Количество 33
Количество 33

CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVE-2021-3999
CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow ...

CVE-2022-23219
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23219
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23219
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23219
CVE-2022-23219
The deprecated compatibility function clnt_create in the sunrpc module ...

RLSA-2022:896
Moderate: glibc security update
GHSA-vfch-2fr8-r5c2
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

BDU:2022-01635
Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код
GHSA-fhxm-4mc9-6jf5
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

BDU:2022-01633
Уязвимость модуля sunrpc системной библиотеки glibc, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад |
![]() | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow ... | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
![]() | CVE-2022-23219 The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-23219 The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 7 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2022-23219 The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
CVE-2022-23219 The deprecated compatibility function clnt_create in the sunrpc module ... | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
![]() | RLSA-2022:896 Moderate: glibc security update | 1% Низкий | больше 3 лет назад | |
GHSA-vfch-2fr8-r5c2 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
![]() | BDU:2022-01635 Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 1% Низкий | больше 3 лет назад |
GHSA-fhxm-4mc9-6jf5 The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2022-01633 Уязвимость модуля sunrpc системной библиотеки glibc, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу