Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 541246 (CVE-2015-8983) - <sys-libs/glibc-2.21-r1: _IO_wstr_overflow integer overflow
Summary: <sys-libs/glibc-2.21-r1: _IO_wstr_overflow integer overflow
Alias: CVE-2015-8983
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
Whiteboard: A2 [glsa]
Depends on:
Reported: 2015-02-24 14:12 UTC by Agostino Sarubbo
Modified: 2017-02-15 07:50 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-02-24 14:12:52 UTC
From ${URL} :

An integer overflow flaw, leading to a heap-based buffer overflow, was found in glibc's 
_IO_wstr_overflow() function. If an application used this function, it could cause the application 
to crash or, potentially, execute arbitrary code with the privileges of the user running the 

Upstream issue:

Upstream patch:;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 SpanKY gentoo-dev 2015-07-21 03:49:11 UTC
this has been fixed for glibc 2.22 and 2.21.1, and i've backported it to our glibc 2.21-r1 ebuild.  but that's just now hitting ~arch so it'll be a little while before we can stabilize.
Comment 2 Roger 2015-10-17 15:44:13 UTC
Package =sys-libs/glibc-2.20-r2 is still marked as the latest stable on X86_64 bit platforms without this patch applied.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2016-02-17 15:38:43 UTC
This issue was resolved and addressed in
 GLSA 201602-02 at
by GLSA coordinator Tobias Heinlein (keytoaster).