Описание
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | released | 2.19-0ubuntu6.8 |
precise | released | 2.15-0ubuntu10.14 |
precise/esm | not-affected | 2.15-0ubuntu10.14 |
trusty | released | 2.19-0ubuntu6.8 |
trusty/esm | released | 2.19-0ubuntu6.8 |
upstream | needed | |
vivid | DNE | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.23-0ubuntu1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 2.23-0ubuntu1 |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needed | |
vivid | ignored | end of life |
vivid/stable-phone-overlay | ignored | end of life |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Stack-based buffer overflow in the catopen function in the GNU C Libra ...
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
ELSA-2017-0680: glibc security and bug fix update (MODERATE)
7.5 High
CVSS2
9.8 Critical
CVSS3