![]() The catopen function contains several unbound stack allocations Szabolcs Nagy reported that the rarely-used hcreate and hcreate_rįunctions did not check the size argument properly, leading to aĬrash (denial of service) for certain arguments. Information to strftime no affected applications are known. Applications normally pass only valid time Is passed to strftime, the strftime function could crash or leak This vulnerability affects mostĪpplications which perform host name resolution using getaddrinfo,Īdam Nielsen discovered that if an invalid separated time value Internal buffers, leading to a stack-based buffer overflow andĪrbitrary code execution. Host name resolver function, getaddrinfo, when processingĪF_UNSPEC queries (for dual A/AAAA lookups), could mismanage its The Google Security Team and Red Hat discovered that the glibc The first vulnerability listed below is considered to have critical Several vulnerabilities have been fixed in the GNU C Library, glibc. Debian Security Advisory DSA-3481-1 glibc - security update Date Reported: Affected Packages: glibc Vulnerable: Yes Security database references: In the Debian bugtracking system: Bug 812441, Bug 812445, Bug 812455.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |