Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2010-10-12T21:00:00Z

Updated: 2024-09-16T16:17:25.715Z

Reserved: 2010-08-31T00:00:00Z

Link: CVE-2010-3192

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-10-14T05:58:06.833

Modified: 2024-11-21T01:18:14.657

Link: CVE-2010-3192

cve-icon Redhat

Severity : Low

Publid Date: 2010-04-27T00:00:00Z

Links: CVE-2010-3192 - Bugzilla