stable

glibc-2.36-14.fc37

FEDORA-2023-028062484e created by codonell 7 months ago for Fedora 37

Security fix for CVE-2023-4911, CVE-2023-4806, and CVE-2023-4527.

CVE-2023-4911: If a tunable of the form NAME=NAME=VAL is passed in the environment of a setuid program and NAME is valid, it may result in a buffer overflow, which could be exploited to achieve escalated privileges. This flaw was introduced in glibc 2.34.

CVE-2023-4806: When an NSS plugin only implements the _gethostbyname2_r and _getcanonname_r callbacks, getaddrinfo could use memory that was freed during buffer resizing, potentially causing a crash or read or write to arbitrary memory.

CVE-2023-4527: If the system is configured in no-aaaa mode via /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC address family, and a DNS response is received over TCP that is larger than 2048 bytes, getaddrinfo may potentially disclose stack contents via the returned address data, or crash.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2023-028062484e

This update has been submitted for testing by codonell.

7 months ago

This update's test gating status has been changed to 'waiting'.

7 months ago

adamwill edited this update.

7 months ago

adamwill edited this update.

7 months ago

This update's test gating status has been changed to 'passed'.

7 months ago

This update's test gating status has been changed to 'failed'.

7 months ago

This update has been pushed to testing.

7 months ago

This update's test gating status has been changed to 'waiting'.

7 months ago

This update's test gating status has been changed to 'failed'.

7 months ago

This update's test gating status has been changed to 'waiting'.

7 months ago

This update's test gating status has been changed to 'passed'.

7 months ago
User Icon submachine commented & provided feedback 7 months ago

I just waived the automated test failures, but I don't see my waiver comment here, so:

The scratch build validation failure is an strace build failure that also occurs on baseline; waived The debugging symbols in libc.so.6 and ld.so is expected; waived The cope build validation failure seems to be an infrastructure issue; waived

These are identical to the failures seen on the f38 update.

User Icon blarsen commented & provided feedback 7 months ago
karma

Just installed the update and rebooted the system. everything is working as expected!

User Icon tuliom commented & provided feedback 7 months ago
karma

Tested manually. LGTM.

This update can be pushed to stable now if the maintainer wishes

7 months ago
User Icon jforbes commented & provided feedback 7 months ago
karma

Seems to be working here on aarch64.

This update has been submitted for stable by bodhi.

7 months ago
User Icon mcermak commented & provided feedback 7 months ago
karma

Smoke test passed for me on x86_64.

This update has been pushed to stable.

7 months ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
4
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
7 months ago
in testing
7 months ago
in stable
7 months ago
modified
7 months ago
approved
7 months ago
BZ#2234712 CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode
0
0
BZ#2237782 CVE-2023-4806 glibc: potential use-after-free in getaddrinfo()
0
0
BZ#2238352 CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation
0
0
BZ#2238600 CVE-2023-4527 glibc: Stack read overflow in getaddrinfo in no-aaaa mode [fedora-all]
0
0
BZ#2238604 CVE-2023-4806 glibc: potential use-after-free in getaddrinfo() [fedora-all]
0
0
BZ#2241966 CVE-2023-4911 glibc: buffer overflow in ld.so leading to privilege escalation [fedora-all]
0
0

Automated Test Results