| Summary: | glibc new security issue CVE-2023-0687 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | RPM Packages | Assignee: | Thomas Backlund <tmb> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | ||
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | glibc-2.36-34.mga9.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2023-04-05 02:28:35 CEST
David Walser
2023-04-05 02:28:47 CEST
Whiteboard:
(none) =>
MGA8TOO disputed upstream: https://sourceware.org/bugzilla/show_bug.cgi?id=29444#c9 Fixed in Cauldron since 2.36-36.mga9 I wont push to mga8 as upstream has disputed it and reported it to mitre, and pointed out that: " My point is that this step above needs specific knowledge of the address space *and* control over execution to make this happen. Without such control, there's no exploitation vector. " so basically impossible to exploit in reality... I've queued the fix in svn for mga8 if there is something else that needs fixing QA Contact:
security =>
(none) |