Описание
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Отчет
This issue was rated as having Moderate impact because of the prerequisites required for successful exploitation. To the best of our knowledge, there is no actual setuid exposure to the vulnerable getcwd() usage pattern.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | compat-glibc | Out of support scope | ||
Red Hat Enterprise Linux 6 | glibc | Out of support scope | ||
Red Hat Enterprise Linux 7 | compat-glibc | Out of support scope | ||
Red Hat Enterprise Linux 7 | glibc | Out of support scope | ||
Red Hat Enterprise Linux 9 | glibc | Not affected | ||
Red Hat Enterprise Linux 8 | glibc | Fixed | RHSA-2022:0896 | 15.03.2022 |
Red Hat Enterprise Linux 8 | glibc | Fixed | RHSA-2022:0896 | 15.03.2022 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.4 High
CVSS3
Связанные уязвимости
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
A flaw was found in glibc. An off-by-one buffer overflow and underflow ...
EPSS
7.4 High
CVSS3