View | Details | Raw Unified | Return to bug 207272 | Differences between
and this patch

Collapse All | Expand All

(-)security/vuxml/vuln.xml (+42 lines)
Lines 57-62 Link Here
57
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
57
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
-->
58
-->
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
59
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
  <vuln vid="8e4665da-d5a2-11e5-a09d-c485083ca99c">
61
    <topic>glibc -- stack-based buffer overflow</topic>
62
    <affects>
63
      <package>
64
	<name>linux_base-c6</name>
65
	<name>linux_base-c6_64</name>
66
	<range><lt>6.7_1</lt></range>
67
      </package>
68
      <package>
69
	<name>linux_base-f10</name>
70
	<name>linux_base-c6_64</name>
71
	<range><ge>0</ge></range>
72
      </package>
73
    </affects>
74
    <description>
75
      <body xmlns="http://www.w3.org/1999/xhtml">
76
	<p>Fabio Olive Leite reports:</p>
77
	<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7547">
78
	  <p>A stack-based buffer overflow was found in libresolv when invoked
79
	  from nss_dns, allowing specially crafted DNS responses to seize control of
80
	  EIP in the DNS client.
81
82
	  The buffer overflow occurs in the functions send_dg (send datagram) and
83
	  send_vc (send TCP) for the NSS module libnss_dns.so.2 when calling
84
	  getaddrinfo with AF_UNSPEC family, or in some cases AF_INET6 family.  The
85
	  use of AF_UNSPEC (or AF_INET6 in some cases) triggers the low-level resolver
86
	  code to send out two parallel queries for A and AAAA.  A mismanagement of
87
	  the buffers used for those queries could result in the response of a query
88
	  writing beyond the alloca allocated buffer created by __res_nquery.</p>
89
	</blockquote>
90
      </body>
91
    </description>
92
    <references>
93
      <url>https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7547</url>
94
      <url>https://googleonlinesecurity.blogspot.com.ee/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html</url>
95
    </references>
96
    <dates>
97
      <discovery>2016-02-16</discovery>
98
      <entry>2016-02-17</entry>
99
    </dates>
100
  </vuln>
101
60
  <vuln vid="dd563930-d59a-11e5-8fa8-14dae9d210b8">
102
  <vuln vid="dd563930-d59a-11e5-8fa8-14dae9d210b8">
61
    <topic>adminer -- remote code execution</topic>
103
    <topic>adminer -- remote code execution</topic>
62
    <affects>
104
    <affects>

Return to bug 207272