Show filters
183 Total Results
Displaying 21-30 of 183
Sort by:
Attacker Value
Unknown
CVE-2023-32611
Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
0
Attacker Value
Unknown
CVE-2023-29499
Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
0
Attacker Value
Unknown
CVE-2023-4813
Disclosure Date: September 12, 2023 (last updated April 25, 2024)
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
0
Attacker Value
Unknown
CVE-2015-20109
Disclosure Date: June 25, 2023 (last updated October 08, 2023)
end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.
0
Attacker Value
Unknown
CVE-2023-0687
Disclosure Date: February 06, 2023 (last updated February 15, 2024)
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.
0
Attacker Value
Unknown
CVE-2023-25139
Disclosure Date: February 03, 2023 (last updated October 08, 2023)
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.
0
Attacker Value
Unknown
CVE-2022-39046
Disclosure Date: August 31, 2022 (last updated November 07, 2023)
An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the heap.
0
Attacker Value
Unknown
CVE-2021-3998
Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
0
Attacker Value
Unknown
CVE-2021-3999
Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2021-3800
Disclosure Date: August 23, 2022 (last updated November 29, 2024)
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
0