idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
12,958
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_copyscanlines(gx_device * dev, int start_y, byte * data, uint size, int *plines_copied, uint * pbytes_copied) { uint line_size = gx_device_raster(dev, 0); uint count = size / line_size; uint i; byte *dest = data; for (i = 0; i < count; i++, dest += line_size) { int code ...
121,176,432,738,769,500,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,959
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_currentdevice(const gs_gstate * pgs) { return pgs->device; }
246,589,197,504,535,070,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,960
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_deviceinitialmatrix(gx_device * dev, gs_matrix * pmat) { fill_dev_proc(dev, get_initial_matrix, gx_default_get_initial_matrix); (*dev_proc(dev, get_initial_matrix)) (dev, pmat); }
241,744,422,895,354,530,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,961
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_flushpage(gs_gstate * pgs) { gx_device *dev = gs_currentdevice(pgs); return (*dev_proc(dev, sync_output)) (dev); }
118,647,578,009,158,500,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,962
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_getdefaultdevice(void) { return gs_getdefaultlibdevice(NULL); }
128,246,745,710,143,350,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,963
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_getdefaultlibdevice(gs_memory_t *mem) { const gx_device *const *list; int count = gs_lib_device_list(&list, NULL); const char *name, *end, *fin; int i; /* Search the compiled in device list for a known device name */ /* In the case the lib ctx hasn't been initialised */ if (mem && mem->g...
234,235,028,076,659,650,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,964
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_getdevice(int index) { const gx_device *const *list; int count = gs_lib_device_list(&list, NULL); if (index < 0 || index >= count) return 0; /* index out of range */ return list[index]; }
192,197,817,241,924,720,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,965
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_gstate_putdeviceparams(gs_gstate *pgs, gx_device *dev, gs_param_list *plist) { int code; gx_device *dev2; if (dev) dev2 = dev; else dev2 = pgs->device; code = gs_putdeviceparams(dev2, plist); if (code >= 0) gs_gstate_update_device(pgs, dev2); return code; }
284,263,465,545,604,520,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,966
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_gstate_update_device(gs_gstate *pgs, gx_device *dev) { gx_set_cmap_procs(pgs, dev); gx_unset_both_dev_colors(pgs); }
220,349,104,624,773,140,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,967
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_make_null_device(gx_device_null *dev_null, gx_device *dev, gs_memory_t * mem) { gx_device_init((gx_device *)dev_null, (const gx_device *)&gs_null_device, mem, true); gx_device_set_target((gx_device_forward *)dev_null, dev); if (dev) { /* The gx_device_copy_c...
94,838,632,952,741,690,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,968
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_opendevice(gx_device *dev) { if (dev->is_open) return 0; check_device_separable(dev); gx_device_fill_in_procs(dev); { int code = (*dev_proc(dev, open_device))(dev); if (code < 0) return_error(code); dev->is_open = true; return 1; } }
17,326,740,967,496,054,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,969
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_output_page(gs_gstate * pgs, int num_copies, int flush) { gx_device *dev = gs_currentdevice(pgs); cmm_dev_profile_t *dev_profile; int code; /* for devices that hook 'fill_path' in order to pick up gs_gstate */ /* values such as dev_ht (such as tiffsep1), make a dummy call here */ /* to mak...
239,360,874,233,814,900,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,970
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_setdevice_no_erase(gs_gstate * pgs, gx_device * dev) { int open_code = 0, code; gs_lib_ctx_t *libctx = gs_lib_ctx_get_interp_instance(pgs->memory); /* If the ICC manager is not yet initialized, set it up now. But only if we have file io capability now */ if (libctx->io_device_table != NULL) ...
287,767,588,940,161,460,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,971
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gs_setdevice_no_init(gs_gstate * pgs, gx_device * dev) { /* * Just set the device, possibly changing color space but no other * device parameters. * * Make sure we don't close the device if dev == pgs->device * This could be done by allowing the rc_assign to close the * old 'dev' if th...
297,002,467,929,152,000,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,972
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
bool gx_color_info_equal(const gx_device_color_info * p1, const gx_device_color_info * p2) { if (p1->anti_alias.graphics_bits != p2->anti_alias.graphics_bits) return false; if (p1->anti_alias.text_bits != p2->anti_alias.text_bits) return false; if (p1->black_component != p2->black_component)...
107,972,787,377,262,370,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,973
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_copy_color_params(gx_device *dev, const gx_device *target) { COPY_PARAM(color_info); COPY_PARAM(cached_colors); gx_device_copy_color_procs(dev, target); }
69,448,433,926,426,675,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,974
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_copy_color_procs(gx_device *dev, const gx_device *target) { dev_proc_map_cmyk_color((*from_cmyk)) = dev_proc(dev, map_cmyk_color); dev_proc_map_rgb_color((*from_rgb)) = dev_proc(dev, map_rgb_color); dev_proc_map_color_rgb((*to_rgb)) = dev_proc(dev, map_color_rgb); /* T...
175,623,425,087,760,100,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,975
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_copy_params(gx_device *dev, const gx_device *target) { #define COPY_ARRAY_PARAM(p) memcpy(dev->p, target->p, sizeof(dev->p)) COPY_PARAM(width); COPY_PARAM(height); COPY_ARRAY_PARAM(MediaSize); COPY_ARRAY_PARAM(ImagingBBox); COPY_PARAM(ImagingBBox_set); COPY_ARRA...
241,543,467,634,600,870,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,976
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
int gx_device_delete_output_file(const gx_device * dev, const char *fname) { gs_parsed_file_name_t parsed; const char *fmt; char *pfname = (char *)gs_alloc_bytes(dev->memory, gp_file_name_sizeof, "gx_device_delete_output_file(pfname)"); int code; if (pfname == NULL) { code = gs_note_error(g...
263,423,279,000,345,130,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,977
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_enum_ptr(gx_device * dev) { if (dev == 0 || dev->memory == 0) return 0; return dev; }
157,366,631,059,104,600,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,978
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_finalize(const gs_memory_t *cmem, void *vptr) { gx_device * const dev = (gx_device *)vptr; (void)cmem; /* unused */ if (dev->icc_struct != NULL) { rc_decrement(dev->icc_struct, "gx_device_finalize(icc_profile)"); } if (dev->finalize) dev->finalize(dev); /* Deal with s...
76,777,080,795,472,600,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,979
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_free_local(gx_device *dev) { gx_device_finalize(dev->memory, dev); }
223,116,113,608,474,680,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,980
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_make_struct_type(gs_memory_struct_type_t *st, const gx_device *dev) { if (dev->stype) *st = *dev->stype; else if (dev_proc(dev, get_xfont_procs) == gx_forward_get_xfont_procs) *st = st_device_forward; else *st = st_device; st->ssize = dev->par...
223,072,032,333,690,770,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,981
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_open_output_file(const gx_device * dev, char *fname, bool binary, bool positionable, FILE ** pfile) { gs_parsed_file_name_t parsed; const char *fmt; char *pfname = (char *)gs_alloc_bytes(dev->memory, gp_file_name_sizeof, "gx_device_open_output_file(pfname)"); int cod...
47,867,042,082,787,110,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,982
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_raster(const gx_device * dev, bool pad) { ulong bits = (ulong) dev->width * dev->color_info.depth; ulong raster; int l2align; if (dev->is_planar) bits /= dev->color_info.num_components; raster = (uint)((bits + 7) >> 3); if (!pad) return raster; l2align = dev->log2...
60,491,976,273,406,750,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,983
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_reloc_ptr(gx_device * dev, gc_state_t * gcst) { if (dev == 0 || dev->memory == 0) return dev; return RELOC_OBJ(dev); /* gcst implicit */ }
42,602,427,819,645,280,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,984
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_retain(gx_device *dev, bool retained) { int delta = (int)retained - (int)dev->retained; if (delta) { dev->retained = retained; /* do first in case dev is freed */ rc_adjust_only(dev, delta, "gx_device_retain"); } }
290,142,168,081,832,400,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,985
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_set_hwsize_from_media(gx_device *dev) { int rot = (dev->LeadingEdge & 1); double rot_media_x = rot ? dev->MediaSize[1] : dev->MediaSize[0]; double rot_media_y = rot ? dev->MediaSize[0] : dev->MediaSize[1]; dev->width = (int)(rot_media_x * dev->HWResolution[0] / 72.0 + 0.5); dev->height = ...
55,881,504,523,783,830,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,986
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_set_margins(gx_device * dev, const float *margins /*[4] */ , bool move_origin) { int i; for (i = 0; i < 4; ++i) dev->HWMargins[i] = margins[i] * 72.0; if (move_origin) { dev->Margins[0] = -margins[0] * dev->HWResolution[0]; dev->Margins[1] = -margins[...
128,921,508,264,789,700,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,987
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_set_media_from_hwsize(gx_device *dev) { int rot = (dev->LeadingEdge & 1); double x = dev->width * 72.0 / dev->HWResolution[0]; double y = dev->height * 72.0 / dev->HWResolution[1]; if (rot) { dev->MediaSize[1] = x; dev->MediaSize[0] = y; } else { dev->MediaSize[0] ...
333,214,101,161,294,440,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,988
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_set_media_size(gx_device * dev, double media_width, double media_height) { dev->MediaSize[0] = media_width; dev->MediaSize[1] = media_height; gx_device_set_hwsize_from_media(dev); }
138,491,899,669,594,270,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,989
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_set_procs(gx_device * dev) { if (dev->static_procs != 0) { /* 0 if already populated */ dev->procs = *dev->static_procs; dev->static_procs = 0; } }
198,215,675,602,589,670,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,990
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_set_resolution(gx_device * dev, double x_dpi, double y_dpi) { dev->HWResolution[0] = x_dpi; dev->HWResolution[1] = y_dpi; gx_device_set_hwsize_from_media(dev); }
121,786,554,363,902,900,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,991
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_device_set_width_height(gx_device * dev, int width, int height) { dev->width = width; dev->height = height; gx_device_set_media_from_hwsize(dev); }
235,183,843,600,623,440,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,992
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_finish_output_page(gx_device *dev, int num_copies, int flush) { dev->PageCount += num_copies; return 0; }
55,463,866,489,858,830,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,993
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_outputfile_is_separate_pages(const char *fname, gs_memory_t *memory) { const char *fmt; gs_parsed_file_name_t parsed; int code = gx_parse_output_file_name(&parsed, &fmt, fname, strlen(fname), memory); return (code >= 0 && fmt != 0); }
24,055,865,898,036,173,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,994
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_parse_output_format(gs_parsed_file_name_t *pfn, const char **pfmt) { bool have_format = false, field; int width[2], int_width = sizeof(int) * 3, w = 0; uint i; /* Scan the file name for a format string, and validate it if present. */ width[0] = width[1] = 0; for (i = 0; i < pfn->len; ++i) ...
197,994,751,149,248,050,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,995
ghostscript
79cccf641486a6595c43f1de1cd7ade696020a31
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
None
0
gx_set_device_only(gs_gstate * pgs, gx_device * dev) { rc_assign(pgs->device, dev, "gx_set_device_only"); }
227,318,991,850,472,930,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,996
ghostscript
5516c614dc33662a2afdc377159f70218e67bde5
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33
None
0
z2grestoreall(i_ctx_t *i_ctx_p) { for (;;) { if (!restore_page_device(igs, gs_gstate_saved(igs))) { bool done = !gs_gstate_saved(gs_gstate_saved(igs)); gs_grestore(igs); if (done) break; } else return push_callout(i_ctx_p, "%grestoreal...
173,339,446,047,426,430,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,997
ghostscript
5516c614dc33662a2afdc377159f70218e67bde5
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33
None
0
ivalidate_clean_spaces(i_ctx_t *i_ctx_p) { if (gs_debug_c('?')) { ref_stack_cleanup(&d_stack); ref_stack_cleanup(&e_stack); ref_stack_cleanup(&o_stack); ivalidate_spaces(); } }
154,552,545,675,467,000,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,998
ghostscript
5516c614dc33662a2afdc377159f70218e67bde5
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33
None
0
zsave(i_ctx_t *i_ctx_p) { os_ptr op = osp; uint space = icurrent_space; vm_save_t *vmsave; ulong sid; int code; gs_gstate *prev; if (I_VALIDATE_BEFORE_SAVE) ivalidate_clean_spaces(i_ctx_p); ialloc_set_space(idmemory, avm_local); vmsave = ialloc_struct(vm_save_t, &st_vm_save,...
7,099,333,562,797,629,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2018-16863
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En...
https://nvd.nist.gov/vuln/detail/CVE-2018-16863
12,999
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
foreach_item_helper (GHashTable *hash, NMVPNIterFunc func, gpointer user_data) { GList *keys, *liter; GSList *copied = NULL, *siter; g_return_if_fail (hash != NULL); /* Grab keys and copy them so that the callback func can modify * the hash table items if it wants to. ...
288,363,740,086,990,170,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,000
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
get_secret_flags (NMSetting *setting, const char *secret_name, gboolean verify_secret, NMSettingSecretFlags *out_flags, GError **error) { NMSettingVPNPrivate *priv = NM_SETTING_VPN_GET_PRIVATE (setting); gboolean success = FALSE; char *flags_key...
100,936,012,068,127,600,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,001
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
need_secrets (NMSetting *setting) { /* Assume that VPN connections need secrets since they almost always will */ return g_ptr_array_sized_new (1); }
1,465,387,943,877,927,600,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,002
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_add_data_item (NMSettingVPN *setting, const char *key, const char *item) { g_return_if_fail (NM_IS_SETTING_VPN (setting)); g_return_if_fail (key != NULL); g_return_if_fail (strlen (key) > 0); g_return_if_fail (item != NULL); g_return_if_fai...
223,850,055,064,850,450,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,003
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_add_secret (NMSettingVPN *setting, const char *key, const char *secret) { g_return_if_fail (NM_IS_SETTING_VPN (setting)); g_return_if_fail (key != NULL); g_return_if_fail (strlen (key) > 0); g_return_if_fail (secret != NULL); g_return_if_fail (st...
104,936,455,229,510,820,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,004
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_error_get_type (void) { static GType etype = 0; if (etype == 0) { static const GEnumValue values[] = { /* Unknown error. */ ENUM_ENTRY (NM_SETTING_VPN_ERROR_UNKNOWN, "UnknownError"), /* The specified property was invalid. */ ENUM_ENTRY (NM_SETTING_VPN_ERROR_INVALID_PROPERTY, "InvalidProp...
94,857,485,923,692,960,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,005
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_error_quark (void) { static GQuark quark; if (G_UNLIKELY (!quark)) quark = g_quark_from_static_string ("nm-setting-vpn-error-quark"); return quark; }
26,806,505,943,741,525,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,006
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_foreach_data_item (NMSettingVPN *setting, NMVPNIterFunc func, gpointer user_data) { g_return_if_fail (setting != NULL); g_return_if_fail (NM_IS_SETTING_VPN (setting)); foreach_item_helper (NM_SETTING_VPN_GET_PRIVATE (setting)->data, ...
321,082,917,956,983,600,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,007
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_foreach_secret (NMSettingVPN *setting, NMVPNIterFunc func, gpointer user_data) { g_return_if_fail (setting != NULL); g_return_if_fail (NM_IS_SETTING_VPN (setting)); foreach_item_helper (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets, func, ...
240,436,442,538,505,940,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,008
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_get_secret (NMSettingVPN *setting, const char *key) { g_return_val_if_fail (NM_IS_SETTING_VPN (setting), NULL); return (const char *) g_hash_table_lookup (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets, key); }
158,027,075,639,067,830,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,009
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_get_service_type (NMSettingVPN *setting) { g_return_val_if_fail (NM_IS_SETTING_VPN (setting), NULL); return NM_SETTING_VPN_GET_PRIVATE (setting)->service_type; }
119,582,077,599,794,970,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,010
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_get_user_name (NMSettingVPN *setting) { g_return_val_if_fail (NM_IS_SETTING_VPN (setting), NULL); return NM_SETTING_VPN_GET_PRIVATE (setting)->user_name; }
256,141,519,305,599,020,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,011
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_new (void) { return (NMSetting *) g_object_new (NM_TYPE_SETTING_VPN, NULL); }
164,641,893,174,104,650,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,012
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_remove_data_item (NMSettingVPN *setting, const char *key) { g_return_if_fail (NM_IS_SETTING_VPN (setting)); g_hash_table_remove (NM_SETTING_VPN_GET_PRIVATE (setting)->data, key); }
180,344,893,505,640,880,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,013
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
nm_setting_vpn_remove_secret (NMSettingVPN *setting, const char *key) { g_return_if_fail (NM_IS_SETTING_VPN (setting)); g_hash_table_remove (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets, key); }
245,380,515,635,376,780,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,014
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
set_secret_flags (NMSetting *setting, const char *secret_name, gboolean verify_secret, NMSettingSecretFlags flags, GError **error) { g_hash_table_insert (NM_SETTING_VPN_GET_PRIVATE (setting)->data, g_strdup_printf ("%s-flags"...
5,221,903,562,538,165,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,015
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
update_one_secret (NMSetting *setting, const char *key, GValue *value, GError **error) { gboolean success = FALSE; g_return_val_if_fail (key != NULL, FALSE); g_return_val_if_fail (value != NULL, FALSE); if (G_VALUE_HOLDS_STRING (value)) { /* Passing the string properties individually isn't correct, and won't ...
178,223,663,612,000,560,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,016
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
update_secret_hash (NMSetting *setting, GHashTable *secrets, GError **error) { NMSettingVPNPrivate *priv = NM_SETTING_VPN_GET_PRIVATE (setting); GHashTableIter iter; const char *name, *value; g_return_val_if_fail (secrets != NULL, FALSE); /* Make sure the items are valid *...
198,056,450,771,164,820,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,017
NetworkManager
78ce088843d59d4494965bfc40b30a2e63d065f6
https://gitlab.freedesktop.org/NetworkManager/NetworkManager
https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6
libnm-util: remove some left-over debugging code
0
update_secret_string (NMSetting *setting, const char *key, const char *value, GError **error) { NMSettingVPNPrivate *priv = NM_SETTING_VPN_GET_PRIVATE (setting); g_return_val_if_fail (key != NULL, FALSE); g_return_val_if_fail (value != NULL, FALSE); ...
290,725,752,382,751,830,000,000,000,000,000,000,000
nm-setting-vpn.c
333,698,967,928,628,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2011-1943
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
https://nvd.nist.gov/vuln/detail/CVE-2011-1943
13,025
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileAddEntry(FontTablePtr table, FontEntryPtr prototype) { FontEntryPtr entry; int newsize; /* can't add entries to a sorted table, pointers get broken! */ if (table->sorted) return (FontEntryPtr) 0; /* "cannot" happen */ if (table->used == table->size) { if (table->size >= ((INT32...
105,897,487,033,164,210,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,026
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileFreeDir (FontDirectoryPtr dir) { FontFileFreeTable (&dir->scalable); FontFileFreeTable (&dir->nonScalable); free(dir); }
116,089,240,263,418,750,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,027
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileFreeEntry (FontEntryPtr entry) { FontScalableExtraPtr extra; int i; if (entry->name.name) free(entry->name.name); entry->name.name = NULL; switch (entry->type) { case FONT_ENTRY_SCALABLE: free (entry->u.scalable.fileName); extra = entry->u.scalable.extra; for (i = 0; i < extr...
179,653,529,445,716,820,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,028
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileFreeTable (FontTablePtr table) { int i; for (i = 0; i < table->used; i++) FontFileFreeEntry (&table->entries[i]); free (table->entries); }
310,470,303,469,150,200,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,029
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileInitTable (FontTablePtr table, int size) { if (size < 0 || (size > INT32_MAX/sizeof(FontEntryRec))) return FALSE; if (size) { table->entries = malloc(sizeof(FontEntryRec) * size); if (!table->entries) return FALSE; } else table->entries = 0; table->used = 0; table->size = si...
11,308,980,747,300,044,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,030
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileMakeDir(const char *dirName, int size) { FontDirectoryPtr dir; int dirlen; int needslash = 0; const char *attrib; int attriblen; #if !defined(WIN32) attrib = strchr(dirName, ':'); #else /* OS/2 uses the colon in the drive letter descriptor, skip this */ attrib = strchr(di...
63,402,302,048,463,130,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,031
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileNameCompare(const void* a, const void* b) { FontEntryPtr a_name = (FontEntryPtr) a, b_name = (FontEntryPtr) b; return strcmpn(a_name->name.name, b_name->name.name); }
207,696,992,581,768,830,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,032
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
FontFileSortTable (FontTablePtr table) { if (!table->sorted) { qsort((char *) table->entries, table->used, sizeof(FontEntryRec), FontFileNameCompare); table->sorted = TRUE; } }
278,665,351,011,961,500,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,033
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
SetupWildMatch(FontTablePtr table, FontNamePtr pat, int *leftp, int *rightp, int *privatep) { int nDashes; char c; char *t; char *firstWild; char *firstDigit; int first; int center, left, right; int ...
109,749,753,334,868,200,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,034
libxfont
d1e670a4a8704b8708e493ab6155589bcd570608
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0
https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608
None
0
static int strcmpn(const char *s1, const char *s2) { int digits, predigits = 0; const char *ss1, *ss2; while (1) { if (*s1 == 0 && *s2 == 0) return 0; digits = Xisdigit(*s1) && Xisdigit(*s2); if (digits && !predigits) { ss1 = s1; ss2 = s2; while (Xisdigit(*ss1) && Xisdigit(*ss2)) s...
31,742,571,490,106,272,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13720
In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect...
https://nvd.nist.gov/vuln/detail/CVE-2017-13720
13,047
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
extend_path_list_container (gs_main_instance * minst, gs_file_path * pfp) { uint len = r_size(&minst->lib_path.container); ref *paths, *opaths = minst->lib_path.container.value.refs; /* Add 5 entries at a time to reduce VM thrashing */ paths = (ref *) gs_alloc_byte_array(minst->heap, len + LIB_PATH_EXT...
121,448,216,616,531,430,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,048
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
file_path_add(gs_main_instance * minst, gs_file_path * pfp, const char *dirs) { uint len = r_size(&pfp->list); const char *dpath = dirs; int code; if (dirs == 0) return 0; for (;;) { /* Find the end of the next directory name. */ const char *npath = dpath; ...
284,777,637,738,920,840,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,049
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
get_global_op_array(const gs_memory_t *mem) { gs_main_instance *minst = get_minst_from_memory(mem); return &minst->i_ctx_p->op_array_table_global; }
337,918,229,730,507,900,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,050
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
get_local_op_array(const gs_memory_t *mem) { gs_main_instance *minst = get_minst_from_memory(mem); return &minst->i_ctx_p->op_array_table_local; }
282,415,606,983,337,600,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,051
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
get_minst_from_memory(const gs_memory_t *mem) { return (gs_main_instance*)mem->gs_lib_ctx->top_of_system; }
106,700,645,422,609,950,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,052
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_abort(const gs_memory_t *mem) { /* In previous versions, we tried to do a cleanup (using gs_to_exit), * but more often than not, that will trip another abort and create * an infinite recursion. So just abort without trying to cleanup. */ gp_do_exit(1); }
264,138,651,576,620,600,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,053
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_finit_push_systemdict(i_ctx_t *i_ctx_p) { if (i_ctx_p == NULL) return; if (dsp == dstop ) { if (ref_stack_extend(&d_stack, 1) < 0) { /* zend() cannot fail */ (void)zend(i_ctx_p); } } dsp++; ref_assign(dsp, systemdict); }
6,947,556,960,003,981,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,054
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_alloc_instance(gs_memory_t *mem) { gs_main_instance *minst; if (mem == NULL) return NULL; minst = (gs_main_instance *)gs_alloc_bytes_immovable(mem, sizeof(gs_main_instance), "in...
288,873,631,506,187,020,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,055
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_init0(gs_main_instance * minst, FILE * in, FILE * out, FILE * err, int max_lib_paths) { ref *array; /* Do platform-dependent initialization. */ /* We have to do this as the very first thing, */ /* because it detects attempts to run 80N86 executables (N>0) */ /* on incompatible...
2,787,005,889,623,407,400,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,056
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_init1(gs_main_instance * minst) { gs_dual_memory_t idmem; name_table *nt = NULL; int code = 0; if (minst->init_done < 1) { code = ialloc_init(&idmem, minst->heap, minst->memory_clump_size, gs_have_level2()); if (code < 0) return code; ...
242,363,650,715,574,130,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,057
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_init2(gs_main_instance * minst) { i_ctx_t *i_ctx_p; int code = gs_main_init1(minst); int initial_init_level = minst->init_done; if (code < 0) return code; code = gs_main_init2aux(minst); if (code < 0) return code; i_ctx_p = minst->i_ctx_p; /* display_set_callback or ...
90,076,329,845,171,700,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,058
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_interpret(gs_main_instance *minst, ref * pref, int user_errors, int *pexit_code, ref * perror_object) { int code; /* set interpreter pointer to lib_path */ minst->i_ctx_p->lib_path = &minst->lib_path; code = gs_interpret(&minst->i_ctx_p, pref, user_errors, pexit_code, p...
70,279,696,578,730,700,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,059
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_run_file(gs_main_instance * minst, const char *file_name, int user_errors, int *pexit_code, ref * perror_object) { ref initial_file; int code = gs_main_run_file_open(minst, file_name, &initial_file); if (code < 0) return code; return gs_main_interpret(minst, &initial_file, user_errors, ...
324,244,535,467,490,500,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,060
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_run_file_open(gs_main_instance * minst, const char *file_name, ref * pfref) { gs_main_set_lib_paths(minst); if (gs_main_lib_open(minst, file_name, pfref) < 0) { emprintf1(minst->heap, "Can't find initialization file %s.\n", file_name); return_error(gs_...
74,360,986,685,600,710,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,061
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_run_string(gs_main_instance * minst, const char *str, int user_errors, int *pexit_code, ref * perror_object) { return gs_main_run_string_with_length(minst, str, (uint) strlen(str), user_errors, pexit_code,...
154,990,518,728,798,140,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,062
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_run_string_continue(gs_main_instance * minst, const char *str, uint length, int user_errors, int *pexit_code, ref * perror_object) { ref rstr; if (length == 0) return 0; /* empty string signals EOF */ make_const_string(&rstr, avm_foreign | a_readonly, length, ...
326,415,944,080,910,500,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,063
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_run_string_end(gs_main_instance * minst, int user_errors, int *pexit_code, ref * perror_object) { ref rstr; make_empty_const_string(&rstr, avm_foreign | a_readonly); return gs_main_interpret(minst, &rstr, user_errors, pexit_code, perror_object); }
21,337,938,275,860,980,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,064
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_run_string_with_length(gs_main_instance * minst, const char *str, uint length, int user_errors, int *pexit_code, ref * perror_object) { int code; code = gs_main_run_string_begin(minst, user_errors, pexit_code, perror_object); if (code < 0) return...
268,813,961,312,064,320,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,065
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_main_set_lib_paths(gs_main_instance * minst) { ref *paths = minst->lib_path.container.value.refs; int first_is_here = (r_size(&minst->lib_path.list) != 0 && paths[0].value.bytes == (const byte *)gp_current_directory_name ? 1 : 0); int code = 0; int count = minst->lib_path.count; ...
316,349,062,797,282,370,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,066
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
static char *gs_main_tempnames(gs_main_instance *minst) { i_ctx_t *i_ctx_p = minst->i_ctx_p; ref *SAFETY; ref *tempfiles; ref keyval[2]; /* for key and value */ char *tempnames = NULL; int i; int idict; int len = 0; const byte *data = NULL; uint size; if (minst->init_don...
85,829,529,421,199,590,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,067
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_pop_boolean(gs_main_instance * minst, bool * result) { i_ctx_t *i_ctx_p = minst->i_ctx_p; ref vref; int code = pop_value(i_ctx_p, &vref); if (code < 0) return code; check_type_only(vref, t_boolean); *result = vref.value.boolval; ref_stack_pop(&o_stack, 1); return 0; }
216,933,678,738,595,440,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,068
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_pop_integer(gs_main_instance * minst, long *result) { i_ctx_t *i_ctx_p = minst->i_ctx_p; ref vref; int code = pop_value(i_ctx_p, &vref); if (code < 0) return code; check_type_only(vref, t_integer); *result = vref.value.intval; ref_stack_pop(&o_stack, 1); return 0; }
20,389,079,627,896,340,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,069
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_pop_real(gs_main_instance * minst, float *result) { i_ctx_t *i_ctx_p = minst->i_ctx_p; ref vref; int code = pop_value(i_ctx_p, &vref); if (code < 0) return code; switch (r_type(&vref)) { case t_real: *result = vref.value.realval; break; case t_inte...
312,936,224,320,106,900,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,070
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_pop_string(gs_main_instance * minst, gs_string * result) { i_ctx_t *i_ctx_p = minst->i_ctx_p; ref vref; int code = pop_value(i_ctx_p, &vref); if (code < 0) return code; switch (r_type(&vref)) { case t_name: name_string_ref(minst->heap, &vref, &vref); code ...
204,078,097,995,483,680,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,071
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_push_boolean(gs_main_instance * minst, bool value) { ref vref; make_bool(&vref, value); return push_value(minst, &vref); }
120,696,417,550,786,750,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,072
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_push_integer(gs_main_instance * minst, long value) { ref vref; make_int(&vref, value); return push_value(minst, &vref); }
47,065,399,740,519,440,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,073
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_push_string(gs_main_instance * minst, byte * chars, uint length, bool read_only) { ref vref; make_string(&vref, avm_foreign | (read_only ? a_readonly : a_all), length, (byte *) chars); return push_value(minst, &vref); }
120,605,738,359,642,460,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,074
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
gs_to_exit(const gs_memory_t *mem, int exit_status) { return gs_to_exit_with_code(mem, exit_status, 0); }
244,713,961,261,436,300,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,075
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
print_resource_usage(const gs_main_instance * minst, gs_dual_memory_t * dmem, const char *msg) { ulong used = 0; /* this we accumulate for the PS memories */ long utime[2]; int i; gs_memory_status_t status; gp_get_realtime(utime); for (i = 0; i < countof(dmem->spaces_inde...
333,873,625,482,511,640,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541
13,076
ghostscript
241d91112771a6104de10b3948c3f350d6690c1d
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
None
0
push_value(gs_main_instance *minst, ref * pvalue) { i_ctx_t *i_ctx_p = minst->i_ctx_p; int code = ref_stack_push(&o_stack, 1); if (code < 0) return code; *ref_stack_index(&o_stack, 0L) = *pvalue; return 0; }
20,838,362,543,447,195,000,000,000,000,000,000,000
imain.c
190,063,148,089,697,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-16541
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
https://nvd.nist.gov/vuln/detail/CVE-2018-16541