Add CVE-2015-0235.
- Affects linux_base-* Approved by: so@ (des)
This commit is contained in:
parent
fcd0b8b533
commit
b94dece6fd
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=378048
1 changed files with 40 additions and 0 deletions
|
@ -57,6 +57,46 @@ Notes:
|
|||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="0765de84-a6c1-11e4-a0c1-c485083ca99c">
|
||||
<topic>glibc -- gethostbyname buffer overflow</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>linux_base-c6</name>
|
||||
<range><lt>6.6_2</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>linux_base-f10</name>
|
||||
<range><ge>0</ge></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Robert Krátký reports:</p>
|
||||
<blockquote cite="https://access.redhat.com/discussions/1332403">
|
||||
<p>
|
||||
GHOST is a 'buffer overflow' bug affecting the gethostbyname() and
|
||||
gethostbyname2() function calls in the glibc library. This
|
||||
vulnerability allows a remote attacker that is able to make an
|
||||
application call to either of these functions to execute arbitrary
|
||||
code with the permissions of the user running the application.
|
||||
The gethostbyname() function calls are used for DNS resolving, which
|
||||
is a very common event. To exploit this vulnerability, an attacker
|
||||
must trigger a buffer overflow by supplying an invalid hostname
|
||||
argument to an application that performs a DNS resolution.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2015-0235</cvename>
|
||||
<url>https://access.redhat.com/articles/1332213</url>
|
||||
<url>http://www.openwall.com/lists/oss-security/2015/01/27/9</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2015-01-27</discovery>
|
||||
<entry>2015-01-28</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="37a87ade-a59f-11e4-958e-0011d823eebd">
|
||||
<topic>Adobe Flash Player -- critical vulnerability</topic>
|
||||
<affects>
|
||||
|
|
Loading…
Reference in a new issue