Gnu

Glibc

152 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.37%
  • Veröffentlicht 02.03.2011 20:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expres...

Exploit
  • EPSS 4.66%
  • Veröffentlicht 13.01.2011 19:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded r...

Exploit
  • EPSS 9.95%
  • Veröffentlicht 13.01.2011 19:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular exp...

Exploit
  • EPSS 4.99%
  • Veröffentlicht 07.01.2011 19:00:17
  • Zuletzt bearbeitet 11.04.2025 00:51:21

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted d...

  • EPSS 5.86%
  • Veröffentlicht 07.01.2011 19:00:17
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain...

  • EPSS 0.79%
  • Veröffentlicht 14.10.2010 05:58:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorre...

Exploit
  • EPSS 13.53%
  • Veröffentlicht 01.06.2010 20:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple integer overflows in the strfmon implementation in the GNU C Library (aka glibc or libc6) 2.10.1 and earlier allow context-dependent attackers to cause a denial of service (memory consumption or application crash) via a crafted format string...

  • EPSS 0.67%
  • Veröffentlicht 01.06.2010 20:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the __vstrfmon_l function in stdlib/strfmon_l.c in the strfmon implementation in the GNU C Library (aka glibc or libc6) before 2.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafte...

  • EPSS 0.11%
  • Veröffentlicht 01.06.2010 20:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of ...

  • EPSS 6.83%
  • Veröffentlicht 01.06.2010 20:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary ...