Description
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3152-1 | glibc security update |
EUVD |
EUVD-2020-12583 | A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32. |
Ubuntu USN |
USN-4416-1 | GNU C Library vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Gnu
Subscribe
Glibc
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
Hci Management Node
Subscribe
Solidfire
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.943Z
Reserved: 2019-11-27T00:00:00.000Z
Link: CVE-2020-1752
No data.
Status : Modified
Published: 2020-04-30T17:15:13.067
Modified: 2024-11-21T05:11:18.623
Link: CVE-2020-1752
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN