As an FYI: A heap-based buffer overflow was found in __nss_hostname_digits_dots(), which is used by the gethostbyname() and gethostbyname2() glibc function call. A remote attacker could use this flaw to execute arbitary code with the permissions of the user running the application. https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-0235 https://rhn.redhat.com/errata/RHSA-2015-0092.html -- Steven Haigh Email: [log in to unmask] Web: http://www.crc.id.au Phone: (03) 9001 6090 - 0412 935 897