First published: Tue Jan 18 2022(Updated: )
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. Reference: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28768">https://sourceware.org/bugzilla/show_bug.cgi?id=28768</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library | <=2.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2042013 is considered critical due to potential denial of service and security implications.
To fix REDHAT-BUG-2042013, upgrade the GNU C Library to a version higher than 2.34 that includes the necessary patches.
REDHAT-BUG-2042013 affects systems running GNU C Library version 2.34 and lower.
REDHAT-BUG-2042013 describes a buffer overflow vulnerability in the svcunix_create function of the sunrpc module.
Yes, REDHAT-BUG-2042013 can potentially lead to code execution due to the buffer overflow, though primarily it may result in denial of service.