mirror of git://sourceware.org/git/glibc.git
Add advisory text for CVE-2026-0951
Explain the security issue and set context for the vulnerability to help downstreams get a better understanding of the issue. Reviewed-by: Siddhesh Poyarekar <siddhesh@gotplt.org>
This commit is contained in:
parent
75d8c149f8
commit
ffe48207fd
|
|
@ -0,0 +1,25 @@
|
|||
getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler
|
||||
|
||||
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf
|
||||
that specifies the library's DNS backend for networks and queries for a
|
||||
zero-valued network in the GNU C Library version 2.0 to version 2.42
|
||||
can leak stack contents to the configured DNS resolver.
|
||||
|
||||
A defect in the _nss_dns_getnetbyaddr_r function which implements
|
||||
getnetbyaddr and getnetbyaddr_r in the dns-based network database can
|
||||
pass stack contents unmodified to the configured DNS resolver as part of
|
||||
the network DNS query when the network queried is the default network
|
||||
i.e. net == 0x0. This stack contents leaking in the query is considered
|
||||
a loss of confidentiality for the host making the query. Typically it
|
||||
is rare to call these APIs with a net value of zero, and if an attacker
|
||||
can control the net value it can only leak adjacent stack, and so loss
|
||||
of confidentiality is spatially limited. The leak might be used to
|
||||
accelerate an ASLR bypass by knowing pointer values, but also requires
|
||||
network adjacent access to snoop between the application and the
|
||||
DNS server; making the attack complexity higher.
|
||||
|
||||
CVE-Id: CVE-2026-0915
|
||||
Public-Date: 2026-01-15
|
||||
Vulnerable-Commit: 5f0e6fc702296840d2daa39f83f6cb1e40073d58 (1.92-1)
|
||||
Fix-Commit: e56ff82d5034ec66c6a78f517af6faa427f65b0b (2.43)
|
||||
Reported-by: Igor Morgenstern, Aisle Research
|
||||
Loading…
Reference in New Issue