CVE-2010-4756

NameCVE-2010-4756
DescriptionThe glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)bullseye2.31-13+deb11u11vulnerable
bullseye (security)2.31-13+deb11u10vulnerable
bookworm2.36-9+deb12u9vulnerable
bookworm (security)2.36-9+deb12u7vulnerable
sid, trixie2.40-4vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)(unfixed)unimportant
glibcsource(unstable)(unfixed)unimportant

Notes

That's standard POSIX behaviour implemented by (e)glibc. Applications using
glob need to impose limits for themselves

Search for package or bug name: Reporting problems