Heap-based Buffer Overflow Affecting libss package, versions *
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.04% (10th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-LIBSS-1951423
- published 26 Jul 2021
- disclosed 11 Feb 2015
Introduced: 11 Feb 2015
CVE-2015-1572 Open this link in a new tabHow to fix?
There is no fixed version for Centos:6
libss
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libss
package and not the libss
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
References
- http://www.securityfocus.com/bid/72709
- http://advisories.mageia.org/MGASA-2015-0088.html
- https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
- https://access.redhat.com/security/cve/CVE-2015-1572
- http://www.debian.org/security/2015/dsa-3166
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
- https://security.gentoo.org/glsa/201507-22
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
- http://www.ubuntu.com/usn/USN-2507-1