Bug 2234712 (CVE-2023-4527) - CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode
Summary: CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode
Keywords:
Status: NEW
Alias: CVE-2023-4527
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2234713 2234714 2234715 2234716 2238600
Blocks: 2234719
TreeView+ depends on / blocked
 
Reported: 2023-08-25 08:25 UTC by Mauro Matteo Cascella
Modified: 2023-12-01 00:16 UTC (History)
44 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2023:5495 0 None None None 2023-10-09 01:01:23 UTC
Red Hat Product Errata RHBA-2023:5496 0 None None None 2023-10-09 01:03:09 UTC
Red Hat Product Errata RHBA-2023:5497 0 None None None 2023-10-09 01:11:11 UTC
Red Hat Product Errata RHBA-2023:5498 0 None None None 2023-10-09 01:05:33 UTC
Red Hat Product Errata RHBA-2023:5499 0 None None None 2023-10-09 01:07:25 UTC
Red Hat Product Errata RHBA-2023:5500 0 None None None 2023-10-09 01:09:36 UTC
Red Hat Product Errata RHBA-2023:5501 0 None None None 2023-10-09 01:14:53 UTC
Red Hat Product Errata RHBA-2023:5502 0 None None None 2023-10-09 01:20:37 UTC
Red Hat Product Errata RHBA-2023:5503 0 None None None 2023-10-09 01:11:21 UTC
Red Hat Product Errata RHBA-2023:5504 0 None None None 2023-10-09 01:12:08 UTC
Red Hat Product Errata RHBA-2023:5505 0 None None None 2023-10-09 01:12:27 UTC
Red Hat Product Errata RHBA-2023:5513 0 None None None 2023-10-09 01:27:57 UTC
Red Hat Product Errata RHBA-2023:5514 0 None None None 2023-10-09 01:25:57 UTC
Red Hat Product Errata RHBA-2023:5515 0 None None None 2023-10-09 01:29:33 UTC
Red Hat Product Errata RHBA-2023:5516 0 None None None 2023-10-09 01:32:01 UTC
Red Hat Product Errata RHBA-2023:5518 0 None None None 2023-10-09 09:43:23 UTC
Red Hat Product Errata RHBA-2023:5519 0 None None None 2023-10-09 09:43:19 UTC
Red Hat Product Errata RHBA-2023:5521 0 None None None 2023-10-09 10:03:45 UTC
Red Hat Product Errata RHBA-2023:5522 0 None None None 2023-10-09 09:53:54 UTC
Red Hat Product Errata RHBA-2023:5523 0 None None None 2023-10-09 09:44:52 UTC
Red Hat Product Errata RHBA-2023:5543 0 None None None 2023-10-09 15:55:13 UTC
Red Hat Product Errata RHBA-2023:5550 0 None None None 2023-10-10 09:47:58 UTC
Red Hat Product Errata RHBA-2023:5551 0 None None None 2023-10-10 09:53:42 UTC
Red Hat Product Errata RHBA-2023:5552 0 None None None 2023-10-10 09:54:05 UTC
Red Hat Product Errata RHBA-2023:5553 0 None None None 2023-10-10 10:08:33 UTC
Red Hat Product Errata RHBA-2023:5554 0 None None None 2023-10-10 09:53:59 UTC
Red Hat Product Errata RHBA-2023:5555 0 None None None 2023-10-10 09:54:15 UTC
Red Hat Product Errata RHBA-2023:5556 0 None None None 2023-10-10 09:53:56 UTC
Red Hat Product Errata RHBA-2023:5557 0 None None None 2023-10-10 09:49:11 UTC
Red Hat Product Errata RHBA-2023:5558 0 None None None 2023-10-10 10:15:08 UTC
Red Hat Product Errata RHBA-2023:5559 0 None None None 2023-10-10 09:57:01 UTC
Red Hat Product Errata RHBA-2023:5560 0 None None None 2023-10-10 09:59:05 UTC
Red Hat Product Errata RHBA-2023:5561 0 None None None 2023-10-10 10:00:29 UTC
Red Hat Product Errata RHBA-2023:5567 0 None None None 2023-10-10 10:08:03 UTC
Red Hat Product Errata RHBA-2023:5569 0 None None None 2023-10-10 10:08:09 UTC
Red Hat Product Errata RHBA-2023:5573 0 None None None 2023-10-10 10:04:52 UTC
Red Hat Product Errata RHBA-2023:5577 0 None None None 2023-10-10 10:08:48 UTC
Red Hat Product Errata RHBA-2023:5581 0 None None None 2023-10-10 10:29:19 UTC
Red Hat Product Errata RHBA-2023:5582 0 None None None 2023-10-10 13:42:23 UTC
Red Hat Product Errata RHBA-2023:5584 0 None None None 2023-10-10 13:42:50 UTC
Red Hat Product Errata RHBA-2023:5585 0 None None None 2023-10-10 13:49:57 UTC
Red Hat Product Errata RHBA-2023:5649 0 None None None 2023-10-10 20:16:58 UTC
Red Hat Product Errata RHBA-2023:5650 0 None None None 2023-10-10 20:20:35 UTC
Red Hat Product Errata RHBA-2023:5651 0 None None None 2023-10-10 20:20:54 UTC
Red Hat Product Errata RHBA-2023:5658 0 None None None 2023-10-11 07:42:59 UTC
Red Hat Product Errata RHBA-2023:5659 0 None None None 2023-10-11 08:24:45 UTC
Red Hat Product Errata RHBA-2023:5663 0 None None None 2023-10-11 13:30:57 UTC
Red Hat Product Errata RHBA-2023:5664 0 None None None 2023-10-11 13:44:07 UTC
Red Hat Product Errata RHBA-2023:5665 0 None None None 2023-10-11 13:42:57 UTC
Red Hat Product Errata RHBA-2023:5670 0 None None None 2023-10-12 01:30:31 UTC
Red Hat Product Errata RHBA-2023:5685 0 None None None 2023-10-12 13:21:10 UTC
Red Hat Product Errata RHBA-2023:5702 0 None None None 2023-10-16 01:21:37 UTC
Red Hat Product Errata RHBA-2023:5703 0 None None None 2023-10-16 07:18:23 UTC
Red Hat Product Errata RHBA-2023:5722 0 None None None 2023-10-16 12:20:05 UTC
Red Hat Product Errata RHBA-2023:5723 0 None None None 2023-10-16 12:31:03 UTC
Red Hat Product Errata RHBA-2023:5748 0 None None None 2023-10-16 15:13:41 UTC
Red Hat Product Errata RHBA-2023:5755 0 None None None 2023-10-16 15:10:35 UTC
Red Hat Product Errata RHBA-2023:5757 0 None None None 2023-10-16 15:34:31 UTC
Red Hat Product Errata RHBA-2023:5760 0 None None None 2023-10-17 07:42:49 UTC
Red Hat Product Errata RHBA-2023:5798 0 None None None 2023-10-17 16:08:51 UTC
Red Hat Product Errata RHBA-2023:5910 0 None None None 2023-10-19 09:04:26 UTC
Red Hat Product Errata RHBA-2023:6043 0 None None None 2023-10-23 18:48:06 UTC
Red Hat Product Errata RHBA-2023:6184 0 None None None 2023-10-30 14:09:35 UTC
Red Hat Product Errata RHSA-2023:5453 0 None None None 2023-10-05 13:54:30 UTC
Red Hat Product Errata RHSA-2023:5455 0 None None None 2023-10-05 14:01:21 UTC
Sourceware 30842 0 P2 ASSIGNED Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) 2023-09-12 16:48:37 UTC

Description Mauro Matteo Cascella 2023-08-25 08:25:31 UTC
If the system is configured in no-aaaa mode via /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC address family, and a DNS response is received over TCP that is larger than 2048 bytes, getaddrinfo may potentially disclose stack contents via the returned address data, or crash. While name lookup normally just fails incorrectly, crashes are not difficult to trigger, with valid DNS responses that are propagated by DNS resolvers.

Reference:
https://sourceware.org/bugzilla/show_bug.cgi?id=30842

Comment 5 Guilherme de Almeida Suckevicz 2023-09-12 17:26:15 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 2238600]

Comment 6 errata-xmlrpc 2023-10-05 13:54:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5453

Comment 7 errata-xmlrpc 2023-10-05 14:01:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:5455


Note You need to log in before you can comment on or make changes to this bug.