Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <56C32F61.1010306@redhat.com>
Date: Tue, 16 Feb 2016 15:17:05 +0100
From: Florian Weimer <fweimer@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2015-7547: stack-based buffer overflow in glibc's getaddrinfo
 function

Hi,

today, we are disclosing a vulnerability in the nss_dns backend for
getaddrinfo, related to handling dual A/AAAA queries:

The security impact of this issue was discovered roughly at the same
time by the Google Security Team and Red Hat.

Background information:

  https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html

https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

Thanks,
Florian

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.