GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
Max CVSS
9.8
EPSS Score
0.34%
Published
2019-07-15
Updated
2024-03-21
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
Max CVSS
9.8
EPSS Score
0.26%
Published
2019-04-10
Updated
2019-04-11
2 vulnerabilities found