CVE-2020-1752
30.04.2020, 17:15
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.Enginsight
| Vendor | Product | Version |
|---|---|---|
| gnu | glibc | 𝑥 < 2.32.0 |
| canonical | ubuntu_linux | 16.04 |
| canonical | ubuntu_linux | 18.04 |
| canonical | ubuntu_linux | 19.10 |
| netapp | active_iq_unified_manager | 9.5 ≤ |
| netapp | hci_management_node | - |
| netapp | solidfire | - |
| netapp | steelstore_cloud_integrated_storage | - |
| netapp | h410c_firmware | - |
| debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| eglibc |
| ||||||||||||||||||||||||||
| glibc |
|
Common Weakness Enumeration
References