Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 489234 (CVE-2013-4458) - <sys-libs/glibc-2.19-r1: Stack (frame) overflow in getaddrinfo() when called with AF_INET6 (CVE-2013-4458)
Summary: <sys-libs/glibc-2.19-r1: Stack (frame) overflow in getaddrinfo() when called ...
Alias: CVE-2013-4458
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
Whiteboard: A2 [glsa cleanup]
Depends on: 518364
  Show dependency tree
Reported: 2013-10-24 07:21 UTC by Agostino Sarubbo
Modified: 2015-03-08 14:54 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-10-24 07:21:13 UTC
A stack (frame) overflow flaw, which led to a denial of service (application crash), was found in the way glibc's getaddrinfo() function processed certain requests when called with AF_INET6.  A similar flaw to CVE-2013-1914, this affects AF_INET6 rather than AF_UNSPEC.

A proposed patch has been submitted for review [1].  No CVE has been assigned yet.

Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-12-03 01:06:46 UTC
Patch available in upstream master:;a=commitdiff;h=7cbcdb3699584db8913ca90f705d6337633ee10f
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2013-12-27 03:59:46 UTC
CVE-2013-4458 (
  Stack-based buffer overflow in the getaddrinfo function in
  sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and
  earlier allows remote attackers to cause a denial of service (crash) via a
  (1) hostname or (2) IP address that triggers a large number of AF_INET6
  address results.  NOTE: this vulnerability exists because of an incomplete
  fix for CVE-2013-1914.
Comment 3 Yury German Gentoo Infrastructure gentoo-dev 2014-01-07 04:48:53 UTC

What do you think about providing a stabilization for this since the patch was available for a month now (as provided in the posts). This is a an A2 (5 day) vulnerability.

Please advise if we have a version that can be tested / stabilized.
Comment 4 SpanKY gentoo-dev 2014-01-07 13:25:16 UTC
there are no plans to add more patches to glibc-2.17
Comment 5 SpanKY gentoo-dev 2014-02-18 19:32:41 UTC
i've cherry picked this to the glibc-2.18 patchset
Comment 6 Yury German Gentoo Infrastructure gentoo-dev 2015-03-03 02:47:07 UTC
Maintainer(s), please drop the vulnerable version(s).

Added to an existing GLSA Request.
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2015-03-08 14:54:25 UTC
This issue was resolved and addressed in
 GLSA 201503-04 at
by GLSA coordinator Kristian Fiskerstrand (K_F).