stable

glibc-2.36-14.fc37

FEDORA-2023-028062484e created by codonell a year ago for Fedora 37

Security fix for CVE-2023-4911, CVE-2023-4806, and CVE-2023-4527.

CVE-2023-4911: If a tunable of the form NAME=NAME=VAL is passed in the environment of a setuid program and NAME is valid, it may result in a buffer overflow, which could be exploited to achieve escalated privileges. This flaw was introduced in glibc 2.34.

CVE-2023-4806: When an NSS plugin only implements the _gethostbyname2_r and _getcanonname_r callbacks, getaddrinfo could use memory that was freed during buffer resizing, potentially causing a crash or read or write to arbitrary memory.

CVE-2023-4527: If the system is configured in no-aaaa mode via /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC address family, and a DNS response is received over TCP that is larger than 2048 bytes, getaddrinfo may potentially disclose stack contents via the returned address data, or crash.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2023-028062484e

This update has been submitted for testing by codonell.

a year ago

This update's test gating status has been changed to 'waiting'.

a year ago

adamwill edited this update.

a year ago

adamwill edited this update.

a year ago

This update's test gating status has been changed to 'passed'.

a year ago

This update's test gating status has been changed to 'failed'.

a year ago

This update has been pushed to testing.

a year ago

This update's test gating status has been changed to 'waiting'.

a year ago

This update's test gating status has been changed to 'failed'.

a year ago

This update's test gating status has been changed to 'waiting'.

a year ago

This update's test gating status has been changed to 'passed'.

a year ago
User Icon submachine commented & provided feedback a year ago

I just waived the automated test failures, but I don't see my waiver comment here, so:

The scratch build validation failure is an strace build failure that also occurs on baseline; waived The debugging symbols in libc.so.6 and ld.so is expected; waived The cope build validation failure seems to be an infrastructure issue; waived

These are identical to the failures seen on the f38 update.

User Icon blarsen commented & provided feedback a year ago
karma

Just installed the update and rebooted the system. everything is working as expected!

User Icon tuliom commented & provided feedback a year ago
karma

Tested manually. LGTM.

This update can be pushed to stable now if the maintainer wishes

a year ago
User Icon jforbes commented & provided feedback a year ago
karma

Seems to be working here on aarch64.

This update has been submitted for stable by bodhi.

a year ago
User Icon mcermak commented & provided feedback a year ago
karma

Smoke test passed for me on x86_64.

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
4
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
modified
a year ago
approved
a year ago
BZ#2234712 CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode
0
0
BZ#2237782 CVE-2023-4806 glibc: potential use-after-free in getaddrinfo()
0
0
BZ#2238352 CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation
0
0
BZ#2238600 CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode [fedora-all]
0
0
BZ#2238604 CVE-2023-4806 glibc: potential use-after-free in getaddrinfo() [fedora-all]
0
0
BZ#2241966 CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation [fedora-all]
0
0

Automated Test Results