Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
| Software | From | Fixed in |
|---|---|---|
| hardlink_project / hardlink | - | 0.1.2 |
| redhat / enterprise_linux | 6.0 | 6.0.x |
| debian / debian_linux | 8.0 | 8.0.x |
| redhat / enterprise_linux | 5.0 | 5.0.x |
| debian / debian_linux | 9.0 | 9.0.x |
| debian / debian_linux | 10.0 | 10.0.x |