| Summary: | Update request: glibc-2.18-9.9.mga4 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Thomas Backlund <tmb> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | olchal, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/633832/ | ||
| Whiteboard: | has_procedure advisory MGA4-32-OK mga4-64-ok | ||
| Source RPM: | glibc-2.18-9.9.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Thomas Backlund
2015-02-10 21:23:59 CET
Had this running on my 6 machines that I tested the kernel on since the weekend or yesterday. No general regressions. PoC for the security issue here: https://sourceware.org/bugzilla/show_bug.cgi?id=16618 Compile the program in the bug report there as follows: gcc scan.c -std=c99 Then run the program: ./a.out Before the glibc update it gives an error output due to the free() call. After it gives no output. Testing complete Mageia 4 i586. Whiteboard:
(none) =>
has_procedure MGA4-32-OK Performed two installations one x86_64 and one i586 with kernel, 3 x nvidia, fglrx, broadcom-wl, vbox, xtables-addons and also glibc, dbus, x11 and cups at the same time. Also tested PoC 64bit. All Ok. Whiteboard:
has_procedure MGA4-32-OK =>
has_procedure MGA4-32-OK mga4-64-ok Advisory uploaded. Whiteboard:
has_procedure MGA4-32-OK mga4-64-ok =>
has_procedure advisory MGA4-32-OK mga4-64-ok Running fine on 3 live x86_64 systems here Testing on Mageia4x32 real hardware (intel core i3, 8 Series/C220 Series Chipset, nvidia GTX750) glibc-2.18-9.9.mga4 with latest kernel-desktop, dbus and x11-server OK CC:
(none) =>
olchal Validating. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0072.html Status:
NEW =>
RESOLVED
David Walser
2015-02-18 23:08:43 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/633832/ |