Gnu

Glibc

155 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.42%
  • Veröffentlicht 02.02.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 04:10:53

The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap re...

  • EPSS 0.58%
  • Veröffentlicht 01.02.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:45

An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to ...

Exploit
  • EPSS 0.76%
  • Veröffentlicht 01.02.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:04:40

A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.

Exploit
  • EPSS 0.84%
  • Veröffentlicht 01.02.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:04:40

A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.

Exploit
  • EPSS 33.68%
  • Veröffentlicht 31.01.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:23

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

  • EPSS 1.13%
  • Veröffentlicht 18.12.2017 01:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the cu...

Exploit
  • EPSS 0.36%
  • Veröffentlicht 05.12.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occu...

  • EPSS 0.21%
  • Veröffentlicht 22.10.2017 20:29:02
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.

  • EPSS 0.22%
  • Veröffentlicht 20.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.

  • EPSS 0.4%
  • Veröffentlicht 20.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (mem...