Use of Out-of-range Pointer Offset The advisory has been revoked - it doesn't affect any version of package unixODBC-devel  (opens in a new tab)


Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS8-UNIXODBCDEVEL-6462422
  • published19 Mar 2024
  • disclosed18 Mar 2024

Introduced: 18 Mar 2024

CVE-2024-1013  (opens in a new tab)
CWE-823  (opens in a new tab)

Amendment

The Centos security team deemed this advisory irrelevant for Centos:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream unixODBC-devel package and not the unixODBC-devel package as distributed by Centos.

An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller has 4 bytes and callee writes 8 bytes. This issue may go unnoticed on little-endian architectures, while big-endian architectures can be broken.