Bugzilla – Bug 813121
VUL-1: CVE-2013-1914: glibc: stack overflow in getaddrinfo() sorting
Last modified: 2018-10-30 07:47:33 UTC
+++ This bug was initially created as a clone of Bug #810637 +++ A piece of the back trace (bt) from gdb : #7 0x00002b4353eb0c1b in dumpCrashData () from ./opt/IBM/WebSphere/AppServer/java/jre/bin/libj9vm23.so #8 0x00002b43541169fd in j9sig_protect () from ./opt/IBM/WebSphere/AppServer/java/jre/bin/libj9prt23.so #9 0x00002b4353eb0348 in structuredSignalHandler () from ./opt/IBM/WebSphere/AppServer/java/jre/bin/libj9vm23.so #10 0x00002b4354117449 in masterSynchSignalHandler () from ./opt/IBM/WebSphere/AppServer/java/jre/bin/libj9prt23.so #11 <signal handler called> #12 *__GI_getaddrinfo (name=<optimized out>, service=<optimized out>, hints=0x4459fe88, pai=0x44661bc8) at ../sysdeps/posix/getaddrinfo.c:2119 #13 0x00002aab346082a3 in Java_java_net_Inet6AddressImpl_lookupAllHostAddr () from ./opt/IBM/WebSphere/AppServer/java/jre/bin/libnet.so #14 0x00002aab2ef86b3d in ?? () #15 0x00002aaaab97afa0 in ?? () from ./opt/IBM/WebSphere/AppServer/java/jre/bin/libj9gc23.so #16 0x00002aab448f1e00 in ?? () #17 0x0000000000000000 in ?? () It would appear that on line 2119 in getaddrinfo.c of glibc, that there was a problem that caused a segfault. Here's the code in question: for (i = 0, q = p; q != NULL; ++i, last = q, q = q->ai_next) { results[i].dest_addr = q; results[i].service_order = i; results[i].native = -1; <==== segfault here (if the line number matches correctly)
Andreas Schwab reviewed this and the reason is a alloca overflow if the number of replies exceeds a certain limit.
Created attachment 533210 [details] getaddrinfo-stack-overflow.patch patch by andreas (?)
Andreas ... patch is not in glibc git master yet, did you push it upstream?
Since it is a security bug I didn't publish it yet.
reproducer: $ for i in `seq 1 10000000`; do echo "ff00::$i a1" >>/etc/hosts; done $ ulimit -s 1024 $ telnet a1 Segmentation fault (clean out /etc/hosts again afterwards)
Please mention CVE-2013-1914 in the glibc commit message.
bugbot adjusting priority
git commit in mainline glibc git: http://sourceware.org/git/?p=glibc.git;a=commit;h=1cef1b19089528db11f221e938f60b9b048945d7
The SWAMPID for this issue is 52413. This issue was rated as low. Please submit fixed packages until 2013-06-06. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
This is an autogenerated message for OBS integration: This bug (813121) was mentioned in https://build.opensuse.org/request/show/175893 Factory / glibc
Was already released for SLES 11 SP2 in glibc-2.11.3-17.45.45.1
Update released for: glibc, glibc-32bit, glibc-64bit, glibc-dceext, glibc-dceext-32bit, glibc-dceext-64bit, glibc-dceext-devel, glibc-dceext-x86, glibc-debuginfo, glibc-devel, glibc-devel-32bit, glibc-devel-64bit, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-locale-32bit, glibc-locale-64bit, glibc-locale-x86, glibc-obsolete, glibc-profile, glibc-profile-32bit, glibc-profile-64bit, glibc-profile-x86, glibc-x86, nscd Products: SLE-DEBUGINFO 10-SP4 (i386, ia64, ppc, s390x, x86_64) SLE-DESKTOP 10-SP4 (i386, x86_64) SLE-SDK 10-SP4 (i386, ia64, ppc, s390x, x86_64) SLE-SERVER 10-SP4 (i386, ia64, ppc, s390x, x86_64)
Update released for: glibc, glibc-32bit, glibc-debuginfo, glibc-debuginfo-32bit, glibc-debuginfo-x86, glibc-debugsource, glibc-devel, glibc-devel-32bit, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-locale-32bit, glibc-obsolete, glibc-profile, glibc-profile-32bit, nscd Products: SLE-DEBUGINFO 11-SP1 (i386, s390x, x86_64) SLE-SERVER 11-SP1-LTSS (i386, s390x, x86_64) SLES4VMWARE 11-SP1-LTSS (i386, x86_64)
Update released for: glibc, glibc-32bit, glibc-debuginfo, glibc-debugsource, glibc-devel, glibc-devel-32bit, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-locale-32bit, glibc-obsolete, glibc-profile, glibc-profile-32bit, nscd Products: SLE-SERVER 11-SP1-TERADATA (x86_64)
Update released for: glibc, glibc-32bit, glibc-dceext, glibc-dceext-32bit, glibc-dceext-devel, glibc-debuginfo, glibc-devel, glibc-devel-32bit, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-locale-32bit, glibc-obsolete, glibc-profile, glibc-profile-32bit, nscd Products: SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: glibc, glibc-devel, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-profile, nscd, timezone Products: SUSE-CORE 9-SP3-TERADATA (x86_64)
Update released for: glibc, glibc-32bit, glibc-dceext, glibc-dceext-32bit, glibc-dceext-devel, glibc-debuginfo, glibc-devel, glibc-devel-32bit, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-locale-32bit, glibc-obsolete, glibc-profile, glibc-profile-32bit, nscd Products: SLE-DEBUGINFO 10-SP3 (i386, s390x, x86_64) SLE-SERVER 10-SP3-LTSS (i386, s390x, x86_64)
The SWAMPID for this issue is 54298. This issue was rated as low. Please submit fixed packages until 2013-09-26. Also create a patchinfo file using this link: https://swamp.suse.de/webswamp/wf/54298
(In reply to comment #15) > Was already released for SLES 11 SP2 in glibc-2.11.3-17.45.45.1 No, this was a different bug (#785041).
Right, the last SLE-11-SP2 glibc update was from Mon 18 Mar 2013 10:41:33 PM CET. So two weeks before this issue came up.
openSUSE-SU-2013:1510-1: An update that solves 6 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 779320,801246,805054,813121,813306,819383,819524,824046,830257,834594,839870 CVE References: CVE-2012-4412,CVE-2013-0242,CVE-2013-1914,CVE-2013-2207,CVE-2013-4237,CVE-2013-4332 Sources used: openSUSE 12.3 (src): glibc-2.17-4.7.1, glibc-testsuite-2.17-4.7.2, glibc-testsuite-2.17-4.7.3, glibc-utils-2.17-4.7.1
Update released for: glibc, glibc-32bit, glibc-debuginfo, glibc-debuginfo-32bit, glibc-debuginfo-64bit, glibc-debuginfo-x86, glibc-debugsource, glibc-devel, glibc-devel-32bit, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-locale-32bit, glibc-locale-x86, glibc-obsolete, glibc-profile, glibc-profile-32bit, glibc-profile-x86, glibc-x86, nscd Products: SLE-DEBUGINFO 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP2 (i386, x86_64) SLE-SDK 11-SP2 (i386, x86_64) SLE-SERVER 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP2 (i386, x86_64)
Update released for: glibc, glibc-32bit, glibc-debuginfo, glibc-debuginfo-32bit, glibc-debuginfo-64bit, glibc-debuginfo-x86, glibc-debugsource, glibc-devel, glibc-devel-32bit, glibc-html, glibc-i18ndata, glibc-info, glibc-locale, glibc-locale-32bit, glibc-locale-x86, glibc-obsolete, glibc-profile, glibc-profile-32bit, glibc-profile-x86, glibc-x86, nscd Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SDK 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
The SWAMPID for this issue is 55384. This issue was rated as moderate. Please submit fixed packages until 2013-12-24. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
fixed
L3:43338 is closed Ya Dan Fan