
CVE-2019-11639 – Ubuntu Security Notice USN-7137-1
https://notcve.org/view.php?id=CVE-2019-11639
01 May 2019 — An issue was discovered in GNU recutils 1.8. There is a stack-based buffer overflow in the function rec_type_check_enum at rec-types.c in librec.a. Se descubrió un problema en GNU recutils versión 1.8. Hay un desbordamiento de búfer basado en pila en la función rec_type_check_enum en rec-types.c en librec.a. It was discovered that recutils incorrectly handled memory when parsing comments with the recparser utility. • https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils • CWE-787: Out-of-bounds Write •

CVE-2019-11638
https://notcve.org/view.php?id=CVE-2019-11638
01 May 2019 — An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_field_name_equal_p at rec-field-name.c in librec.a, leading to a crash. Se descubrió un problema en GNU recutils versión 1.8. Hay una desreferencia de un puntero NULL en la función rec_field_name_equal_p en rec-field-name.c en librec.a, lo que conduce a un cierre inesperado • https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils • CWE-125: Out-of-bounds Read CWE-476: NULL Pointer Dereference •

CVE-2019-11637 – Ubuntu Security Notice USN-7137-1
https://notcve.org/view.php?id=CVE-2019-11637
01 May 2019 — An issue was discovered in GNU recutils 1.8. There is a NULL pointer dereference in the function rec_rset_get_props at rec-rset.c in librec.a, leading to a crash. Se descubrió un problema en GNU recutils versión 1.8. Hay una desreferencia de un puntero NULL en la función rec_rset_get_props en rec-rset.c en librec.a, lo que conduce a un cierre inesperado It was discovered that recutils incorrectly handled memory when parsing comments with the recparser utility. An attacker could possibly use this issue to ca... • https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils • CWE-125: Out-of-bounds Read CWE-476: NULL Pointer Dereference •

CVE-2006-7254
https://notcve.org/view.php?id=CVE-2006-7254
10 Apr 2019 — The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon. El demonio nscd en la librería GNU C (glibc) anterior a la versión 2.5, no cierra los sockets de clientes entrantes si no pueden ser manejados por el demonio, lo que permite a los usuarios locales llevar a cabo un ataque de denegación de servicio en el demonio. • https://sourceware.org/bugzilla/show_bug.cgi?id=2498 • CWE-19: Data Processing Errors •

CVE-2005-3590
https://notcve.org/view.php?id=CVE-2005-3590
10 Apr 2019 — The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory. La función getgrouplist en la librería GNU C (glibc) anterior a la versión 2.3.5, cuando se invoca con un argumento cero, escribe en el puntero pasado incluso si el tamaño de la matriz especificada es cero, lo que lleva a un desbordamiento del bú... • http://www.securityfocus.com/bid/107871 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2019-5953 – wget: do_conversion() heap-based buffer overflow vulnerability
https://notcve.org/view.php?id=CVE-2019-5953
08 Apr 2019 — Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. El desbordamiento de búfer en GNU Wget 1.20.1 y versiones anteriores permite a los atacantes remotos causar una denegación de servicio (DoS) o pueden ejecutar un código arbitrario a través de vectores no especificados. A buffer overflow flaw was found in the GNU Wget in version 1.20.1 and earlier when processing Internationalized Resource Identif... • http://jvn.jp/en/jp/JVN25261088/index.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2019-3836 – gnutls: invalid pointer access upon receiving async handshake messages
https://notcve.org/view.php?id=CVE-2019-3836
01 Apr 2019 — It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages. Se descubrió en gnutls, antes de la versión 3.6.7 upstream, que hay un acceso de puntero no inicializado en gnutls, en versiones 3.6.4 o posteriores, que puede desencadenarse por determinados mensajes "post-handshake". A flaw was found in the way gnutls handled malformed TLS 1.3 asynchronous messages. An attacker ... • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html • CWE-456: Missing Initialization of a Variable CWE-824: Access of Uninitialized Pointer •

CVE-2019-3829 – gnutls: use-after-free/double-free in certificate verification
https://notcve.org/view.php?id=CVE-2019-3829
27 Mar 2019 — A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected. Se ha descubierto una vulnerabilidad en gnutls, desde la versión 3.5.8 hasta antes de la 3.6.7. Hay una vulnerabilidad de corrupción de memoria (doble liberación o "double free") en la API de verificación de certificados. • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html • CWE-415: Double Free CWE-416: Use After Free •

CVE-2019-9923 – Ubuntu Security Notice USN-4692-1
https://notcve.org/view.php?id=CVE-2019-9923
22 Mar 2019 — pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers. pax_decode_header en sparse.c en GNU Tar, en versiones anteriores a la 1.32, tenía una desreferencia de puntero NULL al analizar ciertos archivos que tenían cabeceras extendidas mal formadas. Chris Siebenmann discovered that tar incorrectly handled extracting files resized during extraction when invoked with the --sparse flag. An attacker could possibly use ... • http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 • CWE-476: NULL Pointer Dereference •

CVE-2019-9924 – bash: BASH_CMD is writable in restricted bash shells
https://notcve.org/view.php?id=CVE-2019-9924
22 Mar 2019 — rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell. rbash en Bash USN-4058-1 fixed a vulnerability in bash. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bash incorrectly handled the restricted shell. An attacker could possibly use this issue to escape restrictions and execute any command. Various other issues were also address... • http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65 • CWE-138: Improper Neutralization of Special Elements CWE-862: Missing Authorization •