commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Fix command injection on PDB download (#16966) * Fix r_sys_mkdirp with absolute path on Windows * Fix build with --with-openssl * Use RBuffer in r_socket_http_answer() * r_socket_http_answer: Fix read for big responses * Implement r_str_escape_sh() * Cleanup r_socket_connect() on Windows * Fix socket being created without a protocol * Fix socket connect with SSL ##socket * Use select() in r_socket_ready() * Fix read failing if received only protocol answer * Fix double-free * r_socket_http_get: Fail if req. SSL with no support * Follow redirects in r_socket_http_answer() * Fix r_socket_http_get result length with R2_CURL=1 * Also follow redirects * Avoid using curl for downloading PDBs * Use r_socket_http_get() on UNIXs * Use WinINet API on Windows for r_socket_http_get() * Fix command injection * Fix r_sys_cmd_str_full output for binary data * Validate GUID on PDB download * Pass depth to socket_http_get_recursive() * Remove 'r_' and '__' from static function names * Fix is_valid_guid * Fix for comments
04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9
2020-06-10 18:00:00+02:00
Fix #18667 - division by zero in the macho parser ##bin
a07dedb804a82bc01c07072861942dd80c6b6d62
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62
2021-05-07 18:44:49+02:00
Fix #18666 - uaf in python bin parser
5e16e2d1c9fe245e4c17005d779fde91ec0b9c05
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05
2021-05-07 21:09:59+02:00
Fix use-after-free in iobank rbtree usage ##io * See havoc4 bin for reproducer * Reported via huntr.dev by 'Cen Zhang'
37897226a1a31f982bfefdc4aeefc2e50355c73c
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c
2022-01-06 21:57:58+01:00
Fix null deref in xnu.kernelcache ##crash * Reported by @xshad3 via huntr.dev
feaa4e7f7399c51ee6f52deb84dc3f795b4035d6
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6
2022-01-31 02:32:50+01:00
Fix oobread segfault in java arith8.class ##crash * Reported by Cen Zhang via huntr.dev
9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa
2022-02-07 23:58:09+01:00
Fix bins/*/rep8 - UAF crash in pyc parser ##crash * Reported by Cen Zhang via huntr.dev
8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8
2022-02-07 23:58:09+01:00
Fix negative index in anal.arm64.cs ##crash * Reported by Cen Zhang via huntr.dev
d17a7bdf166108a29a27cd89bf454f9fa6c050d6
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6
2022-02-07 23:58:09+01:00
Fix UAF in pyc parser ##crash * Reported by Cen Zhang via huntr.dev * Reproducer: bins/fuzzed/harep2.pyc
35482cb760db10f87a62569e2f8872dbd95e9269
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269
2022-02-08 00:55:09+01:00
Improve boundary checks to fix oobread segfaults ##crash * Reported by Cen Zhang via huntr.dev * Reproducer: bins/fuzzed/javaoob-havoc.class
6c4428f018d385fc80a33ecddcb37becea685dd5
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5
2022-02-08 15:03:16+01:00
Prefer memleak over usaf in io.bank's rbtree bug ##crash * That's a workaround, proper fix will come later * Reproducer: bins/fuzzed/iobank-crash * Reported by Akyne Choi via huntr.dev
b5cb90b28ec71fda3504da04e3cc94a362807f5e
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e
2022-02-13 22:34:24+01:00
Fix heap buffer overflow in dyldcache parser ##crash * Reported by: Lazymio via huntr.dev * Reproducer: dyldovf
c84b7232626badd075caf3ae29661b609164bac6
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6
2022-02-18 12:45:44+01:00
Fix DoS in the minidump parser ##crash * Reported by lazymio via huntr.dev * Reproducer: mdmp-dos
27fe8031782d3a06c3998eaa94354867864f9f1b
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b
2022-02-21 18:32:36+01:00
Fix null deref in bin.symbols ##crash * Reported by cnitlrt via huntr.dev
515e592b9bea0612bc63d8e93239ff35bcf645c7
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7
2022-02-21 18:47:11+01:00
Fix oobread in macho core symbolication ##crash * Reported by @cnitlrt via huntr.dev
a35f89f86ed12161af09330e92e5a213014e46a1
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1
2022-02-21 19:25:02+01:00
Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash * Reported by lazymio * Reproducer: AAA4AAAAAB4=
634b886e84a5c568d243e744becc6b3223e089cf
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf
2022-02-24 04:53:06+01:00
aaef on arm/thumb switches causes uaf ##crash * Reported by peacock-doris via huntr.dev * Reproducer: poc_uaf_r_reg_get
10517e3ff0e609697eb8cde60ec8dc999ee5ea24
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24
2022-03-04 11:11:49+01:00
Fix UAF in aaaa on arm/thumb switching ##crash * Reported by @peacock-doris via huntr.dev * Reproducer tests_65185 * This is a logic fix, but not the fully safe as changes in the code can result on UAF again, to properly protect r2 from crashing we need to break the ABI and add refcounting to RRegItem, which can't happen in 5.6.x because of abi-compat rules
a7ce29647fcb38386d7439696375e16e093d6acb
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb
2022-03-21 18:46:53+01:00
Fix heap OOB read in macho.iterate_chained_fixups ##crash * Reported by peacock-doris via huntr.dev * Reproducer 'tests_65305' mrmacete: * Return early if segs_count is 0 * Initialize segs_count also for reconstructed fixups Co-authored-by: pancake <[email protected]> Co-authored-by: Francesco Tamagni <[email protected]>
0052500c1ed5bf8263b26b9fd7773dbdc6f170c4
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4
2022-03-22 16:56:27+01:00
Fix oobread in symbols header parsing ##bin
d4ce40b516ffd70cf2e9e36832d8de139117d522
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522
2022-03-24 10:12:05+01:00
Fix 1 byte oobread in the cris analysis plugin ##crash
605785b65dd356d46d4487faa41dbf90943b8bc1
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1
2022-04-01 21:03:24+02:00
Fix oobread in the macho parser ##crash * Reported by @Han0nly via huntr.dev * Reproducers: heapoverflow1 * BountyID: e589bd97-4c74-4e79-93b5-0951a281facc
ca8d8b39f3e34a4fd943270330b80f1148129de4
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4
2022-04-05 12:11:05+02:00
Fix oobread segfaults in the NE bin parser ##crash * Reported by @han0nly via huntr.dev * Reproducers: seed1 seed2 * BountyID: ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40
2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6
2022-04-05 19:10:49+02:00
Fix another oobread segfault in the NE bin parser ##crash * Reported by @han0nly via huntr.dev * Reproducers: sample1 sample2 sample3 * BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200
c40a4f9862104ede15d0ba05ccbf805923070778
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778
2022-04-05 19:10:49+02:00
Fix oobread in dyldcache ##crash * Reported by @hdthky via huntr.dev * Reproducers: poc1 * BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82
2b77b277d67ce061ee6ef839e7139ebc2103c1e3
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3
2022-04-05 19:51:03+02:00
Fix null deref in the ne parser ##crash * Reported by @hmsec via huntr.dev * Reproducer: nepoc00 * BountyID: bfeb8fb8-644d-4587-80d4-cb704c404013
18d1d064bf599a255d55f09fca3104776fc34a67
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67
2022-04-08 19:49:21+02:00
Fix oobread in NE parser ##crash * Reported by @hmsec via huntr.dev * Reproducer: necrash * BountyID: 52b57274-0e1a-4d61-ab29-1373b555fea0/
153bcdc29f11cd8c90e7d639a7405450f644ddb6
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6
2022-04-08 20:29:01+02:00
Fix UAF in `aaef` ##crash * Reported by @hdthky * Reproducer: uaf-aef * BountyID: e98ad92c-3a64-48fb-84d4-d13afdbcbdd7
64a82e284dddabaeb549228380103b57dead32a6
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6
2022-04-08 20:39:43+02:00
Fix oobread and unaligned casts in the NE entrypoint logic ##crash * Reported by @hmsec via huntr.dev * Reproducer: nepocaligns * BountyID: ec538fa4-06c6-4050-a141-f60153ddeaac
0a557045476a2969c7079aec9eeb29d02f2809c6
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6
2022-04-11 13:46:41+02:00
Fix null deref in ne parser ##crash * Reported by @cnitlrt via huntr.dev * BountyID: d8b6d239-6d7b-4783-b26b-5be848c01aa1/ * Reproducer: nenull
48f0ea79f99174fb0a62cb2354e13496ce5b7c44
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44
2022-04-17 00:38:35+02:00
Fix oobread bug in NE parser ##crash * Reported by @cnitlrt via huntrdev * BountyID: 02b4b563-b946-4343-9092-38d1c5cd60c9 * Reproducer: neoobread
1dd65336f0f0c351d6ea853efcf73cf9c0030862
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862
2022-04-17 01:06:07+02:00
Fix oobread and null deref in symbols file parser ##crash * Reported by @cnitlrt * BountyID: af6c3e9e-b7df-4d80-b48f-77fdd17b4038/ * Reproducer: symoob
669a404b6d98d5db409a5ebadae4e94b34ef5136
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136
2022-04-22 15:55:12+02:00
Redo minor cleanup in new_rbtree
14189710859c27981adb4c2c2aed2863c1859ec5
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5
2022-04-23 03:17:34+02:00
Fix oobread crash in java parser ##crash * Reported by @bet4it via @huntrdev * BountyID: 229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 * Reproducer: poc4java
0927ed3ae99444e7b47b84e43118deb10fe37529
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529
2022-04-24 21:53:13+02:00
Fix oobread in java parser ##crash * Reported by @bet4it via @huntrdev * BountyID c8f4c2de-7d96-4ad4-857a-c099effca2d6 * Reproducer: bootstrap.class
ecc44b6a2f18ee70ac133365de0e509d26d5e168
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168
2022-04-24 21:53:13+02:00
Fix null deref in macho parser ##crash * Reported by Han0nly via huntrdev * BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449 * Reproducer: machonull
a5aafb99c3965259c84ddcf45a91144bf7eb4cf1
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1
2022-05-10 11:50:25+02:00
Fix 4 byte oobread in msp430 disassembler ##crash * Only crashes with asan builds * Add missing =SN register * Reported by cnitlrt via huntrdev * BountyID: 1c22055b-b015-47a8-a57b-4982978751d0
3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e
2022-05-13 16:11:37+02:00
Fix crash in vtable analysis on UB ##crash * Reported by @greatergoodest via huntrdev * BountyID 0730a95e-c485-4ff2-9a5d-bb3abfda0b17 * Reproducer: minified_crash
919e3ac1a13f753c73e7a8e8d8bb4a143218732d
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d
2022-05-21 22:47:36+02:00
Fix integer overflow in string search causing oobread ##crash * Reported by @greatergoodest via huntrdev * BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04 * Reproducer bfileovf
193f4fe01d7f626e2ea937450f2e0c4604420e9d
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d
2022-05-26 17:42:39+02:00
fix #6872
68338b71a563b24e62617bb629059adc0c94b230
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/68338b71a563b24e62617bb629059adc0c94b230
2017-03-01 15:27:14+01:00
Fix #12374 - oobread crash in truncated dyldcache ##bin (#12381)
30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19
2018-12-03 02:03:00+01:00
Fix #12417/#12418 (arm assembler heap overflows)
e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
2018-12-10 16:42:02+01:00
Fix unmatched array length in core_java.c (issue #16304) (#16313)
ced0223c7a1b3b5344af315715cd28fe7c0d9ebc
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc
2020-03-26 12:02:43+01:00
Fix #16303 - c->table_query double free (#16318)
cb8b683758edddae2d2f62e8e63a738c39f92683
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/cb8b683758edddae2d2f62e8e63a738c39f92683
2020-03-26 12:28:50+01:00
Fix #10498 - Fix crash in fuzzed java files (#10511)
e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/e9ce0d64faf19fa4e9c260250fbdf25e3c11e152
2018-06-27 13:56:59+02:00
Fix #10464 - oobread crash in mdmp (#10683)
eb7deb281df54771fb8ecf5890dc325a7d22d3e2
radare2
cvefixes
1
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2/commit/eb7deb281df54771fb8ecf5890dc325a7d22d3e2
2018-07-09 13:55:45+02:00
BugFix - data length Even tho this is a "LONG" type, it's actually only 4 bytes. Typecasting it to a long* caused a dereference beyond the end of the allocated region. issues#28
f98f5d4adc1c4bd4033638f6167c1bb95d642f89
ytnef
cvefixes
1
https://github.com/yeraze/ytnef
https://github.com/yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89
2017-02-23 14:26:49-05:00
BugFix - Potential OOB with Fields of Size 0 Thanks to @hannob for contributing a malformed TNEF stream with a Version field of size 0. Now such files will return an error indicating invalid data.
3cb0f914d6427073f262e1b2b5fd973e3043cdf7
ytnef
cvefixes
1
https://github.com/yeraze/ytnef
https://github.com/yeraze/ytnef/commit/3cb0f914d6427073f262e1b2b5fd973e3043cdf7
2017-02-24 16:08:02-05:00
Added safety check for Compressed RTF Streams You could potentially overflow the input pointer. in response to #34
22f8346c8d4f0020a40d9f258fdb3bfc097359cc
ytnef
cvefixes
1
https://github.com/yeraze/ytnef
https://github.com/yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc
2017-02-25 07:41:45-05:00
Protect against the directory traversal in mg_upload()
c65c8fdaaa257e0487ab0aaae9e8f6b439335945
mongoose
cvefixes
1
https://github.com/cesanta/mongoose
https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945
2022-01-17 12:08:23+00:00
Fix crash in multipart handling Close cesanta/dev#6974 PUBLISHED_FROM=4d4e4a46eceba10aec8dacb7f8f58bd078c92307
b8402ed0733e3f244588b61ad5fedd093e3cf9cc
mongoose
cvefixes
1
https://github.com/cesanta/mongoose
https://github.com/cesanta/mongoose/commit/b8402ed0733e3f244588b61ad5fedd093e3cf9cc
2017-04-03 09:25:12+00:00
Be much more careful about copying data from the signature header Only look for known tags, and ensure correct type and size where known before copying over. Bump the old arbitrary 16k count limit to 16M limit though, it's not inconceivable that a package could have that many files. While at it, ensure none of these tags exist in the main header, which would confuse us greatly. This is optimized for backporting ease, upstream can remove redundancies and further improve checking later. Reported and initial patches by Demi Marie Obenour. Fixes: RhBug:1935049, RhBug:1933867, RhBug:1935035, RhBug:1934125, ... Fixes: CVE-2021-3421, CVE-2021-20271
d6a86b5e69e46cc283b1e06c92343319beb42e21
rpm
cvefixes
1
https://github.com/rpm-software-management/rpm
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
2021-03-16 12:36:52+02:00
Validate and require subkey binding signatures on PGP public keys All subkeys must be followed by a binding signature by the primary key as per the OpenPGP RFC, enforce the presence and validity in the parser. The implementation is as kludgey as they come to work around our simple-minded parser structure without touching API, to maximise backportability. Store all the raw packets internally as we decode them to be able to access previous elements at will, needed to validate ordering and access the actual data. Add testcases for manipulated keys whose import previously would succeed. Depends on the two previous commits: 7b399fcb8f52566e6f3b4327197a85facd08db91 and 236b802a4aa48711823a191d1b7f753c82a89ec5 Fixes CVE-2021-3521.
bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
rpm
cvefixes
1
https://github.com/rpm-software-management/rpm
https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
2021-10-19 09:41:10+03:00
Validate intermediate symlinks during installation, CVE-2021-35939 Whenever directory changes during unpacking, walk the entire tree from starting from / and validate any symlinks crossed, fail the install on invalid links. This is the first of step of many towards securing our file operations against local tamperers and besides plugging that one CVE, paves the way for the next step by adding the necessary directory fd tracking. This also bumps the rpm OS requirements to a whole new level by requiring the *at() family of calls from POSIX-1.2008. This necessarily does a whole lot of huffing and puffing we previously did not do. It should be possible to cache secure (ie root-owned) directory structures to avoid validating everything a million times but for now, just keeping things simple.
96ec957e281220f8e137a2d5eb23b83a6377d556
rpm
cvefixes
1
https://github.com/rpm-software-management/rpm
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
2022-02-16 10:57:18+02:00
Set file metadata via fd-based ops for everything but symlinks Regular file ops are fd-based already, for the rest we need to open them manually. Files with temporary suffix must never be followed, for directories (and pre-existing FA_TOUCHed files) use the rpm symlink "root or target owner allowed" rule wrt following. This mostly fixes CVE-2021-35938, but as we're not yet using dirfd-based operatiosn for everything there are corner cases left undone. And then there's the plugin API which needs updating for all this.
25a435e90844ea98fe5eb7bef22c1aecf3a9c033
rpm
cvefixes
1
https://github.com/rpm-software-management/rpm
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
2022-02-16 10:57:18+02:00
fix heap-buffer-overflow
d3e402928b6eb3327f8f7d59a9edfa622fec557b
oniguruma
cvefixes
1
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/d3e402928b6eb3327f8f7d59a9edfa622fec557b
2019-08-14 08:41:44+09:00
Fix error handling in scanner when in case of OOM (#3793) This patch fixes #3786 and fixes #3788. JerryScript-DCO-1.0-Signed-off-by: Robert Fancsik [email protected]
69f8e78c2f8d562bd6d8002b5488f1662ac30d24
jerryscript
cvefixes
1
https://github.com/jerryscript-project/jerryscript
https://github.com/jerryscript-project/jerryscript/commit/69f8e78c2f8d562bd6d8002b5488f1662ac30d24
2020-05-27 14:40:43+02:00
Fix adding entries to the internal buffer of a Map object (#3805) When appending the key/value pair separately, garbage collection could be triggered before the value is added, which could cause problems during marking. This patch changes insertion to add both values at the same time, which prevents partial entries from being present in the internal buffer. Fixes #3804. JerryScript-DCO-1.0-Signed-off-by: Dániel Bátyai [email protected]
c2b662170245a16f46ce02eae68815c325d99821
jerryscript
cvefixes
1
https://github.com/jerryscript-project/jerryscript
https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821
2020-05-28 07:55:16+02:00
Cancel 9cdf439 Should not free the pointer in `realloc` since it can cause use-after-free problem.
97319697c8f9f6ff27b32589947e1918e3015503
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/97319697c8f9f6ff27b32589947e1918e3015503
2020-07-02 10:41:03+09:00
proc.c: add `mrb_state` argument to `mrb_proc_copy()`. The function may invoke the garbage collection and it requires `mrb_state` to run.
f5e10c5a79a17939af763b1dcf5232ce47e24a34
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34
2021-12-14 13:35:18+09:00
array.c: fix `mrb_ary_shift_m` initialization bug. The `ARY_PTR` and `ARY_LEN` may be modified in `mrb_get_args`.
27d1e0132a0804581dca28df042e7047fd27eaa8
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8
2021-12-29 15:50:28+09:00
proc.c: should not reference `irep` when copying failed. It may cause broken reference count numbers.
28ccc664e5dcd3f9d55173e9afde77c4705a9ab6
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6
2022-01-01 21:02:58+09:00
class.c: add `obj->c` check before `prepare_singleton_class()`.
31fa3304049fc406a201a72293cce140f0557dca
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca
2022-01-16 22:22:46+09:00
codegen.c: no `OP_HASHADD` required when `val` is false.
b611c43a5de061ec21b343967e1b64c45c373d7e
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e
2022-01-21 15:42:51+09:00
codegen.c: fixed a bug in hash code generation with `!val`.
ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e
2022-02-03 10:40:05+09:00
codegen.c: stack position may be wrong on assignments. When `[]=` access includes keyword arguments.
0849a2885f81cfd82134992c06df3ccd59052ac7
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/0849a2885f81cfd82134992c06df3ccd59052ac7
2022-02-08 13:11:43+09:00
codegen.c: fix a bug in `gen_values()`. - Fix limit handling that fails 15 arguments method calls. - Fix too early argument packing in arrays.
38b164ace7d6ae1c367883a3d67d7f559783faad
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/38b164ace7d6ae1c367883a3d67d7f559783faad
2022-02-12 12:39:35+09:00
vm.c: should check type before hash access. Since the operand of double splat (`**`) may not be a hash, simple assertion (previous code since d42a64e) was not enough for this case.
ff3a5ebed6ffbe3e70481531cfb969b497aa73ad
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad
2022-02-15 18:36:38+09:00
vm.c: packed arguments length may be zero for `send` method.
47068ae07a5fa3aa9a1879cdfe98a9ce0f339299
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299
2022-02-18 14:38:07+09:00
codegen.c: adjust stack position for `OP_SUPER` instruction.
44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d
2022-02-19 16:17:33+09:00
codegen.c: fix a argument generation bug in array assignment.
f72315575f78a9a773adbce0ee7d3ec33434cb76
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76
2022-02-22 11:06:20+09:00
fiber.c: should pack 15+ arguments in an array.
da48e7dbb20024c198493b8724adae1b842083aa
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa
2022-03-09 15:21:15+09:00
vm.c: stack may be reallocated in functions calls. Probably due to recursive VM calls via `mrb_funcall()`.
aaa28a508903041dd7399d4159a8ace9766b022f
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f
2022-03-25 12:54:45+09:00
vm.c: vm.c: stack may be reallocated in functions calls; aaa28a5 `mrb_range_new()` also calls VM recursively.
7f5a490d09f4d56801ac3a3e4e39e03e1471b44c
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/7f5a490d09f4d56801ac3a3e4e39e03e1471b44c
2022-03-26 21:06:02+09:00
vm.c: target class may be NULL.
00acae117da1b45b318dc36531a7b0021b8097ae
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae
2022-04-01 16:40:06+09:00
vm.c: create break object before clearing GC arena. Otherwise it possibly cause use-after-free.
3cf291f72224715942beaf8553e42ba8891ab3c6
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6
2022-04-04 12:26:52+09:00
codegen.c: need to pack argument when `n==13` too. Because we have extra 2 arguments coming (kw and rhs).
c8c083cb750606b2da81582cd8e43b442bb143e6
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6
2022-04-09 17:16:12+09:00
class.c: clear method cache after `remove_method`.
b1d0296a937fe278239bdfac840a3fd0e93b3ee9
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9
2022-04-09 17:16:12+09:00
vm.c: check if target_class is NULL (when prepended).
a4d97934d51cb88954cc49161dc1d151f64afb6b
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b
2022-04-22 08:32:18+09:00
vm.c (hash_new_from_regs): stack may be reallocated.
aa7f98dedb68d735a1665d3a289036c88b0c47ce
mruby
cvefixes
1
https://github.com/mruby/mruby
https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce
2022-05-30 01:18:15+09:00
[Fix] Possible out-of-bounds read when computing length of some IT files with pattern loops (OpenMPT: formats that are converted to IT, libopenmpt: IT/ITP/MO3), caught with afl-fuzz. git-svn-id: https://source.openmpt.org/svn/openmpt/trunk/OpenMPT@10027 56274372-70c3-4bfc-bfc3-4c3a0b034d27
7ebf02af2e90f03e0dbd0e18b8b3164f372fb97c
openmpt
cvefixes
1
https://github.com/openmpt/openmpt
https://github.com/openmpt/openmpt/commit/7ebf02af2e90f03e0dbd0e18b8b3164f372fb97c
2018-04-07 16:04:51+00:00
CVE-2018-10756: Fix heap-use-after-free in tr_variantWalk In libtransmission/variant.c, function tr_variantWalk, when the variant stack is reallocated, a pointer to the previously allocated memory region is kept. This address is later accessed (heap use-after-free) while walking back down the stack, causing the application to crash. The application can be any application which uses libtransmission, such as transmission-daemon, transmission-gtk, transmission-show, etc. Reported-by: Tom Richards <[email protected]>
2123adf8e5e1c2b48791f9d22fc8c747e974180e
transmission
cvefixes
1
https://github.com/transmission/transmission
https://github.com/transmission/transmission/commit/2123adf8e5e1c2b48791f9d22fc8c747e974180e
2020-04-29 17:29:38+03:00
rdppm.c: Fix buf overrun caused by bad binary PPM This extends the fix in 1e81b0c3ea26f4ea8f56de05367469333de64a9f to include binary PPM files with maximum values < 255, thus preventing a malformed binary PPM input file with those specifications from triggering an overrun of the rescale array and potentially crashing cjpeg, TJBench, or any program that uses the tjLoadImage() function. Fixes #433
3de15e0c344d11d4b90f4a47136467053eb2d09a
libjpeg-turbo
cvefixes
1
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a
2020-06-02 14:51:17-05:00
tjLoadImage: Fix issues w/loading 16-bit PPMs/PGMs - The PPM reader now throws an error rather than segfaulting (due to a buffer overrun) if an application attempts to load a 16-bit PPM file into a grayscale uncompressed image buffer. No known applications allowed that (not even the test applications in libjpeg-turbo), because that mode of operation was never expected to work and did not work under any circumstances. (In fact, it was necessary to modify TJBench in order to reproduce the issue outside of a fuzzing environment.) This was purely a matter of making the library bow out gracefully rather than crash if an application tries to do something really stupid. - The PPM reader now throws an error rather than generating incorrect pixels if an application attempts to load a 16-bit PGM file into an RGB uncompressed image buffer. - The PPM reader now correctly loads 16-bit PPM files into extended RGB uncompressed image buffers. (Previously it generated incorrect pixels unless the input colorspace was JCS_RGB or JCS_EXT_RGB.) The only way that users could have potentially encountered these issues was through the tjLoadImage() function. cjpeg and TJBench were unaffected.
f35fd27ec641c42d6b115bfa595e483ec58188d2
libjpeg-turbo
cvefixes
1
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2
2021-04-06 16:12:29-05:00
Fix potential corruption issue caused by `delete [].__proto__` (fix #2142)
e069be2ecc5060ef47391716e4de94999595b260
espruino
cvefixes
1
https://github.com/espruino/espruino
https://github.com/espruino/espruino/commit/e069be2ecc5060ef47391716e4de94999595b260
2022-02-08 14:59:00+00:00
Change signature generation to verify by default
23878512c65834d12811b1107d19a001478eca5d
wolfssl
cvefixes
1
https://github.com/wolfssl/wolfssl
https://github.com/wolfssl/wolfssl/commit/23878512c65834d12811b1107d19a001478eca5d
2019-11-27 10:47:03+10:00
Constant time EC map to affine for private operations For fast math, use a constant time modular inverse when mapping to affine when operation involves a private key - key gen, calc shared secret, sign.
1de07da61f0c8e9926dcbd68119f73230dae283f
wolfssl
cvefixes
1
https://github.com/wolfssl/wolfssl
https://github.com/wolfssl/wolfssl/commit/1de07da61f0c8e9926dcbd68119f73230dae283f
2020-03-20 08:59:41+10:00
RSA-PSS: Handle edge case with encoding message to hash When the key is small relative to the digest (1024-bit key, 64-byte hash, 61-byte salt length), the internal message to hash is larger than the output size. Allocate a buffer for the message when this happens.
fb2288c46dd4c864b78f00a47a364b96a09a5c0f
wolfssl
cvefixes
1
https://github.com/wolfssl/wolfssl
https://github.com/wolfssl/wolfssl/commit/fb2288c46dd4c864b78f00a47a364b96a09a5c0f
2020-10-27 12:39:06+10:00
OCSP: improve handling of OCSP no check extension
f93083be72a3b3d956b52a7ec13f307a27b6e093
wolfssl
cvefixes
1
https://github.com/wolfssl/wolfssl
https://github.com/wolfssl/wolfssl/commit/f93083be72a3b3d956b52a7ec13f307a27b6e093
2021-07-16 12:19:39+10:00
fix buffer overrun in gf_bin128_parse closes #1204 closes #1205
f3698bb1bce62402805c3fda96551a23101a32f9
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9
2019-04-11 15:24:52+02:00
fixed potential crash - cf #1263
6170024568f4dda310e98ef7508477b425c58d09
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09
2019-07-07 17:56:28+02:00
fixed potential crash in TS - cf #1264
2320eb73afba753b39b7147be91f7be7afc0eeb7
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7
2019-07-07 17:56:28+02:00
fixed potential crash on PMT IOD parse - cf #1268 #1269
1ab4860609f2e7a35634930571e7d0531297e090
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
2019-07-07 17:56:28+02:00
be stricter in PAT processing - cf #1269
98b727637e32d1d4824101d8947e2dbd573d4fc8
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8
2019-07-07 17:56:28+02:00
fix UAF in audio_sample_entry_Read (#1440)
6063b1a011c3f80cee25daade18154e15e4c058c
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c
2020-03-26 19:17:07+01:00
fixed potential crash - cf #1406
8e585e623b1d666b4ef736ed609264639cb27701
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/8e585e623b1d666b4ef736ed609264639cb27701
2020-06-11 19:28:51+02:00
fixed #1564
093283e727f396130651280609e687cd4778e0d1
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/093283e727f396130651280609e687cd4778e0d1
2020-09-01 16:42:40+02:00
fixed #1565
9eeac00b38348c664dfeae2525bba0cf1bc32349
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/9eeac00b38348c664dfeae2525bba0cf1bc32349
2020-09-01 16:46:07+02:00
fixed #1566
ce01bd15f711d4575b7424b54b3a395ec64c1784
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/ce01bd15f711d4575b7424b54b3a395ec64c1784
2020-09-01 17:05:02+02:00
fixed #1568
8e05648d6b4459facbc783025c5c42d301fef5c3
gpac
cvefixes
1
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/8e05648d6b4459facbc783025c5c42d301fef5c3
2020-09-01 17:10:13+02:00