gnu CVE Vulnerabilities & Metrics

Focus on gnu vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About gnu Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with gnu. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total gnu CVEs: 699
Earliest CVE date: 13 Sep 1996, 04:00 UTC
Latest CVE date: 11 Feb 2025, 07:15 UTC

Latest CVE reference: CVE-2025-1179

Rolling Stats

30-day Count (Rolling): 4
365-day Count (Rolling): 7

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 300.0%
Year Variation (Calendar): -90.54%

Month Growth Rate (30-day Rolling): 300.0%
Year Growth Rate (365-day Rolling): -90.54%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical gnu CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.93

Max CVSS: 10.0

Critical CVEs (≥9): 37

CVSS Range vs. Count

Range Count
0.0-3.9 209
4.0-6.9 648
7.0-8.9 151
9.0-10.0 37

CVSS Distribution Chart

Top 5 Highest CVSS gnu CVEs

These are the five CVEs with the highest CVSS scores for gnu, sorted by severity first and recency.

All CVEs for gnu

CVE-2025-1179 gnu vulnerability CVSS: 5.1 11 Feb 2025, 07:15 UTC

A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".

CVE-2025-1176 gnu vulnerability CVSS: 5.1 11 Feb 2025, 06:15 UTC

A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue.

CVE-2025-1153 gnu vulnerability CVSS: 2.6 10 Feb 2025, 19:15 UTC

A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component.

CVE-2025-1152 gnu vulnerability CVSS: 2.6 10 Feb 2025, 18:15 UTC

A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."

CVE-2025-0840 gnu vulnerability CVSS: 5.1 29 Jan 2025, 20:15 UTC

A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.

CVE-2024-38428 gnu vulnerability CVSS: 0 16 Jun 2024, 03:15 UTC

url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.

CVE-2024-5742 gnu vulnerability CVSS: 0 12 Jun 2024, 09:15 UTC

A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.

CVE-2024-1048 gnu vulnerability CVSS: 0 06 Feb 2024, 18:15 UTC

A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.

CVE-2024-0911 gnu vulnerability CVSS: 0 06 Feb 2024, 15:15 UTC

A flaw was found in indent, a program for formatting C code. This issue may allow an attacker to trick a user into processing a specially crafted file to trigger a heap-based buffer overflow, causing the application to crash.

CVE-2024-0684 gnu vulnerability CVSS: 0 06 Feb 2024, 09:15 UTC

A flaw was found in the GNU coreutils "split" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.

CVE-2023-7216 gnu vulnerability CVSS: 0 05 Feb 2024, 15:15 UTC

A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, which allows files to be written in arbitrary directories through symlinks.

CVE-2023-6780 gnu vulnerability CVSS: 0 31 Jan 2024, 14:15 UTC

An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.

CVE-2023-6779 gnu vulnerability CVSS: 0 31 Jan 2024, 14:15 UTC

An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.

CVE-2023-6246 gnu vulnerability CVSS: 0 31 Jan 2024, 14:15 UTC

A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.

CVE-2024-0567 gnu vulnerability CVSS: 0 16 Jan 2024, 14:15 UTC

A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.

CVE-2024-0553 gnu vulnerability CVSS: 0 16 Jan 2024, 12:15 UTC

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.

CVE-2023-4001 gnu vulnerability CVSS: 0 15 Jan 2024, 11:15 UTC

An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.

CVE-2023-26157 gnu vulnerability CVSS: 0 02 Jan 2024, 05:15 UTC

Versions of the package libredwg before 0.12.5.6384 are vulnerable to Denial of Service (DoS) due to an out-of-bounds read involving section->num_pages in decode_r2007.c.

CVE-2023-5981 gnu vulnerability CVSS: 0 28 Nov 2023, 12:15 UTC

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

CVE-2023-4949 gnu vulnerability CVSS: 0 10 Nov 2023, 17:15 UTC

An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation.

CVE-2023-4693 gnu vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.

CVE-2023-4692 gnu vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.

CVE-2023-4911 gnu vulnerability CVSS: 0 03 Oct 2023, 18:15 UTC

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

CVE-2023-5156 gnu vulnerability CVSS: 0 25 Sep 2023, 16:15 UTC

A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

CVE-2023-4806 gnu vulnerability CVSS: 0 18 Sep 2023, 17:15 UTC

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

CVE-2023-4527 gnu vulnerability CVSS: 0 18 Sep 2023, 17:15 UTC

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVE-2023-25588 gnu vulnerability CVSS: 0 14 Sep 2023, 21:15 UTC

A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.

CVE-2023-25586 gnu vulnerability CVSS: 0 14 Sep 2023, 21:15 UTC

A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.

CVE-2023-25585 gnu vulnerability CVSS: 0 14 Sep 2023, 21:15 UTC

A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.

CVE-2023-25584 gnu vulnerability CVSS: 0 14 Sep 2023, 21:15 UTC

An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.

CVE-2023-4039 gnu vulnerability CVSS: 0 13 Sep 2023, 09:15 UTC

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVE-2023-4813 gnu vulnerability CVSS: 0 12 Sep 2023, 22:15 UTC

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVE-2022-48065 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.

CVE-2022-48064 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.

CVE-2022-48063 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.

CVE-2022-47696 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.

CVE-2022-47695 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function bfd_mach_o_get_synthetic_symtab in match-o.c.

CVE-2022-47673 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered in Binutils addr2line before 2.39.3, function parse_module contains multiple out of bound reads which may cause a denial of service or other unspecified impacts.

CVE-2022-47011 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered function parse_stab_struct_fields in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

CVE-2022-47010 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered function pr_function_type in prdbg.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

CVE-2022-47008 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered function make_tempdir, and make_tempname in bucomm.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

CVE-2022-47007 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered function stab_demangle_v3_arg in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.

CVE-2022-45703 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Heap buffer overflow vulnerability in binutils readelf before 2.40 via function display_debug_section in file readelf.c.

CVE-2022-44840 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Heap buffer overflow vulnerability in binutils readelf before 2.40 via function find_section_in_set in file readelf.c.

CVE-2022-35206 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Null pointer dereference vulnerability in Binutils readelf 2.38.50 via function read_and_display_attr_value in file dwarf.c.

CVE-2022-35205 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered in Binutils readelf 2.38.50, reachable assertion failure in function display_debug_names allows attackers to cause a denial of service.

CVE-2021-46174 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Heap-based Buffer Overflow in function bfd_getl32 in Binutils objdump 3.37.

CVE-2020-35357 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.

CVE-2020-35342 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak.

CVE-2020-21490 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered in GNU Binutils 2.34. It is a memory leak when process microblaze-dis.c. This one will consume memory on each insn disassembled.

CVE-2020-19726 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

An issue was discovered in binutils libbfd.c 2.36 relating to the auxiliary symbol data allows attackers to read or write to system memory or cause a denial of service.

CVE-2020-19724 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

A memory consumption issue in get_data function in binutils/nm.c in GNU nm before 2.34 allows attackers to cause a denial of service via crafted command.

CVE-2020-19190 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.

CVE-2020-19189 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.

CVE-2020-19188 gnu vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.

CVE-2020-19187 gnu vulnerability CVSS: 0 22 Aug 2023, 19:15 UTC

Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.

CVE-2020-19186 gnu vulnerability CVSS: 0 22 Aug 2023, 19:15 UTC

Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.

CVE-2020-19185 gnu vulnerability CVSS: 0 22 Aug 2023, 19:15 UTC

Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.

CVE-2023-40305 gnu vulnerability CVSS: 0 14 Aug 2023, 06:15 UTC

GNU indent 2.2.13 has a heap-based buffer overflow in search_brace in indent.c via a crafted file.

CVE-2023-40303 gnu vulnerability CVSS: 0 14 Aug 2023, 05:15 UTC

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

CVE-2023-39130 gnu vulnerability CVSS: 0 25 Jul 2023, 19:15 UTC

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap buffer overflow via the function pe_as16() at /gdb/coff-pe-read.c.

CVE-2023-39129 gnu vulnerability CVSS: 0 25 Jul 2023, 19:15 UTC

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c.

CVE-2023-39128 gnu vulnerability CVSS: 0 25 Jul 2023, 19:15 UTC

GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.

CVE-2022-28736 gnu vulnerability CVSS: 0 20 Jul 2023, 01:15 UTC

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

CVE-2022-28735 gnu vulnerability CVSS: 0 20 Jul 2023, 01:15 UTC

The GRUB2's shim_lock verifier allows non-kernel files to be loaded on shim-powered secure boot systems. Allowing such files to be loaded may lead to unverified code and modules to be loaded in GRUB2 breaking the secure boot trust-chain.

CVE-2022-28734 gnu vulnerability CVSS: 0 20 Jul 2023, 01:15 UTC

Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.

CVE-2022-28733 gnu vulnerability CVSS: 0 20 Jul 2023, 01:15 UTC

Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.

CVE-2021-32256 gnu vulnerability CVSS: 0 18 Jul 2023, 14:15 UTC

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack-overflow issue in demangle_type in rust-demangle.c.

CVE-2015-20109 gnu vulnerability CVSS: 0 25 Jun 2023, 17:15 UTC

end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.

CVE-2023-36274 gnu vulnerability CVSS: 0 23 Jun 2023, 15:15 UTC

LibreDWG v0.11 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.

CVE-2023-36273 gnu vulnerability CVSS: 0 23 Jun 2023, 15:15 UTC

LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.

CVE-2023-36272 gnu vulnerability CVSS: 0 23 Jun 2023, 15:15 UTC

LibreDWG v0.10 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.

CVE-2023-36271 gnu vulnerability CVSS: 0 23 Jun 2023, 15:15 UTC

LibreDWG v0.10 to v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.

CVE-2023-2789 gnu vulnerability CVSS: 2.7 18 May 2023, 13:15 UTC

A vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-2491 gnu vulnerability CVSS: 0 17 May 2023, 22:15 UTC

A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.

CVE-2023-1972 gnu vulnerability CVSS: 0 17 May 2023, 22:15 UTC

A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability.

CVE-2021-34337 gnu vulnerability CVSS: 0 15 Apr 2023, 20:16 UTC

An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.

CVE-2023-29491 gnu vulnerability CVSS: 0 14 Apr 2023, 01:15 UTC

ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.

CVE-2023-24626 gnu vulnerability CVSS: 0 08 Apr 2023, 05:15 UTC

socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.

CVE-2023-1579 gnu vulnerability CVSS: 0 03 Apr 2023, 23:15 UTC

Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.

CVE-2023-28617 gnu vulnerability CVSS: 0 19 Mar 2023, 03:15 UTC

org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

CVE-2023-27986 gnu vulnerability CVSS: 0 09 Mar 2023, 06:15 UTC

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.

CVE-2023-27985 gnu vulnerability CVSS: 0 09 Mar 2023, 06:15 UTC

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90

CVE-2023-25222 gnu vulnerability CVSS: 0 01 Mar 2023, 15:15 UTC

A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c.

CVE-2023-27371 gnu vulnerability CVSS: 0 28 Feb 2023, 20:15 UTC

GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.

CVE-2022-48339 gnu vulnerability CVSS: 0 20 Feb 2023, 23:15 UTC

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVE-2022-48338 gnu vulnerability CVSS: 0 20 Feb 2023, 23:15 UTC

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.

CVE-2022-48337 gnu vulnerability CVSS: 0 20 Feb 2023, 23:15 UTC

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2023-0361 gnu vulnerability CVSS: 0 15 Feb 2023, 18:15 UTC

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.

CVE-2023-0687 gnu vulnerability CVSS: 4.0 06 Feb 2023, 19:15 UTC

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVE-2023-25139 gnu vulnerability CVSS: 0 03 Feb 2023, 06:15 UTC

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

CVE-2022-48303 gnu vulnerability CVSS: 0 30 Jan 2023, 04:15 UTC

GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.

CVE-2022-3715 gnu vulnerability CVSS: 0 05 Jan 2023, 15:15 UTC

A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.

CVE-2022-3775 gnu vulnerability CVSS: 0 19 Dec 2022, 20:15 UTC

When rendering certain unicode sequences, grub2's font code doesn't proper validate if the informed glyph's width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2's heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded.

CVE-2022-2601 gnu vulnerability CVSS: 0 14 Dec 2022, 21:15 UTC

A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.

CVE-2022-45332 gnu vulnerability CVSS: 0 30 Nov 2022, 03:15 UTC

LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.

CVE-2022-45939 gnu vulnerability CVSS: 0 28 Nov 2022, 06:15 UTC

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2021-46848 gnu vulnerability CVSS: 0 24 Oct 2022, 14:15 UTC

GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.

CVE-2022-41550 gnu vulnerability CVSS: 0 11 Oct 2022, 22:15 UTC

GNU oSIP v5.3.0 was discovered to contain an integer overflow via the component osip_body_parse_header.

CVE-2022-25310 gnu vulnerability CVSS: 0 06 Sep 2022, 18:15 UTC

A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.

CVE-2022-25309 gnu vulnerability CVSS: 0 06 Sep 2022, 18:15 UTC

A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.

CVE-2022-25308 gnu vulnerability CVSS: 0 06 Sep 2022, 18:15 UTC

A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.

CVE-2022-39832 gnu vulnerability CVSS: 0 05 Sep 2022, 05:15 UTC

An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

CVE-2022-39831 gnu vulnerability CVSS: 0 05 Sep 2022, 05:15 UTC

An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. This issue is different from CVE-2018-20230.

CVE-2021-3826 gnu vulnerability CVSS: 0 01 Sep 2022, 21:15 UTC

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

CVE-2022-1271 gnu vulnerability CVSS: 0 31 Aug 2022, 16:15 UTC

An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.

CVE-2022-39046 gnu vulnerability CVSS: 0 31 Aug 2022, 06:15 UTC

An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the heap.

CVE-2022-39028 gnu vulnerability CVSS: 0 30 Aug 2022, 05:15 UTC

telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.

CVE-2022-38533 gnu vulnerability CVSS: 0 26 Aug 2022, 00:15 UTC

In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.

CVE-2021-4209 gnu vulnerability CVSS: 0 24 Aug 2022, 16:15 UTC

A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.

CVE-2021-3999 gnu vulnerability CVSS: 0 24 Aug 2022, 16:15 UTC

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVE-2021-3998 gnu vulnerability CVSS: 0 24 Aug 2022, 16:15 UTC

A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.

CVE-2022-35164 gnu vulnerability CVSS: 0 18 Aug 2022, 05:15 UTC

LibreDWG v0.12.4.4608 & commit f2dea29 was discovered to contain a heap use-after-free via bit_copy_chain.

CVE-2022-2509 gnu vulnerability CVSS: 0 01 Aug 2022, 14:15 UTC

A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.

CVE-2022-2469 gnu vulnerability CVSS: 0 19 Jul 2022, 16:15 UTC

GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client

CVE-2021-3697 gnu vulnerability CVSS: 4.4 06 Jul 2022, 16:15 UTC

A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.

CVE-2021-3696 gnu vulnerability CVSS: 6.9 06 Jul 2022, 16:15 UTC

A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.

CVE-2021-3695 gnu vulnerability CVSS: 4.4 06 Jul 2022, 16:15 UTC

A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to achieve signifcant results, also the values written into the memory are repeated three times in a row making difficult to produce valid payloads. This flaw affects grub2 versions prior grub-2.12.

CVE-2022-33034 gnu vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c.

CVE-2022-33033 gnu vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

LibreDWG v0.12.4.4608 was discovered to contain a double-free via the function dwg_read_file at dwg.c.

CVE-2022-33032 gnu vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

LibreDWG v0.12.4.4608 was discovered to contain a heap-buffer-overflow via the function decode_preR13_section_hdr at decode_r11.c.

CVE-2022-33028 gnu vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function dwg_add_object at decode.c.

CVE-2022-33027 gnu vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c.

CVE-2022-33026 gnu vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.

CVE-2022-33025 gnu vulnerability CVSS: 6.8 23 Jun 2022, 17:15 UTC

LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function decode_preR13_section at decode_r11.c.

CVE-2022-33024 gnu vulnerability CVSS: 5.0 23 Jun 2022, 17:15 UTC

There is an Assertion `int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *' failed at dwg2dxf: decode.c:5801 in libredwg v0.12.4.4608.

CVE-2021-42586 gnu vulnerability CVSS: 6.8 23 May 2022, 11:16 UTC

A heap buffer overflow was discovered in copy_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.

CVE-2021-42585 gnu vulnerability CVSS: 6.8 23 May 2022, 11:16 UTC

A heap buffer overflow was discovered in copy_compressed_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.

CVE-2022-29458 gnu vulnerability CVSS: 5.8 18 Apr 2022, 21:15 UTC

ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.

CVE-2022-27943 gnu vulnerability CVSS: 4.3 26 Mar 2022, 13:15 UTC

libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.

CVE-2021-46705 gnu vulnerability CVSS: 2.1 16 Mar 2022, 10:15 UTC

A Insecure Temporary File vulnerability in grub-once of grub2 in SUSE Linux Enterprise Server 15 SP4, openSUSE Factory allows local attackers to truncate arbitrary files. This issue affects: SUSE Linux Enterprise Server 15 SP4 grub2 versions prior to 2.06-150400.7.1. SUSE openSUSE Factory grub2 versions prior to 2.06-18.1.

CVE-2021-3981 gnu vulnerability CVSS: 2.1 10 Mar 2022, 17:43 UTC

A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.

CVE-2021-46195 gnu vulnerability CVSS: 4.3 14 Jan 2022, 20:15 UTC

GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.

CVE-2021-46022 gnu vulnerability CVSS: 4.3 14 Jan 2022, 20:15 UTC

An Use-After-Free vulnerability in rec_mset_elem_destroy() at rec-mset.c of GNU Recutils v1.8.90 can lead to a segmentation fault or application crash.

CVE-2021-46021 gnu vulnerability CVSS: 4.3 14 Jan 2022, 20:15 UTC

An Use-After-Free vulnerability in rec_record_destroy() at rec-record.c of GNU Recutils v1.8.90 can lead to a segmentation fault or application crash.

CVE-2021-46019 gnu vulnerability CVSS: 4.3 14 Jan 2022, 20:15 UTC

An untrusted pointer dereference in rec_db_destroy() at rec-db.c of GNU Recutils v1.8.90 can lead to a segmentation fault or application crash.

CVE-2022-23219 gnu vulnerability CVSS: 7.5 14 Jan 2022, 07:15 UTC

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23218 gnu vulnerability CVSS: 7.5 14 Jan 2022, 07:15 UTC

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2021-45950 gnu vulnerability CVSS: 4.3 01 Jan 2022, 00:15 UTC

LibreDWG 0.12.4.4313 through 0.12.4.4367 has an out-of-bounds write in dwg_free_BLOCK_private (called from dwg_free_BLOCK and dwg_free_object).

CVE-2021-45261 gnu vulnerability CVSS: 4.3 22 Dec 2021, 18:15 UTC

An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.

CVE-2021-45078 gnu vulnerability CVSS: 6.8 15 Dec 2021, 20:15 UTC

stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.

CVE-2021-28237 gnu vulnerability CVSS: 7.5 02 Dec 2021, 22:15 UTC

LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13.

CVE-2021-28236 gnu vulnerability CVSS: 5.0 02 Dec 2021, 22:15 UTC

LibreDWG v0.12.3 was discovered to contain a NULL pointer dereference via out_dxfb.c.

CVE-2021-44227 gnu vulnerability CVSS: 6.8 02 Dec 2021, 03:15 UTC

In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.

CVE-2021-37322 gnu vulnerability CVSS: 6.8 18 Nov 2021, 22:15 UTC

GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

CVE-2021-43332 gnu vulnerability CVSS: 4.0 12 Nov 2021, 21:15 UTC

In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.

CVE-2021-43331 gnu vulnerability CVSS: 4.3 12 Nov 2021, 21:15 UTC

In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.

CVE-2021-43414 gnu vulnerability CVSS: 6.9 07 Nov 2021, 18:15 UTC

An issue was discovered in GNU Hurd before 0.9 20210404-9. The use of an authentication protocol in the proc server is vulnerable to man-in-the-middle attacks, which can be exploited for local privilege escalation to get full root access.

CVE-2021-43413 gnu vulnerability CVSS: 9.0 07 Nov 2021, 18:15 UTC

An issue was discovered in GNU Hurd before 0.9 20210404-9. A single pager port is shared among everyone who mmaps a file, allowing anyone to modify any files that they can read. This can be trivially exploited to get full root access.

CVE-2021-43412 gnu vulnerability CVSS: 7.2 07 Nov 2021, 18:15 UTC

An issue was discovered in GNU Hurd before 0.9 20210404-9. libports accepts fake notification messages from any client on any port, which can lead to port use-after-free. This can be exploited for local privilege escalation to get full root access.

CVE-2021-43411 gnu vulnerability CVSS: 8.5 07 Nov 2021, 18:15 UTC

An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access.

CVE-2021-43396 gnu vulnerability CVSS: 5.0 04 Nov 2021, 20:15 UTC

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.

CVE-2021-42097 gnu vulnerability CVSS: 8.5 21 Oct 2021, 01:15 UTC

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover).

CVE-2021-42096 gnu vulnerability CVSS: 4.0 21 Oct 2021, 01:15 UTC

GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password.

CVE-2021-39537 gnu vulnerability CVSS: 6.8 20 Sep 2021, 16:15 UTC

An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.

CVE-2021-39530 gnu vulnerability CVSS: 6.8 20 Sep 2021, 16:15 UTC

An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2nlen() in bits.c has a heap-based buffer overflow.

CVE-2021-39528 gnu vulnerability CVSS: 6.8 20 Sep 2021, 16:15 UTC

An issue was discovered in libredwg through v0.10.1.3751. dwg_free_MATERIAL_private() in dwg.spec has a double free.

CVE-2021-39527 gnu vulnerability CVSS: 6.8 20 Sep 2021, 16:15 UTC

An issue was discovered in libredwg through v0.10.1.3751. appinfo_private() in decode.c has a heap-based buffer overflow.

CVE-2021-39525 gnu vulnerability CVSS: 6.8 20 Sep 2021, 16:15 UTC

An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-based buffer overflow.

CVE-2021-39523 gnu vulnerability CVSS: 4.3 20 Sep 2021, 16:15 UTC

An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function check_POLYLINE_handles() located in decode.c. It allows an attacker to cause Denial of Service.

CVE-2021-39522 gnu vulnerability CVSS: 6.8 20 Sep 2021, 16:15 UTC

An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2len() in bits.c has a heap-based buffer overflow.

CVE-2021-39521 gnu vulnerability CVSS: 4.3 20 Sep 2021, 16:15 UTC

An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function bit_read_BB() located in bits.c. It allows an attacker to cause Denial of Service.

CVE-2021-40491 gnu vulnerability CVSS: 4.3 03 Sep 2021, 02:15 UTC

The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.

CVE-2021-38604 gnu vulnerability CVSS: 5.0 12 Aug 2021, 16:15 UTC

In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.

CVE-2021-38185 gnu vulnerability CVSS: 6.8 08 Aug 2021, 00:15 UTC

GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.

CVE-2021-35942 gnu vulnerability CVSS: 6.4 22 Jul 2021, 18:15 UTC

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVE-2019-25051 gnu vulnerability CVSS: 4.6 20 Jul 2021, 07:15 UTC

objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).

CVE-2021-36080 gnu vulnerability CVSS: 6.8 01 Jul 2021, 03:15 UTC

GNU LibreDWG 0.12.3.4163 through 0.12.3.4191 has a double-free in bit_chain_free (called from dwg_encode_MTEXT and dwg_encode_add_object).

CVE-2021-3530 gnu vulnerability CVSS: 5.0 02 Jun 2021, 15:15 UTC

A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.

CVE-2020-18395 gnu vulnerability CVSS: 5.0 28 May 2021, 21:15 UTC

A NULL-pointer deference issue was discovered in GNU_gama::set() in ellipsoid.h in Gama 2.04 which can lead to a denial of service (DOS) via segment faults caused by crafted inputs.

CVE-2021-3549 gnu vulnerability CVSS: 5.8 26 May 2021, 21:15 UTC

An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.

CVE-2021-33574 gnu vulnerability CVSS: 7.5 25 May 2021, 22:15 UTC

The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.

CVE-2020-23861 gnu vulnerability CVSS: 4.3 18 May 2021, 16:15 UTC

A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.

CVE-2020-23856 gnu vulnerability CVSS: 2.1 18 May 2021, 15:15 UTC

Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.

CVE-2020-21844 gnu vulnerability CVSS: 6.8 17 May 2021, 22:15 UTC

GNU LibreDWG 0.10 is affected by: memcpy-param-overlap. The impact is: execute arbitrary code (remote). The component is: read_2004_section_header ../../src/decode.c:2580.

CVE-2020-21843 gnu vulnerability CVSS: 6.8 17 May 2021, 22:15 UTC

A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_read_RC ../../src/bits.c:318.

CVE-2020-21842 gnu vulnerability CVSS: 6.8 17 May 2021, 22:15 UTC

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_revhistory ../../src/decode.c:3051.

CVE-2020-21831 gnu vulnerability CVSS: 6.8 17 May 2021, 22:15 UTC

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_handles ../../src/decode.c:2637.

CVE-2020-21841 gnu vulnerability CVSS: 6.8 17 May 2021, 21:15 UTC

A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_read_B ../../src/bits.c:135.

CVE-2020-21840 gnu vulnerability CVSS: 6.8 17 May 2021, 21:15 UTC

A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_search_sentinel ../../src/bits.c:1985.

CVE-2020-21839 gnu vulnerability CVSS: 4.3 17 May 2021, 21:15 UTC

An issue was discovered in GNU LibreDWG 0.10. Crafted input will lead to an memory leak in dwg_decode_eed ../../src/decode.c:3638.

CVE-2020-21838 gnu vulnerability CVSS: 6.8 17 May 2021, 21:15 UTC

A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via: read_2004_section_appinfo ../../src/decode.c:2842.

CVE-2020-21836 gnu vulnerability CVSS: 6.8 17 May 2021, 21:15 UTC

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_preview ../../src/decode.c:3175.

CVE-2020-21835 gnu vulnerability CVSS: 4.3 17 May 2021, 21:15 UTC

A null pointer deference issue exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2337.

CVE-2020-21834 gnu vulnerability CVSS: 4.3 17 May 2021, 21:15 UTC

A null pointer deference issue exists in GNU LibreDWG 0.10 via get_bmp ../../programs/dwgbmp.c:164.

CVE-2020-21833 gnu vulnerability CVSS: 6.8 17 May 2021, 21:15 UTC

A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via: read_2004_section_classes ../../src/decode.c:2440.

CVE-2020-21832 gnu vulnerability CVSS: 6.8 17 May 2021, 21:15 UTC

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2417.

CVE-2020-21830 gnu vulnerability CVSS: 6.8 17 May 2021, 21:15 UTC

A heap based buffer overflow vulneraibility exists in GNU LibreDWG 0.10 via bit_calc_CRC ../../src/bits.c:2213.

CVE-2020-21827 gnu vulnerability CVSS: 6.8 17 May 2021, 20:15 UTC

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2379.

CVE-2020-21819 gnu vulnerability CVSS: 6.8 17 May 2021, 19:15 UTC

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10.2641via htmlescape ../../programs/escape.c:51.

CVE-2020-21818 gnu vulnerability CVSS: 6.8 17 May 2021, 19:15 UTC

A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:48.

CVE-2020-21817 gnu vulnerability CVSS: 4.3 17 May 2021, 19:15 UTC

A null pointer dereference issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:29. which causes a denial of service (application crash).

CVE-2020-21816 gnu vulnerability CVSS: 6.8 17 May 2021, 19:15 UTC

A heab based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:46.

CVE-2020-21815 gnu vulnerability CVSS: 4.3 17 May 2021, 19:15 UTC

A null pointer deference issue exists in GNU LibreDWG 0.10.2641 via output_TEXT ../../programs/dwg2SVG.c:114, which causes a denial of service (application crash).

CVE-2020-21814 gnu vulnerability CVSS: 6.8 17 May 2021, 19:15 UTC

A heap based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlwescape ../../programs/escape.c:97.

CVE-2020-21813 gnu vulnerability CVSS: 6.8 17 May 2021, 18:15 UTC

A heap based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via output_TEXT ../../programs/dwg2SVG.c:114.

CVE-2021-20294 gnu vulnerability CVSS: 6.8 29 Apr 2021, 16:15 UTC

A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.

CVE-2021-31879 gnu vulnerability CVSS: 5.8 29 Apr 2021, 05:15 UTC

GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.

CVE-2021-27851 gnu vulnerability CVSS: 2.1 26 Apr 2021, 16:15 UTC

A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable.

CVE-2021-30184 gnu vulnerability CVSS: 6.8 07 Apr 2021, 12:15 UTC

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

CVE-2021-20284 gnu vulnerability CVSS: 4.3 26 Mar 2021, 17:15 UTC

A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.

CVE-2021-20197 gnu vulnerability CVSS: 3.3 26 Mar 2021, 17:15 UTC

There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.

CVE-2021-20193 gnu vulnerability CVSS: 4.3 26 Mar 2021, 17:15 UTC

A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.

CVE-2021-3466 gnu vulnerability CVSS: 10.0 25 Mar 2021, 19:15 UTC

A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.

CVE-2021-28968 gnu vulnerability CVSS: 3.5 22 Mar 2021, 16:15 UTC

An issue was discovered in PunBB before 1.4.6. An XSS vulnerability in the [email] BBcode tag allows (with authentication) injecting arbitrary JavaScript into any forum message.

CVE-2021-3418 gnu vulnerability CVSS: 4.4 15 Mar 2021, 22:15 UTC

If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism.

CVE-2021-20232 gnu vulnerability CVSS: 7.5 12 Mar 2021, 19:15 UTC

A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.

CVE-2021-20231 gnu vulnerability CVSS: 7.5 12 Mar 2021, 19:15 UTC

A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.

CVE-2021-20233 gnu vulnerability CVSS: 7.2 03 Mar 2021, 17:15 UTC

A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2021-20225 gnu vulnerability CVSS: 7.2 03 Mar 2021, 17:15 UTC

A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2020-27779 gnu vulnerability CVSS: 6.9 03 Mar 2021, 17:15 UTC

A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2020-27749 gnu vulnerability CVSS: 7.2 03 Mar 2021, 17:15 UTC

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2020-25647 gnu vulnerability CVSS: 7.2 03 Mar 2021, 17:15 UTC

A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2020-25632 gnu vulnerability CVSS: 7.2 03 Mar 2021, 17:15 UTC

A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2020-14372 gnu vulnerability CVSS: 6.2 03 Mar 2021, 17:15 UTC

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

CVE-2020-27618 gnu vulnerability CVSS: 2.1 26 Feb 2021, 23:15 UTC

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.

CVE-2021-27645 gnu vulnerability CVSS: 1.9 24 Feb 2021, 15:15 UTC

The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.

CVE-2021-26937 gnu vulnerability CVSS: 7.5 09 Feb 2021, 20:15 UTC

encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.

CVE-2021-3326 gnu vulnerability CVSS: 5.0 27 Jan 2021, 20:15 UTC

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

CVE-2019-25013 gnu vulnerability CVSS: 7.1 04 Jan 2021, 18:15 UTC

The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.

CVE-2020-35507 gnu vulnerability CVSS: 4.3 04 Jan 2021, 15:15 UTC

There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.

CVE-2020-35496 gnu vulnerability CVSS: 4.3 04 Jan 2021, 15:15 UTC

There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.

CVE-2020-35495 gnu vulnerability CVSS: 4.3 04 Jan 2021, 15:15 UTC

There's a flaw in binutils /bfd/pef.c. An attacker who is able to submit a crafted input file to be processed by the objdump program could cause a null pointer dereference. The greatest threat from this flaw is to application availability. This flaw affects binutils versions prior to 2.34.

CVE-2020-35494 gnu vulnerability CVSS: 5.8 04 Jan 2021, 15:15 UTC

There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.

CVE-2020-35493 gnu vulnerability CVSS: 4.3 04 Jan 2021, 15:15 UTC

A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.

CVE-2020-35448 gnu vulnerability CVSS: 4.3 27 Dec 2020, 04:15 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.

CVE-2020-16599 gnu vulnerability CVSS: 4.3 09 Dec 2020, 21:15 UTC

A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.

CVE-2020-16593 gnu vulnerability CVSS: 4.3 09 Dec 2020, 21:15 UTC

A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.

CVE-2020-16592 gnu vulnerability CVSS: 4.3 09 Dec 2020, 21:15 UTC

A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.

CVE-2020-16591 gnu vulnerability CVSS: 4.3 09 Dec 2020, 21:15 UTC

A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.

CVE-2020-16590 gnu vulnerability CVSS: 4.3 09 Dec 2020, 21:15 UTC

A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.

CVE-2020-29573 gnu vulnerability CVSS: 5.0 06 Dec 2020, 00:15 UTC

sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.

CVE-2020-29562 gnu vulnerability CVSS: 2.1 04 Dec 2020, 07:15 UTC

The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

CVE-1999-0199 gnu vulnerability CVSS: 7.5 06 Oct 2020, 13:15 UTC

manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.

CVE-2020-24659 gnu vulnerability CVSS: 5.0 04 Sep 2020, 15:15 UTC

An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.

CVE-2020-24240 gnu vulnerability CVSS: 7.1 25 Aug 2020, 14:15 UTC

GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison.

CVE-2020-14311 gnu vulnerability CVSS: 3.6 31 Jul 2020, 22:15 UTC

There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.

CVE-2020-14310 gnu vulnerability CVSS: 3.6 31 Jul 2020, 22:15 UTC

There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.

CVE-2020-14309 gnu vulnerability CVSS: 4.6 30 Jul 2020, 13:15 UTC

There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.

CVE-2020-10713 gnu vulnerability CVSS: 4.6 30 Jul 2020, 13:15 UTC

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVE-2020-14308 gnu vulnerability CVSS: 4.4 29 Jul 2020, 20:15 UTC

In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.

CVE-2020-15707 gnu vulnerability CVSS: 4.4 29 Jul 2020, 18:15 UTC

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

CVE-2020-15706 gnu vulnerability CVSS: 4.4 29 Jul 2020, 18:15 UTC

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

CVE-2020-15705 gnu vulnerability CVSS: 4.4 29 Jul 2020, 18:15 UTC

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.

CVE-2020-15807 gnu vulnerability CVSS: 4.3 17 Jul 2020, 16:15 UTC

GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.

CVE-2019-20915 gnu vulnerability CVSS: 5.8 16 Jul 2020, 18:15 UTC

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in bit_write_TF in bits.c.

CVE-2019-20914 gnu vulnerability CVSS: 7.5 16 Jul 2020, 18:15 UTC

An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_common_entity_handle_data in common_entity_handle_data.spec.

CVE-2019-20913 gnu vulnerability CVSS: 5.8 16 Jul 2020, 18:15 UTC

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec.

CVE-2019-20912 gnu vulnerability CVSS: 6.8 16 Jul 2020, 18:15 UTC

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a stack overflow in bits.c, possibly related to bit_read_TF.

CVE-2019-20911 gnu vulnerability CVSS: 4.3 16 Jul 2020, 18:15 UTC

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to denial of service in bit_calc_CRC in bits.c, related to a for loop.

CVE-2019-20910 gnu vulnerability CVSS: 5.8 16 Jul 2020, 18:15 UTC

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in decode_R13_R2000 in decode.c, a different vulnerability than CVE-2019-20011.

CVE-2019-20909 gnu vulnerability CVSS: 5.0 16 Jul 2020, 18:15 UTC

An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec.

CVE-2020-15011 gnu vulnerability CVSS: 2.6 24 Jun 2020, 12:15 UTC

GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.

CVE-2020-13777 gnu vulnerability CVSS: 5.8 04 Jun 2020, 07:15 UTC

GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.

CVE-2020-12108 gnu vulnerability CVSS: 4.3 06 May 2020, 15:15 UTC

/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.

CVE-2020-1752 gnu vulnerability CVSS: 3.7 30 Apr 2020, 17:15 UTC

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.

CVE-2020-12137 gnu vulnerability CVSS: 4.3 24 Apr 2020, 13:15 UTC

GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.

CVE-2020-1751 gnu vulnerability CVSS: 5.9 17 Apr 2020, 19:15 UTC

An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.

CVE-2020-11501 gnu vulnerability CVSS: 5.8 03 Apr 2020, 13:15 UTC

GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.

CVE-2020-6096 gnu vulnerability CVSS: 6.8 01 Apr 2020, 22:15 UTC

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.

CVE-2019-20633 gnu vulnerability CVSS: 4.3 25 Mar 2020, 17:15 UTC

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.

CVE-2020-10029 gnu vulnerability CVSS: 2.1 04 Mar 2020, 15:15 UTC

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.

CVE-2020-9366 gnu vulnerability CVSS: 7.5 24 Feb 2020, 17:15 UTC

A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact.

CVE-2015-0294 gnu vulnerability CVSS: 5.0 27 Jan 2020, 16:15 UTC

GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.

CVE-2019-20433 gnu vulnerability CVSS: 6.4 27 Jan 2020, 15:15 UTC

libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.

CVE-2015-4042 gnu vulnerability CVSS: 7.5 24 Jan 2020, 17:15 UTC

Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.

CVE-2015-4041 gnu vulnerability CVSS: 4.6 24 Jan 2020, 17:15 UTC

The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.

CVE-2019-3697 gnu vulnerability CVSS: 7.2 24 Jan 2020, 12:15 UTC

UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of gnump3d in openSUSE Leap 15.1 allows local attackers to escalate from user gnump3d to root. This issue affects: openSUSE Leap 15.1 gnump3d version 3.0-lp151.2.1 and prior versions.

CVE-2020-6615 gnu vulnerability CVSS: 4.3 08 Jan 2020, 21:15 UTC

GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl).

CVE-2020-6614 gnu vulnerability CVSS: 5.8 08 Jan 2020, 21:15 UTC

GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c.

CVE-2020-6613 gnu vulnerability CVSS: 5.8 08 Jan 2020, 21:15 UTC

GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c.

CVE-2020-6612 gnu vulnerability CVSS: 5.8 08 Jan 2020, 21:15 UTC

GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c.

CVE-2020-6611 gnu vulnerability CVSS: 4.3 08 Jan 2020, 21:15 UTC

GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c.

CVE-2020-6610 gnu vulnerability CVSS: 4.3 08 Jan 2020, 21:15 UTC

GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.

CVE-2020-6609 gnu vulnerability CVSS: 6.8 08 Jan 2020, 21:15 UTC

GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c.

CVE-2019-14866 gnu vulnerability CVSS: 6.9 07 Jan 2020, 17:15 UTC

In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.

CVE-2019-20015 gnu vulnerability CVSS: 4.3 27 Dec 2019, 01:15 UTC

An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec.

CVE-2019-20014 gnu vulnerability CVSS: 6.8 27 Dec 2019, 01:15 UTC

An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c.

CVE-2019-20013 gnu vulnerability CVSS: 4.3 27 Dec 2019, 01:15 UTC

An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec.

CVE-2019-20012 gnu vulnerability CVSS: 4.3 27 Dec 2019, 01:15 UTC

An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec.

CVE-2019-20011 gnu vulnerability CVSS: 6.8 27 Dec 2019, 01:15 UTC

An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c.

CVE-2019-20010 gnu vulnerability CVSS: 6.8 27 Dec 2019, 01:15 UTC

An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c.

CVE-2019-20009 gnu vulnerability CVSS: 4.3 27 Dec 2019, 01:15 UTC

An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec.

CVE-2015-8313 gnu vulnerability CVSS: 4.3 20 Dec 2019, 14:15 UTC

GnuTLS incorrectly validates the first byte of padding in CBC modes

CVE-2019-14865 gnu vulnerability CVSS: 4.9 29 Nov 2019, 10:15 UTC

A flaw was found in the grub2-set-bootflag utility of grub2. A local attacker could run this utility under resource pressure (for example by setting RLIMIT), causing grub2 configuration files to be truncated and leaving the system unbootable on subsequent reboots.

CVE-2019-18276 gnu vulnerability CVSS: 7.2 28 Nov 2019, 01:15 UTC

An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.

CVE-2015-1396 gnu vulnerability CVSS: 6.4 25 Nov 2019, 16:15 UTC

A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.

CVE-2019-16200 gnu vulnerability CVSS: 5.0 20 Nov 2019, 13:15 UTC

GNU Serveez through 0.2.2 has an Information Leak. An attacker may send an HTTP POST request to the /cgi-bin/reader URI. The attacker must include a Content-length header with a large positive value that, when represented in 32 bit binary, evaluates to a negative number. The problem exists in the http_cgi_write function under http-cgi.c; however, exploitation might show svz_envblock_add in libserveez/passthrough.c as the location of the heap-based buffer over-read.

CVE-2019-19126 gnu vulnerability CVSS: 2.1 19 Nov 2019, 22:15 UTC

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.

CVE-2012-0824 gnu vulnerability CVSS: 7.5 19 Nov 2019, 16:15 UTC

gnusound 0.7.5 has format string issue

CVE-2019-18397 gnu vulnerability CVSS: 6.8 13 Nov 2019, 14:15 UTC

A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.

CVE-2019-18862 gnu vulnerability CVSS: 4.6 11 Nov 2019, 16:15 UTC

maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.

CVE-2002-2439 gnu vulnerability CVSS: 4.6 23 Oct 2019, 18:15 UTC

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

CVE-2019-12290 gnu vulnerability CVSS: 5.0 22 Oct 2019, 16:15 UTC

GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.

CVE-2019-18224 gnu vulnerability CVSS: 7.5 21 Oct 2019, 17:15 UTC

idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.

CVE-2019-18192 gnu vulnerability CVSS: 4.6 17 Oct 2019, 20:15 UTC

GNU Guix 1.0.1 allows local users to gain access to an arbitrary user's account because the parent directory of the user-profile directories is world writable, a similar issue to CVE-2019-17365.

CVE-2019-17595 gnu vulnerability CVSS: 5.8 14 Oct 2019, 21:15 UTC

There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.

CVE-2019-17594 gnu vulnerability CVSS: 4.6 14 Oct 2019, 21:15 UTC

There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.

CVE-2019-17544 gnu vulnerability CVSS: 6.4 14 Oct 2019, 02:15 UTC

libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.

CVE-2019-17451 gnu vulnerability CVSS: 4.3 10 Oct 2019, 17:15 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.

CVE-2019-17450 gnu vulnerability CVSS: 4.3 10 Oct 2019, 17:15 UTC

find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.

CVE-2019-16166 gnu vulnerability CVSS: 4.3 09 Sep 2019, 17:15 UTC

GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c.

CVE-2019-16165 gnu vulnerability CVSS: 4.3 09 Sep 2019, 17:15 UTC

GNU cflow through 1.6 has a use-after-free in the reference function in parser.c.

CVE-2019-15847 gnu vulnerability CVSS: 5.0 02 Sep 2019, 23:15 UTC

The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.

CVE-2019-15767 gnu vulnerability CVSS: 6.8 29 Aug 2019, 03:15 UTC

In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file.

CVE-2019-15531 gnu vulnerability CVSS: 4.3 23 Aug 2019, 17:15 UTC

GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.

CVE-2018-20969 gnu vulnerability CVSS: 9.3 16 Aug 2019, 04:15 UTC

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

CVE-2014-10375 gnu vulnerability CVSS: 5.0 14 Aug 2019, 05:15 UTC

handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header.

CVE-2019-14444 gnu vulnerability CVSS: 4.3 30 Jul 2019, 13:15 UTC

apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.

CVE-2019-13638 gnu vulnerability CVSS: 9.3 26 Jul 2019, 13:15 UTC

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.

CVE-2019-1010180 gnu vulnerability CVSS: 6.8 24 Jul 2019, 13:15 UTC

GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.

CVE-2019-14250 gnu vulnerability CVSS: 4.3 24 Jul 2019, 04:15 UTC

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.

CVE-2019-1010204 gnu vulnerability CVSS: 4.3 23 Jul 2019, 14:15 UTC

GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.

CVE-2019-13636 gnu vulnerability CVSS: 5.8 17 Jul 2019, 21:15 UTC

In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.

CVE-2019-1010025 gnu vulnerability CVSS: 5.0 15 Jul 2019, 04:15 UTC

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

CVE-2019-1010024 gnu vulnerability CVSS: 5.0 15 Jul 2019, 04:15 UTC

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

CVE-2019-1010023 gnu vulnerability CVSS: 6.8 15 Jul 2019, 04:15 UTC

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

CVE-2019-1010022 gnu vulnerability CVSS: 7.5 15 Jul 2019, 04:15 UTC

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

CVE-2019-12972 gnu vulnerability CVSS: 4.3 26 Jun 2019, 14:15 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.

CVE-2012-6711 gnu vulnerability CVSS: 4.6 18 Jun 2019, 18:15 UTC

A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().

CVE-2018-12886 gnu vulnerability CVSS: 6.8 22 May 2019, 19:29 UTC

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

CVE-2019-5953 gnu vulnerability CVSS: 7.5 17 May 2019, 16:29 UTC

Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.

CVE-2019-11640 gnu vulnerability CVSS: 6.8 01 May 2019, 18:29 UTC

An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a.

CVE-2019-11639 gnu vulnerability CVSS: 6.8 01 May 2019, 18:29 UTC

An issue was discovered in GNU recutils 1.8. There is a stack-based buffer overflow in the function rec_type_check_enum at rec-types.c in librec.a.

CVE-2019-11638 gnu vulnerability CVSS: 4.3 01 May 2019, 18:29 UTC

An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_field_name_equal_p at rec-field-name.c in librec.a, leading to a crash.

CVE-2019-11637 gnu vulnerability CVSS: 4.3 01 May 2019, 18:29 UTC

An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_rset_get_props at rec-rset.c in librec.a, leading to a crash.

CVE-2006-7254 gnu vulnerability CVSS: 2.1 10 Apr 2019, 20:29 UTC

The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.

CVE-2005-3590 gnu vulnerability CVSS: 7.5 10 Apr 2019, 20:29 UTC

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.

CVE-2019-3836 gnu vulnerability CVSS: 5.0 01 Apr 2019, 15:29 UTC

It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.

CVE-2019-3829 gnu vulnerability CVSS: 5.0 27 Mar 2019, 18:29 UTC

A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.

CVE-2019-9924 gnu vulnerability CVSS: 7.2 22 Mar 2019, 08:29 UTC

rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.

CVE-2019-9923 gnu vulnerability CVSS: 5.0 22 Mar 2019, 08:29 UTC

pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.

CVE-2019-9779 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function dwg_dxf_LTYPE at dwg.spec (earlier than CVE-2019-9776).

CVE-2019-9778 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer over-read in the function dwg_dxf_LTYPE at dwg.spec.

CVE-2019-9777 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer over-read in the function dxf_header_write at header_variables_dxf.spec.

CVE-2019-9776 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function dwg_dxf_LTYPE at dwg.spec (later than CVE-2019-9779).

CVE-2019-9775 gnu vulnerability CVSS: 6.4 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is an out-of-bounds read in the function dwg_dxf_BLOCK_CONTROL at dwg.spec.

CVE-2019-9774 gnu vulnerability CVSS: 6.4 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is an out-of-bounds read in the function bit_read_B at bits.c.

CVE-2019-9773 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer overflow in the function dwg_decode_eed_data at decode.c for the z dimension.

CVE-2019-9772 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function dwg_dxf_LEADER at dwg.spec.

CVE-2019-9771 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function bit_convert_TU at bits.c.

CVE-2019-9770 gnu vulnerability CVSS: 5.0 14 Mar 2019, 09:29 UTC

An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer overflow in the function dwg_decode_eed_data at decode.c for the y dimension.

CVE-2019-9211 gnu vulnerability CVSS: 4.3 27 Feb 2019, 17:29 UTC

There is a reachable assertion abort in the function write_long_string_missing_values() in data/sys-file-writer.c in libdata.a in GNU PSPP 1.2.0 that will lead to denial of service.

CVE-2019-9192 gnu vulnerability CVSS: 5.0 26 Feb 2019, 18:29 UTC

In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern

CVE-2019-9169 gnu vulnerability CVSS: 7.5 26 Feb 2019, 02:29 UTC

In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.

CVE-2018-20796 gnu vulnerability CVSS: 5.0 26 Feb 2019, 02:29 UTC

In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\\1\\1|t1|\\\2537)+' in grep.

CVE-2009-5155 gnu vulnerability CVSS: 5.0 26 Feb 2019, 02:29 UTC

In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

CVE-2019-9077 gnu vulnerability CVSS: 6.8 24 Feb 2019, 00:29 UTC

An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.

CVE-2019-9076 gnu vulnerability CVSS: 4.3 24 Feb 2019, 00:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c.

CVE-2019-9075 gnu vulnerability CVSS: 6.8 24 Feb 2019, 00:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.

CVE-2019-9074 gnu vulnerability CVSS: 4.3 24 Feb 2019, 00:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.

CVE-2019-9073 gnu vulnerability CVSS: 4.3 24 Feb 2019, 00:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c.

CVE-2019-9072 gnu vulnerability CVSS: 4.3 24 Feb 2019, 00:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c.

CVE-2019-9071 gnu vulnerability CVSS: 4.3 24 Feb 2019, 00:29 UTC

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls.

CVE-2019-9070 gnu vulnerability CVSS: 6.8 24 Feb 2019, 00:29 UTC

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls.

CVE-2019-7309 gnu vulnerability CVSS: 2.1 03 Feb 2019, 02:29 UTC

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

CVE-2016-10739 gnu vulnerability CVSS: 4.6 21 Jan 2019, 19:29 UTC

In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.

CVE-2019-6488 gnu vulnerability CVSS: 4.6 18 Jan 2019, 19:29 UTC

The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.

CVE-2019-6460 gnu vulnerability CVSS: 4.3 16 Jan 2019, 18:29 UTC

An issue was discovered in GNU Recutils 1.8. There is a NULL pointer dereference in the function rec_field_set_name() in the file rec-field.c in librec.a.

CVE-2019-6459 gnu vulnerability CVSS: 4.3 16 Jan 2019, 18:29 UTC

An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_extract_type in rec-utils.c in librec.a.

CVE-2019-6458 gnu vulnerability CVSS: 4.3 16 Jan 2019, 18:29 UTC

An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_buf_new in rec-buf.c when called from rec_parse_rset in rec-parser.c in librec.a.

CVE-2019-6457 gnu vulnerability CVSS: 4.3 16 Jan 2019, 18:29 UTC

An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_aggregate_reg_new in rec-aggregate.c in librec.a.

CVE-2019-6456 gnu vulnerability CVSS: 4.3 16 Jan 2019, 18:29 UTC

An issue was discovered in GNU Recutils 1.8. There is a NULL pointer dereference in the function rec_fex_size() in the file rec-fex.c of librec.a.

CVE-2019-6455 gnu vulnerability CVSS: 4.3 16 Jan 2019, 18:29 UTC

An issue was discovered in GNU Recutils 1.8. There is a double-free problem in the function rec_mset_elem_destroy() in the file rec-mset.c.

CVE-2018-20712 gnu vulnerability CVSS: 4.3 15 Jan 2019, 00:29 UTC

A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.

CVE-2018-20673 gnu vulnerability CVSS: 4.3 04 Jan 2019, 18:29 UTC

The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for "Create an array for saving the template argument values") that can trigger a heap-based buffer overflow, as demonstrated by nm.

CVE-2018-20671 gnu vulnerability CVSS: 4.3 04 Jan 2019, 16:29 UTC

load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.

CVE-2018-20657 gnu vulnerability CVSS: 5.0 02 Jan 2019, 14:29 UTC

The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698.

CVE-2018-20651 gnu vulnerability CVSS: 4.3 01 Jan 2019, 16:29 UTC

A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.

CVE-2018-20623 gnu vulnerability CVSS: 4.3 31 Dec 2018, 19:29 UTC

In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.

CVE-2018-20483 gnu vulnerability CVSS: 2.1 26 Dec 2018, 18:29 UTC

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVE-2018-20482 gnu vulnerability CVSS: 1.9 26 Dec 2018, 18:29 UTC

GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).

CVE-2018-20431 gnu vulnerability CVSS: 4.3 24 Dec 2018, 05:29 UTC

GNU Libextractor through 1.8 has a NULL Pointer Dereference vulnerability in the function process_metadata() in plugins/ole2_extractor.c.

CVE-2018-20430 gnu vulnerability CVSS: 4.3 24 Dec 2018, 05:29 UTC

GNU Libextractor through 1.8 has an out-of-bounds read vulnerability in the function history_extract() in plugins/ole2_extractor.c, related to EXTRACTOR_common_convert_to_utf8 in common/convert.c.

CVE-2018-1000876 gnu vulnerability CVSS: 4.6 20 Dec 2018, 17:29 UTC

binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.

CVE-2018-20230 gnu vulnerability CVSS: 6.8 19 Dec 2018, 11:29 UTC

An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

CVE-2018-20002 gnu vulnerability CVSS: 4.3 10 Dec 2018, 02:29 UTC

The _bfd_generic_read_minisymbols function in syms.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, has a memory leak via a crafted ELF file, leading to a denial of service (memory consumption), as demonstrated by nm.

CVE-2018-19932 gnu vulnerability CVSS: 4.3 07 Dec 2018, 07:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.

CVE-2018-19931 gnu vulnerability CVSS: 6.8 07 Dec 2018, 07:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.

CVE-2018-19591 gnu vulnerability CVSS: 5.0 04 Dec 2018, 16:29 UTC

In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.

CVE-2018-16868 gnu vulnerability CVSS: 3.3 03 Dec 2018, 14:29 UTC

A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.

CVE-2018-19217 gnu vulnerability CVSS: 4.3 12 Nov 2018, 19:29 UTC

In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party

CVE-2018-19211 gnu vulnerability CVSS: 4.3 12 Nov 2018, 19:29 UTC

In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection.

CVE-2018-18751 gnu vulnerability CVSS: 7.5 29 Oct 2018, 12:29 UTC

An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.

CVE-2018-18701 gnu vulnerability CVSS: 4.3 29 Oct 2018, 12:29 UTC

An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions next_is_type_qual() and cplus_demangle_type() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.

CVE-2018-18700 gnu vulnerability CVSS: 4.3 29 Oct 2018, 12:29 UTC

An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption vulnerability resulting from infinite recursion in the functions d_name(), d_encoding(), and d_local_name() in cp-demangle.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via an ELF file, as demonstrated by nm.

CVE-2018-18607 gnu vulnerability CVSS: 4.3 23 Oct 2018, 17:29 UTC

An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.

CVE-2018-18606 gnu vulnerability CVSS: 4.3 23 Oct 2018, 17:29 UTC

An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.

CVE-2018-18605 gnu vulnerability CVSS: 4.3 23 Oct 2018, 17:29 UTC

A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.

CVE-2018-18484 gnu vulnerability CVSS: 4.3 18 Oct 2018, 21:29 UTC

An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.

CVE-2018-18483 gnu vulnerability CVSS: 6.8 18 Oct 2018, 21:29 UTC

The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.

CVE-2018-18309 gnu vulnerability CVSS: 4.3 15 Oct 2018, 02:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.

CVE-2018-17985 gnu vulnerability CVSS: 4.3 04 Oct 2018, 23:29 UTC

An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.

CVE-2018-17794 gnu vulnerability CVSS: 4.3 30 Sep 2018, 20:29 UTC

An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in work_stuff_copy_to_from when called from iterate_demangle_function.

CVE-2018-17360 gnu vulnerability CVSS: 4.3 23 Sep 2018, 18:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.

CVE-2018-17359 gnu vulnerability CVSS: 4.3 23 Sep 2018, 18:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.

CVE-2018-17358 gnu vulnerability CVSS: 4.3 23 Sep 2018, 18:29 UTC

An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.

CVE-2018-16430 gnu vulnerability CVSS: 6.8 04 Sep 2018, 00:29 UTC

GNU Libextractor through 1.7 has an out-of-bounds read vulnerability in EXTRACTOR_zip_extract_method() in zip_extractor.c.

CVE-2018-10846 gnu vulnerability CVSS: 1.9 22 Aug 2018, 13:29 UTC

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVE-2018-10845 gnu vulnerability CVSS: 4.3 22 Aug 2018, 13:29 UTC

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVE-2018-10844 gnu vulnerability CVSS: 4.3 22 Aug 2018, 13:29 UTC

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

CVE-2018-1000654 gnu vulnerability CVSS: 7.1 20 Aug 2018, 19:31 UTC

GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.

CVE-2018-0618 gnu vulnerability CVSS: 3.5 26 Jul 2018, 17:29 UTC

Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2018-14524 gnu vulnerability CVSS: 4.3 23 Jul 2018, 08:29 UTC

dwg_decode_eed in decode.c in GNU LibreDWG before 0.6 leads to a double free (in dwg_free_eed in free.c) because it does not properly manage the obj->eed value after a free occurs.

CVE-2018-14471 gnu vulnerability CVSS: 4.3 20 Jul 2018, 16:29 UTC

dwg_obj_block_control_get_block_headers in dwg_api.c in GNU LibreDWG 0.5.1048 allows remote attackers to cause a denial of service (NULL pointer dereference and SEGV) via a crafted dwg file.

CVE-2018-14443 gnu vulnerability CVSS: 4.3 20 Jul 2018, 13:29 UTC

get_first_owned_object in dwg.c in GNU LibreDWG 0.5.1036 allows remote attackers to cause a denial of service (SEGV).

CVE-2018-14347 gnu vulnerability CVSS: 4.3 17 Jul 2018, 15:29 UTC

GNU Libextractor before 1.7 contains an infinite loop vulnerability in EXTRACTOR_mpeg_extract_method (mpeg_extractor.c).

CVE-2018-14346 gnu vulnerability CVSS: 6.8 17 Jul 2018, 15:29 UTC

GNU Libextractor before 1.7 has a stack-based buffer overflow in ec_read_file_func (unzip.c).

CVE-2018-13796 gnu vulnerability CVSS: 4.3 12 Jul 2018, 18:29 UTC

An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.

CVE-2018-13033 gnu vulnerability CVSS: 4.3 01 Jul 2018, 16:29 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file, as demonstrated by _bfd_elf_parse_attributes in elf-attrs.c and bfd_malloc in libbfd.c. This can occur during execution of nm.

CVE-2018-12934 gnu vulnerability CVSS: 5.0 28 Jun 2018, 14:29 UTC

remember_Ktype in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM). This can occur during execution of cxxfilt.

CVE-2018-12699 gnu vulnerability CVSS: 7.5 23 Jun 2018, 23:29 UTC

finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.

CVE-2018-12698 gnu vulnerability CVSS: 5.0 23 Jun 2018, 23:29 UTC

demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.

CVE-2018-12697 gnu vulnerability CVSS: 5.0 23 Jun 2018, 23:29 UTC

A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.

CVE-2018-12641 gnu vulnerability CVSS: 4.3 22 Jun 2018, 12:29 UTC

An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_arg, demangle_args, and demangle_nested_args. This can occur during execution of nm-new.

CVE-2018-11237 gnu vulnerability CVSS: 4.6 18 May 2018, 16:29 UTC

An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

CVE-2018-11236 gnu vulnerability CVSS: 7.5 18 May 2018, 16:29 UTC

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

CVE-2017-18269 gnu vulnerability CVSS: 7.5 18 May 2018, 16:29 UTC

An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.

CVE-2018-0494 gnu vulnerability CVSS: 4.3 06 May 2018, 22:29 UTC

GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.

CVE-2018-10535 gnu vulnerability CVSS: 4.3 29 Apr 2018, 15:29 UTC

The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.

CVE-2018-10534 gnu vulnerability CVSS: 4.3 29 Apr 2018, 15:29 UTC

The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.

CVE-2018-10373 gnu vulnerability CVSS: 4.3 25 Apr 2018, 09:29 UTC

concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.

CVE-2018-10372 gnu vulnerability CVSS: 4.3 25 Apr 2018, 09:29 UTC

process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.

CVE-2018-9996 gnu vulnerability CVSS: 4.3 10 Apr 2018, 22:29 UTC

An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.

CVE-2018-1000156 gnu vulnerability CVSS: 6.8 06 Apr 2018, 13:29 UTC

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVE-2018-9138 gnu vulnerability CVSS: 4.3 30 Mar 2018, 08:29 UTC

An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.29 and 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_nested_args, demangle_args, do_arg, and do_type.

CVE-2018-8945 gnu vulnerability CVSS: 4.3 22 Mar 2018, 21:29 UTC

The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.

CVE-2018-1000097 gnu vulnerability CVSS: 6.8 13 Mar 2018, 01:29 UTC

Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..

CVE-2018-7643 gnu vulnerability CVSS: 6.8 02 Mar 2018, 15:29 UTC

The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.

CVE-2018-7642 gnu vulnerability CVSS: 4.3 02 Mar 2018, 15:29 UTC

The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.

CVE-2018-7570 gnu vulnerability CVSS: 4.3 28 Feb 2018, 21:29 UTC

The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.

CVE-2018-7569 gnu vulnerability CVSS: 4.3 28 Feb 2018, 21:29 UTC

dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.

CVE-2018-7568 gnu vulnerability CVSS: 4.3 28 Feb 2018, 21:29 UTC

The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.

CVE-2017-18201 gnu vulnerability CVSS: 7.5 26 Feb 2018, 14:29 UTC

An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.

CVE-2017-18199 gnu vulnerability CVSS: 4.3 24 Feb 2018, 06:29 UTC

realloc_symlink in rock.c in GNU libcdio before 1.0.0 allows remote attackers to cause a denial of service (NULL Pointer Dereference) via a crafted iso file.

CVE-2017-18198 gnu vulnerability CVSS: 6.8 24 Feb 2018, 06:29 UTC

print_iso9660_recurse in iso-info.c in GNU libcdio before 1.0.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted iso file.

CVE-2018-7208 gnu vulnerability CVSS: 6.8 18 Feb 2018, 04:29 UTC

In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.

CVE-2018-6952 gnu vulnerability CVSS: 5.0 13 Feb 2018, 19:29 UTC

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.

CVE-2018-6951 gnu vulnerability CVSS: 5.0 13 Feb 2018, 19:29 UTC

An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.

CVE-2016-10713 gnu vulnerability CVSS: 4.3 13 Feb 2018, 19:29 UTC

An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.

CVE-2018-6872 gnu vulnerability CVSS: 4.3 09 Feb 2018, 06:29 UTC

The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.

CVE-2018-6759 gnu vulnerability CVSS: 4.3 06 Feb 2018, 21:29 UTC

The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.

CVE-2018-6551 gnu vulnerability CVSS: 7.5 02 Feb 2018, 14:29 UTC

The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.

CVE-2018-6543 gnu vulnerability CVSS: 6.8 02 Feb 2018, 09:29 UTC

In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

CVE-2018-6485 gnu vulnerability CVSS: 7.5 01 Feb 2018, 14:29 UTC

An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.

CVE-2017-1000409 gnu vulnerability CVSS: 6.9 01 Feb 2018, 04:29 UTC

A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.

CVE-2017-1000408 gnu vulnerability CVSS: 7.2 01 Feb 2018, 04:29 UTC

A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.

CVE-2018-1000001 gnu vulnerability CVSS: 7.2 31 Jan 2018, 14:29 UTC

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVE-2018-6323 gnu vulnerability CVSS: 6.8 26 Jan 2018, 08:29 UTC

The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

CVE-2018-5950 gnu vulnerability CVSS: 4.3 23 Jan 2018, 16:29 UTC

Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.

CVE-2018-6003 gnu vulnerability CVSS: 5.0 22 Jan 2018, 20:29 UTC

An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.

CVE-2017-18018 gnu vulnerability CVSS: 1.9 04 Jan 2018, 04:29 UTC

In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.

CVE-2017-1000455 gnu vulnerability CVSS: 2.1 02 Jan 2018, 17:29 UTC

GuixSD prior to Git commit 5e66574a128937e7f2fcf146d146225703ccfd5d used POSIX hard links incorrectly, leading the creation of setuid executables in "the store", violating a fundamental security assumption of GNU Guix.

CVE-2017-16997 gnu vulnerability CVSS: 9.3 18 Dec 2017, 01:29 UTC

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.

CVE-2017-17531 gnu vulnerability CVSS: 6.8 14 Dec 2017, 16:29 UTC

gozilla.c in GNU GLOBAL 4.8.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.

CVE-2017-17440 gnu vulnerability CVSS: 4.3 06 Dec 2017, 17:29 UTC

GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.

CVE-2017-17426 gnu vulnerability CVSS: 6.8 05 Dec 2017, 17:29 UTC

The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.

CVE-2017-17126 gnu vulnerability CVSS: 6.8 04 Dec 2017, 08:29 UTC

The load_debug_section function in readelf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via an ELF file that lacks section headers.

CVE-2017-17125 gnu vulnerability CVSS: 6.8 04 Dec 2017, 08:29 UTC

nm.c and objdump.c in GNU Binutils 2.29.1 mishandle certain global symbols, which allows remote attackers to cause a denial of service (_bfd_elf_get_symbol_version_string buffer over-read and application crash) or possibly have unspecified other impact via a crafted ELF file.

CVE-2017-17124 gnu vulnerability CVSS: 6.8 04 Dec 2017, 08:29 UTC

The _bfd_coff_read_string_table function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not properly validate the size of the external string table, which allows remote attackers to cause a denial of service (excessive memory consumption, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted COFF binary.

CVE-2017-17123 gnu vulnerability CVSS: 4.3 04 Dec 2017, 08:29 UTC

The coff_slurp_reloc_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted COFF based file.

CVE-2017-17122 gnu vulnerability CVSS: 6.8 04 Dec 2017, 08:29 UTC

The dump_relocs_in_section function in objdump.c in GNU Binutils 2.29.1 does not check for reloc count integer overflows, which allows remote attackers to cause a denial of service (excessive memory allocation, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PE file.

CVE-2017-17121 gnu vulnerability CVSS: 6.8 04 Dec 2017, 08:29 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (memory access violation) or possibly have unspecified other impact via a COFF binary in which a relocation refers to a location after the end of the to-be-relocated section.

CVE-2017-17080 gnu vulnerability CVSS: 4.3 30 Nov 2017, 21:29 UTC

elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate sizes of core notes, which allows remote attackers to cause a denial of service (bfd_getl32 heap-based buffer over-read and application crash) via a crafted object file, related to elfcore_grok_netbsd_procinfo, elfcore_grok_openbsd_procinfo, and elfcore_grok_nto_status.

CVE-2017-16879 gnu vulnerability CVSS: 6.8 22 Nov 2017, 22:29 UTC

Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.

CVE-2017-16832 gnu vulnerability CVSS: 6.8 15 Nov 2017, 08:29 UTC

The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.

CVE-2017-16831 gnu vulnerability CVSS: 6.8 15 Nov 2017, 08:29 UTC

coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.

CVE-2017-16830 gnu vulnerability CVSS: 6.8 15 Nov 2017, 08:29 UTC

The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.

CVE-2017-16829 gnu vulnerability CVSS: 6.8 15 Nov 2017, 08:29 UTC

The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.

CVE-2017-16828 gnu vulnerability CVSS: 6.8 15 Nov 2017, 08:29 UTC

The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.

CVE-2017-16827 gnu vulnerability CVSS: 6.8 15 Nov 2017, 08:29 UTC

The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.

CVE-2017-16826 gnu vulnerability CVSS: 6.8 15 Nov 2017, 08:29 UTC

The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.

CVE-2017-1000383 gnu vulnerability CVSS: 2.1 31 Oct 2017, 20:29 UTC

GNU Emacs version 25.3.1 (and other versions most likely) ignores umask when creating a backup save file ("[ORIGINAL_FILENAME]~") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the emacs binary.

CVE-2017-15996 gnu vulnerability CVSS: 6.8 29 Oct 2017, 17:29 UTC

elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.

CVE-2017-15939 gnu vulnerability CVSS: 4.3 27 Oct 2017, 21:29 UTC

dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.

CVE-2017-15938 gnu vulnerability CVSS: 5.0 27 Oct 2017, 21:29 UTC

dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).

CVE-2017-13090 gnu vulnerability CVSS: 9.3 27 Oct 2017, 19:29 UTC

The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.

CVE-2017-13089 gnu vulnerability CVSS: 9.3 27 Oct 2017, 19:29 UTC

The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.

CVE-2017-15922 gnu vulnerability CVSS: 4.3 26 Oct 2017, 18:29 UTC

In GNU Libextractor 1.4, there is an out-of-bounds read in the EXTRACTOR_dvi_extract_method function in plugins/dvi_extractor.c.

CVE-2017-15804 gnu vulnerability CVSS: 7.5 22 Oct 2017, 20:29 UTC

The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.

CVE-2017-15671 gnu vulnerability CVSS: 4.3 20 Oct 2017, 17:29 UTC

The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).

CVE-2017-15670 gnu vulnerability CVSS: 7.5 20 Oct 2017, 17:29 UTC

The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.

CVE-2017-15602 gnu vulnerability CVSS: 5.0 18 Oct 2017, 21:29 UTC

In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size.

CVE-2017-15601 gnu vulnerability CVSS: 5.0 18 Oct 2017, 21:29 UTC

In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup.

CVE-2017-15600 gnu vulnerability CVSS: 5.0 18 Oct 2017, 21:29 UTC

In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.

CVE-2011-5320 gnu vulnerability CVSS: 2.1 18 Oct 2017, 14:29 UTC

scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.

CVE-2017-15267 gnu vulnerability CVSS: 5.0 11 Oct 2017, 17:29 UTC

In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c.

CVE-2017-15266 gnu vulnerability CVSS: 4.3 11 Oct 2017, 17:29 UTC

In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate.

CVE-2017-15225 gnu vulnerability CVSS: 4.3 10 Oct 2017, 23:29 UTC

_bfd_dwarf2_cleanup_debug_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory leak) via a crafted ELF file.

CVE-2017-15025 gnu vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted ELF file.

CVE-2017-15024 gnu vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

find_abstract_instance_name in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.

CVE-2017-15023 gnu vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename.

CVE-2017-15022 gnu vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the DW_AT_name data type, which allows remote attackers to cause a denial of service (bfd_hash_hash NULL pointer dereference, or out-of-bounds access, and application crash) via a crafted ELF file, related to scan_unit_for_symbols and parse_comp_unit.

CVE-2017-15021 gnu vulnerability CVSS: 4.3 05 Oct 2017, 01:29 UTC

bfd_get_debug_link_info_1 in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to bfd_getl32.

CVE-2017-15020 gnu vulnerability CVSS: 6.8 05 Oct 2017, 01:29 UTC

dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles pointers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file, related to parse_die and parse_line_table, as demonstrated by a parse_die heap-based buffer over-read.

CVE-2017-14974 gnu vulnerability CVSS: 4.3 02 Oct 2017, 01:29 UTC

The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.

CVE-2017-14940 gnu vulnerability CVSS: 4.3 30 Sep 2017, 01:29 UTC

scan_unit_for_symbols in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file.

CVE-2017-14939 gnu vulnerability CVSS: 4.3 30 Sep 2017, 01:29 UTC

decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles a length calculation, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to read_1_byte.

CVE-2017-14938 gnu vulnerability CVSS: 4.3 30 Sep 2017, 01:29 UTC

_bfd_elf_slurp_version_tables in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file.

CVE-2017-14934 gnu vulnerability CVSS: 4.3 30 Sep 2017, 01:29 UTC

process_debug_info in dwarf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file that contains a negative size value in a CU structure.

CVE-2017-14933 gnu vulnerability CVSS: 4.3 30 Sep 2017, 01:29 UTC

read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file.

CVE-2017-14932 gnu vulnerability CVSS: 4.3 30 Sep 2017, 01:29 UTC

decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file.

CVE-2017-14930 gnu vulnerability CVSS: 7.1 30 Sep 2017, 01:29 UTC

Memory leak in decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.

CVE-2017-14745 gnu vulnerability CVSS: 6.8 26 Sep 2017, 16:29 UTC

The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.

CVE-2017-14729 gnu vulnerability CVSS: 6.8 25 Sep 2017, 16:29 UTC

The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.

CVE-2015-1865 gnu vulnerability CVSS: 3.3 20 Sep 2017, 18:29 UTC

fts.c in coreutils 8.4 allows local users to delete arbitrary files.

CVE-2017-14529 gnu vulnerability CVSS: 4.3 18 Sep 2017, 00:29 UTC

The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.

CVE-2017-14482 gnu vulnerability CVSS: 6.8 14 Sep 2017, 16:29 UTC

GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).

CVE-2017-14333 gnu vulnerability CVSS: 4.3 12 Sep 2017, 08:29 UTC

The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution.

CVE-2017-12133 gnu vulnerability CVSS: 4.3 07 Sep 2017, 13:29 UTC

Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.

CVE-2017-14130 gnu vulnerability CVSS: 4.3 04 Sep 2017, 20:29 UTC

The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.

CVE-2017-14129 gnu vulnerability CVSS: 4.3 04 Sep 2017, 20:29 UTC

The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.

CVE-2017-14128 gnu vulnerability CVSS: 4.3 04 Sep 2017, 20:29 UTC

The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.

CVE-2017-14062 gnu vulnerability CVSS: 7.5 31 Aug 2017, 16:29 UTC

Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.

CVE-2017-14061 gnu vulnerability CVSS: 7.5 31 Aug 2017, 16:29 UTC

Integer overflow in the _isBidi function in bidi.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.

CVE-2017-13757 gnu vulnerability CVSS: 4.3 29 Aug 2017, 23:29 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.

CVE-2017-13734 gnu vulnerability CVSS: 4.3 29 Aug 2017, 06:29 UTC

There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.

CVE-2017-13733 gnu vulnerability CVSS: 4.3 29 Aug 2017, 06:29 UTC

There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.

CVE-2017-13732 gnu vulnerability CVSS: 4.3 29 Aug 2017, 06:29 UTC

There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.

CVE-2017-13731 gnu vulnerability CVSS: 4.3 29 Aug 2017, 06:29 UTC

There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.

CVE-2017-13730 gnu vulnerability CVSS: 4.3 29 Aug 2017, 06:29 UTC

There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.

CVE-2017-13729 gnu vulnerability CVSS: 4.3 29 Aug 2017, 06:29 UTC

There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.

CVE-2017-13728 gnu vulnerability CVSS: 4.3 29 Aug 2017, 06:29 UTC

There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.

CVE-2017-13716 gnu vulnerability CVSS: 7.1 28 Aug 2017, 21:29 UTC

The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).

CVE-2016-0634 gnu vulnerability CVSS: 6.0 28 Aug 2017, 15:29 UTC

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

CVE-2014-9483 gnu vulnerability CVSS: 5.0 28 Aug 2017, 15:29 UTC

Emacs 24.4 allows remote attackers to bypass security restrictions.

CVE-2017-13710 gnu vulnerability CVSS: 5.0 27 Aug 2017, 16:29 UTC

The setup_group function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a group section that is too small.

CVE-2015-1395 gnu vulnerability CVSS: 7.8 25 Aug 2017, 18:29 UTC

Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.

CVE-2014-9637 gnu vulnerability CVSS: 7.1 25 Aug 2017, 18:29 UTC

GNU patch 2.7.2 and earlier allows remote attackers to cause a denial of service (memory consumption and segmentation fault) via a crafted diff file.

CVE-2017-12836 gnu vulnerability CVSS: 5.1 24 Aug 2017, 14:29 UTC

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."

CVE-2017-12967 gnu vulnerability CVSS: 4.3 19 Aug 2017, 16:29 UTC

The getsym function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a malformed tekhex binary.

CVE-2017-12961 gnu vulnerability CVSS: 5.0 18 Aug 2017, 21:29 UTC

There is an assertion abort in the function parse_attributes() in data/sys-file-reader.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to remote denial of service.

CVE-2017-12960 gnu vulnerability CVSS: 5.0 18 Aug 2017, 21:29 UTC

There is a reachable assertion abort in the function dict_rename_var() in data/dictionary.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to remote denial of service.

CVE-2017-12959 gnu vulnerability CVSS: 5.0 18 Aug 2017, 21:29 UTC

There is a reachable assertion abort in the function dict_add_mrset() in data/dictionary.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to a remote denial of service attack.

CVE-2017-12958 gnu vulnerability CVSS: 5.0 18 Aug 2017, 21:29 UTC

There is an illegal address access in the function output_hex() in data/data-out.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to remote denial of service.

CVE-2017-12799 gnu vulnerability CVSS: 6.8 10 Aug 2017, 18:29 UTC

The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.

CVE-2016-4456 gnu vulnerability CVSS: 5.0 08 Aug 2017, 21:29 UTC

The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.

CVE-2017-12459 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The bfd_mach_o_read_symtab_strtab function in bfd/mach-o.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted mach-o file.

CVE-2017-12458 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The nlm_swap_auxiliary_headers_in function in bfd/nlmcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted nlm file.

CVE-2017-12457 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The bfd_make_section_with_flags function in section.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a NULL dereference via a crafted file.

CVE-2017-12456 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.

CVE-2017-12455 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The evax_bfd_print_emh function in vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.

CVE-2017-12454 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.

CVE-2017-12453 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.

CVE-2017-12452 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.

CVE-2017-12451 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The _bfd_xcoff_read_ar_hdr function in bfd/coff-rs6000.c and bfd/coff64-rs6000.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds stack read via a crafted COFF image file.

CVE-2017-12450 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.

CVE-2017-12449 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The _bfd_vms_save_sized_string function in vms-misc.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms file.

CVE-2017-12448 gnu vulnerability CVSS: 6.8 04 Aug 2017, 15:29 UTC

The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.

CVE-2017-12132 gnu vulnerability CVSS: 4.3 01 Aug 2017, 16:29 UTC

The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.

CVE-2017-11671 gnu vulnerability CVSS: 2.1 26 Jul 2017, 21:29 UTC

Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.

CVE-2017-11113 gnu vulnerability CVSS: 5.0 08 Jul 2017, 17:29 UTC

In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.

CVE-2017-11112 gnu vulnerability CVSS: 5.0 08 Jul 2017, 17:29 UTC

In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.

CVE-2017-10792 gnu vulnerability CVSS: 4.3 02 Jul 2017, 03:29 UTC

There is a NULL Pointer Dereference in the function ll_insert() of the libpspp library in GNU PSPP before 0.11.0. For example, a crash was observed within the library code when attempting to convert invalid SPSS data into CSV format. A crafted input will lead to a remote denial of service attack.

CVE-2017-10791 gnu vulnerability CVSS: 4.3 02 Jul 2017, 03:29 UTC

There is an Integer overflow in the hash_int function of the libpspp library in GNU PSPP before 0.11.0. For example, a crash was observed within the library code when attempting to convert invalid SPSS data into CSV format. A crafted input will lead to a remote denial of service attack.

CVE-2017-10790 gnu vulnerability CVSS: 5.0 02 Jul 2017, 03:29 UTC

The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.

CVE-2017-10685 gnu vulnerability CVSS: 7.5 29 Jun 2017, 23:29 UTC

In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

CVE-2017-10684 gnu vulnerability CVSS: 7.5 29 Jun 2017, 23:29 UTC

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

CVE-2015-5180 gnu vulnerability CVSS: 5.0 27 Jun 2017, 20:29 UTC

res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).

CVE-2017-9955 gnu vulnerability CVSS: 4.3 26 Jun 2017, 23:29 UTC

The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program.

CVE-2017-9954 gnu vulnerability CVSS: 4.3 26 Jun 2017, 23:29 UTC

The getvalue function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted tekhex file, as demonstrated by mishandling within the nm program.

CVE-2017-9778 gnu vulnerability CVSS: 4.3 21 Jun 2017, 07:29 UTC

GNU Debugger (GDB) 8.0 and earlier fails to detect a negative length field in a DWARF section. A malformed section in an ELF binary or a core file can cause GDB to repeatedly allocate memory until a process limit is reached. This can, for example, impede efforts to analyze malware with GDB.

CVE-2017-1000366 gnu vulnerability CVSS: 7.2 19 Jun 2017, 16:29 UTC

glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.

CVE-2017-9756 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9755 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9754 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The process_otr function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not validate a certain offset, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9753 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The versados_mkobject function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not initialize a certain data structure, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9752 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during "objdump -D" execution.

CVE-2017-9751 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

opcodes/rl78-decode.opc in GNU Binutils 2.28 has an unbounded GETBYTE macro, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9750 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9749 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The *regs* macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9748 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.

CVE-2017-9747 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.

CVE-2017-9746 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during "objdump -D" execution.

CVE-2017-9745 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The _bfd_vms_slurp_etir function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9744 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9743 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The print_insn_score32 function in opcodes/score7-dis.c:552 in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-9742 gnu vulnerability CVSS: 6.8 19 Jun 2017, 04:29 UTC

The score_opcodes function in opcodes/score7-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.

CVE-2017-7507 gnu vulnerability CVSS: 5.0 16 Jun 2017, 19:29 UTC

GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.

CVE-2014-9984 gnu vulnerability CVSS: 7.5 12 Jun 2017, 13:29 UTC

nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.

CVE-2016-4973 gnu vulnerability CVSS: 4.6 07 Jun 2017, 20:29 UTC

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

CVE-2017-6891 gnu vulnerability CVSS: 6.8 22 May 2017, 19:29 UTC

Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.

CVE-2017-9044 gnu vulnerability CVSS: 4.3 18 May 2017, 01:29 UTC

The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file.

CVE-2017-9043 gnu vulnerability CVSS: 6.8 18 May 2017, 01:29 UTC

readelf.c in GNU Binutils 2017-04-12 has a "shift exponent too large for type unsigned long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.

CVE-2017-9042 gnu vulnerability CVSS: 6.8 18 May 2017, 01:29 UTC

readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.

CVE-2017-9041 gnu vulnerability CVSS: 4.3 18 May 2017, 01:29 UTC

GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to MIPS GOT mishandling in the process_mips_specific function in readelf.c.

CVE-2017-9040 gnu vulnerability CVSS: 4.3 18 May 2017, 01:29 UTC

GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt.

CVE-2017-9039 gnu vulnerability CVSS: 4.3 18 May 2017, 01:29 UTC

GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.

CVE-2017-9038 gnu vulnerability CVSS: 4.3 18 May 2017, 01:29 UTC

GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.

CVE-2017-8804 gnu vulnerability CVSS: 7.8 07 May 2017, 18:29 UTC

The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references

CVE-2017-8421 gnu vulnerability CVSS: 7.1 02 May 2017, 17:59 UTC

The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.

CVE-2017-8398 gnu vulnerability CVSS: 5.0 01 May 2017, 18:59 UTC

dwarf.c in GNU Binutils 2.28 is vulnerable to an invalid read of size 1 during dumping of debug information from a corrupt binary. This vulnerability causes programs that conduct an analysis of binary programs, such as objdump and readelf, to crash.

CVE-2017-8397 gnu vulnerability CVSS: 5.0 01 May 2017, 18:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 and an invalid write of size 1 during processing of a corrupt binary containing reloc(s) with negative addresses. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.

CVE-2017-8396 gnu vulnerability CVSS: 5.0 01 May 2017, 18:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.

CVE-2017-8395 gnu vulnerability CVSS: 5.0 01 May 2017, 18:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.

CVE-2017-8394 gnu vulnerability CVSS: 5.0 01 May 2017, 18:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.

CVE-2017-8393 gnu vulnerability CVSS: 5.0 01 May 2017, 18:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.

CVE-2017-8392 gnu vulnerability CVSS: 5.0 01 May 2017, 18:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.

CVE-2017-7869 gnu vulnerability CVSS: 5.0 14 Apr 2017, 04:59 UTC

GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.

CVE-2017-7853 gnu vulnerability CVSS: 5.0 13 Apr 2017, 16:59 UTC

In libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS.

CVE-2016-10326 gnu vulnerability CVSS: 5.0 13 Apr 2017, 16:59 UTC

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_body_to_str() function defined in osipparser2/osip_body.c, resulting in a remote DoS.

CVE-2016-10325 gnu vulnerability CVSS: 5.0 13 Apr 2017, 16:59 UTC

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the _osip_message_to_str() function defined in osipparser2/osip_message_to_str.c, resulting in a remote DoS.

CVE-2016-10324 gnu vulnerability CVSS: 7.5 13 Apr 2017, 16:59 UTC

In libosip2 in GNU oSIP 4.1.0, a malformed SIP message can lead to a heap buffer overflow in the osip_clrncpy() function defined in osipparser2/osip_port.c.

CVE-2015-8107 gnu vulnerability CVSS: 6.8 13 Apr 2017, 14:59 UTC

Format string vulnerability in GNU a2ps 4.14 allows remote attackers to execute arbitrary code.

CVE-2017-7614 gnu vulnerability CVSS: 7.5 09 Apr 2017, 14:59 UTC

elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a "member access within null pointer" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an "int main() {return 0;}" program.

CVE-2017-7304 gnu vulnerability CVSS: 5.0 29 Mar 2017, 15:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.

CVE-2017-7303 gnu vulnerability CVSS: 5.0 29 Mar 2017, 15:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.

CVE-2017-7302 gnu vulnerability CVSS: 5.0 29 Mar 2017, 15:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.

CVE-2017-7301 gnu vulnerability CVSS: 5.0 29 Mar 2017, 15:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.

CVE-2017-7300 gnu vulnerability CVSS: 5.0 29 Mar 2017, 15:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.

CVE-2017-7299 gnu vulnerability CVSS: 4.3 29 Mar 2017, 15:59 UTC

The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.

CVE-2017-5932 gnu vulnerability CVSS: 4.6 27 Mar 2017, 15:59 UTC

The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter.

CVE-2017-5337 gnu vulnerability CVSS: 7.5 24 Mar 2017, 15:59 UTC

Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.

CVE-2017-5336 gnu vulnerability CVSS: 7.5 24 Mar 2017, 15:59 UTC

Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.

CVE-2017-5335 gnu vulnerability CVSS: 5.0 24 Mar 2017, 15:59 UTC

The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.

CVE-2017-5334 gnu vulnerability CVSS: 7.5 24 Mar 2017, 15:59 UTC

Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.

CVE-2017-7227 gnu vulnerability CVSS: 5.0 22 Mar 2017, 16:59 UTC

GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.

CVE-2017-7226 gnu vulnerability CVSS: 6.4 22 Mar 2017, 16:59 UTC

The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.

CVE-2017-7225 gnu vulnerability CVSS: 5.0 22 Mar 2017, 16:59 UTC

The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.

CVE-2017-7224 gnu vulnerability CVSS: 4.3 22 Mar 2017, 16:59 UTC

The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.

CVE-2017-7223 gnu vulnerability CVSS: 5.0 22 Mar 2017, 16:59 UTC

GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.

CVE-2017-7210 gnu vulnerability CVSS: 4.3 21 Mar 2017, 06:59 UTC

objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.

CVE-2017-7209 gnu vulnerability CVSS: 4.3 21 Mar 2017, 06:59 UTC

The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.

CVE-2014-9939 gnu vulnerability CVSS: 7.5 21 Mar 2017, 06:59 UTC

ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.

CVE-2017-5618 gnu vulnerability CVSS: 7.2 20 Mar 2017, 16:59 UTC

GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.

CVE-2015-8985 gnu vulnerability CVSS: 4.3 20 Mar 2017, 16:59 UTC

The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.

CVE-2015-8984 gnu vulnerability CVSS: 4.3 20 Mar 2017, 16:59 UTC

The fnmatch function in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash) via a malformed pattern, which triggers an out-of-bounds read.

CVE-2015-8983 gnu vulnerability CVSS: 6.8 20 Mar 2017, 16:59 UTC

Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.

CVE-2017-6969 gnu vulnerability CVSS: 6.4 17 Mar 2017, 09:59 UTC

readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.

CVE-2017-6966 gnu vulnerability CVSS: 4.3 17 Mar 2017, 09:59 UTC

readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.

CVE-2017-6965 gnu vulnerability CVSS: 4.3 17 Mar 2017, 09:59 UTC

readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.

CVE-2015-8982 gnu vulnerability CVSS: 6.8 15 Mar 2017, 19:59 UTC

Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

CVE-2017-6508 gnu vulnerability CVSS: 4.3 07 Mar 2017, 08:59 UTC

CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.

CVE-2016-10228 gnu vulnerability CVSS: 4.3 02 Mar 2017, 01:59 UTC

The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.

CVE-2016-4493 gnu vulnerability CVSS: 4.3 24 Feb 2017, 20:59 UTC

The demangle_template_value_parm and do_hpacc_template_literal functions in cplus-dem.c in libiberty allow remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted binary.

CVE-2016-4492 gnu vulnerability CVSS: 4.3 24 Feb 2017, 20:59 UTC

Buffer overflow in the do_type function in cplus-dem.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary.

CVE-2016-4491 gnu vulnerability CVSS: 4.3 24 Feb 2017, 20:59 UTC

The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once."

CVE-2016-4490 gnu vulnerability CVSS: 4.3 24 Feb 2017, 20:59 UTC

Integer overflow in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to inconsistent use of the long and int types for lengths.

CVE-2016-4489 gnu vulnerability CVSS: 4.3 24 Feb 2017, 20:59 UTC

Integer overflow in the gnu_special function in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to the "demangling of virtual tables."

CVE-2016-4488 gnu vulnerability CVSS: 4.3 24 Feb 2017, 20:59 UTC

Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "ktypevec."

CVE-2016-4487 gnu vulnerability CVSS: 4.3 24 Feb 2017, 20:59 UTC

Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "btypevec."

CVE-2016-2226 gnu vulnerability CVSS: 6.8 24 Feb 2017, 20:59 UTC

Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.

CVE-2017-5357 gnu vulnerability CVSS: 5.0 17 Feb 2017, 02:59 UTC

regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free.

CVE-2016-5417 gnu vulnerability CVSS: 5.0 17 Feb 2017, 02:59 UTC

Memory leak in the __res_vinit function in the IPv6 name server management code in libresolv in GNU C Library (aka glibc or libc6) before 2.24 allows remote attackers to cause a denial of service (memory consumption) by leveraging partial initialization of internal resolver data structures.

CVE-2016-6131 gnu vulnerability CVSS: 5.0 07 Feb 2017, 15:59 UTC

The demangler in GNU Libiberty allows remote attackers to cause a denial of service (infinite loop, stack overflow, and crash) via a cycle in the references of remembered mangled types.

CVE-2016-2781 gnu vulnerability CVSS: 2.1 07 Feb 2017, 15:59 UTC

chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

CVE-2016-9401 gnu vulnerability CVSS: 2.1 23 Jan 2017, 21:59 UTC

popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.

CVE-2015-8972 gnu vulnerability CVSS: 7.5 23 Jan 2017, 21:59 UTC

Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.

CVE-2016-7543 gnu vulnerability CVSS: 7.2 19 Jan 2017, 20:59 UTC

Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.

CVE-2016-8606 gnu vulnerability CVSS: 7.5 12 Jan 2017, 22:59 UTC

The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.

CVE-2016-8605 gnu vulnerability CVSS: 5.0 12 Jan 2017, 22:59 UTC

The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.

CVE-2016-6321 gnu vulnerability CVSS: 5.0 09 Dec 2016, 22:59 UTC

Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.

CVE-2016-6323 gnu vulnerability CVSS: 5.0 07 Oct 2016, 14:59 UTC

The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.

CVE-2016-7444 gnu vulnerability CVSS: 5.0 27 Sep 2016, 15:59 UTC

The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

CVE-2016-7098 gnu vulnerability CVSS: 6.8 26 Sep 2016, 14:59 UTC

Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.

CVE-2016-6263 gnu vulnerability CVSS: 5.0 07 Sep 2016, 20:59 UTC

The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.

CVE-2016-6262 gnu vulnerability CVSS: 5.0 07 Sep 2016, 20:59 UTC

idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.

CVE-2016-6261 gnu vulnerability CVSS: 5.0 07 Sep 2016, 20:59 UTC

The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.

CVE-2015-8948 gnu vulnerability CVSS: 5.0 07 Sep 2016, 20:59 UTC

idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.

CVE-2016-7123 gnu vulnerability CVSS: 6.8 02 Sep 2016, 14:59 UTC

Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1.15 allows remote attackers to hijack the authentication of administrators.

CVE-2016-6893 gnu vulnerability CVSS: 6.8 02 Sep 2016, 14:59 UTC

Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.

CVE-2016-4971 gnu vulnerability CVSS: 4.3 30 Jun 2016, 17:59 UTC

GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.

CVE-2016-4429 gnu vulnerability CVSS: 4.3 10 Jun 2016, 15:59 UTC

Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.

CVE-2016-3706 gnu vulnerability CVSS: 5.0 10 Jun 2016, 15:59 UTC

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.

CVE-2016-3075 gnu vulnerability CVSS: 5.0 01 Jun 2016, 20:59 UTC

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.

CVE-2016-1234 gnu vulnerability CVSS: 5.0 01 Jun 2016, 20:59 UTC

Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.

CVE-2016-4008 gnu vulnerability CVSS: 4.3 05 May 2016, 18:59 UTC

The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.

CVE-2015-8779 gnu vulnerability CVSS: 7.5 19 Apr 2016, 21:59 UTC

Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.

CVE-2015-8778 gnu vulnerability CVSS: 7.5 19 Apr 2016, 21:59 UTC

Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.

CVE-2015-8776 gnu vulnerability CVSS: 6.4 19 Apr 2016, 21:59 UTC

The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.

CVE-2014-9761 gnu vulnerability CVSS: 7.5 19 Apr 2016, 21:59 UTC

Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.

CVE-2016-2037 gnu vulnerability CVSS: 4.3 22 Feb 2016, 15:59 UTC

The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.

CVE-2015-7547 gnu vulnerability CVSS: 6.8 18 Feb 2016, 21:59 UTC

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVE-2015-8777 gnu vulnerability CVSS: 2.1 20 Jan 2016, 05:59 UTC

The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.

CVE-2015-5277 gnu vulnerability CVSS: 7.2 17 Dec 2015, 19:59 UTC

The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.

CVE-2015-8370 gnu vulnerability CVSS: 6.9 16 Dec 2015, 21:59 UTC

Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.

CVE-2015-5276 gnu vulnerability CVSS: 5.0 17 Nov 2015, 15:59 UTC

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.

CVE-2015-1781 gnu vulnerability CVSS: 6.8 28 Sep 2015, 20:59 UTC

Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.

CVE-2015-3308 gnu vulnerability CVSS: 7.5 02 Sep 2015, 14:59 UTC

Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.

CVE-2013-7424 gnu vulnerability CVSS: 5.1 26 Aug 2015, 19:59 UTC

The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to ping6.

CVE-2015-6251 gnu vulnerability CVSS: 5.0 24 Aug 2015, 14:59 UTC

Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.

CVE-2014-8155 gnu vulnerability CVSS: 4.3 14 Aug 2015, 18:59 UTC

GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.

CVE-2015-2059 gnu vulnerability CVSS: 7.5 12 Aug 2015, 14:59 UTC

The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.

CVE-2015-3622 gnu vulnerability CVSS: 4.3 12 May 2015, 19:59 UTC

The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.

CVE-2014-9488 gnu vulnerability CVSS: 10.0 14 Apr 2015, 18:59 UTC

The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.

CVE-2015-2775 gnu vulnerability CVSS: 7.6 13 Apr 2015, 14:59 UTC

Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.

CVE-2015-2806 gnu vulnerability CVSS: 10.0 10 Apr 2015, 15:00 UTC

Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.

CVE-2015-1473 gnu vulnerability CVSS: 6.4 08 Apr 2015, 10:59 UTC

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVE-2015-1472 gnu vulnerability CVSS: 7.5 08 Apr 2015, 10:59 UTC

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVE-2014-8121 gnu vulnerability CVSS: 5.0 27 Mar 2015, 14:59 UTC

DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.

CVE-2015-0282 gnu vulnerability CVSS: 5.0 24 Mar 2015, 17:59 UTC

GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.

CVE-2014-9402 gnu vulnerability CVSS: 7.8 24 Feb 2015, 15:59 UTC

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.

CVE-2013-7423 gnu vulnerability CVSS: 5.0 24 Feb 2015, 15:59 UTC

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVE-2015-1197 gnu vulnerability CVSS: 1.9 19 Feb 2015, 15:59 UTC

cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.

CVE-2015-1345 gnu vulnerability CVSS: 2.1 12 Feb 2015, 16:59 UTC

The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.

CVE-2015-0235 gnu vulnerability CVSS: 10.0 28 Jan 2015, 19:59 UTC

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

CVE-2015-1196 gnu vulnerability CVSS: 4.3 21 Jan 2015, 18:59 UTC

GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.

CVE-2014-9471 gnu vulnerability CVSS: 7.5 16 Jan 2015, 16:59 UTC

The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.

CVE-2014-8738 gnu vulnerability CVSS: 5.0 15 Jan 2015, 15:59 UTC

The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.

CVE-2014-8737 gnu vulnerability CVSS: 3.6 09 Dec 2014, 23:59 UTC

Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.

CVE-2014-8504 gnu vulnerability CVSS: 7.5 09 Dec 2014, 23:59 UTC

Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.

CVE-2014-8503 gnu vulnerability CVSS: 7.5 09 Dec 2014, 23:59 UTC

Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.

CVE-2014-8502 gnu vulnerability CVSS: 7.5 09 Dec 2014, 23:59 UTC

Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.

CVE-2014-8501 gnu vulnerability CVSS: 7.5 09 Dec 2014, 23:59 UTC

The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.

CVE-2014-8485 gnu vulnerability CVSS: 7.5 09 Dec 2014, 23:59 UTC

The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.

CVE-2014-8484 gnu vulnerability CVSS: 5.0 09 Dec 2014, 23:59 UTC

The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.

CVE-2014-6040 gnu vulnerability CVSS: 5.0 05 Dec 2014, 16:59 UTC

GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.

CVE-2012-6656 gnu vulnerability CVSS: 5.0 05 Dec 2014, 16:59 UTC

iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.

CVE-2014-9112 gnu vulnerability CVSS: 5.0 02 Dec 2014, 16:59 UTC

Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.

CVE-2014-7817 gnu vulnerability CVSS: 4.6 24 Nov 2014, 15:59 UTC

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

CVE-2014-8564 gnu vulnerability CVSS: 5.0 13 Nov 2014, 21:32 UTC

The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.

CVE-2014-4877 gnu vulnerability CVSS: 9.3 29 Oct 2014, 10:55 UTC

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

CVE-2011-2702 gnu vulnerability CVSS: 6.8 27 Oct 2014, 20:55 UTC

Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.

CVE-2014-3564 gnu vulnerability CVSS: 6.8 20 Oct 2014, 17:55 UTC

Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."

CVE-2014-4043 gnu vulnerability CVSS: 7.5 06 Oct 2014, 23:55 UTC

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

CVE-2014-6278 gnu vulnerability CVSS: 10.0 30 Sep 2014, 10:55 UTC

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

CVE-2014-7187 gnu vulnerability CVSS: 10.0 28 Sep 2014, 19:55 UTC

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.

CVE-2014-7186 gnu vulnerability CVSS: 10.0 28 Sep 2014, 19:55 UTC

The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.

CVE-2014-6277 gnu vulnerability CVSS: 10.0 27 Sep 2014, 22:55 UTC

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

CVE-2014-7169 gnu vulnerability CVSS: 10.0 25 Sep 2014, 01:55 UTC

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

CVE-2014-6271 gnu vulnerability CVSS: 10.0 24 Sep 2014, 18:48 UTC

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

CVE-2014-5119 gnu vulnerability CVSS: 7.5 29 Aug 2014, 16:55 UTC

Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.

CVE-2014-2524 gnu vulnerability CVSS: 3.3 20 Aug 2014, 14:55 UTC

The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.

CVE-2014-0475 gnu vulnerability CVSS: 6.8 29 Jul 2014, 14:55 UTC

Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-3465 gnu vulnerability CVSS: 5.0 10 Jun 2014, 14:55 UTC

The gnutls_x509_dn_oid_name function in lib/x509/common.c in GnuTLS 3.0 before 3.1.20 and 3.2.x before 3.2.10 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted X.509 certificate, related to a missing LDAP description for an OID when printing the DN.

CVE-2014-3469 gnu vulnerability CVSS: 5.0 05 Jun 2014, 20:55 UTC

The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.

CVE-2014-3468 gnu vulnerability CVSS: 7.5 05 Jun 2014, 20:55 UTC

The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.

CVE-2014-3467 gnu vulnerability CVSS: 5.0 05 Jun 2014, 20:55 UTC

Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.

CVE-2014-3466 gnu vulnerability CVSS: 6.8 03 Jun 2014, 14:55 UTC

Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

CVE-2013-4577 gnu vulnerability CVSS: 2.1 12 May 2014, 14:55 UTC

A certain Debian patch for GNU GRUB uses world-readable permissions for grub.cfg, which allows local users to obtain password hashes, as demonstrated by reading the password_pbkdf2 directive in the file.

CVE-2013-6889 gnu vulnerability CVSS: 4.9 08 May 2014, 14:29 UTC

GNU Rush 1.7 does not properly drop privileges, which allows local users to read arbitrary files via the --lint option.

CVE-2014-3424 gnu vulnerability CVSS: 3.3 08 May 2014, 10:55 UTC

lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.

CVE-2014-3423 gnu vulnerability CVSS: 3.3 08 May 2014, 10:55 UTC

lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.

CVE-2014-3422 gnu vulnerability CVSS: 3.3 08 May 2014, 10:55 UTC

lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.

CVE-2014-3421 gnu vulnerability CVSS: 3.3 08 May 2014, 10:55 UTC

lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.

CVE-2001-1593 gnu vulnerability CVSS: 2.1 05 Apr 2014, 21:55 UTC

The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.

CVE-2014-0466 gnu vulnerability CVSS: 6.8 03 Apr 2014, 16:15 UTC

The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.

CVE-2014-1959 gnu vulnerability CVSS: 5.8 07 Mar 2014, 00:10 UTC

lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.

CVE-2014-0092 gnu vulnerability CVSS: 5.8 07 Mar 2014, 00:10 UTC

lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

CVE-2009-5138 gnu vulnerability CVSS: 5.8 07 Mar 2014, 00:10 UTC

GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.

CVE-2012-3406 gnu vulnerability CVSS: 6.8 10 Feb 2014, 18:15 UTC

The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.

CVE-2012-3405 gnu vulnerability CVSS: 5.0 10 Feb 2014, 18:15 UTC

The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.

CVE-2012-3404 gnu vulnerability CVSS: 5.0 10 Feb 2014, 18:15 UTC

The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.

CVE-2010-4226 gnu vulnerability CVSS: 5.0 06 Feb 2014, 17:00 UTC

cpio, as used in build 2007.05.10, 2010.07.28, and possibly other versions, allows remote attackers to overwrite arbitrary files via a symlink within an RPM package archive.

CVE-2013-7039 gnu vulnerability CVSS: 5.1 13 Dec 2013, 18:55 UTC

Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.

CVE-2013-7038 gnu vulnerability CVSS: 6.4 13 Dec 2013, 18:55 UTC

The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read.

CVE-2013-4458 gnu vulnerability CVSS: 5.0 12 Dec 2013, 18:55 UTC

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.

CVE-2013-4487 gnu vulnerability CVSS: 5.0 20 Nov 2013, 14:12 UTC

Off-by-one error in the dane_raw_tlsa in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.16 and 3.2.x before 3.2.6 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries. NOTE: this issue is due to an incomplete fix for CVE-2013-4466.

CVE-2013-4466 gnu vulnerability CVSS: 5.0 20 Nov 2013, 14:12 UTC

Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.15 and 3.2.x before 3.2.5 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries.

CVE-2013-4332 gnu vulnerability CVSS: 4.3 09 Oct 2013, 22:55 UTC

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

CVE-2013-4237 gnu vulnerability CVSS: 6.8 09 Oct 2013, 22:55 UTC

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.

CVE-2013-2207 gnu vulnerability CVSS: 2.6 09 Oct 2013, 22:55 UTC

pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.

CVE-2012-4424 gnu vulnerability CVSS: 5.1 09 Oct 2013, 22:55 UTC

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.

CVE-2012-4412 gnu vulnerability CVSS: 7.5 09 Oct 2013, 22:55 UTC

Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.

CVE-2013-4788 gnu vulnerability CVSS: 5.1 04 Oct 2013, 17:55 UTC

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.

CVE-2013-2116 gnu vulnerability CVSS: 5.0 03 Jul 2013, 18:55 UTC

The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2013-0169.

CVE-2012-0864 gnu vulnerability CVSS: 6.8 02 May 2013, 14:55 UTC

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

CVE-2011-4609 gnu vulnerability CVSS: 5.0 02 May 2013, 14:55 UTC

The svc_run function in the RPC implementation in glibc before 2.15 allows remote attackers to cause a denial of service (CPU consumption) via a large number of RPC connections.

CVE-2009-5029 gnu vulnerability CVSS: 6.8 02 May 2013, 14:55 UTC

Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.

CVE-2013-1914 gnu vulnerability CVSS: 5.0 29 Apr 2013, 22:55 UTC

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.

CVE-2011-4355 gnu vulnerability CVSS: 6.9 05 Mar 2013, 21:38 UTC

GNU Project Debugger (GDB) before 7.5, when .debug_gdb_scripts is defined, automatically loads certain files from the current working directory, which allows local users to gain privileges via crafted files such as Python scripts.

CVE-2013-0242 gnu vulnerability CVSS: 5.0 08 Feb 2013, 20:55 UTC

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

CVE-2013-1619 gnu vulnerability CVSS: 4.0 08 Feb 2013, 19:55 UTC

The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

CVE-2012-5667 gnu vulnerability CVSS: 4.4 03 Jan 2013, 11:54 UTC

Multiple integer overflows in GNU Grep before 2.11 might allow context-dependent attackers to execute arbitrary code via vectors involving a long input line that triggers a heap-based buffer overflow.

CVE-2012-3509 gnu vulnerability CVSS: 5.0 05 Sep 2012, 23:55 UTC

Multiple integer overflows in the (1) _objalloc_alloc function in objalloc.c and (2) objalloc_alloc macro in include/objalloc.h in GNU libiberty, as used by binutils 2.22, allow remote attackers to cause a denial of service (crash) via vectors related to the "addition of CHUNK_HEADER_SIZE to the length," which triggers a heap-based buffer overflow.

CVE-2012-3410 gnu vulnerability CVSS: 4.6 27 Aug 2012, 23:55 UTC

Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.

CVE-2012-1175 gnu vulnerability CVSS: 6.8 26 Aug 2012, 20:55 UTC

Integer overflow in the GnashImage::size method in libbase/GnashImage.h in GNU Gnash 0.8.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SWF file, which triggers a heap-based buffer overflow.

CVE-2012-3480 gnu vulnerability CVSS: 4.6 25 Aug 2012, 10:29 UTC

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

CVE-2012-3479 gnu vulnerability CVSS: 6.8 25 Aug 2012, 10:29 UTC

lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.

CVE-2012-3386 gnu vulnerability CVSS: 4.4 07 Aug 2012, 21:55 UTC

The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.

CVE-2011-4328 gnu vulnerability CVSS: 5.0 16 Jun 2012, 00:55 UTC

plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (world readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.

CVE-2012-1573 gnu vulnerability CVSS: 5.0 26 Mar 2012, 19:55 UTC

gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.

CVE-2012-1569 gnu vulnerability CVSS: 5.0 26 Mar 2012, 19:55 UTC

The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.

CVE-2012-1663 gnu vulnerability CVSS: 7.5 13 Mar 2012, 22:55 UTC

Double free vulnerability in libgnutls in GnuTLS before 3.0.14 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.

CVE-2012-0035 gnu vulnerability CVSS: 9.3 19 Jan 2012, 15:55 UTC

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

CVE-2012-0390 gnu vulnerability CVSS: 4.3 06 Jan 2012, 01:55 UTC

The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.

CVE-2011-5024 gnu vulnerability CVSS: 4.3 29 Dec 2011, 11:55 UTC

Cross-site scripting (XSS) vulnerability in mmsearch/design in the Mailman/htdig integration patch for Mailman allows remote attackers to inject arbitrary web script or HTML via the config parameter.

CVE-2011-4862 gnu vulnerability CVSS: 10.0 25 Dec 2011, 01:55 UTC

Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.

CVE-2011-4128 gnu vulnerability CVSS: 4.3 08 Dec 2011, 20:55 UTC

Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.

CVE-2011-3771 gnu vulnerability CVSS: 5.0 24 Sep 2011, 00:55 UTC

phpBook 2.1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by doc/update_smilies_1.50-1.60.php and certain other files.

CVE-2009-5082 gnu vulnerability CVSS: 3.3 30 Jun 2011, 15:55 UTC

The (1) configure and (2) config.guess scripts in GNU troff (aka groff) 1.20.1 on Openwall GNU/*/Linux (aka Owl) improperly create temporary files upon a failure of the mktemp function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file.

CVE-2009-5081 gnu vulnerability CVSS: 3.3 30 Jun 2011, 15:55 UTC

The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.

CVE-2009-5080 gnu vulnerability CVSS: 3.3 30 Jun 2011, 15:55 UTC

The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296.

CVE-2009-5079 gnu vulnerability CVSS: 3.3 30 Jun 2011, 15:55 UTC

The (1) gendef.sh, (2) doc/fixinfo.sh, and (3) contrib/gdiffmk/tests/runtests.in scripts in GNU troff (aka groff) 1.21 and earlier allow local users to overwrite arbitrary files via a symlink attack on a gro#####.tmp or /tmp/##### temporary file.

CVE-2009-5078 gnu vulnerability CVSS: 6.4 30 Jun 2011, 15:55 UTC

contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 launches the Ghostscript program without the -dSAFER option, which allows remote attackers to create, overwrite, rename, or delete arbitrary files via a crafted document.

CVE-2009-5044 gnu vulnerability CVSS: 3.3 24 Jun 2011, 20:55 UTC

contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.

CVE-2011-1095 gnu vulnerability CVSS: 6.2 10 Apr 2011, 02:55 UTC

locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function.

CVE-2011-1089 gnu vulnerability CVSS: 3.3 10 Apr 2011, 02:55 UTC

The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.

CVE-2011-1659 gnu vulnerability CVSS: 5.0 08 Apr 2011, 15:17 UTC

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.

CVE-2011-1658 gnu vulnerability CVSS: 3.7 08 Apr 2011, 15:17 UTC

ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that any standard operating-system distribution would ship an applicable setuid or setgid program.

CVE-2011-1071 gnu vulnerability CVSS: 5.1 08 Apr 2011, 15:17 UTC

The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.

CVE-2011-0536 gnu vulnerability CVSS: 6.9 08 Apr 2011, 15:17 UTC

Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847.

CVE-2009-5064 gnu vulnerability CVSS: 6.9 30 Mar 2011, 22:55 UTC

ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc.

CVE-2010-4651 gnu vulnerability CVSS: 5.8 11 Mar 2011, 22:55 UTC

Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.

CVE-2010-4756 gnu vulnerability CVSS: 4.0 02 Mar 2011, 20:00 UTC

The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.

CVE-2011-0707 gnu vulnerability CVSS: 4.3 22 Feb 2011, 19:00 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.

CVE-2010-4337 gnu vulnerability CVSS: 3.3 14 Jan 2011, 23:00 UTC

The configure script in gnash 0.8.8 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/gnash-configure-errors.$$, (2) /tmp/gnash-configure-warnings.$$, or (3) /tmp/gnash-configure-recommended.$$ files.

CVE-2010-4052 gnu vulnerability CVSS: 5.0 13 Jan 2011, 19:00 UTC

Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.

CVE-2010-4051 gnu vulnerability CVSS: 5.0 13 Jan 2011, 19:00 UTC

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."

CVE-2010-3856 gnu vulnerability CVSS: 7.2 07 Jan 2011, 19:00 UTC

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.

CVE-2010-3847 gnu vulnerability CVSS: 6.9 07 Jan 2011, 19:00 UTC

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.

CVE-2010-3192 gnu vulnerability CVSS: 5.0 14 Oct 2010, 05:58 UTC

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.

CVE-2010-3089 gnu vulnerability CVSS: 3.5 15 Sep 2010, 20:00 UTC

Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.

CVE-2010-2056 gnu vulnerability CVSS: 3.3 22 Jul 2010, 05:43 UTC

GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file.

CVE-2010-2252 gnu vulnerability CVSS: 6.8 06 Jul 2010, 17:17 UTC

GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.

CVE-2010-0830 gnu vulnerability CVSS: 5.1 01 Jun 2010, 20:30 UTC

Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.

CVE-2010-0296 gnu vulnerability CVSS: 7.2 01 Jun 2010, 20:30 UTC

The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.

CVE-2009-4881 gnu vulnerability CVSS: 5.0 01 Jun 2010, 20:30 UTC

Integer overflow in the __vstrfmon_l function in stdlib/strfmon_l.c in the strfmon implementation in the GNU C Library (aka glibc or libc6) before 2.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted format string, as demonstrated by the %99999999999999999999n string, a related issue to CVE-2008-1391.

CVE-2009-4880 gnu vulnerability CVSS: 5.0 01 Jun 2010, 20:30 UTC

Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and earlier allow context-dependent attackers to cause a denial of service (memory consumption or application crash) via a crafted format string, as demonstrated by a crafted first argument to the money_format function in PHP, a related issue to CVE-2008-1391.

CVE-2006-7239 gnu vulnerability CVSS: 5.0 24 May 2010, 19:30 UTC

The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, which triggers a NULL pointer dereference.

CVE-2010-1161 gnu vulnerability CVSS: 3.7 16 Apr 2010, 19:30 UTC

Race condition in GNU nano before 2.2.4, when run by root to edit a file that is not owned by root, allows local user-assisted attackers to change the ownership of arbitrary files via vectors related to the creation of backup files.

CVE-2010-1160 gnu vulnerability CVSS: 1.9 16 Apr 2010, 19:30 UTC

GNU nano before 2.2.4 does not verify whether a file has been changed before it is overwritten in a file-save operation, which allows local user-assisted attackers to overwrite arbitrary files via a symlink attack on an attacker-owned file that is being edited by the victim.

CVE-2010-0825 gnu vulnerability CVSS: 4.4 05 Apr 2010, 15:30 UTC

lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.

CVE-2010-0731 gnu vulnerability CVSS: 7.5 26 Mar 2010, 18:30 UTC

The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.

CVE-2010-0624 gnu vulnerability CVSS: 6.8 15 Mar 2010, 13:28 UTC

Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.

CVE-2010-0001 gnu vulnerability CVSS: 6.8 29 Jan 2010, 18:30 UTC

Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.

CVE-2009-2624 gnu vulnerability CVSS: 6.8 29 Jan 2010, 18:30 UTC

The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive. NOTE: this issue is caused by a CVE-2006-4334 regression.

CVE-2010-0015 gnu vulnerability CVSS: 7.5 14 Jan 2010, 18:30 UTC

nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote attackers to obtain the encrypted passwords of NIS accounts by calling the getpwnam function.

CVE-2010-0002 gnu vulnerability CVSS: 2.1 14 Jan 2010, 18:30 UTC

The /etc/profile.d/60alias.sh script in the Mandriva bash package for Bash 2.05b, 3.0, 3.2, 3.2.48, and 4.0 enables the --show-control-chars option in LS_OPTIONS, which allows local users to send escape sequences to terminal emulators, or hide the existence of a file, via a crafted filename.

CVE-2009-4029 gnu vulnerability CVSS: 4.4 20 Dec 2009, 02:30 UTC

The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.

CVE-2009-4135 gnu vulnerability CVSS: 4.4 11 Dec 2009, 16:30 UTC

The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp.

CVE-2009-4128 gnu vulnerability CVSS: 7.2 01 Dec 2009, 16:30 UTC

GNU GRand Unified Bootloader (GRUB) 2 1.97 only compares the submitted portion of a password with the actual password, which makes it easier for physically proximate attackers to conduct brute force attacks and bypass authentication by submitting a password whose length is 1.

CVE-2009-3736 gnu vulnerability CVSS: 6.9 29 Nov 2009, 13:07 UTC

ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.

CVE-2009-3555 gnu vulnerability CVSS: 5.8 09 Nov 2009, 17:30 UTC

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVE-2009-3490 gnu vulnerability CVSS: 6.8 30 Sep 2009, 15:30 UTC

GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

CVE-2009-2730 gnu vulnerability CVSS: 7.5 12 Aug 2009, 10:30 UTC

libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

CVE-2009-2409 gnu vulnerability CVSS: 5.1 30 Jul 2009, 19:30 UTC

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.

CVE-2009-1417 gnu vulnerability CVSS: 5.0 30 Apr 2009, 20:30 UTC

gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote attackers to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time checks in the _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls_x509, as used by (a) Exim, (b) OpenLDAP, and (c) libsoup.

CVE-2009-1416 gnu vulnerability CVSS: 7.5 30 Apr 2009, 20:30 UTC

lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structures, instead of the intended DSA keys, which might allow remote attackers to spoof signatures on certificates or have unspecified other impact by leveraging an invalid DSA key.

CVE-2009-1415 gnu vulnerability CVSS: 4.3 30 Apr 2009, 20:30 UTC

lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.

CVE-2009-1215 gnu vulnerability CVSS: 1.9 01 Apr 2009, 10:30 UTC

Race condition in GNU screen 4.0.3 allows local users to create or overwrite arbitrary files via a symlink attack on the /tmp/screen-exchange temporary file.

CVE-2009-1214 gnu vulnerability CVSS: 4.9 01 Apr 2009, 10:30 UTC

GNU screen 4.0.3 creates the /tmp/screen-exchange temporary file with world-readable permissions, which might allow local users to obtain sensitive session information.

CVE-2008-5078 gnu vulnerability CVSS: 6.8 19 Dec 2008, 17:30 UTC

Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename.

CVE-2008-5659 gnu vulnerability CVSS: 7.5 17 Dec 2008, 20:30 UTC

The gnu.java.security.util.PRNG class in GNU Classpath 0.97.2 and earlier uses a predictable seed based on the system time, which makes it easier for context-dependent attackers to conduct brute force attacks against cryptographic routines that use this class for randomness, as demonstrated against DSA private keys.

CVE-2008-4989 gnu vulnerability CVSS: 4.3 13 Nov 2008, 01:00 UTC

The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).

CVE-2008-3863 gnu vulnerability CVSS: 7.6 23 Oct 2008, 22:00 UTC

Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.

CVE-2008-4475 gnu vulnerability CVSS: 7.2 07 Oct 2008, 21:11 UTC

ibackup 2.27 allows local users to overwrite arbitrary files via a symlink attack on temporary files.

CVE-2008-4100 gnu vulnerability CVSS: 6.4 18 Sep 2008, 17:59 UTC

GNU adns 1.4 and earlier uses a fixed source port and sequential transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: the vendor reports that this is intended behavior and is compatible with the product's intended role in a trusted environment.

CVE-2008-3916 gnu vulnerability CVSS: 9.3 04 Sep 2008, 18:41 UTC

Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename. NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.

CVE-2008-3896 gnu vulnerability CVSS: 2.1 03 Sep 2008, 14:12 UTC

Grub Legacy 0.97 and earlier stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.

CVE-2008-2377 gnu vulnerability CVSS: 7.6 08 Aug 2008, 19:41 UTC

Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle.

CVE-2008-1946 gnu vulnerability CVSS: 4.4 28 Jul 2008, 17:41 UTC

The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module.

CVE-2008-1948 gnu vulnerability CVSS: 10.0 21 May 2008, 13:24 UTC

The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.

CVE-2008-1949 gnu vulnerability CVSS: 9.3 21 May 2008, 13:24 UTC

The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.

CVE-2008-1950 gnu vulnerability CVSS: 5.0 21 May 2008, 13:24 UTC

Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.

CVE-2008-2142 gnu vulnerability CVSS: 6.8 12 May 2008, 19:20 UTC

Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.

CVE-2008-1694 gnu vulnerability CVSS: 4.6 22 Apr 2008, 04:41 UTC

vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files.

CVE-2008-1688 gnu vulnerability CVSS: 7.5 09 Apr 2008, 19:05 UTC

Unspecified vulnerability in GNU m4 before 1.4.11 might allow context-dependent attackers to execute arbitrary code, related to improper handling of filenames specified with the -F option. NOTE: it is not clear when this issue crosses privilege boundaries.

CVE-2008-1685 gnu vulnerability CVSS: 6.8 06 Apr 2008, 23:44 UTC

gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999)

CVE-2008-1367 gnu vulnerability CVSS: 7.5 17 Mar 2008, 23:44 UTC

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.

CVE-2007-6613 gnu vulnerability CVSS: 5.0 03 Jan 2008, 22:46 UTC

Stack-based buffer overflow in the print_iso9660_recurse function in iso-info (src/iso-info.c) in GNU Compact Disc Input and Control Library (libcdio) 0.79 and earlier allows context-dependent attackers to cause a denial of service (core dump) and possibly execute arbitrary code via a disk or image that contains a long joilet file name.

CVE-2007-6109 gnu vulnerability CVSS: 10.0 07 Dec 2007, 11:46 UTC

Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.

CVE-2007-6130 gnu vulnerability CVSS: 5.0 26 Nov 2007, 22:46 UTC

gnump3d 2.9final does not apply password protection to its plugins, which might allow remote attackers to bypass intended access restrictions.

CVE-2007-5795 gnu vulnerability CVSS: 6.3 02 Nov 2007, 22:46 UTC

The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify critical program variables via a file containing a Local variables declaration.

CVE-2007-5377 gnu vulnerability CVSS: 6.9 12 Oct 2007, 00:17 UTC

The (1) tramp-make-temp-file and (2) tramp-make-tramp-temp-file functions in Tramp 2.1.10 extension for Emacs, and possibly earlier 2.1.x versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files.

CVE-2007-4476 gnu vulnerability CVSS: 7.5 05 Sep 2007, 01:17 UTC

Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."

CVE-2007-3741 gnu vulnerability CVSS: 4.3 27 Aug 2007, 17:17 UTC

The (1) psp (aka .tub), (2) bmp, (3) pcx, and (4) psd plugins in gimp allow user-assisted remote attackers to cause a denial of service (crash or memory consumption) via crafted image files, as discovered using the fusil fuzzing tool.

CVE-2007-4131 gnu vulnerability CVSS: 6.8 25 Aug 2007, 00:17 UTC

Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.

CVE-2007-2833 gnu vulnerability CVSS: 7.8 21 Jun 2007, 20:30 UTC

Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.

CVE-2007-3048 gnu vulnerability CVSS: 7.2 05 Jun 2007, 23:30 UTC

GNU screen 4.0.3 allows local users to unlock the screen via a CTRL-C sequence at the password prompt. NOTE: multiple third parties report inability to reproduce this issue

CVE-2007-2452 gnu vulnerability CVSS: 6.0 04 Jun 2007, 16:30 UTC

Heap-based buffer overflow in the visit_old_format function in locate/locate.c in locate in GNU findutils before 4.2.31 might allow context-dependent attackers to execute arbitrary code via a long pathname in a locate database that has the old format, a different vulnerability than CVE-2001-1036.

CVE-2007-2808 gnu vulnerability CVSS: 4.3 22 May 2007, 19:30 UTC

Cross-site scripting (XSS) vulnerability in gnatsweb.pl in Gnatsweb 4.00 and Gnats 4.1.99 allows remote attackers to inject arbitrary web script or HTML via the database parameter.

CVE-2007-2500 gnu vulnerability CVSS: 10.0 04 May 2007, 00:19 UTC

server/parser/sprite_definition.cpp in GNU Gnash (aka GNU Flash Player) 0.7.2 allows remote attackers to execute arbitrary code via a large number of SHOWFRAME elements within a DEFINESPRITE element, which triggers memory corruption and enables the attacker to call free with an arbitrary address, probably resultant from a buffer overflow.

CVE-2007-2162 gnu vulnerability CVSS: 7.8 22 Apr 2007, 19:19 UTC

(1) Mozilla Firefox 2.0.0.3 and (2) GNU IceWeasel 2.0.0.3 allow remote attackers to cause a denial of service (browser crash or system hang) via JavaScript that matches a regular expression against a long string, as demonstrated using /(.)*/.

CVE-2006-7151 gnu vulnerability CVSS: 6.6 07 Mar 2007, 20:19 UTC

Untrusted search path vulnerability in the libtool-ltdl library (libltdl.so) 1.5.22-2.3 in Fedora Core 5 might allow local users to execute arbitrary code via a malicious library in the (1) hwcap, (2) 0, and (3) nosegneg subdirectories.

CVE-2007-1263 gnu vulnerability CVSS: 5.0 06 Mar 2007, 20:19 UTC

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

CVE-2007-1269 gnu vulnerability CVSS: 5.0 06 Mar 2007, 20:19 UTC

GNUMail 1.1.2 and earlier does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote attackers to forge the contents of a message without detection.

CVE-2006-6939 gnu vulnerability CVSS: 4.6 17 Jan 2007, 00:28 UTC

GNU ed before 0.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files, possibly in the open_sbuf function.

CVE-2006-6719 gnu vulnerability CVSS: 5.0 23 Dec 2006, 11:28 UTC

The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.

CVE-2006-6235 gnu vulnerability CVSS: 10.0 07 Dec 2006, 11:28 UTC

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.

CVE-2006-4181 gnu vulnerability CVSS: 10.0 28 Nov 2006, 02:07 UTC

Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors.

CVE-2006-6097 gnu vulnerability CVSS: 4.0 24 Nov 2006, 18:07 UTC

GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.

CVE-2006-5864 gnu vulnerability CVSS: 5.1 11 Nov 2006, 01:07 UTC

Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.

CVE-2006-4810 gnu vulnerability CVSS: 4.6 08 Nov 2006, 21:07 UTC

Buffer overflow in the readline function in util/texindex.c, as used by the (1) texi2dvi and (2) texindex commands, in texinfo 4.8 and earlier allows local users to execute arbitrary code via a crafted Texinfo file.

CVE-2006-4573 gnu vulnerability CVSS: 2.6 24 Oct 2006, 18:07 UTC

Multiple unspecified vulnerabilities in the "utf8 combining characters handling" (utf8_handle_comb function in encoding.c) in screen before 4.0.3 allows user-assisted attackers to cause a denial of service (crash or hang) via certain UTF8 sequences.

CVE-2006-2191 gnu vulnerability CVSS: 7.5 19 Sep 2006, 21:07 UTC

Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable.

CVE-2006-4790 gnu vulnerability CVSS: 5.0 14 Sep 2006, 19:07 UTC

verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.

CVE-2006-4624 gnu vulnerability CVSS: 2.6 07 Sep 2006, 19:04 UTC

CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.

CVE-2006-3636 gnu vulnerability CVSS: 6.8 06 Sep 2006, 00:04 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2006-2941 gnu vulnerability CVSS: 5.0 06 Sep 2006, 00:04 UTC

Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".

CVE-2006-4146 gnu vulnerability CVSS: 5.1 31 Aug 2006, 22:04 UTC

Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.

CVE-2006-2362 gnu vulnerability CVSS: 7.5 15 May 2006, 16:06 UTC

Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.

CVE-2006-1902 gnu vulnerability CVSS: 2.1 20 Apr 2006, 10:02 UTC

fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value."

CVE-2006-1712 gnu vulnerability CVSS: 2.6 11 Apr 2006, 19:06 UTC

Cross-site scripting (XSS) vulnerability in the private archive script (private.py) in GNU Mailman 2.1.7 allows remote attackers to inject arbitrary web script or HTML via the action argument.

CVE-2006-0052 gnu vulnerability CVSS: 5.0 31 Mar 2006, 11:06 UTC

The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.

CVE-2006-0049 gnu vulnerability CVSS: 5.0 13 Mar 2006, 21:06 UTC

gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.

CVE-2006-0300 gnu vulnerability CVSS: 5.1 24 Feb 2006, 00:02 UTC

Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.

CVE-2006-0455 gnu vulnerability CVSS: 4.6 15 Feb 2006, 22:06 UTC

gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".

CVE-2006-0353 gnu vulnerability CVSS: 3.6 22 Jan 2006, 19:03 UTC

unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys.

CVE-2006-0075 gnu vulnerability CVSS: 7.5 04 Jan 2006, 01:03 UTC

Direct static code injection vulnerability in phpBook 1.3.2 and earlier allows remote attackers to execute arbitrary PHP code via the e-mail field (mail variable) in a new message, which is written to a PHP file.

CVE-2005-4808 gnu vulnerability CVSS: 7.6 31 Dec 2005, 05:00 UTC

Buffer overflow in reset_vars in config/tc-crx.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050714 allows user-assisted attackers to have an unknown impact via a crafted .s file.

CVE-2005-4807 gnu vulnerability CVSS: 7.5 31 Dec 2005, 05:00 UTC

Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.

CVE-2005-1918 gnu vulnerability CVSS: 2.6 31 Dec 2005, 05:00 UTC

The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".

CVE-2005-4268 gnu vulnerability CVSS: 3.7 15 Dec 2005, 18:11 UTC

Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.

CVE-2005-4153 gnu vulnerability CVSS: 7.8 11 Dec 2005, 02:03 UTC

Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573.

CVE-2005-3355 gnu vulnerability CVSS: 6.4 18 Nov 2005, 22:03 UTC

Directory traversal vulnerability in GNU Gnump3d before 2.9.8 has unknown impact via "CGI parameters, and cookie values".

CVE-2005-3349 gnu vulnerability CVSS: 1.9 18 Nov 2005, 22:03 UTC

GNU Gnump3d before 2.9.8 allows local users to modify or delete arbitrary files via a symlink attack on the index.lok temporary file.

CVE-2005-3573 gnu vulnerability CVSS: 5.0 16 Nov 2005, 07:42 UTC

Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash).

CVE-2005-3424 gnu vulnerability CVSS: 4.3 01 Nov 2005, 22:02 UTC

Cross-site scripting (XSS) vulnerability in GNUMP3D before 2.9.5 allows remote attackers to inject arbitrary web script or HTML via 404 error pages, a different vulnerability than CVE-2005-3425.

CVE-2005-3425 gnu vulnerability CVSS: 4.3 01 Nov 2005, 22:02 UTC

Cross-site scripting (XSS) vulnerability in GNUMP3D before 2.9.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2005-3424.

CVE-2005-3123 gnu vulnerability CVSS: 5.0 30 Oct 2005, 20:02 UTC

Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed.

CVE-2005-2960 gnu vulnerability CVSS: 2.1 05 Oct 2005, 19:02 UTC

cfengine 1.6.5 and 2.1.16 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by vicf.in, a different vulnerability than CVE-2005-3137.

CVE-2005-3137 gnu vulnerability CVSS: 2.1 05 Oct 2005, 19:02 UTC

The (1) cfmailfilter and (2) cfcron.in files for cfengine 1.6.5 allow local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2005-2960.

CVE-2005-3011 gnu vulnerability CVSS: 1.2 21 Sep 2005, 20:03 UTC

The sort_offline function for texindex in texinfo 4.8 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.

CVE-2005-2878 gnu vulnerability CVSS: 7.5 13 Sep 2005, 23:03 UTC

Format string vulnerability in search.c in the imap4d server in GNU Mailutils 0.6 allows remote authenticated users to execute arbitrary code via format string specifiers in the SEARCH command.

CVE-2005-2541 gnu vulnerability CVSS: 10.0 10 Aug 2005, 04:00 UTC

Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.

CVE-2005-2397 gnu vulnerability CVSS: 4.3 27 Jul 2005, 04:00 UTC

Cross-site scripting (XSS) vulnerability in guestbook.php in phpBook 1.46 allows remote attackers to inject arbitrary web script or HTML via the admin parameter.

CVE-2005-2180 gnu vulnerability CVSS: 2.1 11 Jul 2005, 04:00 UTC

gen-index in GNATS 4.0, 4.1.0, and possibly earlier versions, when installed setuid, does not properly check files passed to the -o argument and opens the file with write access, which allows local users to overwrite arbitrary files.

CVE-2005-1824 gnu vulnerability CVSS: 7.5 02 Jun 2005, 04:00 UTC

The sql_escape_string function in auth/sql.c for the mailutils SQL authentication module does not properly quote the "\" (backslash) character, which is used as an escape character and makes the module vulnerable to SQL injection attacks.

CVE-2005-1520 gnu vulnerability CVSS: 7.5 26 May 2005, 04:00 UTC

Buffer overflow in the header_get_field_name function in header.c for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a crafted e-mail.

CVE-2005-1521 gnu vulnerability CVSS: 7.5 26 May 2005, 04:00 UTC

Integer overflow in the fetch_io function of the imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via a partial message request with a large value in the END parameter, which leads to a heap-based buffer overflow.

CVE-2005-1523 gnu vulnerability CVSS: 7.5 26 May 2005, 04:00 UTC

Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via format string specifiers in the command tag for IMAP commands.

CVE-2005-1522 gnu vulnerability CVSS: 5.0 26 May 2005, 04:00 UTC

The imap4d server for GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows authenticated remote users to cause a denial of service (CPU consumption) via a large range value in the FETCH command.

CVE-2005-1705 gnu vulnerability CVSS: 7.2 24 May 2005, 04:00 UTC

gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.

CVE-2005-1704 gnu vulnerability CVSS: 4.6 24 May 2005, 04:00 UTC

Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.

CVE-2005-0758 gnu vulnerability CVSS: 4.6 13 May 2005, 04:00 UTC

zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.

CVE-2005-1431 gnu vulnerability CVSS: 5.0 03 May 2005, 04:00 UTC

The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.

CVE-2005-0080 gnu vulnerability CVSS: 5.0 02 May 2005, 04:00 UTC

The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.

CVE-2005-0202 gnu vulnerability CVSS: 5.0 02 May 2005, 04:00 UTC

Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.

CVE-2005-1228 gnu vulnerability CVSS: 5.0 02 May 2005, 04:00 UTC

Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.

CVE-2005-1229 gnu vulnerability CVSS: 4.6 02 May 2005, 04:00 UTC

Directory traversal vulnerability in cpio 2.6 and earlier allows remote attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.

CVE-2005-0988 gnu vulnerability CVSS: 3.7 02 May 2005, 04:00 UTC

Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.

CVE-2005-1039 gnu vulnerability CVSS: 3.7 02 May 2005, 04:00 UTC

Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.

CVE-2005-1111 gnu vulnerability CVSS: 3.7 02 May 2005, 04:00 UTC

Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.

CVE-2005-0990 gnu vulnerability CVSS: 2.1 02 May 2005, 04:00 UTC

unshar (unshar.c) in sharutils 4.2.1 allows local users to overwrite arbitrary files via a symlink attack on the unsh.X temporary file.

CVE-2004-1487 gnu vulnerability CVSS: 5.0 27 Apr 2005, 04:00 UTC

wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.

CVE-2004-1488 gnu vulnerability CVSS: 5.0 27 Apr 2005, 04:00 UTC

wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.

CVE-2004-0966 gnu vulnerability CVSS: 2.1 09 Feb 2005, 05:00 UTC

The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.

CVE-2004-0968 gnu vulnerability CVSS: 2.1 09 Feb 2005, 05:00 UTC

The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.

CVE-2004-0969 gnu vulnerability CVSS: 2.1 09 Feb 2005, 05:00 UTC

The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.

CVE-2004-0970 gnu vulnerability CVSS: 2.1 09 Feb 2005, 05:00 UTC

The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files. NOTE: the znew vulnerability may overlap CVE-2003-0367.

CVE-2005-0100 gnu vulnerability CVSS: 7.5 07 Feb 2005, 05:00 UTC

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

CVE-2004-1185 gnu vulnerability CVSS: 7.5 21 Jan 2005, 05:00 UTC

Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.

CVE-2004-1184 gnu vulnerability CVSS: 4.6 21 Jan 2005, 05:00 UTC

The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.

CVE-2004-1170 gnu vulnerability CVSS: 10.0 10 Jan 2005, 05:00 UTC

a2ps 4.13 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename.

CVE-2004-1177 gnu vulnerability CVSS: 4.3 10 Jan 2005, 05:00 UTC

Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.

CVE-2004-2531 gnu vulnerability CVSS: 7.8 31 Dec 2004, 05:00 UTC

X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys.

CVE-2004-0555 gnu vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

Buffer overflow in (1) queue.c and (2) queued.c in queue before 1.30.1 may allow remote attackers to execute arbitrary code.

CVE-2004-1143 gnu vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

The password generation in mailman before 2.1.5 generates only 5 million unique passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.

CVE-2004-1773 gnu vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.

CVE-2004-2461 gnu vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

Buffer overflow in pop3.c in gnubiff before 2.0.0 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code.

CVE-2004-0984 gnu vulnerability CVSS: 7.2 31 Dec 2004, 05:00 UTC

Unknown vulnerability in the dotlock implementation in mailutils before 1:0.5-4 on Debian GNU/Linux allows attackers to gain privileges.

CVE-2004-2264 gnu vulnerability CVSS: 6.4 31 Dec 2004, 05:00 UTC

Format string bug in the open_altfile function in filename.c for GNU less 382, 381, and 358 might allow local users to cause a denial of service or possibly execute arbitrary code via format strings in the LESSOPEN environment variable. NOTE: since less is not setuid or setgid, then this is not a vulnerability unless there are plausible scenarios under which privilege boundaries could be crossed

CVE-2004-1186 gnu vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).

CVE-2004-2460 gnu vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Unknown vulnerability in POP3 in gnubiff before 2.0.0 allows remote attackers to cause a denial of service (application crash) via an "infinite" Unique IDentification Listing (UIDL) list.

CVE-2004-1772 gnu vulnerability CVSS: 4.6 31 Dec 2004, 05:00 UTC

Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.

CVE-2004-2014 gnu vulnerability CVSS: 2.6 31 Dec 2004, 05:00 UTC

Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.

CVE-2004-1382 gnu vulnerability CVSS: 2.1 31 Dec 2004, 05:00 UTC

The glibcbug script in glibc 2.3.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2004-0968.

CVE-2004-1453 gnu vulnerability CVSS: 2.1 31 Dec 2004, 05:00 UTC

GNU glibc 2.3.4 before 2.3.4.20040619, 2.3.3 before 2.3.3.20040420, and 2.3.2 before 2.3.2-r10 does not restrict the use of LD_DEBUG for a setuid program, which allows local users to gain sensitive information, such as the list of symbols used by the program.

CVE-2004-2459 gnu vulnerability CVSS: 2.1 31 Dec 2004, 05:00 UTC

Unknown vulnerability in gnubiff 1.2.0 and earlier allows local users to obtain passwords, related to the password table.

CVE-2004-1377 gnu vulnerability CVSS: 2.1 27 Dec 2004, 05:00 UTC

The (1) fixps (aka fixps.in) and (2) psmandup (aka psmandup.in) scripts in a2ps before 4.13 allow local users to overwrite arbitrary files via a symlink attack on temporary files.

CVE-2004-1337 gnu vulnerability CVSS: 7.2 23 Dec 2004, 05:00 UTC

The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.

CVE-2004-0849 gnu vulnerability CVSS: 5.0 23 Dec 2004, 05:00 UTC

Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.

CVE-2004-0603 gnu vulnerability CVSS: 10.0 06 Dec 2004, 05:00 UTC

gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332.

CVE-2004-0623 gnu vulnerability CVSS: 10.0 06 Dec 2004, 05:00 UTC

Format string vulnerability in misc.c in GNU GNATS 4.00 may allow remote attackers to execute arbitrary code via format string specifiers in a string that gets logged by syslog.

CVE-2004-0576 gnu vulnerability CVSS: 5.0 06 Dec 2004, 05:00 UTC

The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.

CVE-2004-0353 gnu vulnerability CVSS: 10.0 23 Nov 2004, 05:00 UTC

Multiple buffer overflows in auth_ident() function in auth.c for GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to gain privileges via a long string.

CVE-2004-0354 gnu vulnerability CVSS: 10.0 23 Nov 2004, 05:00 UTC

Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c.

CVE-2004-0256 gnu vulnerability CVSS: 2.1 23 Nov 2004, 05:00 UTC

GNU libtool before 1.5.2, during compile time, allows local users to overwrite arbitrary files via a symlink attack on libtool directories in /tmp.

CVE-2004-0778 gnu vulnerability CVSS: 5.0 20 Oct 2004, 04:00 UTC

CVS 1.11.x before 1.11.17, and 1.12.x before 1.12.9, allows remote attackers to determine the existence of arbitrary files and directories via the -X command for an alternate history file, which causes different error messages to be returned.

CVE-2004-1349 gnu vulnerability CVSS: 2.1 04 Oct 2004, 04:00 UTC

gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.

CVE-2004-0412 gnu vulnerability CVSS: 5.0 18 Aug 2004, 04:00 UTC

Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.

CVE-2004-1701 gnu vulnerability CVSS: 10.0 09 Aug 2004, 04:00 UTC

Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication.

CVE-2004-1702 gnu vulnerability CVSS: 5.0 09 Aug 2004, 04:00 UTC

The AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 does not properly check the return value of the ReceiveTransaction function, which leads to a failed malloc call and triggers to a null dereference, which allows remote attackers to cause a denial of service (crash).

CVE-2004-0548 gnu vulnerability CVSS: 7.2 06 Aug 2004, 04:00 UTC

Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.

CVE-2004-0581 gnu vulnerability CVSS: 4.6 06 Aug 2004, 04:00 UTC

ksymoops-gznm script in Mandrake Linux 9.1 through 10.0, and Corporate Server 2.1, allows local users to delete arbitrary files via a symlink attack on files in /tmp.

CVE-2004-0422 gnu vulnerability CVSS: 2.1 07 Jul 2004, 04:00 UTC

flim before 1.14.3 creates temporary files insecurely, which allows local users to overwrite arbitrary files of the Emacs user via a symlink attack.

CVE-2004-0182 gnu vulnerability CVSS: 5.0 01 Jun 2004, 04:00 UTC

Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field.

CVE-2003-0991 gnu vulnerability CVSS: 5.0 03 Mar 2004, 05:00 UTC

Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.

CVE-2004-0131 gnu vulnerability CVSS: 5.0 03 Mar 2004, 05:00 UTC

The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.

CVE-2003-0965 gnu vulnerability CVSS: 6.8 17 Feb 2004, 05:00 UTC

Cross-site scripting (XSS) vulnerability in the admin CGI script for Mailman before 2.1.4 allows remote attackers to steal session cookies and conduct unauthorized activities.

CVE-2003-0992 gnu vulnerability CVSS: 4.3 17 Feb 2004, 05:00 UTC

Cross-site scripting (XSS) vulnerability in the create CGI script for Mailman before 2.1.3 allows remote attackers to steal cookies of other users.

CVE-2003-0978 gnu vulnerability CVSS: 7.5 05 Jan 2004, 05:00 UTC

Format string vulnerability in gpgkeys_hkp (experimental HKP interface) for the GnuPG (gpg) client 1.2.3 and earlier, and 1.3.3 and earlier, allows remote attackers or a malicious keyserver to cause a denial of service (crash) and possibly execute arbitrary code during key retrieval.

CVE-2003-1232 gnu vulnerability CVSS: 5.1 31 Dec 2003, 05:00 UTC

Emacs 21.2.1 does not prompt or warn the user before executing Lisp code in the local variables section of a text file, which allows user-assisted attackers to execute arbitrary commands, as demonstrated using the mode-name variable.

CVE-2003-0972 gnu vulnerability CVSS: 10.0 15 Dec 2003, 05:00 UTC

Integer signedness error in ansi.c for GNU screen 4.0.1 and earlier, and 3.9.15 and earlier, allows local users to execute arbitrary code via a large number of ";" (semicolon) characters in escape sequences, which leads to a buffer overflow.

CVE-2003-0795 gnu vulnerability CVSS: 5.0 15 Dec 2003, 05:00 UTC

The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference.

CVE-2003-0971 gnu vulnerability CVSS: 5.0 15 Dec 2003, 05:00 UTC

GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.

CVE-2003-0859 gnu vulnerability CVSS: 4.9 15 Dec 2003, 05:00 UTC

The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.

CVE-2003-0858 gnu vulnerability CVSS: 2.1 15 Dec 2003, 05:00 UTC

Zebra 0.93b and earlier, and quagga before 0.95, allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.

CVE-2003-0849 gnu vulnerability CVSS: 7.5 17 Nov 2003, 05:00 UTC

Buffer overflow in net.c for cfengine 2.x before 2.0.8 allows remote attackers to execute arbitrary code via certain packets with modified length values, which is trusted by the ReceiveTransaction function when using a buffer provided by the BusyWithConnection function.

CVE-2003-0853 gnu vulnerability CVSS: 5.0 17 Nov 2003, 05:00 UTC

An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.

CVE-2003-0854 gnu vulnerability CVSS: 2.1 17 Nov 2003, 05:00 UTC

ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.

CVE-2003-0826 gnu vulnerability CVSS: 7.5 06 Oct 2003, 04:00 UTC

lsh daemon (lshd) does not properly return from certain functions in (1) read_line.c, (2) channel_commands.c, or (3) client_keyexchange.c when long input is provided, which could allow remote attackers to execute arbitrary code via a heap-based buffer overflow attack.

CVE-2003-0367 gnu vulnerability CVSS: 2.1 02 Jul 2003, 04:00 UTC

znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.

CVE-2003-0255 gnu vulnerability CVSS: 10.0 27 May 2003, 04:00 UTC

The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.

CVE-2003-0028 gnu vulnerability CVSS: 7.5 25 Mar 2003, 05:00 UTC

Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.

CVE-2003-0038 gnu vulnerability CVSS: 4.3 07 Feb 2003, 05:00 UTC

Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters.

CVE-2002-2099 gnu vulnerability CVSS: 7.2 31 Dec 2002, 05:00 UTC

Buffer overflow in the GNU DataDisplay Debugger (DDD) 3.3.1 allows local users to execute arbitrary code and possibly gain privileges via a long HOME environment variable. NOTE: since DDD is not installed setuid or setgid, perhaps this issue should not be included in CVE.

CVE-2002-1344 gnu vulnerability CVSS: 5.0 18 Dec 2002, 05:00 UTC

Directory traversal vulnerability in wget before 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.

CVE-2002-1265 gnu vulnerability CVSS: 5.0 12 Nov 2002, 05:00 UTC

The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote attackers to cause a denial of service (hang).

CVE-2002-1216 gnu vulnerability CVSS: 5.0 28 Oct 2002, 05:00 UTC

GNU tar 1.13.19 and other versions before 1.13.25 allows remote attackers to overwrite arbitrary files via a symlink attack, as the result of a modification that effectively disabled the security check.

CVE-2002-1146 gnu vulnerability CVSS: 5.0 11 Oct 2002, 04:00 UTC

The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).

CVE-2002-0399 gnu vulnerability CVSS: 5.0 10 Oct 2002, 04:00 UTC

Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leaves the "..", a variant of CVE-2001-1267.

CVE-2002-0855 gnu vulnerability CVSS: 7.5 05 Sep 2002, 04:00 UTC

Cross-site scripting vulnerability in Mailman before 2.0.12 allows remote attackers to execute script as other users via a subscriber's list subscription options in the (1) adminpw or (2) info parameters to the ml-name feature.

CVE-2002-0684 gnu vulnerability CVSS: 7.5 12 Aug 2002, 04:00 UTC

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.

CVE-2002-0435 gnu vulnerability CVSS: 1.2 26 Jul 2002, 04:00 UTC

Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a ".." directory that is higher than expected, possibly up to the root file system.

CVE-2002-0388 gnu vulnerability CVSS: 7.5 18 Jun 2002, 04:00 UTC

Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries.

CVE-2002-0389 gnu vulnerability CVSS: 2.1 18 Jun 2002, 04:00 UTC

Pipermail in Mailman stores private mail messages with predictable filenames in a world-executable directory, which allows local users to read private mailing list archives.

CVE-2002-0178 gnu vulnerability CVSS: 7.2 29 May 2002, 04:00 UTC

uudecode, as available in the sharutils package before 4.2.1, does not check whether the filename of the uudecoded file is a pipe or symbolic link, which could allow attackers to overwrite files or execute commands.

CVE-2002-0204 gnu vulnerability CVSS: 7.5 16 May 2002, 04:00 UTC

Buffer overflow in GNU Chess (gnuchess) 5.02 and earlier, if modified or used in a networked capacity contrary to its own design as a single-user application, may allow local or remote attackers to execute arbitrary code via a long command.

CVE-2002-1602 gnu vulnerability CVSS: 4.6 23 Apr 2002, 04:00 UTC

Buffer overflow in the Braille module for GNU screen 3.9.11, when HAVE_BRAILLE is defined, allows local users to execute arbitrary code.

CVE-2002-0062 gnu vulnerability CVSS: 7.2 08 Mar 2002, 05:00 UTC

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."

CVE-2001-1376 gnu vulnerability CVSS: 7.5 04 Mar 2002, 05:00 UTC

Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.

CVE-2001-1377 gnu vulnerability CVSS: 5.0 04 Mar 2002, 05:00 UTC

Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.

CVE-2002-0003 gnu vulnerability CVSS: 7.5 27 Feb 2002, 05:00 UTC

Buffer overflow in the preprocessor in groff 1.16 and earlier allows remote attackers to gain privileges via lpd in the LPRng printing system.

CVE-2002-0044 gnu vulnerability CVSS: 3.6 31 Jan 2002, 05:00 UTC

GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.

CVE-2001-0884 gnu vulnerability CVSS: 5.1 21 Dec 2001, 05:00 UTC

Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.

CVE-2001-1228 gnu vulnerability CVSS: 7.5 18 Nov 2001, 05:00 UTC

Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server.

CVE-2001-1132 gnu vulnerability CVSS: 7.5 05 Sep 2001, 04:00 UTC

Mailman 2.0.x before 2.0.6 allows remote attackers to gain access to list administrative pages when there is an empty site or list password, which is not properly handled during the call to the crypt function during authentication.

CVE-2001-1036 gnu vulnerability CVSS: 7.2 31 Aug 2001, 04:00 UTC

GNU locate in findutils 4.1 on Slackware 7.1 and 8.0 allows local users to gain privileges via an old formatted filename database (locatedb) that contains an entry with an out-of-range offset, which causes locate to write to arbitrary process memory.

CVE-2001-0522 gnu vulnerability CVSS: 7.5 14 Aug 2001, 04:00 UTC

Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file.

CVE-2001-1301 gnu vulnerability CVSS: 1.2 07 Aug 2001, 04:00 UTC

rcs2log, as used in Emacs 20.4, xemacs 21.1.10 and other versions before 21.4, and possibly other packages, allows local users to modify files of other users via a symlink attack on a temporary file.

CVE-2001-1022 gnu vulnerability CVSS: 7.5 26 Jul 2001, 04:00 UTC

Format string vulnerability in pic utility in groff 1.16.1 and other versions, and jgroff before 1.15, allows remote attackers to bypass the -S option and execute arbitrary commands via format string specifiers in the plot command.

CVE-2001-1267 gnu vulnerability CVSS: 2.1 12 Jul 2001, 04:00 UTC

Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).

CVE-2001-0290 gnu vulnerability CVSS: 4.6 03 May 2001, 04:00 UTC

Vulnerability in Mailman 2.0.1 and earlier allows list administrators to obtain user passwords.

CVE-2001-0072 gnu vulnerability CVSS: 5.0 12 Feb 2001, 05:00 UTC

gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.

CVE-2001-0071 gnu vulnerability CVSS: 2.1 12 Feb 2001, 05:00 UTC

gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.

CVE-2000-1137 gnu vulnerability CVSS: 4.6 09 Jan 2001, 05:00 UTC

GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.

CVE-2000-0803 gnu vulnerability CVSS: 10.0 19 Dec 2000, 05:00 UTC

GNU Groff uses the current working directory to find a device description file, which allows a local user to gain additional privileges by including a malicious postpro directive in the description file, which is executed when another user runs groff.

CVE-2000-0947 gnu vulnerability CVSS: 10.0 19 Dec 2000, 05:00 UTC

Format string vulnerability in cfd daemon in GNU CFEngine before 1.6.0a11 allows attackers to execute arbitrary commands via format characters in the CAUTH command.

CVE-2000-0974 gnu vulnerability CVSS: 7.5 19 Dec 2000, 05:00 UTC

GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, which allows an attacker to modify contents of all documents but the first without detection.

CVE-2000-0963 gnu vulnerability CVSS: 7.2 19 Dec 2000, 05:00 UTC

Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.

CVE-2000-0959 gnu vulnerability CVSS: 1.2 19 Dec 2000, 05:00 UTC

glibc2 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environmental variables when a program is spawned from a setuid program, which could allow local users to overwrite files via a symlink attack.

CVE-2000-0824 gnu vulnerability CVSS: 7.2 14 Nov 2000, 05:00 UTC

The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH.

CVE-2000-0861 gnu vulnerability CVSS: 7.2 14 Nov 2000, 05:00 UTC

Mailman 1.1 allows list administrators to execute arbitrary commands via shell metacharacters in the %(listname) macro expansion.

CVE-2000-1219 gnu vulnerability CVSS: 7.5 01 Nov 2000, 05:00 UTC

The -ftrapv compiler option in gcc and g++ 3.3.3 and earlier does not handle all types of integer overflows, which may leave applications vulnerable to vulnerabilities related to overflows.

CVE-2000-0701 gnu vulnerability CVSS: 4.6 20 Oct 2000, 04:00 UTC

The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.

CVE-2000-0786 gnu vulnerability CVSS: 4.6 20 Oct 2000, 04:00 UTC

GNU userv 1.0.0 and earlier does not properly perform file descriptor swapping, which can corrupt the USERV_GROUPS and USERV_GIDS environmental variables and allow local users to bypass some access restrictions.

CVE-2000-0335 gnu vulnerability CVSS: 7.5 03 May 2000, 04:00 UTC

The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.

CVE-2000-0271 gnu vulnerability CVSS: 4.6 18 Apr 2000, 04:00 UTC

read-passwd and other Lisp functions in Emacs 20 do not properly clear the history of recently typed keys, which allows an attacker to read unencrypted passwords.

CVE-2000-0270 gnu vulnerability CVSS: 3.6 18 Apr 2000, 04:00 UTC

The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.

CVE-2000-0269 gnu vulnerability CVSS: 2.1 18 Apr 2000, 04:00 UTC

Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess.

CVE-2000-0151 gnu vulnerability CVSS: 6.2 01 Feb 2000, 05:00 UTC

GNU make follows symlinks when it reads a Makefile from stdin, which allows other local users to execute commands.

CVE-1999-0719 gnu vulnerability CVSS: 4.6 05 Aug 1999, 04:00 UTC

The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code.

CVE-1999-1165 gnu vulnerability CVSS: 7.2 21 Jul 1999, 04:00 UTC

GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a malicious program in the .fingerrc file, or (2) read arbitrary files via symbolic links from .plan, .forward, or .project files.

CVE-1999-0491 gnu vulnerability CVSS: 4.6 20 Apr 1999, 04:00 UTC

The prompt parsing in bash allows a local user to execute commands as another user by creating a directory with the name of the command to execute.

CVE-1999-0402 gnu vulnerability CVSS: 5.0 02 Jan 1999, 05:00 UTC

wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.

CVE-1999-0017 gnu vulnerability CVSS: 7.5 10 Dec 1997, 05:00 UTC

FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.

CVE-1999-0016 gnu vulnerability CVSS: 5.0 01 Dec 1997, 05:00 UTC

Land IP denial of service.

CVE-1999-0216 gnu vulnerability CVSS: 5.0 01 Nov 1997, 05:00 UTC

Denial of service of inetd on Linux through SYN and RST packets.

CVE-1999-0150 gnu vulnerability CVSS: 7.5 01 Jul 1997, 04:00 UTC

The Perl fingerd program allows arbitrary command execution from remote users.

CVE-1999-0035 gnu vulnerability CVSS: 5.1 29 May 1997, 04:00 UTC

Race condition in signal handling routine in ftpd, allowing read/write arbitrary files.

CVE-1999-0612 gnu vulnerability CVSS: 0 01 Mar 1997, 05:00 UTC

A version of finger is running that exposes valid user information to any entity on the network.

CVE-1999-0041 gnu vulnerability CVSS: 7.5 13 Feb 1997, 05:00 UTC

Buffer overflow in NLS (Natural Language Service).

CVE-1999-1383 gnu vulnerability CVSS: 4.6 13 Sep 1996, 04:00 UTC

(1) bash before 1.14.7, and (2) tcsh 6.05 allow local users to gain privileges via directory names that contain shell metacharacters (` back-tick), which can cause the commands enclosed in the directory name to be executed when the shell expands filenames using the \w option in the PS1 variable.