Fedora has issued an advisory on May 10: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ICIY2WE4MCXHRVFZPY24JZKPAXG4PDIZ/
Cauldron fixed with glibc-2.22-17.mga6
Fedora has issued an advisory on May 12: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/WENVYEYN5OSQXJQV7L4TQOKH3BODV6PB/ This fixes an additional issue, CVE-2016-3706. Thomas has already fixed this in Cauldron. from http://lwn.net/Vulnerabilities/687400/
Summary: glibc new security issues CVE-2016-1234 and CVE-2016-3075 => glibc new security issues CVE-2016-1234, CVE-2016-3075, and CVE-2016-3706
Patched package uploaded for Mageia 5 by Thomas. Advisory: ======================== Updated glibc packages fix security vulnerabilities: It was found that glob implementation in glibc does not correctly handle overlong names in struct dirent buffers when GLOB_ALTDIRFUNC is used, causing large stack-based buffer overflow with controlled length and content (CVE-2016-1234). A stack overflow vulnerability (unbounded allocation) in _nss_dns_getnetbyname_r function was found (CVE-2016-3075). stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458) (CVE-2016-3706). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ICIY2WE4MCXHRVFZPY24JZKPAXG4PDIZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/WENVYEYN5OSQXJQV7L4TQOKH3BODV6PB/ ======================== Updated packages in core/updates_testing: ======================== glibc-2.20-22.mga5 glibc-devel-2.20-22.mga5 glibc-static-devel-2.20-22.mga5 glibc-profile-2.20-22.mga5 nscd-2.20-22.mga5 glibc-utils-2.20-22.mga5 glibc-i18ndata-2.20-22.mga5 glibc-doc-2.20-22.mga5 from glibc-2.20-22.mga5.src.rpm
CC: (none) => tmbAssignee: tmb => qa-bugs
PoC for CVE-2016-1234 here: https://sourceware.org/bugzilla/show_bug.cgi?id=CVE-2016-1234
Whiteboard: (none) => has_procedure
Followed the procedure on the upstream bug and got a Segmentation fault before the update, and no segfault after the update, Mageia 5 i586 and x86_64.
Whiteboard: has_procedure => has_procedure MGA5-32-OK MGA5-64-OK
Advisory added in SVN. Perhaps someone could check the formatting.
Whiteboard: has_procedure MGA5-32-OK MGA5-64-OK => has_procedure MGA5-32-OK MGA5-64-OK advisory
All good, thanks. Validating.
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0206.html
Status: NEW => RESOLVEDResolution: (none) => FIXED