Gnu

Glibc

152 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.25%
  • Published 03.02.2019 02:29:00
  • Last modified 21.11.2024 04:47:58

In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

  • EPSS 0.02%
  • Published 21.01.2019 19:29:00
  • Last modified 21.11.2024 02:44:38

In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume tha...

  • EPSS 0.16%
  • Published 18.01.2019 19:29:00
  • Last modified 21.11.2024 04:46:32

The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecif...

Exploit
  • EPSS 1.48%
  • Published 04.12.2018 16:29:00
  • Last modified 21.11.2024 03:58:15

In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.

  • EPSS 1.08%
  • Published 18.05.2018 16:29:00
  • Last modified 21.11.2024 03:19:43

An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range sp...

  • EPSS 0.89%
  • Published 18.05.2018 16:29:00
  • Last modified 21.11.2024 03:42:57

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer over...

  • EPSS 0.59%
  • Published 18.05.2018 16:29:00
  • Last modified 21.11.2024 03:42:58

An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

  • EPSS 0.42%
  • Published 02.02.2018 14:29:01
  • Last modified 21.11.2024 04:10:53

The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap re...

  • EPSS 0.73%
  • Published 01.02.2018 14:29:00
  • Last modified 21.11.2024 04:10:45

An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to ...

Exploit
  • EPSS 1.54%
  • Published 01.02.2018 04:29:00
  • Last modified 21.11.2024 03:04:40

A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.