Bug 2234712 (CVE-2023-4527) - CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode
Summary: CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2023-4527
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2234713 2234714 2234715 2234716 2238600
Blocks: 2234719
TreeView+ depends on / blocked
 
Reported: 2023-08-25 08:25 UTC by Mauro Matteo Cascella
Modified: 2024-10-10 08:13 UTC (History)
44 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2024-10-10 08:13:15 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2023:5495 0 None None None 2023-10-09 01:01:23 UTC
Red Hat Product Errata RHBA-2023:5496 0 None None None 2023-10-09 01:03:09 UTC
Red Hat Product Errata RHBA-2023:5497 0 None None None 2023-10-09 01:11:11 UTC
Red Hat Product Errata RHBA-2023:5498 0 None None None 2023-10-09 01:05:33 UTC
Red Hat Product Errata RHBA-2023:5499 0 None None None 2023-10-09 01:07:25 UTC
Red Hat Product Errata RHBA-2023:5500 0 None None None 2023-10-09 01:09:36 UTC
Red Hat Product Errata RHBA-2023:5501 0 None None None 2023-10-09 01:14:53 UTC
Red Hat Product Errata RHBA-2023:5502 0 None None None 2023-10-09 01:20:37 UTC
Red Hat Product Errata RHBA-2023:5503 0 None None None 2023-10-09 01:11:21 UTC
Red Hat Product Errata RHBA-2023:5504 0 None None None 2023-10-09 01:12:08 UTC
Red Hat Product Errata RHBA-2023:5505 0 None None None 2023-10-09 01:12:27 UTC
Red Hat Product Errata RHBA-2023:5513 0 None None None 2023-10-09 01:27:57 UTC
Red Hat Product Errata RHBA-2023:5514 0 None None None 2023-10-09 01:25:57 UTC
Red Hat Product Errata RHBA-2023:5515 0 None None None 2023-10-09 01:29:33 UTC
Red Hat Product Errata RHBA-2023:5516 0 None None None 2023-10-09 01:32:01 UTC
Red Hat Product Errata RHBA-2023:5518 0 None None None 2023-10-09 09:43:23 UTC
Red Hat Product Errata RHBA-2023:5519 0 None None None 2023-10-09 09:43:19 UTC
Red Hat Product Errata RHBA-2023:5521 0 None None None 2023-10-09 10:03:45 UTC
Red Hat Product Errata RHBA-2023:5522 0 None None None 2023-10-09 09:53:54 UTC
Red Hat Product Errata RHBA-2023:5523 0 None None None 2023-10-09 09:44:52 UTC
Red Hat Product Errata RHBA-2023:5543 0 None None None 2023-10-09 15:55:13 UTC
Red Hat Product Errata RHBA-2023:5550 0 None None None 2023-10-10 09:47:58 UTC
Red Hat Product Errata RHBA-2023:5551 0 None None None 2023-10-10 09:53:42 UTC
Red Hat Product Errata RHBA-2023:5552 0 None None None 2023-10-10 09:54:05 UTC
Red Hat Product Errata RHBA-2023:5553 0 None None None 2023-10-10 10:08:33 UTC
Red Hat Product Errata RHBA-2023:5554 0 None None None 2023-10-10 09:53:59 UTC
Red Hat Product Errata RHBA-2023:5555 0 None None None 2023-10-10 09:54:15 UTC
Red Hat Product Errata RHBA-2023:5556 0 None None None 2023-10-10 09:53:56 UTC
Red Hat Product Errata RHBA-2023:5557 0 None None None 2023-10-10 09:49:11 UTC
Red Hat Product Errata RHBA-2023:5558 0 None None None 2023-10-10 10:15:08 UTC
Red Hat Product Errata RHBA-2023:5559 0 None None None 2023-10-10 09:57:01 UTC
Red Hat Product Errata RHBA-2023:5560 0 None None None 2023-10-10 09:59:05 UTC
Red Hat Product Errata RHBA-2023:5561 0 None None None 2023-10-10 10:00:29 UTC
Red Hat Product Errata RHBA-2023:5567 0 None None None 2023-10-10 10:08:03 UTC
Red Hat Product Errata RHBA-2023:5569 0 None None None 2023-10-10 10:08:09 UTC
Red Hat Product Errata RHBA-2023:5573 0 None None None 2023-10-10 10:04:52 UTC
Red Hat Product Errata RHBA-2023:5577 0 None None None 2023-10-10 10:08:48 UTC
Red Hat Product Errata RHBA-2023:5581 0 None None None 2023-10-10 10:29:19 UTC
Red Hat Product Errata RHBA-2023:5582 0 None None None 2023-10-10 13:42:23 UTC
Red Hat Product Errata RHBA-2023:5584 0 None None None 2023-10-10 13:42:50 UTC
Red Hat Product Errata RHBA-2023:5585 0 None None None 2023-10-10 13:49:57 UTC
Red Hat Product Errata RHBA-2023:5649 0 None None None 2023-10-10 20:16:58 UTC
Red Hat Product Errata RHBA-2023:5650 0 None None None 2023-10-10 20:20:35 UTC
Red Hat Product Errata RHBA-2023:5651 0 None None None 2023-10-10 20:20:54 UTC
Red Hat Product Errata RHBA-2023:5658 0 None None None 2023-10-11 07:42:59 UTC
Red Hat Product Errata RHBA-2023:5659 0 None None None 2023-10-11 08:24:45 UTC
Red Hat Product Errata RHBA-2023:5663 0 None None None 2023-10-11 13:30:57 UTC
Red Hat Product Errata RHBA-2023:5664 0 None None None 2023-10-11 13:44:07 UTC
Red Hat Product Errata RHBA-2023:5665 0 None None None 2023-10-11 13:42:57 UTC
Red Hat Product Errata RHBA-2023:5670 0 None None None 2023-10-12 01:30:31 UTC
Red Hat Product Errata RHBA-2023:5685 0 None None None 2023-10-12 13:21:10 UTC
Red Hat Product Errata RHBA-2023:5702 0 None None None 2023-10-16 01:21:37 UTC
Red Hat Product Errata RHBA-2023:5703 0 None None None 2023-10-16 07:18:23 UTC
Red Hat Product Errata RHBA-2023:5722 0 None None None 2023-10-16 12:20:05 UTC
Red Hat Product Errata RHBA-2023:5723 0 None None None 2023-10-16 12:31:03 UTC
Red Hat Product Errata RHBA-2023:5748 0 None None None 2023-10-16 15:13:41 UTC
Red Hat Product Errata RHBA-2023:5755 0 None None None 2023-10-16 15:10:35 UTC
Red Hat Product Errata RHBA-2023:5757 0 None None None 2023-10-16 15:34:31 UTC
Red Hat Product Errata RHBA-2023:5760 0 None None None 2023-10-17 07:42:49 UTC
Red Hat Product Errata RHBA-2023:5798 0 None None None 2023-10-17 16:08:51 UTC
Red Hat Product Errata RHBA-2023:5910 0 None None None 2023-10-19 09:04:26 UTC
Red Hat Product Errata RHBA-2023:6043 0 None None None 2023-10-23 18:48:06 UTC
Red Hat Product Errata RHBA-2023:6184 0 None None None 2023-10-30 14:09:35 UTC
Red Hat Product Errata RHSA-2023:5453 0 None None None 2023-10-05 13:54:30 UTC
Red Hat Product Errata RHSA-2023:5455 0 None None None 2023-10-05 14:01:21 UTC
Sourceware 30842 0 P2 RESOLVED Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) 2024-10-08 11:52:49 UTC

Description Mauro Matteo Cascella 2023-08-25 08:25:31 UTC
If the system is configured in no-aaaa mode via /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC address family, and a DNS response is received over TCP that is larger than 2048 bytes, getaddrinfo may potentially disclose stack contents via the returned address data, or crash. While name lookup normally just fails incorrectly, crashes are not difficult to trigger, with valid DNS responses that are propagated by DNS resolvers.

Reference:
https://sourceware.org/bugzilla/show_bug.cgi?id=30842

Comment 5 Guilherme de Almeida Suckevicz 2023-09-12 17:26:15 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 2238600]

Comment 6 errata-xmlrpc 2023-10-05 13:54:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5453

Comment 7 errata-xmlrpc 2023-10-05 14:01:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:5455


Note You need to log in before you can comment on or make changes to this bug.