Show filters
31 Total Results
Displaying 11-20 of 31
Sort by:
Attacker Value
Unknown
CVE-2020-35508
Disclosure Date: March 26, 2021 (last updated November 28, 2024)
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
0
Attacker Value
Unknown
CVE-2021-20197
Disclosure Date: March 26, 2021 (last updated November 28, 2024)
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
0
Attacker Value
Unknown
CVE-2021-28153
Disclosure Date: March 11, 2021 (last updated November 08, 2023)
An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
0
Attacker Value
Unknown
CVE-2021-27218
Disclosure Date: February 15, 2021 (last updated November 08, 2023)
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
0
Attacker Value
Unknown
CVE-2021-27219
Disclosure Date: February 15, 2021 (last updated November 08, 2023)
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
0
Attacker Value
Unknown
CVE-2020-35507
Disclosure Date: January 04, 2021 (last updated November 28, 2024)
There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
0
Attacker Value
Unknown
CVE-2020-35493
Disclosure Date: January 04, 2021 (last updated November 08, 2023)
A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
0
Attacker Value
Unknown
CVE-2020-35494
Disclosure Date: January 04, 2021 (last updated November 08, 2023)
There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.
0
Attacker Value
Unknown
CVE-2020-35496
Disclosure Date: January 04, 2021 (last updated November 08, 2023)
There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
0
Attacker Value
Unknown
CVE-2020-35495
Disclosure Date: January 04, 2021 (last updated November 08, 2023)
There's a flaw in binutils /bfd/pef.c. An attacker who is able to submit a crafted input file to be processed by the objdump program could cause a null pointer dereference. The greatest threat from this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
0