Show filters
183 Total Results
Displaying 41-50 of 183
Sort by:
Attacker Value
Unknown
CVE-2021-27645
Disclosure Date: February 24, 2021 (last updated February 22, 2025)
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.
0
Attacker Value
Unknown
CVE-2021-27218
Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
0
Attacker Value
Unknown
CVE-2021-27219
Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
0
Attacker Value
Unknown
CVE-2021-3326
Disclosure Date: January 27, 2021 (last updated February 22, 2025)
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2019-25013
Disclosure Date: January 04, 2021 (last updated February 22, 2025)
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
0
Attacker Value
Unknown
CVE-2020-35457
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented
0
Attacker Value
Unknown
CVE-2020-29573
Disclosure Date: December 06, 2020 (last updated February 22, 2025)
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
0
Attacker Value
Unknown
CVE-2020-29562
Disclosure Date: December 04, 2020 (last updated February 22, 2025)
The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
0
Attacker Value
Unknown
CVE-1999-0199
Disclosure Date: October 06, 2020 (last updated February 22, 2025)
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
0
Attacker Value
Unknown
CVE-2020-13645
Disclosure Date: May 28, 2020 (last updated February 21, 2025)
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
0