Описание
The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 481-2.1 |
| esm-infra-legacy/trusty | not-affected | 458-2 |
| lucid | ignored | end of life |
| precise | not-affected | verified via valgrind |
| trusty | not-affected | 458-2 |
| trusty/esm | not-affected | 458-2 |
| upstream | released | 475 |
| utopic | ignored | end of life |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | not-affected | 458-3 |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
The is_utf8_well_formed function in GNU less before 475 allows remote ...
The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
EPSS
10 Critical
CVSS2