ArchLinux: 201608-6: glibc: denial of service
Summary
- CVE-2016-3075 (denial of service)
The getnetbyname implementation in nss_dns contains a potentially
unbounded alloca call (in the form of a call to strdupa), leading to a
stack overflow (stack exhaustion) and a crash if getnetbyname is
invoked on a very long name.
- CVE-2016-5417 (denial of service)
The sockaddr_in6 allocated in resolv/res_init.c:317 is not freed,
leaking 28 bytes per thread using the resolver (according to valgrind).
The leak is triggered if name resolution functions are called in such a
way that internal resolver data structures are only initialized
partially. This issue may ultimately lead to denial of service by
leaking extensive amounts of memory.
Resolution
Upgrade to 2.24-1.
# pacman -Syu "glibc>=2.24-1"
The problems have been fixed upstream in version 2.24.
References
https://access.redhat.com/security/cve/CVE-2016-3075 https://access.redhat.com/security/cve/CVE-2016-5417 https://sourceware.org/bugzilla/show_bug.cgi?id=19879 https://sourceware.org/bugzilla/show_bug.cgi?id=19257
Workaround
None.