Gnu

Glibc

157 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.3%
  • Veröffentlicht 12.09.2023 22:15:08
  • Zuletzt bearbeitet 26.09.2025 12:15:34

A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 25.06.2023 17:15:14
  • Zuletzt bearbeitet 21.11.2024 02:26:33

end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the...

  • EPSS 0.07%
  • Veröffentlicht 06.02.2023 19:15:10
  • Zuletzt bearbeitet 21.11.2024 07:37:37

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommend...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 03.02.2023 06:15:09
  • Zuletzt bearbeitet 26.03.2025 15:15:48

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a pad...

Exploit
  • EPSS 0.69%
  • Veröffentlicht 31.08.2022 06:15:07
  • Zuletzt bearbeitet 21.11.2024 07:17:26

An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a por...

  • EPSS 0.2%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 09.06.2025 15:15:26

A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.

Exploit
  • EPSS 0.78%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 02.12.2025 21:15:49

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid progr...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 14.01.2022 07:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:55

The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting ...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 14.01.2022 07:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:55

The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting...

Exploit
  • EPSS 0.6%
  • Veröffentlicht 04.11.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:09

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in ...