Information Exposure Affecting eglibc package, versions *
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1404-EGLIBC-1653045
- published 10 Sep 2020
- disclosed 14 Oct 2010
Introduced: 14 Oct 2010
CVE-2010-3192 Open this link in a new tabHow to fix?
There is no fixed version for Ubuntu:14.04
eglibc
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream eglibc
package and not the eglibc
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:14.04
relevant fixed versions and status.
Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2010-3192
- http://seclists.org/fulldisclosure/2010/Apr/399
- http://www.openwall.com/lists/oss-security/2010/08/25/8
- http://www.openwall.com/lists/oss-security/2010/08/31/6
- http://www.openwall.com/lists/oss-security/2010/08/31/7
- http://www.openwall.com/lists/oss-security/2010/09/02/2
- http://www.openwall.com/lists/oss-security/2010/09/02/3
- http://www.openwall.com/lists/oss-security/2010/09/02/4
- http://www.openwall.com/lists/oss-security/2010/09/02/5