aboutsummaryrefslogtreecommitdiff
path: root/NEWS
diff options
context:
space:
mode:
authorFlorian Weimer <fweimer@redhat.com>2023-09-13 14:10:56 +0200
committerFlorian Weimer <fweimer@redhat.com>2023-09-13 14:10:56 +0200
commitbd77dd7e73e3530203be1c52c8a29d08270cb25d (patch)
treeb5d84f536d6c48f6ca85b61b42231fe01fc4384a /NEWS
parentc8fa383f4cec9cf1c0cc8ec97903c09af10286f4 (diff)
downloadglibc-bd77dd7e73e3530203be1c52c8a29d08270cb25d.zip
glibc-bd77dd7e73e3530203be1c52c8a29d08270cb25d.tar.gz
glibc-bd77dd7e73e3530203be1c52c8a29d08270cb25d.tar.bz2
CVE-2023-4527: Stack read overflow with large TCP responses in no-aaaa mode
Without passing alt_dns_packet_buffer, __res_context_search can only store 2048 bytes (what fits into dns_packet_buffer). However, the function returns the total packet size, and the subsequent DNS parsing code in _nss_dns_gethostbyname4_r reads beyond the end of the stack-allocated buffer. Fixes commit f282cdbe7f436c75864e5640a4 ("resolv: Implement no-aaaa stub resolver option") and bug 30842.
Diffstat (limited to 'NEWS')
-rw-r--r--NEWS6
1 files changed, 5 insertions, 1 deletions
diff --git a/NEWS b/NEWS
index 60a0371..a48c32e 100644
--- a/NEWS
+++ b/NEWS
@@ -42,7 +42,11 @@ Changes to build and runtime requirements:
Security related changes:
- [Add security related changes here]
+ CVE-2023-4527: If the system is configured in no-aaaa mode via
+ /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC address
+ family, and a DNS response is received over TCP that is larger than
+ 2048 bytes, getaddrinfo may potentially disclose stack contents via
+ the returned address data, or crash.
The following bugs are resolved with this release: