Show filters
1,191 Total Results
Displaying 531-540 of 1,191
Sort by:
Attacker Value
Unknown
CVE-2018-1000001
Disclosure Date: January 31, 2018 (last updated November 26, 2024)
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
0
Attacker Value
Unknown
CVE-2018-6323
Disclosure Date: January 26, 2018 (last updated November 26, 2024)
The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
0
Attacker Value
Unknown
CVE-2018-5950
Disclosure Date: January 23, 2018 (last updated November 08, 2023)
Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.
0
Attacker Value
Unknown
CVE-2018-6003
Disclosure Date: January 22, 2018 (last updated November 08, 2023)
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
0
Attacker Value
Unknown
CVE-2017-18018
Disclosure Date: January 04, 2018 (last updated November 26, 2024)
In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.
0
Attacker Value
Unknown
CVE-2017-1000455
Disclosure Date: January 02, 2018 (last updated November 26, 2024)
GuixSD prior to Git commit 5e66574a128937e7f2fcf146d146225703ccfd5d used POSIX hard links incorrectly, leading the creation of setuid executables in "the store", violating a fundamental security assumption of GNU Guix.
0
Attacker Value
Unknown
CVE-2017-16997
Disclosure Date: December 18, 2017 (last updated November 26, 2024)
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
0
Attacker Value
Unknown
CVE-2017-17531
Disclosure Date: December 14, 2017 (last updated November 26, 2024)
gozilla.c in GNU GLOBAL 4.8.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
0
Attacker Value
Unknown
CVE-2017-17440
Disclosure Date: December 06, 2017 (last updated November 26, 2024)
GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.
0
Attacker Value
Unknown
CVE-2017-17426
Disclosure Date: December 05, 2017 (last updated November 08, 2023)
The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.
0