CVE-2010-4756

NameCVE-2010-4756
DescriptionThe glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)jessie, jessie (lts)2.19-18+deb8u14vulnerable
stretch (security)2.24-11+deb9u1vulnerable
stretch (lts), stretch2.24-11+deb9u7vulnerable
buster (security), buster, buster (lts)2.28-10+deb10u4vulnerable
bullseye2.31-13+deb11u11vulnerable
bullseye (security)2.31-13+deb11u10vulnerable
bookworm2.36-9+deb12u9vulnerable
bookworm (security)2.36-9+deb12u7vulnerable
sid, trixie2.40-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)(unfixed)unimportant
glibcsource(unstable)(unfixed)unimportant

Notes

That's standard POSIX behaviour implemented by (e)glibc. Applications using
glob need to impose limits for themselves

Search for package or bug name: Reporting problems