Show filters
462 Total Results
Displaying 131-140 of 462
Sort by:
Attacker Value
Unknown
CVE-2019-13508
Disclosure Date: October 31, 2019 (last updated November 27, 2024)
FreeTDS through 1.1.11 has a Buffer Overflow.
0
Attacker Value
Unknown
CVE-2019-15790
Disclosure Date: October 30, 2019 (last updated February 21, 2025)
Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged running process by exploiting PID recycling. This information could then be used to obtain ASLR offsets for a process with an existing memory corruption vulnerability. The initial fix introduced regressions in the Python Apport library due to a missing argument in Report.add_proc_environ in apport/report.py. It also caused an autopkgtest failure when reading /proc/pid and with Python 2 compatibility by reading /proc maps. The initial and subsequent regression fixes are in 2.20.11-0ubuntu16, 2.20.11-0ubuntu8.6, 2.20.9-0ubuntu7.12, 2.20.1-0ubuntu2.22 and 2.14.1-0ubuntu3.29+esm3.
0
Attacker Value
Unknown
CVE-2019-11483
Disclosure Date: October 29, 2019 (last updated November 27, 2024)
Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.
0
Attacker Value
Unknown
CVE-2019-11481
Disclosure Date: October 29, 2019 (last updated February 21, 2025)
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
0
Attacker Value
Unknown
CVE-2019-11482
Disclosure Date: October 29, 2019 (last updated February 21, 2025)
Sander Bos discovered a time of check to time of use (TOCTTOU) vulnerability in apport that allowed a user to cause core files to be written in arbitrary directories.
0
Attacker Value
Unknown
CVE-2019-11484
Disclosure Date: October 29, 2019 (last updated February 21, 2025)
Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.
0
Attacker Value
Unknown
CVE-2019-11485
Disclosure Date: October 29, 2019 (last updated February 21, 2025)
Sander Bos discovered Apport's lock file was in a world-writable directory which allowed all users to prevent crash handling.
0
Attacker Value
Unknown
CVE-2019-18408
Disclosure Date: October 24, 2019 (last updated November 08, 2023)
archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.
0
Attacker Value
Unknown
CVE-2019-18218
Disclosure Date: October 21, 2019 (last updated November 08, 2023)
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
0
Attacker Value
Unknown
CVE-2019-18197
Disclosure Date: October 18, 2019 (last updated November 27, 2024)
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
0