Announced on the GLIBC mailing list. https://sourceware.org/ml/libc-announce/2019/msg00000.html CVE-2019-6488: On x32, the size_t parameter may be passed in the lower 32 bits of a 64-bit register with with non-zero upper 32 bit. When it happened, accessing the 32-bit size_t value as the full 64-bit register in the assembly string/memory functions would cause a buffer overflow. Reported by H.J. Lu. CVE-2016-10739: The getaddrinfo function could successfully parse IPv4 addresses with arbitrary trailing characters, potentially leading to data or command injection issues in applications. CVE-2018-19591 has already been merged in our version. Fixed in version 2.29.
CVE: (none) => CVE-2016-10739 CVE-2019-6488
Whiteboard: (none) => MGA6TOOBlocks: (none) => 23912
CVE-2019-6488 does not matter as we dont build or support x32 arch but I pulled in the fix in the cauldron build anyway as it has been backported to the upstream glibc-2.28 branch. I've also merged the fix for CVE-2016-10739 from glibc master in glibc-2.28-29.mga7 currently building
CC: (none) => tmb
Fixed in glibc-2.28-29.mga7 in Cauldron. For Mageia 6 we have this and Bug 23912.
Whiteboard: MGA6TOO => (none)Version: Cauldron => 6
(In reply to David Walser from comment #2) > Fixed in glibc-2.28-29.mga7 in Cauldron. > > For Mageia 6 we have this and Bug 23912. Assigning to the Base System maintainers (the registered maintainer is already in the CC, welcome back to him :-) )
Assignee: bugsquad => basesystemCC: (none) => marja11
RedHat has issued an advisory for CVE-2016-10739 today (August 6): https://access.redhat.com/errata/RHSA-2019:2118
Mageia 6 is EOL.
Resolution: (none) => OLDStatus: NEW => RESOLVED