idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
12,958 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_copyscanlines(gx_device * dev, int start_y, byte * data, uint size,
int *plines_copied, uint * pbytes_copied)
{
uint line_size = gx_device_raster(dev, 0);
uint count = size / line_size;
uint i;
byte *dest = data;
for (i = 0; i < count; i++, dest += line_size) {
int code ... | 121,176,432,738,769,500,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,959 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_currentdevice(const gs_gstate * pgs)
{
return pgs->device;
}
| 246,589,197,504,535,070,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,960 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_deviceinitialmatrix(gx_device * dev, gs_matrix * pmat)
{
fill_dev_proc(dev, get_initial_matrix, gx_default_get_initial_matrix);
(*dev_proc(dev, get_initial_matrix)) (dev, pmat);
}
| 241,744,422,895,354,530,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,961 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_flushpage(gs_gstate * pgs)
{
gx_device *dev = gs_currentdevice(pgs);
return (*dev_proc(dev, sync_output)) (dev);
}
| 118,647,578,009,158,500,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,962 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_getdefaultdevice(void)
{
return gs_getdefaultlibdevice(NULL);
}
| 128,246,745,710,143,350,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,963 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_getdefaultlibdevice(gs_memory_t *mem)
{
const gx_device *const *list;
int count = gs_lib_device_list(&list, NULL);
const char *name, *end, *fin;
int i;
/* Search the compiled in device list for a known device name */
/* In the case the lib ctx hasn't been initialised */
if (mem && mem->g... | 234,235,028,076,659,650,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,964 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_getdevice(int index)
{
const gx_device *const *list;
int count = gs_lib_device_list(&list, NULL);
if (index < 0 || index >= count)
return 0; /* index out of range */
return list[index];
}
| 192,197,817,241,924,720,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,965 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_gstate_putdeviceparams(gs_gstate *pgs, gx_device *dev, gs_param_list *plist)
{
int code;
gx_device *dev2;
if (dev)
dev2 = dev;
else
dev2 = pgs->device;
code = gs_putdeviceparams(dev2, plist);
if (code >= 0)
gs_gstate_update_device(pgs, dev2);
return code;
}
| 284,263,465,545,604,520,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,966 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_gstate_update_device(gs_gstate *pgs, gx_device *dev)
{
gx_set_cmap_procs(pgs, dev);
gx_unset_both_dev_colors(pgs);
}
| 220,349,104,624,773,140,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,967 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_make_null_device(gx_device_null *dev_null, gx_device *dev,
gs_memory_t * mem)
{
gx_device_init((gx_device *)dev_null, (const gx_device *)&gs_null_device,
mem, true);
gx_device_set_target((gx_device_forward *)dev_null, dev);
if (dev) {
/* The gx_device_copy_c... | 94,838,632,952,741,690,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,968 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_opendevice(gx_device *dev)
{
if (dev->is_open)
return 0;
check_device_separable(dev);
gx_device_fill_in_procs(dev);
{
int code = (*dev_proc(dev, open_device))(dev);
if (code < 0)
return_error(code);
dev->is_open = true;
return 1;
}
}
| 17,326,740,967,496,054,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,969 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_output_page(gs_gstate * pgs, int num_copies, int flush)
{
gx_device *dev = gs_currentdevice(pgs);
cmm_dev_profile_t *dev_profile;
int code;
/* for devices that hook 'fill_path' in order to pick up gs_gstate */
/* values such as dev_ht (such as tiffsep1), make a dummy call here */
/* to mak... | 239,360,874,233,814,900,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,970 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_setdevice_no_erase(gs_gstate * pgs, gx_device * dev)
{
int open_code = 0, code;
gs_lib_ctx_t *libctx = gs_lib_ctx_get_interp_instance(pgs->memory);
/* If the ICC manager is not yet initialized, set it up now. But only
if we have file io capability now */
if (libctx->io_device_table != NULL) ... | 287,767,588,940,161,460,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,971 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gs_setdevice_no_init(gs_gstate * pgs, gx_device * dev)
{
/*
* Just set the device, possibly changing color space but no other
* device parameters.
*
* Make sure we don't close the device if dev == pgs->device
* This could be done by allowing the rc_assign to close the
* old 'dev' if th... | 297,002,467,929,152,000,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,972 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | bool gx_color_info_equal(const gx_device_color_info * p1, const gx_device_color_info * p2)
{
if (p1->anti_alias.graphics_bits != p2->anti_alias.graphics_bits)
return false;
if (p1->anti_alias.text_bits != p2->anti_alias.text_bits)
return false;
if (p1->black_component != p2->black_component)... | 107,972,787,377,262,370,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,973 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_copy_color_params(gx_device *dev, const gx_device *target)
{
COPY_PARAM(color_info);
COPY_PARAM(cached_colors);
gx_device_copy_color_procs(dev, target);
}
| 69,448,433,926,426,675,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,974 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_copy_color_procs(gx_device *dev, const gx_device *target)
{
dev_proc_map_cmyk_color((*from_cmyk)) =
dev_proc(dev, map_cmyk_color);
dev_proc_map_rgb_color((*from_rgb)) =
dev_proc(dev, map_rgb_color);
dev_proc_map_color_rgb((*to_rgb)) =
dev_proc(dev, map_color_rgb);
/* T... | 175,623,425,087,760,100,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,975 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_copy_params(gx_device *dev, const gx_device *target)
{
#define COPY_ARRAY_PARAM(p) memcpy(dev->p, target->p, sizeof(dev->p))
COPY_PARAM(width);
COPY_PARAM(height);
COPY_ARRAY_PARAM(MediaSize);
COPY_ARRAY_PARAM(ImagingBBox);
COPY_PARAM(ImagingBBox_set);
COPY_ARRA... | 241,543,467,634,600,870,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,976 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | int gx_device_delete_output_file(const gx_device * dev, const char *fname)
{
gs_parsed_file_name_t parsed;
const char *fmt;
char *pfname = (char *)gs_alloc_bytes(dev->memory, gp_file_name_sizeof, "gx_device_delete_output_file(pfname)");
int code;
if (pfname == NULL) {
code = gs_note_error(g... | 263,423,279,000,345,130,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,977 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_enum_ptr(gx_device * dev)
{
if (dev == 0 || dev->memory == 0)
return 0;
return dev;
}
| 157,366,631,059,104,600,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,978 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_finalize(const gs_memory_t *cmem, void *vptr)
{
gx_device * const dev = (gx_device *)vptr;
(void)cmem; /* unused */
if (dev->icc_struct != NULL) {
rc_decrement(dev->icc_struct, "gx_device_finalize(icc_profile)");
}
if (dev->finalize)
dev->finalize(dev);
/* Deal with s... | 76,777,080,795,472,600,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,979 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_free_local(gx_device *dev)
{
gx_device_finalize(dev->memory, dev);
}
| 223,116,113,608,474,680,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,980 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_make_struct_type(gs_memory_struct_type_t *st,
const gx_device *dev)
{
if (dev->stype)
*st = *dev->stype;
else if (dev_proc(dev, get_xfont_procs) == gx_forward_get_xfont_procs)
*st = st_device_forward;
else
*st = st_device;
st->ssize = dev->par... | 223,072,032,333,690,770,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,981 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_open_output_file(const gx_device * dev, char *fname,
bool binary, bool positionable, FILE ** pfile)
{
gs_parsed_file_name_t parsed;
const char *fmt;
char *pfname = (char *)gs_alloc_bytes(dev->memory, gp_file_name_sizeof, "gx_device_open_output_file(pfname)");
int cod... | 47,867,042,082,787,110,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,982 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_raster(const gx_device * dev, bool pad)
{
ulong bits = (ulong) dev->width * dev->color_info.depth;
ulong raster;
int l2align;
if (dev->is_planar)
bits /= dev->color_info.num_components;
raster = (uint)((bits + 7) >> 3);
if (!pad)
return raster;
l2align = dev->log2... | 60,491,976,273,406,750,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,983 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_reloc_ptr(gx_device * dev, gc_state_t * gcst)
{
if (dev == 0 || dev->memory == 0)
return dev;
return RELOC_OBJ(dev); /* gcst implicit */
}
| 42,602,427,819,645,280,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,984 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_retain(gx_device *dev, bool retained)
{
int delta = (int)retained - (int)dev->retained;
if (delta) {
dev->retained = retained; /* do first in case dev is freed */
rc_adjust_only(dev, delta, "gx_device_retain");
}
}
| 290,142,168,081,832,400,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,985 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_set_hwsize_from_media(gx_device *dev)
{
int rot = (dev->LeadingEdge & 1);
double rot_media_x = rot ? dev->MediaSize[1] : dev->MediaSize[0];
double rot_media_y = rot ? dev->MediaSize[0] : dev->MediaSize[1];
dev->width = (int)(rot_media_x * dev->HWResolution[0] / 72.0 + 0.5);
dev->height = ... | 55,881,504,523,783,830,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,986 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_set_margins(gx_device * dev, const float *margins /*[4] */ ,
bool move_origin)
{
int i;
for (i = 0; i < 4; ++i)
dev->HWMargins[i] = margins[i] * 72.0;
if (move_origin) {
dev->Margins[0] = -margins[0] * dev->HWResolution[0];
dev->Margins[1] = -margins[... | 128,921,508,264,789,700,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,987 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_set_media_from_hwsize(gx_device *dev)
{
int rot = (dev->LeadingEdge & 1);
double x = dev->width * 72.0 / dev->HWResolution[0];
double y = dev->height * 72.0 / dev->HWResolution[1];
if (rot) {
dev->MediaSize[1] = x;
dev->MediaSize[0] = y;
} else {
dev->MediaSize[0] ... | 333,214,101,161,294,440,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,988 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_set_media_size(gx_device * dev, double media_width, double media_height)
{
dev->MediaSize[0] = media_width;
dev->MediaSize[1] = media_height;
gx_device_set_hwsize_from_media(dev);
}
| 138,491,899,669,594,270,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,989 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_set_procs(gx_device * dev)
{
if (dev->static_procs != 0) { /* 0 if already populated */
dev->procs = *dev->static_procs;
dev->static_procs = 0;
}
}
| 198,215,675,602,589,670,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,990 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_set_resolution(gx_device * dev, double x_dpi, double y_dpi)
{
dev->HWResolution[0] = x_dpi;
dev->HWResolution[1] = y_dpi;
gx_device_set_hwsize_from_media(dev);
}
| 121,786,554,363,902,900,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,991 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_device_set_width_height(gx_device * dev, int width, int height)
{
dev->width = width;
dev->height = height;
gx_device_set_media_from_hwsize(dev);
}
| 235,183,843,600,623,440,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,992 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_finish_output_page(gx_device *dev, int num_copies, int flush)
{
dev->PageCount += num_copies;
return 0;
}
| 55,463,866,489,858,830,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,993 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_outputfile_is_separate_pages(const char *fname, gs_memory_t *memory)
{
const char *fmt;
gs_parsed_file_name_t parsed;
int code = gx_parse_output_file_name(&parsed, &fmt, fname,
strlen(fname), memory);
return (code >= 0 && fmt != 0);
}
| 24,055,865,898,036,173,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,994 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_parse_output_format(gs_parsed_file_name_t *pfn, const char **pfmt)
{
bool have_format = false, field;
int width[2], int_width = sizeof(int) * 3, w = 0;
uint i;
/* Scan the file name for a format string, and validate it if present. */
width[0] = width[1] = 0;
for (i = 0; i < pfn->len; ++i)
... | 197,994,751,149,248,050,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,995 | ghostscript | 79cccf641486a6595c43f1de1cd7ade696020a31 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486 | None | 0 | gx_set_device_only(gs_gstate * pgs, gx_device * dev)
{
rc_assign(pgs->device, dev, "gx_set_device_only");
}
| 227,318,991,850,472,930,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,996 | ghostscript | 5516c614dc33662a2afdc377159f70218e67bde5 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33 | None | 0 | z2grestoreall(i_ctx_t *i_ctx_p)
{
for (;;) {
if (!restore_page_device(igs, gs_gstate_saved(igs))) {
bool done = !gs_gstate_saved(gs_gstate_saved(igs));
gs_grestore(igs);
if (done)
break;
} else
return push_callout(i_ctx_p, "%grestoreal... | 173,339,446,047,426,430,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,997 | ghostscript | 5516c614dc33662a2afdc377159f70218e67bde5 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33 | None | 0 | ivalidate_clean_spaces(i_ctx_t *i_ctx_p)
{
if (gs_debug_c('?')) {
ref_stack_cleanup(&d_stack);
ref_stack_cleanup(&e_stack);
ref_stack_cleanup(&o_stack);
ivalidate_spaces();
}
}
| 154,552,545,675,467,000,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,998 | ghostscript | 5516c614dc33662a2afdc377159f70218e67bde5 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33 | None | 0 | zsave(i_ctx_t *i_ctx_p)
{
os_ptr op = osp;
uint space = icurrent_space;
vm_save_t *vmsave;
ulong sid;
int code;
gs_gstate *prev;
if (I_VALIDATE_BEFORE_SAVE)
ivalidate_clean_spaces(i_ctx_p);
ialloc_set_space(idmemory, avm_local);
vmsave = ialloc_struct(vm_save_t, &st_vm_save,... | 7,099,333,562,797,629,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2018-16863 | It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat En... | https://nvd.nist.gov/vuln/detail/CVE-2018-16863 |
12,999 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | foreach_item_helper (GHashTable *hash,
NMVPNIterFunc func,
gpointer user_data)
{
GList *keys, *liter;
GSList *copied = NULL, *siter;
g_return_if_fail (hash != NULL);
/* Grab keys and copy them so that the callback func can modify
* the hash table items if it wants to.
... | 288,363,740,086,990,170,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,000 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | get_secret_flags (NMSetting *setting,
const char *secret_name,
gboolean verify_secret,
NMSettingSecretFlags *out_flags,
GError **error)
{
NMSettingVPNPrivate *priv = NM_SETTING_VPN_GET_PRIVATE (setting);
gboolean success = FALSE;
char *flags_key... | 100,936,012,068,127,600,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,001 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | need_secrets (NMSetting *setting)
{
/* Assume that VPN connections need secrets since they almost always will */
return g_ptr_array_sized_new (1);
}
| 1,465,387,943,877,927,600,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,002 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_add_data_item (NMSettingVPN *setting,
const char *key,
const char *item)
{
g_return_if_fail (NM_IS_SETTING_VPN (setting));
g_return_if_fail (key != NULL);
g_return_if_fail (strlen (key) > 0);
g_return_if_fail (item != NULL);
g_return_if_fai... | 223,850,055,064,850,450,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,003 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_add_secret (NMSettingVPN *setting,
const char *key,
const char *secret)
{
g_return_if_fail (NM_IS_SETTING_VPN (setting));
g_return_if_fail (key != NULL);
g_return_if_fail (strlen (key) > 0);
g_return_if_fail (secret != NULL);
g_return_if_fail (st... | 104,936,455,229,510,820,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,004 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_error_get_type (void)
{
static GType etype = 0;
if (etype == 0) {
static const GEnumValue values[] = {
/* Unknown error. */
ENUM_ENTRY (NM_SETTING_VPN_ERROR_UNKNOWN, "UnknownError"),
/* The specified property was invalid. */
ENUM_ENTRY (NM_SETTING_VPN_ERROR_INVALID_PROPERTY, "InvalidProp... | 94,857,485,923,692,960,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,005 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_error_quark (void)
{
static GQuark quark;
if (G_UNLIKELY (!quark))
quark = g_quark_from_static_string ("nm-setting-vpn-error-quark");
return quark;
}
| 26,806,505,943,741,525,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,006 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_foreach_data_item (NMSettingVPN *setting,
NMVPNIterFunc func,
gpointer user_data)
{
g_return_if_fail (setting != NULL);
g_return_if_fail (NM_IS_SETTING_VPN (setting));
foreach_item_helper (NM_SETTING_VPN_GET_PRIVATE (setting)->data, ... | 321,082,917,956,983,600,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,007 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_foreach_secret (NMSettingVPN *setting,
NMVPNIterFunc func,
gpointer user_data)
{
g_return_if_fail (setting != NULL);
g_return_if_fail (NM_IS_SETTING_VPN (setting));
foreach_item_helper (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets, func, ... | 240,436,442,538,505,940,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,008 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_get_secret (NMSettingVPN *setting, const char *key)
{
g_return_val_if_fail (NM_IS_SETTING_VPN (setting), NULL);
return (const char *) g_hash_table_lookup (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets, key);
}
| 158,027,075,639,067,830,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,009 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_get_service_type (NMSettingVPN *setting)
{
g_return_val_if_fail (NM_IS_SETTING_VPN (setting), NULL);
return NM_SETTING_VPN_GET_PRIVATE (setting)->service_type;
}
| 119,582,077,599,794,970,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,010 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_get_user_name (NMSettingVPN *setting)
{
g_return_val_if_fail (NM_IS_SETTING_VPN (setting), NULL);
return NM_SETTING_VPN_GET_PRIVATE (setting)->user_name;
}
| 256,141,519,305,599,020,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,011 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_new (void)
{
return (NMSetting *) g_object_new (NM_TYPE_SETTING_VPN, NULL);
}
| 164,641,893,174,104,650,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,012 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_remove_data_item (NMSettingVPN *setting, const char *key)
{
g_return_if_fail (NM_IS_SETTING_VPN (setting));
g_hash_table_remove (NM_SETTING_VPN_GET_PRIVATE (setting)->data, key);
}
| 180,344,893,505,640,880,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,013 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | nm_setting_vpn_remove_secret (NMSettingVPN *setting, const char *key)
{
g_return_if_fail (NM_IS_SETTING_VPN (setting));
g_hash_table_remove (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets, key);
}
| 245,380,515,635,376,780,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,014 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | set_secret_flags (NMSetting *setting,
const char *secret_name,
gboolean verify_secret,
NMSettingSecretFlags flags,
GError **error)
{
g_hash_table_insert (NM_SETTING_VPN_GET_PRIVATE (setting)->data,
g_strdup_printf ("%s-flags"... | 5,221,903,562,538,165,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,015 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | update_one_secret (NMSetting *setting, const char *key, GValue *value, GError **error)
{
gboolean success = FALSE;
g_return_val_if_fail (key != NULL, FALSE);
g_return_val_if_fail (value != NULL, FALSE);
if (G_VALUE_HOLDS_STRING (value)) {
/* Passing the string properties individually isn't correct, and won't
... | 178,223,663,612,000,560,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,016 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | update_secret_hash (NMSetting *setting,
GHashTable *secrets,
GError **error)
{
NMSettingVPNPrivate *priv = NM_SETTING_VPN_GET_PRIVATE (setting);
GHashTableIter iter;
const char *name, *value;
g_return_val_if_fail (secrets != NULL, FALSE);
/* Make sure the items are valid *... | 198,056,450,771,164,820,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,017 | NetworkManager | 78ce088843d59d4494965bfc40b30a2e63d065f6 | https://gitlab.freedesktop.org/NetworkManager/NetworkManager | https://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=78ce088843d59d4494965bfc40b30a2e63d065f6 | libnm-util: remove some left-over debugging code | 0 | update_secret_string (NMSetting *setting,
const char *key,
const char *value,
GError **error)
{
NMSettingVPNPrivate *priv = NM_SETTING_VPN_GET_PRIVATE (setting);
g_return_val_if_fail (key != NULL, FALSE);
g_return_val_if_fail (value != NULL, FALSE);
... | 290,725,752,382,751,830,000,000,000,000,000,000,000 | nm-setting-vpn.c | 333,698,967,928,628,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2011-1943 | The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file. | https://nvd.nist.gov/vuln/detail/CVE-2011-1943 |
13,025 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileAddEntry(FontTablePtr table, FontEntryPtr prototype)
{
FontEntryPtr entry;
int newsize;
/* can't add entries to a sorted table, pointers get broken! */
if (table->sorted)
return (FontEntryPtr) 0; /* "cannot" happen */
if (table->used == table->size) {
if (table->size >= ((INT32... | 105,897,487,033,164,210,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,026 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileFreeDir (FontDirectoryPtr dir)
{
FontFileFreeTable (&dir->scalable);
FontFileFreeTable (&dir->nonScalable);
free(dir);
}
| 116,089,240,263,418,750,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,027 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileFreeEntry (FontEntryPtr entry)
{
FontScalableExtraPtr extra;
int i;
if (entry->name.name)
free(entry->name.name);
entry->name.name = NULL;
switch (entry->type)
{
case FONT_ENTRY_SCALABLE:
free (entry->u.scalable.fileName);
extra = entry->u.scalable.extra;
for (i = 0; i < extr... | 179,653,529,445,716,820,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,028 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileFreeTable (FontTablePtr table)
{
int i;
for (i = 0; i < table->used; i++)
FontFileFreeEntry (&table->entries[i]);
free (table->entries);
}
| 310,470,303,469,150,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,029 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileInitTable (FontTablePtr table, int size)
{
if (size < 0 || (size > INT32_MAX/sizeof(FontEntryRec)))
return FALSE;
if (size)
{
table->entries = malloc(sizeof(FontEntryRec) * size);
if (!table->entries)
return FALSE;
}
else
table->entries = 0;
table->used = 0;
table->size = si... | 11,308,980,747,300,044,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,030 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileMakeDir(const char *dirName, int size)
{
FontDirectoryPtr dir;
int dirlen;
int needslash = 0;
const char *attrib;
int attriblen;
#if !defined(WIN32)
attrib = strchr(dirName, ':');
#else
/* OS/2 uses the colon in the drive letter descriptor, skip this */
attrib = strchr(di... | 63,402,302,048,463,130,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,031 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileNameCompare(const void* a, const void* b)
{
FontEntryPtr a_name = (FontEntryPtr) a,
b_name = (FontEntryPtr) b;
return strcmpn(a_name->name.name, b_name->name.name);
}
| 207,696,992,581,768,830,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,032 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | FontFileSortTable (FontTablePtr table)
{
if (!table->sorted) {
qsort((char *) table->entries, table->used, sizeof(FontEntryRec),
FontFileNameCompare);
table->sorted = TRUE;
}
}
| 278,665,351,011,961,500,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,033 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | SetupWildMatch(FontTablePtr table, FontNamePtr pat,
int *leftp, int *rightp, int *privatep)
{
int nDashes;
char c;
char *t;
char *firstWild;
char *firstDigit;
int first;
int center,
left,
right;
int ... | 109,749,753,334,868,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,034 | libxfont | d1e670a4a8704b8708e493ab6155589bcd570608 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d11ee5886e9d9ec610051a206b135a4cdc1e09a0 | https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 | None | 0 | static int strcmpn(const char *s1, const char *s2)
{
int digits, predigits = 0;
const char *ss1, *ss2;
while (1) {
if (*s1 == 0 && *s2 == 0)
return 0;
digits = Xisdigit(*s1) && Xisdigit(*s2);
if (digits && !predigits) {
ss1 = s1;
ss2 = s2;
while (Xisdigit(*ss1) && Xisdigit(*ss2))
s... | 31,742,571,490,106,272,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13720 | In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrect... | https://nvd.nist.gov/vuln/detail/CVE-2017-13720 |
13,047 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | extend_path_list_container (gs_main_instance * minst, gs_file_path * pfp)
{
uint len = r_size(&minst->lib_path.container);
ref *paths, *opaths = minst->lib_path.container.value.refs;
/* Add 5 entries at a time to reduce VM thrashing */
paths = (ref *) gs_alloc_byte_array(minst->heap, len + LIB_PATH_EXT... | 121,448,216,616,531,430,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,048 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | file_path_add(gs_main_instance * minst, gs_file_path * pfp, const char *dirs)
{
uint len = r_size(&pfp->list);
const char *dpath = dirs;
int code;
if (dirs == 0)
return 0;
for (;;) { /* Find the end of the next directory name. */
const char *npath = dpath;
... | 284,777,637,738,920,840,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,049 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | get_global_op_array(const gs_memory_t *mem)
{
gs_main_instance *minst = get_minst_from_memory(mem);
return &minst->i_ctx_p->op_array_table_global;
}
| 337,918,229,730,507,900,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,050 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | get_local_op_array(const gs_memory_t *mem)
{
gs_main_instance *minst = get_minst_from_memory(mem);
return &minst->i_ctx_p->op_array_table_local;
}
| 282,415,606,983,337,600,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,051 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | get_minst_from_memory(const gs_memory_t *mem)
{
return (gs_main_instance*)mem->gs_lib_ctx->top_of_system;
}
| 106,700,645,422,609,950,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,052 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_abort(const gs_memory_t *mem)
{
/* In previous versions, we tried to do a cleanup (using gs_to_exit),
* but more often than not, that will trip another abort and create
* an infinite recursion. So just abort without trying to cleanup.
*/
gp_do_exit(1);
}
| 264,138,651,576,620,600,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,053 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_finit_push_systemdict(i_ctx_t *i_ctx_p)
{
if (i_ctx_p == NULL)
return;
if (dsp == dstop ) {
if (ref_stack_extend(&d_stack, 1) < 0) {
/* zend() cannot fail */
(void)zend(i_ctx_p);
}
}
dsp++;
ref_assign(dsp, systemdict);
}
| 6,947,556,960,003,981,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,054 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_alloc_instance(gs_memory_t *mem)
{
gs_main_instance *minst;
if (mem == NULL)
return NULL;
minst = (gs_main_instance *)gs_alloc_bytes_immovable(mem,
sizeof(gs_main_instance),
"in... | 288,873,631,506,187,020,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,055 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_init0(gs_main_instance * minst, FILE * in, FILE * out, FILE * err,
int max_lib_paths)
{
ref *array;
/* Do platform-dependent initialization. */
/* We have to do this as the very first thing, */
/* because it detects attempts to run 80N86 executables (N>0) */
/* on incompatible... | 2,787,005,889,623,407,400,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,056 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_init1(gs_main_instance * minst)
{
gs_dual_memory_t idmem;
name_table *nt = NULL;
int code = 0;
if (minst->init_done < 1) {
code = ialloc_init(&idmem, minst->heap,
minst->memory_clump_size, gs_have_level2());
if (code < 0)
return code;
... | 242,363,650,715,574,130,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,057 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_init2(gs_main_instance * minst)
{
i_ctx_t *i_ctx_p;
int code = gs_main_init1(minst);
int initial_init_level = minst->init_done;
if (code < 0)
return code;
code = gs_main_init2aux(minst);
if (code < 0)
return code;
i_ctx_p = minst->i_ctx_p; /* display_set_callback or ... | 90,076,329,845,171,700,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,058 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_interpret(gs_main_instance *minst, ref * pref, int user_errors,
int *pexit_code, ref * perror_object)
{
int code;
/* set interpreter pointer to lib_path */
minst->i_ctx_p->lib_path = &minst->lib_path;
code = gs_interpret(&minst->i_ctx_p, pref,
user_errors, pexit_code, p... | 70,279,696,578,730,700,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,059 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_run_file(gs_main_instance * minst, const char *file_name, int user_errors, int *pexit_code, ref * perror_object)
{
ref initial_file;
int code = gs_main_run_file_open(minst, file_name, &initial_file);
if (code < 0)
return code;
return gs_main_interpret(minst, &initial_file, user_errors,
... | 324,244,535,467,490,500,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,060 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_run_file_open(gs_main_instance * minst, const char *file_name, ref * pfref)
{
gs_main_set_lib_paths(minst);
if (gs_main_lib_open(minst, file_name, pfref) < 0) {
emprintf1(minst->heap,
"Can't find initialization file %s.\n",
file_name);
return_error(gs_... | 74,360,986,685,600,710,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,061 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_run_string(gs_main_instance * minst, const char *str, int user_errors,
int *pexit_code, ref * perror_object)
{
return gs_main_run_string_with_length(minst, str, (uint) strlen(str),
user_errors,
pexit_code,... | 154,990,518,728,798,140,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,062 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_run_string_continue(gs_main_instance * minst, const char *str,
uint length, int user_errors, int *pexit_code, ref * perror_object)
{
ref rstr;
if (length == 0)
return 0; /* empty string signals EOF */
make_const_string(&rstr, avm_foreign | a_readonly, length,
... | 326,415,944,080,910,500,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,063 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_run_string_end(gs_main_instance * minst, int user_errors,
int *pexit_code, ref * perror_object)
{
ref rstr;
make_empty_const_string(&rstr, avm_foreign | a_readonly);
return gs_main_interpret(minst, &rstr, user_errors, pexit_code,
perror_object);
}
| 21,337,938,275,860,980,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,064 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_run_string_with_length(gs_main_instance * minst, const char *str,
uint length, int user_errors, int *pexit_code, ref * perror_object)
{
int code;
code = gs_main_run_string_begin(minst, user_errors,
pexit_code, perror_object);
if (code < 0)
return... | 268,813,961,312,064,320,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,065 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_main_set_lib_paths(gs_main_instance * minst)
{
ref *paths = minst->lib_path.container.value.refs;
int first_is_here =
(r_size(&minst->lib_path.list) != 0 &&
paths[0].value.bytes == (const byte *)gp_current_directory_name ? 1 : 0);
int code = 0;
int count = minst->lib_path.count;
... | 316,349,062,797,282,370,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,066 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | static char *gs_main_tempnames(gs_main_instance *minst)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
ref *SAFETY;
ref *tempfiles;
ref keyval[2]; /* for key and value */
char *tempnames = NULL;
int i;
int idict;
int len = 0;
const byte *data = NULL;
uint size;
if (minst->init_don... | 85,829,529,421,199,590,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,067 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_pop_boolean(gs_main_instance * minst, bool * result)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
ref vref;
int code = pop_value(i_ctx_p, &vref);
if (code < 0)
return code;
check_type_only(vref, t_boolean);
*result = vref.value.boolval;
ref_stack_pop(&o_stack, 1);
return 0;
}
| 216,933,678,738,595,440,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,068 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_pop_integer(gs_main_instance * minst, long *result)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
ref vref;
int code = pop_value(i_ctx_p, &vref);
if (code < 0)
return code;
check_type_only(vref, t_integer);
*result = vref.value.intval;
ref_stack_pop(&o_stack, 1);
return 0;
}
| 20,389,079,627,896,340,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,069 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_pop_real(gs_main_instance * minst, float *result)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
ref vref;
int code = pop_value(i_ctx_p, &vref);
if (code < 0)
return code;
switch (r_type(&vref)) {
case t_real:
*result = vref.value.realval;
break;
case t_inte... | 312,936,224,320,106,900,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,070 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_pop_string(gs_main_instance * minst, gs_string * result)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
ref vref;
int code = pop_value(i_ctx_p, &vref);
if (code < 0)
return code;
switch (r_type(&vref)) {
case t_name:
name_string_ref(minst->heap, &vref, &vref);
code ... | 204,078,097,995,483,680,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,071 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_push_boolean(gs_main_instance * minst, bool value)
{
ref vref;
make_bool(&vref, value);
return push_value(minst, &vref);
}
| 120,696,417,550,786,750,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,072 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_push_integer(gs_main_instance * minst, long value)
{
ref vref;
make_int(&vref, value);
return push_value(minst, &vref);
}
| 47,065,399,740,519,440,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,073 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_push_string(gs_main_instance * minst, byte * chars, uint length,
bool read_only)
{
ref vref;
make_string(&vref, avm_foreign | (read_only ? a_readonly : a_all),
length, (byte *) chars);
return push_value(minst, &vref);
}
| 120,605,738,359,642,460,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,074 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | gs_to_exit(const gs_memory_t *mem, int exit_status)
{
return gs_to_exit_with_code(mem, exit_status, 0);
}
| 244,713,961,261,436,300,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,075 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | print_resource_usage(const gs_main_instance * minst, gs_dual_memory_t * dmem,
const char *msg)
{
ulong used = 0; /* this we accumulate for the PS memories */
long utime[2];
int i;
gs_memory_status_t status;
gp_get_realtime(utime);
for (i = 0; i < countof(dmem->spaces_inde... | 333,873,625,482,511,640,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
13,076 | ghostscript | 241d91112771a6104de10b3948c3f350d6690c1d | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d | None | 0 | push_value(gs_main_instance *minst, ref * pvalue)
{
i_ctx_t *i_ctx_p = minst->i_ctx_p;
int code = ref_stack_push(&o_stack, 1);
if (code < 0)
return code;
*ref_stack_index(&o_stack, 0L) = *pvalue;
return 0;
}
| 20,838,362,543,447,195,000,000,000,000,000,000,000 | imain.c | 190,063,148,089,697,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16541 | In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter. | https://nvd.nist.gov/vuln/detail/CVE-2018-16541 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.