Integer overflow in the strxfrm function in the GNU C...
High severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Apr 20, 2025
Description
Published by the National Vulnerability Database
Mar 15, 2017
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Apr 20, 2025
Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
References