漏洞信息详情
GNU C Library 输入验证错误漏洞
- CNNVD编号:CNNVD-201606-228
- 危害等级: 高危
- CVE编号: CVE-2016-3706
- 漏洞类型: 输入验证错误
- 发布时间: 2016-06-12
- 威胁类型: 远程
- 更新时间: 2020-10-30
- 厂 商: gnu
- 漏洞来源: Michael Petlan of ...
漏洞简介
GNU C Library(glibc,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。
GNU C Library的sysdeps/posix/getaddrinfo.c文件中的‘getaddrinfo’函数存在输入验证错误漏洞。远程攻击者可利用该漏洞造成拒绝服务(崩溃)。(注:该漏洞源于CNNVD-201310-634补丁的不完全修复)
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页:
http://www.gnu.org/software/libc/
参考网址
来源:CONFIRM
链接:https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
来源:SUSE
链接:http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.HTML
来源:source.codeaurora.org
链接:https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=8c4901802968b8c8356860ee689b1ef9cd2cbfe4
来源:source.codeaurora.org
链接:https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=11e7de77bd5ab0a7706a013598f845ad0c4a8b4c
来源:source.codeaurora.org
链接:https://source.codeaurora.org/quic/la/abl/tianocore/edk2/commit/?id=5c710156bb55b0a085da7c4142b124f3cd986d25
来源:source.codeaurora.org
链接:https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=b15f0ff7351eb6b6a8f6694b4cd5ad27145bd439
来源:source.codeaurora.org
链接:https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=613f91ebcd0838c2c2bec3657e36dd57fcc6a7ea
来源:source.codeaurora.org
链接:https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=aab2cc06db7cb6c7589bef71e65b5acfa58adc33
来源:source.codeaurora.org
链接:https://source.codeaurora.org/quic/le/oe/recipes/commit/?h=LNX.LE.5.3&id=6cfcc1c582a565f5360f7a3977f4a8f42d5245cd
来源:source.CMS.zone.ci/e/tags/htag.php?tag=Android target=_blank class=infotextkey>Android.com
链接:https://source.CMS.zone.ci/e/tags/htag.php?tag=Android target=_blank class=infotextkey>Android.com/security/bulletin/2017-12-01
来源:code.Google.com
链接:http://code.Google.com/CMS.zone.ci/e/tags/htag.php?tag=Android target=_blank class=infotextkey>Android/
来源:BID
链接:https://www.securityfocus.com/bid/102073
来源:BID
链接:https://www.securityfocus.com/bid/88440
来源:CONFIRM
链接:https://sourceware.org/bugzilla/show_bug.cgi?id=20010
来源:SUSE
链接:http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.HTML
来源:CONFIRM
链接:http://www-01.ibm.com/support/docview.wss?uid=swg21995039
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/102073
受影响实体
- Gnu Glibc
补丁
- GNU C Library 基于栈的缓冲区溢出漏洞的修复措施
评论