Количество 10
Количество 10
CVE-2019-19126
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
CVE-2019-19126
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
CVE-2019-19126
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
CVE-2019-19126
CVE-2019-19126
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 ...
SUSE-SU-2020:0262-1
Security update for glibc
GHSA-p4p6-gwhq-q5q7
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
ELSA-2020-3861
ELSA-2020-3861: glibc security, bug fix, and enhancement update (LOW)
ELSA-2020-1828
ELSA-2020-1828: glibc security, bug fix, and enhancement update (LOW)
BDU:2022-05763
Уязвимость системной библиотеки GNU C Library, связанная с ошибками инициализации памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-19126 On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program. | CVSS3: 3.3 | 0% Низкий | около 6 лет назад | |
CVE-2019-19126 On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program. | CVSS3: 2.9 | 0% Низкий | около 6 лет назад | |
CVE-2019-19126 On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program. | CVSS3: 3.3 | 0% Низкий | около 6 лет назад | |
CVSS3: 3.3 | 0% Низкий | больше 5 лет назад | ||
CVE-2019-19126 On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 ... | CVSS3: 3.3 | 0% Низкий | около 6 лет назад | |
SUSE-SU-2020:0262-1 Security update for glibc | 0% Низкий | около 6 лет назад | ||
GHSA-p4p6-gwhq-q5q7 On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program. | CVSS3: 3.3 | 0% Низкий | больше 3 лет назад | |
ELSA-2020-3861 ELSA-2020-3861: glibc security, bug fix, and enhancement update (LOW) | больше 5 лет назад | |||
ELSA-2020-1828 ELSA-2020-1828: glibc security, bug fix, and enhancement update (LOW) | почти 6 лет назад | |||
BDU:2022-05763 Уязвимость системной библиотеки GNU C Library, связанная с ошибками инициализации памяти, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 3.3 | 0% Низкий | около 6 лет назад |
Уязвимостей на страницу