Summary: | <sys-libs/glibc-2.19-r1: Stack (frame) overflow in getaddrinfo() when processing entry mapping to long list of address structures (CVE-2013-1914) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://sourceware.org/bugzilla/show_bug.cgi?id=15330 | ||
See Also: |
http://sourceware.org/bugzilla/show_bug.cgi?id=15330 https://bugzilla.redhat.com/show_bug.cgi?id=947882 https://bugzilla.novell.com/show_bug.cgi?id=813121 |
||
Whiteboard: | A3 [glsa cleanup] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 518364 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2013-04-04 19:10:09 UTC
Upstream commit. http://sourceware.org/git/?p=glibc.git;a=commit;h=1cef1b19089528db11f221e938f60b9b048945d7 CVE-2013-1914 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1914): Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results. no plans to backport to glibc-2.17 or older Maintainer(s), please drop the vulnerable version(s). Added to an existing GLSA Request. This issue was resolved and addressed in GLSA 201503-04 at http://security.gentoo.org/glsa/glsa-201503-04.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |