CVE-2020-12135

bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
VendorProductVersion
whoopsie_projectwhoopsie
𝑥
≤ 0.2.69
mongodbc_driver
𝑥
< 0.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
duo-unix
bookworm
unimportant
bullseye
unimportant
sid
unimportant
trixie
unimportant
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
duo-unix
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
groovy
ignored
focal
needs-triage
eoan
ignored
bionic
needs-triage
xenial
needs-triage
trusty
dne
whoopsie
noble
Fixed 0.2.71
released
mantic
Fixed 0.2.71
released
lunar
Fixed 0.2.71
released
kinetic
Fixed 0.2.71
released
jammy
Fixed 0.2.71
released
impish
Fixed 0.2.71
released
hirsute
Fixed 0.2.71
released
groovy
Fixed 0.2.71
released
focal
Fixed 0.2.69ubuntu0.1
released
eoan
ignored
bionic
Fixed 0.2.62ubuntu0.5
released
xenial
Fixed 0.2.52.5ubuntu0.5
released
trusty
dne