Summary: | <sys-libs/glibc-2.19-r1: posix_spawn_file_actions_addopen fails to copy the path argument (CVE-2014-4043) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | toolchain |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/06/11/3 | ||
Whiteboard: | A3 [glsa cleanup] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 518364 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-06-13 09:34:09 UTC
Fixed in 2.20 backported to glibc-2.19-r1 http://sources.gentoo.org/gentoo/src/patchsets/glibc/2.19/00_all_0012-posix_spawn_file_actions_addopen-needs-to-copy-the-p.patch?rev=1.1 http://sources.gentoo.org/gentoo/src/patchsets/glibc/2.19/00_all_0013-posix_spawn_faction_addopen-Add-missing-string.h-inc.patch?rev=1.1 Is there a way to backport to 2.17/2.18 ? Which version we need to stabilize? i'm not planning on backporting past 2.19, nor stabilizing 2.18. we'll most likely stabilize 2.19 next. CVE-2014-4043 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4043): The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities. Maintainer(s), please drop the vulnerable version(s). Added to an existing GLSA Request. This issue was resolved and addressed in GLSA 201503-04 at http://security.gentoo.org/glsa/glsa-201503-04.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |