Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1339960 - CVE-2013-7423 glibc: getaddrinfo() sends DNS queries to random file descriptors [rhel-6.5.z]
CVE-2013-7423 glibc: getaddrinfo() sends DNS queries to random file descripto...
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: glibc (Show other bugs)
6.5
All Linux
urgent Severity high
: rc
: ---
Assigned To: Florian Weimer
Václav Kadlčík
: SecurityTracking, ZStream
Depends On: 1144019
Blocks: CVE-2013-7423
  Show dependency treegraph
 
Reported: 2016-05-26 05:15 EDT by Marcel Kolaja
Modified: 2016-11-08 11:20 EST (History)
19 users (show)

See Also:
Fixed In Version: glibc-2.12-1.132.el6_5.8
Doc Type: Release Note
Doc Text:
It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data.
Story Points: ---
Clone Of: 1144019
Environment:
Last Closed: 2016-06-07 01:38:11 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Sourceware 15946 None None None 2016-05-26 05:16 EDT
Debian BTS 722075 None None None 2016-05-26 05:16 EDT
Red Hat Product Errata RHSA-2016:1207 normal SHIPPED_LIVE Moderate: glibc security update 2016-06-07 05:37:49 EDT

  None (edit)
Description Marcel Kolaja 2016-05-26 05:15:57 EDT
This bug has been copied from bug #1144019 and has been proposed
to be backported to 6.5 z-stream (EUS).
Comment 7 errata-xmlrpc 2016-06-07 01:38:11 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2016:1207

Note You need to log in before you can comment on or make changes to this bug.