Gnu

Glibc

152 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 09.06.2025 15:15:26

A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.

Exploit
  • EPSS 1.02%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 06:23:20

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid progr...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 14.01.2022 07:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:55

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting ...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 14.01.2022 07:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:55

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 04.11.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:09

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 12.08.2021 16:15:10
  • Zuletzt bearbeitet 30.05.2025 19:15:26

In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 ...

  • EPSS 1.2%
  • Veröffentlicht 22.07.2021 18:15:23
  • Zuletzt bearbeitet 01.05.2025 18:10:02

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of in...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 25.05.2021 22:15:10
  • Zuletzt bearbeitet 21.11.2024 06:09:07

The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.02.2021 23:15:11
  • Zuletzt bearbeitet 09.06.2025 16:15:31

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an i...

  • EPSS 0.04%
  • Veröffentlicht 24.02.2021 15:15:13
  • Zuletzt bearbeitet 09.06.2025 15:15:25

The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the loc...