commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
patch 9.0.0035: spell dump may go beyond end of an array
Problem: Spell dump may go beyond end of an array.
Solution: Limit the word length. | 54e5fed6d27b747ff152cdb6edfb72ff60e70939 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939 | 2022-07-04 13:37:07+01:00 |
patch 9.0.0045: reading past end of completion with a long line
Problem: Reading past end of completion with a long line and 'infercase'
set.
Solution: Allocate the string if needed. | caea66442d86e7bbba3bf3dc202c3c0d549b9853 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853 | 2022-07-07 19:42:04+01:00 |
patch 9.0.0046: reading past end of completion with duplicate match
Problem: Reading past end of completion with duplicate match.
Solution: Check string length | baefde14550231f6468ac2ed2ed495bc381c0c92 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92 | 2022-07-07 19:59:49+01:00 |
patch 9.0.0047: using freed memory with recursive substitute
Problem: Using freed memory with recursive substitute.
Solution: Always make a copy for reg_prev_sub. | 32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea | 2022-07-07 22:20:31+01:00 |
patch 9.0.0060: accessing uninitialized memory when completing long line
Problem: Accessing uninitialized memory when completing long line.
Solution: Terminate string with NUL. | b9e717367c395490149495cf375911b5d9de889e | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/b9e717367c395490149495cf375911b5d9de889e | 2022-07-23 06:53:08+01:00 |
patch 9.0.0061: ml_get error with nested autocommand
Problem: ml_get error with nested autocommand.
Solution: Also check line numbers for a nested autocommand. (closes #10761) | 5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089 | 2022-07-23 09:06:48+01:00 |
patch 9.0.0101: invalid memory access in diff mode with "dp" and undo
Problem: Invalid memory access in diff mode with "dp" and undo.
Solution: Make sure the line number does not go below one. | 4e677b9c40ccbc5f090971b31dc2fe07bf05541d | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d | 2022-07-28 18:44:27+01:00 |
patch 9.0.0102: reading past end of line with insert mode completion
Problem: Reading past end of line with insert mode completion.
Solution: Check text length. | a6f9e300161f4cb54713da22f65b261595e8e614 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/a6f9e300161f4cb54713da22f65b261595e8e614 | 2022-07-28 21:51:37+01:00 |
patch 9.0.0104: going beyond allocated memory when evaluating string constant
Problem: Going beyond allocated memory when evaluating string constant.
Solution: Properly skip over <Key> form. | 1e56bda9048a9625bce6e660938c834c5c15b07d | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/1e56bda9048a9625bce6e660938c834c5c15b07d | 2022-07-29 15:28:27+01:00 |
patch 9.0.0105: illegal memory access when pattern starts with illegal byte
Problem: Illegal memory access when pattern starts with illegal byte.
Solution: Do not match a character with an illegal byte. | f50940531dd57135fe60aa393ac9d3281f352d88 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/f50940531dd57135fe60aa393ac9d3281f352d88 | 2022-07-29 16:22:25+01:00 |
patch 9.0.0211: invalid memory access when compiling :lockvar
Problem: Invalid memory access when compiling :lockvar.
Solution: Don't read past the end of the line. | d1d8f6bacb489036d0fd479c9dd3c0102c988889 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/d1d8f6bacb489036d0fd479c9dd3c0102c988889 | 2022-08-14 21:28:32+01:00 |
patch 9.0.0212: invalid memory access when compiling :unlet
Problem: Invalid memory access when compiling :unlet.
Solution: Don't read past the end of the line. | dbdd16b62560413abcc3c8e893cc3010ccf31666 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/dbdd16b62560413abcc3c8e893cc3010ccf31666 | 2022-08-14 21:46:07+01:00 |
patch 9.0.0213: using freed memory with error in assert argument
Problem: Using freed memory with error in assert argument.
Solution: Make a copy of the error. | 249e1b903a9c0460d618f6dcc59aeb8c03b24b20 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20 | 2022-08-14 22:23:02+01:00 |
patch 9.0.0218: reading before the start of the line
Problem: Reading before the start of the line.
Solution: When displaying "$" check the column is not negative. | e98c88c44c308edaea5994b8ad4363e65030968c | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c | 2022-08-16 14:51:53+01:00 |
patch 9.0.0220: invalid memory access with for loop over NULL string
Problem: Invalid memory access with for loop over NULL string.
Solution: Make sure mb_ptr2len() consistently returns zero for NUL. | f6d39c31d2177549a986d170e192d8351bd571e2 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/f6d39c31d2177549a986d170e192d8351bd571e2 | 2022-08-16 17:50:38+01:00 |
patch 9.0.0221: accessing freed memory if compiling nested function fails
Problem: Accessing freed memory if compiling nested function fails.
Solution: Mess up the variable name so that it won't be found. | 1889f499a4f248cd84e0e0bf6d0d820016774494 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/1889f499a4f248cd84e0e0bf6d0d820016774494 | 2022-08-16 19:34:44+01:00 |
patch 9.0.0224: Using NULL pointer when skipping compiled code
Problem: Using NULL pointer when skipping compiled code.
Solution: Check for skipping. | 4875d6ab068f09df88d24d81de40dcd8d56e243d | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/4875d6ab068f09df88d24d81de40dcd8d56e243d | 2022-08-17 15:55:51+01:00 |
patch 9.0.0225: using freed memory with multiple line breaks in expression
Problem: Using freed memory with multiple line breaks in expression.
Solution: Free eval_tofree later. | 91c7cbfe31bbef57d5fcf7d76989fc159f73ef15 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/91c7cbfe31bbef57d5fcf7d76989fc159f73ef15 | 2022-08-18 13:28:31+01:00 |
patch 9.0.0246: using freed memory when 'tagfunc' deletes the buffer
Problem: Using freed memory when 'tagfunc' deletes the buffer.
Solution: Make a copy of the tag name. | adce965162dd89bf29ee0e5baf53652e7515762c | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/adce965162dd89bf29ee0e5baf53652e7515762c | 2022-08-22 16:35:45+01:00 |
patch 9.0.0259: crash with mouse click when not initialized
Problem: Crash with mouse click when not initialized.
Solution: Check TabPageIdxs[] is not NULL. | 80525751c5ce9ed82c41d83faf9ef38667bf61b1 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/80525751c5ce9ed82c41d83faf9ef38667bf61b1 | 2022-08-24 19:27:45+01:00 |
patch 9.0.0260: using freed memory when using 'quickfixtextfunc' recursively
Problem: Using freed memory when using 'quickfixtextfunc' recursively.
Solution: Do not allow for recursion. | d6c67629ed05aae436164eec474832daf8ba7420 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/d6c67629ed05aae436164eec474832daf8ba7420 | 2022-08-24 20:07:22+01:00 |
patch 8.1.0633: crash when out of memory while opening a terminal window
Problem: Crash when out of memory while opening a terminal window.
Solution: Handle out-of-memory more gracefully. | cd929f7ba8cc5b6d6dcf35c8b34124e969fed6b8 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/cd929f7ba8cc5b6d6dcf35c8b34124e969fed6b8 | 2018-12-24 21:38:45+01:00 |
patch 8.1.0881: can execute shell commands in rvim through interfaces
Problem: Can execute shell commands in rvim through interfaces.
Solution: Disable using interfaces in restricted mode. Allow for writing
file with writefile(), histadd() and a few others. | 8c62a08faf89663e5633dc5036cd8695c80f1075 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075 | 2019-02-08 14:34:10+01:00 |
patch 8.1.1365: source command doesn't check for the sandbox
Problem: Source command doesn't check for the sandbox. (Armin Razmjou)
Solution: Check for the sandbox when sourcing a file. | 53575521406739cf20bbe4e384d88e7dca11f040 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/53575521406739cf20bbe4e384d88e7dca11f040 | 2019-05-22 22:38:25+02:00 |
patch 8.1.2136: using freed memory with autocmd from fuzzer
Problem: using freed memory with autocmd from fuzzer. (Dhiraj Mishra,
Dominique Pelle)
Solution: Avoid using "wp" after autocommands. (closes #5041) | ec66c41d84e574baf8009dbc0bd088d2bc5b2421 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/ec66c41d84e574baf8009dbc0bd088d2bc5b2421 | 2019-10-11 21:19:13+02:00 |
patch 8.0.0056
Problem: When setting 'filetype' there is no check for a valid name.
Solution: Only allow valid characters in 'filetype', 'syntax' and 'keymap'. | d0b5138ba4bccff8a744c99836041ef6322ed39a | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a | 2016-11-04 15:23:45+01:00 |
patch 8.0.0377: possible overflow when reading corrupted undo file
Problem: Possible overflow when reading corrupted undo file.
Solution: Check if allocated size is not too big. (King) | 3eb1637b1bba19519885dd6d377bd5596e91d22c | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/3eb1637b1bba19519885dd6d377bd5596e91d22c | 2017-02-26 18:11:36+01:00 |
patch 8.0.0378: possible overflow when reading corrupted undo file
Problem: Another possible overflow when reading corrupted undo file.
Solution: Check if allocated size is not too big. (King) | 0c8485f0e4931463c0f7986e1ea84a7d79f10c75 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75 | 2017-02-26 18:17:10+01:00 |
patch 8.0.1263: others can read the swap file if a user is careless
Problem: Others can read the swap file if a user is careless with his
primary group.
Solution: If the group permission allows for reading but the world
permissions doesn't, make sure the group is right. | 5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8 | vim | cvefixes | 1 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8 | 2017-11-04 21:35:01+01:00 |
vim-patch:8.0.0056
Problem: When setting 'filetype' there is no check for a valid name.
Solution: Only allow valid characters in 'filetype', 'syntax' and 'keymap'.
https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a | 4fad66fbe637818b6b3d6bc5d21923ba72795040 | neovim | cvefixes | 1 | https://github.com/neovim/neovim | https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040 | 2016-11-20 14:07:46-05:00 |
zero the arep structure (Coverity #115822) | e4c00eba70a0f72c4de77b5f072c69708ec2beab | pam_tacplus | cvefixes | 1 | https://github.com/kravietz/pam_tacplus | https://github.com/kravietz/pam_tacplus/commit/e4c00eba70a0f72c4de77b5f072c69708ec2beab | 2016-05-05 19:38:34+01:00 |
pam: don't leak TACACS+ secret to journald
If journald for syslog is used, the journal is going to store everything,
even DEBUG loglevel messages. Pre-journald logging of system-wide DEBUG
loglevel could be avoided and is not affected in all cases.
With journald presence it's probably safe to no longer log sensitive
details at DEBUG level.
Fix #149
Signed-off-by: Daniel Gollub <[email protected]> | 4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0 | pam_tacplus | cvefixes | 1 | https://github.com/kravietz/pam_tacplus | https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0 | 2020-06-02 19:28:41+02:00 |
nsenter: clone /proc/self/exe to avoid exposing host binary to container
There are quite a few circumstances where /proc/self/exe pointing to a
pretty important container binary is a _bad_ thing, so to avoid this we
have to make a copy (preferably doing self-clean-up and not being
writeable).
We require memfd_create(2) -- though there is an O_TMPFILE fallback --
but we can always extend this to use a scratch MNT_DETACH overlayfs or
tmpfs. The main downside to this approach is no page-cache sharing for
the runc binary (which overlayfs would give us) but this is far less
complicated.
This is only done during nsenter so that it happens transparently to the
Go code, and any libcontainer users benefit from it. This also makes
ExtraFiles and --preserve-fds handling trivial (because we don't need to
worry about it).
Fixes: CVE-2019-5736
Co-developed-by: Christian Brauner <[email protected]>
Signed-off-by: Aleksa Sarai <[email protected]> | 0a8e4117e7f715d5fbeef398405813ce8e88558b | runc | cvefixes | 1 | https://github.com/opencontainers/runc | https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b | 2019-02-08 18:57:59+11:00 |
Open bind mount sources from the host userns
The source of the bind mount might not be accessible in a different user
namespace because a component of the source path might not be traversed
under the users and groups mapped inside the user namespace. This caused
errors such as the following:
# time="2020-06-22T13:48:26Z" level=error msg="container_linux.go:367:
starting container process caused: process_linux.go:459:
container init caused: rootfs_linux.go:58:
mounting \"/tmp/busyboxtest/source-inaccessible/dir\"
to rootfs at \"/tmp/inaccessible\" caused:
stat /tmp/busyboxtest/source-inaccessible/dir: permission denied"
To solve this problem, this patch performs the following:
1. in nsexec.c, it opens the source path in the host userns (so we have
the right permissions to open it) but in the container mntns (so the
kernel cross mntns mount check let us mount it later:
https://github.com/torvalds/linux/blob/v5.8/fs/namespace.c#L2312).
2. in nsexec.c, it passes the file descriptors of the source to the
child process with SCM_RIGHTS.
3. In runc-init in Golang, it finishes the mounts while inside the
userns even without access to the some components of the source
paths.
Passing the fds with SCM_RIGHTS is necessary because once the child
process is in the container mntns, it is already in the container userns
so it cannot temporarily join the host mntns.
This patch uses the existing mechanism with _LIBCONTAINER_* environment
variables to pass the file descriptors from runc to runc init.
This patch uses the existing mechanism with the Netlink-style bootstrap
to pass information about the list of source mounts to nsexec.c.
Rootless containers don't use this bind mount sources fdpassing
mechanism because we can't setns() to the target mntns in a rootless
container (we don't have the privileges when we are in the host userns).
This patch takes care of using O_CLOEXEC on mount fds, and close them
early.
Fixes: #2484.
Signed-off-by: Alban Crequy <[email protected]>
Signed-off-by: Rodrigo Campos <[email protected]>
Co-authored-by: Rodrigo Campos <[email protected]> | 9c444070ec7bb83995dbc0185da68284da71c554 | runc | cvefixes | 1 | https://github.com/opencontainers/runc | https://github.com/opencontainers/runc/commit/9c444070ec7bb83995dbc0185da68284da71c554 | 2021-10-12 15:13:45+02:00 |
common: [security fix] Make sure sockets only listen locally | 4397b3376dc4e4cb1c991d0aed61ce6482614196 | libusbmuxd | cvefixes | 1 | https://github.com/libimobiledevice/libusbmuxd | https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196 | 2015-12-29 23:09:37+01:00 |
rsa_verify_hash: fix possible bleichenbacher signature attack | 5eb9743410ce4657e9d54fef26a2ee31a1b5dd09 | libtomcrypt | cvefixes | 1 | https://github.com/libtom/libtomcrypt | https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd09 | 2014-08-28 13:30:26+02:00 |
MDEV-26574 An improper locking bug due to unreleased lock in the ds_xbstream.cc
release lock in all as cases n xbstream_open, also fix the case where malloc would return NULL. | b1351c15946349f9daa7e5297fb2ac6f3139e4a8 | server | cvefixes | 1 | https://github.com/mariadb/server | https://github.com/mariadb/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8 | 2021-09-15 14:55:45+02:00 |
MDEV-26556 An improper locking bug(s) due to unreleased lock.
Get rid of the global big_buffer. | d627d00b13ab2f2c0954ea7b77202470cb102944 | server | cvefixes | 1 | https://github.com/mariadb/server | https://github.com/mariadb/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944 | 2021-10-25 19:53:25+04:00 |
MDEV-26561 Fix a bug due to unreleased lock
Fix a bug of unreleased lock ctrl_mutex in the method create_worker_threads | e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2 | server | cvefixes | 1 | https://github.com/mariadb/server | https://github.com/mariadb/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2 | 2021-11-09 17:05:55+11:00 |
MDEV-26561 mariabackup release locks
The previous threads locked need to be released too.
This occurs if the initialization of any of the non-first
mutex/conditition variables errors occurs. | 7c30bc38a588b22b01f11130cfe99e7f36accf94 | server | cvefixes | 1 | https://github.com/mariadb/server | https://github.com/mariadb/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94 | 2021-11-09 17:05:55+11:00 |
schannel: don't use static to store selected ciphers
CVE-2021-22897
Bug: https://curl.se/docs/CVE-2021-22897.html | bbb71507b7bab52002f9b1e0880bed6a32834511 | curl | cvefixes | 1 | https://github.com/curl/curl | https://github.com/curl/curl/commit/bbb71507b7bab52002f9b1e0880bed6a32834511 | 2021-05-24 07:56:05+02:00 |
telnet: check sscanf() for correct number of matches
CVE-2021-22898
Bug: https://curl.se/docs/CVE-2021-22898.html | 39ce47f219b09c380b81f89fe54ac586c8db6bde | curl | cvefixes | 1 | https://github.com/curl/curl | https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde | 2021-05-24 07:56:05+02:00 |
openssl: associate/detach the transfer from connection
CVE-2021-22901
Bug: https://curl.se/docs/CVE-2021-22901.html | 7f4a9a9b2a49547eae24d2e19bc5c346e9026479 | curl | cvefixes | 1 | https://github.com/curl/curl | https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479 | 2021-05-24 13:15:10+02:00 |
libsepol/cil: Destroy classperms list when resetting classpermission
Nicolas Iooss reports:
A few months ago, OSS-Fuzz found a crash in the CIL compiler, which
got reported as
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28648 (the title
is misleading, or is caused by another issue that conflicts with the
one I report in this message). Here is a minimized CIL policy which
reproduces the issue:
(class CLASS (PERM))
(classorder (CLASS))
(sid SID)
(sidorder (SID))
(user USER)
(role ROLE)
(type TYPE)
(category CAT)
(categoryorder (CAT))
(sensitivity SENS)
(sensitivityorder (SENS))
(sensitivitycategory SENS (CAT))
(allow TYPE self (CLASS (PERM)))
(roletype ROLE TYPE)
(userrole USER ROLE)
(userlevel USER (SENS))
(userrange USER ((SENS)(SENS (CAT))))
(sidcontext SID (USER ROLE TYPE ((SENS)(SENS))))
(classpermission CLAPERM)
(optional OPT
(roletype nonexistingrole nonexistingtype)
(classpermissionset CLAPERM (CLASS (PERM)))
)
The CIL policy fuzzer (which mimics secilc built with clang Address
Sanitizer) reports:
==36541==ERROR: AddressSanitizer: heap-use-after-free on address
0x603000004f98 at pc 0x56445134c842 bp 0x7ffe2a256590 sp
0x7ffe2a256588
READ of size 8 at 0x603000004f98 thread T0
#0 0x56445134c841 in __cil_verify_classperms
/selinux/libsepol/src/../cil/src/cil_verify.c:1620:8
#1 0x56445134a43e in __cil_verify_classpermission
/selinux/libsepol/src/../cil/src/cil_verify.c:1650:9
#2 0x56445134a43e in __cil_pre_verify_helper
/selinux/libsepol/src/../cil/src/cil_verify.c:1715:8
#3 0x5644513225ac in cil_tree_walk_core
/selinux/libsepol/src/../cil/src/cil_tree.c:272:9
#4 0x564451322ab1 in cil_tree_walk
/selinux/libsepol/src/../cil/src/cil_tree.c:316:7
#5 0x5644513226af in cil_tree_walk_core
/selinux/libsepol/src/../cil/src/cil_tree.c:284:9
#6 0x564451322ab1 in cil_tree_walk
/selinux/libsepol/src/../cil/src/cil_tree.c:316:7
#7 0x5644512b88fd in cil_pre_verify
/selinux/libsepol/src/../cil/src/cil_post.c:2510:7
#8 0x5644512b88fd in cil_post_process
/selinux/libsepol/src/../cil/src/cil_post.c:2524:7
#9 0x5644511856ff in cil_compile
/selinux/libsepol/src/../cil/src/cil.c:564:7
The classperms list of a classpermission rule is created and filled
in when classpermissionset rules are processed, so it doesn't own any
part of the list and shouldn't retain any of it when it is reset.
Destroy the classperms list (without destroying the data in it) when
resetting a classpermission rule.
Reported-by: Nicolas Iooss <[email protected]>
Signed-off-by: James Carter <[email protected]> | f34d3d30c8325e4847a6b696fe7a3936a8a361f3 | selinux | cvefixes | 1 | https://github.com/selinuxproject/selinux | https://github.com/selinuxproject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 | 2021-04-19 10:40:29-04:00 |
libsepol/cil: Destroy classperm list when resetting map perms
Map perms share the same struct as regular perms, but only the
map perms use the classperms field. This field is a pointer to a
list of classperms that is created and added to when resolving
classmapping rules, so the map permission doesn't own any of the
data in the list and this list should be destroyed when the AST is
reset.
When resetting a perm, destroy the classperms list without destroying
the data in the list.
Signed-off-by: James Carter <[email protected]> | 2d35fcc7e9e976a2346b1de20e54f8663e8a6cba | selinux | cvefixes | 1 | https://github.com/selinuxproject/selinux | https://github.com/selinuxproject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba | 2021-04-19 10:40:33-04:00 |
libsepol/cil: cil_reset_classperms_set() should not reset classpermission
In struct cil_classperms_set, the set field is a pointer to a
struct cil_classpermission which is looked up in the symbol table.
Since the cil_classperms_set does not create the cil_classpermission,
it should not reset it.
Set the set field to NULL instead of resetting the classpermission
that it points to.
Signed-off-by: James Carter <[email protected]> | c49a8ea09501ad66e799ea41b8154b6770fec2c8 | selinux | cvefixes | 1 | https://github.com/selinuxproject/selinux | https://github.com/selinuxproject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 | 2021-04-19 10:40:35-04:00 |
libsepol/cil: Check for statements not allowed in optional blocks
While there are some checks for invalid statements in an optional
block when resolving the AST, there are no checks when building the
AST.
OSS-Fuzz found the following policy which caused a null dereference
in cil_tree_get_next_path().
(blockinherit b3)
(sid SID)
(sidorder(SID))
(optional o
(ibpkeycon :(1 0)s)
(block b3
(filecon""block())
(filecon""block())))
The problem is that the blockinherit copies block b3 before
the optional block is disabled. When the optional is disabled,
block b3 is deleted along with everything else in the optional.
Later, when filecon statements with the same path are found an
error message is produced and in trying to find out where the block
was copied from, the reference to the deleted block is used. The
error handling code assumes (rightly) that if something was copied
from a block then that block should still exist.
It is clear that in-statements, blocks, and macros cannot be in an
optional, because that allows nodes to be copied from the optional
block to somewhere outside even though the optional could be disabled
later. When optionals are disabled the AST is reset and the
resolution is restarted at the point of resolving macro calls, so
anything resolved before macro calls will never be re-resolved.
This includes tunableifs, in-statements, blockinherits,
blockabstracts, and macro definitions. Tunable declarations also
cannot be in an optional block because they are needed to resolve
tunableifs. It should be fine to allow blockinherit statements in
an optional, because that is copying nodes from outside the optional
to the optional and if the optional is later disabled, everything
will be deleted anyway.
Check and quit with an error if a tunable declaration, in-statement,
block, blockabstract, or macro definition is found within an
optional when either building or resolving the AST.
Signed-off-by: James Carter <[email protected]> | 340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 | selinux | cvefixes | 1 | https://github.com/selinuxproject/selinux | https://github.com/selinuxproject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 | 2021-04-19 14:05:14-04:00 |
Fix line wrapping mode 0/3 bugs
This fixes two separate bugs:
a) Don't move a linebreak into the first symbol. This results in a empty
line at the front, which does not help to equalize line lengths at all.
Instead, merge line with the second one.
b) When moving a linebreak into a symbol that already is a break, the
number of lines must be decremented. Otherwise, uninitialized memory
is possibly used for later layout operations.
Found by fuzzer test case
id:000085,sig:11,src:003377+003350,op:splice,rep:8.
This might also affect and hopefully fix libass#229.
v2: change semantics according to review | f4f48950788b91c6a30029cc28a240b834713ea7 | libass | cvefixes | 1 | https://github.com/libass/libass | https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7 | 2016-10-05 00:38:35+02:00 |
decode_font: fix subtraction broken by change to unsigned type
This caused a one-byte buffer overwrite and an assertion failure.
Regression in commit 910211f1c0078e37546f73e95306724358b89be2.
Discovered by OSS-Fuzz.
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674.
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26678. | 017137471d0043e0321e377ed8da48e45a3ec632 | libass | cvefixes | 1 | https://github.com/libass/libass | https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632 | 2020-10-27 15:50:23+02:00 |
Fix a bug that can crash deflate on some input when using Z_FIXED.
This bug was reported by Danilo Ramos of Eideticom, Inc. It has
lain in wait 13 years before being found! The bug was introduced
in zlib 1.2.2.2, with the addition of the Z_FIXED option. That
option forces the use of fixed Huffman codes. For rare inputs with
a large number of distant matches, the pending buffer into which
the compressed data is written can overwrite the distance symbol
table which it overlays. That results in corrupted output due to
invalid distances, and can result in out-of-bound accesses,
crashing the application.
The fix here combines the distance buffer and literal/length
buffers into a single symbol buffer. Now three bytes of pending
buffer space are opened up for each literal or length/distance
pair consumed, instead of the previous two bytes. This assures
that the pending buffer cannot overwrite the symbol table, since
the maximum fixed code compressed length/distance is 31 bits, and
since there are four bytes of pending space for every three bytes
of symbol space. | 5c44459c3b28a9bd3283aaceab7c615f8020c531 | zlib | cvefixes | 1 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 | 2018-04-19 19:47:11-07:00 |
[CVE-2017-0028] Fix binding of 'async' identifier in the presence of async arrow function. | 402f3d967c0a905ec5b9ca9c240783d3f2c15724 | chakracore | cvefixes | 1 | https://github.com/microsoft/chakracore | https://github.com/microsoft/chakracore/commit/402f3d967c0a905ec5b9ca9c240783d3f2c15724 | 2017-03-16 15:40:15-07:00 |
[CVE-2017-0196] Fixing an heap overread during slice.
The MissingItem check is happening on the array in a loop. It is possible that we get called into script and that mutates the array. So the Array's head is newly created with length.
However the loop is still performing over the old length.
Fixed this by checking the length In IsMissingItem function.
Added a unittest. | 065b7978c40ded35c356ced6cd922a40156c9c46 | chakracore | cvefixes | 1 | https://github.com/microsoft/chakracore | https://github.com/microsoft/chakracore/commit/065b7978c40ded35c356ced6cd922a40156c9c46 | 2017-03-16 15:40:15-07:00 |
[CVE-2017-0152] MSFT: 10592731 : Issue with Function name capturing in param scope
In a function expression with name, where the name is captured in one
of the param scope functions, if there is a function or var declaration
with the same name as the function expression name we were marking the
function expression name as shadowed. In non-eval case this causes
issue because the name symbol won't get added to the body. This change is to
fix it in such a way if the name is captured in the param scope then we
split the param and body scope such that the name symbol is added to the
param scope not body scope. | 9da019424601325a6e95e6be0fa03d7d21d0b517 | chakracore | cvefixes | 1 | https://github.com/microsoft/chakracore | https://github.com/microsoft/chakracore/commit/9da019424601325a6e95e6be0fa03d7d21d0b517 | 2017-03-16 15:40:16-07:00 |
Fix host_name_lookup (Close 2747)
Thanks to Nico R for providing a reproducing configuration.
host_lookup = *
message_size_limit = ${if def:sender_host_name {32M}{32M}}
acl_smtp_connect = acl_smtp_connect
acl_smtp_rcpt = acl_smtp_rcpt
begin acl
acl_smtp_connect:
warn ratelimit = 256 / 1m / per_conn
accept
acl_smtp_rcpt:
accept hosts = 127.0.0.*
begin routers
null:
driver = accept
transport = null
begin transports
null:
driver = appendfile
file = /dev/null
Tested with
swaks -f [email protected] -t [email protected] --pipe 'exim -bh 127.0.0.1 -C /opt/exim/etc/exim-bug.conf'
The IP must have a PTR to "localhost." to reproduce it.
(cherry picked from commit 20812729e3e47a193a21d326ecd036d67a8b2724) | d4bc023436e4cce7c23c5f8bb5199e178b4cc743 | exim | cvefixes | 1 | https://github.com/exim/exim | https://github.com/exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743 | 2021-05-17 12:09:31+02:00 |
Fix PAM auth. Bug 2813 | 51be321b27825c01829dffd90f11bfff256f7e42 | exim | cvefixes | 1 | https://github.com/exim/exim | https://github.com/exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42 | 2021-10-16 16:34:03+01:00 |
Fixed div0 vulnerability in SampFact | b4e458612d4294e0cfe01dbf1c0b09a07a8133a4 | jpegsnoop | cvefixes | 1 | https://github.com/impulseadventure/jpegsnoop | https://github.com/impulseadventure/jpegsnoop/commit/b4e458612d4294e0cfe01dbf1c0b09a07a8133a4 | 2017-06-05 23:32:45-07:00 |
Fix bug #175:
CVE-2017-11661, CVE-2017-11662, CVE-2017-11663, CVE-2017-11664:
Add a new size parameter to _WM_SetupMidiEvent() so that it
knows where to stop reading, and adjust its clients properly. | ad6d7cf88d6673167ca1f517248af9409a9f1be1 | wildmidi | cvefixes | 1 | https://github.com/mindwerks/wildmidi | https://github.com/mindwerks/wildmidi/commit/ad6d7cf88d6673167ca1f517248af9409a9f1be1 | 2017-08-02 18:50:00+03:00 |
bgo#783835 - Don't divide by zero in box_blur_line() for gaussian blurs
We were making the decision to use box blurs, instead of a true
Gaussian kernel, based on the size of *both* x and y dimensions. Do
them individually instead. | ecf9267a24b2c3c0cd211dbdfa9ef2232511972a | librsvg | cvefixes | 1 | https://github.com/gnome/librsvg | https://github.com/gnome/librsvg/commit/ecf9267a24b2c3c0cd211dbdfa9ef2232511972a | 2017-06-27 17:12:51-05:00 |
Fix buffer overflow if NULL line is present in db.
If ptr->line == NULL for an entry, the first cycle will exit,
but the second one will happily write past entries buffer.
We actually do not want to exit the first cycle prematurely
on ptr->line == NULL.
Signed-off-by: Tomas Mraz <[email protected]> | 954e3d2e7113e9ac06632aee3c69b8d818cc8952 | shadow | cvefixes | 1 | https://github.com/shadow-maint/shadow | https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952 | 2017-03-31 16:25:06+02:00 |
Prevent arithmetic overflow on bounds check | 027f84c69f4ef30c0693832a6c396ef19e563ca1 | mbedtls | cvefixes | 1 | https://github.com/armmbed/mbedtls | https://github.com/armmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1 | 2018-03-13 11:29:24+01:00 |
Fix arbitrary heap exposure problem | 8f782fd8e181d9cfe9387ded43a5ca9692266b85 | json | cvefixes | 1 | https://github.com/flori/json | https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85 | 2017-04-18 10:38:41+02:00 |
irc: fix crash when receiving a malformed message 324 (channel mode)
Thanks to Stuart Nevans Locke for reporting the issue. | 6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da | weechat | cvefixes | 1 | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da | 2020-02-08 20:24:50+01:00 |
irc: fix crash when a new message 005 is received with longer nick prefixes
Thanks to Stuart Nevans Locke for reporting the issue. | 40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f | weechat | cvefixes | 1 | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f | 2020-02-09 20:04:45+01:00 |
auth: Do not double-expand key in passdb dict when authenticating
Broken by 79042f8c | 000030feb7a30f193197f1aab8a7b04a26b42735 | core | cvefixes | 1 | https://github.com/dovecot/core | https://github.com/dovecot/core/commit/000030feb7a30f193197f1aab8a7b04a26b42735 | 2017-03-12 20:15:13+02:00 |
lib-auth: Fix memory leak in auth_client_request_abort()
This caused memory leaks when authentication was aborted. For example
with IMAP:
a AUTHENTICATE PLAIN
*
Broken by 9137c55411aa39d41c1e705ddc34d5bd26c65021 | 1a29ed2f96da1be22fa5a4d96c7583aa81b8b060 | core | cvefixes | 1 | https://github.com/dovecot/core | https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060 | 2018-01-25 11:02:56+02:00 |
stream: fix SYN_SENT RST/FIN injection
RST injection during the SYN_SENT state could trick Suricata into marking
a session as CLOSED. The way this was done is: using invalid TSECR value
in RST+ACK packet. The ACK was needed to force Linux into considering the
TSECR value and compare it to the TSVAL from the SYN packet.
The second works only against Windows. The client would not use a TSVAL
but the RST packet would. Windows will reject this, but Suricata considered
the RST valid and triggered the CLOSED logic.
This patch addresses both. When the SYN packet used timestamp support
the timestamp of incoming packet is validated. Otherwise, packet responding
should not have a timestamp.
Bug #3286
Reported-by: Nicolas Adba | 9f0294fadca3dcc18c919424242a41e01f3e8318 | suricata | cvefixes | 1 | https://github.com/oisf/suricata | https://github.com/oisf/suricata/commit/9f0294fadca3dcc18c919424242a41e01f3e8318 | 2019-12-13 13:13:28+01:00 |
stream: reject broken ACK packets
Fix evasion posibility by rejecting packets with a broken ACK field.
These packets have a non-0 ACK field, but do not have a ACK flag set.
Bug #3324.
Reported-by: Nicolas Adba | fa692df37a796c3330c81988d15ef1a219afc006 | suricata | cvefixes | 1 | https://github.com/oisf/suricata | https://github.com/oisf/suricata/commit/fa692df37a796c3330c81988d15ef1a219afc006 | 2019-12-13 13:13:28+01:00 |
detect: avoid needless recursive scanning
Don't recursively inspect a detect list if the recursion
doesn't increase chance of success. | b9579fbe7dd408200ef03cbe20efddb624b73885 | suricata | cvefixes | 1 | https://github.com/oisf/suricata | https://github.com/oisf/suricata/commit/b9579fbe7dd408200ef03cbe20efddb624b73885 | 2017-05-01 11:59:03+02:00 |
stream/tcp: handle RST with MD5 or AO header
Special handling for RST packets if they have an TCP MD5 or AO header option.
The options hash can't be validated. The end host might be able to validate
it, as it can have a key/password that was communicated out of band.
The sender could use this to move the TCP state to 'CLOSED', leading to
a desync of the TCP session.
This patch builds on top of
843d0b7a10bb ("stream: support RST getting lost/ignored")
It flags the receiver as having received an RST and moves the TCP state
into the CLOSED state. It then reverts this if the sender continues to
send traffic. In this case it sets the following event:
stream-event:suspected_rst_inject;
Bug: #4710. | 50e2b973eeec7172991bf8f544ab06fb782b97df | suricata | cvefixes | 1 | https://github.com/oisf/suricata | https://github.com/oisf/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df | 2021-11-12 15:21:07+01:00 |
[CVE-2022-23308] Use-after-free of ID and IDREF attributes
If a document is parsed with XML_PARSE_DTDVALID and without
XML_PARSE_NOENT, the value of ID attributes has to be normalized after
potentially expanding entities in xmlRemoveID. Otherwise, later calls
to xmlGetID can return a pointer to previously freed memory.
ID attributes which are empty or contain only whitespace after
entity expansion are affected in a similar way. This is fixed by
not storing such attributes in the ID table.
The test to detect streaming mode when validating against a DTD was
broken. In connection with the defects above, this could result in a
use-after-free when using the xmlReader interface with validation.
Fix detection of streaming mode to avoid similar issues. (This changes
the expected result of a test case. But as far as I can tell, using the
XML reader with XIncludes referencing the root document never worked
properly, anyway.)
All of these issues can result in denial of service. Using xmlReader
with validation could result in disclosure of memory via the error
channel, typically stderr. The security impact of xmlGetID returning
a pointer to freed memory depends on the application. The typical use
case of calling xmlGetID on an unmodified document is not affected. | 652dd12a858989b14eed4e84e453059cd3ba340e | libxml2 | cvefixes | 1 | https://github.com/gnome/libxml2 | https://github.com/gnome/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e | 2022-02-19 19:26:42+01:00 |
kdc: validate sname in TGS-REQ
In tgs_build_reply(), validate the server name in the TGS-REQ is present before
dereferencing. | 04171147948d0a3636bc6374181926f0fb2ec83a | heimdal | cvefixes | 1 | https://github.com/heimdal/heimdal | https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a | 2021-08-27 11:45:41+10:00 |
fix overflow and refactor websockets decode (Hybi)
fix critical heap-based buffer overflow which allowed easy modification
of a return address via an overwritten function pointer
fix bug causing connections to fail due a "one websocket frame = one
ws_read" assumption, which failed with LibVNCServer-0.9.11
refactor websocket Hybi decode to use a simple state machine for
decoding of websocket frames | aac95a9dcf4bbba87b76c72706c3221a842ca433 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/aac95a9dcf4bbba87b76c72706c3221a842ca433 | 2017-05-14 20:38:12+02:00 |
LibVNCClient: ignore server-sent cut text longer than 1MB
This is in line with how LibVNCServer does it
(28afb6c537dc82ba04d5f245b15ca7205c6dbb9c) and fixes part of #273. | c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a | 2018-12-29 14:16:58+01:00 |
LibVNCClient: ignore server-sent reason strings longer than 1MB
Fixes #273 | e34bcbb759ca5bef85809967a268fdf214c1ad2c | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/e34bcbb759ca5bef85809967a268fdf214c1ad2c | 2018-12-29 14:40:53+01:00 |
LibVNCClient: fail on server-sent desktop name lengths longer than 1MB
re #273 | c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7 | 2019-01-06 14:20:37+01:00 |
LibVNCClient: remove now-useless cast
re #273 | a64c3b37af9a6c8f8009d7516874b8d266b42bae | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae | 2019-01-06 14:22:34+01:00 |
Error out in rfbProcessFileTransferReadBuffer if length can not be allocated
re #273 | 15bb719c03cc70f14c36a843dcb16ed69b405707 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707 | 2019-01-06 15:13:56+01:00 |
Limit lenght to INT_MAX bytes in rfbProcessFileTransferReadBuffer()
This ammends 15bb719c03cc70f14c36a843dcb16ed69b405707 fix for a heap
out-of-bound write access in rfbProcessFileTransferReadBuffer() when
reading a transfered file content in a server. The former fix did not
work on platforms with a 32-bit int type (expected by rfbReadExact()).
CVE-2018-15127
<https://github.com/LibVNC/libvncserver/issues/243>
<https://github.com/LibVNC/libvncserver/issues/273> | 09e8fc02f59f16e2583b34fe1a270c238bd9ffec | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/09e8fc02f59f16e2583b34fe1a270c238bd9ffec | 2019-01-08 10:00:24+01:00 |
libvncclient: bail out if unix socket name would overflow
Closes #291 | 3fd03977c9b35800d73a865f167338cb4d05b0c1 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1 | 2019-04-06 20:23:12+02:00 |
fix crash because of unaligned accesses in hybiReadAndDecode() | 0cf1400c61850065de590d403f6d49e32882fd76 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76 | 2019-05-28 18:30:46+02:00 |
rfbserver: don't leak stack memory to the remote
Thanks go to Pavel Cheremushkin of Kaspersky for reporting. | d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a | 2019-08-19 22:32:25+02:00 |
libvncclient/cursor: limit width/height input values
Avoids a possible heap overflow reported by Pavel Cheremushkin
<[email protected]>.
re #275 | 54220248886b5001fbbb9fa73c4e1a2cb9413fed | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed | 2019-11-17 17:23:03+01:00 |
libvncclient/tls_openssl: do not deref a NULL pointer
Happens in anonTLS mode where cred is NULL.
re #347 | 33441d90a506d5f3ae9388f2752901227e430553 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/33441d90a506d5f3ae9388f2752901227e430553 | 2020-03-06 17:37:57+01:00 |
libvncclient/rfbproto: limit max textchat size
Addresses GitHub Security Lab (GHSL) Vulnerability Report
`GHSL-2020-063`.
Re #275 | 8937203441ee241c4ace85da687b7d6633a12365 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/8937203441ee241c4ace85da687b7d6633a12365 | 2020-04-10 19:07:12+02:00 |
libvncclient: handle half-open TCP connections
When a connection is not reset properly at the TCP level (e.g. sudden
power loss or process crash) the TCP connection becomes half-open and
read() always returns -1 with errno = EAGAIN while select() always
returns 0. This leads to an infinite loop and can be fixed by closing
the connection after a certain number of retries (based on a timeout)
has been exceeded. | 57433015f856cc12753378254ce4f1c78f5d9c7b | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/57433015f856cc12753378254ce4f1c78f5d9c7b | 2020-04-24 15:52:05+02:00 |
libvncserver: encodings: prevent OOB accesses | 74e8a70f2c9a5248d6718ce443e07c7ed314dfff | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff | 2020-05-28 08:40:09+02:00 |
libvncserver: add missing NULL pointer checks | 38e98ee61d74f5f5ab4aa4c77146faad1962d6d0 | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/38e98ee61d74f5f5ab4aa4c77146faad1962d6d0 | 2020-05-28 08:40:09+02:00 |
libvncclient: fix pointer aliasing/alignment issue
Accessing byte-aligned data through uint32_t pointers can cause crashes
on some platforms or reduce the performance. Therefore ensure a proper
stack alignment. | 23e5cbe6b090d7f22982aee909a6a618174d3c2d | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d | 2020-05-28 08:47:11+02:00 |
libvncserver: fix pointer aliasing/alignment issue
Accessing byte-aligned data through uint16_t pointers can cause crashes
on some platforms or reduce the performance. Therefore ensure a proper
stack alignment. | 53073c8d7e232151ea2ecd8a1243124121e10e2d | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/53073c8d7e232151ea2ecd8a1243124121e10e2d | 2020-05-28 08:47:11+02:00 |
libvncserver: scale: cast to 64 bit before shifting
Since pixel_value is 64 bit the data type of the shift operand should
be 64 bit too to prevent integer overflows. | a6788d1da719ae006605b78d22f5a9f170b423af | libvncserver | cvefixes | 1 | https://github.com/libvnc/libvncserver | https://github.com/libvnc/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af | 2020-05-28 08:53:32+02:00 |
Fixed ngx_gmtime() on 32-bit platforms with 64-bit time_t.
In ngx_gmtime(), instead of casting to ngx_uint_t we now work with
time_t directly. This allows using dates after 2038 on 32-bit platforms
which use 64-bit time_t, notably NetBSD and OpenBSD.
As the code is not able to work with negative time_t values, argument
is now set to 0 for negative values. As a positive side effect, this
results in Epoch being used for such values instead of a date in distant
future. | 0206ebe76f748bb39d9de4dd4b3fce777fdfdccf | nginx | cvefixes | 1 | https://github.com/nginx/nginx | https://github.com/nginx/nginx/commit/0206ebe76f748bb39d9de4dd4b3fce777fdfdccf | 2017-09-13 15:52:01+03:00 |
Introduced time truncation to December 31, 9999 (ticket #1368).
Various buffers are allocated in an assumption that there would be
no more than 4 year digits. This might not be true on platforms
with 64-bit time_t, as 64-bit time_t is able to represent more than that.
Such dates with more than 4 year digits hardly make sense though, as
various date formats in use do not allow them anyway.
As such, all dates are now truncated by ngx_gmtime() to December 31, 9999.
This should have no effect on valid dates, though will prevent potential
buffer overflows on invalid ones. | b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b | nginx | cvefixes | 1 | https://github.com/nginx/nginx | https://github.com/nginx/nginx/commit/b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b | 2017-09-13 15:53:19+03:00 |
Mail: max_errors directive.
Similarly to smtpd_hard_error_limit in Postfix and smtp_max_unknown_commands
in Exim, specifies the number of errors after which the connection is closed. | 173f16f736c10eae46cd15dd861b04b82d91a37a | nginx | cvefixes | 1 | https://github.com/nginx/nginx | https://github.com/nginx/nginx/commit/173f16f736c10eae46cd15dd861b04b82d91a37a | 2021-05-19 03:13:31+03:00 |
5.6.1.4: Use in-memory archive instead of file IO | 0ff832d31470471803b175cfff4e40c1b08ee779 | unrar | cvefixes | 1 | https://github.com/aawc/unrar | https://github.com/aawc/unrar/commit/0ff832d31470471803b175cfff4e40c1b08ee779 | 2018-01-04 12:07:56-08:00 |
security fix | 5d43fdcd215203868d440ffc42036f5f5ffc89fc | firejail | cvefixes | 1 | https://github.com/netblue30/firejail | https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc | 2017-01-06 22:45:11-05:00 |
Check for presence of crsf in admin scripts | f91fbe3d94c8346884271838ae3406ae633f6f15 | ntopng | cvefixes | 1 | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/f91fbe3d94c8346884271838ae3406ae633f6f15 | 2017-01-12 06:45:41-08:00 |
Security fix: prevents empty host from being used | 01f47e04fd7c8d54399c9e465f823f0017069f8f | ntopng | cvefixes | 1 | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f | 2017-02-13 23:47:02+01:00 |
Added code to randomize values returned by rand() | 30610bda60cbfc058f90a1c0a17d0e8f4516221a | ntopng | cvefixes | 1 | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/30610bda60cbfc058f90a1c0a17d0e8f4516221a | 2018-06-17 15:24:25+02:00 |
Improve security of zip/unzip sandbox by switching the sandboxed filesystem from blacklisting directories to whitelisting them. | 4ea8df7403381d9b657b121b3c98d8081b27414d | sandstorm | cvefixes | 1 | https://github.com/sandstorm-io/sandstorm | https://github.com/sandstorm-io/sandstorm/commit/4ea8df7403381d9b657b121b3c98d8081b27414d | 2017-03-01 14:23:15-08:00 |
Fix newline detection in zip paths. | 6e8572ea8bb56d0216bb1b410e5040edc051b120 | sandstorm | cvefixes | 1 | https://github.com/sandstorm-io/sandstorm | https://github.com/sandstorm-io/sandstorm/commit/6e8572ea8bb56d0216bb1b410e5040edc051b120 | 2017-03-01 14:23:15-08:00 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.