{"id":"CVE-2015-1473","details":"The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.","modified":"2026-04-16T06:19:19.986349228Z","published":"2015-04-08T10:59:03Z","related":["openSUSE-SU-2024:10154-1"],"references":[{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2519-1"},{"type":"WEB","url":"http://openwall.com/lists/oss-security/2015/02/04/1"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/72499"},{"type":"WEB","url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06"}],"schema_version":"1.7.5"}