Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8985

Опубликовано: 20 мар. 2017
Источник: debian
EPSS Низкий

Описание

The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glibcfixed2.28-1package

Примечания

  • https://sourceware.org/bugzilla/show_bug.cgi?id=21163

  • https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 (2.28)

  • DoS via crafted regexps are not considered security issues by glibc upstream

EPSS

Процентиль: 42%
0.00198
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 9 лет назад

The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.

redhat
почти 11 лет назад

The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.

CVSS3: 5.9
nvd
почти 9 лет назад

The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.

suse-cvrf
около 3 лет назад

Security update for glibc

suse-cvrf
около 3 лет назад

Security update for glibc

EPSS

Процентиль: 42%
0.00198
Низкий