Show filters
1,191 Total Results
Displaying 51-60 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2023-4692

Disclosure Date: October 25, 2023 (last updated May 22, 2024)
An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
Attacker Value
Unknown

CVE-2023-4156

Disclosure Date: September 25, 2023 (last updated October 08, 2023)
A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.
Attacker Value
Unknown

CVE-2023-5156

Disclosure Date: September 25, 2023 (last updated April 25, 2024)
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
Attacker Value
Unknown

CVE-2023-4806

Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Attacker Value
Unknown

CVE-2023-4527

Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Attacker Value
Unknown

CVE-2023-25588

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.
Attacker Value
Unknown

CVE-2023-25586

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.
Attacker Value
Unknown

CVE-2023-25585

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.
Attacker Value
Unknown

CVE-2023-25584

Disclosure Date: September 14, 2023 (last updated February 24, 2024)
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
Attacker Value
Unknown

CVE-2023-4039

Disclosure Date: September 13, 2023 (last updated June 13, 2024)
** DISPUTED ** **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.