
oss-sec mailing list archives
Re: CVE Request uclibc-ng dns resolver issues
From: cve-assign () mitre org
Date: Fri, 5 Feb 2016 12:37:00 -0500 (EST)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
The first is a denial of service while parsing compressed items. An attacker can make the application end up in an infinit loop. Fixed by: http://repo.or.cz/uclibc-ng.git/commit/16719c1a7078421928e6d31dd1dec574825ef515
Use CVE-2016-2224.
The other problem is that a crafted packet will make the parser terminate early. The buffer is never initialized and is later passed to strdup(). Fixed by: http://repo.or.cz/uclibc-ng.git/commit/bb01edff0377f2585ce304ecbadcb7b6cde372ac
Use CVE-2016-2225. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJWtNzoAAoJEL54rhJi8gl5S9EP/jQ9DVZd0cXk8H0+ZJbgJi78 3+rQH00Sh5sTlPIPiq5zlE+dTZEIvHHq3eaHqIa6clTiZ8aWMSRy7PzcODWkXRIi E1/Kj+IdBg6puYeWWnkJZY7FeeU3PYKo4+fOKwB4O5+DYH9Lo0IN1bsKisiWmIpo KXhsK117DPrcMfE5HlrjLIQ1ZHd+c0O9LIaVFbjW75gLCEN553tWls6KU3NFzFUz Nh+zASekPfnt8XsTkNA0DT88ZFutiqvznNuy4IHMf65Zz3lWiCqX9gfxprjrR1FV aHwp95qN6DOIiw7S9aE/E+UCYZkGF/HVaIkmAZkFAeNWGwICjlBnWhGviIaEPaJC Jphp2YGbbY/6wxA2d4pfz7yXd5rwpvSElizHrhUdmlH9c1DvW0kaZVCybvsfU2HN +V8S2U/e5DZPLIcQXHV757WAjeMRduHMX2yP7qYO0EwEbor1IaD5LoQ3cIU//eSB AWC0rIIl6kaUeSktuwATRApk8OJ+11PX83cTy+XGYHLeP6jgaTgI6l9pRR9BJnIj qF4YSs/1kbikQXS6aLMGAeiIvVuxgbp64TRACw6rZNSLrXnbQ7DbcBxjxOAW9CNO 2Ht/mY5o7hWTLJkyEbb7XHbpj6lx1gSWic+BRn38tmYsHvvLPYdU2hl3cfbtuI0O DQDtql0LtIp/P9AKIsCY =LXU8 -----END PGP SIGNATURE-----
Current thread:
- CVE Request uclibc-ng dns resolver issues Daniel Fahlgren (Feb 05)
- Re: CVE Request uclibc-ng dns resolver issues cve-assign (Feb 05)