First published: Wed Sep 02 2015(Updated: )
A flaw was reported in colcrt: When running colcrt with a big input it crashes because of a global-buffer-overflow caused by a global variable 'page' defined in 'text-utils/colcrt.c:73:9 It is unclear whether this can be used to execute code on the system. Proposed patches: <a href="https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8">https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8</a> <a href="https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec">https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/util-linux | <2.27 | 2.27 |
kernel util-linux | <=2.22 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
openSUSE Leap | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-5218 is not clearly defined, but it involves a global buffer overflow that may lead to crashes.
To fix CVE-2015-5218, you should upgrade to util-linux version 2.27 or later.
CVE-2015-5218 affects versions of util-linux prior to 2.27, as well as specific versions of openSUSE.
It is unclear whether CVE-2015-5218 can be exploited to execute code on the system.
The flaw in CVE-2015-5218 is a global buffer overflow that occurs when colcrt is run with large inputs.