CVE-2023-0687
- EPSS 0.07%
- Veröffentlicht 06.02.2023 19:15:10
- Zuletzt bearbeitet 21.11.2024 07:37:37
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommend...
CVE-2023-25139
- EPSS 0.13%
- Veröffentlicht 03.02.2023 06:15:09
- Zuletzt bearbeitet 26.03.2025 15:15:48
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a pad...
CVE-2022-39046
- EPSS 0.57%
- Veröffentlicht 31.08.2022 06:15:07
- Zuletzt bearbeitet 21.11.2024 07:17:26
An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a por...
CVE-2021-3998
- EPSS 0.13%
- Veröffentlicht 24.08.2022 16:15:09
- Zuletzt bearbeitet 09.06.2025 15:15:26
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
CVE-2021-3999
- EPSS 1.02%
- Veröffentlicht 24.08.2022 16:15:09
- Zuletzt bearbeitet 02.12.2025 21:15:49
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid progr...
CVE-2022-23218
- EPSS 0.52%
- Veröffentlicht 14.01.2022 07:15:08
- Zuletzt bearbeitet 05.05.2025 17:17:55
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting ...
CVE-2022-23219
- EPSS 0.52%
- Veröffentlicht 14.01.2022 07:15:08
- Zuletzt bearbeitet 05.05.2025 17:17:55
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting...
CVE-2021-43396
- EPSS 0.6%
- Veröffentlicht 04.11.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:09
In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in ...
CVE-2021-38604
- EPSS 0.1%
- Veröffentlicht 12.08.2021 16:15:10
- Zuletzt bearbeitet 30.05.2025 19:15:26
In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 ...
CVE-2021-35942
- EPSS 1.11%
- Veröffentlicht 22.07.2021 18:15:23
- Zuletzt bearbeitet 01.05.2025 18:10:02
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of in...