|
|
Subscribe / Log in / New account

glibc: code execution

Package(s):glibc eglibc CVE #(s):CVE-2015-0235
Created:January 27, 2015 Updated:March 4, 2015
Description: From the Debian advisory:

Qualys discovered that the gethostbyname and gethostbyname2 functions were subject to a buffer overflow if provided with a crafted IP address argument. This could be used by an attacker to execute arbitrary code in processes which called the affected functions.

The original glibc bug was reported by Peter Klotz.

Alerts:
Fedora FEDORA-2015-2315 php 2015-02-23
Oracle ELSA-2015-0327 glibc 2015-03-09
Fedora FEDORA-2015-2328 php 2015-03-04
Mandriva MDVSA-2015:039 glibc 2015-02-10
openSUSE openSUSE-SU-2015:0184-1 glibc 2015-02-02
Oracle ELSA-2015-0101 glibc 2015-01-29
Slackware SSA:2015-028-01 glibc 2015-01-28
openSUSE openSUSE-SU-2015:0162-1 glibc 2015-01-28
Red Hat RHSA-2015:0101-01 glibc 2015-01-28
Ubuntu USN-2485-1 eglibc 2015-01-27
SUSE SUSE-SU-2015:0158-1 glibc 2015-01-28
Scientific Linux SLSA-2015:0090-1 glibc 2015-01-27
Scientific Linux SLSA-2015:0092-1 glibc 2015-01-27
Oracle ELSA-2015-0090 glibc 2015-01-27
Oracle ELSA-2015-0092 glibc 2015-01-27
Oracle ELSA-2015-0092 glibc 2015-01-27
Debian-LTS DLA-139-1 eglibc 2015-01-28
CentOS CESA-2015:0090 glibc 2015-01-27
CentOS CESA-2015:0092 glibc 2015-01-27
CentOS CESA-2015:0092 glibc 2015-01-28
Red Hat RHSA-2015:0099-01 glibc 2015-01-28
Red Hat RHSA-2015:0090-01 glibc 2015-01-27
Red Hat RHSA-2015:0092-01 glibc 2015-01-27
Debian DSA-3142-1 eglibc 2015-01-27
Gentoo 201503-04 glibc 2015-03-08

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds