169 results (0.005 seconds)

CVSS: 3.9EPSS: 0%CPEs: 3EXPL: 0

09 Jun 2025 — A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition. Se ha identificado una vulnerabilidad en la librería libarchive, específicamente en la función archive_read_format_rar_seek_data... • https://access.redhat.com/security/cve/CVE-2025-5914 • CWE-415: Double Free •

CVSS: 3.9EPSS: 0%CPEs: 3EXPL: 0

09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition. Se ha identificado una vulnerabilidad en la librería libarchive. Esta falla puede activarse cuando se canalizan flujos de archivos a bsdtar, lo que podría permitir la... • https://access.redhat.com/security/cve/CVE-2025-5918 • CWE-125: Out-of-bounds Read •

CVSS: 2.8EPSS: 0%CPEs: 3EXPL: 0

09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. Se ha identificado una vulnerabilidad en la librería libarchive. • https://access.redhat.com/security/cve/CVE-2025-5917 • CWE-787: Out-of-bounds Write •

CVSS: 3.9EPSS: 0%CPEs: 3EXPL: 0

09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. Se ha identificado una vulnerabilidad en ... • https://access.redhat.com/security/cve/CVE-2025-5916 • CWE-190: Integer Overflow or Wraparound •

CVSS: 3.9EPSS: 0%CPEs: 3EXPL: 0

09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions. Se ha identificado una vulnerabilidad en la librería libarchive. Est... • https://access.redhat.com/security/cve/CVE-2025-5915 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 0

06 Jun 2025 — A flaw was found in the user's crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list. • https://access.redhat.com/security/cve/CVE-2025-5791 • CWE-266: Incorrect Privilege Assignment •

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

06 Jun 2025 — A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again. • https://access.redhat.com/security/cve/CVE-2025-0620 • CWE-552: Files or Directories Accessible to External Parties •

CVSS: 4.7EPSS: 0%CPEs: 7EXPL: 0

30 May 2025 — A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access... • https://access.redhat.com/security/cve/CVE-2025-4598 • CWE-364: Signal Handler Race Condition •

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

27 May 2025 — A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data. • https://access.redhat.com/security/cve/CVE-2025-5278 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.0EPSS: 0%CPEs: 3EXPL: 0

27 May 2025 — A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution. • https://access.redhat.com/security/cve/CVE-2025-5222 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •