摘要:
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
安全等级: Low
公告ID: KylinSec-SA-2022-2483
发布日期: 2022年10月21日
关联CVE: CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-3999 | KY3.4-4A | glibc | Unaffected |
CVE-2021-3999 | KY3.4-5A | glibc | Unaffected |
CVE-2021-3999 | KY3.5.1 | glibc | Unaffected |