CVE-2015-0235

Priority
High
Description
Heap-based buffer overflow in the __nss_hostname_digits_dots function in
glibc 2.2, and other 2.x versions before 2.18, allows context-dependent
attackers to execute arbitrary code via vectors related to the (1)
gethostbyname or (2) gethostbyname2 function, aka "GHOST."
References
Bugs
Assigned-to
sbeattie
Package
Upstream:not-affected (2.18)
Ubuntu 12.04 LTS (Precise Pangolin):released (2.15-0ubuntu10.10)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (2.19-0ubuntu6)
Package
Source: glibc (LP Ubuntu Debian)
Upstream:not-affected (2.18)
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
More Information

Updated: 2016-03-23 03:41:42 UTC (commit 10817)