[arch-security] [ASA-201608-7] lib32-glibc: denial of service
anthraxx at archlinux.org
Mon Aug 8 00:44:21 UTC 2016
Arch Linux Security Advisory ASA-201608-7
Date : 2016-08-08
CVE-ID : CVE-2016-3075 CVE-2016-5417
Package : lib32-glibc
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package lib32-glibc before version 2.24-1 is vulnerable to denial of
Upgrade to 2.24-1.
# pacman -Syu "lib32-glibc>=2.24-1"
The problems have been fixed upstream in version 2.24.
- CVE-2016-3075 (denial of service)
The getnetbyname implementation in nss_dns contains a potentially
unbounded alloca call (in the form of a call to strdupa), leading to a
stack overflow (stack exhaustion) and a crash if getnetbyname is
invoked on a very long name.
- CVE-2016-5417 (denial of service)
The sockaddr_in6 allocated in resolv/res_init.c:317 is not freed,
leaking 28 bytes per thread using the resolver (according to valgrind).
The leak is triggered if name resolution functions are called in such a
way that internal resolver data structures are only initialized
partially. This issue may ultimately lead to denial of service by
leaking extensive amounts of memory.
A remote attacker is able to perform a denial of service attack via
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security