Описание
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | DNE | |
| bionic | DNE | |
| cosmic | DNE | |
| devel | DNE | |
| disco | DNE | |
| eoan | DNE | |
| esm-infra-legacy/trusty | released | 2.19-0ubuntu6.15+esm3 |
| esm-infra/focal | DNE | |
| focal | DNE | |
| groovy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | released | 2.27-3ubuntu1.2 |
| cosmic | not-affected | 2.28-0ubuntu1 |
| devel | not-affected | 2.28-0ubuntu1 |
| disco | not-affected | 2.28-0ubuntu1 |
| eoan | not-affected | 2.28-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | released | 2.27-3ubuntu1.2 |
| esm-infra/focal | not-affected | 2.28-0ubuntu1 |
| esm-infra/xenial | released | 2.23-0ubuntu11.2 |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 a ...
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
7.5 High
CVSS2
9.8 Critical
CVSS3