First published: Sun Oct 22 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.26 | |
redhat/glibc | <2.27 | 2.27 |
debian/glibc | 2.31-13+deb11u11 2.31-13+deb11u10 2.36-9+deb12u8 2.36-9+deb12u7 2.40-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15804 is a vulnerability in the GNU C Library (glibc) that allows a buffer overflow during unescaping of user names with the ~ operator.
The severity of CVE-2017-15804 is critical with a CVSS score of 9.8.
The affected software versions include glibc 2.19-0ubuntu6.14, glibc 2.26-0ubuntu2.1, glibc 2.27, glibc 2.23-0ubuntu10, and various versions of glibc from 2.28-10+deb10u1 to 2.37-12.
To fix CVE-2017-15804, update to the latest available version of glibc, such as version 2.27 or higher.
More information about CVE-2017-15804 can be found on the MITRE CVE database, Ubuntu Security Notices, and the NIST National Vulnerability Database.