Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3192

Опубликовано: 14 окт. 2010
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 5

Описание

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

needed

esm-infra/focal

DNE

focal

DNE

groovy

DNE

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

2.27-3ubuntu1
cosmic

not-affected

2.28-0ubuntu1
devel

not-affected

2.29-0ubuntu2
disco

not-affected

2.29-0ubuntu2
eoan

not-affected

2.29-0ubuntu2
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.27-3ubuntu1
esm-infra/focal

not-affected

2.29-0ubuntu2
esm-infra/xenial

needed

Показывать по

EPSS

Процентиль: 73%
0.00786
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.

nvd
около 15 лет назад

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.

debian
около 15 лет назад

Certain run-time memory protection mechanisms in the GNU C Library (ak ...

github
больше 3 лет назад

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.

EPSS

Процентиль: 73%
0.00786
Низкий

5 Medium

CVSS2