Описание
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | needed | |
esm-infra/focal | DNE | |
focal | DNE | |
impish | DNE | |
jammy | DNE | |
kinetic | DNE | |
lunar | DNE | |
mantic | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.27-3ubuntu1.5 |
devel | not-affected | 2.35-0ubuntu1 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 2.27-3ubuntu1.5 |
esm-infra/focal | not-affected | 2.31-0ubuntu9.7 |
esm-infra/xenial | released | 2.23-0ubuntu11.3+esm1 |
focal | released | 2.31-0ubuntu9.7 |
impish | released | 2.34-0ubuntu3.2 |
jammy | not-affected | 2.35-0ubuntu1 |
kinetic | not-affected | 2.35-0ubuntu1 |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
The deprecated compatibility function svcunix_create in the sunrpc mod ...
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3