Arch Linux Security Advisory ASA-201608-6
========================================
Severity: Low
Date    : 2016-08-08
CVE-ID  : CVE-2016-3075 CVE-2016-5417
Package : glibc
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package glibc before version 2.24-1 is vulnerable to denial of service.

Resolution
=========
Upgrade to 2.24-1.

# pacman -Syu "glibc>=2.24-1"

The problems have been fixed upstream in version 2.24.

Workaround
=========
None.

Description
==========
- CVE-2016-3075 (denial of service)

The getnetbyname implementation in nss_dns contains a potentially
unbounded alloca call (in the form of a call to strdupa), leading to a
stack overflow (stack exhaustion) and a crash if getnetbyname is
invoked on a very long name.

- CVE-2016-5417 (denial of service)

The sockaddr_in6 allocated in resolv/res_init.c:317 is not freed,
leaking 28 bytes per thread using the resolver (according to valgrind).
The leak is triggered if name resolution functions are called in such a
way that internal resolver data structures are only initialized
partially. This issue may ultimately lead to denial of service by
leaking extensive amounts of memory.

Impact
=====
A remote attacker is able to perform a denial of service attack via
various vectors.

References
=========
https://access.redhat.com/security/cve/CVE-2016-3075
https://access.redhat.com/security/cve/CVE-2016-5417
https://sourceware.org/bugzilla/show_bug.cgi?id=19879
https://sourceware.org/bugzilla/show_bug.cgi?id=19257

ArchLinux: 201608-6: glibc: denial of service

August 8, 2016

Summary

- CVE-2016-3075 (denial of service) The getnetbyname implementation in nss_dns contains a potentially unbounded alloca call (in the form of a call to strdupa), leading to a stack overflow (stack exhaustion) and a crash if getnetbyname is invoked on a very long name.
- CVE-2016-5417 (denial of service)
The sockaddr_in6 allocated in resolv/res_init.c:317 is not freed, leaking 28 bytes per thread using the resolver (according to valgrind). The leak is triggered if name resolution functions are called in such a way that internal resolver data structures are only initialized partially. This issue may ultimately lead to denial of service by leaking extensive amounts of memory.

Resolution

Upgrade to 2.24-1. # pacman -Syu "glibc>=2.24-1"
The problems have been fixed upstream in version 2.24.

References

https://access.redhat.com/security/cve/CVE-2016-3075 https://access.redhat.com/security/cve/CVE-2016-5417 https://sourceware.org/bugzilla/show_bug.cgi?id=19879 https://sourceware.org/bugzilla/show_bug.cgi?id=19257

Severity
Package : glibc
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News