Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 893442 (CVE-2023-25139) - =sys-libs/glibc-2.37: Buffer overflow in sprintf
Summary: =sys-libs/glibc-2.37: Buffer overflow in sprintf
Status: RESOLVED FIXED
Alias: CVE-2023-25139
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ?? [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-02-07 04:14 UTC by Sam James
Modified: 2023-05-23 04:37 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-02-07 04:14:53 UTC
CVE-2023-25139 (https://sourceware.org/bugzilla/show_bug.cgi?id=30068):

sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.

[No fix on release/2.37 yet.]
Comment 1 Andreas K. Hüttel archtester gentoo-dev 2023-02-11 00:04:46 UTC
Fixed in patchset 2
Comment 2 Andreas K. Hüttel archtester gentoo-dev 2023-05-07 21:44:38 UTC
This affects only 2.37 and all affected versions are long gone from Gentoo.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-05-23 04:34:20 UTC
(In reply to Andreas K. Hüttel from comment #2)
> This affects only 2.37 and all affected versions are long gone from Gentoo.

What's the fixed version?
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-05-23 04:37:46 UTC
Ah, fixed with this commit, I guess:

commit 3f5305f584de1481159876f4c174aa87cfce1c89
Author: Andreas K. Hüttel <dilfridge@gentoo.org>
Date:   Wed Feb 8 15:57:16 2023 +0100

    sys-libs/glibc: bump 2.37 to  patchset 2

    Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org>

 sys-libs/glibc/Manifest          | 2 +-
 sys-libs/glibc/glibc-2.37.ebuild | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

So affected 2.37 was never even keyworded. All done then. 2.37 was both unaffected and affected, but that still doesn't matter much because it was never keyworded.