Описание
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-5229
- https://bugzilla.redhat.com/show_bug.cgi?id=1246713
- https://bugzilla.redhat.com/show_bug.cgi?id=1256285
- https://bugzilla.redhat.com/show_bug.cgi?id=1293976
- https://kc.mcafee.com/corporate/index?page=content&id=SB10150
- http://rhn.redhat.com/errata/RHSA-2016-0176.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/84172
Связанные уязвимости
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
The calloc function in the glibc package in Red Hat Enterprise Linux ( ...
ELSA-2016-0176: glibc security and bug fix update (CRITICAL)