Upstream information

CVE-2015-5229 at MITRE

Description

The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.

CVSS v2 Scores
  National Vulnerability Database SUSE
Base Score 5 4
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P AV:N/AC:H/Au:N/C:P/I:N/A:P
Access Vector Network Network
Access Complexity Low High
Authentication None None
Confidentiality Impact None Partial
Integrity Impact None None
Availability Impact Partial Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3

Note from the SUSE Security Team

This issue was in a Redhat specific glibc patch and so does not affect SUSE or openSUSE.

SUSE Bugzilla entry: 943015 [RESOLVED / INVALID]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Liberty Linux 7
  • glibc >= 2.17-106.el7_2.4
  • glibc-common >= 2.17-106.el7_2.4
  • glibc-devel >= 2.17-106.el7_2.4
  • glibc-headers >= 2.17-106.el7_2.4
  • glibc-static >= 2.17-106.el7_2.4
  • glibc-utils >= 2.17-106.el7_2.4
  • nscd >= 2.17-106.el7_2.4
Patchnames:
RHSA-2016:0176


SUSE Timeline for this CVE

CVE page created: Mon Aug 24 13:15:16 2015
CVE page last modified: Thu Apr 17 00:22:32 2025