Show filters
183 Total Results
Displaying 71-80 of 183
Sort by:
Attacker Value
Unknown

CVE-2016-10739

Disclosure Date: January 21, 2019 (last updated November 27, 2024)
In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
0
Attacker Value
Unknown

CVE-2019-6488

Disclosure Date: January 18, 2019 (last updated November 27, 2024)
The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.
0
Attacker Value
Unknown

CVE-2018-19591

Disclosure Date: December 04, 2018 (last updated November 08, 2023)
In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.
0
Attacker Value
Unknown

CVE-2018-16428

Disclosure Date: September 04, 2018 (last updated November 27, 2024)
In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
0
Attacker Value
Unknown

CVE-2018-16429

Disclosure Date: September 04, 2018 (last updated November 08, 2023)
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
0
Attacker Value
Unknown

CVE-2018-11439

Disclosure Date: May 30, 2018 (last updated November 26, 2024)
The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.
Attacker Value
Unknown

CVE-2018-11236

Disclosure Date: May 18, 2018 (last updated November 08, 2023)
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
0
Attacker Value
Unknown

CVE-2017-18269

Disclosure Date: May 18, 2018 (last updated November 08, 2023)
An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
0
Attacker Value
Unknown

CVE-2018-11237

Disclosure Date: May 18, 2018 (last updated November 26, 2024)
An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
Attacker Value
Unknown

CVE-2018-6551

Disclosure Date: February 02, 2018 (last updated November 08, 2023)
The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
0