The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-0176.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - | |
References | () http://www.securityfocus.com/bid/84172 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1246713 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1256285 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1293976 - Vendor Advisory | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10150 - |
Information
Published : 2016-04-08 15:59
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5229
Mitre link : CVE-2015-5229
CVE.ORG link : CVE-2015-5229
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_hpc_node_eus
- enterprise_linux_hpc_node
- enterprise_linux_server_aus
- enterprise_linux_workstation
CWE
CWE-17
DEPRECATED: Code