First published: Wed Jun 01 2016(Updated: )
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE openSUSE | =13.2 | |
GNU glibc | <=2.23 | |
Fedoraproject Fedora | =23 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.