about summary refs log tree commit diff
path: root/NEWS
diff options
context:
space:
mode:
authorFlorian Weimer <fweimer@redhat.com>2016-04-29 10:35:34 +0200
committerGabriel F. T. Gomes <gftg@linux.vnet.ibm.com>2016-05-24 11:35:31 -0300
commit1029487ab3b2ef65ec9364cb15c44ee9c571224f (patch)
treebcdf22236e9d5a9a13688ff53cc0d0700f366e7c /NEWS
parentedbab2450a084a275d418fba871a8c7b48001a71 (diff)
downloadglibc-1029487ab3b2ef65ec9364cb15c44ee9c571224f.tar.gz
glibc-1029487ab3b2ef65ec9364cb15c44ee9c571224f.tar.xz
glibc-1029487ab3b2ef65ec9364cb15c44ee9c571224f.zip
CVE-2016-3706: getaddrinfo: stack overflow in hostent conversion [BZ #20010]
When converting a struct hostent response to struct gaih_addrtuple, the
gethosts macro (which is called from gaih_inet) used alloca, without
malloc fallback for large responses.  This commit changes this code to
use calloc unconditionally.

This commit also consolidated a second hostent-to-gaih_addrtuple
conversion loop (in gaih_inet) to use the new conversion function.

(cherry picked from commit 4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9)
Diffstat (limited to 'NEWS')
-rw-r--r--NEWS5
1 files changed, 5 insertions, 0 deletions
diff --git a/NEWS b/NEWS
index 138aee2e91..afca6c2be7 100644
--- a/NEWS
+++ b/NEWS
@@ -13,6 +13,11 @@ Version 2.20.1
   17625, 17630, 17801, 18032, 18080, 18508, 18665, 18694, 18928, 19018,
   19682.
 
+* Previously, getaddrinfo copied large amounts of address data to the stack,
+  even after the fix for CVE-2013-4458 has been applied, potentially
+  resulting in a stack overflow.  getaddrinfo now uses a heap allocation
+  instead.  Reported by Michael Petlan.  (CVE-2016-3706)
+
 * A stack-based buffer overflow was found in libresolv when invoked from
   libnss_dns, allowing specially crafted DNS responses to seize control
   of execution flow in the DNS client.  The buffer overflow occurs in