Search CVE reports
3001 – 3010 of 39001 results
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious...
1 affected package
libxml2
Package | 18.04 LTS |
---|---|
libxml2 | Fixed |
A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it...
1 affected package
glib2.0
Package | 18.04 LTS |
---|---|
glib2.0 | Not affected |
A flaw was found in GIMP. An integer overflow vulnerability exists in the GIMP "Despeckle" plug-in. The issue occurs due to unchecked multiplication of image dimensions, such as width, height, and bytes-per-pixel (img_bpp), which...
1 affected package
gimp
Package | 18.04 LTS |
---|---|
gimp | Needs evaluation |
Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory.
1 affected package
salt
Package | 18.04 LTS |
---|---|
salt | Needs evaluation |
Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then...
1 affected package
salt
Package | 18.04 LTS |
---|---|
salt | Needs evaluation |
File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys...
1 affected package
salt
Package | 18.04 LTS |
---|---|
salt | Needs evaluation |
Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the “tgt_env” variable. This can be exploited by an attacker to delete...
1 affected package
salt
Package | 18.04 LTS |
---|---|
salt | Needs evaluation |
Arbitrary event injection on Salt Master. The master's "_minion_event" method can be used by and authorized minion to send arbitrary events onto the master's event bus.
1 affected package
salt
Package | 18.04 LTS |
---|---|
salt | Needs evaluation |
Directory traversal attack in minion file cache creation. The master's default cache is vulnerable to a directory traversal attack. Which could be leveraged to write or overwrite 'cache' files outside of the cache directory.
1 affected package
salt
Package | 18.04 LTS |
---|---|
salt | Needs evaluation |
An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.
1 affected package
salt
Package | 18.04 LTS |
---|---|
salt | Needs evaluation |