Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3152-1 | glibc security update |
EUVD |
EUVD-2021-27189 | A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. |
Ubuntu USN |
USN-5310-1 | GNU C Library vulnerabilities |
Ubuntu USN |
USN-5310-2 | GNU C Library vulnerabilities |
Ubuntu USN |
USN-6762-1 | GNU C Library vulnerabilities |
Tue, 02 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-02T20:54:34.966Z
Reserved: 2021-11-22T00:00:00.000Z
Link: CVE-2021-3999
Updated: 2024-08-03T17:16:03.318Z
Status : Modified
Published: 2022-08-24T16:15:09.077
Modified: 2025-12-02T21:15:49.210
Link: CVE-2021-3999
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN