Gnu

Glibc

155 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 15.01.2026 22:16:12
  • Zuletzt bearbeitet 23.01.2026 19:36:50

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configu...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 14.01.2026 21:01:11
  • Zuletzt bearbeitet 03.02.2026 18:26:25

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that ...

  • EPSS 0.04%
  • Veröffentlicht 05.06.2025 19:20:23
  • Zuletzt bearbeitet 22.10.2025 14:03:33

The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the pow...

  • EPSS 0.05%
  • Veröffentlicht 05.06.2025 18:23:57
  • Zuletzt bearbeitet 01.10.2025 15:37:50

The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powe...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 16.05.2025 19:32:50
  • Zuletzt bearbeitet 03.11.2025 20:19:11

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen...

  • EPSS 0.65%
  • Veröffentlicht 22.01.2025 13:15:20
  • Zuletzt bearbeitet 30.04.2025 05:15:46

When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to pag...

  • EPSS 0.56%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 18.06.2025 14:56:01

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw...

  • EPSS 0.2%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 18.06.2025 14:50:25

nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...

  • EPSS 0.1%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 01.08.2025 01:56:26

nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...

  • EPSS 0.33%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 18.06.2025 14:40:48

nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 ...