CVE-2016-3075

Priority
Description
Stack-based buffer overflow in the nss_dns implementation of the
getnetbyname function in GNU C Library (aka glibc) before 2.24 allows
context-dependent attackers to cause a denial of service (stack consumption
and application crash) via a long name.
Ubuntu-Description
Florian Weimer discovered that the getnetbyname implementation in the
GNU C Library did not properly handle long names passed as arguments.
An attacker could use to cause a denial of service (stack exhaustion
leading to an application crash).
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):released (2.15-0ubuntu10.14)
Ubuntu 14.04 ESM (Trusty Tahr):released (2.19-0ubuntu6.8)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Source: glibc (LP Ubuntu Debian)
Upstream:released (2.22-6)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2.23-0ubuntu3)
Patches:
Upstream:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=317b199b4aff8cfa27f2302ab404d2bb5032b9a4
More Information

Updated: 2020-07-28 19:57:02 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)