ID CVE-2013-7424
Summary The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to ping6.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:x64:*
    cpe:2.3:a:gnu:glibc:-:*:*:*:*:*:x64:*
  • cpe:2.3:a:gnu:glibc:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.06.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.06.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.07.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.07.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.08.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.08.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:1.09.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:1.09.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:x86:*
    cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:x86:*
  • cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 28-11-2016 - 19:10)
Impact:
Exploitability:
CWE CWE-17
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • bugzilla
    id 1099025
    title ftime() possibly broken on ppc
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 6 is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • comment glibc is earlier than 0:2.12-1.149.el6
            oval oval:com.redhat.rhsa:tst:20141391001
          • comment glibc is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763002
        • AND
          • comment glibc-common is earlier than 0:2.12-1.149.el6
            oval oval:com.redhat.rhsa:tst:20141391003
          • comment glibc-common is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763004
        • AND
          • comment glibc-devel is earlier than 0:2.12-1.149.el6
            oval oval:com.redhat.rhsa:tst:20141391005
          • comment glibc-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763006
        • AND
          • comment glibc-headers is earlier than 0:2.12-1.149.el6
            oval oval:com.redhat.rhsa:tst:20141391007
          • comment glibc-headers is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763008
        • AND
          • comment glibc-static is earlier than 0:2.12-1.149.el6
            oval oval:com.redhat.rhsa:tst:20141391009
          • comment glibc-static is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763010
        • AND
          • comment glibc-utils is earlier than 0:2.12-1.149.el6
            oval oval:com.redhat.rhsa:tst:20141391011
          • comment glibc-utils is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763012
        • AND
          • comment nscd is earlier than 0:2.12-1.149.el6
            oval oval:com.redhat.rhsa:tst:20141391013
          • comment nscd is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhba:tst:20120763014
    rhsa
    id RHSA-2014:1391
    released 2014-10-13
    severity Moderate
    title RHSA-2014:1391: glibc security, bug fix, and enhancement update (Moderate)
  • bugzilla
    id 1186614
    title CVE-2013-7424 glibc: Invalid-free when using getaddrinfo()
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment glibc is earlier than 0:2.5-123.el5_11.3
            oval oval:com.redhat.rhsa:tst:20151627001
          • comment glibc is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022002
        • AND
          • comment glibc-common is earlier than 0:2.5-123.el5_11.3
            oval oval:com.redhat.rhsa:tst:20151627003
          • comment glibc-common is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022004
        • AND
          • comment glibc-devel is earlier than 0:2.5-123.el5_11.3
            oval oval:com.redhat.rhsa:tst:20151627005
          • comment glibc-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022006
        • AND
          • comment glibc-headers is earlier than 0:2.5-123.el5_11.3
            oval oval:com.redhat.rhsa:tst:20151627007
          • comment glibc-headers is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022008
        • AND
          • comment glibc-utils is earlier than 0:2.5-123.el5_11.3
            oval oval:com.redhat.rhsa:tst:20151627009
          • comment glibc-utils is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022010
        • AND
          • comment nscd is earlier than 0:2.5-123.el5_11.3
            oval oval:com.redhat.rhsa:tst:20151627011
          • comment nscd is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhba:tst:20130022012
    rhsa
    id RHSA-2015:1627
    released 2015-08-17
    severity Moderate
    title RHSA-2015:1627: glibc security update (Moderate)
rpms
  • glibc-0:2.12-1.149.el6
  • glibc-common-0:2.12-1.149.el6
  • glibc-debuginfo-0:2.12-1.149.el6
  • glibc-debuginfo-common-0:2.12-1.149.el6
  • glibc-devel-0:2.12-1.149.el6
  • glibc-headers-0:2.12-1.149.el6
  • glibc-static-0:2.12-1.149.el6
  • glibc-utils-0:2.12-1.149.el6
  • nscd-0:2.12-1.149.el6
  • glibc-0:2.5-123.el5_11.3
  • glibc-common-0:2.5-123.el5_11.3
  • glibc-debuginfo-0:2.5-123.el5_11.3
  • glibc-debuginfo-common-0:2.5-123.el5_11.3
  • glibc-devel-0:2.5-123.el5_11.3
  • glibc-headers-0:2.5-123.el5_11.3
  • glibc-utils-0:2.5-123.el5_11.3
  • nscd-0:2.5-123.el5_11.3
refmap via4
bid 72710
confirm
mlist [oss-security] 20150129 Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)
Last major update 28-11-2016 - 19:10
Published 26-08-2015 - 19:59
Last modified 28-11-2016 - 19:10
Back to Top