Количество 17
Количество 17

CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVE-2021-3999
CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow ...

RLSA-2022:896
Moderate: glibc security update
GHSA-vfch-2fr8-r5c2
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

BDU:2022-01635
Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код

openSUSE-SU-2022:0330-1
Security update for glibc

SUSE-SU-2022:0909-1
Security update for glibc

SUSE-SU-2022:0441-1
Security update for glibc

SUSE-SU-2022:0330-1
Security update for glibc
ELSA-2022-9234
ELSA-2022-9234: glibc security update (MODERATE)
ELSA-2022-0896
ELSA-2022-0896: glibc security update (MODERATE)

SUSE-SU-2022:0832-1
Security update for glibc

ROS-20220323-02
Множественные уязвимости glibc

SUSE-SU-2022:14923-1
Security update for glibc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад |
![]() | CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.4 | 1% Низкий | больше 3 лет назад |
![]() | CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад |
![]() | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow ... | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
![]() | RLSA-2022:896 Moderate: glibc security update | 1% Низкий | больше 3 лет назад | |
GHSA-vfch-2fr8-r5c2 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
![]() | BDU:2022-01635 Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 1% Низкий | больше 3 лет назад |
![]() | openSUSE-SU-2022:0330-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0909-1 Security update for glibc | около 3 лет назад | ||
![]() | SUSE-SU-2022:0441-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0330-1 Security update for glibc | больше 3 лет назад | ||
ELSA-2022-9234 ELSA-2022-9234: glibc security update (MODERATE) | больше 3 лет назад | |||
ELSA-2022-0896 ELSA-2022-0896: glibc security update (MODERATE) | больше 3 лет назад | |||
![]() | SUSE-SU-2022:0832-1 Security update for glibc | больше 3 лет назад | ||
![]() | ROS-20220323-02 Множественные уязвимости glibc | около 3 лет назад | ||
![]() | SUSE-SU-2022:14923-1 Security update for glibc | около 3 лет назад |
Уязвимостей на страницу