Gnu

Glibc

157 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 30.04.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:18

A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker ...

  • EPSS 0.14%
  • Veröffentlicht 17.04.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:18

An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of ser...

  • EPSS 1.9%
  • Veröffentlicht 01.04.2020 22:15:18
  • Zuletzt bearbeitet 21.11.2024 05:35:05

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 04.03.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 04:54:40

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 04:34:14

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping ad...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to...

Exploit
  • EPSS 0.65%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threa...

Exploit
  • EPSS 0.86%
  • Veröffentlicht 15.07.2019 04:15:13
  • Zuletzt bearbeitet 21.11.2024 04:17:55

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

  • EPSS 0.43%
  • Veröffentlicht 10.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 00:02:15

The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to ...