Количество 33
Количество 33

CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

CVE-2021-3999
CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow ...

CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

CVE-2022-23218
CVE-2022-23218
The deprecated compatibility function svcunix_create in the sunrpc mod ...

RLSA-2022:896
Moderate: glibc security update
GHSA-vfch-2fr8-r5c2
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

BDU:2022-01635
Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код
GHSA-8g8v-256r-57v7
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.

BDU:2022-01632
Уязвимость модуля sunrpc ib glibc системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад |
![]() | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
CVE-2021-3999 A flaw was found in glibc. An off-by-one buffer overflow and underflow ... | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
![]() | CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
![]() | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
CVE-2022-23218 The deprecated compatibility function svcunix_create in the sunrpc mod ... | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
![]() | RLSA-2022:896 Moderate: glibc security update | 1% Низкий | больше 3 лет назад | |
GHSA-vfch-2fr8-r5c2 A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. | CVSS3: 7.8 | 1% Низкий | почти 3 года назад | |
![]() | BDU:2022-01635 Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 1% Низкий | больше 3 лет назад |
GHSA-8g8v-256r-57v7 The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2022-01632 Уязвимость модуля sunrpc ib glibc системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу