Описание
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | released | 2.19-0ubuntu6.8 |
| precise | released | 2.15-0ubuntu10.14 |
| precise/esm | not-affected | 2.15-0ubuntu10.14 |
| trusty | released | 2.19-0ubuntu6.8 |
| trusty/esm | released | 2.19-0ubuntu6.8 |
| upstream | needed | |
| vivid | DNE | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.23-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/xenial | not-affected | 2.23-0ubuntu1 |
| precise | DNE | |
| precise/esm | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needed | |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | ignored | end of life |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Stack-based buffer overflow in the catopen function in the GNU C Libra ...
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
ELSA-2017-0680: glibc security and bug fix update (MODERATE)
7.5 High
CVSS2
9.8 Critical
CVSS3