Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2022:896

Опубликовано: 15 мар. 2022
Источник: rocky
Оценка: Moderate

Описание

Moderate: glibc security update

For more information visit https://errata.rockylinux.org/RLSA-2022:896

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
glibci686164.el8_5.3glibc-2.28-164.el8_5.3.i686.rpm
glibcx86_64164.el8_5.3glibc-2.28-164.el8_5.3.x86_64.rpm
glibc-all-langpacksx86_64164.el8_5.3glibc-all-langpacks-2.28-164.el8_5.3.x86_64.rpm
glibc-commonx86_64164.el8_5.3glibc-common-2.28-164.el8_5.3.x86_64.rpm
glibc-develi686164.el8_5.3glibc-devel-2.28-164.el8_5.3.i686.rpm
glibc-develx86_64164.el8_5.3glibc-devel-2.28-164.el8_5.3.x86_64.rpm
glibc-headersi686164.el8_5.3glibc-headers-2.28-164.el8_5.3.i686.rpm
glibc-headersx86_64164.el8_5.3glibc-headers-2.28-164.el8_5.3.x86_64.rpm
glibc-langpack-aax86_64164.el8_5.3glibc-langpack-aa-2.28-164.el8_5.3.x86_64.rpm
glibc-langpack-afx86_64164.el8_5.3glibc-langpack-af-2.28-164.el8_5.3.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.4
redhat
больше 3 лет назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
nvd
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVSS3: 7.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 3 года назад

A flaw was found in glibc. An off-by-one buffer overflow and underflow ...