Show filters
170 Total Results
Displaying 41-50 of 170
Sort by:
Attacker Value
Unknown
CVE-2018-11236
Disclosure Date: May 18, 2018 (last updated November 08, 2023)
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
0
Attacker Value
Unknown
CVE-2018-11237
Disclosure Date: May 18, 2018 (last updated November 26, 2024)
An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
0
Attacker Value
Unknown
CVE-2018-1111
Disclosure Date: May 17, 2018 (last updated November 26, 2024)
DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
0
Attacker Value
Unknown
CVE-2018-1087
Disclosure Date: May 15, 2018 (last updated November 26, 2024)
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
0
Attacker Value
Unknown
CVE-2018-1118
Disclosure Date: May 10, 2018 (last updated November 26, 2024)
Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
0
Attacker Value
Unknown
CVE-2018-10675
Disclosure Date: May 02, 2018 (last updated November 26, 2024)
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
0
Attacker Value
Unknown
CVE-2018-10322
Disclosure Date: April 24, 2018 (last updated November 26, 2024)
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
0
Attacker Value
Unknown
CVE-2018-8905
Disclosure Date: March 22, 2018 (last updated November 26, 2024)
In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.
0
Attacker Value
Unknown
CVE-2018-8088
Disclosure Date: March 20, 2018 (last updated November 08, 2023)
org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.
0
Attacker Value
Unknown
CVE-2018-1068
Disclosure Date: March 16, 2018 (last updated November 26, 2024)
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
0