[manjaro-security] [arch-security] [ASA-201608-7] lib32-glibc: denial of service
Levente Polyak
anthraxx at archlinux.org
Mon Aug 8 02:44:21 CEST 2016
Arch Linux Security Advisory ASA-201608-7
=========================================
Severity: Low
Date : 2016-08-08
CVE-ID : CVE-2016-3075 CVE-2016-5417
Package : lib32-glibc
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package lib32-glibc before version 2.24-1 is vulnerable to denial of
service.
Resolution
==========
Upgrade to 2.24-1.
# pacman -Syu "lib32-glibc>=2.24-1"
The problems have been fixed upstream in version 2.24.
Workaround
==========
None.
Description
===========
- CVE-2016-3075 (denial of service)
The getnetbyname implementation in nss_dns contains a potentially
unbounded alloca call (in the form of a call to strdupa), leading to a
stack overflow (stack exhaustion) and a crash if getnetbyname is
invoked on a very long name.
- CVE-2016-5417 (denial of service)
The sockaddr_in6 allocated in resolv/res_init.c:317 is not freed,
leaking 28 bytes per thread using the resolver (according to valgrind).
The leak is triggered if name resolution functions are called in such a
way that internal resolver data structures are only initialized
partially. This issue may ultimately lead to denial of service by
leaking extensive amounts of memory.
Impact
======
A remote attacker is able to perform a denial of service attack via
various vectors.
References
==========
https://access.redhat.com/security/cve/CVE-2016-3075
https://access.redhat.com/security/cve/CVE-2016-5417
https://sourceware.org/bugzilla/show_bug.cgi?id=19879
https://sourceware.org/bugzilla/show_bug.cgi?id=19257
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20160808/3c80105f/attachment.pgp>
More information about the manjaro-security
mailing list