Uclibc

Uclibc

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.76%
  • Published 29.09.2022 17:15:28
  • Last modified 21.11.2024 06:59:12

A memory corruption vulnerability exists in the libpthread linuxthreads functionality of uClibC 0.9.33.2 and uClibC-ng 1.0.40. Thread allocation can lead to memory corruption. An attacker can create threads to trigger this vulnerability.

  • EPSS 0.66%
  • Published 06.05.2022 05:15:07
  • Last modified 21.11.2024 07:02:31

uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2.

Exploit
  • EPSS 2.89%
  • Published 10.11.2021 15:15:12
  • Last modified 05.05.2025 17:17:27

In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking)...

  • EPSS 0.41%
  • Published 16.06.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

In uClibc 0.9.33.2, there is an out-of-bounds read in the get_subexp function in misc/regex/regexec.c when processing a crafted regular expression.

  • EPSS 0.33%
  • Published 16.06.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

In uClibc 0.9.33.2, there is stack exhaustion (uncontrolled recursion) in the check_dst_limits_calc_pos_1 function in misc/regex/regexec.c when processing a crafted regular expression.

  • EPSS 2.47%
  • Published 27.01.2017 22:59:00
  • Last modified 20.04.2025 01:37:25

Integer signedness error in libc/string/arm/memset.S in uClibc and uClibc-ng before 1.0.16 allows context-dependent attackers to cause a denial of service (crash) via a negative length value to the memset function.