Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
UBUNTU-CVE-2022-29967
See a problem?
Please try reporting it
to the source
first.
Source
https://ubuntu.com/security/CVE-2022-29967
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29967.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2022-29967
Upstream
CVE-2022-29967
Published
2022-04-29T23:15:00Z
Modified
2025-07-16T07:56:37.047123Z
Severity
7.5 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS Calculator
Ubuntu - medium
Summary
[none]
Details
static
compressed
inmemory
website
callback.c in Glewlwyd through 2.6.2 allows directory traversal.
References
https://ubuntu.com/security/CVE-2022-29967
https://github.com/babelouest/glewlwyd/commit/e3f7245c33897bf9b3a75acfcdb8b7b93974bf11
https://www.cve.org/CVERecord?id=CVE-2022-29967
Affected packages
Ubuntu:Pro:18.04:LTS
/
glewlwyd
Package
Name
glewlwyd
Purl
pkg:deb/ubuntu/glewlwyd@1.3.1-1?arch=source&distro=esm-apps/bionic
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
1.*
1.1-2ubuntu1
1.2.2-1
1.3.1-1
Ubuntu:Pro:20.04:LTS
/
glewlwyd
Package
Name
glewlwyd
Purl
pkg:deb/ubuntu/glewlwyd@1.4.9-3?arch=source&distro=esm-apps/focal
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
1.*
1.4.9-2
1.4.9-3
Ubuntu:22.04:LTS
/
glewlwyd
Package
Name
glewlwyd
Purl
pkg:deb/ubuntu/glewlwyd@2.6.1-1build1?arch=source&distro=jammy
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
2.*
2.5.2-3
2.6.1-1
2.6.1-1build1
UBUNTU-CVE-2022-29967 - OSV