Gnu

Glibc

152 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.27%
  • Published 31.01.2024 14:15:48
  • Last modified 07.02.2025 17:15:29

An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect ca...

Warning Exploit
  • EPSS 78.36%
  • Published 03.10.2023 18:15:10
  • Last modified 06.05.2025 21:02:34

A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launch...

  • EPSS 0.06%
  • Published 25.09.2023 16:15:15
  • Last modified 21.11.2024 08:41:10

A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

Exploit
  • EPSS 0.11%
  • Published 18.09.2023 17:15:55
  • Last modified 24.06.2025 17:31:20

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack con...

  • EPSS 1.9%
  • Published 18.09.2023 17:15:55
  • Last modified 26.09.2025 12:15:32

A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethos...

  • EPSS 0.3%
  • Published 12.09.2023 22:15:08
  • Last modified 26.09.2025 12:15:34

A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database...

Exploit
  • EPSS 0.03%
  • Published 25.06.2023 17:15:14
  • Last modified 21.11.2024 02:26:33

end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the...

  • EPSS 0.05%
  • Published 06.02.2023 19:15:10
  • Last modified 21.11.2024 07:37:37

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommend...

Exploit
  • EPSS 0.14%
  • Published 03.02.2023 06:15:09
  • Last modified 26.03.2025 15:15:48

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a pad...

Exploit
  • EPSS 0.57%
  • Published 31.08.2022 06:15:07
  • Last modified 21.11.2024 07:17:26

An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a por...