Show filters
183 Total Results
Displaying 11-20 of 183
Sort by:
Attacker Value
Unknown

CVE-2024-33599

Disclosure Date: May 06, 2024 (last updated February 14, 2025)
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
0
Attacker Value
Unknown

CVE-2024-2961

Disclosure Date: April 17, 2024 (last updated February 14, 2025)
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
0
Attacker Value
Unknown

CVE-2023-6780

Disclosure Date: January 31, 2024 (last updated February 13, 2024)
An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size to store the message, resulting in undefined behavior. This issue affects glibc 2.37 and newer.
Attacker Value
Unknown

CVE-2023-6779

Disclosure Date: January 31, 2024 (last updated February 09, 2024)
An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.
Attacker Value
Unknown

CVE-2023-5156

Disclosure Date: September 25, 2023 (last updated April 25, 2024)
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
Attacker Value
Unknown

CVE-2023-4806

Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Attacker Value
Unknown

CVE-2023-4527

Disclosure Date: September 18, 2023 (last updated April 25, 2024)
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Attacker Value
Unknown

CVE-2023-32665

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.
Attacker Value
Unknown

CVE-2023-32643

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.
Attacker Value
Unknown

CVE-2023-32636

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.