Total vulnerabilities in the database
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
Software | From | Fixed in |
---|---|---|
opensuse / opensuse | 13.2 | 13.2.x |
gnu / glibc | - | 2.23.x |
fedoraproject / fedora | 23 | 23.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 15.10 | 15.10.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |