CVE-2015-8779

Priority
Description
Stack-based buffer overflow in the catopen function in the GNU C Library
(aka glibc or libc6) before 2.23 allows context-dependent attackers to
cause a denial of service (application crash) or possibly execute arbitrary
code via a long catalog name.
Ubuntu-Description
Maksymilian Arciemowicz discovered a stack-based buffer overflow
in the catopen function in the GNU C Library when handling long
catalog names. An attacker could use this to cause a denial of
service (application crash) or possibly execute arbitrary code.
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):released (2.15-0ubuntu10.14)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.19-0ubuntu6.8)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.23-0ubuntu1)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f58539030e436449f79189b6edab17d7479796e
More Information

Updated: 2019-03-19 12:24:18 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)