unofficial mirror of libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: Florian Weimer <fweimer@redhat.com>
To: libc-alpha@sourceware.org
Subject: [PATCH 0/4] Various nscd security fixes
Date: Wed, 24 Apr 2024 18:08:33 +0200	[thread overview]
Message-ID: <cover.1713974801.git.fweimer@redhat.com> (raw)

Carlos filed bug 31677, and it it turns out that this is a reachable
stack-based buffer overflow.  The data looks quite attacker-controlled
to me and probably can contain NUL bytes with a custom client, so this
looks quite exploitable to my untrained eye.

Unfortunately, the reproducer kept crashing after the initial patch,
hence the second and third commit.  The two issues fixed in the last
commit were discovered by reading through the code.

By my count, this needs four different CVE identifiers:

  Bug 31677: the stack-based buffer overflow (commit 1)
  Bug 31678: two distinct null pointer dereferences (commit 2, commit 3)
    (same flaw type, presumably same version range, so MERGE from a
    CVE perspective)
  Bug 31679: process termination on malloc failure (commit 4)
  Byg 31680: memory corruption due to incorrect callback API assumption
    (commit 4)

Florian Weimer (4):
  nscd: Stack-based buffer overflow in netgroup cache (bug 31677)
  nscd: Do not send missing not-found response in addgetnetgrentX (bug
    31678)
  nscd: Avoid null pointer crashes after notfound response (bug 31678)
  nscd: netgroup: Use two buffers in addgetnetgrentX (bug 31680)

 nscd/netgroupcache.c | 247 +++++++++++++++++++++++--------------------
 1 file changed, 135 insertions(+), 112 deletions(-)


base-commit: f4724843ada64a51d66f65d3199fe431f9d4c254
-- 
2.44.0


             reply	other threads:[~2024-04-24 16:09 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-04-24 16:08 Florian Weimer [this message]
2024-04-24 16:08 ` [PATCH 1/4] nscd: Stack-based buffer overflow in netgroup cache (bug 31677) Florian Weimer
2024-04-24 16:27   ` Siddhesh Poyarekar
2024-04-24 16:08 ` [PATCH 2/4] nscd: Do not send missing not-found response in addgetnetgrentX (bug 31678) Florian Weimer
2024-04-24 16:35   ` Siddhesh Poyarekar
2024-04-24 16:08 ` [PATCH 3/4] nscd: Avoid null pointer crashes after notfound response " Florian Weimer
2024-04-24 16:39   ` Siddhesh Poyarekar
2024-04-24 16:08 ` [PATCH 4/4] nscd: netgroup: Use two buffers in addgetnetgrentX (bug 31680) Florian Weimer
2024-04-24 16:48   ` Siddhesh Poyarekar
2024-04-24 20:53 ` [PATCH 0/4] Various nscd security fixes Carlos O'Donell
2024-04-26  0:10 ` Cristian Rodríguez
2024-04-26  8:10   ` Florian Weimer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://www.gnu.org/software/libc/involved.html

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cover.1713974801.git.fweimer@redhat.com \
    --to=fweimer@redhat.com \
    --cc=libc-alpha@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).