CVE-2015-8982
Summary
| CVE | CVE-2015-8982 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-15 19:59:00 UTC |
| Updated | 2023-11-07 02:28:00 UTC |
| Description | Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow. |
Risk And Classification
Problem Types: CWE-190
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| sourceware.org Git - glibc.git/commit | CONFIRM | sourceware.org | Issue Tracking, Patch, Third Party Advisory |
| sourceware.org Git - glibc.git/commit | sourceware.org | ||
| oss-security - CVE Requests - glibc overflows (strxfrm) | MLIST | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 | lists.apache.org | ||
| Pony Mail! | MLIST | lists.apache.org | |
| 16009 – Possible buffer overflow in strxfrm | CONFIRM | sourceware.org | Issue Tracking, Patch |
| GNU glibc 'strxfrm()' Function Local Integer Overflow and Stack Overflow Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Pony Mail! | MLIST | lists.apache.org | |
| [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 | lists.apache.org | ||
| oss-security - Re: Pending CVE requests for glibc | MLIST | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 753208 SUSE Enterprise Linux Security Update for glibc (SUSE-SU-2022:14923-1)