Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: unixODBC

Found 2 matching suggestions

View:
Compact
Detailed
Untriaged
created 1 month, 3 weeks ago
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible …

The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.

References

Affected products

unixodbc
  • ==before 2.2.14p2

Matching in nixpkgs

Untriaged
Permalink CVE-2024-1013
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 year, 2 months ago
Unixodbc: out of bounds stack write due to pointer-to-integer types conversion

An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.

References

Affected products

unixODBC
compat-unixODBC234

Matching in nixpkgs