From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id F36383849AFA for ; Thu, 2 May 2024 20:23:54 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org F36383849AFA Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org F36383849AFA Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1714681440; cv=none; b=wPYMql+r3mqYyaYrix0BEwwk4KXwpe3kKCJV5xkRdpH8PAXE9dA4UCzBBKVRUZa+Yeuja7b6GY+bH+/+4MHwGJpbLiQ5We1KXd/wSSS8/uy9ZMt8jmg0WwB1OfFqL+RE+kk1pJKPdGN2Izi8b4dEC3AY0mudAPHvv5CMVcAXl8U= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1714681440; c=relaxed/simple; bh=t/bUIUJG+rvFOUfRmZXuOZUtdWornh8lUva7R2xFxj4=; h=DKIM-Signature:MIME-Version:From:Date:Message-ID:Subject:To; b=RLkcK+M+Q4z0G8U/5xOzuxjUbHlIFIk2FZgAGKza5mJEte9WtRXCvSYKO+aWRwhlMiO6TP3cpwxnFIqtGs0wlZye0kFsUIwZTo/8Atwcq7ILFtKqCCJXqE1wPQfTvotQLLVtBpElVUGCBC0OLCeFQxSoSU1INJwf7yqTbdd8+a0= ARC-Authentication-Results: i=1; server2.sourceware.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1714681434; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=OEmWAGEFP2NO5GEV86BoYjBdn6KL0bKBv4fdq/ix4HM=; b=UfKEHyAqC6NFxC1KQitYblzyKqBBjwPhBs+L7pdmBeneC4u4tVRISklZKLVKJpUc6fIsPG S8htKiJ9oBgyKf8cBgVdxiQQNmRgj+3J1huH8ARELgVEa7LdT4Z99LrDyZlRlyTRbaSCTM 4kKUfAOZ2MaG1SbFJMMvH8dSDJPBuik= Received: from mail-ed1-f72.google.com (mail-ed1-f72.google.com [209.85.208.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-438-Uygorb-1O7GmJ61GUCZIAg-1; Thu, 02 May 2024 16:23:52 -0400 X-MC-Unique: Uygorb-1O7GmJ61GUCZIAg-1 Received: by mail-ed1-f72.google.com with SMTP id 4fb4d7f45d1cf-572b3091d68so877465a12.2 for ; Thu, 02 May 2024 13:23:52 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714681431; x=1715286231; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=OEmWAGEFP2NO5GEV86BoYjBdn6KL0bKBv4fdq/ix4HM=; b=eMCnxgpx5rAAAMba9LPc2NetHiM0Axkp6jGQqFxa2yo5pNj8f3b4CdH/t5K6UqxDIe AAgSyDryovLxC8fEZBPYaEf3kUtek/h9O6wwjll+a1bPKH48uV5PlI7oEYAwib9cKeK3 nONaL+NMC7cs2HFKFaHXkNU873Fc9GUUkC6QJzjL6AYygRHpriaPOQCAFS6nZb4hkJUJ TK54/0aldvWh+LDXGIEkc+QI6ZoXJ2vvo+ICeg60affgOuGj9g8XtYPhAZmQkJbwAPWw IVO1fPDGbWk3vEqgtsCPDMnsb/Gr9EYHatIcAWIwXSdWGwa52IkI0gSwL5SCPi/aI2cT gzZA== X-Gm-Message-State: AOJu0YxVNaR+MwDDBGX38KEc9hJQBbhGQeq+zCmSzXJChld/98vIViNG lD73uh10qeGb1A3LVO3r5BeP73E85uimGpBddzXdusT5o2khfrgwbVwBnn9W/rZ+Bmp3jjiTh5H T6Ku0uzXsFOv9YRVKoIDiIvQg6pFv2IzWGuWT/mfdixpd+R7ujYplsPvPNUATdqiEJPJ1iygkPU EIMR3CYQtF0rqzGiNKXBo8lAUU1X6sHR4S X-Received: by 2002:a50:bb45:0:b0:572:8b30:bef7 with SMTP id y63-20020a50bb45000000b005728b30bef7mr285663ede.2.1714681431318; Thu, 02 May 2024 13:23:51 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGFli8XXaHmZWM+jrBCfNDdqEi2zZN64I3eBk0HKM7b++NHP7rHmMn/ufw25eBlB+NoIEFpS1Y3e5cmYiX67Dk= X-Received: by 2002:a50:bb45:0:b0:572:8b30:bef7 with SMTP id y63-20020a50bb45000000b005728b30bef7mr285655ede.2.1714681430962; Thu, 02 May 2024 13:23:50 -0700 (PDT) MIME-Version: 1.0 References: <20240502201423.3413078-1-carlos@redhat.com> In-Reply-To: <20240502201423.3413078-1-carlos@redhat.com> From: Joe Simmons-Talbott Date: Thu, 2 May 2024 16:23:34 -0400 Message-ID: Subject: Re: [PATCH v2 1/2] Document CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 To: "Carlos O'Donell" Cc: libc-alpha@sourceware.org, Adhemerval Zanella , Siddhesh Poyarekar X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-12.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,KAM_LOTSOFHASH,KAM_NUMSUBJECT,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On Thu, May 2, 2024 at 4:15=E2=80=AFPM Carlos O'Donell = wrote: > A few typos below. Thanks, Joe > This commit adds advisory data for the above CVE(s). > --- > advisories/GLIBC-SA-2024-0005 | 22 ++++++++++++++++++++++ > advisories/GLIBC-SA-2024-0006 | 32 ++++++++++++++++++++++++++++++++ > advisories/GLIBC-SA-2024-0007 | 28 ++++++++++++++++++++++++++++ > advisories/GLIBC-SA-2024-0008 | 26 ++++++++++++++++++++++++++ > 4 files changed, 108 insertions(+) > create mode 100644 advisories/GLIBC-SA-2024-0005 > create mode 100644 advisories/GLIBC-SA-2024-0006 > create mode 100644 advisories/GLIBC-SA-2024-0007 > create mode 100644 advisories/GLIBC-SA-2024-0008 > > diff --git a/advisories/GLIBC-SA-2024-0005 b/advisories/GLIBC-SA-2024-000= 5 > new file mode 100644 > index 0000000000..9dc3ff8cf9 > --- /dev/null > +++ b/advisories/GLIBC-SA-2024-0005 > @@ -0,0 +1,22 @@ > +nscd: Stack-based buffer overflow in netgroup cache > + > +If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted > +by client requests then a subsequent client request for netgroup data > +may result in a stack-based buffer overflow. This flaw was introduced > +in glibc 2.15 when the cache was added to nscd. > + > +This vulnerability is only present the nscd binary. in the > + > +CVE-Id: CVE-2024-33599 > +Public-Date: 2024-04-23 > +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) > +Fix-Commit: 69c58d5ef9f584ea198bd00f7964d364d0e6b921 (2.31-155) > +Fix-Commit: a77064893bfe8a701770e2f53a4d33805bc47a5a (2.32-141) > +Fix-Commit: 5c75001a96abcd50cbdb74df24c3f013188d076e (2.33-264) > +Fix-Commit: 52f73e5c4e29b14e79167272297977f360ae1e97 (2.34-460) > +Fix-Commit: 7a95873543ce225376faf13bb71c43dea6d24f86 (2.35-316) > +Fix-Commit: caa3151ca460bdd9330adeedd68c3112d97bffe4 (2.36-165) > +Fix-Commit: f75c298e747b2b8b41b1c2f551c011a52c41bfd1 (2.37-91) > +Fix-Commit: 5968aebb86164034b8f8421b4abab2f837a5bdaf (2.38-72) > +Fix-Commit: 1263d583d2e28afb8be53f8d6922f0842036f35d (2.39-35) > +Fix-Commit: 87801a8fd06db1d654eea3e4f7626ff476a9bdaa (2.40) > diff --git a/advisories/GLIBC-SA-2024-0006 b/advisories/GLIBC-SA-2024-000= 6 > new file mode 100644 > index 0000000000..2f42ab876d > --- /dev/null > +++ b/advisories/GLIBC-SA-2024-0006 > @@ -0,0 +1,32 @@ > +nscd: Avoid null pointer crashes after notfound response > + > +If the Name Service Cache Daemon's (nscd) cache fails to add a not-found > +netgroup response to the cache, the client request can result in a null > +pointer dereference. This flaw was introduced in glibc 2.15 when the > +cache was added to nscd. > + > +This vulnerability is only present in the nscd binary. > + > +CVE-Id: CVE-2024-33600 > +Public-Date: 2024-04-24 > +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) > +Fix-Commit: b048a482f088e53144d26a61c390bed0210f49f2 (2.40) > +Fix-Commit: 7835b00dbce53c3c87bbbb1754a95fb5e58187aa (2.40) > +Fix-Commit: c99f886de54446cd4447db6b44be93dabbdc2f8b (2.39-37) > +Fix-Commit: 5a508e0b508c8ad53bd0d2fb48fd71b242626341 (2.39-36) > +Fix-Commit: 2ae9446c1b7a3064743b4a51c0bbae668ee43e4c (2.38-74) > +Fix-Commit: 541ea5172aa658c4bd5c6c6d6fd13903c3d5bb0a (2.38-73) > +Fix-Commit: a8070b31043c7585c36ba68a74298c4f7af075c3 (2.37-93) > +Fix-Commit: 5eea50c4402e39588de98aa1d4469a79774703d4 (2.37-92) > +Fix-Commit: f205b3af56740e3b014915b1bd3b162afe3407ef (2.36-167) > +Fix-Commit: c34f470a615b136170abd16142da5dd0c024f7d1 (2.36-166) > +Fix-Commit: bafadc589fbe21ae330e8c2af74db9da44a17660 (2.35-318) > +Fix-Commit: 4370bef52b0f3f3652c6aa13d7a9bb3ac079746d (2.35-317) > +Fix-Commit: 1f94122289a9bf7dba573f5d60327aaa2b85cf2e (2.34-462) > +Fix-Commit: 966d6ac9e40222b84bb21674cc4f83c8d72a5a26 (2.34-461) > +Fix-Commit: e3eef1b8fbdd3a7917af466ca9c4b7477251ca79 (2.33-266) > +Fix-Commit: f20a8d696b13c6261b52a6434899121f8b19d5a7 (2.33-265) > +Fix-Commit: be602180146de37582a3da3a0caa4b719645de9c (2.32-143) > +Fix-Commit: 394eae338199078b7961b051c191539870742d7b (2.32-142) > +Fix-Commit: 8d7949183760170c61e55def723c1d8050187874 (2.31-157) > +Fix-Commit: 304ce5fe466c4762b21b36c26926a4657b59b53e (2.31-156) > diff --git a/advisories/GLIBC-SA-2024-0007 b/advisories/GLIBC-SA-2024-000= 7 > new file mode 100644 > index 0000000000..d4f5d4298c > --- /dev/null > +++ b/advisories/GLIBC-SA-2024-0007 > @@ -0,0 +1,28 @@ > +nscd: netgroup cache may terminate daemon on memory allocation failure > + > +The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or > +xrealloc and these functions may terminate the process due to a memory > +allocation failure resulting in a denial of service to the clients. The > +flaw was introduced in glibc 2.15 when the cache was added to nscd. > + > +This vulnerability is only present the nscd binary. in the > + > +Subsequent refactoring of the netgroup cache only added more uses of > +xmalloc and xrealloc. Uses of xmalloc and xrealloc in other parts of > +nscd only occur during startup of the daemon and so are not affected by > +client requests that could trigger an out of memory followed by > +termination. > + > +CVE-Id: CVE-2024-33601 > +Public-Date: 2024-04-24 > +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) > +Fix-Commit: c04a21e050d64a1193a6daab872bca2528bda44b (2.40) > +Fix-Commit: a9a8d3eebb145779a18d90e3966009a1daa63cd8 (2.39-38) > +Fix-Commit: 71af8ca864345d39b746d5cee84b94b430fad5db (2.38-75) > +Fix-Commit: 6e106dc214d6a033a4e945d1c6cf58061f1c5f1f (2.37-94) > +Fix-Commit: b6742463694b1dfdd5120b91ee21cf05d15ec2e2 (2.36-168) > +Fix-Commit: 7a5864cac60e06000394128a5a2817b03542f5a3 (2.35-319) > +Fix-Commit: 86f1d5f4129c373ac6fb6df5bcf38273838843cb (2.34-463) > +Fix-Commit: 4d27d4b9a188786fc6a56745506cec2acfc51f83 (2.33-267) > +Fix-Commit: 3ed195a8ec89da281e3c4bf887a13d281b72d8f4 (2.32-144) > +Fix-Commit: bbf5a58ccb55679217f94de706164d15372fbbc0 (2.31-158) > diff --git a/advisories/GLIBC-SA-2024-0008 b/advisories/GLIBC-SA-2024-000= 8 > new file mode 100644 > index 0000000000..60c0187b76 > --- /dev/null > +++ b/advisories/GLIBC-SA-2024-0008 > @@ -0,0 +1,26 @@ > +nscd: netgroup cache assumes NSS callback uses in-buffer strings > + > +The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory > +when the NSS callback does not store all strings in the provided buffer. > +The flaw was introduced in glibc 2.15 when the cache was added to nscd. > + > +This vulnerability is only present the nscd binary. in the > + > +There is no guarantee from the NSS callback API that the returned > +strings are all within the buffer. However, the netgroup cache code > +assumes that the NSS callback uses in-buffer strings and if it doesn't > +the buffer resizing logic could lead to potential memory corruption. > + > +CVE-Id: CVE-2024-33602 > +Public-Date: 2024-04-24 > +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) > +Fix-Commit: c04a21e050d64a1193a6daab872bca2528bda44b (2.40) > +Fix-Commit: a9a8d3eebb145779a18d90e3966009a1daa63cd8 (2.39-38) > +Fix-Commit: 71af8ca864345d39b746d5cee84b94b430fad5db (2.38-75) > +Fix-Commit: 6e106dc214d6a033a4e945d1c6cf58061f1c5f1f (2.37-94) > +Fix-Commit: b6742463694b1dfdd5120b91ee21cf05d15ec2e2 (2.36-168) > +Fix-Commit: 7a5864cac60e06000394128a5a2817b03542f5a3 (2.35-319) > +Fix-Commit: 86f1d5f4129c373ac6fb6df5bcf38273838843cb (2.34-463) > +Fix-Commit: 4d27d4b9a188786fc6a56745506cec2acfc51f83 (2.33-267) > +Fix-Commit: 3ed195a8ec89da281e3c4bf887a13d281b72d8f4 (2.32-144) > +Fix-Commit: bbf5a58ccb55679217f94de706164d15372fbbc0 (2.31-158) > -- > 2.44.0 > --=20 Joe Simmons-Talbott