Filtered by vendor Klibc Project
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-31873 | 2 Debian, Klibc Project | 2 Debian Linux, Klibc | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow. | |||||
CVE-2021-31872 | 2 Debian, Klibc Project | 2 Debian Linux, Klibc | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in klibc before 2.0.9. Multiple possible integer overflows in the cpio command on 32-bit systems may result in a buffer overflow or other security impact. | |||||
CVE-2021-31871 | 2 Debian, Klibc Project | 2 Debian Linux, Klibc | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems. | |||||
CVE-2021-31870 | 2 Debian, Klibc Project | 2 Debian Linux, Klibc | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow. | |||||
CVE-2011-1930 | 2 Debian, Klibc Project | 2 Debian Linux, Klibc | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options. |