Описание
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | compat-glibc | Not affected | ||
Red Hat Enterprise Linux 5 | glibc | Not affected | ||
Red Hat Enterprise Linux 6 | compat-glibc | Not affected | ||
Red Hat Enterprise Linux 6 | glibc | Not affected | ||
Red Hat Enterprise Linux 7 | compat-glibc | Not affected | ||
Red Hat Enterprise Linux 7 | glibc | Not affected | ||
Red Hat Enterprise Linux 8 | glibc | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
5.6 Medium
CVSS3
Связанные уязвимости
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
The getgrouplist function in the GNU C library (glibc) before version ...
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
EPSS
5.6 Medium
CVSS3