mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
1.6 KiB
1.6 KiB
CVE-2020-28928
Description
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
POC
Reference
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/SilveiraLeonardo/experimenting_mkdown
- https://github.com/arindam0310018/04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy
- https://github.com/chaimleib/maclfs
- https://github.com/developer-guy/image-scanning-using-trivy-as-go-library
- https://github.com/fivexl/aws-ecr-client-golang
- https://github.com/fredrkl/trivy-demo
- https://github.com/henrymrrtt67/Sample.WeatherForecast
- https://github.com/meldron/psonoci
- https://github.com/rode/collector-clair
- https://github.com/taiki-e/rust-cross-toolchain
- https://github.com/taiki-e/setup-cross-toolchain-action
- https://github.com/thecyberbaby/Trivy-by-AquaSecurity
- https://github.com/thecyberbaby/Trivy-by-aquaSecurity
- https://github.com/vinamra28/tekton-image-scan-trivy