CVE-2021-3999
Summary
| CVE | CVE-2021-3999 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-24 16:15:00 UTC |
| Updated | 2023-02-12 23:43:00 UTC |
| Description | A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| sourceware.org Git - glibc.git/commit |
MISC |
sourceware.org |
|
| CVE-2021-3999 |
MISC |
security-tracker.debian.org |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| CVE-2021-3999 GNU C Library (glibc) Vulnerability in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| 28769 – (CVE-2021-3999) Off-by-one buffer overflow/underflow in getcwd() (CVE-2021-3999) |
MISC |
sourceware.org |
|
| 2024637 – (CVE-2021-3999) CVE-2021-3999 glibc: Off-by-one buffer overflow/underflow in getcwd() |
MISC |
bugzilla.redhat.com |
|
| [SECURITY] [DLA 3152-1] glibc security update |
MLIST |
lists.debian.org |
|
| oss-security - CVE-2021-3998 and CVE-2021-3999 in glibc's realpath() and getcwd() |
MISC |
www.openwall.com |
|
| sourceware.org Git - glibc.git/commit |
MISC |
sourceware.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159715 Oracle Enterprise Linux Security Update for glibc (ELSA-2022-0896)
- 159720 Oracle Enterprise Linux Security Update for glibc (ELSA-2022-9234)
- 181006 Debian Security Update for glibc (CVE-2021-3999)
- 181138 Debian Security Update for glibc (DLA 3152-1)
- 198685 Ubuntu Security Notification for GNU C Library Vulnerabilities (USN-5310-1)
- 240148 Red Hat Update for glibc (RHSA-2022:0896)
- 282318 Fedora Security Update for glibc (FEDORA-2022-918e18c52c)
- 354097 Amazon Linux Security Advisory for glibc : ALAS2-2022-1857
- 376419 Snap-Confine Local Privilege Escalation Vulnerability (Oh Snap! More Lemmings)
- 376580 F5 BIG-IP Application Security Manager (ASM), Local Traffic Manager (LTM), Access Policy Manager (APM) GNU C Library (glibc) Vulnerability (K24207649)
- 591406 Siemens SIMATIC S7-1500 CPU GNU/Linux subsystem Multiple Vulnerabilities (SSB-439005, ICSA-22-104-13)
- 671617 EulerOS Security Update for glibc (EulerOS-SA-2022-1565)
- 671765 EulerOS Security Update for glibc (EulerOS-SA-2022-1823)
- 671777 EulerOS Security Update for glibc (EulerOS-SA-2022-1827)
- 671784 EulerOS Security Update for glibc (EulerOS-SA-2022-1840)
- 671815 EulerOS Security Update for glibc (EulerOS-SA-2022-1864)
- 672219 EulerOS Security Update for glibc (EulerOS-SA-2022-2608)
- 710605 Gentoo Linux GNU C Library Multiple Vulnerabilities (GLSA 202208-24)
- 751690 OpenSUSE Security Update for glibc (openSUSE-SU-2022:0330-1)
- 751712 SUSE Enterprise Linux Security Update for glibc (SUSE-SU-2022:0441-1)
- 751867 SUSE Enterprise Linux Security Update for glibc (SUSE-SU-2022:0832-1)
- 751910 SUSE Enterprise Linux Security Update for glibc (SUSE-SU-2022:0909-1)
- 751983 SUSE Enterprise Linux Security Update for glibc (SUSE-SU-2022:0330-1)
- 753208 SUSE Enterprise Linux Security Update for glibc (SUSE-SU-2022:14923-1)
- 903758 Common Base Linux Mariner (CBL-Mariner) Security Update for glibc (10699) (DEPRECATED)
- 904018 Common Base Linux Mariner (CBL-Mariner) Security Update for glibc (10699-1)
- 940469 AlmaLinux Security Update for glibc (ALSA-2022:0896)
- 960118 Rocky Linux Security Update for glibc (RLSA-2022:896)
- 960854 Rocky Linux Security Update for glibc (RLSA-2022:0896)