Search CVE reports


Toggle filters

101 – 110 of 157 results


CVE-2014-8121

Low priority

Some fixes available 3 of 6

DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2014-7817

Medium priority
Fixed

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing ”$((`...`))”.

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2014-6040

Low priority
Fixed

GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of “0xffff” to the iconv function when converting (1) IBM933, (2)...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2014-5119

High priority
Fixed

Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2014-4043

Low priority

Some fixes available 3 of 4

The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2014-0475

Medium priority

Some fixes available 3 of 4

Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2013-7424

Medium priority
Not affected

The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code...

2 affected packages

eglibc, glibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
glibc
Show less packages

CVE-2013-7423

Medium priority
Fixed

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of...

2 affected packages

glibc, eglibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
glibc
eglibc
Show less packages

CVE-2013-4788

Low priority
Ignored

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent...

1 affected package

eglibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
Show less packages

CVE-2013-4458

Low priority

Some fixes available 2 of 5

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2)...

1 affected package

eglibc

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
eglibc
Show less packages