Openwall GNU/*/Linux Information for VU#967332
GNU C Library (glibc) __nss_hostname_digits_dots() function vulnerable to buffer overflow
- Vendor Information Help Date Notified: 28 Jan 2015
- Statement Date: 28 Jan 2015
- Date Updated: 30 Jan 2015
"Openwall GNU/*/Linux (Owl) was affected, although there's no known
attack vector that would expose the glibc bug as a vulnerability in an
install of Owl with no third-party software. We have released glibc
updates for Owl 3.1-stable and Owl-current on 2015/01/28."
We are not aware of further vendor information regarding this vulnerability.
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.