This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
CVE-2016-3075 glibc: Stack overflow in nss_dns_getnetbyname_r
Product:
[Other] Security Response
Reporter:
Adam Mariš <amaris>
Component:
vulnerability Assignee:
Red Hat Product Security <security-response-team>
Status:
CLOSED
ERRATA
QA Contact:
Severity:
low
Docs Contact:
Priority:
low
Version:
unspecified CC:
arjun.is, ashankar, codonell, dj, fweimer, glibc-bugzilla, law, mfabian, mnewsome, ngalvin, pfrankli, sardella, security-response-team, siddhesh, slawomir, yozone
Target Milestone:
--- Keywords:
Security
Target Release:
---
Hardware:
All
OS:
Linux
Whiteboard:
Fixed In Version:
glibc 2.24
Doc Type:
Bug Fix
Doc Text:
A stack overflow vulnerability was found in _nss_dns_getnetbyname_r. On systems with nsswitch configured to include "networks: dns" with a privileged or network-facing service that would attempt to resolve user-provided network names, an attacker could provide an excessively long network name, resulting in stack corruption and code execution.
Story Points:
---
Clone Of:
Environment:
Last Closed:
2019-06-08 02:50:09 UTC
Type:
---
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
Bug Depends On:
1321954 , 1321993
Bug Blocks:
1321867 , 1323912
Attachments: