bson is vulnerable to Integer Overflows. It incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
CPE | Name | Operator | Version |
---|---|---|---|
whoopsie:xenial | eq | 0.2.52 | |
whoopsie:xenial | eq | 0.2.52 |