Gnu

Glibc

155 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 92.86%
  • Veröffentlicht 17.04.2024 18:15:15
  • Zuletzt bearbeitet 13.02.2025 18:17:58

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neig...

Exploit
  • EPSS 24.32%
  • Veröffentlicht 31.01.2024 14:15:48
  • Zuletzt bearbeitet 21.11.2024 08:43:27

A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument...

Exploit
  • EPSS 0.61%
  • Veröffentlicht 31.01.2024 14:15:48
  • Zuletzt bearbeitet 21.11.2024 08:44:32

An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 31.01.2024 14:15:48
  • Zuletzt bearbeitet 07.02.2025 17:15:29

An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect ca...

Warnung Exploit
  • EPSS 73.04%
  • Veröffentlicht 03.10.2023 18:15:10
  • Zuletzt bearbeitet 08.01.2026 16:28:27

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launch...

  • EPSS 0.06%
  • Veröffentlicht 25.09.2023 16:15:15
  • Zuletzt bearbeitet 21.11.2024 08:41:10

A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 18.09.2023 17:15:55
  • Zuletzt bearbeitet 24.06.2025 17:31:20

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack con...

  • EPSS 1.9%
  • Veröffentlicht 18.09.2023 17:15:55
  • Zuletzt bearbeitet 26.09.2025 12:15:32

A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethos...

  • EPSS 0.3%
  • Veröffentlicht 12.09.2023 22:15:08
  • Zuletzt bearbeitet 26.09.2025 12:15:34

A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 25.06.2023 17:15:14
  • Zuletzt bearbeitet 21.11.2024 02:26:33

end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the...