Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 3 Nov 2015 15:53:22 +0100
From: Raphael Hertzog <hertzog@...ian.org>
To: oss-security@...ts.openwall.com
Cc: Mitre CVE assign department <cve-assign@...re.org>
Subject: Re: Pending CVE requests for glibc

Hello,

it seems that this CVE request fell through the cracks. Can you
please assign the requested CVE ids?

Thank you very much.

Le mardi 08 septembre 2015, Huzaifa Sidhpurwala a écrit :
> Hi MITRE,
> 
> I could not help but notice, some glibc security issues were not
> assigned CVE ids.
> 
> 1. glibc: multiple overflows in strxfrm()
> Integer overflow when computing memory allocation sizes (similar to
> CVE-2012-4412) was reported [1] in glibc strxfrm() function. Attached
> strxfrm-int32.c should trigger this issue on a 32-bit systems.
> Additionally, it was discovered [1] that strxfrm() falls back to an
> unbounded alloca if malloc fails making it vulnerable to stack-based
> buffer overflows (similar to CVE-2012-4424). Attached strxfrm-alloca.c
> should trigger this issue.
> 
> Previously a request was made via:
> http://seclists.org/oss-sec/2015/q1/540
> 
> 2. glibc: _IO_wstr_overflow integer overflow
> An integer overflow flaw, leading to a heap-based buffer overflow, was
> found in glibc's _IO_wstr_overflow() function. If an application used
> this function, it could cause the application to crash or, potentially,
> execute arbitrary code with the privileges of the user running the
> application.
> 
> https://sourceware.org/bugzilla/show_bug.cgi?id=17269
> https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
> 
> 3. glibc: potential denial of service in internal_fnmatch()
> It was reported [1] that when processing certain malformed patterns,
> fnmatch can skip over the NUL byte terminating the pattern.  This can
> potentially result in an application crash if fnmatch hits an unmapped
> page before encountering a NUL byte.
> 
> https://sourceware.org/bugzilla/show_bug.cgi?id=18032
> https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
> 
> Previously a request was made via:
> http://seclists.org/oss-sec/2015/q1/689
> 
> 4. glibc: potential denial of service in pop_fail_stack()
> A crash was reported [1] during glibc extended regular expression
> processing. No known patch exists at the time of writing.
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
> 
> 
> Can MITRE please assign CVE ids to these flaws?
> 
> Thanks!
> 
> 
> -- 
> Huzaifa Sidhpurwala / Red Hat Product Security Team
> 
> 

-- 
Raphaël Hertzog ◈ Writer/Consultant ◈ Debian Developer

Discover the Debian Administrator's Handbook:
→ http://debian-handbook.info/get/

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.