commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Tweak pointer math to avoid possible integer overflow
d944a10808891d202bb1d5e1998de6e0423af678
gamenetworkingsockets
cvefixes
1
https://github.com/valvesoftware/gamenetworkingsockets
https://github.com/valvesoftware/gamenetworkingsockets/commit/d944a10808891d202bb1d5e1998de6e0423af678
2020-09-03 11:24:25-07:00
Check if output buffer is too small. It really seems like libsodium (whose entire purpose is to make crypto idiot-proof) making me mess with these details is a flaw in the API design. Also, correct Hungarian.
bea84e2844b647532a9b7fbc3a6a8989d66e49e3
gamenetworkingsockets
cvefixes
1
https://github.com/valvesoftware/gamenetworkingsockets
https://github.com/valvesoftware/gamenetworkingsockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3
2020-09-03 15:05:55-07:00
correctly check return value of X509_check_host CVE-2020-7041 incorrect use of X509_check_host (regarding return value) is fixed with this commit. The flaw came in with #242 and prevented proper host name verification when openssl >= 1.0.2 was in use since openfortivpn 1.7.0.
60660e00b80bad0fadcf39aee86f6f8756c94f91
openfortivpn
cvefixes
1
https://github.com/adrienverge/openfortivpn
https://github.com/adrienverge/openfortivpn/commit/60660e00b80bad0fadcf39aee86f6f8756c94f91
2020-02-26 16:49:56+01:00
supply proper input buffer to X509_check_host CVE-2020-7042 use of uninitialized memory in X509_check_host is fixed with this commit the uninitialized buffer common_name was passed as argument to X509_check_host which prevented proper host name validation when openssl >= 1.0.2 was in use. This came in with #282 which went into openfortivpn 1.7.1. Unfortunately, this problem has stayed unnoticed because the return value was not properly checked either (which is a separate issue, with CVE-2020-7041, and which has been fixed by the previous commit)
9eee997d599a89492281fc7ffdd79d88cd61afc3
openfortivpn
cvefixes
1
https://github.com/adrienverge/openfortivpn
https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3
2020-02-26 16:49:56+01:00
fix TLS Certificate CommonName NULL Byte Vulnerability CVE-2020-7043 TLS Certificate CommonName NULL Byte Vulnerability is fixed with this commit with #8 hostname validation for the certificate was introduced but unfortunately strncasecmp() was used to compare the byte array against the expected hostname. This does not correctly treat a CN which contains a NULL byte. In order to fix this vulnerability the reference implementation from iSECPartners has been included into the code.
6328a070ddaab16faaf008cb9a8a62439c30f2a8
openfortivpn
cvefixes
1
https://github.com/adrienverge/openfortivpn
https://github.com/adrienverge/openfortivpn/commit/6328a070ddaab16faaf008cb9a8a62439c30f2a8
2020-02-26 16:49:56+01:00
Remote addr (#99) * REMOTE_ADDR added * Ready for merge
23d03535cf7b50d679a60a953a0cae9519a4a130
agoo
cvefixes
1
https://github.com/ohler55/agoo
https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130
2020-11-07 19:07:47-05:00
Check for output_len range in ecall_restore This may cause vulnerablity if pointing to trusted memory. This issue was reported by Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and Kang Li from Baidu Security. PiperOrigin-RevId: 322476223 Change-Id: I8a6406e9f07a20582d4387bd9a3469dfa9cbcb12
e582f36ac49ee11a21d23ad6a30c333092e0a94e
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e
2020-07-21 17:22:14-07:00
Fix vulnerability in enc_untrusted_recvfrom Change recvfrom memcpy to check for received_buffer size to avoid copying extra buffer. This issue was reported by Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and Kang Li from Baidu Security. PiperOrigin-RevId: 322476299 Change-Id: I3606ff9ec51ec7cc4312c7555c645a2fc6e09b21
299f804acbb95a612ab7c504d25ab908aa59ae93
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/299f804acbb95a612ab7c504d25ab908aa59ae93
2020-07-21 17:22:45-07:00
Check untrusted queue is in outside enclave PiperOrigin-RevId: 333370935 Change-Id: Ic3f15d5db1302d95c7cb199b44172474fecb81ca
a37fb6a0e7daf30134dbbf357c9a518a1026aa02
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/a37fb6a0e7daf30134dbbf357c9a518a1026aa02
2020-09-23 14:16:30-07:00
Check for result of recvfrom PiperOrigin-RevId: 333399155 Change-Id: I3d79e1e3f45f75d4c4360d42499e511d84b9aff7
6e158d558abd3c29a0208e30c97c9a8c5bd4230f
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/6e158d558abd3c29a0208e30c97c9a8c5bd4230f
2020-09-23 16:39:58-07:00
Check return result in recvmsg PiperOrigin-RevId: 333411798 Change-Id: I61986b5a1bffd79c0e1950013aa9de09cf4a5d61
fa6485c5d16a7355eab047d4a44345a73bc9131e
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e
2020-09-23 17:57:04-07:00
Check return pointer is outside enclave in realloc PiperOrigin-RevId: 333769459 Change-Id: If53b5f4317080b8abaf5c4f80ce751f150630bcb
ed0926bff0e423cd122a18b3d2fc772817f66825
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/ed0926bff0e423cd122a18b3d2fc772817f66825
2020-09-25 11:11:32-07:00
Verify UntrustedCall output is outside enclave PiperOrigin-RevId: 333781703 Change-Id: I9df55c04dc8b04f4bf0bda8e68cc32bca81b933a
83036fd841d33baa7e039f842d131aa7881fdcc2
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/83036fd841d33baa7e039f842d131aa7881fdcc2
2020-09-25 12:10:12-07:00
Check input length in FromLinuxSockAddr PiperOrigin-RevId: 333785506 Change-Id: I1d68fb8954665eebc1018d80ff995cbe9e7ed6a9
bda9772e7872b0d2b9bee32930cf7a4983837b39
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/bda9772e7872b0d2b9bee32930cf7a4983837b39
2020-09-25 12:27:44-07:00
Check for result size in dst in inet_ntop PiperOrigin-RevId: 333814318 Change-Id: Id7766ed598809f5df42d457f224d6f3dea06c224
6ff3b77ffe110a33a2f93848a6333f33616f02c4
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4
2020-09-25 14:53:05-07:00
Check sockaddr size in inet_pton PiperOrigin-RevId: 333821843 Change-Id: Ie0b694f1edd3f7a4a3de6df964d68566961accf6
8fed5e334131abaf9c5e17307642fbf6ce4a57ec
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/8fed5e334131abaf9c5e17307642fbf6ce4a57ec
2020-09-25 15:34:34-07:00
Check for return size in enc_untrusted_read Check return size does not exceed requested. The returned result and content still cannot be trusted, but it's expected behavior when not using a secure file system. PiperOrigin-RevId: 333827386 Change-Id: I0bdec0aec9356ea333dc8c647eba5d2772875f29
b1d120a2c7d7446d2cc58d517e20a1b184b82200
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200
2020-09-25 16:09:54-07:00
Check output of ecall_restore is outside enclave PiperOrigin-RevId: 334265380 Change-Id: Ifbaead6bce56f01b2a4d69f53ca508d0138f6f61
382da2b8b09cbf928668a2445efb778f76bd9c8a
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a
2020-09-28 16:49:54-07:00
Fix vulnerability in UntrustedCacheMalloc The pointer array is stored in untrusted memory, so we cannot trust the value even after validation. We should validate the pointer is pointing to untrusted memory after it's stored inside the enclave. PiperOrigin-RevId: 358474391 Change-Id: I63cf6c251bdaf1b491dbf06cc0dcf77f7b141756
a47ef55db2337d29de19c50cd29b0deb2871d31c
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c
2021-02-19 13:42:29-08:00
Store untrusted input to enclave variable The untrusted input pointer should be stored to trusted variable before checking to avoid unexpected modifications after checking. PiperOrigin-RevId: 362553830 Change-Id: I743f9bd3487de60269e247d74f2188f2ffc06d01
ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/ecfcd0008b6f8f63c6fa3cc1b62fcd4a52f2c0ad
2021-03-12 10:43:12-08:00
Store untrusted output pointer in enclave Validate the pointer after it's stored in enclave to avoid unexpected modifications after it's validated. PiperOrigin-RevId: 365648810 Change-Id: I3079128040c142e86bab8255b07d03562a6fcb61
53ed5d8fd8118ced1466e509606dd2f473707a5c
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
2021-03-29 13:17:26-07:00
Add sysno check in MessageReader The sysno in MessageReader is interpreted from the Message header passed from the host. A malicious Message header may provide a modified sysno to bypass the validation, and overwrites enclave memory. This change adds a check for sysno to make sure it matches the expected value. This issue was reported by Qinkun Bao, Zhaofeng Chen, Mingshen Sun, and Kang Li from Baidu Security. PiperOrigin-RevId: 377328054 Change-Id: I3ff6f60694d3390f66da89d139cf7cc7b49abaea
90d7619e9dd99bcdb6cd28c7649d741d254d9a1a
asylo
cvefixes
1
https://github.com/google/asylo
https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a
2021-06-03 11:02:29-07:00
[dhcps] update dhcps
4b73f58f32914d0081d79a79e53a3215c8c1ea56
amb1_sdk
cvefixes
1
https://github.com/ambiot/amb1_sdk
https://github.com/ambiot/amb1_sdk/commit/4b73f58f32914d0081d79a79e53a3215c8c1ea56
2022-03-11 14:41:08+08:00
fix security: GSL-2020-026
a6dc186dd4b6b9e329a93cca3e7e3cfccfdf3cca
lua-openssl
cvefixes
1
https://github.com/zhaozg/lua-openssl
https://github.com/zhaozg/lua-openssl/commit/a6dc186dd4b6b9e329a93cca3e7e3cfccfdf3cca
2020-02-27 21:53:32+08:00
stunnel-5.57
ebad9ddc4efb2635f37174c9d800d06206f1edf9
stunnel
cvefixes
1
https://github.com/mtrojnar/stunnel
https://github.com/mtrojnar/stunnel/commit/ebad9ddc4efb2635f37174c9d800d06206f1edf9
2020-10-11 20:02:12+02:00
Fix redis-cli / redis-sential overflow on some platforms (CVE-2021-32762) (#9587) The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. Co-authored-by: Yossi Gottlieb <[email protected]>
0215324a66af949be39b34be2d55143232c1cb71
redis
cvefixes
1
https://github.com/redis/redis
https://github.com/redis/redis/commit/0215324a66af949be39b34be2d55143232c1cb71
2021-10-04 12:10:17+03:00
Fix memory leak in streamGetEdgeID (#10753) si is initialized by streamIteratorStart(), we should call streamIteratorStop() on it when done. regression introduced in #9127 (redis 7.0)
4a7a4e42db8ff757cdf3f4a824f66426036034ef
redis
cvefixes
1
https://github.com/redis/redis
https://github.com/redis/redis/commit/4a7a4e42db8ff757cdf3f4a824f66426036034ef
2022-05-22 12:15:26+03:00
Check basic auth result against != NGX_OK rather than == NGX_DECLINED This corrects the error handling case when ngx_http_auth_spnego_basic is called with a bad configuration or bad username. These cases return NGX_ERROR, which allowed basic auth to proceed. Thanks to Prakapovich Pavel aka Flyguy.by for pointing this out.
a06f9efca373e25328b1c53639a48decd0854570
spnego-http-auth-nginx-module
cvefixes
1
https://github.com/stnoonan/spnego-http-auth-nginx-module
https://github.com/stnoonan/spnego-http-auth-nginx-module/commit/a06f9efca373e25328b1c53639a48decd0854570
2021-02-26 10:31:41+00:00
Merge pull request from GHSA-5p3g-j69g-w2mq * Implement unimplemented methods * Check the dialog response * Support cancellation * Add some clarifying comments * Couple more comments
86500e645a907538abafe5225b67cc12c03e7645
switchboard-plug-bluetooth
cvefixes
1
https://github.com/elementary/switchboard-plug-bluetooth
https://github.com/elementary/switchboard-plug-bluetooth/commit/86500e645a907538abafe5225b67cc12c03e7645
2021-03-09 10:24:07-07:00
Disallow NativeModule creation unless main isolate
27151bfecc260e96714443613880e3b2e6596704
isolated-vm
cvefixes
1
https://github.com/laverdet/isolated-vm
https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704
2021-03-18 15:20:24-05:00
Don't invoke accessors or proxies via Reference functions
2646e6c1558bac66285daeab54c7d490ed332b15
isolated-vm
cvefixes
1
https://github.com/laverdet/isolated-vm
https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15
2021-03-20 14:40:07-05:00
Fix a crash bug with malformed URIs (Issue #418)
19c582fb32eac74b57e155cffbb529377a9e751a
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/19c582fb32eac74b57e155cffbb529377a9e751a
2021-01-26 08:02:32-05:00
Fix a crash bug with bogus table attributes (Issue #417)
0ddab26a542c74770317b622e985c52430092ba5
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/0ddab26a542c74770317b622e985c52430092ba5
2021-04-01 08:14:29-04:00
Fix crash bugs with bogus table attributes (Issue #416)
ba61a3ece382389ae4482c7027af8b32e8ab4cc8
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/ba61a3ece382389ae4482c7027af8b32e8ab4cc8
2021-04-01 08:21:57-04:00
Fix JPEG error handling (Issue #415)
369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/369b2ea1fd0d0537ba707f20a2f047b6afd2fbdc
2021-04-01 09:37:58-04:00
Fix a number-up crash bug (Issue #413)
6e8a95561988500b5b5ae4861b3b0cbf4fba517f
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/6e8a95561988500b5b5ae4861b3b0cbf4fba517f
2021-04-01 09:47:56-04:00
Fix a crash bug with empty titles (Issue #425)
a0014be47d614220db111b360fb6170ef6f3937e
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/a0014be47d614220db111b360fb6170ef6f3937e
2021-05-07 06:37:23-04:00
Fix a crash bug with bogus text (Issue #426)
ee778252faebb721afba5a081dd6ad7eaf20eef3
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/ee778252faebb721afba5a081dd6ad7eaf20eef3
2021-05-07 06:42:42-04:00
Fix BMP crash bug (Issue #444)
f12b9666e582a8e7b70f11b28e5ffc49ad625d43
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/f12b9666e582a8e7b70f11b28e5ffc49ad625d43
2021-09-11 18:12:33-04:00
Fix potential BMP stack overflow (Issue #453)
27d08989a5a567155d506ac870ae7d8cc88fa58b
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b
2021-11-05 09:35:10-04:00
Block GIF images with a code size > 12 (Issue #463)
312f0f9c12f26fbe015cd0e6cefa40e4b99017d9
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9
2022-01-07 18:21:53-05:00
Fix a potential integer overflow bug in the JPEG and PNG loaders (Issue #471) All images are now limited to 4GiB of memory usage (37837x37837 pixels).
31f780487e5ddc426888638786cdc47631687275
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/31f780487e5ddc426888638786cdc47631687275
2022-03-10 15:29:36-05:00
Call check_pages when writing links (Issue #480)
46c8ec2b9bccb8ccabff52d998c5eee77a228348
htmldoc
cvefixes
1
https://github.com/michaelrsweet/htmldoc
https://github.com/michaelrsweet/htmldoc/commit/46c8ec2b9bccb8ccabff52d998c5eee77a228348
2022-03-24 16:30:07-04:00
Fix IPv6 routing loops
24afe944a6ffff53d84a748384e276a4e95912ec
gargoyle
cvefixes
1
https://github.com/ericpaulbishop/gargoyle
https://github.com/ericpaulbishop/gargoyle/commit/24afe944a6ffff53d84a748384e276a4e95912ec
2021-01-20 18:05:51+11:00
ZipFile: Add path checks to uncompressEntry()
2e874e80cba0152201aff6a4d0dc407997d10a7f
juce
cvefixes
1
https://github.com/juce-framework/juce
https://github.com/juce-framework/juce/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f
2022-01-12 13:16:57+01:00
Adds new American flag module
074a0f8ed0c31c35d13d28632bd8a049ff136fb6
colors.js
cvefixes
1
https://github.com/marak/colors.js
https://github.com/marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6
2022-01-07 23:19:03-05:00
added allowed customized types
b0e63be5f0bb20dfce507cb8a1a9568f6e73de57
ajax.net-professional
cvefixes
1
https://github.com/michaelschwarz/ajax.net-professional
https://github.com/michaelschwarz/ajax.net-professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57
2021-10-27 21:17:11+02:00
Close connection if we derive an extra 1-rtt write cipher Summary: Fixes CVE-2021-24029 Reviewed By: mjoras, lnicco Differential Revision: D26613890 fbshipit-source-id: 19bb2be2c731808144e1a074ece313fba11f1945
a67083ff4b8dcbb7ee2839da6338032030d712b0
mvfst
cvefixes
1
https://github.com/facebookincubator/mvfst
https://github.com/facebookincubator/mvfst/commit/a67083ff4b8dcbb7ee2839da6338032030d712b0
2021-03-03 07:26:26-08:00
Revive startup parameter `--server.session-timeout` (#14118) Co-authored-by: Tobias Gödderz <[email protected]>
e9c6ee9dcca7b9b4fbcd02a0b323d205bee838d3
arangodb
cvefixes
1
https://github.com/arangodb/arangodb
https://github.com/arangodb/arangodb/commit/e9c6ee9dcca7b9b4fbcd02a0b323d205bee838d3
2021-07-01 11:36:14+02:00
[APM-78] Disable installation from remote URL (#15292)
d9b7f019d2435f107b19a59190bf9cc27d5f34dd
arangodb
cvefixes
1
https://github.com/arangodb/arangodb
https://github.com/arangodb/arangodb/commit/d9b7f019d2435f107b19a59190bf9cc27d5f34dd
2021-12-14 11:24:01+01:00
Fixes #94
14e75f95e5f56fbe7ee897bdf5d858788072e818
opencrx
cvefixes
1
https://github.com/opencrx/opencrx
https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818
2021-07-27 21:40:57+02:00
Version 2.0.2
de5336016edbe1e90327d0ed1cba5c4e49114366
cyclonetcp
cvefixes
1
https://github.com/oryx-embedded/cyclonetcp
https://github.com/oryx-embedded/cyclonetcp/commit/de5336016edbe1e90327d0ed1cba5c4e49114366
2021-01-08 10:16:26+01:00
Fixes #264. The JP2 decoder was allowing the decoding of a code stream to be attempted when the stream has inconsistent values for the number of components and/or the component types. For such invalid streams, only a warning would be issued and decoding would proceed. This is dangerous, however, as it can lead to many unexpected paths through the code, which in some cases have been demonstrated to result in security vulnerabilities. This code change makes decoding of these types invalid code streams a hard error.
41f214b121b837fa30d9ca5f2430212110f5cd9b
jasper
cvefixes
1
https://github.com/jasper-software/jasper
https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b
2021-02-07 12:31:55-08:00
snapshot of project "xterm", label xterm-365d
82ba55b8f994ab30ff561a347b82ea340ba7075c
xterm-snapshots
cvefixes
1
https://github.com/thomasdickey/xterm-snapshots
https://github.com/thomasdickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c
2021-02-10 20:05:07+00:00
added empty strign check, which would lead to NULL ptr deref/crash in exif XML display. fixes https://github.com/libexif/exif/issues/4
f6334d9d32437ef13dc902f0a88a2be0063d9d1c
exif
cvefixes
1
https://github.com/libexif/exif
https://github.com/libexif/exif/commit/f6334d9d32437ef13dc902f0a88a2be0063d9d1c
2021-02-25 08:31:53+01:00
actually return empty stringand not 'em,pty string' as expected
eb84b0e3c5f2a86013b6fcfb800d187896a648fa
exif
cvefixes
1
https://github.com/libexif/exif
https://github.com/libexif/exif/commit/eb84b0e3c5f2a86013b6fcfb800d187896a648fa
2021-02-25 09:45:36+01:00
tame some window operations, just in case
bd52109993440b6996760aaccb66e68e782762b9
mintty
cvefixes
1
https://github.com/mintty/mintty
https://github.com/mintty/mintty/commit/bd52109993440b6996760aaccb66e68e782762b9
2021-02-13 11:48:37+01:00
pict: Fixed a bug with ICC profile extraction Could cause a NULL pointer dereference. Found by F. Çelik.
287f5ac31dfdc074669182f51ece637706070eeb
deark
cvefixes
1
https://github.com/jsummers/deark
https://github.com/jsummers/deark/commit/287f5ac31dfdc074669182f51ece637706070eeb
2021-03-12 15:13:19-05:00
pict,macrsrc: Fixed a bug that could cause division by 0 Found by F. Çelik.
62acb7753b0e3c0d3ab3c15057b0a65222313334
deark
cvefixes
1
https://github.com/jsummers/deark
https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334
2021-03-14 10:09:11-04:00
md_analyze_line: Avoid reading 1 byte beyond the input size. Fixes #155.
4fc808d8fe8d8904f8525bb4231d854f45e23a19
md4c
cvefixes
1
https://github.com/mity/md4c
https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19
2021-03-29 12:51:48+02:00
util: Check for NULL string in writefile This check was there previously, but was removed in f549b757 with the addition of a check during parse that every rule has rspfile if and only if it has rspfile_content. However, this fails to consider the possibility of those variables coming from the edge or global environment. So, re-add the check. Fixes #67.
e84b6d99c85043fa1ba54851ee500540ec206918
samurai
cvefixes
1
https://github.com/michaelforney/samurai
https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918
2021-04-02 17:28:21-07:00
parse: Check for non-empty command/rspfile/rspfile_content This matches ninja behavior and prevents the possibility of a rule with an empty (NULL) command string. Fixes #68.
d2af3bc375e2a77139c3a28d6128c60cd8d08655
samurai
cvefixes
1
https://github.com/michaelforney/samurai
https://github.com/michaelforney/samurai/commit/d2af3bc375e2a77139c3a28d6128c60cd8d08655
2021-04-04 03:55:41-07:00
fix sqlcipher_export handling of NULL parameters
cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
sqlcipher
cvefixes
1
https://github.com/sqlcipher/sqlcipher
https://github.com/sqlcipher/sqlcipher/commit/cb71f53e8cea4802509f182fa5bead0ac6ab0e7f
2021-01-13 17:24:33-05:00
Improve heap2 bounds checking (#224) * Improve heap bounds checking in pvPortMalloc
c7a9a01c94987082b223d3e59969ede64363da63
freertos-kernel
cvefixes
1
https://github.com/freertos/freertos-kernel
https://github.com/freertos/freertos-kernel/commit/c7a9a01c94987082b223d3e59969ede64363da63
2020-12-07 10:36:27-08:00
Add addition overflow check for stream buffer (#226)
d05b9c123f2bf9090bce386a244fc934ae44db5b
freertos-kernel
cvefixes
1
https://github.com/freertos/freertos-kernel
https://github.com/freertos/freertos-kernel/commit/d05b9c123f2bf9090bce386a244fc934ae44db5b
2020-12-07 11:07:31-08:00
add assert for addition overflow on queue creation (#225)
47338393f1f79558f6144213409f09f81d7c4837
freertos-kernel
cvefixes
1
https://github.com/freertos/freertos-kernel
https://github.com/freertos/freertos-kernel/commit/47338393f1f79558f6144213409f09f81d7c4837
2020-12-07 11:48:51-08:00
fix: array overflow when wrong duration in voice overlay Issue #83,
2f56e1179cab6affeb8afa9d6c324008fe40d8e3
abcm2ps
cvefixes
1
https://github.com/leesavide/abcm2ps
https://github.com/leesavide/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3
2021-04-27 11:52:27+02:00
fix: crash when accidental without a note at start of line after K: Issue #84.
3169ace6d63f6f517a64e8df0298f44a490c4a15
abcm2ps
cvefixes
1
https://github.com/leesavide/abcm2ps
https://github.com/leesavide/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15
2021-04-27 16:39:19+02:00
Fix for integer/buffer overflow CVE-2021-32765 This fix prevents hiredis from trying to allocate more than `SIZE_MAX` bytes, which would result in a buffer overrun. [Full Details](https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2)
76a7b10005c70babee357a7d0f2becf28ec7ed1e
hiredis
cvefixes
1
https://github.com/redis/hiredis
https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e
2021-10-04 11:56:31-07:00
add useful checks
efddaef0151af3be16078cc4d88c6bae0f911e56
openoffice
cvefixes
1
https://github.com/apache/openoffice
https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56
2021-06-26 09:46:32+02:00
Always create a full 256-entry map in case color values are out of range Fixes https://github.com/libsdl-org/SDL/issues/5042
8c91cf7dba5193f5ce12d06db1336515851c9ee9
sdl
cvefixes
1
https://github.com/libsdl-org/sdl
https://github.com/libsdl-org/sdl/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9
2021-11-30 12:37:39-08:00
SKALE-3205-restart
77425c862ad20cd270d42c54f3d63e1eb4e02195
sgxwallet
cvefixes
1
https://github.com/skalenetwork/sgxwallet
https://github.com/skalenetwork/sgxwallet/commit/77425c862ad20cd270d42c54f3d63e1eb4e02195
2020-09-08 15:30:59+03:00
secvar: fix endian conversion unpack_timestamp() calls le32_to_cpu() for endian conversion of uint16_t "year" value. This patch fixes the code to use le16_to_cpu(). Signed-off-by: Nayna Jain <[email protected]> Reviewed-by: Daniel Axtens <[email protected]> Signed-off-by: Vasant Hegde <[email protected]>
5be38b672c1410e2f10acd3ad2eecfdc81d5daf7
skiboot
cvefixes
1
https://github.com/open-power/skiboot
https://github.com/open-power/skiboot/commit/5be38b672c1410e2f10acd3ad2eecfdc81d5daf7
2021-06-24 14:47:48+05:18
Prevent redirect to URLs that begin with '///' Visiting a logout URL like this: https://rp.example.co.jp/mellon/logout?ReturnTo=///fishing-site.example.com/logout.html would have redirected the user to fishing-site.example.com With the patch, this URL would be rejected. Fixes: CVE-2021-3639
42a11261b9dad2e48d70bdff7c53dd57a12db6f5
mod_auth_mellon
cvefixes
1
https://github.com/latchset/mod_auth_mellon
https://github.com/latchset/mod_auth_mellon/commit/42a11261b9dad2e48d70bdff7c53dd57a12db6f5
2021-07-29 13:35:44+02:00
Fix handling of APNG with 0 delay_den (#313)
7dfa400ded53919d986c5d3d23446a09e0cf481b
libjxl
cvefixes
1
https://github.com/libjxl/libjxl
https://github.com/libjxl/libjxl/commit/7dfa400ded53919d986c5d3d23446a09e0cf481b
2021-07-15 12:34:08+02:00
version 3.12 to address CVE-2021-36770
527e482dc70b035d0df4f8c77a00d81f8d775c74
p5-encode
cvefixes
1
https://github.com/dankogai/p5-encode
https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74
2021-08-09 23:19:25+09:00
Add arm ite blocks samples from #853 (#1381)
bf1713d9e011b55ca1f502a6779fc4722b4bb077
unicorn
cvefixes
1
https://github.com/unicorn-engine/unicorn
https://github.com/unicorn-engine/unicorn/commit/bf1713d9e011b55ca1f502a6779fc4722b4bb077
2021-03-30 12:06:26+08:00
Fix wrong offset used in split_region
c733bbada356b0373fa8aa72c044574bb855fd24
unicorn
cvefixes
1
https://github.com/unicorn-engine/unicorn
https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24
2021-11-23 23:22:53+01:00
Generate bindings
5a79d7879ca3ee0ce684ad6576d8ac15e8d90fc7
unicorn
cvefixes
1
https://github.com/unicorn-engine/unicorn
https://github.com/unicorn-engine/unicorn/commit/5a79d7879ca3ee0ce684ad6576d8ac15e8d90fc7
2022-04-16 17:50:32+02:00
Fix crash when mapping a big memory and calling uc_close
3d3deac5e6d38602b689c4fef5dac004f07a2e63
unicorn
cvefixes
1
https://github.com/unicorn-engine/unicorn
https://github.com/unicorn-engine/unicorn/commit/3d3deac5e6d38602b689c4fef5dac004f07a2e63
2022-04-16 19:17:41+02:00
Avoid stack overflow refs: https://github.com/wez/atomicparsley/issues/32
d72ccf06c98259d7261e0f3ac4fd8717778782c1
atomicparsley
cvefixes
1
https://github.com/wez/atomicparsley
https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1
2021-07-12 23:10:28-07:00
Fix issue with corrupt files with tagvalues_count = 0 that caused null pointer dereference
ce0ab6586069791b1e8e2a42f44318e581c39939
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/ce0ab6586069791b1e8e2a42f44318e581c39939
2022-04-23 17:12:04+02:00
Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input
fb1ab50e448ddbed746fd27ae07469bc506d838b
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/fb1ab50e448ddbed746fd27ae07469bc506d838b
2022-04-26 15:07:48+02:00
Fix wrong boundary checks in inflections parser resulting in stack buffer over-read with corrupt input
eafc415bc6067e72577f70d6dd5acbf057ce6e6f
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/eafc415bc6067e72577f70d6dd5acbf057ce6e6f
2022-04-27 12:33:05+02:00
Fix undefined behavior when passing null to strdup
c0699c8693c47f14a2e57dec7292e862ac7adf9c
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/c0699c8693c47f14a2e57dec7292e862ac7adf9c
2022-04-27 12:35:39+02:00
Fix boundary checking error in markup search, that could cause buffer over-read with corrupt input
1e0378e6f9e4ae415cedc9eb10850888897c5dba
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/1e0378e6f9e4ae415cedc9eb10850888897c5dba
2022-05-03 09:54:25+02:00
Fix: index entry label not being zero-terminated with corrupt input
612562bc1ea38f1708b044e7a079c47a05b1291d
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/612562bc1ea38f1708b044e7a079c47a05b1291d
2022-05-05 20:54:11+02:00
fix oob write bug inside libmobi
ab5bf0e37e540eac682a14e628853b918626e72b
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/ab5bf0e37e540eac682a14e628853b918626e72b
2021-09-09 14:21:58+08:00
Fix potential out-of-buffer read while parsing corrupt file, closes #35, #36
bec783e6212439a335ba6e8df7ab8ed610ca9a21
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/bec783e6212439a335ba6e8df7ab8ed610ca9a21
2021-09-18 22:14:58+02:00
Fix potential out-of-buffer read while parsing corrupt file, closes #38
c78e186739b50d156cb3da5d08d70294f0490853
libmobi
cvefixes
1
https://github.com/bfabiszewski/libmobi
https://github.com/bfabiszewski/libmobi/commit/c78e186739b50d156cb3da5d08d70294f0490853
2021-09-18 22:15:54+02:00
crypto: digest: use crypto_memneq() When verifying a digest it is important not to leak timing information through memcmp(). Use crypto_memneq() instead. Signed-off-by: Sascha Hauer <[email protected]>
0a9f9a7410681e55362f8311537ebc7be9ad0fbe
barebox
cvefixes
1
https://github.com/saschahauer/barebox
https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe
2021-07-30 19:50:36+02:00
password: Use crypto_memneq() to compare hashes Cryptographic verifications should be time-constant so that an attacker cannot get information about the secrets used by observing the system, so use crypto_memneq() rather than memcmp() to compare password hashes. Signed-off-by: Sascha Hauer <[email protected]>
a3337563c705bc8e0cf32f910b3e9e3c43d962ff
barebox
cvefixes
1
https://github.com/saschahauer/barebox
https://github.com/saschahauer/barebox/commit/a3337563c705bc8e0cf32f910b3e9e3c43d962ff
2021-07-30 19:50:36+02:00
SOFT: Check the EC Key on C_CreateObject and C_DeriveKey When constructing an OpenSSL EC public or private key from PKCS#11 attributes or ECDH public data, check that the key is valid, i.e. that the point is on the curve. This prevents one from creating an EC key object via C_CreateObject with invalid key data. It also prevents C_DeriveKey to derive a secret using ECDH with an EC public key (public data) that uses a different curve or is invalid by other means. Signed-off-by: Ingo Franzki <[email protected]>
4e3b43c3d8844402c04a66b55c6c940f965109f0
opencryptoki
cvefixes
1
https://github.com/opencryptoki/opencryptoki
https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0
2021-05-11 20:05:36+02:00
[misc] Fix use-after-free in net_bind() Thanks to Ba Jinsheng for reporting this bug
246d8ae0cef27377e5dfe9ee3ad87e864d6b6266
owntone-server
cvefixes
1
https://github.com/owntone/owntone-server
https://github.com/owntone/owntone-server/commit/246d8ae0cef27377e5dfe9ee3ad87e864d6b6266
2021-07-31 00:55:48+02:00
vhost: fix queue number check when setting inflight FD In function vhost_user_set_inflight_fd, queue number in inflight message is used to access virtqueue. However, queue number could be larger than VHOST_MAX_VRING and cause write OOB as this number will be used to write inflight info in virtqueue structure. This patch checks the queue number to avoid the issue and also make sure virtqueues are allocated before setting inflight information. Fixes: ad0a4ae491fe ("vhost: checkout resubmit inflight information") Cc: [email protected] Reported-by: Wenxiang Qian <[email protected]> Signed-off-by: Chenbo Xia <[email protected]> Reviewed-by: Maxime Coquelin <[email protected]>
6442c329b9d2ded0f44b27d2016aaba8ba5844c5
dpdk
cvefixes
1
https://github.com/dpdk/dpdk
https://github.com/dpdk/dpdk/commit/6442c329b9d2ded0f44b27d2016aaba8ba5844c5
2022-03-10 14:03:43+01:00
Improve fix for avoiding huge number of tiny dashes Some pathological cases were not caught by the previous fix. Fixes: QTBUG-95239 Pick-to: 6.2 6.1 5.15 Change-Id: I0337ee3923ff93ccb36c4d7b810a9c0667354cc5 Reviewed-by: Robert Löhning <[email protected]>
6b400e3147dcfd8cc3a393ace1bd118c93762e0c
qtbase
cvefixes
1
https://github.com/qt/qtbase
https://github.com/qt/qtbase/commit/6b400e3147dcfd8cc3a393ace1bd118c93762e0c
2021-07-27 17:44:30+02:00
Fix memory leak by properly closing `charsetDetector`
d44356927b92e3b13e178071bf6d7c671766f588
detect-character-encoding
cvefixes
1
https://github.com/sonicdoe/detect-character-encoding
https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588
2017-03-10 12:24:00+01:00
Return null if no charset matches Fixes a segmentation fault if no charset matches. According to http://icu-project.org/apiref/icu4c/ucsdet_8h.html#aff2633b5055d472cff4108d94f97cf7d, ucsdet_detect() may return NULL if no charset matches. Fixes: #15 Co-authored-by: chenzhip <[email protected]>
992a11007fff6cfd40b952150ab8d30410c4a20a
detect-character-encoding
cvefixes
1
https://github.com/sonicdoe/detect-character-encoding
https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a
2018-11-06 19:10:49+01:00
libmount: remove support for deleted mount table entries The "(deleted)" suffix has been originally used by kernel for deleted mountpoints. Since kernel commit 9d4d65748a5ca26ea8650e50ba521295549bf4e3 (Dec 2014) kernel does not use this suffix for mount stuff in /proc at all. Let's remove this support from libmount too. Signed-off-by: Karel Zak <[email protected]>
166e87368ae88bf31112a30e078cceae637f4cdb
util-linux
cvefixes
1
https://github.com/util-linux/util-linux
https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb
2022-01-04 10:37:55+01:00
libmount: fix UID check for FUSE umount [CVE-2021-3995] Improper UID check allows an unprivileged user to unmount FUSE filesystems of users with similar UID. Signed-off-by: Karel Zak <[email protected]>
57202f5713afa2af20ffbb6ab5331481d0396f8d
util-linux
cvefixes
1
https://github.com/util-linux/util-linux
https://github.com/util-linux/util-linux/commit/57202f5713afa2af20ffbb6ab5331481d0396f8d
2022-01-24 12:05:16+01:00