Количество 32
Количество 32

CVE-2021-35942
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVE-2021-35942
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVE-2021-35942
CVE-2021-35942
The wordexp function in the GNU C Library (aka glibc) through 2.33 may ...

SUSE-SU-2021:3290-1
Security update for glibc
GHSA-rx5m-j84j-22pg
The mq_notify function in the GNU C Library (aka glibc) through 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.

BDU:2021-06408
Уязвимость системной библиотеки GNU C Library (glibc), связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить отказ в обслуживании

RLSA-2021:4358
Moderate: glibc security, bug fix, and enhancement update
GHSA-53wq-r63f-m33q
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

BDU:2021-03561
Уязвимость функции wordexp() библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю читать произвольные файлы

SUSE-SU-2021:2480-1
Security update for glibc

ROS-20220112-02
Уязвимость glibc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-35942 The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. | CVSS3: 9.1 | 1% Низкий | почти 4 года назад |
![]() | CVE-2021-35942 The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. | CVSS3: 9.1 | 1% Низкий | почти 4 года назад |
![]() | CVSS3: 9.1 | 1% Низкий | почти 4 года назад | |
CVE-2021-35942 The wordexp function in the GNU C Library (aka glibc) through 2.33 may ... | CVSS3: 9.1 | 1% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:3290-1 Security update for glibc | 0% Низкий | больше 3 лет назад | |
GHSA-rx5m-j84j-22pg The mq_notify function in the GNU C Library (aka glibc) through 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. | CVSS3: 9.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2021-06408 Уязвимость системной библиотеки GNU C Library (glibc), связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить отказ в обслуживании | CVSS3: 9.8 | 0% Низкий | около 4 лет назад |
![]() | RLSA-2021:4358 Moderate: glibc security, bug fix, and enhancement update | 1% Низкий | больше 3 лет назад | |
GHSA-53wq-r63f-m33q The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. | CVSS3: 9.1 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2021-03561 Уязвимость функции wordexp() библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю читать произвольные файлы | CVSS3: 6.7 | 1% Низкий | почти 4 года назад |
![]() | SUSE-SU-2021:2480-1 Security update for glibc | почти 4 года назад | ||
![]() | ROS-20220112-02 Уязвимость glibc | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу