CVE-2011-3631
26.11.2019, 04:15
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.Enginsight
Vendor | Product | Version |
---|---|---|
hardlink_project | hardlink | 𝑥 < 0.1.2 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
redhat | enterprise_linux | 5.0 |
redhat | enterprise_linux | 6.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
References