From ${URL} : A stack (frame) overflow flaw, leading to denial of service (application crash), was found in the way getaddrinfo() routine (returning a list of address structures for particular request) of glibc, the collection of GNU libc libraries, processed certain requests. If an application linked against glibc accepted untrusted getaddrinfo() input remotely, a remote attacker could issue a specially-crafted request, which once processed would lead to that application crash. References: [1] https://bugzilla.novell.com/show_bug.cgi?id=813121 [2] http://www.openwall.com/lists/oss-security/2013/04/03/2 Proposed Novell patch: [3] http://bugzillafiles.novell.org/attachment.cgi?id=533210
Upstream commit. http://sourceware.org/git/?p=glibc.git;a=commit;h=1cef1b19089528db11f221e938f60b9b048945d7
CVE-2013-1914 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1914): Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
Fix is in 2.18: http://sourceware.org/git/?p=glibc.git;a=blob_plain;f=NEWS;hb=HEAD
no plans to backport to glibc-2.17 or older
Maintainer(s), please drop the vulnerable version(s). Added to an existing GLSA Request.
This issue was resolved and addressed in GLSA 201503-04 at http://security.gentoo.org/glsa/glsa-201503-04.xml by GLSA coordinator Kristian Fiskerstrand (K_F).