04-20-2020 04:03 AM - edited 04-20-2020 04:04 AM
How to understand the description in the bug:
The following are active releases and planned CCO date:
release CCO_Date
15.5(2)S/XE3.15.0S 3/31/2015 <<<<<<<<<<<<<
15.5(1)S1/XE3.14.1S 3/3/2015
15.4(3)S3/XE3.13.3S 5/29/2015
15.4(2)S3/XE3.12.3S 3/28/2015
15.4(1)S4/XE3.11.4S 5/29/2015
15.3(3)S6/XE3.10.6S 7/30/2015
15.2(4)S7/XE3.7.7S 3/20/2015
15.5(3)S/XE3.16.0S 7/31/2015 <<<<<<<<<<<<<<<
Known Affected Releases: | (8) |
Solved! Go to Solution.
04-20-2020 05:07 AM
@Rps-Cheers wrote:
Why the fixed release also the affectd release
Cisco Bug IDs are rarely accurate.
For more "reliable" information, always refer to the Security Bulletin: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
04-20-2020 04:16 AM
@Rps-Cheers wrote:
3.15.0S
3.14.1S
3.13.3S
3.12.3S
3.11.4S
3.10.6S
3.7.7S
3.16.0S
The fixed versions are above.
(Wow. This is a 5-year old security vulnerability.)
04-20-2020 04:25 AM
04-20-2020 05:07 AM
@Rps-Cheers wrote:
Why the fixed release also the affectd release
Cisco Bug IDs are rarely accurate.
For more "reliable" information, always refer to the Security Bulletin: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
04-20-2020 05:16 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide