Описание
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| glibc | fixed | 2.15 | package | |
| eglibc | fixed | 2.13-25 | package |
Примечания
2.15 ist the first version recieving the fix, mark with upstream version which should
be handled correctly then by the tracker.
https://sourceware.org/bugzilla/show_bug.cgi?id=13138
https://www.openwall.com/lists/oss-security/2015/02/26/2
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0
CVE assigned specific to the https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4 issue
Связанные уязвимости
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.
scanf and related functions in glibc before 2.15 allow local users to cause a denial of service (segmentation fault) via a large string of 0s.