Total vulnerabilities in the database
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
Software | From | Fixed in |
---|---|---|
hardlink_project / hardlink | - | 0.1.2 |
redhat / enterprise_linux | 6.0 | 6.0.x |
debian / debian_linux | 8.0 | 8.0.x |
redhat / enterprise_linux | 5.0 | 5.0.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |