commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
Fix command injection on PDB download (#16966)
* Fix r_sys_mkdirp with absolute path on Windows
* Fix build with --with-openssl
* Use RBuffer in r_socket_http_answer()
* r_socket_http_answer: Fix read for big responses
* Implement r_str_escape_sh()
* Cleanup r_socket_connect() on Windows
* Fix socket being created without a protocol
* Fix socket connect with SSL ##socket
* Use select() in r_socket_ready()
* Fix read failing if received only protocol answer
* Fix double-free
* r_socket_http_get: Fail if req. SSL with no support
* Follow redirects in r_socket_http_answer()
* Fix r_socket_http_get result length with R2_CURL=1
* Also follow redirects
* Avoid using curl for downloading PDBs
* Use r_socket_http_get() on UNIXs
* Use WinINet API on Windows for r_socket_http_get()
* Fix command injection
* Fix r_sys_cmd_str_full output for binary data
* Validate GUID on PDB download
* Pass depth to socket_http_get_recursive()
* Remove 'r_' and '__' from static function names
* Fix is_valid_guid
* Fix for comments | 04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9 | 2020-06-10 18:00:00+02:00 |
Fix #18667 - division by zero in the macho parser ##bin | a07dedb804a82bc01c07072861942dd80c6b6d62 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 | 2021-05-07 18:44:49+02:00 |
Fix #18666 - uaf in python bin parser | 5e16e2d1c9fe245e4c17005d779fde91ec0b9c05 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05 | 2021-05-07 21:09:59+02:00 |
Fix use-after-free in iobank rbtree usage ##io
* See havoc4 bin for reproducer
* Reported via huntr.dev by 'Cen Zhang' | 37897226a1a31f982bfefdc4aeefc2e50355c73c | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c | 2022-01-06 21:57:58+01:00 |
Fix null deref in xnu.kernelcache ##crash
* Reported by @xshad3 via huntr.dev | feaa4e7f7399c51ee6f52deb84dc3f795b4035d6 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6 | 2022-01-31 02:32:50+01:00 |
Fix oobread segfault in java arith8.class ##crash
* Reported by Cen Zhang via huntr.dev | 9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa | 2022-02-07 23:58:09+01:00 |
Fix bins/*/rep8 - UAF crash in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev | 8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8 | 2022-02-07 23:58:09+01:00 |
Fix negative index in anal.arm64.cs ##crash
* Reported by Cen Zhang via huntr.dev | d17a7bdf166108a29a27cd89bf454f9fa6c050d6 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6 | 2022-02-07 23:58:09+01:00 |
Fix UAF in pyc parser ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/harep2.pyc | 35482cb760db10f87a62569e2f8872dbd95e9269 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269 | 2022-02-08 00:55:09+01:00 |
Improve boundary checks to fix oobread segfaults ##crash
* Reported by Cen Zhang via huntr.dev
* Reproducer: bins/fuzzed/javaoob-havoc.class | 6c4428f018d385fc80a33ecddcb37becea685dd5 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5 | 2022-02-08 15:03:16+01:00 |
Prefer memleak over usaf in io.bank's rbtree bug ##crash
* That's a workaround, proper fix will come later
* Reproducer: bins/fuzzed/iobank-crash
* Reported by Akyne Choi via huntr.dev | b5cb90b28ec71fda3504da04e3cc94a362807f5e | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e | 2022-02-13 22:34:24+01:00 |
Fix heap buffer overflow in dyldcache parser ##crash
* Reported by: Lazymio via huntr.dev
* Reproducer: dyldovf | c84b7232626badd075caf3ae29661b609164bac6 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6 | 2022-02-18 12:45:44+01:00 |
Fix DoS in the minidump parser ##crash
* Reported by lazymio via huntr.dev
* Reproducer: mdmp-dos | 27fe8031782d3a06c3998eaa94354867864f9f1b | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b | 2022-02-21 18:32:36+01:00 |
Fix null deref in bin.symbols ##crash
* Reported by cnitlrt via huntr.dev | 515e592b9bea0612bc63d8e93239ff35bcf645c7 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7 | 2022-02-21 18:47:11+01:00 |
Fix oobread in macho core symbolication ##crash
* Reported by @cnitlrt via huntr.dev | a35f89f86ed12161af09330e92e5a213014e46a1 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1 | 2022-02-21 19:25:02+01:00 |
Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash
* Reported by lazymio
* Reproducer: AAA4AAAAAB4= | 634b886e84a5c568d243e744becc6b3223e089cf | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf | 2022-02-24 04:53:06+01:00 |
aaef on arm/thumb switches causes uaf ##crash
* Reported by peacock-doris via huntr.dev
* Reproducer: poc_uaf_r_reg_get | 10517e3ff0e609697eb8cde60ec8dc999ee5ea24 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24 | 2022-03-04 11:11:49+01:00 |
Fix UAF in aaaa on arm/thumb switching ##crash
* Reported by @peacock-doris via huntr.dev
* Reproducer tests_65185
* This is a logic fix, but not the fully safe as changes in the code
can result on UAF again, to properly protect r2 from crashing we
need to break the ABI and add refcounting to RRegItem, which can't
happen in 5.6.x because of abi-compat rules | a7ce29647fcb38386d7439696375e16e093d6acb | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb | 2022-03-21 18:46:53+01:00 |
Fix heap OOB read in macho.iterate_chained_fixups ##crash
* Reported by peacock-doris via huntr.dev
* Reproducer 'tests_65305'
mrmacete:
* Return early if segs_count is 0
* Initialize segs_count also for reconstructed fixups
Co-authored-by: pancake <[email protected]>
Co-authored-by: Francesco Tamagni <[email protected]> | 0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 | 2022-03-22 16:56:27+01:00 |
Fix oobread in symbols header parsing ##bin | d4ce40b516ffd70cf2e9e36832d8de139117d522 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 | 2022-03-24 10:12:05+01:00 |
Fix 1 byte oobread in the cris analysis plugin ##crash | 605785b65dd356d46d4487faa41dbf90943b8bc1 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1 | 2022-04-01 21:03:24+02:00 |
Fix oobread in the macho parser ##crash
* Reported by @Han0nly via huntr.dev
* Reproducers: heapoverflow1
* BountyID: e589bd97-4c74-4e79-93b5-0951a281facc | ca8d8b39f3e34a4fd943270330b80f1148129de4 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4 | 2022-04-05 12:11:05+02:00 |
Fix oobread segfaults in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: seed1 seed2
* BountyID: ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 | 2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6 | 2022-04-05 19:10:49+02:00 |
Fix another oobread segfault in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: sample1 sample2 sample3
* BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200 | c40a4f9862104ede15d0ba05ccbf805923070778 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778 | 2022-04-05 19:10:49+02:00 |
Fix oobread in dyldcache ##crash
* Reported by @hdthky via huntr.dev
* Reproducers: poc1
* BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 | 2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3 | 2022-04-05 19:51:03+02:00 |
Fix null deref in the ne parser ##crash
* Reported by @hmsec via huntr.dev
* Reproducer: nepoc00
* BountyID: bfeb8fb8-644d-4587-80d4-cb704c404013 | 18d1d064bf599a255d55f09fca3104776fc34a67 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67 | 2022-04-08 19:49:21+02:00 |
Fix oobread in NE parser ##crash
* Reported by @hmsec via huntr.dev
* Reproducer: necrash
* BountyID: 52b57274-0e1a-4d61-ab29-1373b555fea0/ | 153bcdc29f11cd8c90e7d639a7405450f644ddb6 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6 | 2022-04-08 20:29:01+02:00 |
Fix UAF in `aaef` ##crash
* Reported by @hdthky
* Reproducer: uaf-aef
* BountyID: e98ad92c-3a64-48fb-84d4-d13afdbcbdd7 | 64a82e284dddabaeb549228380103b57dead32a6 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6 | 2022-04-08 20:39:43+02:00 |
Fix oobread and unaligned casts in the NE entrypoint logic ##crash
* Reported by @hmsec via huntr.dev
* Reproducer: nepocaligns
* BountyID: ec538fa4-06c6-4050-a141-f60153ddeaac | 0a557045476a2969c7079aec9eeb29d02f2809c6 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6 | 2022-04-11 13:46:41+02:00 |
Fix null deref in ne parser ##crash
* Reported by @cnitlrt via huntr.dev
* BountyID: d8b6d239-6d7b-4783-b26b-5be848c01aa1/
* Reproducer: nenull | 48f0ea79f99174fb0a62cb2354e13496ce5b7c44 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44 | 2022-04-17 00:38:35+02:00 |
Fix oobread bug in NE parser ##crash
* Reported by @cnitlrt via huntrdev
* BountyID: 02b4b563-b946-4343-9092-38d1c5cd60c9
* Reproducer: neoobread | 1dd65336f0f0c351d6ea853efcf73cf9c0030862 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862 | 2022-04-17 01:06:07+02:00 |
Fix oobread and null deref in symbols file parser ##crash
* Reported by @cnitlrt
* BountyID: af6c3e9e-b7df-4d80-b48f-77fdd17b4038/
* Reproducer: symoob | 669a404b6d98d5db409a5ebadae4e94b34ef5136 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136 | 2022-04-22 15:55:12+02:00 |
Redo minor cleanup in new_rbtree | 14189710859c27981adb4c2c2aed2863c1859ec5 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5 | 2022-04-23 03:17:34+02:00 |
Fix oobread crash in java parser ##crash
* Reported by @bet4it via @huntrdev
* BountyID: 229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7
* Reproducer: poc4java | 0927ed3ae99444e7b47b84e43118deb10fe37529 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529 | 2022-04-24 21:53:13+02:00 |
Fix oobread in java parser ##crash
* Reported by @bet4it via @huntrdev
* BountyID c8f4c2de-7d96-4ad4-857a-c099effca2d6
* Reproducer: bootstrap.class | ecc44b6a2f18ee70ac133365de0e509d26d5e168 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168 | 2022-04-24 21:53:13+02:00 |
Fix null deref in macho parser ##crash
* Reported by Han0nly via huntrdev
* BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449
* Reproducer: machonull | a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 | 2022-05-10 11:50:25+02:00 |
Fix 4 byte oobread in msp430 disassembler ##crash
* Only crashes with asan builds
* Add missing =SN register
* Reported by cnitlrt via huntrdev
* BountyID: 1c22055b-b015-47a8-a57b-4982978751d0 | 3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e | 2022-05-13 16:11:37+02:00 |
Fix crash in vtable analysis on UB ##crash
* Reported by @greatergoodest via huntrdev
* BountyID 0730a95e-c485-4ff2-9a5d-bb3abfda0b17
* Reproducer: minified_crash | 919e3ac1a13f753c73e7a8e8d8bb4a143218732d | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d | 2022-05-21 22:47:36+02:00 |
Fix integer overflow in string search causing oobread ##crash
* Reported by @greatergoodest via huntrdev
* BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04
* Reproducer bfileovf | 193f4fe01d7f626e2ea937450f2e0c4604420e9d | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d | 2022-05-26 17:42:39+02:00 |
fix #6872 | 68338b71a563b24e62617bb629059adc0c94b230 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/68338b71a563b24e62617bb629059adc0c94b230 | 2017-03-01 15:27:14+01:00 |
Fix #12374 - oobread crash in truncated dyldcache ##bin (#12381) | 30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19 | 2018-12-03 02:03:00+01:00 |
Fix #12417/#12418 (arm assembler heap overflows) | e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7 | 2018-12-10 16:42:02+01:00 |
Fix unmatched array length in core_java.c (issue #16304) (#16313) | ced0223c7a1b3b5344af315715cd28fe7c0d9ebc | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc | 2020-03-26 12:02:43+01:00 |
Fix #16303 - c->table_query double free (#16318) | cb8b683758edddae2d2f62e8e63a738c39f92683 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/cb8b683758edddae2d2f62e8e63a738c39f92683 | 2020-03-26 12:28:50+01:00 |
Fix #10498 - Fix crash in fuzzed java files (#10511) | e9ce0d64faf19fa4e9c260250fbdf25e3c11e152 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/e9ce0d64faf19fa4e9c260250fbdf25e3c11e152 | 2018-06-27 13:56:59+02:00 |
Fix #10464 - oobread crash in mdmp (#10683) | eb7deb281df54771fb8ecf5890dc325a7d22d3e2 | radare2 | cvefixes | 1 | https://github.com/radareorg/radare2 | https://github.com/radareorg/radare2/commit/eb7deb281df54771fb8ecf5890dc325a7d22d3e2 | 2018-07-09 13:55:45+02:00 |
BugFix - data length
Even tho this is a "LONG" type, it's actually only 4 bytes. Typecasting
it to a long* caused a dereference beyond the end of the allocated
region.
issues#28 | f98f5d4adc1c4bd4033638f6167c1bb95d642f89 | ytnef | cvefixes | 1 | https://github.com/yeraze/ytnef | https://github.com/yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89 | 2017-02-23 14:26:49-05:00 |
BugFix - Potential OOB with Fields of Size 0
Thanks to @hannob for contributing a malformed TNEF stream with
a Version field of size 0. Now such files will return an error
indicating invalid data. | 3cb0f914d6427073f262e1b2b5fd973e3043cdf7 | ytnef | cvefixes | 1 | https://github.com/yeraze/ytnef | https://github.com/yeraze/ytnef/commit/3cb0f914d6427073f262e1b2b5fd973e3043cdf7 | 2017-02-24 16:08:02-05:00 |
Added safety check for Compressed RTF Streams
You could potentially overflow the input pointer.
in response to #34 | 22f8346c8d4f0020a40d9f258fdb3bfc097359cc | ytnef | cvefixes | 1 | https://github.com/yeraze/ytnef | https://github.com/yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc | 2017-02-25 07:41:45-05:00 |
Protect against the directory traversal in mg_upload() | c65c8fdaaa257e0487ab0aaae9e8f6b439335945 | mongoose | cvefixes | 1 | https://github.com/cesanta/mongoose | https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945 | 2022-01-17 12:08:23+00:00 |
Fix crash in multipart handling
Close cesanta/dev#6974
PUBLISHED_FROM=4d4e4a46eceba10aec8dacb7f8f58bd078c92307 | b8402ed0733e3f244588b61ad5fedd093e3cf9cc | mongoose | cvefixes | 1 | https://github.com/cesanta/mongoose | https://github.com/cesanta/mongoose/commit/b8402ed0733e3f244588b61ad5fedd093e3cf9cc | 2017-04-03 09:25:12+00:00 |
Be much more careful about copying data from the signature header
Only look for known tags, and ensure correct type and size where known
before copying over. Bump the old arbitrary 16k count limit to 16M limit
though, it's not inconceivable that a package could have that many files.
While at it, ensure none of these tags exist in the main header,
which would confuse us greatly.
This is optimized for backporting ease, upstream can remove redundancies
and further improve checking later.
Reported and initial patches by Demi Marie Obenour.
Fixes: RhBug:1935049, RhBug:1933867, RhBug:1935035, RhBug:1934125, ...
Fixes: CVE-2021-3421, CVE-2021-20271 | d6a86b5e69e46cc283b1e06c92343319beb42e21 | rpm | cvefixes | 1 | https://github.com/rpm-software-management/rpm | https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 | 2021-03-16 12:36:52+02:00 |
Validate and require subkey binding signatures on PGP public keys
All subkeys must be followed by a binding signature by the primary key
as per the OpenPGP RFC, enforce the presence and validity in the parser.
The implementation is as kludgey as they come to work around our
simple-minded parser structure without touching API, to maximise
backportability. Store all the raw packets internally as we decode them
to be able to access previous elements at will, needed to validate ordering
and access the actual data. Add testcases for manipulated keys whose
import previously would succeed.
Depends on the two previous commits:
7b399fcb8f52566e6f3b4327197a85facd08db91 and
236b802a4aa48711823a191d1b7f753c82a89ec5
Fixes CVE-2021-3521. | bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8 | rpm | cvefixes | 1 | https://github.com/rpm-software-management/rpm | https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8 | 2021-10-19 09:41:10+03:00 |
Validate intermediate symlinks during installation, CVE-2021-35939
Whenever directory changes during unpacking, walk the entire tree from
starting from / and validate any symlinks crossed, fail the install
on invalid links.
This is the first of step of many towards securing our file operations
against local tamperers and besides plugging that one CVE, paves the way
for the next step by adding the necessary directory fd tracking.
This also bumps the rpm OS requirements to a whole new level by requiring
the *at() family of calls from POSIX-1.2008.
This necessarily does a whole lot of huffing and puffing we previously
did not do. It should be possible to cache secure (ie root-owned)
directory structures to avoid validating everything a million times
but for now, just keeping things simple. | 96ec957e281220f8e137a2d5eb23b83a6377d556 | rpm | cvefixes | 1 | https://github.com/rpm-software-management/rpm | https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556 | 2022-02-16 10:57:18+02:00 |
Set file metadata via fd-based ops for everything but symlinks
Regular file ops are fd-based already, for the rest we need to open them
manually. Files with temporary suffix must never be followed, for
directories (and pre-existing FA_TOUCHed files) use the rpm symlink
"root or target owner allowed" rule wrt following.
This mostly fixes CVE-2021-35938, but as we're not yet using dirfd-based
operatiosn for everything there are corner cases left undone. And then
there's the plugin API which needs updating for all this. | 25a435e90844ea98fe5eb7bef22c1aecf3a9c033 | rpm | cvefixes | 1 | https://github.com/rpm-software-management/rpm | https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033 | 2022-02-16 10:57:18+02:00 |
fix heap-buffer-overflow | d3e402928b6eb3327f8f7d59a9edfa622fec557b | oniguruma | cvefixes | 1 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/d3e402928b6eb3327f8f7d59a9edfa622fec557b | 2019-08-14 08:41:44+09:00 |
Fix error handling in scanner when in case of OOM (#3793)
This patch fixes #3786 and fixes #3788.
JerryScript-DCO-1.0-Signed-off-by: Robert Fancsik [email protected] | 69f8e78c2f8d562bd6d8002b5488f1662ac30d24 | jerryscript | cvefixes | 1 | https://github.com/jerryscript-project/jerryscript | https://github.com/jerryscript-project/jerryscript/commit/69f8e78c2f8d562bd6d8002b5488f1662ac30d24 | 2020-05-27 14:40:43+02:00 |
Fix adding entries to the internal buffer of a Map object (#3805)
When appending the key/value pair separately, garbage collection could be
triggered before the value is added, which could cause problems during
marking. This patch changes insertion to add both values at the same
time, which prevents partial entries from being present in the internal
buffer.
Fixes #3804.
JerryScript-DCO-1.0-Signed-off-by: Dániel Bátyai [email protected] | c2b662170245a16f46ce02eae68815c325d99821 | jerryscript | cvefixes | 1 | https://github.com/jerryscript-project/jerryscript | https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821 | 2020-05-28 07:55:16+02:00 |
Cancel 9cdf439
Should not free the pointer in `realloc` since it can cause
use-after-free problem. | 97319697c8f9f6ff27b32589947e1918e3015503 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/97319697c8f9f6ff27b32589947e1918e3015503 | 2020-07-02 10:41:03+09:00 |
proc.c: add `mrb_state` argument to `mrb_proc_copy()`.
The function may invoke the garbage collection and it requires
`mrb_state` to run. | f5e10c5a79a17939af763b1dcf5232ce47e24a34 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34 | 2021-12-14 13:35:18+09:00 |
array.c: fix `mrb_ary_shift_m` initialization bug.
The `ARY_PTR` and `ARY_LEN` may be modified in `mrb_get_args`. | 27d1e0132a0804581dca28df042e7047fd27eaa8 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8 | 2021-12-29 15:50:28+09:00 |
proc.c: should not reference `irep` when copying failed.
It may cause broken reference count numbers. | 28ccc664e5dcd3f9d55173e9afde77c4705a9ab6 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6 | 2022-01-01 21:02:58+09:00 |
class.c: add `obj->c` check before `prepare_singleton_class()`. | 31fa3304049fc406a201a72293cce140f0557dca | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca | 2022-01-16 22:22:46+09:00 |
codegen.c: no `OP_HASHADD` required when `val` is false. | b611c43a5de061ec21b343967e1b64c45c373d7e | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e | 2022-01-21 15:42:51+09:00 |
codegen.c: fixed a bug in hash code generation with `!val`. | ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | 2022-02-03 10:40:05+09:00 |
codegen.c: stack position may be wrong on assignments.
When `[]=` access includes keyword arguments. | 0849a2885f81cfd82134992c06df3ccd59052ac7 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/0849a2885f81cfd82134992c06df3ccd59052ac7 | 2022-02-08 13:11:43+09:00 |
codegen.c: fix a bug in `gen_values()`.
- Fix limit handling that fails 15 arguments method calls.
- Fix too early argument packing in arrays. | 38b164ace7d6ae1c367883a3d67d7f559783faad | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/38b164ace7d6ae1c367883a3d67d7f559783faad | 2022-02-12 12:39:35+09:00 |
vm.c: should check type before hash access.
Since the operand of double splat (`**`) may not be a hash, simple
assertion (previous code since d42a64e) was not enough for this case. | ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | 2022-02-15 18:36:38+09:00 |
vm.c: packed arguments length may be zero for `send` method. | 47068ae07a5fa3aa9a1879cdfe98a9ce0f339299 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299 | 2022-02-18 14:38:07+09:00 |
codegen.c: adjust stack position for `OP_SUPER` instruction. | 44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/44f591aa8f7091e6ca6cb418e428ae6d4ceaf77d | 2022-02-19 16:17:33+09:00 |
codegen.c: fix a argument generation bug in array assignment. | f72315575f78a9a773adbce0ee7d3ec33434cb76 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76 | 2022-02-22 11:06:20+09:00 |
fiber.c: should pack 15+ arguments in an array. | da48e7dbb20024c198493b8724adae1b842083aa | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa | 2022-03-09 15:21:15+09:00 |
vm.c: stack may be reallocated in functions calls.
Probably due to recursive VM calls via `mrb_funcall()`. | aaa28a508903041dd7399d4159a8ace9766b022f | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f | 2022-03-25 12:54:45+09:00 |
vm.c: vm.c: stack may be reallocated in functions calls; aaa28a5
`mrb_range_new()` also calls VM recursively. | 7f5a490d09f4d56801ac3a3e4e39e03e1471b44c | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/7f5a490d09f4d56801ac3a3e4e39e03e1471b44c | 2022-03-26 21:06:02+09:00 |
vm.c: target class may be NULL. | 00acae117da1b45b318dc36531a7b0021b8097ae | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae | 2022-04-01 16:40:06+09:00 |
vm.c: create break object before clearing GC arena.
Otherwise it possibly cause use-after-free. | 3cf291f72224715942beaf8553e42ba8891ab3c6 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6 | 2022-04-04 12:26:52+09:00 |
codegen.c: need to pack argument when `n==13` too.
Because we have extra 2 arguments coming (kw and rhs). | c8c083cb750606b2da81582cd8e43b442bb143e6 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6 | 2022-04-09 17:16:12+09:00 |
class.c: clear method cache after `remove_method`. | b1d0296a937fe278239bdfac840a3fd0e93b3ee9 | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9 | 2022-04-09 17:16:12+09:00 |
vm.c: check if target_class is NULL (when prepended). | a4d97934d51cb88954cc49161dc1d151f64afb6b | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b | 2022-04-22 08:32:18+09:00 |
vm.c (hash_new_from_regs): stack may be reallocated. | aa7f98dedb68d735a1665d3a289036c88b0c47ce | mruby | cvefixes | 1 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce | 2022-05-30 01:18:15+09:00 |
[Fix] Possible out-of-bounds read when computing length of some IT files with pattern loops (OpenMPT: formats that are converted to IT, libopenmpt: IT/ITP/MO3), caught with afl-fuzz.
git-svn-id: https://source.openmpt.org/svn/openmpt/trunk/OpenMPT@10027 56274372-70c3-4bfc-bfc3-4c3a0b034d27 | 7ebf02af2e90f03e0dbd0e18b8b3164f372fb97c | openmpt | cvefixes | 1 | https://github.com/openmpt/openmpt | https://github.com/openmpt/openmpt/commit/7ebf02af2e90f03e0dbd0e18b8b3164f372fb97c | 2018-04-07 16:04:51+00:00 |
CVE-2018-10756: Fix heap-use-after-free in tr_variantWalk
In libtransmission/variant.c, function tr_variantWalk, when the variant
stack is reallocated, a pointer to the previously allocated memory
region is kept. This address is later accessed (heap use-after-free)
while walking back down the stack, causing the application to crash.
The application can be any application which uses libtransmission, such
as transmission-daemon, transmission-gtk, transmission-show, etc.
Reported-by: Tom Richards <[email protected]> | 2123adf8e5e1c2b48791f9d22fc8c747e974180e | transmission | cvefixes | 1 | https://github.com/transmission/transmission | https://github.com/transmission/transmission/commit/2123adf8e5e1c2b48791f9d22fc8c747e974180e | 2020-04-29 17:29:38+03:00 |
rdppm.c: Fix buf overrun caused by bad binary PPM
This extends the fix in 1e81b0c3ea26f4ea8f56de05367469333de64a9f to
include binary PPM files with maximum values < 255, thus preventing a
malformed binary PPM input file with those specifications from
triggering an overrun of the rescale array and potentially crashing
cjpeg, TJBench, or any program that uses the tjLoadImage() function.
Fixes #433 | 3de15e0c344d11d4b90f4a47136467053eb2d09a | libjpeg-turbo | cvefixes | 1 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a | 2020-06-02 14:51:17-05:00 |
tjLoadImage: Fix issues w/loading 16-bit PPMs/PGMs
- The PPM reader now throws an error rather than segfaulting (due to a
buffer overrun) if an application attempts to load a 16-bit PPM file
into a grayscale uncompressed image buffer. No known applications
allowed that (not even the test applications in libjpeg-turbo),
because that mode of operation was never expected to work and did not
work under any circumstances. (In fact, it was necessary to modify
TJBench in order to reproduce the issue outside of a fuzzing
environment.) This was purely a matter of making the library bow out
gracefully rather than crash if an application tries to do something
really stupid.
- The PPM reader now throws an error rather than generating incorrect
pixels if an application attempts to load a 16-bit PGM file into an
RGB uncompressed image buffer.
- The PPM reader now correctly loads 16-bit PPM files into extended
RGB uncompressed image buffers. (Previously it generated incorrect
pixels unless the input colorspace was JCS_RGB or JCS_EXT_RGB.)
The only way that users could have potentially encountered these issues
was through the tjLoadImage() function. cjpeg and TJBench were
unaffected. | f35fd27ec641c42d6b115bfa595e483ec58188d2 | libjpeg-turbo | cvefixes | 1 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2 | 2021-04-06 16:12:29-05:00 |
Fix potential corruption issue caused by `delete [].__proto__` (fix #2142) | e069be2ecc5060ef47391716e4de94999595b260 | espruino | cvefixes | 1 | https://github.com/espruino/espruino | https://github.com/espruino/espruino/commit/e069be2ecc5060ef47391716e4de94999595b260 | 2022-02-08 14:59:00+00:00 |
Change signature generation to verify by default | 23878512c65834d12811b1107d19a001478eca5d | wolfssl | cvefixes | 1 | https://github.com/wolfssl/wolfssl | https://github.com/wolfssl/wolfssl/commit/23878512c65834d12811b1107d19a001478eca5d | 2019-11-27 10:47:03+10:00 |
Constant time EC map to affine for private operations
For fast math, use a constant time modular inverse when mapping to
affine when operation involves a private key - key gen, calc shared
secret, sign. | 1de07da61f0c8e9926dcbd68119f73230dae283f | wolfssl | cvefixes | 1 | https://github.com/wolfssl/wolfssl | https://github.com/wolfssl/wolfssl/commit/1de07da61f0c8e9926dcbd68119f73230dae283f | 2020-03-20 08:59:41+10:00 |
RSA-PSS: Handle edge case with encoding message to hash
When the key is small relative to the digest (1024-bit key, 64-byte
hash, 61-byte salt length), the internal message to hash is larger than
the output size.
Allocate a buffer for the message when this happens. | fb2288c46dd4c864b78f00a47a364b96a09a5c0f | wolfssl | cvefixes | 1 | https://github.com/wolfssl/wolfssl | https://github.com/wolfssl/wolfssl/commit/fb2288c46dd4c864b78f00a47a364b96a09a5c0f | 2020-10-27 12:39:06+10:00 |
OCSP: improve handling of OCSP no check extension | f93083be72a3b3d956b52a7ec13f307a27b6e093 | wolfssl | cvefixes | 1 | https://github.com/wolfssl/wolfssl | https://github.com/wolfssl/wolfssl/commit/f93083be72a3b3d956b52a7ec13f307a27b6e093 | 2021-07-16 12:19:39+10:00 |
fix buffer overrun in gf_bin128_parse
closes #1204
closes #1205 | f3698bb1bce62402805c3fda96551a23101a32f9 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9 | 2019-04-11 15:24:52+02:00 |
fixed potential crash - cf #1263 | 6170024568f4dda310e98ef7508477b425c58d09 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09 | 2019-07-07 17:56:28+02:00 |
fixed potential crash in TS - cf #1264 | 2320eb73afba753b39b7147be91f7be7afc0eeb7 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7 | 2019-07-07 17:56:28+02:00 |
fixed potential crash on PMT IOD parse - cf #1268 #1269 | 1ab4860609f2e7a35634930571e7d0531297e090 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090 | 2019-07-07 17:56:28+02:00 |
be stricter in PAT processing - cf #1269 | 98b727637e32d1d4824101d8947e2dbd573d4fc8 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8 | 2019-07-07 17:56:28+02:00 |
fix UAF in audio_sample_entry_Read (#1440) | 6063b1a011c3f80cee25daade18154e15e4c058c | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c | 2020-03-26 19:17:07+01:00 |
fixed potential crash - cf #1406 | 8e585e623b1d666b4ef736ed609264639cb27701 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/8e585e623b1d666b4ef736ed609264639cb27701 | 2020-06-11 19:28:51+02:00 |
fixed #1564 | 093283e727f396130651280609e687cd4778e0d1 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/093283e727f396130651280609e687cd4778e0d1 | 2020-09-01 16:42:40+02:00 |
fixed #1565 | 9eeac00b38348c664dfeae2525bba0cf1bc32349 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/9eeac00b38348c664dfeae2525bba0cf1bc32349 | 2020-09-01 16:46:07+02:00 |
fixed #1566 | ce01bd15f711d4575b7424b54b3a395ec64c1784 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/ce01bd15f711d4575b7424b54b3a395ec64c1784 | 2020-09-01 17:05:02+02:00 |
fixed #1568 | 8e05648d6b4459facbc783025c5c42d301fef5c3 | gpac | cvefixes | 1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/8e05648d6b4459facbc783025c5c42d301fef5c3 | 2020-09-01 17:10:13+02:00 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.