Back to bug 1300312

Who When What Removed Added
Adam Mariš 2016-01-20 13:05:28 UTC Depends On 1300314
Adam Mariš 2016-01-20 13:07:45 UTC Blocks 1300316
Florian Weimer 2016-01-20 13:11:49 UTC Link ID Sourceware 17905
Salvatore Bonaccorso 2016-01-20 17:22:39 UTC CC carnil
Slawomir Czarko 2016-01-21 07:28:41 UTC CC slawomir
Adam Mariš 2016-01-22 08:32:11 UTC Whiteboard impact=moderate,public=20150129,reported=20160119,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-6/compat-glibc=new,rhel-6/glibc=new,rhel-7/compat-glibc=new,rhel-7/glibc=new,rhes-3.1/glibc=new,fedora-all/glibc=affected impact=moderate,public=20150129,reported=20160119,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/compat-glibc=new,rhel-5/glibc=new,rhel-6/compat-glibc=new,rhel-6/glibc=new,rhel-7/compat-glibc=new,rhel-7/glibc=new,rhes-3.1/glibc=new,fedora-all/glibc=affected
Paul DeStefano 2016-02-16 08:01:17 UTC CC paul.destefano
Huzaifa S. Sidhpurwala 2016-03-11 07:46:25 UTC Comment 2 is private 1 0
Norman Sardella 2016-04-20 13:23:29 UTC CC sardella
Ganesh 2016-05-20 07:08:53 UTC CC gnaik
Huzaifa S. Sidhpurwala 2016-05-30 06:34:44 UTC Whiteboard impact=moderate,public=20150129,reported=20160119,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/compat-glibc=new,rhel-5/glibc=new,rhel-6/compat-glibc=new,rhel-6/glibc=new,rhel-7/compat-glibc=new,rhel-7/glibc=new,rhes-3.1/glibc=new,fedora-all/glibc=affected impact=moderate,public=20150129,reported=20160119,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/compat-glibc=wontfix,rhel-5/glibc=wontfix,rhel-6/compat-glibc=wontfix,rhel-6/glibc=affected,rhel-7/compat-glibc=wontfix,rhel-7/glibc=affected,rhes-3.1/glibc=new,fedora-all/glibc=affected
Huzaifa S. Sidhpurwala 2016-05-30 06:35:08 UTC Whiteboard impact=moderate,public=20150129,reported=20160119,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/compat-glibc=wontfix,rhel-5/glibc=wontfix,rhel-6/compat-glibc=wontfix,rhel-6/glibc=affected,rhel-7/compat-glibc=wontfix,rhel-7/glibc=affected,rhes-3.1/glibc=new,fedora-all/glibc=affected impact=moderate,public=20150129,reported=20160119,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/compat-glibc=wontfix,rhel-5/glibc=wontfix,rhel-6/compat-glibc=wontfix,rhel-6/glibc=affected,rhel-7/compat-glibc=wontfix,rhel-7/glibc=affected,fedora-all/glibc=affected
John Walter 2016-07-04 20:46:59 UTC CC jwalter
Florian Weimer 2016-07-19 20:08:48 UTC Depends On 1358015
Yasuhiro Ozone 2016-07-26 03:26:53 UTC CC yozone
Florian Weimer 2016-09-09 10:44:59 UTC Depends On 1374654
Huzaifa S. Sidhpurwala 2017-03-09 04:37:00 UTC Doc Text A stack based buffer overflow vulnerability in the catopen() function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code.
Eric Christensen 2017-03-09 14:13:12 UTC Doc Text A stack based buffer overflow vulnerability in the catopen() function was found, causing applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. A stack based buffer overflow vulnerability in the catopen() function was found causing applications, which pass long strings to the catopen function, to crash or, potentially execute arbitrary code.
Tomas Hoger 2017-03-14 09:16:44 UTC Doc Text A stack based buffer overflow vulnerability in the catopen() function was found causing applications, which pass long strings to the catopen function, to crash or, potentially execute arbitrary code. A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code.
Doran Moppert 2017-07-28 04:13:23 UTC Blocks 1415638
PnT Account Manager 2019-05-31 14:21:58 UTC CC smohan
Product Security DevOps Team 2019-06-08 02:47:39 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2019-06-08 02:47:39 UTC
Product Security DevOps Team 2019-09-29 13:42:36 UTC Whiteboard impact=moderate,public=20150129,reported=20160119,source=oss-security,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/compat-glibc=wontfix,rhel-5/glibc=wontfix,rhel-6/compat-glibc=wontfix,rhel-6/glibc=affected,rhel-7/compat-glibc=wontfix,rhel-7/glibc=affected,fedora-all/glibc=affected

Back to bug 1300312