Wind River Linux 4.3 Security Alert for glibc getaddrinfo() stack-based buffer overflow -- CVE-2015-7547
As described at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
When the thisanssizp pointer variable on line 1257 is updated, thisanssizp = anssizp2, i.e assigned a new address, this change causes the thisanssizp pointer variable used in the recvfrom function on line 1282 to use the wrong size if a new buffer is created after the thisanssizp address has been changed at line 1257.
The size of the buffer used will be what was stored at the address assigned at line 1257, and not the size of the newly created buffer.
The program will crash if the calculated size of the buffer used is 0. The recvfrom function will
not crash, but any further accesses to the buffer where the bytes read was 0 from the recvfrom function will crash the program.
To our knowledge, glibc 2.11 to 2.22 are affected.
To verify the patch, there's a solution posted on github.
You would need to make -C build python and install python module RPMs to target to run the python script which works as a malicious DNS server in the test.
For any questions, please contact Wind River Support at +1-800-872-4977 or your local Wind River representative
Request to upgrade WRL4.3 RCPL 32