Gnu

Glibc

157 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 08.04.2011 15:17:28
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary director...

Exploit
  • EPSS 2.48%
  • Veröffentlicht 08.04.2011 15:17:28
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted p...

Exploit
  • EPSS 5.23%
  • Veröffentlicht 08.04.2011 15:17:27
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka...

  • EPSS 0.28%
  • Veröffentlicht 08.04.2011 15:17:26
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 30.03.2011 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor s...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 02.03.2011 20:00:01
  • Zuletzt bearbeitet 03.11.2025 22:15:41

The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expres...

Exploit
  • EPSS 4.66%
  • Veröffentlicht 13.01.2011 19:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded r...

Exploit
  • EPSS 9.95%
  • Veröffentlicht 13.01.2011 19:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular exp...

Exploit
  • EPSS 4.98%
  • Veröffentlicht 07.01.2011 19:00:17
  • Zuletzt bearbeitet 11.04.2025 00:51:21

elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted d...

  • EPSS 5.28%
  • Veröffentlicht 07.01.2011 19:00:17
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain...