public inbox for glibc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug network/30842] New: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527)
@ 2023-09-12 15:16 fweimer at redhat dot com
  2023-09-12 15:25 ` [Bug network/30842] " fweimer at redhat dot com
                   ` (11 more replies)
  0 siblings, 12 replies; 13+ messages in thread
From: fweimer at redhat dot com @ 2023-09-12 15:16 UTC (permalink / raw)
  To: glibc-bugs

https://sourceware.org/bugzilla/show_bug.cgi?id=30842

            Bug ID: 30842
           Summary: Stack read overflow in getaddrinfo in no-aaaa mode
                    (CVE-2023-4527)
           Product: glibc
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: network
          Assignee: fweimer at redhat dot com
          Reporter: fweimer at redhat dot com
  Target Milestone: ---
             Flags: security+

If the system is configured in no-aaaa mode via /etc/resolv.conf, getaddrinfo
is called for the AF_UNSPEC address family, and a DNS response is received over
TCP that is larger than 2048 bytes, getaddrinfo may potentially disclose stack
contents via the returned address data, or crash. While name lookup normally
just fails incorrectly, crashes are not difficult to trigger, with valid DNS
responses that are propagated by DNS resolvers.

Introduced by:

commit f282cdbe7f436c75864e5640a409a10485e9abb2
Author: Florian Weimer <fweimer@redhat.com>
Date:   Fri Jun 24 18:16:41 2022 +0200

    resolv: Implement no-aaaa stub resolver option

    Reviewed-by: Carlos O'Donell <carlos@redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.

^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2023-09-26 22:54 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-09-12 15:16 [Bug network/30842] New: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) fweimer at redhat dot com
2023-09-12 15:25 ` [Bug network/30842] " fweimer at redhat dot com
2023-09-13  3:18 ` sam at gentoo dot org
2023-09-13 12:11 ` cvs-commit at gcc dot gnu.org
2023-09-13 12:36 ` cvs-commit at gcc dot gnu.org
2023-09-13 12:36 ` cvs-commit at gcc dot gnu.org
2023-09-13 12:57 ` cvs-commit at gcc dot gnu.org
2023-09-13 12:58 ` fweimer at redhat dot com
2023-09-26 22:52 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:53 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:53 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:54 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:54 ` cvs-commit at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).