--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-63e5a77522
2023-10-04 17:15:10.480213
--------------------------------------------------------------------------------

Name        : glibc
Product     : Fedora 39
Version     : 2.38
Release     : 6.fc39
URL         : http://www.gnu.org/software/glibc/
Summary     : The GNU libc libraries
Description :
The glibc package contains standard libraries which are used by
multiple programs on the system. In order to save disk space and
memory, as well as to make upgrading easier, common system code is
kept in one place and shared between programs. This particular package
contains the most important sets of shared libraries: the standard C
library and the standard math library. Without these two libraries, a
Linux system will not function.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2023-4911, CVE-2023-4806, and CVE-2023-4527.
CVE-2023-4911: If a tunable of the form NAME=NAME=VAL is passed in the
environment of a setuid program and NAME is valid, it may result in a buffer
overflow, which could be exploited to achieve escalated privileges.  This flaw
was introduced in glibc 2.34.  CVE-2023-4806: When an NSS plugin only implements
the _gethostbyname2_r and _getcanonname_r callbacks, getaddrinfo could use
memory that was freed during buffer resizing, potentially causing a crash or
read or write to arbitrary memory.  CVE-2023-4527: If the system is configured
in no-aaaa mode via /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC
address family, and a DNS response is received over TCP that is larger than 2048
bytes, getaddrinfo may potentially disclose stack contents via the returned
address data, or crash.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct  3 2023 Arjun Shankar  - 2.38-6
- Auto-sync with upstream branch release/2.38/master,
  750a45a783906a19591fb8ff6b7841470f1f5701:
- tunables: Terminate if end of input is reached (CVE-2023-4911)
- Propagate GLIBC_TUNABLES in setxid binaries
* Tue Oct  3 2023 Arjun Shankar  - 2.38-5
- Auto-sync with upstream branch release/2.38/master,
  f6445dc94da185b3d1ee283f0ca0a34c4e1986cc:
- Document CVE-2023-4806 and CVE-2023-5156 in NEWS
- Fix leak in getaddrinfo introduced by the fix for CVE-2023-4806 [BZ #30843]
- manual/jobs.texi: Add missing @item EPERM for getpgid
- string: Fix tester build with fortify enable with gcc < 12
- iconv: restore verbosity with unrecognized encoding names (bug 30694)
- getaddrinfo: Fix use after free in getcanonname (CVE-2023-4806)
- CVE-2023-4527: Stack read overflow with large TCP responses in no-aaaa mode
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2234712 - CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode
        https://bugzilla.redhat.com/show_bug.cgi?id=2234712
  [ 2 ] Bug #2237782 - CVE-2023-4806 glibc: potential use-after-free in getaddrinfo()
        https://bugzilla.redhat.com/show_bug.cgi?id=2237782
  [ 3 ] Bug #2238352 - CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation
        https://bugzilla.redhat.com/show_bug.cgi?id=2238352
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-63e5a77522' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/
Do not reply to spam, report it: https://pagure.io/login/

Fedora 39: glibc 2023-63e5a77522

October 4, 2023
Security fix for CVE-2023-4911, CVE-2023-4806, and CVE-2023-4527

Summary

The glibc package contains standard libraries which are used by

multiple programs on the system. In order to save disk space and

memory, as well as to make upgrading easier, common system code is

kept in one place and shared between programs. This particular package

contains the most important sets of shared libraries: the standard C

library and the standard math library. Without these two libraries, a

Linux system will not function.

Update Information:

Security fix for CVE-2023-4911, CVE-2023-4806, and CVE-2023-4527. CVE-2023-4911: If a tunable of the form NAME=NAME=VAL is passed in the environment of a setuid program and NAME is valid, it may result in a buffer overflow, which could be exploited to achieve escalated privileges. This flaw was introduced in glibc 2.34. CVE-2023-4806: When an NSS plugin only implements the _gethostbyname2_r and _getcanonname_r callbacks, getaddrinfo could use memory that was freed during buffer resizing, potentially causing a crash or read or write to arbitrary memory. CVE-2023-4527: If the system is configured in no-aaaa mode via /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC address family, and a DNS response is received over TCP that is larger than 2048 bytes, getaddrinfo may potentially disclose stack contents via the returned address data, or crash.

Change Log

* Tue Oct 3 2023 Arjun Shankar - 2.38-6 - Auto-sync with upstream branch release/2.38/master, 750a45a783906a19591fb8ff6b7841470f1f5701: - tunables: Terminate if end of input is reached (CVE-2023-4911) - Propagate GLIBC_TUNABLES in setxid binaries * Tue Oct 3 2023 Arjun Shankar - 2.38-5 - Auto-sync with upstream branch release/2.38/master, f6445dc94da185b3d1ee283f0ca0a34c4e1986cc: - Document CVE-2023-4806 and CVE-2023-5156 in NEWS - Fix leak in getaddrinfo introduced by the fix for CVE-2023-4806 [BZ #30843] - manual/jobs.texi: Add missing @item EPERM for getpgid - string: Fix tester build with fortify enable with gcc < 12 - iconv: restore verbosity with unrecognized encoding names (bug 30694) - getaddrinfo: Fix use after free in getcanonname (CVE-2023-4806) - CVE-2023-4527: Stack read overflow with large TCP responses in no-aaaa mode

References

[ 1 ] Bug #2234712 - CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode https://bugzilla.redhat.com/show_bug.cgi?id=2234712 [ 2 ] Bug #2237782 - CVE-2023-4806 glibc: potential use-after-free in getaddrinfo() https://bugzilla.redhat.com/show_bug.cgi?id=2237782 [ 3 ] Bug #2238352 - CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation https://bugzilla.redhat.com/show_bug.cgi?id=2238352

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-63e5a77522' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html

Severity
Name : glibc
Product : Fedora 39
Version : 2.38
Release : 6.fc39
URL : http://www.gnu.org/software/glibc/
Summary : The GNU libc libraries

Related News