Lucene search

K
debianDebianDEBIAN:DLA-230-1:7B9C4
HistoryMay 27, 2015 - 6:03 p.m.

[SECURITY] [DLA 230-1] eglibc security update

2015-05-2718:03:22
lists.debian.org
12

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

AI Score

Confidence

High

0.105 Low

EPSS

Percentile

95.0%

Package : eglibc
Version : 2.11.3-4+deb6u6
CVE ID : CVE-2015-1781

Arjun Shankar of Red Hat discovered that gethostbyname_r and related
functions compute the size of an input buffer incorrectly if the passed-in
buffer is misaligned. This results in a buffer overflow.

For the oldoldstable distribution (squeeze), this problem has been
fixed in version 2.11.3-4+deb6u6.

Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

AI Score

Confidence

High

0.105 Low

EPSS

Percentile

95.0%