First published: Mon Mar 20 2017(Updated: )
Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c ...
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <=2.21 | |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u9 2.36-9+deb12u7 2.40-7 2.41-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8983 has a medium severity rating due to its potential to cause denial of service through application crashes.
To fix CVE-2015-8983, upgrade your GNU C Library (glibc) to version 2.22 or later.
CVE-2015-8983 affects versions of glibc prior to 2.22, specifically versions up to 2.21.
CVE-2015-8983 can be exploited by context-dependent attackers to cause application crashes.
Yes, CVE-2015-8983 can potentially be exploited to cause denial of service, but specific exploit details are not publicly available.