CVE-2015-5277
Publication date 17 December 2015
Last updated 24 July 2024
Ubuntu priority
The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
From the Ubuntu Security Team
Sumit Bose and Lukáš Slebodník discovered that the Name Service Switch (NSS) implementation in the GNU C Library did not handle long lines in the files databases correctly. A local attacker could use this to cause a denial of service (application crash) or possibly execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
eglibc | 16.04 LTS xenial | Not in release |
14.04 LTS trusty |
Fixed 2.19-0ubuntu6.8
|
|
glibc | 16.04 LTS xenial |
Not affected
|
14.04 LTS trusty | Not in release | |
Patch details
Package | Patch details |
---|---|
glibc |
References
Related Ubuntu Security Notices (USN)
- USN-2985-1
- GNU C Library vulnerabilities
- 25 May 2016