CVE-2015-5957
Published: 28 September 2015
Buffer overflow in the DumpSysVar function in var.c in Remind before 3.1.15 allows attackers to have unspecified impact via a long name.
Priority
Status
Package | Release | Status |
---|---|---|
remind Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(03.01.15-1)
|
bionic |
Not vulnerable
(03.01.15-1)
|
|
cosmic |
Not vulnerable
(03.01.15-1)
|
|
disco |
Not vulnerable
(03.01.15-1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(03.01.15-1)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Not vulnerable
(03.01.15-1)
|
|
xenial |
Not vulnerable
(03.01.15-1)
|
|
yakkety |
Not vulnerable
(03.01.15-1)
|
|
zesty |
Not vulnerable
(03.01.15-1)
|
|
Patches: other: http://www.openwall.com/lists/oss-security/2015/07/29/2 |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. This vulnerability is mitigated in part by the use of -D_FORTIFY_SOURCE=2 in Ubuntu. |