idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
21,170 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_make_global_ctx(Jbig2Ctx *ctx)
{
return (Jbig2GlobalCtx *) ctx;
}
| 293,060,785,972,687,330,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,171 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_realloc(Jbig2Allocator *allocator, void *p, size_t size, size_t num)
{
/* check for integer multiplication overflow */
if (num > 0 && size >= (size_t) - 0x100 / num)
return NULL;
return allocator->realloc(allocator, p, size * num);
}
| 257,906,945,006,803,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,172 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_word_stream_buf_new(Jbig2Ctx *ctx, const byte *data, size_t size)
{
Jbig2WordStreamBuf *result = jbig2_new(ctx, Jbig2WordStreamBuf, 1);
if (result == NULL) {
jbig2_error(ctx, JBIG2_SEVERITY_FATAL, -1, "failed to allocate Jbig2WordStreamBuf in jbig2_word_stream_buf_new");
return NULL;
... | 288,388,873,949,700,440,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,173 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | copy_prev_row(Jbig2Image *image, int row)
{
if (!row) {
/* no previous row */
memset(image->data, 0, image->stride);
} else {
/* duplicate data from the previous row */
uint8_t *src = image->data + (row - 1) * image->stride;
memcpy(src + image->stride, src, image->stride... | 110,054,091,345,938,320,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,174 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_region(Jbig2Ctx *ctx,
Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int8_t *gbat = params->gbat;
if (image->stride * image->height > (1 << 24) && segment->data_length < imag... | 236,079,836,502,710,950,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,175 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_region_TPGDON(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
switch (params->GBTEMPLATE) {
case 0:
return jbig2_deco... | 292,822,683,866,506,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,176 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template0(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = i... | 182,301,213,972,004,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,177 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template0_TPGDON(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->h... | 290,098,400,987,821,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,178 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template0_unopt(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->heig... | 194,971,647,549,770,360,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,179 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template1(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->height;
const int ... | 61,187,756,391,727,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,180 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template2(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->height;
const int ... | 7,052,442,311,914,768,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,181 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template2_TPGDON(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->h... | 252,710,829,373,654,230,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,182 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template2a(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->height;
const i... | 182,070,032,218,958,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,183 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template3(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->height;
const int ... | 22,824,203,421,509,215,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,184 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template3_TPGDON(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->h... | 56,095,665,162,752,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,185 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_generic_template3_unopt(Jbig2Ctx *ctx,
Jbig2Segment *segment,
const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats)
{
const int GBW = image->width;
const int GBH = image->heig... | 281,788,004,055,363,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,186 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_generic_stats_size(Jbig2Ctx *ctx, int template)
{
int stats_size = template == 0 ? 1 << 16 : template == 1 ? 1 << 1 << 13 : 1 << 10;
return stats_size;
}
| 133,648,513,902,186,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,187 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_pattern_dict(Jbig2Ctx *ctx, Jbig2Segment *segment,
const Jbig2PatternDictParams *params, const byte *data, const size_t size, Jbig2ArithCx *GB_stats)
{
Jbig2PatternDict *hd = NULL;
Jbig2Image *image = NULL;
Jbig2GenericRegionParams rparams;
int code = 0;
/* al... | 241,592,402,361,704,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,188 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_hd_new(Jbig2Ctx *ctx, const Jbig2PatternDictParams *params, Jbig2Image *image)
{
Jbig2PatternDict *new;
const int N = params->GRAYMAX + 1;
const int HPW = params->HDPW;
const int HPH = params->HDPH;
int i;
/* allocate a new struct */
new = jbig2_new(ctx, Jbig2PatternDict, 1);
if (... | 134,186,738,967,408,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,189 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_hd_release(Jbig2Ctx *ctx, Jbig2PatternDict *dict)
{
int i;
if (dict == NULL)
return;
for (i = 0; i < dict->n_patterns; i++)
if (dict->patterns[i])
jbig2_image_release(ctx, dict->patterns[i]);
jbig2_free(ctx->allocator, dict->patterns);
jbig2_free(ctx->allocator, di... | 234,666,706,626,379,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,190 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_pattern_dictionary(Jbig2Ctx *ctx, Jbig2Segment *segment, const byte *segment_data)
{
Jbig2PatternDictParams params;
Jbig2ArithCx *GB_stats = NULL;
byte flags;
int offset = 0;
/* 7.4.4.1 - Data header */
if (segment->data_length < 7) {
return jbig2_error(ctx, JBIG2_SEVERITY_FATAL, ... | 326,853,311,271,252,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,191 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_build_huffman_table(Jbig2Ctx *ctx, const Jbig2HuffmanParams *params)
{
int *LENCOUNT;
int LENMAX = -1;
const int lencountcount = 256;
const Jbig2HuffmanLine *lines = params->lines;
int n_lines = params->n_lines;
int i, j;
int max_j;
int log_table_size = 0;
Jbig2HuffmanTable *re... | 320,689,555,873,302,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,192 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_dump_huffman_binary(Jbig2HuffmanState *hs)
{
const uint32_t word = hs->this_word;
int i;
fprintf(stderr, "huffman binary ");
for (i = 31; i >= 0; i--)
fprintf(stderr, ((word >> i) & 1) ? "1" : "0");
fprintf(stderr, "\n");
}
| 174,491,046,170,364,780,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,193 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_dump_huffman_table(const Jbig2HuffmanTable *table)
{
int i;
int table_size = (1 << table->log_table_size);
fprintf(stderr, "huffman table %p (log_table_size=%d, %d entries, entryies=%p):\n", table, table->log_table_size, table_size, table->entries);
for (i = 0; i < table_size; i++) {
fpri... | 260,853,172,045,653,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,194 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_find_table(Jbig2Ctx *ctx, Jbig2Segment *segment, int index)
{
int i, table_index = 0;
for (i = 0; i < segment->referred_to_segment_count; i++) {
const Jbig2Segment *const rsegment = jbig2_find_segment(ctx, segment->referred_to_segments[i]);
if (rsegment && (rsegment->flags & 63) == 53) {... | 48,885,276,418,249,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,195 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_huffman_free(Jbig2Ctx *ctx, Jbig2HuffmanState *hs)
{
if (hs != NULL)
jbig2_free(ctx->allocator, hs);
return;
}
| 60,787,165,412,932,325,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,196 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_huffman_get(Jbig2HuffmanState *hs, const Jbig2HuffmanTable *table, bool *oob)
{
Jbig2HuffmanEntry *entry;
byte flags;
int offset_bits = hs->offset_bits;
uint32_t this_word = hs->this_word;
uint32_t next_word;
int RANGELEN;
int32_t result;
if (hs->offset_limit && hs->offset >= hs->... | 112,070,433,476,590,690,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,197 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_huffman_offset(Jbig2HuffmanState *hs)
{
return hs->offset + (hs->offset_bits >> 3);
}
| 263,561,625,271,923,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,198 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_huffman_skip(Jbig2HuffmanState *hs)
{
int bits = hs->offset_bits & 7;
if (bits) {
bits = 8 - bits;
hs->offset_bits += bits;
hs->this_word = (hs->this_word << bits) | (hs->next_word >> (32 - hs->offset_bits));
}
if (hs->offset_bits >= 32) {
hs->this_word = hs->next... | 249,409,303,162,974,240,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,199 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_release_huffman_table(Jbig2Ctx *ctx, Jbig2HuffmanTable *table)
{
if (table != NULL) {
jbig2_free(ctx->allocator, table->entries);
jbig2_free(ctx->allocator, table);
}
return;
}
| 18,521,792,971,816,724,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,200 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_table(Jbig2Ctx *ctx, Jbig2Segment *segment, const byte *segment_data)
{
Jbig2HuffmanParams *params = NULL;
Jbig2HuffmanLine *line = NULL;
segment->result = NULL;
if (segment->data_length < 10)
goto too_short;
{
/* B.2 1) (B.2.1) Code table flags */
const int code_tabl... | 232,728,276,523,313,580,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,201 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_table_free(Jbig2Ctx *ctx, Jbig2HuffmanParams *params)
{
if (params != NULL) {
if (params->lines != NULL)
jbig2_free(ctx->allocator, (void *)params->lines);
jbig2_free(ctx->allocator, params);
}
}
| 273,908,959,578,532,260,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,202 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_table_read_bits(const byte *data, size_t *bitoffset, const int bitlen)
{
uint32_t result = 0;
uint32_t byte_offset = *bitoffset / 8;
const int endbit = (*bitoffset & 7) + bitlen;
const int n_proc_bytes = (endbit + 7) / 8;
const int rshift = n_proc_bytes * 8 - endbit;
int i;
for (i = n... | 308,749,388,160,825,400,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,203 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | test_get_word(Jbig2WordStream *self, int offset, uint32_t *word)
{
uint32_t val = 0;
test_stream_t *st = (test_stream_t *) self;
if (st != NULL) {
if (st->h != NULL) {
if (offset >= st->h->input_len)
return -1;
if (offset < st->h->input_len) {
... | 218,879,849,311,067,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,204 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_image_clear(Jbig2Ctx *ctx, Jbig2Image *image, int value)
{
const uint8_t fill = value ? 0xFF : 0x00;
memset(image->data, fill, image->stride * image->height);
}
| 145,021,005,712,531,240,000,000,000,000,000,000,000 | jbig2_image.c | 275,695,218,023,988,680,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,205 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_image_clone(Jbig2Ctx *ctx, Jbig2Image *image)
{
if (image)
image->refcount++;
return image;
}
| 52,487,369,955,016,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,206 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_image_free(Jbig2Ctx *ctx, Jbig2Image *image)
{
if (image)
jbig2_free(ctx->allocator, image->data);
jbig2_free(ctx->allocator, image);
}
| 140,739,488,845,399,990,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,207 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_image_get_pixel(Jbig2Image *image, int x, int y)
{
const int w = image->width;
const int h = image->height;
const int byte = (x >> 3) + y * image->stride;
const int bit = 7 - (x & 7);
if ((x < 0) || (x >= w))
return 0;
if ((y < 0) || (y >= h))
return 0;
return ((image... | 212,468,617,377,833,780,000,000,000,000,000,000,000 | jbig2_image.c | 275,695,218,023,988,680,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,208 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_image_release(Jbig2Ctx *ctx, Jbig2Image *image)
{
if (image == NULL)
return;
image->refcount--;
if (!image->refcount)
jbig2_image_free(ctx, image);
}
| 191,704,538,375,319,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,209 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_image_set_pixel(Jbig2Image *image, int x, int y, bool value)
{
const int w = image->width;
const int h = image->height;
int scratch, mask;
int bit, byte;
if ((x < 0) || (x >= w))
return 0;
if ((y < 0) || (y >= h))
return 0;
byte = (x >> 3) + y * image->stride;
bit... | 125,191,143,700,565,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,210 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_decode_mmr_consume(Jbig2MmrCtx *mmr, int n_bits)
{
mmr->word <<= n_bits;
mmr->bit_index += n_bits;
while (mmr->bit_index >= 8) {
mmr->bit_index -= 8;
if (mmr->data_index + 4 < mmr->size)
mmr->word |= (mmr->data[mmr->data_index + 4] << mmr->bit_index);
mmr->data_inde... | 275,637,840,447,946,580,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,211 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | dump_page_info(Jbig2Ctx *ctx, Jbig2Segment *segment, Jbig2Page *page)
{
if (page->x_resolution == 0) {
jbig2_error(ctx, JBIG2_SEVERITY_INFO, segment->number, "page %d image is %dx%d (unknown res)", page->number, page->width, page->height);
} else if (page->x_resolution == page->y_resolution) {
j... | 147,832,988,932,521,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,212 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_complete_page(Jbig2Ctx *ctx)
{
int code = 0;
/* check for unfinished segments */
if (ctx->segment_index != ctx->n_segments) {
Jbig2Segment *segment = ctx->segments[ctx->segment_index];
/* Some versions of Xerox Workcentre generate PDF files
with the segment data length fie... | 108,220,336,999,600,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,213 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_page_info(Jbig2Ctx *ctx, Jbig2Segment *segment, const uint8_t *segment_data)
{
Jbig2Page *page;
/* a new page info segment implies the previous page is finished */
page = &(ctx->pages[ctx->current_page]);
if ((page->number != 0) && ((page->state == JBIG2_PAGE_NEW) || (page->state == JBIG2_PAGE_FR... | 270,887,191,847,616,950,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,214 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_page_out(Jbig2Ctx *ctx)
{
int index;
/* search for a completed page */
for (index = 0; index < ctx->max_page_index; index++) {
if (ctx->pages[index].state == JBIG2_PAGE_COMPLETE) {
Jbig2Image *img = ctx->pages[index].image;
uint32_t page_number = ctx->pages[index].numb... | 298,563,634,127,286,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,215 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_release_page(Jbig2Ctx *ctx, Jbig2Image *image)
{
int index;
/* find the matching page struct and mark it released */
for (index = 0; index < ctx->max_page_index; index++) {
if (ctx->pages[index].image == image) {
jbig2_image_release(ctx, image);
ctx->pages[index].state... | 101,764,721,905,256,420,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,216 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_find_segment(Jbig2Ctx *ctx, uint32_t number)
{
int index, index_max = ctx->segment_index - 1;
const Jbig2Ctx *global_ctx = ctx->global_ctx;
/* FIXME: binary search would be better */
for (index = index_max; index >= 0; index--)
if (ctx->segments[index]->number == number)
retur... | 258,171,282,163,484,730,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,217 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_free_segment(Jbig2Ctx *ctx, Jbig2Segment *segment)
{
if (segment->referred_to_segments != NULL) {
jbig2_free(ctx->allocator, segment->referred_to_segments);
}
/* todo: we need either some separate fields or
a more complex result object rather than this
brittle special casing */
... | 145,399,890,820,083,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,218 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_get_region_segment_info(Jbig2RegionSegmentInfo *info, const uint8_t *segment_data)
{
/* 7.4.1 */
info->width = jbig2_get_int32(segment_data);
info->height = jbig2_get_int32(segment_data + 4);
info->x = jbig2_get_int32(segment_data + 8);
info->y = jbig2_get_int32(segment_data + 12);
info->f... | 307,196,777,252,713,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,219 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_parse_extension_segment(Jbig2Ctx *ctx, Jbig2Segment *segment, const uint8_t *segment_data)
{
uint32_t type = jbig2_get_uint32(segment_data);
bool reserved = type & 0x20000000;
/* bool dependent = type & 0x40000000; (NYI) */
bool necessary = type & 0x80000000;
if (necessary && !reserved) {
... | 37,938,465,868,987,080,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,220 | ghostscript | e698d5c11d27212aa1098bc5b1673a3378563092 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092 | None | 0 | jbig2_sd_glyph(Jbig2SymbolDict *dict, unsigned int id)
{
if (dict == NULL)
return NULL;
return dict->glyphs[id];
}
| 68,240,757,294,330,110,000,000,000,000,000,000,000 | jbig2_symbol_dict.c | 17,345,292,091,717,115,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ... | https://nvd.nist.gov/vuln/detail/CVE-2016-9601 |
21,221 | openssl | 8aed2a7548362e88e84a7feb795a3a97e8395008 | https://github.com/openssl/openssl | https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008 | Reserve option to use BN_mod_exp_mont_consttime in ECDSA.
Submitted by Shay Gueron, Intel Corp.
RT: 3149
Reviewed-by: Rich Salz <rsalz@openssl.org>
(cherry picked from commit f54be179aa4cbbd944728771d7d59ed588158a12) | 0 | static int ecdsa_do_verify(const unsigned char *dgst, int dgst_len,
const ECDSA_SIG *sig, EC_KEY *eckey)
{
int ret = -1, i;
BN_CTX *ctx;
BIGNUM *order, *u1, *u2, *m, *X;
EC_POINT *point = NULL;
const EC_GROUP *group;
const EC_POINT *pub_key;
/* check input values */
if (eckey == NULL || (group = EC_KEY_g... | 179,263,221,347,053,900,000,000,000,000,000,000,000 | None | null | [
"CWE-320"
] | CVE-2016-7056 | A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys. | https://nvd.nist.gov/vuln/detail/CVE-2016-7056 |
21,222 | busybox | 1de25a6e87e0e627aa34298105a3d17c60a1f44e | http://git.busybox.net/busybox | http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e | unzip: test for bad archive SEGVing
function old new delta
huft_build 1296 1300 +4
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static void abort_unzip(STATE_PARAM_ONLY)
{
huft_free_all(PASS_STATE_ONLY);
longjmp(error_jmp, 1);
}
| 111,649,156,846,133,530,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-9261 | huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. | https://nvd.nist.gov/vuln/detail/CVE-2015-9261 |
21,223 | busybox | 1de25a6e87e0e627aa34298105a3d17c60a1f44e | http://git.busybox.net/busybox | http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e | unzip: test for bad archive SEGVing
function old new delta
huft_build 1296 1300 +4
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static unsigned fill_bitbuffer(STATE_PARAM unsigned bitbuffer, unsigned *current, const unsigned required)
{
while (*current < required) {
if (bytebuffer_offset >= bytebuffer_size) {
unsigned sz = bytebuffer_max - 4;
if (to_read >= 0 && to_read < sz) /* unzip only */
sz = to_read;
/* Leave the first 4 b... | 107,796,936,804,010,820,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-9261 | huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. | https://nvd.nist.gov/vuln/detail/CVE-2015-9261 |
21,224 | busybox | 1de25a6e87e0e627aa34298105a3d17c60a1f44e | http://git.busybox.net/busybox | http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e | unzip: test for bad archive SEGVing
function old new delta
huft_build 1296 1300 +4
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static void huft_free(huft_t *p)
{
huft_t *q;
/* Go through linked list, freeing from the malloced (t[-1]) address. */
while (p) {
q = (--p)->v.t;
free(p);
p = q;
}
}
| 312,078,471,467,891,350,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-9261 | huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. | https://nvd.nist.gov/vuln/detail/CVE-2015-9261 |
21,225 | busybox | 1de25a6e87e0e627aa34298105a3d17c60a1f44e | http://git.busybox.net/busybox | http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e | unzip: test for bad archive SEGVing
function old new delta
huft_build 1296 1300 +4
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com> | 0 | static void huft_free_all(STATE_PARAM_ONLY)
{
huft_free(inflate_codes_tl);
huft_free(inflate_codes_td);
inflate_codes_tl = NULL;
inflate_codes_td = NULL;
}
| 158,599,962,897,535,230,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-9261 | huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. | https://nvd.nist.gov/vuln/detail/CVE-2015-9261 |
21,226 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 0 | static int cbk_http_request(void *cls,
struct MHD_Connection *connection,
const char *url,
const char *method,
const char *version,
const char *upload_data,
size_t *upload_data_size,
void **ptr)
{
static int dummy;
struct MHD_Response *response;
int ret;
char *nurl;
... | 96,810,745,530,688,980,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
21,227 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 0 | create_response_api(const char *nurl, const char *method, unsigned int *rp_code)
{
struct MHD_Response *resp;
struct psensor *s;
char *page = NULL;
if (!strcmp(nurl, URL_BASE_API_1_1_SENSORS)) {
page = sensors_to_json_string(server_data.sensors);
#ifdef HAVE_GTOP
} else if (!strcmp(nurl, URL_API_1_1_SYSINFO)) ... | 26,114,359,929,054,140,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
21,228 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 0 | static struct MHD_Response *create_response_file(const char *nurl,
const char *method,
unsigned int *rp_code,
const char *fpath)
{
struct stat st;
int ret;
FILE *file;
ret = stat(fpath, &st);
if (!ret && (S_ISREG(st.st_mode) || S_ISLNK(st.st_mode))) {
file = fopen(fpath, "rb");
if (file... | 307,935,125,134,529,200,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
21,229 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 0 | file_reader(void *cls, uint64_t pos, char *buf, size_t max)
#else
static int
file_reader(void *cls, uint64_t pos, char *buf, int max)
#endif
{
FILE *file = cls;
fseeko(file, pos, SEEK_SET);
return fread(buf, 1, max, file);
}
| 544,473,088,461,807,100,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
21,230 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 0 | static char *get_path(const char *url, const char *www_dir)
{
const char *p;
char *res;
if (!strlen(url) || !strcmp(url, ".") || !strcmp(url, "/"))
p = "/index.html";
else
p = url;
res = malloc(strlen(www_dir)+strlen(p)+1);
strcpy(res, www_dir);
strcat(res, p);
return res;
}
| 338,999,945,991,432,300,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
21,231 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 0 | static void print_help(void)
{
printf(_("Usage: %s [OPTION]...\n"), program_name);
puts(_("psensor-server is an HTTP server for monitoring hardware "
"sensors remotely."));
puts("");
puts("Options:");
puts(_(" -h, --help display this help and exit\n"
" -v, --version display version informatio... | 323,610,420,532,888,050,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
21,232 | wpitchoune | 8b10426dcc0246c1712a99460dd470dcb1cc4d9c | http://git.wpitchoune.net/gitweb/?p=psensor | http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c | None | 0 | static void print_version(void)
{
printf("psensor-server %s\n", VERSION);
printf(_("Copyright (C) %s jeanfi@gmail.com\n"
"License GPLv2: GNU GPL version 2 or later "
"<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>\n"
"This is free software: you are free to change and redistribute it.\n"
"There is... | 182,505,573,669,153,860,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2014-10073 | The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory. | https://nvd.nist.gov/vuln/detail/CVE-2014-10073 |
21,247 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_copy (PangoGlyphString *string)
{
PangoGlyphString *new_string;
if (string == NULL)
return NULL;
new_string = g_slice_new (PangoGlyphString);
*new_string = *string;
new_string->glyphs = g_memdup (string->glyphs,
string->space * sizeof (PangoGlyphInfo));
new_string->log_clus... | 222,883,786,646,094,730,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,248 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_extents (PangoGlyphString *glyphs,
PangoFont *font,
PangoRectangle *ink_rect,
PangoRectangle *logical_rect)
{
pango_glyph_string_extents_range (glyphs, 0, glyphs->num_glyphs,
font, ink_rect, logical_rect);
}
| 51,182,073,616,374,190,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,249 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_extents_range (PangoGlyphString *glyphs,
int start,
int end,
PangoFont *font,
PangoRectangle *ink_rect,
PangoRectangle *logical_rect)
{
int x_pos = 0;
int i;
/* Note that the handling of empty rectangles for ink
* and logi... | 16,359,255,192,419,350,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,250 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_get_logical_widths (PangoGlyphString *glyphs,
const char *text,
int length,
int embedding_level,
int *logical_widths)
{
/* Build a PangoGlyphItem so we can use PangoGlyphItemIter.
* This API should have be... | 36,764,941,182,845,740,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,251 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_get_type (void)
{
static GType our_type = 0;
if (G_UNLIKELY (our_type == 0))
our_type = g_boxed_type_register_static (I_("PangoGlyphString"),
(GBoxedCopyFunc)pango_glyph_string_copy,
(GBoxedFreeFunc)pango_glyph_string_free);
return our_type;
}
| 278,814,091,611,745,400,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,252 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_get_width (PangoGlyphString *glyphs)
{
int i;
int width = 0;
for (i = 0; i < glyphs->num_glyphs; i++)
width += glyphs->glyphs[i].geometry.width;
return width;
}
| 170,184,658,050,985,440,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,253 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_index_to_x (PangoGlyphString *glyphs,
char *text,
int length,
PangoAnalysis *analysis,
int index,
gboolean trailing,
int *x_pos)
{
int i;
int start_xpos = 0;
int end_xpos... | 266,037,673,451,499,180,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,254 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_new (void)
{
PangoGlyphString *string = g_slice_new (PangoGlyphString);
string->num_glyphs = 0;
string->space = 0;
string->glyphs = NULL;
string->log_clusters = NULL;
return string;
}
| 249,571,433,591,931,340,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,255 | pango | 4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | http://github.com/bratsche/pango | http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | [glyphstring] Handle overflow with very long glyphstrings | 0 | pango_glyph_string_x_to_index (PangoGlyphString *glyphs,
char *text,
int length,
PangoAnalysis *analysis,
int x_pos,
int *index,
gboolean *trailing)
{
int i;
int start_xpos = 0;
int end_xpos... | 153,324,213,140,453,700,000,000,000,000,000,000,000 | glyphstring.c | 150,455,093,204,162,130,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-1194 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do... | https://nvd.nist.gov/vuln/detail/CVE-2009-1194 |
21,256 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | _skip(conn c, int n, const char *line, int len)
{
/* Invert the meaning of in_job_read while throwing away data -- it
* counts the bytes that remain to be thrown away. */
c->in_job = 0;
c->in_job_read = n;
fill_extra_data(c);
if (c->in_job_read == 0) return reply(c, line, len, STATE_SENDWORD);... | 43,146,136,225,580,930,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,257 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | buried_job_p(tube t)
{
return job_list_any_p(&t->buried);
}
| 216,187,629,648,679,070,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,258 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | cmd_len(conn c)
{
return scan_line_end(c->cmd, c->cmd_read);
}
| 271,617,011,885,647,900,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,259 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | delay_q_peek()
{
int i;
tube t;
job j = NULL, nj;
for (i = 0; i < tubes.used; i++) {
t = tubes.items[i];
nj = pq_peek(&t->delay);
if (!nj) continue;
if (!j || nj->deadline_at < j->deadline_at) j = nj;
}
return j;
}
| 103,806,609,279,545,330,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,260 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | delay_q_take()
{
job j = delay_q_peek();
return j ? pq_take(&j->tube->delay) : NULL;
}
| 45,415,131,545,784,500,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,261 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | do_cmd(conn c)
{
dispatch_cmd(c);
fill_extra_data(c);
}
| 272,924,687,083,213,500,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,262 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | do_list_tubes(conn c, ms l)
{
char *buf;
tube t;
size_t i, resp_z;
/* first, measure how big a buffer we will need */
resp_z = 6; /* initial "---\n" and final "\r\n" */
for (i = 0; i < l->used; i++) {
t = l->items[i];
resp_z += 3 + strlen(t->name); /* including "- " and "\n" */
... | 192,289,710,072,617,850,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,263 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | do_stats(conn c, fmt_fn fmt, void *data)
{
int r, stats_len;
/* first, measure how big a buffer we will need */
stats_len = fmt(NULL, 0, data) + 16;
c->out_job = allocate_job(stats_len); /* fake job to hold stats data */
if (!c->out_job) return reply_serr(c, MSG_OUT_OF_MEMORY);
/* Mark this j... | 238,426,353,356,198,770,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,264 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | enqueue_incoming_job(conn c)
{
int r;
job j = c->in_job;
c->in_job = NULL; /* the connection no longer owns this job */
c->in_job_read = 0;
/* check if the trailer is present and correct */
if (memcmp(j->body + j->body_size - 2, "\r\n", 2)) {
job_free(j);
return reply_msg(c, MS... | 262,965,562,840,691,500,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,265 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | enqueue_job(job j, usec delay, char update_store)
{
int r;
j->reserver = NULL;
if (delay) {
j->deadline_at = now_usec() + delay;
r = pq_give(&j->tube->delay, j);
if (!r) return 0;
j->state = JOB_STATE_DELAYED;
set_main_delay_timeout();
} else {
r = pq_giv... | 273,425,601,864,649,870,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,266 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | enqueue_reserved_jobs(conn c)
{
int r;
job j;
while (job_list_any_p(&c->reserved_jobs)) {
j = job_remove(c->reserved_jobs.next);
r = enqueue_job(j, 0, 0);
if (r < 1) bury_job(j, 0);
global_stat.reserved_ct--;
j->tube->stat.reserved_ct--;
c->soonest_job = NULL... | 93,455,354,645,480,220,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,267 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | enqueue_waiting_conn(conn c)
{
tube t;
size_t i;
global_stat.waiting_ct++;
c->type |= CONN_TYPE_WAITING;
for (i = 0; i < c->watch.used; i++) {
t = c->watch.items[i];
t->stat.waiting_ct++;
ms_append(&t->waiting, c);
}
}
| 33,241,126,892,336,473,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,268 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | enter_drain_mode(int sig)
{
drain_mode = 1;
}
| 86,151,685,833,449,140,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,269 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | find_reserved_job_in_conn(conn c, job j)
{
return (j && j->reserver == c && j->state == JOB_STATE_RESERVED) ? j : NULL;
}
| 262,584,509,860,220,030,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,270 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | fmt_job_stats(char *buf, size_t size, job j)
{
usec t;
uint64_t time_left;
t = now_usec();
if (j->state == JOB_STATE_RESERVED || j->state == JOB_STATE_DELAYED) {
time_left = (j->deadline_at - t) / 1000000;
} else {
time_left = 0;
}
return snprintf(buf, size, STATS_JOB_FMT,
... | 127,117,226,417,945,720,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,271 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | fmt_stats_tube(char *buf, size_t size, tube t)
{
uint64_t time_left;
if (t->pause > 0) {
time_left = (t->deadline_at - now_usec()) / 1000000;
} else {
time_left = 0;
}
return snprintf(buf, size, STATS_TUBE_FMT,
t->name,
t->stat.urgent_ct,
t->ready... | 62,052,785,506,361,270,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,272 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | get_delayed_job_ct()
{
tube t;
size_t i;
unsigned int count = 0;
for (i = 0; i < tubes.used; i++) {
t = tubes.items[i];
count += t->delay.used;
}
return count;
}
| 262,006,602,100,198,320,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,273 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | h_accept(const int fd, const short which, struct event *ev)
{
conn c;
int cfd, flags, r;
socklen_t addrlen;
struct sockaddr_in6 addr;
if (which == EV_TIMEOUT) return h_delay();
addrlen = sizeof addr;
cfd = accept(fd, (struct sockaddr *)&addr, &addrlen);
if (cfd == -1) {
if (err... | 272,767,295,758,082,400,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,274 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | h_conn(const int fd, const short which, conn c)
{
if (fd != c->fd) {
twarnx("Argh! event fd doesn't match conn fd.");
close(fd);
return conn_close(c);
}
switch (which) {
case EV_TIMEOUT:
h_conn_timeout(c);
event_add(&c->evq, NULL); /* seems to be necessary */
... | 55,763,915,200,046,460,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,275 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | h_conn_timeout(conn c)
{
int r, should_timeout = 0;
job j;
/* Check if the client was trying to reserve a job. */
if (conn_waiting(c) && conn_has_close_deadline(c)) should_timeout = 1;
/* Check if any reserved jobs have run out of time. We should do this
* whether or not the client is waiting... | 51,472,847,996,692,440,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,276 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | h_delay()
{
int r;
job j;
usec now;
int i;
tube t;
now = now_usec();
while ((j = delay_q_peek())) {
if (j->deadline_at > now) break;
j = delay_q_take();
r = enqueue_job(j, 0, 0);
if (r < 1) bury_job(j, 0); /* out of memory, so bury it */
}
for (i = 0... | 19,281,631,188,046,394,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,277 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | kick_buried_job(tube t)
{
int r;
job j;
size_t z;
if (!buried_job_p(t)) return 0;
j = remove_buried_job(t->buried.next);
z = binlog_reserve_space_update(j);
if (!z) return pq_give(&t->delay, j), 0; /* put it back */
j->reserved_binlog_space += z;
j->kick_ct++;
r = enqueue_job(... | 173,823,354,009,705,450,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,278 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | kick_delayed_job(tube t)
{
int r;
job j;
size_t z;
j = pq_take(&t->delay);
if (!j) return 0;
z = binlog_reserve_space_update(j);
if (!z) return pq_give(&t->delay, j), 0; /* put it back */
j->reserved_binlog_space += z;
j->kick_ct++;
r = enqueue_job(j, 0, 1);
if (r == 1) re... | 46,014,599,251,270,910,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,279 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | kick_delayed_jobs(tube t, unsigned int n)
{
unsigned int i;
for (i = 0; (i < n) && kick_delayed_job(t); ++i);
return i;
}
| 301,752,980,939,197,760,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,280 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | kick_jobs(tube t, unsigned int n)
{
if (buried_job_p(t)) return kick_buried_jobs(t, n);
return kick_delayed_jobs(t, n);
}
| 146,286,524,549,460,800,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,281 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | maybe_enqueue_incoming_job(conn c)
{
job j = c->in_job;
/* do we have a complete job? */
if (c->in_job_read == j->body_size) return enqueue_incoming_job(c);
/* otherwise we have incomplete data, so just keep waiting */
c->state = STATE_WANTDATA;
}
| 226,566,124,309,444,130,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,282 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | name_is_ok(const char *name, size_t max)
{
size_t len = strlen(name);
return len > 0 && len <= max &&
strspn(name, NAME_CHARS) == len && name[0] != '-';
}
| 161,434,231,823,243,760,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
21,283 | beanstalkd | 2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | http://github.com/kr/beanstalkd | http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d | Discard job body bytes if the job is too big.
Previously, a malicious user could craft a job payload and inject
beanstalk commands without the client application knowing. (An
extra-careful client library could check the size of the job body before
sending the put command, but most libraries do not do this, nor should
... | 0 | next_eligible_job(usec now)
{
tube t;
size_t i;
job j = NULL, candidate;
dprintf("tubes.used = %zu\n", tubes.used);
for (i = 0; i < tubes.used; i++) {
t = tubes.items[i];
dprintf("for %s t->waiting.used=%zu t->ready.used=%d t->pause=%" PRIu64 "\n",
t->name, t->waitin... | 123,213,984,294,020,470,000,000,000,000,000,000,000 | None | null | [] | CVE-2010-2060 | The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c. | https://nvd.nist.gov/vuln/detail/CVE-2010-2060 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.