CVE-2020-6096
- EPSS 4.85%
- Veröffentlicht 01.04.2020 22:15:18
- Zuletzt bearbeitet 21.11.2024 05:35:05
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in ...
CVE-2020-10029
- EPSS 0.06%
- Veröffentlicht 04.03.2020 15:15:13
- Zuletzt bearbeitet 21.11.2024 04:54:40
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl...
CVE-2019-19126
- EPSS 0.02%
- Veröffentlicht 19.11.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 04:34:14
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping ad...
CVE-2019-1010022
- EPSS 0.13%
- Veröffentlicht 15.07.2019 04:15:13
- Zuletzt bearbeitet 21.11.2024 04:17:55
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack...
CVE-2019-1010023
- EPSS 0.31%
- Veröffentlicht 15.07.2019 04:15:13
- Zuletzt bearbeitet 21.11.2024 04:17:55
GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to...
CVE-2019-1010024
- EPSS 0.65%
- Veröffentlicht 15.07.2019 04:15:13
- Zuletzt bearbeitet 21.11.2024 04:17:55
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threa...
CVE-2019-1010025
- EPSS 1.24%
- Veröffentlicht 15.07.2019 04:15:13
- Zuletzt bearbeitet 21.11.2024 04:17:55
GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.
CVE-2005-3590
- EPSS 0.48%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 00:02:15
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to ...
CVE-2006-7254
- EPSS 0.04%
- Veröffentlicht 10.04.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 00:24:44
The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.
CVE-2019-9192
- EPSS 0.84%
- Veröffentlicht 26.02.2019 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:51:10
In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer dispute...