CVE-2013-1914
Published: 29 April 2013
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
Notes
Author | Note |
---|---|
sbeattie | infinity is going to roll this into an SRU that he'll push through the ubuntu-security-proposed ppa |
Priority
Status
Package | Release | Status |
---|---|---|
eglibc Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Released
(2.11.1-0ubuntu7.13)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(2.15-0ubuntu10.5)
|
|
quantal |
Released
(2.15-0ubuntu20.2)
|
|
raring |
Released
(2.17-0ubuntu5.1)
|
|
saucy |
Not vulnerable
(2.17-91ubuntu1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://sourceware.org/git/?p=glibc.git;a=commit;h=1cef1b19089528db11f221e938f60b9b048945d7 upstream: https://sourceware.org/git/?p=glibc.git;a=commit;h=2169712d9c140d1b011470393c64258b2db3a4cd |
||
glibc Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Does not exist
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://sourceware.org/git/?p=glibc.git;a=commit;h=1cef1b19089528db11f221e938f60b9b048945d7 |