Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000001

Опубликовано: 31 янв. 2018
Источник: debian

Описание

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.26-4package
eglibcremovedpackage
eglibcpostponedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2018/01/11/5

  • https://sourceware.org/bugzilla/show_bug.cgi?id=22679

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=52a713fdd0a30e1bd79818e2e3c4ab44ddca1a94

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7
redhat
около 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

CVSS3: 7.8
nvd
около 8 лет назад

In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

suse-cvrf
около 8 лет назад

Security update for glibc

suse-cvrf
около 8 лет назад

Security update for glibc