FS#48213 - [glibc] bug, CVE2016-7547
Attached to Project:
Arch Linux
Opened by Ingo Albrecht (indigo) - Tuesday, 16 February 2016, 19:06 GMT
Last edited by Allan McRae (Allan) - Wednesday, 17 February 2016, 05:29 GMT
Opened by Ingo Albrecht (indigo) - Tuesday, 16 February 2016, 19:06 GMT
Last edited by Allan McRae (Allan) - Wednesday, 17 February 2016, 05:29 GMT
|
Details
Description:
Bug to track remote exploitable: CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow Additional info: * glibc & lib32-glibc <= 2.22-3 [1] Disclosure: https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html [2] Disclousre: https://googleonlinesecurity.blogspot.de/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html [3] Bug: https://sourceware.org/bugzilla/show_bug.cgi?id=18665 Steps to reproduce: see above links |
This task depends upon
Closed by Allan McRae (Allan)
Wednesday, 17 February 2016, 05:29 GMT
Reason for closing: Fixed
Additional comments about closing: glibc-2.22-4
Wednesday, 17 February 2016, 05:29 GMT
Reason for closing: Fixed
Additional comments about closing: glibc-2.22-4
I've built the glibc package successfully with this patch, and am currently running it on 3-4 of my boxes, without any problems/crashes so far.
313c330
< @@ -767,36 +855,14 @@ send_vc(res_state statp,
---
> @@ -767,40 +855,14 @@ send_vc(res_state statp,
328a346
> -#if __GNUC_PREREQ (4, 7)
330a349
> -#endif
340a360
> -#if __GNUC_PREREQ (4, 7)
341a362
> -#endif
550a572
>