Описание
An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.0.4-9ubuntu2.1 |
| devel | not-affected | 2.0.8-6.1ubuntu2 |
| esm-infra-legacy/trusty | released | 2.0.3-0ubuntu1.14.04.3+esm2 |
| esm-infra/bionic | released | 2.0.4-9ubuntu2.1 |
| esm-infra/focal | released | 2.0.7-1ubuntu5.1 |
| esm-infra/xenial | released | 2.0.4-8ubuntu1.16.04.4+esm1 |
| focal | released | 2.0.7-1ubuntu5.1 |
| groovy | ignored | end of life |
| hirsute | ignored | end of life |
| impish | not-affected | 2.0.8-6.1ubuntu2 |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow.
An issue was discovered in klibc before 2.0.9. Multiplication in the c ...
An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow.
Уязвимость функции calloc() библиотеки среды выполнения Klibc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
7.5 High
CVSS2
9.8 Critical
CVSS3