Total vulnerabilities in the database
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
Software | From | Fixed in |
---|---|---|
gnu / glibc | 2.1.2 | 2.1.2.x |
gnu / glibc | 2.11 | 2.11.x |
gnu / glibc | 2.0.5 | 2.0.5.x |
gnu / glibc | 2.0.6 | 2.0.6.x |
gnu / glibc | 2.10.1 | 2.10.1.x |
gnu / glibc | 2.1.1 | 2.1.1.x |
gnu / glibc | 2.14 | 2.14.x |
gnu / glibc | 2.0.3 | 2.0.3.x |
gnu / glibc | 2.0 | 2.0.x |
gnu / glibc | 2.13 | 2.13.x |
gnu / glibc | 2.1.1.6 | 2.1.1.6.x |
gnu / glibc | 2.4 | 2.4.x |
gnu / glibc | 2.1 | 2.1.x |
gnu / glibc | 2.1.9 | 2.1.9.x |
gnu / glibc | 2.12.1 | 2.12.1.x |
gnu / glibc | 2.0.1 | 2.0.1.x |
gnu / glibc | 2.14.1 | 2.14.1.x |
gnu / glibc | 2.11.2 | 2.11.2.x |
gnu / glibc | 2.0.4 | 2.0.4.x |
gnu / glibc | 2.0.2 | 2.0.2.x |
gnu / glibc | 2.16 | 2.16.x |
gnu / glibc | - | 2.17.x |
gnu / glibc | 2.11.3 | 2.11.3.x |
gnu / glibc | 2.11.1 | 2.11.1.x |
gnu / glibc | 2.1.3 | 2.1.3.x |
gnu / glibc | 2.15 | 2.15.x |
gnu / glibc | 2.12.2 | 2.12.2.x |
gnu / eglibc | - | - |