Deprecated: Hook wp_smush_should_skip_parse is deprecated since version 3.16.1! Use wp_smush_should_skip_lazy_load instead. in /srv/www/cyberthreat.blog/wordpress/wp-includes/functions.php on line 6085

Deprecated: Hook wp_smush_should_skip_parse is deprecated since version 3.16.1! Use wp_smush_should_skip_lazy_load instead. in /srv/www/cyberthreat.blog/wordpress/wp-includes/functions.php on line 6085

Author: Cyberthreat Blog

CVE-2017-1000376

libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. This affects libffi version...

Read More

CVE-2017-1000372

A flaw exists in OpenBSD’s implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly...

Read More

CVE-2017-1000377

An issue was discovered in the size of the default stack guard page on PAX Linux (originally from GRSecurity but shipped by other Linux vendors), specifically the default stack guard page is not sufficiently large and can be...

Read More

CVE-2017-1000365

The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which...

Read More

CVE-2017-9763

The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via...

Read More