CVE-2015-7547

Publication date 16 February 2016

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.1 · High

Score breakdown

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Read the notes from the security team

Status

Package Ubuntu Release Status
eglibc 15.10 wily Not in release
15.04 vivid Not in release
14.04 LTS trusty
Fixed 2.19-0ubuntu6.7
12.04 LTS precise
Fixed 2.15-0ubuntu10.13
glibc 15.10 wily
Fixed 2.21-0ubuntu4.1
15.04 vivid Ignored end of life
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Notes


jdstrand

stable-phone-overlay will be updated in OTA 9.1 tyhicks alerted the Snappy team for an emergency update

Severity score breakdown

Parameter Value
Base score 8.1 · High
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H