![]() ![]() An attacker could use to cause a denial of service (application crash) or possibly execute arbitrary code. Maksymilian Arciemowicz discovered a stack-based buffer overflow in the catopen function in the GNU C Library when handling long catalog names. ( CVE-2015-8779)įlorian Weimer discovered that the getnetbyname implementation in the GNU C Library did not properly handle long names passed as arguments.Īn attacker could use this to cause a denial of service (application crash) or possibly execute arbitrary code. Pivotal RabbitMQ 1.5.x versions prior to 1.5.12 AND 1.6.x versions prior to 1.6.1.Pivotal RiakCS 1.5.x versions prior to 1.5.13.Pivotal MySQL 1.6.x versions prior to 1.6.12 AND 1.7.x versions prior to 1.7.9 AND edge release versions prior to 1.8.0-edge.7.Pivotal Ops Manager 1.6.x versions prior to 1.6.15 AND 1.7.x versions prior to 1.7.6.Pivotal Elastic Runtime 1.6.x versions prior to 1.6.27 AND 1.7.x versions prior to 1.7.5.All versions of Cloud Foundry cflinuxfs2 prior to v.1.63.0.( CVE-2016-3075) Affected VMware Products and Versions An attacker could use to cause a denial of service (stack exhaustion leading to an application crash). Pivotal Redis 1.4.x versions prior to 1.4.25 AND 1.5.x versions prior to 1.5.14. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |