Use-after-free vulnerabilities in posix_spawn_file_actions_addopen function in glibc - CVE-2014-4043
|ID: oval:org.secpod.oval:def:21807||Date: (C)2014-12-01 (M)2017-08-29|
|Class: VULNERABILITY||Family: unix|
The host is installed with glibc before 2.20 and is prone to an use-after-free vulnerabilities. The flaws are present in the application, which does not copy its path argument in accordance with the POSIX specification. Successful exploitation allows context-dependent attackers to trigger use-after-free vulnerabilities.
|Red Hat Enterprise Linux 6|
|Red Hat Enterprise Linux 7|