Описание
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution.
Меры по смягчению последствий
Do not use any applications which call hcreate or hcreate_r with a large size argument. These functions are used only rarely, and most callers supply a constant argument. Other applications calculate the size argument in such a way that the error condition cannot be triggered.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 5 | glibc | Will not fix | ||
Red Hat Enterprise Linux 6 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 7 | compat-glibc | Will not fix | ||
Red Hat Enterprise Linux 6 | glibc | Fixed | RHSA-2017:0680 | 21.03.2017 |
Red Hat Enterprise Linux 7 | glibc | Fixed | RHSA-2017:1916 | 01.08.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.1 High
CVSS3
5.1 Medium
CVSS2
Связанные уязвимости
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 ...
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
ELSA-2017-0680: glibc security and bug fix update (MODERATE)
EPSS
8.1 High
CVSS3
5.1 Medium
CVSS2