First published: Mon Sep 14 2015(Updated: )
It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap (depending on adjacent heap contents), potentially resulting in arbitrary code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
GNU C Library (glibc) | <=2.19 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5277 has a critical severity level due to its potential to cause arbitrary code execution.
To fix CVE-2015-5277, you should update the affected glibc packages to the latest version available for your operating system.
CVE-2015-5277 affects Red Hat Enterprise Linux 7.0, Ubuntu Linux versions 12.04, 14.04, and 15.10, and GNU C Library up to 2.19.
CVE-2015-5277 is a memory corruption vulnerability in the nss_files backend of glibc that can lead to arbitrary code execution.
While there is no official workaround for CVE-2015-5277, applying security patches and limiting access to vulnerable applications can reduce risk.