CVE-2015-8779

Priority
Description
Stack-based buffer overflow in the catopen function in the GNU C Library
(aka glibc or libc6) before 2.23 allows context-dependent attackers to
cause a denial of service (application crash) or possibly execute arbitrary
code via a long catalog name.
Ubuntu-Description
Maksymilian Arciemowicz discovered a stack-based buffer overflow
in the catopen function in the GNU C Library when handling long
catalog names. An attacker could use this to cause a denial of
service (application crash) or possibly execute arbitrary code.
Notes
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):released (2.15-0ubuntu10.14)
Ubuntu 14.04 ESM (Trusty Tahr):released (2.19-0ubuntu6.8)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.23-0ubuntu1)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f58539030e436449f79189b6edab17d7479796e
More Information

Updated: 2020-07-28 19:55:47 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)