Heap-based buffer overflow in the _nsshostnamedigitsdots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "libc6-dbg": "2.19-0ubuntu6", "libc6": "2.19-0ubuntu6", "libc6-dev": "2.19-0ubuntu6", "multiarch-support": "2.19-0ubuntu6", "libc-bin": "2.19-0ubuntu6", "libc6-i386": "2.19-0ubuntu6", "libc6-udeb": "2.19-0ubuntu6", "libc6-ppc64": "2.19-0ubuntu6", "libc6-dev-x32": "2.19-0ubuntu6", "eglibc-source": "2.19-0ubuntu6", "libc-dev-bin": "2.19-0ubuntu6", "libc6-amd64": "2.19-0ubuntu6", "libnss-dns-udeb": "2.19-0ubuntu6", "libc6-x32": "2.19-0ubuntu6", "libnss-files-udeb": "2.19-0ubuntu6", "libc6-prof": "2.19-0ubuntu6", "libc6-dev-amd64": "2.19-0ubuntu6", "libc6-pic": "2.19-0ubuntu6", "libc6-dev-i386": "2.19-0ubuntu6", "libc6-dev-armel": "2.19-0ubuntu6", "libc6-dev-ppc64": "2.19-0ubuntu6", "nscd": "2.19-0ubuntu6", "glibc-doc": "2.19-0ubuntu6", "libc6-armel": "2.19-0ubuntu6" } ] }