Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 19 Jan 2016 11:06:32 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security <oss-security@...ts.openwall.com>
Cc: Assign a CVE Identifier <cve-assign@...re.org>
Subject: Re: CVE assignment request for security bugs fixed in
 glibc 2.23

I'll assign these tomorrow unless Mitre gets to them first, the one
request swbz#18928
is already several months old and shouldn't take this long.

On Tue, Jan 19, 2016 at 11:04 AM, Florian Weimer <fweimer@...hat.com> wrote:

> Hi,
>
> we are preparing the glibc 2.23 release upstream and have fixed the
> following security bugs which, to my best knowledge, lack public CVE
> assignment so far:
>
> Passing out of range data to strftime() causes a segfault
> https://sourceware.org/bugzilla/show_bug.cgi?id=18985
>
> Out-of-range time values passed to the strftime function may cause it to
> crash, leading to a denial of service, or potentially disclosure
> information.
>
> LD_POINTER_GUARD is not ignored for privileged binaries
> https://sourceware.org/bugzilla/show_bug.cgi?id=18928
>
> LD_POINTER_GUARD was an environment variable which controls
> security-related behavior, but was not ignored for privileged binaries
> (in AT_SECURE mode).  This might allow local attackers (who can supply
> the environment variable) to bypass intended security restrictions.
>
> hcreate((size_t)-1) should fail with ENOMEM
> https://sourceware.org/bugzilla/show_bug.cgi?id=18240
>
> This is an integer overflow in hcreate and hcreate_r which can result in
> an out-of-bound memory access.  This could lead to application crashes
> or, potentially, arbitrary code execution.
>
> nan function unbounded stack allocation
> https://sourceware.org/bugzilla/show_bug.cgi?id=16962
>
> A stack overflow (unbounded alloca) can cause applications which process
> long strings with the nan function to crash or, potentially, execute
> arbitrary code.
>
> catopen() Multiple unbounded stack allocations
> https://sourceware.org/bugzilla/show_bug.cgi?id=17905
>
> A stack overflow (unbounded alloca) in the catopen function can cause
> applications which pass long strings to the catopen function to crash
> or, potentially execute arbitrary code.
>
>
> Several people have asked for CVE assignment for swbz#18928 on
> oss-security already.
>
> Thanks,
> Florian
>



-- 

--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.