Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8075

Опубликовано: 10 июл. 2015
Источник: redhat
CVSS2: 4.3

Описание

[REJECTED CVE] An out-of-bounds memory read in function psf_strlcpy_crlf when running test suite of libsndfile with address sanitizer enabled was found.

Отчет

This CVE has been rejected upstream after analysis showed the issue originated from a flawed test case, not a real vulnerability. The test incorrectly passed sizeof(src)—a pointer size—causing false out-of-bounds warnings under AddressSanitizer. The test runs only during make check and has no impact on production. Vendor fixes also reflect the test's invalidity, confirming no security risk exists. Refer to the announcement mail here: https://seclists.org/oss-sec/2015/q4/226. If you have additional information or concerns regarding this determination, please contact Red Hat Product Security for further clarification.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libsndfileWill not fix
Red Hat Enterprise Linux 7libsndfileWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1277915libsndfile: Out of bounds memory access in psf_strlcpy_crlf

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

nvd
больше 10 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

suse-cvrf
около 10 лет назад

Security update for libsndfile

suse-cvrf
около 10 лет назад

Security update for libsndfile

suse-cvrf
около 10 лет назад

Security update for libsndfile

4.3 Medium

CVSS2