CVE-2021-3999
24.08.2022, 16:15
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 𝑥 < 2.31 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
debian | debian_linux | 10.0 |
netapp | e-series_performance_analyzer | - |
netapp | nfs_plug-in | * |
netapp | ontap_select_deploy_administration_utility | - |
netapp | h300s_firmware | - |
netapp | h500s_firmware | - |
netapp | h700s_firmware | - |
netapp | h410s_firmware | - |
netapp | h410c_firmware | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
eglibc |
| ||||||||||||||||||||||
glibc |
|
Common Weakness Enumeration
References