Gnu

Glibc

152 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Published 27.01.2021 20:15:14
  • Last modified 09.06.2025 16:15:32

The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of ser...

  • EPSS 0.68%
  • Published 04.01.2021 18:15:13
  • Last modified 09.06.2025 16:15:30

The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.

  • EPSS 0.1%
  • Published 06.12.2020 00:15:11
  • Last modified 21.11.2024 05:24:14

sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen wh...

Exploit
  • EPSS 0.05%
  • Published 04.12.2020 07:15:11
  • Last modified 09.06.2025 16:15:32

The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

Exploit
  • EPSS 0.68%
  • Published 06.10.2020 13:15:13
  • Last modified 20.11.2024 23:28:06

manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was...

  • EPSS 0.19%
  • Published 30.04.2020 17:15:13
  • Last modified 21.11.2024 05:11:18

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker ...

  • EPSS 0.24%
  • Published 17.04.2020 19:15:14
  • Last modified 21.11.2024 05:11:18

An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of ser...

  • EPSS 4.07%
  • Published 01.04.2020 22:15:18
  • Last modified 21.11.2024 05:35:05

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in ...

Exploit
  • EPSS 0.05%
  • Published 04.03.2020 15:15:13
  • Last modified 21.11.2024 04:54:40

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl...

  • EPSS 0.02%
  • Published 19.11.2019 22:15:11
  • Last modified 21.11.2024 04:34:14

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping ad...