CVE-2010-4756

NameCVE-2010-4756
DescriptionThe glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)buster2.28-10+deb10u1vulnerable
buster (security)2.28-10+deb10u2vulnerable
bullseye2.31-13+deb11u8vulnerable
bullseye (security)2.31-13+deb11u7vulnerable
bookworm, bookworm (security)2.36-9+deb12u4vulnerable
trixie2.37-15vulnerable
sid2.37-15.1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)(unfixed)unimportant
glibcsource(unstable)(unfixed)unimportant

Notes

That's standard POSIX behaviour implemented by (e)glibc. Applications using
glob need to impose limits for themselves

Search for package or bug name: Reporting problems