diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,34 @@ + + RabbitMQ-C -- integer overflow leads to heap corruption + + + net/rabbitmq-c + net/rabbitmq-c-devel + 0.10.0 + +

alanxz reports:

+
+

When parsing a frame header, validate that the frame_size is less than + or equal to INT32_MAX. Given frame_max is limited between 0 and + INT32_MAX in amqp_login and friends, this does not change the API. + This prevents a potential buffer overflow when a malicious client sends + a frame_size that is close to UINT32_MAX, in which causes an overflow + when computing state->target_size resulting in a small value there. A + buffer is then allocated with the small amount, then memcopy copies the + frame_size writing to memory beyond the end of the buffer.

+
+ + + + CVE-2019-18609 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18609 + + + 2019-10-29 + 2021-06-25 + +
+ PuppetDB -- SQL Injection @@ -8,7 +39,6 @@ puppetdb7 7.4.1 - @@ -25,9 +55,6 @@ 2021-06-24 - 2021-06-25 - - Ansible -- Templating engine bug