commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
Tweak pointer math to avoid possible integer overflow | d944a10808891d202bb1d5e1998de6e0423af678 | gamenetworkingsockets | cvefixes | 1 | https://github.com/valvesoftware/gamenetworkingsockets | https://github.com/valvesoftware/gamenetworkingsockets/commit/d944a10808891d202bb1d5e1998de6e0423af678 | 2020-09-03 11:24:25-07:00 |
Check if output buffer is too small.
It really seems like libsodium (whose entire purpose is to make crypto
idiot-proof) making me mess with these details is a flaw in the API design.
Also, correct Hungarian. | bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | gamenetworkingsockets | cvefixes | 1 | https://github.com/valvesoftware/gamenetworkingsockets | https://github.com/valvesoftware/gamenetworkingsockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | 2020-09-03 15:05:55-07:00 |
correctly check return value of X509_check_host
CVE-2020-7041 incorrect use of X509_check_host (regarding return value)
is fixed with this commit.
The flaw came in with #242 and prevented proper host name verification
when openssl >= 1.0.2 was in use since openfortivpn 1.7.0. | 60660e00b80bad0fadcf39aee86f6f8756c94f91 | openfortivpn | cvefixes | 1 | https://github.com/adrienverge/openfortivpn | https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91 | 2020-02-26 16:49:56+01:00 |
supply proper input buffer to X509_check_host
CVE-2020-7042 use of uninitialized memory in X509_check_host is fixed with
this commit
the uninitialized buffer common_name was passed as argument to X509_check_host
which prevented proper host name validation when openssl >= 1.0.2 was in use.
This came in with #282 which went into openfortivpn 1.7.1.
Unfortunately, this problem has stayed unnoticed because the return value
was not properly checked either (which is a separate issue, with CVE-2020-7041,
and which has been fixed by the previous commit) | 9eee997d599a89492281fc7ffdd79d88cd61afc3 | openfortivpn | cvefixes | 1 | https://github.com/adrienverge/openfortivpn | https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3 | 2020-02-26 16:49:56+01:00 |
fix TLS Certificate CommonName NULL Byte Vulnerability
CVE-2020-7043 TLS Certificate CommonName NULL Byte Vulnerability is fixed
with this commit
with #8 hostname validation for the certificate was introduced
but unfortunately strncasecmp() was used to compare the byte array
against the expected hostname. This does not correctly treat a CN
which contains a NULL byte. In order to fix this vulnerability
the reference implementation from iSECPartners has been included
into the code. | 6328a070ddaab16faaf008cb9a8a62439c30f2a8 | openfortivpn | cvefixes | 1 | https://github.com/adrienverge/openfortivpn | https://github.com/adrienverge/openfortivpn/commit/6328a070ddaab16faaf008cb9a8a62439c30f2a8 | 2020-02-26 16:49:56+01:00 |
Remote addr (#99)
* REMOTE_ADDR added
* Ready for merge | 23d03535cf7b50d679a60a953a0cae9519a4a130 | agoo | cvefixes | 1 | https://github.com/ohler55/agoo | https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130 | 2020-11-07 19:07:47-05:00 |
Check for output_len range in ecall_restore
This may cause vulnerablity if pointing to trusted memory.
This issue was reported by Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and
Kang Li from Baidu Security.
PiperOrigin-RevId: 322476223
Change-Id: I8a6406e9f07a20582d4387bd9a3469dfa9cbcb12 | e582f36ac49ee11a21d23ad6a30c333092e0a94e | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e | 2020-07-21 17:22:14-07:00 |
Fix vulnerability in enc_untrusted_recvfrom
Change recvfrom memcpy to check for received_buffer size to avoid
copying extra buffer.
This issue was reported by Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and
Kang Li from Baidu Security.
PiperOrigin-RevId: 322476299
Change-Id: I3606ff9ec51ec7cc4312c7555c645a2fc6e09b21 | 299f804acbb95a612ab7c504d25ab908aa59ae93 | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/299f804acbb95a612ab7c504d25ab908aa59ae93 | 2020-07-21 17:22:45-07:00 |
Check untrusted queue is in outside enclave
PiperOrigin-RevId: 333370935
Change-Id: Ic3f15d5db1302d95c7cb199b44172474fecb81ca | a37fb6a0e7daf30134dbbf357c9a518a1026aa02 | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/a37fb6a0e7daf30134dbbf357c9a518a1026aa02 | 2020-09-23 14:16:30-07:00 |
Check for result of recvfrom
PiperOrigin-RevId: 333399155
Change-Id: I3d79e1e3f45f75d4c4360d42499e511d84b9aff7 | 6e158d558abd3c29a0208e30c97c9a8c5bd4230f | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/6e158d558abd3c29a0208e30c97c9a8c5bd4230f | 2020-09-23 16:39:58-07:00 |
Check return result in recvmsg
PiperOrigin-RevId: 333411798
Change-Id: I61986b5a1bffd79c0e1950013aa9de09cf4a5d61 | fa6485c5d16a7355eab047d4a44345a73bc9131e | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e | 2020-09-23 17:57:04-07:00 |
Check return pointer is outside enclave in realloc
PiperOrigin-RevId: 333769459
Change-Id: If53b5f4317080b8abaf5c4f80ce751f150630bcb | ed0926bff0e423cd122a18b3d2fc772817f66825 | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/ed0926bff0e423cd122a18b3d2fc772817f66825 | 2020-09-25 11:11:32-07:00 |
Verify UntrustedCall output is outside enclave
PiperOrigin-RevId: 333781703
Change-Id: I9df55c04dc8b04f4bf0bda8e68cc32bca81b933a | 83036fd841d33baa7e039f842d131aa7881fdcc2 | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2 | 2020-09-25 12:10:12-07:00 |
Check input length in FromLinuxSockAddr
PiperOrigin-RevId: 333785506
Change-Id: I1d68fb8954665eebc1018d80ff995cbe9e7ed6a9 | bda9772e7872b0d2b9bee32930cf7a4983837b39 | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/bda9772e7872b0d2b9bee32930cf7a4983837b39 | 2020-09-25 12:27:44-07:00 |
Check for result size in dst in inet_ntop
PiperOrigin-RevId: 333814318
Change-Id: Id7766ed598809f5df42d457f224d6f3dea06c224 | 6ff3b77ffe110a33a2f93848a6333f33616f02c4 | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4 | 2020-09-25 14:53:05-07:00 |
Check sockaddr size in inet_pton
PiperOrigin-RevId: 333821843
Change-Id: Ie0b694f1edd3f7a4a3de6df964d68566961accf6 | 8fed5e334131abaf9c5e17307642fbf6ce4a57ec | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec | 2020-09-25 15:34:34-07:00 |
Check for return size in enc_untrusted_read
Check return size does not exceed requested. The returned result and
content still cannot be trusted, but it's expected behavior when not
using a secure file system.
PiperOrigin-RevId: 333827386
Change-Id: I0bdec0aec9356ea333dc8c647eba5d2772875f29 | b1d120a2c7d7446d2cc58d517e20a1b184b82200 | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200 | 2020-09-25 16:09:54-07:00 |
Check output of ecall_restore is outside enclave
PiperOrigin-RevId: 334265380
Change-Id: Ifbaead6bce56f01b2a4d69f53ca508d0138f6f61 | 382da2b8b09cbf928668a2445efb778f76bd9c8a | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a | 2020-09-28 16:49:54-07:00 |
Fix vulnerability in UntrustedCacheMalloc
The pointer array is stored in untrusted memory, so we cannot trust the
value even after validation. We should validate the pointer is pointing
to untrusted memory after it's stored inside the enclave.
PiperOrigin-RevId: 358474391
Change-Id: I63cf6c251bdaf1b491dbf06cc0dcf77f7b141756 | a47ef55db2337d29de19c50cd29b0deb2871d31c | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c | 2021-02-19 13:42:29-08:00 |
Store untrusted input to enclave variable
The untrusted input pointer should be stored to trusted variable before
checking to avoid unexpected modifications after checking.
PiperOrigin-RevId: 362553830
Change-Id: I743f9bd3487de60269e247d74f2188f2ffc06d01 | ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad | 2021-03-12 10:43:12-08:00 |
Store untrusted output pointer in enclave
Validate the pointer after it's stored in enclave to avoid unexpected
modifications after it's validated.
PiperOrigin-RevId: 365648810
Change-Id: I3079128040c142e86bab8255b07d03562a6fcb61 | 53ed5d8fd8118ced1466e509606dd2f473707a5c | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c | 2021-03-29 13:17:26-07:00 |
Add sysno check in MessageReader
The sysno in MessageReader is interpreted from the Message header passed
from the host. A malicious Message header may provide a modified sysno
to bypass the validation, and overwrites enclave memory. This change
adds a check for sysno to make sure it matches the expected value.
This issue was reported by Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and
Kang Li from Baidu Security.
PiperOrigin-RevId: 377328054
Change-Id: I3ff6f60694d3390f66da89d139cf7cc7b49abaea | 90d7619e9dd99bcdb6cd28c7649d741d254d9a1a | asylo | cvefixes | 1 | https://github.com/google/asylo | https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a | 2021-06-03 11:02:29-07:00 |
[dhcps] update dhcps | 4b73f58f32914d0081d79a79e53a3215c8c1ea56 | amb1_sdk | cvefixes | 1 | https://github.com/ambiot/amb1_sdk | https://github.com/ambiot/amb1_sdk/commit/4b73f58f32914d0081d79a79e53a3215c8c1ea56 | 2022-03-11 14:41:08+08:00 |
fix security: GSL-2020-026 | a6dc186dd4b6b9e329a93cca3e7e3cfccfdf3cca | lua-openssl | cvefixes | 1 | https://github.com/zhaozg/lua-openssl | https://github.com/zhaozg/lua-openssl/commit/a6dc186dd4b6b9e329a93cca3e7e3cfccfdf3cca | 2020-02-27 21:53:32+08:00 |
stunnel-5.57 | ebad9ddc4efb2635f37174c9d800d06206f1edf9 | stunnel | cvefixes | 1 | https://github.com/mtrojnar/stunnel | https://github.com/mtrojnar/stunnel/commit/ebad9ddc4efb2635f37174c9d800d06206f1edf9 | 2020-10-11 20:02:12+02:00 |
Fix redis-cli / redis-sential overflow on some platforms (CVE-2021-32762) (#9587)
The redis-cli command line tool and redis-sentinel service may be vulnerable
to integer overflow when parsing specially crafted large multi-bulk network
replies. This is a result of a vulnerability in the underlying hiredis
library which does not perform an overflow check before calling the calloc()
heap allocation function.
This issue only impacts systems with heap allocators that do not perform their
own overflow checks. Most modern systems do and are therefore not likely to
be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator
which is also not vulnerable.
Co-authored-by: Yossi Gottlieb <[email protected]> | 0215324a66af949be39b34be2d55143232c1cb71 | redis | cvefixes | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/0215324a66af949be39b34be2d55143232c1cb71 | 2021-10-04 12:10:17+03:00 |
Fix memory leak in streamGetEdgeID (#10753)
si is initialized by streamIteratorStart(), we should call
streamIteratorStop() on it when done.
regression introduced in #9127 (redis 7.0) | 4a7a4e42db8ff757cdf3f4a824f66426036034ef | redis | cvefixes | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/4a7a4e42db8ff757cdf3f4a824f66426036034ef | 2022-05-22 12:15:26+03:00 |
Check basic auth result against != NGX_OK rather than == NGX_DECLINED
This corrects the error handling case when ngx_http_auth_spnego_basic is called with a bad configuration or bad username. These cases return NGX_ERROR, which allowed basic auth to proceed.
Thanks to Prakapovich Pavel aka Flyguy.by for pointing this out. | a06f9efca373e25328b1c53639a48decd0854570 | spnego-http-auth-nginx-module | cvefixes | 1 | https://github.com/stnoonan/spnego-http-auth-nginx-module | https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570 | 2021-02-26 10:31:41+00:00 |
Merge pull request from GHSA-5p3g-j69g-w2mq
* Implement unimplemented methods
* Check the dialog response
* Support cancellation
* Add some clarifying comments
* Couple more comments | 86500e645a907538abafe5225b67cc12c03e7645 | switchboard-plug-bluetooth | cvefixes | 1 | https://github.com/elementary/switchboard-plug-bluetooth | https://github.com/elementary/switchboard-plug-bluetooth/commit/86500e645a907538abafe5225b67cc12c03e7645 | 2021-03-09 10:24:07-07:00 |
Disallow NativeModule creation unless main isolate | 27151bfecc260e96714443613880e3b2e6596704 | isolated-vm | cvefixes | 1 | https://github.com/laverdet/isolated-vm | https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704 | 2021-03-18 15:20:24-05:00 |
Don't invoke accessors or proxies via Reference functions | 2646e6c1558bac66285daeab54c7d490ed332b15 | isolated-vm | cvefixes | 1 | https://github.com/laverdet/isolated-vm | https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15 | 2021-03-20 14:40:07-05:00 |
Fix a crash bug with malformed URIs (Issue #418) | 19c582fb32eac74b57e155cffbb529377a9e751a | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/19c582fb32eac74b57e155cffbb529377a9e751a | 2021-01-26 08:02:32-05:00 |
Fix a crash bug with bogus table attributes (Issue #417) | 0ddab26a542c74770317b622e985c52430092ba5 | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/0ddab26a542c74770317b622e985c52430092ba5 | 2021-04-01 08:14:29-04:00 |
Fix crash bugs with bogus table attributes (Issue #416) | ba61a3ece382389ae4482c7027af8b32e8ab4cc8 | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/ba61a3ece382389ae4482c7027af8b32e8ab4cc8 | 2021-04-01 08:21:57-04:00 |
Fix JPEG error handling (Issue #415) | 369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc | 2021-04-01 09:37:58-04:00 |
Fix a number-up crash bug (Issue #413) | 6e8a95561988500b5b5ae4861b3b0cbf4fba517f | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/6e8a95561988500b5b5ae4861b3b0cbf4fba517f | 2021-04-01 09:47:56-04:00 |
Fix a crash bug with empty titles (Issue #425) | a0014be47d614220db111b360fb6170ef6f3937e | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/a0014be47d614220db111b360fb6170ef6f3937e | 2021-05-07 06:37:23-04:00 |
Fix a crash bug with bogus text (Issue #426) | ee778252faebb721afba5a081dd6ad7eaf20eef3 | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/ee778252faebb721afba5a081dd6ad7eaf20eef3 | 2021-05-07 06:42:42-04:00 |
Fix BMP crash bug (Issue #444) | f12b9666e582a8e7b70f11b28e5ffc49ad625d43 | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/f12b9666e582a8e7b70f11b28e5ffc49ad625d43 | 2021-09-11 18:12:33-04:00 |
Fix potential BMP stack overflow (Issue #453) | 27d08989a5a567155d506ac870ae7d8cc88fa58b | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b | 2021-11-05 09:35:10-04:00 |
Block GIF images with a code size > 12 (Issue #463) | 312f0f9c12f26fbe015cd0e6cefa40e4b99017d9 | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9 | 2022-01-07 18:21:53-05:00 |
Fix a potential integer overflow bug in the JPEG and PNG loaders (Issue #471)
All images are now limited to 4GiB of memory usage (37837x37837 pixels). | 31f780487e5ddc426888638786cdc47631687275 | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275 | 2022-03-10 15:29:36-05:00 |
Call check_pages when writing links (Issue #480) | 46c8ec2b9bccb8ccabff52d998c5eee77a228348 | htmldoc | cvefixes | 1 | https://github.com/michaelrsweet/htmldoc | https://github.com/michaelrsweet/htmldoc/commit/46c8ec2b9bccb8ccabff52d998c5eee77a228348 | 2022-03-24 16:30:07-04:00 |
Fix IPv6 routing loops | 24afe944a6ffff53d84a748384e276a4e95912ec | gargoyle | cvefixes | 1 | https://github.com/ericpaulbishop/gargoyle | https://github.com/ericpaulbishop/gargoyle/commit/24afe944a6ffff53d84a748384e276a4e95912ec | 2021-01-20 18:05:51+11:00 |
ZipFile: Add path checks to uncompressEntry() | 2e874e80cba0152201aff6a4d0dc407997d10a7f | juce | cvefixes | 1 | https://github.com/juce-framework/juce | https://github.com/juce-framework/juce/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f | 2022-01-12 13:16:57+01:00 |
Adds new American flag module | 074a0f8ed0c31c35d13d28632bd8a049ff136fb6 | colors.js | cvefixes | 1 | https://github.com/marak/colors.js | https://github.com/marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6 | 2022-01-07 23:19:03-05:00 |
added allowed customized types | b0e63be5f0bb20dfce507cb8a1a9568f6e73de57 | ajax.net-professional | cvefixes | 1 | https://github.com/michaelschwarz/ajax.net-professional | https://github.com/michaelschwarz/ajax.net-professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57 | 2021-10-27 21:17:11+02:00 |
Close connection if we derive an extra 1-rtt write cipher
Summary: Fixes CVE-2021-24029
Reviewed By: mjoras, lnicco
Differential Revision: D26613890
fbshipit-source-id: 19bb2be2c731808144e1a074ece313fba11f1945 | a67083ff4b8dcbb7ee2839da6338032030d712b0 | mvfst | cvefixes | 1 | https://github.com/facebookincubator/mvfst | https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0 | 2021-03-03 07:26:26-08:00 |
Revive startup parameter `--server.session-timeout` (#14118)
Co-authored-by: Tobias Gödderz <[email protected]> | e9c6ee9dcca7b9b4fbcd02a0b323d205bee838d3 | arangodb | cvefixes | 1 | https://github.com/arangodb/arangodb | https://github.com/arangodb/arangodb/commit/e9c6ee9dcca7b9b4fbcd02a0b323d205bee838d3 | 2021-07-01 11:36:14+02:00 |
[APM-78] Disable installation from remote URL (#15292) | d9b7f019d2435f107b19a59190bf9cc27d5f34dd | arangodb | cvefixes | 1 | https://github.com/arangodb/arangodb | https://github.com/arangodb/arangodb/commit/d9b7f019d2435f107b19a59190bf9cc27d5f34dd | 2021-12-14 11:24:01+01:00 |
Fixes #94 | 14e75f95e5f56fbe7ee897bdf5d858788072e818 | opencrx | cvefixes | 1 | https://github.com/opencrx/opencrx | https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818 | 2021-07-27 21:40:57+02:00 |
Version 2.0.2 | de5336016edbe1e90327d0ed1cba5c4e49114366 | cyclonetcp | cvefixes | 1 | https://github.com/oryx-embedded/cyclonetcp | https://github.com/oryx-embedded/cyclonetcp/commit/de5336016edbe1e90327d0ed1cba5c4e49114366 | 2021-01-08 10:16:26+01:00 |
Fixes #264.
The JP2 decoder was allowing the decoding of a code stream to be
attempted when the stream has inconsistent values for the number of
components and/or the component types. For such invalid streams,
only a warning would be issued and decoding would proceed. This is
dangerous, however, as it can lead to many unexpected paths through
the code, which in some cases have been demonstrated to result in
security vulnerabilities. This code change makes decoding of these
types invalid code streams a hard error. | 41f214b121b837fa30d9ca5f2430212110f5cd9b | jasper | cvefixes | 1 | https://github.com/jasper-software/jasper | https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b | 2021-02-07 12:31:55-08:00 |
snapshot of project "xterm", label xterm-365d | 82ba55b8f994ab30ff561a347b82ea340ba7075c | xterm-snapshots | cvefixes | 1 | https://github.com/thomasdickey/xterm-snapshots | https://github.com/thomasdickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c | 2021-02-10 20:05:07+00:00 |
added empty strign check, which would lead to NULL ptr deref/crash in exif XML display. fixes https://github.com/libexif/exif/issues/4 | f6334d9d32437ef13dc902f0a88a2be0063d9d1c | exif | cvefixes | 1 | https://github.com/libexif/exif | https://github.com/libexif/exif/commit/f6334d9d32437ef13dc902f0a88a2be0063d9d1c | 2021-02-25 08:31:53+01:00 |
actually return empty stringand not 'em,pty string' as expected | eb84b0e3c5f2a86013b6fcfb800d187896a648fa | exif | cvefixes | 1 | https://github.com/libexif/exif | https://github.com/libexif/exif/commit/eb84b0e3c5f2a86013b6fcfb800d187896a648fa | 2021-02-25 09:45:36+01:00 |
tame some window operations, just in case | bd52109993440b6996760aaccb66e68e782762b9 | mintty | cvefixes | 1 | https://github.com/mintty/mintty | https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9 | 2021-02-13 11:48:37+01:00 |
pict: Fixed a bug with ICC profile extraction
Could cause a NULL pointer dereference.
Found by F. Çelik. | 287f5ac31dfdc074669182f51ece637706070eeb | deark | cvefixes | 1 | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/287f5ac31dfdc074669182f51ece637706070eeb | 2021-03-12 15:13:19-05:00 |
pict,macrsrc: Fixed a bug that could cause division by 0
Found by F. Çelik. | 62acb7753b0e3c0d3ab3c15057b0a65222313334 | deark | cvefixes | 1 | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334 | 2021-03-14 10:09:11-04:00 |
md_analyze_line: Avoid reading 1 byte beyond the input size.
Fixes #155. | 4fc808d8fe8d8904f8525bb4231d854f45e23a19 | md4c | cvefixes | 1 | https://github.com/mity/md4c | https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19 | 2021-03-29 12:51:48+02:00 |
util: Check for NULL string in writefile
This check was there previously, but was removed in f549b757 with
the addition of a check during parse that every rule has rspfile
if and only if it has rspfile_content. However, this fails to
consider the possibility of those variables coming from the edge
or global environment. So, re-add the check.
Fixes #67. | e84b6d99c85043fa1ba54851ee500540ec206918 | samurai | cvefixes | 1 | https://github.com/michaelforney/samurai | https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918 | 2021-04-02 17:28:21-07:00 |
parse: Check for non-empty command/rspfile/rspfile_content
This matches ninja behavior and prevents the possibility of a rule
with an empty (NULL) command string.
Fixes #68. | d2af3bc375e2a77139c3a28d6128c60cd8d08655 | samurai | cvefixes | 1 | https://github.com/michaelforney/samurai | https://github.com/michaelforney/samurai/commit/d2af3bc375e2a77139c3a28d6128c60cd8d08655 | 2021-04-04 03:55:41-07:00 |
fix sqlcipher_export handling of NULL parameters | cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | sqlcipher | cvefixes | 1 | https://github.com/sqlcipher/sqlcipher | https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f | 2021-01-13 17:24:33-05:00 |
Improve heap2 bounds checking (#224)
* Improve heap bounds checking in pvPortMalloc | c7a9a01c94987082b223d3e59969ede64363da63 | freertos-kernel | cvefixes | 1 | https://github.com/freertos/freertos-kernel | https://github.com/freertos/freertos-kernel/commit/c7a9a01c94987082b223d3e59969ede64363da63 | 2020-12-07 10:36:27-08:00 |
Add addition overflow check for stream buffer (#226) | d05b9c123f2bf9090bce386a244fc934ae44db5b | freertos-kernel | cvefixes | 1 | https://github.com/freertos/freertos-kernel | https://github.com/freertos/freertos-kernel/commit/d05b9c123f2bf9090bce386a244fc934ae44db5b | 2020-12-07 11:07:31-08:00 |
add assert for addition overflow on queue creation (#225) | 47338393f1f79558f6144213409f09f81d7c4837 | freertos-kernel | cvefixes | 1 | https://github.com/freertos/freertos-kernel | https://github.com/freertos/freertos-kernel/commit/47338393f1f79558f6144213409f09f81d7c4837 | 2020-12-07 11:48:51-08:00 |
fix: array overflow when wrong duration in voice overlay
Issue #83, | 2f56e1179cab6affeb8afa9d6c324008fe40d8e3 | abcm2ps | cvefixes | 1 | https://github.com/leesavide/abcm2ps | https://github.com/leesavide/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3 | 2021-04-27 11:52:27+02:00 |
fix: crash when accidental without a note at start of line after K:
Issue #84. | 3169ace6d63f6f517a64e8df0298f44a490c4a15 | abcm2ps | cvefixes | 1 | https://github.com/leesavide/abcm2ps | https://github.com/leesavide/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15 | 2021-04-27 16:39:19+02:00 |
Fix for integer/buffer overflow CVE-2021-32765
This fix prevents hiredis from trying to allocate more than `SIZE_MAX`
bytes, which would result in a buffer overrun.
[Full Details](https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2) | 76a7b10005c70babee357a7d0f2becf28ec7ed1e | hiredis | cvefixes | 1 | https://github.com/redis/hiredis | https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e | 2021-10-04 11:56:31-07:00 |
add useful checks | efddaef0151af3be16078cc4d88c6bae0f911e56 | openoffice | cvefixes | 1 | https://github.com/apache/openoffice | https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56 | 2021-06-26 09:46:32+02:00 |
Always create a full 256-entry map in case color values are out of range
Fixes https://github.com/libsdl-org/SDL/issues/5042 | 8c91cf7dba5193f5ce12d06db1336515851c9ee9 | sdl | cvefixes | 1 | https://github.com/libsdl-org/sdl | https://github.com/libsdl-org/sdl/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9 | 2021-11-30 12:37:39-08:00 |
SKALE-3205-restart | 77425c862ad20cd270d42c54f3d63e1eb4e02195 | sgxwallet | cvefixes | 1 | https://github.com/skalenetwork/sgxwallet | https://github.com/skalenetwork/sgxwallet/commit/77425c862ad20cd270d42c54f3d63e1eb4e02195 | 2020-09-08 15:30:59+03:00 |
secvar: fix endian conversion
unpack_timestamp() calls le32_to_cpu() for endian conversion of
uint16_t "year" value. This patch fixes the code to use le16_to_cpu().
Signed-off-by: Nayna Jain <[email protected]>
Reviewed-by: Daniel Axtens <[email protected]>
Signed-off-by: Vasant Hegde <[email protected]> | 5be38b672c1410e2f10acd3ad2eecfdc81d5daf7 | skiboot | cvefixes | 1 | https://github.com/open-power/skiboot | https://github.com/open-power/skiboot/commit/5be38b672c1410e2f10acd3ad2eecfdc81d5daf7 | 2021-06-24 14:47:48+05:18 |
Prevent redirect to URLs that begin with '///'
Visiting a logout URL like this:
https://rp.example.co.jp/mellon/logout?ReturnTo=///fishing-site.example.com/logout.html
would have redirected the user to fishing-site.example.com
With the patch, this URL would be rejected.
Fixes: CVE-2021-3639 | 42a11261b9dad2e48d70bdff7c53dd57a12db6f5 | mod_auth_mellon | cvefixes | 1 | https://github.com/latchset/mod_auth_mellon | https://github.com/latchset/mod_auth_mellon/commit/42a11261b9dad2e48d70bdff7c53dd57a12db6f5 | 2021-07-29 13:35:44+02:00 |
Fix handling of APNG with 0 delay_den (#313) | 7dfa400ded53919d986c5d3d23446a09e0cf481b | libjxl | cvefixes | 1 | https://github.com/libjxl/libjxl | https://github.com/libjxl/libjxl/commit/7dfa400ded53919d986c5d3d23446a09e0cf481b | 2021-07-15 12:34:08+02:00 |
version 3.12 to address CVE-2021-36770 | 527e482dc70b035d0df4f8c77a00d81f8d775c74 | p5-encode | cvefixes | 1 | https://github.com/dankogai/p5-encode | https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74 | 2021-08-09 23:19:25+09:00 |
Add arm ite blocks samples from #853 (#1381) | bf1713d9e011b55ca1f502a6779fc4722b4bb077 | unicorn | cvefixes | 1 | https://github.com/unicorn-engine/unicorn | https://github.com/unicorn-engine/unicorn/commit/bf1713d9e011b55ca1f502a6779fc4722b4bb077 | 2021-03-30 12:06:26+08:00 |
Fix wrong offset used in split_region | c733bbada356b0373fa8aa72c044574bb855fd24 | unicorn | cvefixes | 1 | https://github.com/unicorn-engine/unicorn | https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24 | 2021-11-23 23:22:53+01:00 |
Generate bindings | 5a79d7879ca3ee0ce684ad6576d8ac15e8d90fc7 | unicorn | cvefixes | 1 | https://github.com/unicorn-engine/unicorn | https://github.com/unicorn-engine/unicorn/commit/5a79d7879ca3ee0ce684ad6576d8ac15e8d90fc7 | 2022-04-16 17:50:32+02:00 |
Fix crash when mapping a big memory and calling uc_close | 3d3deac5e6d38602b689c4fef5dac004f07a2e63 | unicorn | cvefixes | 1 | https://github.com/unicorn-engine/unicorn | https://github.com/unicorn-engine/unicorn/commit/3d3deac5e6d38602b689c4fef5dac004f07a2e63 | 2022-04-16 19:17:41+02:00 |
Avoid stack overflow
refs: https://github.com/wez/atomicparsley/issues/32 | d72ccf06c98259d7261e0f3ac4fd8717778782c1 | atomicparsley | cvefixes | 1 | https://github.com/wez/atomicparsley | https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1 | 2021-07-12 23:10:28-07:00 |
Fix issue with corrupt files with tagvalues_count = 0 that caused null pointer dereference | ce0ab6586069791b1e8e2a42f44318e581c39939 | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/ce0ab6586069791b1e8e2a42f44318e581c39939 | 2022-04-23 17:12:04+02:00 |
Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input | fb1ab50e448ddbed746fd27ae07469bc506d838b | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/fb1ab50e448ddbed746fd27ae07469bc506d838b | 2022-04-26 15:07:48+02:00 |
Fix wrong boundary checks in inflections parser resulting in stack buffer over-read with corrupt input | eafc415bc6067e72577f70d6dd5acbf057ce6e6f | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/eafc415bc6067e72577f70d6dd5acbf057ce6e6f | 2022-04-27 12:33:05+02:00 |
Fix undefined behavior when passing null to strdup | c0699c8693c47f14a2e57dec7292e862ac7adf9c | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/c0699c8693c47f14a2e57dec7292e862ac7adf9c | 2022-04-27 12:35:39+02:00 |
Fix boundary checking error in markup search, that could cause buffer over-read with corrupt input | 1e0378e6f9e4ae415cedc9eb10850888897c5dba | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/1e0378e6f9e4ae415cedc9eb10850888897c5dba | 2022-05-03 09:54:25+02:00 |
Fix: index entry label not being zero-terminated with corrupt input | 612562bc1ea38f1708b044e7a079c47a05b1291d | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/612562bc1ea38f1708b044e7a079c47a05b1291d | 2022-05-05 20:54:11+02:00 |
fix oob write bug inside libmobi | ab5bf0e37e540eac682a14e628853b918626e72b | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/ab5bf0e37e540eac682a14e628853b918626e72b | 2021-09-09 14:21:58+08:00 |
Fix potential out-of-buffer read while parsing corrupt file, closes #35, #36 | bec783e6212439a335ba6e8df7ab8ed610ca9a21 | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/bec783e6212439a335ba6e8df7ab8ed610ca9a21 | 2021-09-18 22:14:58+02:00 |
Fix potential out-of-buffer read while parsing corrupt file, closes #38 | c78e186739b50d156cb3da5d08d70294f0490853 | libmobi | cvefixes | 1 | https://github.com/bfabiszewski/libmobi | https://github.com/bfabiszewski/libmobi/commit/c78e186739b50d156cb3da5d08d70294f0490853 | 2021-09-18 22:15:54+02:00 |
crypto: digest: use crypto_memneq()
When verifying a digest it is important not to leak timing information
through memcmp(). Use crypto_memneq() instead.
Signed-off-by: Sascha Hauer <[email protected]> | 0a9f9a7410681e55362f8311537ebc7be9ad0fbe | barebox | cvefixes | 1 | https://github.com/saschahauer/barebox | https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe | 2021-07-30 19:50:36+02:00 |
password: Use crypto_memneq() to compare hashes
Cryptographic verifications should be time-constant so that an attacker
cannot get information about the secrets used by observing the system,
so use crypto_memneq() rather than memcmp() to compare password hashes.
Signed-off-by: Sascha Hauer <[email protected]> | a3337563c705bc8e0cf32f910b3e9e3c43d962ff | barebox | cvefixes | 1 | https://github.com/saschahauer/barebox | https://github.com/saschahauer/barebox/commit/a3337563c705bc8e0cf32f910b3e9e3c43d962ff | 2021-07-30 19:50:36+02:00 |
SOFT: Check the EC Key on C_CreateObject and C_DeriveKey
When constructing an OpenSSL EC public or private key from PKCS#11
attributes or ECDH public data, check that the key is valid, i.e. that
the point is on the curve.
This prevents one from creating an EC key object via C_CreateObject with
invalid key data. It also prevents C_DeriveKey to derive a secret using
ECDH with an EC public key (public data) that uses a different curve
or is invalid by other means.
Signed-off-by: Ingo Franzki <[email protected]> | 4e3b43c3d8844402c04a66b55c6c940f965109f0 | opencryptoki | cvefixes | 1 | https://github.com/opencryptoki/opencryptoki | https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0 | 2021-05-11 20:05:36+02:00 |
[misc] Fix use-after-free in net_bind()
Thanks to Ba Jinsheng for reporting this bug | 246d8ae0cef27377e5dfe9ee3ad87e864d6b6266 | owntone-server | cvefixes | 1 | https://github.com/owntone/owntone-server | https://github.com/owntone/owntone-server/commit/246d8ae0cef27377e5dfe9ee3ad87e864d6b6266 | 2021-07-31 00:55:48+02:00 |
vhost: fix queue number check when setting inflight FD
In function vhost_user_set_inflight_fd, queue number in inflight
message is used to access virtqueue. However, queue number could
be larger than VHOST_MAX_VRING and cause write OOB as this number
will be used to write inflight info in virtqueue structure. This
patch checks the queue number to avoid the issue and also make
sure virtqueues are allocated before setting inflight information.
Fixes: ad0a4ae491fe ("vhost: checkout resubmit inflight information")
Cc: [email protected]
Reported-by: Wenxiang Qian <[email protected]>
Signed-off-by: Chenbo Xia <[email protected]>
Reviewed-by: Maxime Coquelin <[email protected]> | 6442c329b9d2ded0f44b27d2016aaba8ba5844c5 | dpdk | cvefixes | 1 | https://github.com/dpdk/dpdk | https://github.com/dpdk/dpdk/commit/6442c329b9d2ded0f44b27d2016aaba8ba5844c5 | 2022-03-10 14:03:43+01:00 |
Improve fix for avoiding huge number of tiny dashes
Some pathological cases were not caught by the previous fix.
Fixes: QTBUG-95239
Pick-to: 6.2 6.1 5.15
Change-Id: I0337ee3923ff93ccb36c4d7b810a9c0667354cc5
Reviewed-by: Robert Löhning <[email protected]> | 6b400e3147dcfd8cc3a393ace1bd118c93762e0c | qtbase | cvefixes | 1 | https://github.com/qt/qtbase | https://github.com/qt/qtbase/commit/6b400e3147dcfd8cc3a393ace1bd118c93762e0c | 2021-07-27 17:44:30+02:00 |
Fix memory leak by properly closing `charsetDetector` | d44356927b92e3b13e178071bf6d7c671766f588 | detect-character-encoding | cvefixes | 1 | https://github.com/sonicdoe/detect-character-encoding | https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588 | 2017-03-10 12:24:00+01:00 |
Return null if no charset matches
Fixes a segmentation fault if no charset matches. According to http://icu-project.org/apiref/icu4c/ucsdet_8h.html#aff2633b5055d472cff4108d94f97cf7d, ucsdet_detect() may return NULL if no charset matches.
Fixes: #15
Co-authored-by: chenzhip <[email protected]> | 992a11007fff6cfd40b952150ab8d30410c4a20a | detect-character-encoding | cvefixes | 1 | https://github.com/sonicdoe/detect-character-encoding | https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a | 2018-11-06 19:10:49+01:00 |
libmount: remove support for deleted mount table entries
The "(deleted)" suffix has been originally used by kernel for deleted
mountpoints. Since kernel commit 9d4d65748a5ca26ea8650e50ba521295549bf4e3
(Dec 2014) kernel does not use this suffix for mount stuff in /proc at
all. Let's remove this support from libmount too.
Signed-off-by: Karel Zak <[email protected]> | 166e87368ae88bf31112a30e078cceae637f4cdb | util-linux | cvefixes | 1 | https://github.com/util-linux/util-linux | https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb | 2022-01-04 10:37:55+01:00 |
libmount: fix UID check for FUSE umount [CVE-2021-3995]
Improper UID check allows an unprivileged user to unmount FUSE
filesystems of users with similar UID.
Signed-off-by: Karel Zak <[email protected]> | 57202f5713afa2af20ffbb6ab5331481d0396f8d | util-linux | cvefixes | 1 | https://github.com/util-linux/util-linux | https://github.com/util-linux/util-linux/commit/57202f5713afa2af20ffbb6ab5331481d0396f8d | 2022-01-24 12:05:16+01:00 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.