Bug 1187109 (CVE-2013-7423)
Summary: | CVE-2013-7423 glibc: getaddrinfo() writes DNS queries to random file descriptors under high load | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | accounts+fedora, adrian.meier3, arjun.is, ashankar, bhubbard, carnil, codonell, fweimer, huzaifas, jakub, law, mfabian, mnewsome, pfrankli, sardella, security-response-team, siddhesh, slawomir, thomas.oulevey, toracat, vkaigoro |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-11-20 05:46:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1144019, 1194143, 1207995, 1207996, 1266110, 1339960 | ||
Bug Blocks: | 1187112, 1199526, 1210268, 1262918 |
Description
Vasyl Kaigorodov
2015-01-29 11:25:30 UTC
FYI, there's a rhel-6.7 bug for this already: https://bugzilla.redhat.com/show_bug.cgi?id=1144019 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:0863 https://rhn.redhat.com/errata/RHSA-2015-0863.html Statement: This issue did not affect the versions of glibc as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable code, which was introduced in later versions. Is there a plan to address the issue in RHEL-7? Any updates on whether this will be fixed in RHEL7? It's particularly easy to trigger on a docker host (we have 4 concurrent short-lived containers spinning up every few minutes). As soon as we have high load, DNS queries break until we restart the daemon. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2199 https://rhn.redhat.com/errata/RHSA-2015-2199.html This issue has been addressed in the following products: Red Hat Enterprise Linux 7.1 EUS - Server and Compute Node Only Red Hat Enterprise Linux 7.1 EUS - Server and Compute Node Only Via RHSA-2015:2589 https://rhn.redhat.com/errata/RHSA-2015-2589.html This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2016:1207 https://access.redhat.com/errata/RHSA-2016:1207 |