idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
21,170
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_make_global_ctx(Jbig2Ctx *ctx) { return (Jbig2GlobalCtx *) ctx; }
293,060,785,972,687,330,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,171
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_realloc(Jbig2Allocator *allocator, void *p, size_t size, size_t num) { /* check for integer multiplication overflow */ if (num > 0 && size >= (size_t) - 0x100 / num) return NULL; return allocator->realloc(allocator, p, size * num); }
257,906,945,006,803,930,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,172
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_word_stream_buf_new(Jbig2Ctx *ctx, const byte *data, size_t size) { Jbig2WordStreamBuf *result = jbig2_new(ctx, Jbig2WordStreamBuf, 1); if (result == NULL) { jbig2_error(ctx, JBIG2_SEVERITY_FATAL, -1, "failed to allocate Jbig2WordStreamBuf in jbig2_word_stream_buf_new"); return NULL; ...
288,388,873,949,700,440,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,173
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
copy_prev_row(Jbig2Image *image, int row) { if (!row) { /* no previous row */ memset(image->data, 0, image->stride); } else { /* duplicate data from the previous row */ uint8_t *src = image->data + (row - 1) * image->stride; memcpy(src + image->stride, src, image->stride...
110,054,091,345,938,320,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,174
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_region(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int8_t *gbat = params->gbat; if (image->stride * image->height > (1 << 24) && segment->data_length < imag...
236,079,836,502,710,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,175
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_region_TPGDON(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { switch (params->GBTEMPLATE) { case 0: return jbig2_deco...
292,822,683,866,506,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,176
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template0(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = i...
182,301,213,972,004,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,177
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template0_TPGDON(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->h...
290,098,400,987,821,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,178
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template0_unopt(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->heig...
194,971,647,549,770,360,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,179
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template1(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->height; const int ...
61,187,756,391,727,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,180
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template2(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->height; const int ...
7,052,442,311,914,768,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,181
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template2_TPGDON(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->h...
252,710,829,373,654,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,182
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template2a(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->height; const i...
182,070,032,218,958,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,183
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template3(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->height; const int ...
22,824,203,421,509,215,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,184
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template3_TPGDON(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->h...
56,095,665,162,752,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,185
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_generic_template3_unopt(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2GenericRegionParams *params, Jbig2ArithState *as, Jbig2Image *image, Jbig2ArithCx *GB_stats) { const int GBW = image->width; const int GBH = image->heig...
281,788,004,055,363,760,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,186
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_generic_stats_size(Jbig2Ctx *ctx, int template) { int stats_size = template == 0 ? 1 << 16 : template == 1 ? 1 << 1 << 13 : 1 << 10; return stats_size; }
133,648,513,902,186,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,187
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_pattern_dict(Jbig2Ctx *ctx, Jbig2Segment *segment, const Jbig2PatternDictParams *params, const byte *data, const size_t size, Jbig2ArithCx *GB_stats) { Jbig2PatternDict *hd = NULL; Jbig2Image *image = NULL; Jbig2GenericRegionParams rparams; int code = 0; /* al...
241,592,402,361,704,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,188
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_hd_new(Jbig2Ctx *ctx, const Jbig2PatternDictParams *params, Jbig2Image *image) { Jbig2PatternDict *new; const int N = params->GRAYMAX + 1; const int HPW = params->HDPW; const int HPH = params->HDPH; int i; /* allocate a new struct */ new = jbig2_new(ctx, Jbig2PatternDict, 1); if (...
134,186,738,967,408,760,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,189
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_hd_release(Jbig2Ctx *ctx, Jbig2PatternDict *dict) { int i; if (dict == NULL) return; for (i = 0; i < dict->n_patterns; i++) if (dict->patterns[i]) jbig2_image_release(ctx, dict->patterns[i]); jbig2_free(ctx->allocator, dict->patterns); jbig2_free(ctx->allocator, di...
234,666,706,626,379,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,190
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_pattern_dictionary(Jbig2Ctx *ctx, Jbig2Segment *segment, const byte *segment_data) { Jbig2PatternDictParams params; Jbig2ArithCx *GB_stats = NULL; byte flags; int offset = 0; /* 7.4.4.1 - Data header */ if (segment->data_length < 7) { return jbig2_error(ctx, JBIG2_SEVERITY_FATAL, ...
326,853,311,271,252,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,191
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_build_huffman_table(Jbig2Ctx *ctx, const Jbig2HuffmanParams *params) { int *LENCOUNT; int LENMAX = -1; const int lencountcount = 256; const Jbig2HuffmanLine *lines = params->lines; int n_lines = params->n_lines; int i, j; int max_j; int log_table_size = 0; Jbig2HuffmanTable *re...
320,689,555,873,302,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,192
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_dump_huffman_binary(Jbig2HuffmanState *hs) { const uint32_t word = hs->this_word; int i; fprintf(stderr, "huffman binary "); for (i = 31; i >= 0; i--) fprintf(stderr, ((word >> i) & 1) ? "1" : "0"); fprintf(stderr, "\n"); }
174,491,046,170,364,780,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,193
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_dump_huffman_table(const Jbig2HuffmanTable *table) { int i; int table_size = (1 << table->log_table_size); fprintf(stderr, "huffman table %p (log_table_size=%d, %d entries, entryies=%p):\n", table, table->log_table_size, table_size, table->entries); for (i = 0; i < table_size; i++) { fpri...
260,853,172,045,653,450,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,194
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_find_table(Jbig2Ctx *ctx, Jbig2Segment *segment, int index) { int i, table_index = 0; for (i = 0; i < segment->referred_to_segment_count; i++) { const Jbig2Segment *const rsegment = jbig2_find_segment(ctx, segment->referred_to_segments[i]); if (rsegment && (rsegment->flags & 63) == 53) {...
48,885,276,418,249,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,195
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_huffman_free(Jbig2Ctx *ctx, Jbig2HuffmanState *hs) { if (hs != NULL) jbig2_free(ctx->allocator, hs); return; }
60,787,165,412,932,325,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,196
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_huffman_get(Jbig2HuffmanState *hs, const Jbig2HuffmanTable *table, bool *oob) { Jbig2HuffmanEntry *entry; byte flags; int offset_bits = hs->offset_bits; uint32_t this_word = hs->this_word; uint32_t next_word; int RANGELEN; int32_t result; if (hs->offset_limit && hs->offset >= hs->...
112,070,433,476,590,690,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,197
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_huffman_offset(Jbig2HuffmanState *hs) { return hs->offset + (hs->offset_bits >> 3); }
263,561,625,271,923,100,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,198
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_huffman_skip(Jbig2HuffmanState *hs) { int bits = hs->offset_bits & 7; if (bits) { bits = 8 - bits; hs->offset_bits += bits; hs->this_word = (hs->this_word << bits) | (hs->next_word >> (32 - hs->offset_bits)); } if (hs->offset_bits >= 32) { hs->this_word = hs->next...
249,409,303,162,974,240,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,199
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_release_huffman_table(Jbig2Ctx *ctx, Jbig2HuffmanTable *table) { if (table != NULL) { jbig2_free(ctx->allocator, table->entries); jbig2_free(ctx->allocator, table); } return; }
18,521,792,971,816,724,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,200
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_table(Jbig2Ctx *ctx, Jbig2Segment *segment, const byte *segment_data) { Jbig2HuffmanParams *params = NULL; Jbig2HuffmanLine *line = NULL; segment->result = NULL; if (segment->data_length < 10) goto too_short; { /* B.2 1) (B.2.1) Code table flags */ const int code_tabl...
232,728,276,523,313,580,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,201
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_table_free(Jbig2Ctx *ctx, Jbig2HuffmanParams *params) { if (params != NULL) { if (params->lines != NULL) jbig2_free(ctx->allocator, (void *)params->lines); jbig2_free(ctx->allocator, params); } }
273,908,959,578,532,260,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,202
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_table_read_bits(const byte *data, size_t *bitoffset, const int bitlen) { uint32_t result = 0; uint32_t byte_offset = *bitoffset / 8; const int endbit = (*bitoffset & 7) + bitlen; const int n_proc_bytes = (endbit + 7) / 8; const int rshift = n_proc_bytes * 8 - endbit; int i; for (i = n...
308,749,388,160,825,400,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,203
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
test_get_word(Jbig2WordStream *self, int offset, uint32_t *word) { uint32_t val = 0; test_stream_t *st = (test_stream_t *) self; if (st != NULL) { if (st->h != NULL) { if (offset >= st->h->input_len) return -1; if (offset < st->h->input_len) { ...
218,879,849,311,067,480,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,204
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_image_clear(Jbig2Ctx *ctx, Jbig2Image *image, int value) { const uint8_t fill = value ? 0xFF : 0x00; memset(image->data, fill, image->stride * image->height); }
145,021,005,712,531,240,000,000,000,000,000,000,000
jbig2_image.c
275,695,218,023,988,680,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,205
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_image_clone(Jbig2Ctx *ctx, Jbig2Image *image) { if (image) image->refcount++; return image; }
52,487,369,955,016,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,206
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_image_free(Jbig2Ctx *ctx, Jbig2Image *image) { if (image) jbig2_free(ctx->allocator, image->data); jbig2_free(ctx->allocator, image); }
140,739,488,845,399,990,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,207
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_image_get_pixel(Jbig2Image *image, int x, int y) { const int w = image->width; const int h = image->height; const int byte = (x >> 3) + y * image->stride; const int bit = 7 - (x & 7); if ((x < 0) || (x >= w)) return 0; if ((y < 0) || (y >= h)) return 0; return ((image...
212,468,617,377,833,780,000,000,000,000,000,000,000
jbig2_image.c
275,695,218,023,988,680,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,208
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_image_release(Jbig2Ctx *ctx, Jbig2Image *image) { if (image == NULL) return; image->refcount--; if (!image->refcount) jbig2_image_free(ctx, image); }
191,704,538,375,319,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,209
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_image_set_pixel(Jbig2Image *image, int x, int y, bool value) { const int w = image->width; const int h = image->height; int scratch, mask; int bit, byte; if ((x < 0) || (x >= w)) return 0; if ((y < 0) || (y >= h)) return 0; byte = (x >> 3) + y * image->stride; bit...
125,191,143,700,565,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,210
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_decode_mmr_consume(Jbig2MmrCtx *mmr, int n_bits) { mmr->word <<= n_bits; mmr->bit_index += n_bits; while (mmr->bit_index >= 8) { mmr->bit_index -= 8; if (mmr->data_index + 4 < mmr->size) mmr->word |= (mmr->data[mmr->data_index + 4] << mmr->bit_index); mmr->data_inde...
275,637,840,447,946,580,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,211
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
dump_page_info(Jbig2Ctx *ctx, Jbig2Segment *segment, Jbig2Page *page) { if (page->x_resolution == 0) { jbig2_error(ctx, JBIG2_SEVERITY_INFO, segment->number, "page %d image is %dx%d (unknown res)", page->number, page->width, page->height); } else if (page->x_resolution == page->y_resolution) { j...
147,832,988,932,521,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,212
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_complete_page(Jbig2Ctx *ctx) { int code = 0; /* check for unfinished segments */ if (ctx->segment_index != ctx->n_segments) { Jbig2Segment *segment = ctx->segments[ctx->segment_index]; /* Some versions of Xerox Workcentre generate PDF files with the segment data length fie...
108,220,336,999,600,550,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,213
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_page_info(Jbig2Ctx *ctx, Jbig2Segment *segment, const uint8_t *segment_data) { Jbig2Page *page; /* a new page info segment implies the previous page is finished */ page = &(ctx->pages[ctx->current_page]); if ((page->number != 0) && ((page->state == JBIG2_PAGE_NEW) || (page->state == JBIG2_PAGE_FR...
270,887,191,847,616,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,214
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_page_out(Jbig2Ctx *ctx) { int index; /* search for a completed page */ for (index = 0; index < ctx->max_page_index; index++) { if (ctx->pages[index].state == JBIG2_PAGE_COMPLETE) { Jbig2Image *img = ctx->pages[index].image; uint32_t page_number = ctx->pages[index].numb...
298,563,634,127,286,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,215
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_release_page(Jbig2Ctx *ctx, Jbig2Image *image) { int index; /* find the matching page struct and mark it released */ for (index = 0; index < ctx->max_page_index; index++) { if (ctx->pages[index].image == image) { jbig2_image_release(ctx, image); ctx->pages[index].state...
101,764,721,905,256,420,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,216
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_find_segment(Jbig2Ctx *ctx, uint32_t number) { int index, index_max = ctx->segment_index - 1; const Jbig2Ctx *global_ctx = ctx->global_ctx; /* FIXME: binary search would be better */ for (index = index_max; index >= 0; index--) if (ctx->segments[index]->number == number) retur...
258,171,282,163,484,730,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,217
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_free_segment(Jbig2Ctx *ctx, Jbig2Segment *segment) { if (segment->referred_to_segments != NULL) { jbig2_free(ctx->allocator, segment->referred_to_segments); } /* todo: we need either some separate fields or a more complex result object rather than this brittle special casing */ ...
145,399,890,820,083,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,218
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_get_region_segment_info(Jbig2RegionSegmentInfo *info, const uint8_t *segment_data) { /* 7.4.1 */ info->width = jbig2_get_int32(segment_data); info->height = jbig2_get_int32(segment_data + 4); info->x = jbig2_get_int32(segment_data + 8); info->y = jbig2_get_int32(segment_data + 12); info->f...
307,196,777,252,713,480,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,219
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_parse_extension_segment(Jbig2Ctx *ctx, Jbig2Segment *segment, const uint8_t *segment_data) { uint32_t type = jbig2_get_uint32(segment_data); bool reserved = type & 0x20000000; /* bool dependent = type & 0x40000000; (NYI) */ bool necessary = type & 0x80000000; if (necessary && !reserved) { ...
37,938,465,868,987,080,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,220
ghostscript
e698d5c11d27212aa1098bc5b1673a3378563092
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=jbig2dec.git;a=commit;h=e698d5c11d27212aa1098bc5b1673a3378563092
None
0
jbig2_sd_glyph(Jbig2SymbolDict *dict, unsigned int id) { if (dict == NULL) return NULL; return dict->glyphs[id]; }
68,240,757,294,330,110,000,000,000,000,000,000,000
jbig2_symbol_dict.c
17,345,292,091,717,115,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation ...
https://nvd.nist.gov/vuln/detail/CVE-2016-9601
21,221
openssl
8aed2a7548362e88e84a7feb795a3a97e8395008
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008
Reserve option to use BN_mod_exp_mont_consttime in ECDSA. Submitted by Shay Gueron, Intel Corp. RT: 3149 Reviewed-by: Rich Salz <rsalz@openssl.org> (cherry picked from commit f54be179aa4cbbd944728771d7d59ed588158a12)
0
static int ecdsa_do_verify(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey) { int ret = -1, i; BN_CTX *ctx; BIGNUM *order, *u1, *u2, *m, *X; EC_POINT *point = NULL; const EC_GROUP *group; const EC_POINT *pub_key; /* check input values */ if (eckey == NULL || (group = EC_KEY_g...
179,263,221,347,053,900,000,000,000,000,000,000,000
None
null
[ "CWE-320" ]
CVE-2016-7056
A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
https://nvd.nist.gov/vuln/detail/CVE-2016-7056
21,222
busybox
1de25a6e87e0e627aa34298105a3d17c60a1f44e
http://git.busybox.net/busybox
http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e
unzip: test for bad archive SEGVing function old new delta huft_build 1296 1300 +4 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static void abort_unzip(STATE_PARAM_ONLY) { huft_free_all(PASS_STATE_ONLY); longjmp(error_jmp, 1); }
111,649,156,846,133,530,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2015-9261
huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.
https://nvd.nist.gov/vuln/detail/CVE-2015-9261
21,223
busybox
1de25a6e87e0e627aa34298105a3d17c60a1f44e
http://git.busybox.net/busybox
http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e
unzip: test for bad archive SEGVing function old new delta huft_build 1296 1300 +4 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static unsigned fill_bitbuffer(STATE_PARAM unsigned bitbuffer, unsigned *current, const unsigned required) { while (*current < required) { if (bytebuffer_offset >= bytebuffer_size) { unsigned sz = bytebuffer_max - 4; if (to_read >= 0 && to_read < sz) /* unzip only */ sz = to_read; /* Leave the first 4 b...
107,796,936,804,010,820,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2015-9261
huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.
https://nvd.nist.gov/vuln/detail/CVE-2015-9261
21,224
busybox
1de25a6e87e0e627aa34298105a3d17c60a1f44e
http://git.busybox.net/busybox
http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e
unzip: test for bad archive SEGVing function old new delta huft_build 1296 1300 +4 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static void huft_free(huft_t *p) { huft_t *q; /* Go through linked list, freeing from the malloced (t[-1]) address. */ while (p) { q = (--p)->v.t; free(p); p = q; } }
312,078,471,467,891,350,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2015-9261
huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.
https://nvd.nist.gov/vuln/detail/CVE-2015-9261
21,225
busybox
1de25a6e87e0e627aa34298105a3d17c60a1f44e
http://git.busybox.net/busybox
http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e
unzip: test for bad archive SEGVing function old new delta huft_build 1296 1300 +4 Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
0
static void huft_free_all(STATE_PARAM_ONLY) { huft_free(inflate_codes_tl); huft_free(inflate_codes_td); inflate_codes_tl = NULL; inflate_codes_td = NULL; }
158,599,962,897,535,230,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2015-9261
huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file.
https://nvd.nist.gov/vuln/detail/CVE-2015-9261
21,226
wpitchoune
8b10426dcc0246c1712a99460dd470dcb1cc4d9c
http://git.wpitchoune.net/gitweb/?p=psensor
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
None
0
static int cbk_http_request(void *cls, struct MHD_Connection *connection, const char *url, const char *method, const char *version, const char *upload_data, size_t *upload_data_size, void **ptr) { static int dummy; struct MHD_Response *response; int ret; char *nurl; ...
96,810,745,530,688,980,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2014-10073
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-10073
21,227
wpitchoune
8b10426dcc0246c1712a99460dd470dcb1cc4d9c
http://git.wpitchoune.net/gitweb/?p=psensor
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
None
0
create_response_api(const char *nurl, const char *method, unsigned int *rp_code) { struct MHD_Response *resp; struct psensor *s; char *page = NULL; if (!strcmp(nurl, URL_BASE_API_1_1_SENSORS)) { page = sensors_to_json_string(server_data.sensors); #ifdef HAVE_GTOP } else if (!strcmp(nurl, URL_API_1_1_SYSINFO)) ...
26,114,359,929,054,140,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2014-10073
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-10073
21,228
wpitchoune
8b10426dcc0246c1712a99460dd470dcb1cc4d9c
http://git.wpitchoune.net/gitweb/?p=psensor
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
None
0
static struct MHD_Response *create_response_file(const char *nurl, const char *method, unsigned int *rp_code, const char *fpath) { struct stat st; int ret; FILE *file; ret = stat(fpath, &st); if (!ret && (S_ISREG(st.st_mode) || S_ISLNK(st.st_mode))) { file = fopen(fpath, "rb"); if (file...
307,935,125,134,529,200,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2014-10073
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-10073
21,229
wpitchoune
8b10426dcc0246c1712a99460dd470dcb1cc4d9c
http://git.wpitchoune.net/gitweb/?p=psensor
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
None
0
file_reader(void *cls, uint64_t pos, char *buf, size_t max) #else static int file_reader(void *cls, uint64_t pos, char *buf, int max) #endif { FILE *file = cls; fseeko(file, pos, SEEK_SET); return fread(buf, 1, max, file); }
544,473,088,461,807,100,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2014-10073
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-10073
21,230
wpitchoune
8b10426dcc0246c1712a99460dd470dcb1cc4d9c
http://git.wpitchoune.net/gitweb/?p=psensor
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
None
0
static char *get_path(const char *url, const char *www_dir) { const char *p; char *res; if (!strlen(url) || !strcmp(url, ".") || !strcmp(url, "/")) p = "/index.html"; else p = url; res = malloc(strlen(www_dir)+strlen(p)+1); strcpy(res, www_dir); strcat(res, p); return res; }
338,999,945,991,432,300,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2014-10073
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-10073
21,231
wpitchoune
8b10426dcc0246c1712a99460dd470dcb1cc4d9c
http://git.wpitchoune.net/gitweb/?p=psensor
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
None
0
static void print_help(void) { printf(_("Usage: %s [OPTION]...\n"), program_name); puts(_("psensor-server is an HTTP server for monitoring hardware " "sensors remotely.")); puts(""); puts("Options:"); puts(_(" -h, --help display this help and exit\n" " -v, --version display version informatio...
323,610,420,532,888,050,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2014-10073
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-10073
21,232
wpitchoune
8b10426dcc0246c1712a99460dd470dcb1cc4d9c
http://git.wpitchoune.net/gitweb/?p=psensor
http://git.wpitchoune.net/gitweb/?p=psensor.git;a=commit;h=8b10426dcc0246c1712a99460dd470dcb1cc4d9c
None
0
static void print_version(void) { printf("psensor-server %s\n", VERSION); printf(_("Copyright (C) %s jeanfi@gmail.com\n" "License GPLv2: GNU GPL version 2 or later " "<http://www.gnu.org/licenses/old-licenses/gpl-2.0.html>\n" "This is free software: you are free to change and redistribute it.\n" "There is...
182,505,573,669,153,860,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2014-10073
The create_response function in server/server.c in Psensor before 1.1.4 allows Directory Traversal because it lacks a check for whether a file is under the webserver directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-10073
21,247
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_copy (PangoGlyphString *string) { PangoGlyphString *new_string; if (string == NULL) return NULL; new_string = g_slice_new (PangoGlyphString); *new_string = *string; new_string->glyphs = g_memdup (string->glyphs, string->space * sizeof (PangoGlyphInfo)); new_string->log_clus...
222,883,786,646,094,730,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,248
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_extents (PangoGlyphString *glyphs, PangoFont *font, PangoRectangle *ink_rect, PangoRectangle *logical_rect) { pango_glyph_string_extents_range (glyphs, 0, glyphs->num_glyphs, font, ink_rect, logical_rect); }
51,182,073,616,374,190,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,249
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_extents_range (PangoGlyphString *glyphs, int start, int end, PangoFont *font, PangoRectangle *ink_rect, PangoRectangle *logical_rect) { int x_pos = 0; int i; /* Note that the handling of empty rectangles for ink * and logi...
16,359,255,192,419,350,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,250
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_get_logical_widths (PangoGlyphString *glyphs, const char *text, int length, int embedding_level, int *logical_widths) { /* Build a PangoGlyphItem so we can use PangoGlyphItemIter. * This API should have be...
36,764,941,182,845,740,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,251
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_get_type (void) { static GType our_type = 0; if (G_UNLIKELY (our_type == 0)) our_type = g_boxed_type_register_static (I_("PangoGlyphString"), (GBoxedCopyFunc)pango_glyph_string_copy, (GBoxedFreeFunc)pango_glyph_string_free); return our_type; }
278,814,091,611,745,400,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,252
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_get_width (PangoGlyphString *glyphs) { int i; int width = 0; for (i = 0; i < glyphs->num_glyphs; i++) width += glyphs->glyphs[i].geometry.width; return width; }
170,184,658,050,985,440,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,253
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_index_to_x (PangoGlyphString *glyphs, char *text, int length, PangoAnalysis *analysis, int index, gboolean trailing, int *x_pos) { int i; int start_xpos = 0; int end_xpos...
266,037,673,451,499,180,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,254
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_new (void) { PangoGlyphString *string = g_slice_new (PangoGlyphString); string->num_glyphs = 0; string->space = 0; string->glyphs = NULL; string->log_clusters = NULL; return string; }
249,571,433,591,931,340,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,255
pango
4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
http://github.com/bratsche/pango
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
[glyphstring] Handle overflow with very long glyphstrings
0
pango_glyph_string_x_to_index (PangoGlyphString *glyphs, char *text, int length, PangoAnalysis *analysis, int x_pos, int *index, gboolean *trailing) { int i; int start_xpos = 0; int end_xpos...
153,324,213,140,453,700,000,000,000,000,000,000,000
glyphstring.c
150,455,093,204,162,130,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-1194
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long do...
https://nvd.nist.gov/vuln/detail/CVE-2009-1194
21,256
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
_skip(conn c, int n, const char *line, int len) { /* Invert the meaning of in_job_read while throwing away data -- it * counts the bytes that remain to be thrown away. */ c->in_job = 0; c->in_job_read = n; fill_extra_data(c); if (c->in_job_read == 0) return reply(c, line, len, STATE_SENDWORD);...
43,146,136,225,580,930,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,257
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
buried_job_p(tube t) { return job_list_any_p(&t->buried); }
216,187,629,648,679,070,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,258
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
cmd_len(conn c) { return scan_line_end(c->cmd, c->cmd_read); }
271,617,011,885,647,900,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,259
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
delay_q_peek() { int i; tube t; job j = NULL, nj; for (i = 0; i < tubes.used; i++) { t = tubes.items[i]; nj = pq_peek(&t->delay); if (!nj) continue; if (!j || nj->deadline_at < j->deadline_at) j = nj; } return j; }
103,806,609,279,545,330,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,260
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
delay_q_take() { job j = delay_q_peek(); return j ? pq_take(&j->tube->delay) : NULL; }
45,415,131,545,784,500,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,261
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
do_cmd(conn c) { dispatch_cmd(c); fill_extra_data(c); }
272,924,687,083,213,500,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,262
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
do_list_tubes(conn c, ms l) { char *buf; tube t; size_t i, resp_z; /* first, measure how big a buffer we will need */ resp_z = 6; /* initial "---\n" and final "\r\n" */ for (i = 0; i < l->used; i++) { t = l->items[i]; resp_z += 3 + strlen(t->name); /* including "- " and "\n" */ ...
192,289,710,072,617,850,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,263
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
do_stats(conn c, fmt_fn fmt, void *data) { int r, stats_len; /* first, measure how big a buffer we will need */ stats_len = fmt(NULL, 0, data) + 16; c->out_job = allocate_job(stats_len); /* fake job to hold stats data */ if (!c->out_job) return reply_serr(c, MSG_OUT_OF_MEMORY); /* Mark this j...
238,426,353,356,198,770,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,264
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
enqueue_incoming_job(conn c) { int r; job j = c->in_job; c->in_job = NULL; /* the connection no longer owns this job */ c->in_job_read = 0; /* check if the trailer is present and correct */ if (memcmp(j->body + j->body_size - 2, "\r\n", 2)) { job_free(j); return reply_msg(c, MS...
262,965,562,840,691,500,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,265
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
enqueue_job(job j, usec delay, char update_store) { int r; j->reserver = NULL; if (delay) { j->deadline_at = now_usec() + delay; r = pq_give(&j->tube->delay, j); if (!r) return 0; j->state = JOB_STATE_DELAYED; set_main_delay_timeout(); } else { r = pq_giv...
273,425,601,864,649,870,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,266
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
enqueue_reserved_jobs(conn c) { int r; job j; while (job_list_any_p(&c->reserved_jobs)) { j = job_remove(c->reserved_jobs.next); r = enqueue_job(j, 0, 0); if (r < 1) bury_job(j, 0); global_stat.reserved_ct--; j->tube->stat.reserved_ct--; c->soonest_job = NULL...
93,455,354,645,480,220,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,267
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
enqueue_waiting_conn(conn c) { tube t; size_t i; global_stat.waiting_ct++; c->type |= CONN_TYPE_WAITING; for (i = 0; i < c->watch.used; i++) { t = c->watch.items[i]; t->stat.waiting_ct++; ms_append(&t->waiting, c); } }
33,241,126,892,336,473,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,268
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
enter_drain_mode(int sig) { drain_mode = 1; }
86,151,685,833,449,140,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,269
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
find_reserved_job_in_conn(conn c, job j) { return (j && j->reserver == c && j->state == JOB_STATE_RESERVED) ? j : NULL; }
262,584,509,860,220,030,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,270
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
fmt_job_stats(char *buf, size_t size, job j) { usec t; uint64_t time_left; t = now_usec(); if (j->state == JOB_STATE_RESERVED || j->state == JOB_STATE_DELAYED) { time_left = (j->deadline_at - t) / 1000000; } else { time_left = 0; } return snprintf(buf, size, STATS_JOB_FMT, ...
127,117,226,417,945,720,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,271
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
fmt_stats_tube(char *buf, size_t size, tube t) { uint64_t time_left; if (t->pause > 0) { time_left = (t->deadline_at - now_usec()) / 1000000; } else { time_left = 0; } return snprintf(buf, size, STATS_TUBE_FMT, t->name, t->stat.urgent_ct, t->ready...
62,052,785,506,361,270,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,272
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
get_delayed_job_ct() { tube t; size_t i; unsigned int count = 0; for (i = 0; i < tubes.used; i++) { t = tubes.items[i]; count += t->delay.used; } return count; }
262,006,602,100,198,320,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,273
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
h_accept(const int fd, const short which, struct event *ev) { conn c; int cfd, flags, r; socklen_t addrlen; struct sockaddr_in6 addr; if (which == EV_TIMEOUT) return h_delay(); addrlen = sizeof addr; cfd = accept(fd, (struct sockaddr *)&addr, &addrlen); if (cfd == -1) { if (err...
272,767,295,758,082,400,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,274
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
h_conn(const int fd, const short which, conn c) { if (fd != c->fd) { twarnx("Argh! event fd doesn't match conn fd."); close(fd); return conn_close(c); } switch (which) { case EV_TIMEOUT: h_conn_timeout(c); event_add(&c->evq, NULL); /* seems to be necessary */ ...
55,763,915,200,046,460,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,275
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
h_conn_timeout(conn c) { int r, should_timeout = 0; job j; /* Check if the client was trying to reserve a job. */ if (conn_waiting(c) && conn_has_close_deadline(c)) should_timeout = 1; /* Check if any reserved jobs have run out of time. We should do this * whether or not the client is waiting...
51,472,847,996,692,440,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,276
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
h_delay() { int r; job j; usec now; int i; tube t; now = now_usec(); while ((j = delay_q_peek())) { if (j->deadline_at > now) break; j = delay_q_take(); r = enqueue_job(j, 0, 0); if (r < 1) bury_job(j, 0); /* out of memory, so bury it */ } for (i = 0...
19,281,631,188,046,394,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,277
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
kick_buried_job(tube t) { int r; job j; size_t z; if (!buried_job_p(t)) return 0; j = remove_buried_job(t->buried.next); z = binlog_reserve_space_update(j); if (!z) return pq_give(&t->delay, j), 0; /* put it back */ j->reserved_binlog_space += z; j->kick_ct++; r = enqueue_job(...
173,823,354,009,705,450,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,278
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
kick_delayed_job(tube t) { int r; job j; size_t z; j = pq_take(&t->delay); if (!j) return 0; z = binlog_reserve_space_update(j); if (!z) return pq_give(&t->delay, j), 0; /* put it back */ j->reserved_binlog_space += z; j->kick_ct++; r = enqueue_job(j, 0, 1); if (r == 1) re...
46,014,599,251,270,910,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,279
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
kick_delayed_jobs(tube t, unsigned int n) { unsigned int i; for (i = 0; (i < n) && kick_delayed_job(t); ++i); return i; }
301,752,980,939,197,760,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,280
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
kick_jobs(tube t, unsigned int n) { if (buried_job_p(t)) return kick_buried_jobs(t, n); return kick_delayed_jobs(t, n); }
146,286,524,549,460,800,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,281
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
maybe_enqueue_incoming_job(conn c) { job j = c->in_job; /* do we have a complete job? */ if (c->in_job_read == j->body_size) return enqueue_incoming_job(c); /* otherwise we have incomplete data, so just keep waiting */ c->state = STATE_WANTDATA; }
226,566,124,309,444,130,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,282
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
name_is_ok(const char *name, size_t max) { size_t len = strlen(name); return len > 0 && len <= max && strspn(name, NAME_CHARS) == len && name[0] != '-'; }
161,434,231,823,243,760,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060
21,283
beanstalkd
2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
http://github.com/kr/beanstalkd
http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d
Discard job body bytes if the job is too big. Previously, a malicious user could craft a job payload and inject beanstalk commands without the client application knowing. (An extra-careful client library could check the size of the job body before sending the put command, but most libraries do not do this, nor should ...
0
next_eligible_job(usec now) { tube t; size_t i; job j = NULL, candidate; dprintf("tubes.used = %zu\n", tubes.used); for (i = 0; i < tubes.used; i++) { t = tubes.items[i]; dprintf("for %s t->waiting.used=%zu t->ready.used=%d t->pause=%" PRIu64 "\n", t->name, t->waitin...
123,213,984,294,020,470,000,000,000,000,000,000,000
None
null
[]
CVE-2010-2060
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
https://nvd.nist.gov/vuln/detail/CVE-2010-2060