CVE-2014-4043 in C Library
摘要 (英语)
The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
预定
2014-06-12
披露
2014-10-06
状态
已确认
条目
VulDB provides additional information and datapoints for this CVE:
| 标识符 | 漏洞 | CWE | 可利用 | 对策 | CVE |
|---|---|---|---|---|---|
| 13587 | GNU C Library spawn_faction_addopen.c xc_cpupool_getinfo 权限提升 | 94 | 概念验证 | 官方修复 | CVE-2014-4043 |