ArchLinux: 201504-25: glibc: arbitrary code execution
Summary
A buffer overflow in gethostbyname_r() and related functions performing DNS requests has been fixed. If the NSS functions were called with a misaligned buffer, the buffer length change due to pointer alignment was not taken into account. This could result in application crashes or potentially arbitrary code execution using crafted but syntactically valid DNS responses.
Resolution
Upgrade to 2.21-3.
# pacman -Syu "glibc>=2.21-3"
The problem has been fixed upstream but a new version has yet to be
released.
References
https://access.redhat.com/security/cve/CVE-2015-1781 https://www.openwall.com/lists/oss-security/2015/04/21/4 https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=2959eda9272a033863c271aff62095abd01bd4e3;hp=7bf8fb104226407b75103b95525364c4667c869f
Workaround
None.