189
VMScore

CVE-2020-28928

Published: 24/11/2020 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 189
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In musl libc up to and including 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

musl-libc musl

debian debian linux 9.0

fedoraproject fedora 33

fedoraproject fedora 34

oracle graalvm 20.3.2

oracle graalvm 21.1.0

Vendor Advisories

Debian Bug report logs - #975365 musl: CVE-2020-28928 Package: musl; Maintainer for musl is Reiner Herrmann <reiner@reiner-hde>; Source for musl is src:musl (PTS, buildd, popcon) Reported by: "Roberto C Sanchez" <roberto@debianorg> Date: Sat, 21 Nov 2020 05:24:02 UTC Severity: grave Tags: security, upstream Foun ...
The wcsnrtombs function in all musl libc versions up to 121 has been found to have multiple bugs in the handling of the destination buffer size when limiting the input character count, which can lead to an infinite loop with no progress (no overflow) or to writing past the end of the destination buffer ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2020-28928: musl libc: wcsnrtombs destination buffer overflow <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: ...

Github Repositories

GitHub Action for setup toolchains for cross compilation and cross testing for Rust.

setup-cross-toolchain-action GitHub Action for setup toolchains for cross compilation and cross testing for Rust Usage Inputs Example workflow: Basic usage Example workflow: Multiple targets Example workflow: Doctest Example workflow: Tier 3 targets Platform Support Linux (GNU) Linux (musl) Linux (uClibc) Android FreeBSD NetBSD WASI Windows (MinGW) Windows (LLVM MinGW)

Demonstrate how you can use image scanner called Trivy as a golang library

Description Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers and other artifacts A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc) and application dependencies (Bundler,

AWS ECR client to automated push to ECR and handling of vulnerability

aws-ecr-client AWS ECR client for automated push to ECR and handling of vulnerability scanning results Features: Automatically gets authorization token for ECR repo Can push image to "scanning silo" ECR repo before pushing image to the actual repo (recommended) Can push image only to "scanning silo" ECR repo and skip pushing image to the actual repo (useful

psono ci client

psonoci PSONO CI Client PSONO is a secure Open Source Password Manager, which can be self hosted by anyone so you have to trust no one psonoci allows a secure access to your psono passwords (and other values) within your CI process Usage psonoci --help psonoci 040 Bernd Kaiser Psono CI Client (githubcom/meldron/psonoci) USAGE: psonoci [FLAGS] [OPTIONS] --api-

My Journey Part 1 Managed to run through the first group of instructions simply through following the instructions Moved the dockerfile and all relevant files into the root file ran using simple docker calls inside windows terminal powershell Called using postman call to local host api Finding more trouble on the second part whilst trying to make the dockerfile even smaller P

A rode collector for clair scans

collector-clair A rode collector for clair scans Running standalone clair scanner Download the clair scanner githubcom/arminc/clair-scanner/releases Get the DB started up as well as the scanner: docker run -p 5432:5432 -d --name db arminc/clair-db:latest docker run -p 6060:6060 --link db:postgres -d --name clair arminc/clair-local-scan:latest```

Product Report: Django-NV Generated By Admin User (admin) on 12/23/2021 07:55PM UTC Number of vulnerabilities found: 15 VULNERABILITIES DESCRIPTION VULNERABILITY ID : 9 TITLE: Starting a Process With a Shell, Possible Injection Detected, Security Issue SEVERITY: High RECOMMENDED TIME TO RESOLVE THE ISSUE: 30 days DESCRIPTION: An SQL injection attack consists of insertion or &l