A vulnerability has been reported in nss-mdns, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to the use of miss-aligned data structures within the "_nss_mdns_gethostbyname2_r()" function in nss.c and can be exploited to crash an application using the library. The vulnerability is reported in versions prior to 0.10 running on the ARM and SPARC architectures. Solution: Update to version 0.10. Provided and/or discovered by: Daniel Smolik Original Advisory: Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=423222 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=451428 nss-mdns: http://0pointer.de/lennart/projects/nss-mdns/#news Reproducible: Always
please have a look at it
corrected severity Level
nss-mdns-0.10 has been in the tree, please stable.
x86 stable and added quotes
amd64 stable
ppc stable
This does not affect x86 and amd64 systems because they do not require strict alignment. While I am not sure about ppc, and only ARM and SPARC are mentioned affected, plus the impact is DoS, I vote NO.
no too, closing.