A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.
Source: Red Hat, Inc.
Max CVSS
3.3
EPSS Score
0.05%
Published
2024-02-06
Updated
2024-05-22
A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.
Source: Red Hat, Inc.
Max CVSS
3.3
EPSS Score
0.05%
Published
2022-03-10
Updated
2024-01-16
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2019-11-19
Updated
2022-11-08
GNU Parallel before 20150522 (Nepal), when using (1) --cat or (2) --fifo with --sshlogin, allows local users to write to arbitrary files via a symlink attack on a temporary file.
Source: MITRE
Max CVSS
3.6
EPSS Score
0.04%
Published
2015-06-02
Updated
2018-10-30
GNU Parallel before 20150422, when using (1) --pipe, (2) --tmux, (3) --cat, (4) --fifo, or (5) --compress, allows local users to write to arbitrary files via a symlink attack on a temporary file.
Source: MITRE
Max CVSS
3.6
EPSS Score
0.04%
Published
2015-06-02
Updated
2016-12-07
Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
Source: MITRE
Max CVSS
3.6
EPSS Score
0.04%
Published
2014-12-09
Updated
2017-07-01
lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2014-05-08
Updated
2016-06-30
lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2014-05-08
Updated
2016-06-30
lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2014-05-08
Updated
2016-06-30
lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2014-05-08
Updated
2016-06-30
The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2014-08-20
Updated
2018-10-30
ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that any standard operating-system distribution would ship an applicable setuid or setgid program.
Source: MITRE
Max CVSS
3.7
EPSS Score
0.04%
Published
2011-04-08
Updated
2018-10-09
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.
Source: Red Hat, Inc.
Max CVSS
3.3
EPSS Score
0.04%
Published
2011-04-10
Updated
2016-12-07
The configure script in gnash 0.8.8 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/gnash-configure-errors.$$, (2) /tmp/gnash-configure-warnings.$$, or (3) /tmp/gnash-configure-recommended.$$ files.
Source: Red Hat, Inc.
Max CVSS
3.3
EPSS Score
0.04%
Published
2011-01-14
Updated
2012-06-19
Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.
Source: Red Hat, Inc.
Max CVSS
3.5
EPSS Score
0.16%
Published
2010-09-15
Updated
2023-02-13
GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file.
Source: Red Hat, Inc.
Max CVSS
3.3
EPSS Score
0.04%
Published
2010-07-22
Updated
2010-07-22
Race condition in GNU nano before 2.2.4, when run by root to edit a file that is not owned by root, allows local user-assisted attackers to change the ownership of arbitrary files via vectors related to the creation of backup files.
Source: Red Hat, Inc.
Max CVSS
3.7
EPSS Score
0.04%
Published
2010-04-16
Updated
2010-06-07
The (1) configure and (2) config.guess scripts in GNU troff (aka groff) 1.20.1 on Openwall GNU/*/Linux (aka Owl) improperly create temporary files upon a failure of the mktemp function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2011-06-30
Updated
2011-07-12
The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2011-06-30
Updated
2013-12-13
The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2011-06-30
Updated
2013-12-13
The (1) gendef.sh, (2) doc/fixinfo.sh, and (3) contrib/gdiffmk/tests/runtests.in scripts in GNU troff (aka groff) 1.21 and earlier allow local users to overwrite arbitrary files via a symlink attack on a gro#####.tmp or /tmp/##### temporary file.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2011-06-30
Updated
2013-12-13
contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.04%
Published
2011-06-24
Updated
2016-03-30
unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys.
Source: Debian GNU/Linux
Max CVSS
3.6
EPSS Score
0.04%
Published
2006-01-22
Updated
2017-07-20
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
Source: Red Hat, Inc.
Max CVSS
3.7
EPSS Score
0.65%
Published
2005-12-15
Updated
2018-10-03
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files.
Source: MITRE
Max CVSS
3.7
EPSS Score
0.04%
Published
2005-05-02
Updated
2008-09-05
28 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!