| Summary: | glibc new security issues CVE-2016-1234, CVE-2016-3075, and CVE-2016-3706 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | sysadmin-bugs, tmb |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/687047/ | ||
| Whiteboard: | has_procedure MGA5-32-OK MGA5-64-OK advisory | ||
| Source RPM: | glibc-2.20-21.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-05-11 21:18:29 CEST
Cauldron fixed with glibc-2.22-17.mga6 Fedora has issued an advisory on May 12: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/WENVYEYN5OSQXJQV7L4TQOKH3BODV6PB/ This fixes an additional issue, CVE-2016-3706. Thomas has already fixed this in Cauldron. from http://lwn.net/Vulnerabilities/687400/ Summary:
glibc new security issues CVE-2016-1234 and CVE-2016-3075 =>
glibc new security issues CVE-2016-1234, CVE-2016-3075, and CVE-2016-3706 Patched package uploaded for Mageia 5 by Thomas. Advisory: ======================== Updated glibc packages fix security vulnerabilities: It was found that glob implementation in glibc does not correctly handle overlong names in struct dirent buffers when GLOB_ALTDIRFUNC is used, causing large stack-based buffer overflow with controlled length and content (CVE-2016-1234). A stack overflow vulnerability (unbounded allocation) in _nss_dns_getnetbyname_r function was found (CVE-2016-3075). stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458) (CVE-2016-3706). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ICIY2WE4MCXHRVFZPY24JZKPAXG4PDIZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/WENVYEYN5OSQXJQV7L4TQOKH3BODV6PB/ ======================== Updated packages in core/updates_testing: ======================== glibc-2.20-22.mga5 glibc-devel-2.20-22.mga5 glibc-static-devel-2.20-22.mga5 glibc-profile-2.20-22.mga5 nscd-2.20-22.mga5 glibc-utils-2.20-22.mga5 glibc-i18ndata-2.20-22.mga5 glibc-doc-2.20-22.mga5 from glibc-2.20-22.mga5.src.rpm CC:
(none) =>
tmb PoC for CVE-2016-1234 here: https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2016-1234 Whiteboard:
(none) =>
has_procedure Followed the procedure on the upstream bug and got a Segmentation fault before the update, and no segfault after the update, Mageia 5 i586 and x86_64. Whiteboard:
has_procedure =>
has_procedure MGA5-32-OK MGA5-64-OK Advisory added in SVN. Perhaps someone could check the formatting. Whiteboard:
has_procedure MGA5-32-OK MGA5-64-OK =>
has_procedure MGA5-32-OK MGA5-64-OK advisory All good, thanks. Validating. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0206.html Status:
NEW =>
RESOLVED |