Search CVE reports


Toggle filters

41 – 50 of 157 results


CVE-2020-1751

Medium priority

Some fixes available 3 of 4

An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address,...

2 affected packages

glibc, eglibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glibc Not affected Fixed
eglibc Not in release Not in release
Show less packages

CVE-2020-6096

Low priority

Some fixes available 13 of 15

An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num'...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc Not in release Not in release Not in release Not in release
glibc Fixed Fixed Fixed Fixed
Show less packages

CVE-2020-10029

Low priority

Some fixes available 2 of 3

The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc Not in release Not in release Not in release Not in release
glibc Not affected Not affected Not affected Fixed
Show less packages

CVE-2011-3336

Medium priority
Not affected

regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc Not in release
glibc Not affected
Show less packages

CVE-2012-6686

Medium priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-4357. Reason: This candidate is a duplicate of CVE-2013-4357. Notes: All CVE users should reference CVE-2013-4357 instead of this candidate. All references...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2019-19126

Low priority

Some fixes available 3 of 4

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc Not in release Not in release
glibc Not affected Fixed
Show less packages

CVE-2019-1010025

Low priority
Ignored

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc Not in release Not in release
glibc Not affected Not affected
Show less packages

CVE-2019-1010024

Low priority
Ignored

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc Not in release Not in release
glibc Ignored Ignored
Show less packages

CVE-2019-1010023

Low priority
Ignored

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc Not in release Not in release
glibc Ignored Ignored
Show less packages

CVE-2019-1010022

Low priority
Ignored

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this...

1 affected package

glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glibc Ignored Ignored
Show less packages