
CVE-2019-16166
https://notcve.org/view.php?id=CVE-2019-16166
09 Sep 2019 — GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c. GNU cflow versiones hasta 1.6, presenta una lectura excesiva del búfer en la región heap de la memoria en la función nexttoken en el archivo parser.c. • https://lists.gnu.org/archive/html/bug-cflow/2019-04/msg00000.html • CWE-125: Out-of-bounds Read •

CVE-2019-15847 – gcc: POWER9 "DARN" RNG intrinsic produces repeated output
https://notcve.org/view.php?id=CVE-2019-15847
02 Sep 2019 — The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same. El backend POWER9 en GNU Compiler Collection (GCC) en versiones anteriores a la 10 podría optimizar múltiples llamadas de __buil... • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html • CWE-331: Insufficient Entropy •

CVE-2019-15767
https://notcve.org/view.php?id=CVE-2019-15767
29 Aug 2019 — In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file. En GNU Chess 6.2.5, hay un desbordamiento de búfer basado en pilas en la función cmd_load en frontend/cmd.cc a través de una posición de Chess diseñada en un archivo EPD. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZA4UCVURQXNLUNFAMRLZBAFRHSEVC6Q • CWE-787: Out-of-bounds Write •

CVE-2019-15531
https://notcve.org/view.php?id=CVE-2019-15531
23 Aug 2019 — GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c. GNU Libextractor hasta la versión 1.9 tiene una sobre-lectura de búfer basada en el montón en la función EXTRACTOR_dvi_extract_method en plugins / dvi_extractor.c. • https://bugs.gnunet.org/view.php?id=5846 • CWE-125: Out-of-bounds Read •

CVE-2018-20969 – patch: do_ed_script in pch.c does not block strings beginning with a ! character
https://notcve.org/view.php?id=CVE-2018-20969
16 Aug 2019 — do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter. La función do_ed_script en el archivo pch.c en el parche GNU versiones hasta 2.7.6 no bloquea cadenas que comienzan con un carácter !. • https://packetstorm.news/files/id/154124 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2014-10375
https://notcve.org/view.php?id=CVE-2014-10375
14 Aug 2019 — handle_messages in eXtl_tls.c in eXosip before 5.0.0 mishandles a negative value in a content-length header. la función handle_messages en el archivo eXtl_tls.c en eXosip versiones anteriores a 5.0.0, maneja inapropiadamente un valor negativo en un encabezado content-length. • http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 • CWE-189: Numeric Errors •

CVE-2019-14444 – Ubuntu Security Notice USN-4336-2
https://notcve.org/view.php?id=CVE-2019-14444
30 Jul 2019 — apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf. La función apply_relocations en el archivo readelf.c en Binutils de GNU versión 2.32, contiene un desbordamiento de enteros que permite a los atacantes desencadenar una violación de acceso de escritura (en la función byte_put_little_endian en el archivo elfcomm.c) por medio de ... • http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html • CWE-190: Integer Overflow or Wraparound •

CVE-2019-1010180 – gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution
https://notcve.org/view.php?id=CVE-2019-1010180
24 Jul 2019 — GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet. • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVE-2019-14250 – Ubuntu Security Notice USN-4336-2
https://notcve.org/view.php?id=CVE-2019-14250
24 Jul 2019 — An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow. Se ha descubierto una vulnerabilidad en GNU libiberty, tal y como se distribuye en GNU Binutils versión 2.32. simple_object_elf_match in simple-object-elf.c no comprueba un valor shstrndx de cero, lo que lleva a un desbordamiento de enteros y un desbordamiento de búfer b... • http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVE-2019-13638 – patch: OS shell command injection when processing crafted patch files
https://notcve.org/view.php?id=CVE-2019-13638
24 Jul 2019 — GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156. RouterOS de Mikrotik anterior a versión 6.44.5 (árbol de actualizaciones a largo plazo) es vulnerable al agotamiento de la memoria. Mediante el envío de una petición HTTP diseñada, un atacante remoto autenticado pue... • https://packetstorm.news/files/id/154124 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •