Описание
Integer overflow in parse_decode_path() of slocate may allow attackers to execute arbitrary code via a LOCATE_PATH with a large number of ":" (colon) characters, whose count is used in a call to malloc.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
slocate | not-affected | package |
Примечания
Even if exploited, you get only slocate gid.
EPSS
Процентиль: 28%
0.00096
Низкий
Связанные уязвимости
nvd
около 22 лет назад
Integer overflow in parse_decode_path() of slocate may allow attackers to execute arbitrary code via a LOCATE_PATH with a large number of ":" (colon) characters, whose count is used in a call to malloc.
github
около 3 лет назад
Integer overflow in parse_decode_path() of slocate may allow attackers to execute arbitrary code via a LOCATE_PATH with a large number of ":" (colon) characters, whose count is used in a call to malloc.
EPSS
Процентиль: 28%
0.00096
Низкий