Gnu

Glibc

155 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.85%
  • Veröffentlicht 01.04.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:35:05

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 04.03.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 04:54:40

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:34:14

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping ad...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to...

Exploit
  • EPSS 0.65%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threa...

Exploit
  • EPSS 1.24%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

  • EPSS 0.48%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 00:02:15

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to ...

  • EPSS 0.04%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 00:24:44

The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.

Exploit
  • EPSS 0.84%
  • Veröffentlicht 26.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:10

In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\\1\\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer dispute...