First published: Mon Aug 24 2015(Updated: )
It was discovered that the calloc implementation in glibc, as shipped in the Red Hat Enterprise Linux 6.7 GA and 7.2 GA version, could return memory areas which contain non-zero bytes. This could lead to application misbehavior such as hangs or crashes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.7 | |
Red Hat Enterprise Linux | =7.2 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5229 can lead to application misbehavior, including hangs or crashes due to incorrect memory initialization.
CVE-2015-5229 affects Red Hat Enterprise Linux versions 6.7, 7.0, and 7.2.
To mitigate CVE-2015-5229, users should apply the relevant security patches provided by Red Hat for their affected systems.
Yes, CVE-2015-5229 was reported and documented in collaboration with Red Hat, ensuring responsible disclosure.
The significance lies in the fact that improper memory initialization can create unpredictable behavior in applications which rely on calloc.