First published: Thu Nov 18 2021(Updated: )
A flaw was found in glibc. The getcwd() function is affected by an off-by-one buffer overflow and underflow that may lead to memory corruption when the size of the buffer is exactly 1 byte.
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2024637 is moderate due to a potential for memory corruption.
To fix REDHAT-BUG-2024637, update the GNU glibc to the latest patched version provided by your distribution.
REDHAT-BUG-2024637 affects systems using GNU glibc where the getcwd() function is utilized.
There is no indication that REDHAT-BUG-2024637 can be exploited remotely, as it primarily affects local memory operations.
The implications of REDHAT-BUG-2024637 include potential instability or crashes in applications that rely on the getcwd() function.