Количество 33
Количество 33

openSUSE-SU-2022:0330-1
Security update for glibc

SUSE-SU-2022:0909-1
Security update for glibc

SUSE-SU-2022:0441-1
Security update for glibc

SUSE-SU-2022:0330-1
Security update for glibc
ELSA-2022-9234
ELSA-2022-9234: glibc security update (MODERATE)
ELSA-2022-0896
ELSA-2022-0896: glibc security update (MODERATE)

SUSE-SU-2022:0832-1
Security update for glibc

ROS-20220323-02
Множественные уязвимости glibc

SUSE-SU-2022:14923-1
Security update for glibc
ELSA-2022-9421
ELSA-2022-9421: glibc security update (IMPORTANT)
ELSA-2022-9358
ELSA-2022-9358: glibc security update (IMPORTANT)

CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23218
CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc mod ...
GHSA-8g8v-256r-57v7
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

BDU:2022-01632
Уязвимость модуля sunrpc ib glibc системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код

CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | openSUSE-SU-2022:0330-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0909-1 Security update for glibc | около 3 лет назад | ||
![]() | SUSE-SU-2022:0441-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0330-1 Security update for glibc | больше 3 лет назад | ||
ELSA-2022-9234 ELSA-2022-9234: glibc security update (MODERATE) | больше 3 лет назад | |||
ELSA-2022-0896 ELSA-2022-0896: glibc security update (MODERATE) | больше 3 лет назад | |||
![]() | SUSE-SU-2022:0832-1 Security update for glibc | больше 3 лет назад | ||
![]() | ROS-20220323-02 Множественные уязвимости glibc | около 3 лет назад | ||
![]() | SUSE-SU-2022:14923-1 Security update for glibc | около 3 лет назад | ||
ELSA-2022-9421 ELSA-2022-9421: glibc security update (IMPORTANT) | около 3 лет назад | |||
ELSA-2022-9358 ELSA-2022-9358: glibc security update (IMPORTANT) | около 3 лет назад | |||
![]() | CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc mod ... | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
GHSA-8g8v-256r-57v7 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2022-01632 Уязвимость модуля sunrpc ib glibc системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад |
![]() | CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.4 | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу