Bug#803927: glibc: multiple overflows in strxfrm()
Source: glibc
Version: 2.19-22
Severity: serious
Tags: security fixed-upstream
Control: forwarded -1 https://sourceware.org/bugzilla/show_bug.cgi?id=16009
Hello,
libc6 is vulnerable to buffer overruns in strxfrm() as reported
in the following upstream ticket:
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
The issue is fixed in glibc 2.21.
No CVE has been assigned yet even though it had been requested
in http://openwall.com/lists/oss-security/2015/09/08/2
The upstream patch is available here:
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=0f9e585480ed
Cheers,
--
Raphaël Hertzog ◈ Debian Developer
Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Reply to: