PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 1053

of 53

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Gnu, Xen
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.7

An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.6

An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.

Published:   Updated:

Vulnerability Type: Heap overflow

Vendor(s):  Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Fedoraproject, Gnu, Redhat
Immediate
Remediate Within 48 Hours
CVSS v2N/ACVSS v37.8

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

Published:   Updated:

Vulnerability Type: Heap overflow

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.1

A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.1

An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.8

A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Fedoraproject, Gnu, Netapp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Fedoraproject, Gnu, Netapp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Gnu
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function bfd_mach_o_get_synthetic_symtab in match-o.c.

of 53