Skip to content

Fix: prevent warning about ascii64 buffer being too small #925

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 21, 2025

Conversation

mattmundell
Copy link
Contributor

What

Leave the size out of the asci64 array declaration.

Why

The compiler puts a NULL terminator on the string, so the ascii64 array was one too short. Leaving out the size lets the compiler sort it out.

References

Closes #924.

The compiler puts a NULL terminator on the string, so the ascii64 array was one too
short. Showing up because gcc-15 warns about it.
@mattmundell mattmundell requested review from a team as code owners May 20, 2025 20:01
Copy link

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

Snapshot Warnings

⚠️: No snapshots were found for the head SHA ac8b7ff.
Ensure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice.

OpenSSF Scorecard

PackageVersionScoreDetails

Scanned Files

Copy link

github-actions bot commented May 20, 2025

🔍 Vulnerabilities of harbor-os.greenbone.net/community/gvm-libs:925-merge-amd64

📦 Image Reference harbor-os.greenbone.net/community/gvm-libs:925-merge-amd64
digestsha256:356633a02890dda5649f6b9a6bc46a77d1d575d7a4fb4c50d66401c291aaed27
vulnerabilitiescritical: 0 high: 0 medium: 2 low: 20
size48 MB
packages200
📦 Base Image debian:testing-20250428-slim
also known as
  • testing-slim
digestsha256:70d14e03842f014839039e170ffb94ff81e1755e2d31a1d840b6422c40a60165
vulnerabilitiescritical: 0 high: 0 medium: 1 low: 8
critical: 0 high: 0 medium: 1 low: 0 sqlite3 3.46.1-3 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

medium : CVE--2025--29088

Affected range<3.46.1-4
Fixed version3.46.1-4
EPSS Score0.04%
EPSS Percentile14th percentile
Description

In SQLite 3.49.0 before 3.49.1, certain argument values to sqlite3_db_config (in the C-language API) can cause a denial of service (application crash). An sz*nBig multiplication is not cast to a 64-bit integer, and consequently some memory allocations may be incorrect.


critical: 0 high: 0 medium: 1 low: 0 glib2.0 2.84.1-2 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

medium : CVE--2025--4373

Affected range<2.84.1-3
Fixed version2.84.1-3
EPSS Score0.05%
EPSS Percentile16th percentile
Description

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.


critical: 0 high: 0 medium: 0 low: 4 systemd 257.5-2 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2023--31439

Affected range>=257.5-2
Fixed versionNot Fixed
EPSS Score0.09%
EPSS Percentile28th percentile
Description

An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."


low : CVE--2023--31438

Affected range>=257.5-2
Fixed versionNot Fixed
EPSS Score0.10%
EPSS Percentile29th percentile
Description

An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."


low : CVE--2023--31437

Affected range>=257.5-2
Fixed versionNot Fixed
EPSS Score0.13%
EPSS Percentile34th percentile
Description

An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."


low : CVE--2013--4392

Affected range>=257.5-2
Fixed versionNot Fixed
EPSS Score0.14%
EPSS Percentile35th percentile
Description

systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.


critical: 0 high: 0 medium: 0 low: 4 openldap 2.6.9+dfsg-2 (deb)

pkg:deb/debian/[email protected]%2Bdfsg-2?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2020--15719

Affected range>=2.6.9+dfsg-2
Fixed versionNot Fixed
EPSS Score0.37%
EPSS Percentile58th percentile
Description

libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


low : CVE--2017--17740

Affected range>=2.6.9+dfsg-2
Fixed versionNot Fixed
EPSS Score2.07%
EPSS Percentile83rd percentile
Description

contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


low : CVE--2017--14159

Affected range>=2.6.9+dfsg-2
Fixed versionNot Fixed
EPSS Score0.11%
EPSS Percentile31st percentile
Description

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


low : CVE--2015--3276

Affected range>=2.6.9+dfsg-2
Fixed versionNot Fixed
EPSS Score2.15%
EPSS Percentile83rd percentile
Description

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


  • openldap (unimportant)
    Debian builds with GNUTLS, not NSS
critical: 0 high: 0 medium: 0 low: 3 krb5 1.21.3-5 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2024--26461

Affected range>=1.21.3-5
Fixed versionNot Fixed
EPSS Score0.05%
EPSS Percentile14th percentile
Description

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.


low : CVE--2024--26458

Affected range>=1.21.3-5
Fixed versionNot Fixed
EPSS Score0.07%
EPSS Percentile23rd percentile
Description

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.


low : CVE--2018--5709

Affected range>=1.21.3-5
Fixed versionNot Fixed
EPSS Score0.46%
EPSS Percentile63rd percentile
Description

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.


critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.11.0-7 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2024--2236

Affected range>=1.11.0-7
Fixed versionNot Fixed
EPSS Score0.20%
EPSS Percentile42nd percentile
Description

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


low : CVE--2018--6829

Affected range>=1.11.0-7
Fixed versionNot Fixed
EPSS Score1.27%
EPSS Percentile78th percentile
Description

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


critical: 0 high: 0 medium: 0 low: 1 hiredis 1.2.0-6 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2025--29479

Affected range>=1.2.0-6
Fixed versionNot Fixed
EPSS Score0.01%
EPSS Percentile1st percentile
Description

Buffer Overflow in hiredis 1.2.0 allows a local attacker to cause a denial of service via the sdscatlen function.


REJECTED

critical: 0 high: 0 medium: 0 low: 1 pam 1.7.0-3 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2024--10963

Affected range>=1.7.0-3
Fixed versionNot Fixed
EPSS Score0.13%
EPSS Percentile34th percentile
Description

A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.


critical: 0 high: 0 medium: 0 low: 1 gnutls28 3.8.9-2 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2011--3389

Affected range>=3.8.9-2
Fixed versionNot Fixed
EPSS Score5.42%
EPSS Percentile90th percentile
Description

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.


critical: 0 high: 0 medium: 0 low: 1 perl 5.40.1-3 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2011--4116

Affected range>=5.40.1-3
Fixed versionNot Fixed
EPSS Score0.81%
EPSS Percentile73rd percentile
Description

_is_safe in the File::Temp module for Perl does not properly handle symlinks.


critical: 0 high: 0 medium: 0 low: 1 tar 1.35+dfsg-3.1 (deb)

pkg:deb/debian/[email protected]%2Bdfsg-3.1?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2005--2541

Affected range>=1.35+dfsg-3.1
Fixed versionNot Fixed
EPSS Score2.81%
EPSS Percentile85th percentile
Description

Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


This is intended behaviour, after all tar is an archiving tool and you
need to give -p as a command line flag

critical: 0 high: 0 medium: 0 low: 1 openssl 3.5.0-1 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2010--0928

Affected range>=3.2.2-1
Fixed versionNot Fixed
EPSS Score0.10%
EPSS Percentile29th percentile
Description

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
openssl/openssl#24540
Fault injection based attacks are not within OpenSSLs threat model according
to the security policy: https://www.openssl.org/policies/general/security-policy.html

critical: 0 high: 0 medium: 0 low: 1 cjson 1.7.18-3 (deb)

pkg:deb/debian/[email protected]?os_distro=trixie&os_name=debian&os_version=unstable

low : CVE--2023--26819

Affected range>=1.7.18-3
Fixed versionNot Fixed
EPSS Score0.02%
EPSS Percentile3rd percentile
Description

cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.


@mattmundell mattmundell merged commit 2514f01 into main May 21, 2025
28 checks passed
@mattmundell mattmundell deleted the null-term-buf branch May 21, 2025 14:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

22.21.0: build failure with GCC 15
2 participants