Gnu

Glibc

155 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 06.02.2023 19:15:10
  • Zuletzt bearbeitet 21.11.2024 07:37:37

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommend...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 03.02.2023 06:15:09
  • Zuletzt bearbeitet 26.03.2025 15:15:48

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a pad...

Exploit
  • EPSS 0.57%
  • Veröffentlicht 31.08.2022 06:15:07
  • Zuletzt bearbeitet 21.11.2024 07:17:26

An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a por...

  • EPSS 0.13%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 09.06.2025 15:15:26

A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.

Exploit
  • EPSS 1.02%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 02.12.2025 21:15:49

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid progr...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 14.01.2022 07:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:55

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting ...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 14.01.2022 07:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:55

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting...

Exploit
  • EPSS 0.6%
  • Veröffentlicht 04.11.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:09

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 12.08.2021 16:15:10
  • Zuletzt bearbeitet 30.05.2025 19:15:26

In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 ...

  • EPSS 1.11%
  • Veröffentlicht 22.07.2021 18:15:23
  • Zuletzt bearbeitet 01.05.2025 18:10:02

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of in...