CVE-2020-1752
30.04.2020, 17:15
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 𝑥 < 2.32.0 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.10 |
netapp | active_iq_unified_manager | 9.5 ≤ |
netapp | hci_management_node | - |
netapp | solidfire | - |
netapp | steelstore_cloud_integrated_storage | - |
netapp | h410c_firmware | - |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
eglibc |
| ||||||||||||||||||||||||||
glibc |
|
Common Weakness Enumeration
References