s >= '0' && *s <= '9') || (*s >= 'a' && *s <= 'f'); s++)
/* do nothing */ ;
return s == str ? NULL : s;
}
| 167,687,049,359,867,990,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,905 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | skip_to (file_offset file_pos, lin file_line)
{
FILE *i = pfp;
FILE *o = stdout;
int c;
assert(p_base <= file_pos);
if ((verbosity == VERBOSE || !inname) && p_base < file_pos) {
Fseek (i, p_base, SEEK_SET);
say ("The text leading up to this was:\n--------------------------\n");
while (file_tell... | 118,079,717,602,775,590,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,906 | savannah | 3fcd042d26d70856e826a42b5f93dc4854d80bf0 | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0 | None | 0 | there_is_another_patch (bool need_header, mode_t *file_type)
{
if (p_base != 0 && p_base >= p_filesize) {
if (verbosity == VERBOSE)
say ("done\n");
return false;
}
if (verbosity == VERBOSE)
say ("Hmm...");
diff_type = intuit_diff_type (need_header, file_type);
if (diff_type == NO_DIFF) {
if... | 130,862,108,197,889,130,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-13638 | GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. | https://nvd.nist.gov/vuln/detail/CVE-2019-13638 |
12,907 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | get_input_file (char const *filename, char const *outname, mode_t file_type)
{
bool elsewhere = strcmp (filename, outname) != 0;
char const *cs;
char *diffbuf;
char *getbuf;
if (inerrno == -1)
inerrno = stat_file (filename, &instat);
/* Perhaps look for RCS or SCCS versions. */
if (... | 228,721,102,025,008,530,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,908 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | re_input (void)
{
if (using_plan_a) {
if (i_buffer)
{
free (i_buffer);
i_buffer = 0;
free (i_ptr);
}
}
else {
if (tifd >= 0)
close (tifd);
tifd = -1;
if (tibuf[0])
{
free (tibuf[0]);
tibuf[0] = 0;
}
tiline[0] = tiline[1] = -1;
tireclen = 0;
}
}
| 74,690,872,128,934,890,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,909 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | report_revision (bool found_revision)
{
char const *rev = quotearg (revision);
if (found_revision)
{
if (verbosity == VERBOSE)
say ("Good. This file appears to be the %s version.\n", rev);
}
else if (force)
{
if (verbosity != SILENT)
say ("Warning: this file doesn't appear to be the %s... | 226,103,584,018,110,450,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,910 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | too_many_lines (char const *filename)
{
fatal ("File %s has too many lines", quotearg (filename));
}
| 36,215,866,788,484,940,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,911 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | Fseek (FILE *stream, file_offset offset, int ptrname)
{
if (file_seek (stream, offset, ptrname) != 0)
pfatal ("fseek");
}
| 18,322,165,002,801,752,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,912 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | __insert_file_id (struct stat const *st, enum file_id_type type)
{
file_id *p;
static file_id *next_slot;
if (!next_slot)
next_slot = xmalloc (sizeof *next_slot);
next_slot->dev = st->st_dev;
next_slot->ino = st->st_ino;
next_slot->queued_output = false;
p = hash_insert (file_id_table, next_s... | 88,520,534,876,390,840,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,913 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | __lookup_file_id (struct stat const *st)
{
file_id f;
f.dev = st->st_dev;
f.ino = st->st_ino;
return hash_lookup (file_id_table, &f);
}
| 102,006,220,852,737,820,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,914 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | contains_slash (const char *s)
{
for (; *s; s++)
if (ISSLASH(*s))
return true;
return false;
}
| 132,215,065,949,111,180,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,915 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | copy_attr (char const *src_path, char const *dst_path)
{
return 0;
}
| 138,597,939,216,080,310,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,916 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | copy_attr_check (const char *name, struct error_context *ctx)
{
int action = attr_copy_action (name, ctx);
return action == 0 || action == ATTR_ACTION_PERMISSIONS;
}
| 235,290,618,994,882,140,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,917 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | copy_attr_error (struct error_context *ctx, char const *fmt, ...)
{
int err = errno;
va_list ap;
if (err != ENOSYS && err != ENOTSUP && err != EPERM)
{
/* use verror module to print error message */
va_start (ap, fmt);
verror (0, err, fmt, ap);
va_end (ap);
}
}
| 314,615,643,859,749,870,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,918 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | copy_attr_free (struct error_context *ctx, char const *str)
{
}
| 282,182,550,043,181,700,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,919 | savannah | dce4683cbbe107a95f1f0d45fabc304acfb5d71a | https://git.savannah.gnu.org/gitweb/?p=gnutls | https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a | None | 0 | copy_attr_quote (struct error_context *ctx, char const *str)
{
return quotearg (str);
}
| 220,758,973,781,350,270,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2019-13636 | In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13636 |
12,920 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_cache_check (DBusHeader *header,
int field)
{
_dbus_assert (field <= DBUS_HEADER_FIELD_LAST);
if (header->fields[field].value_pos == _DBUS_HEADER_FIELD_VALUE_UNKNOWN)
_dbus_header_cache_revalidate (header);
if (header->fields[field].value_pos == _DBUS_HEA... | 144,020,075,076,020,670,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,921 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_cache_invalidate_all (DBusHeader *header)
{
int i;
i = 0;
while (i <= DBUS_HEADER_FIELD_LAST)
{
header->fields[i].value_pos = _DBUS_HEADER_FIELD_VALUE_UNKNOWN;
++i;
}
}
| 317,582,301,025,191,700,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,922 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_cache_known_nonexistent (DBusHeader *header,
int field)
{
_dbus_assert (field <= DBUS_HEADER_FIELD_LAST);
return (header->fields[field].value_pos == _DBUS_HEADER_FIELD_VALUE_NONEXISTENT);
}
| 211,413,715,981,418,800,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,923 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_cache_one (DBusHeader *header,
int field_code,
DBusTypeReader *variant_reader)
{
header->fields[field_code].value_pos =
_dbus_type_reader_get_value_pos (variant_reader);
#if 0
_dbus_verbose ("cached value_pos %d for field %d\n",
... | 126,355,070,039,433,650,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,924 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_cache_revalidate (DBusHeader *header)
{
DBusTypeReader array;
DBusTypeReader reader;
int i;
i = 0;
while (i <= DBUS_HEADER_FIELD_LAST)
{
header->fields[i].value_pos = _DBUS_HEADER_FIELD_VALUE_NONEXISTENT;
++i;
}
_dbus_type_reader_init (&reader,
he... | 322,166,570,115,088,650,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,925 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_copy (const DBusHeader *header,
DBusHeader *dest)
{
*dest = *header;
if (!_dbus_string_init_preallocated (&dest->data,
_dbus_string_get_length (&header->data)))
return FALSE;
if (!_dbus_string_copy (&header->data, 0, &dest->data, 0... | 266,154,531,972,123,830,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,926 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_create (DBusHeader *header,
int message_type,
const char *destination,
const char *path,
const char *interface,
const char *member,
const char *error_name)
{
unsign... | 39,794,338,453,660,150,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,927 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_delete_field (DBusHeader *header,
int field)
{
DBusTypeReader reader;
DBusTypeReader realign_root;
if (_dbus_header_cache_known_nonexistent (header, field))
return TRUE; /* nothing to do */
/* Scan to the field we want, delete and realign, reappend
* padd... | 336,313,583,656,515,600,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,928 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_free (DBusHeader *header)
{
_dbus_string_free (&header->data);
}
| 220,017,667,161,735,040,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,929 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_get_field_raw (DBusHeader *header,
int field,
const DBusString **str,
int *pos)
{
if (!_dbus_header_cache_check (header, field))
return FALSE;
if (str)
*str = &header->data;
... | 263,602,942,192,859,130,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,930 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_get_flag (DBusHeader *header,
dbus_uint32_t flag)
{
const unsigned char *flags_p;
flags_p = _dbus_string_get_const_data_len (&header->data, FLAGS_OFFSET, 1);
return (*flags_p & flag) != 0;
}
| 16,736,606,330,099,790,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,931 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_get_serial (DBusHeader *header)
{
return _dbus_marshal_read_uint32 (&header->data,
SERIAL_OFFSET,
header->byte_order,
NULL);
}
| 154,746,899,092,142,130,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,932 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_have_message_untrusted (int max_message_length,
DBusValidity *validity,
int *byte_order,
int *fields_array_len,
... | 176,748,178,290,246,840,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,933 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_init (DBusHeader *header,
int byte_order)
{
if (!_dbus_string_init_preallocated (&header->data, 32))
return FALSE;
_dbus_header_reinit (header, byte_order);
return TRUE;
}
| 246,051,285,141,552,220,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,934 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_reinit (DBusHeader *header,
int byte_order)
{
_dbus_string_set_length (&header->data, 0);
header->byte_order = byte_order;
header->padding = 0;
_dbus_header_cache_invalidate_all (header);
}
| 165,059,247,421,556,400,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,935 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_set_field_basic (DBusHeader *header,
int field,
int type,
const void *value)
{
_dbus_assert (field <= DBUS_HEADER_FIELD_LAST);
if (!reserve_header_padding (header))
ret... | 309,199,238,343,700,400,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,936 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_set_serial (DBusHeader *header,
dbus_uint32_t serial)
{
/* we use this function to set the serial on outgoing
* messages, and to reset the serial in dbus_message_copy;
* this assertion should catch a double-set on outgoing.
*/
_dbus_assert (_dbus_header_get_serial ... | 265,991,713,160,041,630,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,937 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_toggle_flag (DBusHeader *header,
dbus_uint32_t flag,
dbus_bool_t value)
{
unsigned char *flags_p;
flags_p = _dbus_string_get_data_len (&header->data, FLAGS_OFFSET, 1);
if (value)
*flags_p |= flag;
else
*flags_p &= ~flag;
}
| 339,161,512,677,815,220,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,938 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_header_update_lengths (DBusHeader *header,
int body_len)
{
_dbus_marshal_set_uint32 (&header->data,
BODY_LENGTH_OFFSET,
body_len,
header->byte_order);
}
| 236,862,773,916,220,600,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,939 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | _dbus_marshal_header_test (void)
{
return TRUE;
}
| 254,669,144,716,916,200,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,940 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | find_field_for_modification (DBusHeader *header,
int field,
DBusTypeReader *reader,
DBusTypeReader *realign_root)
{
dbus_bool_t retval;
retval = FALSE;
_dbus_type_reader_init (realign_root,
... | 108,606,903,235,215,720,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,941 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | reserve_header_padding (DBusHeader *header)
{
_dbus_assert (header->padding <= MAX_POSSIBLE_HEADER_PADDING);
if (!_dbus_string_lengthen (&header->data,
MAX_POSSIBLE_HEADER_PADDING - header->padding))
return FALSE;
header->padding = MAX_POSSIBLE_HEADER_PADDING;
return TRUE;
}
| 152,445,938,804,848,390,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,942 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | set_basic_field (DBusTypeReader *reader,
int field,
int type,
const void *value,
const DBusTypeReader *realign_root)
{
DBusTypeReader sub;
DBusTypeReader variant;
_dbus_type_reader_recurse (rea... | 199,355,673,086,836,480,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,943 | dbus | c3223ba6c401ba81df1305851312a47c485e6cd7 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 | _dbus_header_byteswap: change the first byte of the message, not just the struct member
This has been wrong approximately forever, for instance see:
http://lists.freedesktop.org/archives/dbus/2007-March/007357.html
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=38120
Bug-Debian: http://bugs.debian.org/cgi-bin/bugr... | 0 | write_basic_field (DBusTypeWriter *writer,
int field,
int type,
const void *value)
{
DBusTypeWriter sub;
DBusTypeWriter variant;
int start;
int padding;
unsigned char field_byte;
DBusString contained_type;
char buf[2];
... | 176,741,231,719,318,750,000,000,000,000,000,000,000 | dbus-marshal-header.c | 208,185,001,665,072,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-2200 | The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct... | https://nvd.nist.gov/vuln/detail/CVE-2011-2200 |
12,953 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | static RELOC_PTRS_WITH(device_reloc_ptrs, gx_device *dev)
{
dev->parent = gx_device_reloc_ptr(dev->parent, gcst);
dev->child = gx_device_reloc_ptr(dev->child, gcst);
}
| 304,114,002,168,998,000,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,954 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | static RELOC_PTRS_WITH(device_forward_reloc_ptrs, gx_device_forward *fdev)
{
fdev->target = gx_device_reloc_ptr(fdev->target, gcst);
}
| 219,901,455,457,111,800,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,955 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_closedevice(gx_device * dev)
{
int code = 0;
if (dev->is_open) {
code = (*dev_proc(dev, close_device))(dev);
dev->is_open = false;
if (code < 0)
return_error(code);
}
return code;
}
| 241,688,701,805,302,860,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,956 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_copydevice2(gx_device ** pnew_dev, const gx_device * dev, bool keep_open,
gs_memory_t * mem)
{
gx_device *new_dev;
const gs_memory_struct_type_t *std = dev->stype;
const gs_memory_struct_type_t *new_std;
gs_memory_struct_type_t *a_std = 0;
int code;
if (dev->stype_is_dynamic) ... | 307,728,776,456,067,800,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,957 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_copypage(gs_gstate * pgs)
{
return gs_output_page(pgs, 1, 0);
}
| 273,863,276,612,510,720,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.