Commit Graph

10 Commits (main)

Author SHA1 Message Date
GitHub Action 3d255ddfdd Auto Template Signing [Sat Jun 8 16:02:16 UTC 2024] 🤖 2024-06-08 16:02:18 +00:00
GitHub Action f559aeaeb9 TemplateMan Update [Fri Jun 7 10:04:28 UTC 2024] 🤖 2024-06-07 10:04:29 +00:00
Prince Chaddha 51db5ea193 Revert "TemplateMan Update [Mon Apr 8 11:30:07 UTC 2024] 🤖"
This reverts commit 433dda4ae5.
2024-04-08 17:04:33 +05:30
GitHub Action 433dda4ae5 TemplateMan Update [Mon Apr 8 11:30:07 UTC 2024] 🤖 2024-04-08 11:30:08 +00:00
GitHub Action d62f95fce6 Auto Template Signing [Mon Mar 25 11:57:16 UTC 2024] 🤖 2024-03-25 11:57:17 +00:00
GitHub Action c491aa6724 TemplateMan Update [Sat Mar 23 09:28:19 UTC 2024] 🤖 2024-03-23 09:28:20 +00:00
GitHub Action 8931c00fa3 Auto Template Signing [Mon Mar 4 09:35:31 UTC 2024] 🤖 2024-03-04 09:35:32 +00:00
GitHub Action c7b50b2af4 TemplateMan Update [Mon Mar 4 08:20:22 UTC 2024] 🤖 2024-03-04 08:20:22 +00:00
GitHub Action 7c46896600 Auto Template Signing [Mon Feb 12 18:33:19 UTC 2024] 🤖 2024-02-12 18:33:20 +00:00
GwanYeong Kim 2151dff365 Create CVE-2023-6246.yaml
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2024-02-01 19:32:38 +09:00