public inbox for glibc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug network/30843] New: potential use-after-free in getcanonname (CVE-2023-4806)
@ 2023-09-12 15:32 siddhesh at sourceware dot org
  2023-09-12 15:32 ` [Bug network/30843] " siddhesh at sourceware dot org
                   ` (21 more replies)
  0 siblings, 22 replies; 23+ messages in thread
From: siddhesh at sourceware dot org @ 2023-09-12 15:32 UTC (permalink / raw)
  To: glibc-bugs

https://sourceware.org/bugzilla/show_bug.cgi?id=30843

            Bug ID: 30843
           Summary: potential use-after-free in getcanonname
                    (CVE-2023-4806)
           Product: glibc
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: network
          Assignee: siddhesh at sourceware dot org
          Reporter: siddhesh at sourceware dot org
  Target Milestone: ---
             Flags: security+

In an extremely rare situation, the getaddrinfo function in glibc may access
memory that has already been freed, resulting in an application crash.

This issue is only exploitable when a NSS module implements only the
_nss_*_gethostbyname2_r hook without implementing the _nss_*_gethostbyname3_r
hook. There are no known modules that are implemented in this way.

In addition to that condition, the resolved name should return a large number
of IPv6 as well as IPv4 and the call to the getaddrinfo function should have
AF_INET6 with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

^ permalink raw reply	[flat|nested] 23+ messages in thread

end of thread, other threads:[~2023-12-11 16:37 UTC | newest]

Thread overview: 23+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-09-12 15:32 [Bug network/30843] New: potential use-after-free in getcanonname (CVE-2023-4806) siddhesh at sourceware dot org
2023-09-12 15:32 ` [Bug network/30843] " siddhesh at sourceware dot org
2023-09-13  3:18 ` sam at gentoo dot org
2023-09-14  6:45 ` xry111 at xry111 dot site
2023-09-14  9:56 ` siddhesh at sourceware dot org
2023-09-14 10:02 ` xry111 at xry111 dot site
2023-09-15 18:38 ` cvs-commit at gcc dot gnu.org
2023-09-15 19:19 ` cvs-commit at gcc dot gnu.org
2023-09-15 20:53 ` cvs-commit at gcc dot gnu.org
2023-09-15 22:25 ` cvs-commit at gcc dot gnu.org
2023-09-15 23:48 ` cvs-commit at gcc dot gnu.org
2023-09-16  0:50 ` cvs-commit at gcc dot gnu.org
2023-09-16  0:50 ` siddhesh at sourceware dot org
2023-09-25  0:40 ` romain.geissler at amadeus dot com
2023-09-25  5:55 ` fweimer at redhat dot com
2023-09-26 11:40 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:52 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:53 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:54 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:54 ` cvs-commit at gcc dot gnu.org
2023-09-26 22:54 ` cvs-commit at gcc dot gnu.org
2023-12-11 16:29 ` m.novosyolov at rosalinux dot ru
2023-12-11 16:37 ` siddhesh at sourceware dot org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).