Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "eglibc-source", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc-bin", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc-dev-bin", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-amd64", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-armel", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-dev", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-dev-amd64", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-dev-armel", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-dev-i386", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-dev-ppc64", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-dev-x32", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-i386", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-pic", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-ppc64", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-prof", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "libc6-x32", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "multiarch-support", "binary_version": "2.19-0ubuntu6.8" }, { "binary_name": "nscd", "binary_version": "2.19-0ubuntu6.8" } ] }