ALAS-2017-792


Amazon Linux AMI Security Advisory: ALAS-2017-792
Advisory Release Date: 2017-02-06 18:00 Pacific
Severity: Low
References: CVE-2016-3075 

Issue Overview:

A stack overflow vulnerability was found in _nss_dns_getnetbyname_r. On systems with nsswitch configured to include "networks: dns" with a privileged or network-facing service that would attempt to resolve user-provided network names, an attacker could provide an excessively long network name, resulting in stack corruption and code execution.


Affected Packages:

glibc


Issue Correction:
Run yum update glibc to update your system.

New Packages:
i686:
    glibc-devel-2.17-157.169.amzn1.i686
    glibc-headers-2.17-157.169.amzn1.i686
    glibc-2.17-157.169.amzn1.i686
    glibc-utils-2.17-157.169.amzn1.i686
    glibc-common-2.17-157.169.amzn1.i686
    glibc-debuginfo-common-2.17-157.169.amzn1.i686
    nscd-2.17-157.169.amzn1.i686
    glibc-static-2.17-157.169.amzn1.i686
    glibc-debuginfo-2.17-157.169.amzn1.i686

src:
    glibc-2.17-157.169.amzn1.src

x86_64:
    glibc-debuginfo-2.17-157.169.amzn1.x86_64
    glibc-utils-2.17-157.169.amzn1.x86_64
    glibc-2.17-157.169.amzn1.x86_64
    nscd-2.17-157.169.amzn1.x86_64
    glibc-devel-2.17-157.169.amzn1.x86_64
    glibc-debuginfo-common-2.17-157.169.amzn1.x86_64
    glibc-static-2.17-157.169.amzn1.x86_64
    glibc-headers-2.17-157.169.amzn1.x86_64
    glibc-common-2.17-157.169.amzn1.x86_64