Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
| Software | From | Fixed in |
|---|---|---|
| suse / linux_enterprise_server | 11-sp4 | 11-sp4.x |
| suse / linux_enterprise_desktop | 11-sp3 | 11-sp3.x |
| suse / linux_enterprise_debuginfo | 11-sp3 | 11-sp3.x |
| suse / linux_enterprise_server | 11-sp3 | 11-sp3.x |
| suse / linux_enterprise_desktop | 11-sp4 | 11-sp4.x |
| suse / linux_enterprise_debuginfo | 11-sp4 | 11-sp4.x |
| gnu / glibc | - | 2.21.x |
| debian / debian_linux | 7.0 | 7.0.x |
| canonical / ubuntu_linux | 12.04 | 12.04.x |
| canonical / ubuntu_linux | 14.04 | 14.04.x |
| canonical / ubuntu_linux | 15.04 | 15.04.x |