Hurd GNU Hurd

Do you want an email whenever new security vulnerabilities are reported in GNU Hurd?

By the Year

In 2024 there have been 0 vulnerabilities in GNU Hurd . Hurd did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 4 7.78
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Hurd vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent GNU Hurd Security Vulnerabilities

An issue was discovered in GNU Hurd before 0.9 20210404-9

CVE-2021-43414 7 - High - November 07, 2021

An issue was discovered in GNU Hurd before 0.9 20210404-9. The use of an authentication protocol in the proc server is vulnerable to man-in-the-middle attacks, which can be exploited for local privilege escalation to get full root access.

authentification

An issue was discovered in GNU Hurd before 0.9 20210404-9

CVE-2021-43413 8.8 - High - November 07, 2021

An issue was discovered in GNU Hurd before 0.9 20210404-9. A single pager port is shared among everyone who mmaps a file, allowing anyone to modify any files that they can read. This can be trivially exploited to get full root access.

An issue was discovered in GNU Hurd before 0.9 20210404-9

CVE-2021-43412 7.8 - High - November 07, 2021

An issue was discovered in GNU Hurd before 0.9 20210404-9. libports accepts fake notification messages from any client on any port, which can lead to port use-after-free. This can be exploited for local privilege escalation to get full root access.

Dangling pointer

An issue was discovered in GNU Hurd before 0.9 20210404-9

CVE-2021-43411 7.5 - High - November 07, 2021

An issue was discovered in GNU Hurd before 0.9 20210404-9. When trying to exec a setuid executable, there's a window of time when the process already has the new privileges, but still refers to the old task and is accessible through the old process port. This can be exploited to get full root access.

Race Condition

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for GNU Hurd or by GNU? Click the Watch button to subscribe.

GNU
Vendor

GNU Hurd
Product

subscribe