mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-02-14 15:21:04 +01:00
Add CVE mapping
This commit is contained in:
@@ -14,6 +14,7 @@ a pathologically nested input.
|
||||
|
||||
The flaw was corrected by serializing the DOM tree iteratively instead.
|
||||
"""
|
||||
aliases = ["CVE-2019-15542"]
|
||||
|
||||
[affected.functions]
|
||||
"ammonia::clean" = ["< 2.1.0"]
|
||||
|
||||
@@ -18,6 +18,7 @@ The issue seems to be interlinked with which version of Rust is being used.
|
||||
|
||||
The issue was fixed in crate 3.6.0.
|
||||
"""
|
||||
aliases = ["CVE-2018-20998"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 3.6.0"]
|
||||
|
||||
@@ -12,6 +12,7 @@ This allows an attacker to trigger a SIGABRT by creating length fields that anno
|
||||
|
||||
The flaw was corrected by not preallocating memory.
|
||||
"""
|
||||
aliases = ["CVE-2019-15549"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.6.2"]
|
||||
|
||||
@@ -17,6 +17,7 @@ The v0.8.1 release of the `blake2` crate uses the correct block sizes.
|
||||
Note that this advisory only impacts usage of BLAKE2 with HMAC, and does not
|
||||
impact `Digest` functionality.
|
||||
"""
|
||||
aliases = ["CVE-2019-16143"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.8.1"]
|
||||
|
||||
@@ -12,6 +12,7 @@ A fix was published in version 0.1.3.
|
||||
"""
|
||||
url = "https://github.com/sagebind/isahc/issues/2"
|
||||
keywords = ["memory-management", "memory-corruption"]
|
||||
aliases = ["CVE-2019-16140"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.1.3"]
|
||||
|
||||
@@ -19,6 +19,7 @@ the decode buffer size, and returning a format error if it does not. If an error
|
||||
is returned, the decode buffer is not exposed. Regression tests and an
|
||||
additional fuzzer have been added to prevent similar flaws in the future.
|
||||
"""
|
||||
aliases = ["CVE-2018-20992"]
|
||||
|
||||
[versions]
|
||||
patched = ["=0.3.2", ">= 0.4.1"]
|
||||
|
||||
@@ -16,6 +16,7 @@ access into the memory reserved for the arena.
|
||||
|
||||
The flaw was corrected by implementing generativity correctly in version 0.4.0.
|
||||
"""
|
||||
aliases = ["CVE-2019-16139"]
|
||||
|
||||
[affected.functions]
|
||||
"compact_arena::SmallArena::new" = ["< 0.4.0"]
|
||||
|
||||
@@ -14,6 +14,7 @@ will panic if the value is greater than 2^64/1000 and less than or equal to
|
||||
This flaw was corrected by explicitly checking for the `Max-Age` being in this
|
||||
integer range and clamping the value to the maximum duration value.
|
||||
"""
|
||||
aliases = ["CVE-2017-18589"]
|
||||
|
||||
[versions]
|
||||
patched = ["< 0.6.0", "^0.6.2", ">= 0.7.6"]
|
||||
|
||||
@@ -15,6 +15,7 @@ The flaw was corrected by wrapping elements inside queues in a
|
||||
|
||||
Thanks to @c0gent for reporting the issue.
|
||||
"""
|
||||
aliases = ["CVE-2018-20996"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.4.1"]
|
||||
|
||||
@@ -17,6 +17,7 @@ CA-issued certificate, even if there's a hostname mismatch.
|
||||
The problem was addressed by leveraging rust-openssl's built-in support for
|
||||
hostname verification.
|
||||
"""
|
||||
aliases = ["CVE-2016-10932"]
|
||||
|
||||
[affected]
|
||||
os = ["windows"]
|
||||
|
||||
@@ -13,6 +13,7 @@ is if an application constructs headers based on unsanitized user input.
|
||||
This issue was fixed by replacing all newline characters with a space during serialization of
|
||||
a header value.
|
||||
"""
|
||||
aliases = ["CVE-2017-18587"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.10.2", "< 0.10.0, >= 0.9.18"]
|
||||
|
||||
@@ -22,6 +22,7 @@ Starting from version `0.22`, a breaking change to the interface requires
|
||||
callers to pre-allocate the output buffer and pass a mutable slice instead,
|
||||
avoiding all unsafe code.
|
||||
"""
|
||||
aliases = ["CVE-2019-16138"]
|
||||
|
||||
[affected.functions]
|
||||
"image::hdr::HDRDecoder::read_image_transform" = ["< 0.21.3, >= 0.10.2"]
|
||||
|
||||
@@ -12,6 +12,7 @@ This is equivalent to a use-after-free vulnerability and could allow an attacker
|
||||
|
||||
The flaw was corrected by aborting immediately instead of unwinding the stack in case of panic within `MultiDecoder::read()`. The issue was discovered and fixed by Shnatsel.
|
||||
"""
|
||||
aliases = ["CVE-2019-15552"]
|
||||
|
||||
[affected.functions]
|
||||
"libflate::gzip::MultiDecoder::read" = ["< 0.1.25, >= 0.1.14"]
|
||||
|
||||
@@ -9,6 +9,7 @@ Any signature with a correct length was considered valid.
|
||||
|
||||
This allows an attacker to impersonate any node identity.
|
||||
"""
|
||||
aliases = ["CVE-2019-15545"]
|
||||
|
||||
[versions]
|
||||
patched = ["^0.7.1", ">= 0.8.1"]
|
||||
|
||||
@@ -13,6 +13,7 @@ This allows an attacker to corrupt or take control of the memory.
|
||||
|
||||
The flaw was corrected by Phosphorus15.
|
||||
"""
|
||||
aliases = ["CVE-2019-16880"]
|
||||
|
||||
[versions]
|
||||
patched = ["> 0.9.4"]
|
||||
|
||||
@@ -10,6 +10,7 @@ They also could lead to uninitialized memory being dropped if the field for whic
|
||||
|
||||
The flaw was corrected by using `MaybeUninit`.
|
||||
"""
|
||||
aliases = ["CVE-2019-15553"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.5.0"]
|
||||
|
||||
@@ -13,6 +13,7 @@ description = """
|
||||
input to execute a format string attack, which trivially allows writing
|
||||
arbitrary data to stack memory (functions in the `printw` family).
|
||||
"""
|
||||
aliases = ["CVE-2019-15547", "CVE-2019-15548"]
|
||||
|
||||
[affected.functions]
|
||||
"ncurses::instr" = [">= 0"]
|
||||
|
||||
@@ -12,6 +12,7 @@ subsequent derefernces will execute `std::hints::unreachable_unchecked`.
|
||||
Applications with `panic = "abort"` are not affected, as there will be no
|
||||
subsequent dereferences.
|
||||
"""
|
||||
aliases = ["CVE-2019-16141"]
|
||||
|
||||
[affected.functions]
|
||||
"once_cell::unsync::Lazy::force" = ["< 1.0.1, >= 0.2.5"]
|
||||
|
||||
@@ -18,6 +18,7 @@ by default and exposing APIs to perform hostname verification. Use the
|
||||
`SslConnector` and `SslAcceptor` types to take advantage of these new features
|
||||
(as opposed to the lower-level `SslContext` type).
|
||||
"""
|
||||
aliases = ["CVE-2016-10931"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.9.0"]
|
||||
|
||||
@@ -6,6 +6,7 @@ title = "Use after free in CMS Signing"
|
||||
url = "https://github.com/sfackler/rust-openssl/pull/942"
|
||||
keywords = ["memory-corruption"]
|
||||
description = "Affected versions of the OpenSSL crate used structures after they'd been freed."
|
||||
aliases = ["CVE-2018-20997"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.10.9"]
|
||||
|
||||
@@ -11,6 +11,7 @@ Resetting a streaming state, without finalising it first, creates incorrect resu
|
||||
|
||||
The flaw was corrected by not first checking if the state had already been reset, when calling reset().
|
||||
"""
|
||||
aliases = ["CVE-2018-20999"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.11.2"]
|
||||
|
||||
@@ -9,6 +9,7 @@ description = """
|
||||
allowing hostile input to execute a format string attack, which trivially allows writing
|
||||
arbitrary data to stack memory.
|
||||
"""
|
||||
aliases = ["CVE-2019-15546"]
|
||||
|
||||
[affected.functions]
|
||||
"pancurses::mvprintw" = [">= 0"]
|
||||
|
||||
@@ -15,6 +15,7 @@ This allows an attacker to construct an arbitrary code execution .
|
||||
|
||||
The flaw was reported by Phosphorus15.
|
||||
"""
|
||||
aliases = ["CVE-2019-16881"]
|
||||
|
||||
[versions]
|
||||
patched = ["> 0.3.1"]
|
||||
|
||||
@@ -12,6 +12,7 @@ the portaudio source and build it.
|
||||
A Mallory in the middle can intercept the download with their own archive
|
||||
and get RCE.
|
||||
"""
|
||||
aliases = ["CVE-2016-10933"]
|
||||
|
||||
[versions]
|
||||
patched = []
|
||||
|
||||
@@ -12,6 +12,7 @@ Affected versions of this crate called Vec::reserve() on user-supplied input.
|
||||
This allows an attacker to cause an Out of Memory condition while calling the
|
||||
vulnerable method on untrusted data.
|
||||
"""
|
||||
aliases = ["CVE-2019-15544"]
|
||||
|
||||
[affected.functions]
|
||||
"protobuf::stream::read_raw_bytes_into" = ["< 2.6.0"]
|
||||
|
||||
@@ -15,6 +15,7 @@ without synchronization could lead to unexpected and unpredictable behavior.
|
||||
|
||||
The flaw was corrected in release 0.5.0.
|
||||
"""
|
||||
aliases = ["CVE-2019-16142"]
|
||||
|
||||
[affected.functions]
|
||||
"renderdoc::api::RenderDocV110::trigger_multi_frame_capture" = ["< 0.5.0"]
|
||||
|
||||
@@ -16,6 +16,7 @@ keywords = ["memory-corruption"]
|
||||
#[affected.functions]
|
||||
#"safe_transmute::guarded_transmute_vec_permissive" = [">= 0.4.0, <= 0.10.0"]
|
||||
#"safe_transmute::guarded_transmute_to_bytes_vec" = ["= 0.10.0"]
|
||||
aliases = ["CVE-2018-21000"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.10.1"]
|
||||
|
||||
@@ -13,6 +13,7 @@ certificate.
|
||||
This issue was fixed by properly configuring the trust evaluation logic to
|
||||
perform that check.
|
||||
"""
|
||||
aliases = ["CVE-2017-18588"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.1.12"]
|
||||
|
||||
@@ -24,6 +24,7 @@ This allows an attacker to eventually crash a service.
|
||||
The flaw was corrected by using a padding buffer for the last read from the
|
||||
input. So that we are we never read over the boundary of the input data.
|
||||
"""
|
||||
aliases = ["CVE-2019-15550"]
|
||||
|
||||
[affected]
|
||||
arch = ["x86", "x86_64"]
|
||||
|
||||
@@ -22,6 +22,7 @@ alter program execution.
|
||||
|
||||
The flaw was corrected by properly updating the head and tail of the deque in
|
||||
this case. """
|
||||
aliases = ["CVE-2018-20995"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.1.16"]
|
||||
|
||||
@@ -22,6 +22,7 @@ The flaw was corrected by using a pair of pointers to track the head and tail of
|
||||
the deque instead of a pair of indices. This pair of pointers are represented
|
||||
using a Rust slice.
|
||||
"""
|
||||
aliases = ["CVE-2019-15543"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.2.0"]
|
||||
|
||||
@@ -18,6 +18,7 @@ they will not be dropped more than once.
|
||||
|
||||
Thank you to @Vurich for reporting this bug.
|
||||
"""
|
||||
aliases = ["CVE-2018-20991"]
|
||||
|
||||
[versions]
|
||||
unaffected = ["< 0.3.2"]
|
||||
|
||||
@@ -12,6 +12,7 @@ An attacker that controls the value passed to `grow` may exploit this flaw to ob
|
||||
|
||||
Credits to @ehuss for discovering, reporting and fixing the bug.
|
||||
"""
|
||||
aliases = ["CVE-2019-15551"]
|
||||
|
||||
[affected.functions]
|
||||
"smallvec::SmallVec::grow" = ["< 0.6.10, >= 0.6.5"]
|
||||
|
||||
@@ -12,6 +12,7 @@ An attacker that controls the value passed to `grow` may exploit this flaw to ob
|
||||
|
||||
Credits to @ehuss for discovering, reporting and fixing the bug.
|
||||
"""
|
||||
aliases = ["CVE-2019-15554"]
|
||||
|
||||
[affected.functions]
|
||||
"smallvec::SmallVec::grow" = ["< 0.6.10, >= 0.6.3"]
|
||||
|
||||
@@ -14,6 +14,7 @@ On strongly ordered CPU architectures like x86, the only real way that this woul
|
||||
|
||||
The flaw was corrected by https://github.com/mvdnes/spin-rs/pull/66.
|
||||
"""
|
||||
aliases = ["CVE-2019-16137"]
|
||||
|
||||
[affected.functions]
|
||||
"spin::RwLock::new" = ["< 0.5.2"]
|
||||
|
||||
@@ -20,6 +20,7 @@ This patch implements `Clone` manually to the interner type, so that the interna
|
||||
PR #10 was also backported to the 0.6 release line in
|
||||
<https://github.com/Robbepop/string-interner/pull/14> and was released in 0.6.4.
|
||||
"""
|
||||
aliases = ["CVE-2019-16882"]
|
||||
|
||||
[versions]
|
||||
patched = ["^0.6.4", ">= 0.7.1"]
|
||||
|
||||
@@ -21,6 +21,7 @@ This has been fixed in https://github.com/alexcrichton/tar-rs/pull/156 and is
|
||||
published as `tar` 0.4.16. Thanks to Max Justicz for discovering this and
|
||||
emailing about the issue!
|
||||
"""
|
||||
aliases = ["CVE-2018-20990"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.4.16"]
|
||||
|
||||
@@ -18,6 +18,7 @@ with Trust-DNS could cause stack overflow and crash the affected software.
|
||||
|
||||
The flaw was corrected by trust-dns-proto 0.4.3 and upcoming 0.5.0 release.
|
||||
"""
|
||||
aliases = ["CVE-2018-20994"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.4.3", ">= 0.5.0-alpha.3" ]
|
||||
|
||||
@@ -18,6 +18,7 @@ The error in untrusted is fixed in release 0.6.2 released 2018-06-21. It's also
|
||||
advisable that users of untrusted check for their sources for cases where errors
|
||||
returned by untrusted are not handled correctly.
|
||||
"""
|
||||
aliases = ["CVE-2018-20989"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.6.2"]
|
||||
|
||||
@@ -14,6 +14,7 @@ that causes an abort while deserializing it.
|
||||
|
||||
The flaw was corrected by checking the recursion depth.
|
||||
"""
|
||||
aliases = ["CVE-2018-20993"]
|
||||
|
||||
[versions]
|
||||
patched = [">= 0.4.1"]
|
||||
|
||||
Reference in New Issue
Block a user