The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 3.3 | LOW | AV:L/AC:M/Au:N/C:P/I:P/A:N |
Primary | 2.0 | 3.3 | LOW | AV:L/AC:M/Au:N/C:P/I:P/A:N |
Hyperlink | Source | Resource |
---|---|---|
http://openwall.com/lists/oss-security/2011/03/04/10 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/04/11 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/04/12 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/04/9 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/05/3 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/05/7 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/07/9 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/14/16 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/14/5 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/14/7 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/15/6 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/22/4 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/22/6 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/31/3 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/31/4 | secalert@redhat.com | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/01/2 | secalert@redhat.com | Mailing List Third Party Advisory |
http://sourceware.org/bugzilla/show_bug.cgi?id=12625 | secalert@redhat.com | Issue Tracking |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:178 | secalert@redhat.com | Broken Link |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:179 | secalert@redhat.com | Broken Link |
http://www.redhat.com/support/errata/RHSA-2011-1526.html | secalert@redhat.com | Third Party Advisory |
http://www.securityfocus.com/bid/46740 | secalert@redhat.com | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=688980 | secalert@redhat.com | Issue Tracking |
http://openwall.com/lists/oss-security/2011/03/04/10 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/04/11 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/04/12 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/04/9 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/05/3 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/05/7 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/07/9 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/14/16 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/14/5 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/14/7 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/15/6 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/22/4 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/22/6 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/31/3 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/03/31/4 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/01/2 | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://sourceware.org/bugzilla/show_bug.cgi?id=12625 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:178 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:179 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
http://www.redhat.com/support/errata/RHSA-2011-1526.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.securityfocus.com/bid/46740 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=688980 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking |
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.