First published: Wed Jan 20 2016(Updated: )
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glibc | <2.23 | 2.23 |
Fedora | =23 | |
Debian | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
GNU C Library | <=2.22 | |
SUSE Linux Enterprise Debuginfo | =11-sp2 | |
SUSE Linux Enterprise Debuginfo | =11-sp3 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
openSUSE libeconf | =13.2 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Desktop | =11-sp4 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Desktop | =12-sp1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12-sp1 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =11-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 | |
SUSE Linux Enterprise Server | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8778 has a moderate severity level due to the potential for denial of service or arbitrary code execution.
To fix CVE-2015-8778, upgrade the GNU C Library to version 2.23 or later.
CVE-2015-8778 affects various systems using GNU C Library versions below 2.23, including certain versions of Red Hat, Fedora, Debian, and Ubuntu.
While CVE-2015-8778 primarily causes application crashes, it may also allow attackers to execute arbitrary code, leading to potential data compromise.
CVE-2015-8778 is less of a concern for current systems as most have been updated to versions beyond the vulnerable 2.22.