public inbox for libc-stable@sourceware.org
 help / color / mirror / Atom feed
From: Aurelien Jarno <aurelien@aurel32.net>
To: "Dmitry V. Levin" <ldv@altlinux.org>
Cc: libc-stable@sourceware.org
Subject: Re: [COMMITTED 2.25 3/8] CVE-2017-15670: glob: Fix one-byte overflow [BZ #22320]
Date: Sun, 01 Jan 2017 00:00:00 -0000	[thread overview]
Message-ID: <20171215113001.GA9955@aurel32.net> (raw)
In-Reply-To: <20171215004112.GB28726@altlinux.org>

On 2017-12-15 03:41, Dmitry V. Levin wrote:
> On Sat, Dec 02, 2017 at 10:52:01AM +0100, Aurelien Jarno wrote:
> > From: Paul Eggert <eggert@cs.ucla.edu>
> > 
> > (cherry picked from commit c369d66e5426a30e4725b100d5cd28e372754f90)
> > ---
> >  ChangeLog    | 6 ++++++
> >  NEWS         | 7 +++++++
> >  posix/glob.c | 2 +-
> >  3 files changed, 14 insertions(+), 1 deletion(-)
> > 
> > diff --git a/ChangeLog b/ChangeLog
> > index f9ea53f23e..44eb9d7d7c 100644
> > --- a/ChangeLog
> > +++ b/ChangeLog
> > @@ -1,3 +1,9 @@
> > +2017-10-20  Paul Eggert <eggert@cs.ucla.edu>
> > +
> > +	[BZ #22320]
> > +	CVE-2017-15670
> > +	* posix/glob.c (__glob): Fix one-byte overflow.
> > +
> >  2017-09-08  Adhemerval Zanella  <adhemerval.zanella@linaro.org>
> >  
> >  	[BZ #1062]
> > diff --git a/NEWS b/NEWS
> > index 1879b735e6..98aa362444 100644
> > --- a/NEWS
> > +++ b/NEWS
> > @@ -29,6 +29,13 @@ The following bugs are resolved with this release:
> >    [21778] Robust mutex may deadlock
> >    [21972] assert macro requires operator== (int) for its argument type
> >    [22322] libc: [mips64] wrong bits/long-double.h installed
> > +
> > +Security related changes:
> > +
> > +  CVE-2017-15670: The glob function, when invoked with GLOB_TILDE, suffered
> > +  from a one-byte overflow during ~ operator processing (either on the stack
> > +  or the heap, depending on the length of the user name).
> > +
> >  \f
> >  Version 2.25
> >  
> 
> I'd like to apply the following fix on top of it:
> 
> Subject: [PATCH] NEWS: merge two sections about security related changes in 2.25.1
> 
> Commit glibc-2.25-70-g717743bb07471f95bef6ea63d9b12848ad91aaf6
> introduced a second "Security related changes" section for 2.25.1.
> Merge them back into a single section.
> ---
>  NEWS | 11 ++++-------
>  1 file changed, 4 insertions(+), 7 deletions(-)
> 
> diff --git a/NEWS b/NEWS
> index 0a8f20e..d047d96 100644
> --- a/NEWS
> +++ b/NEWS
> @@ -12,6 +12,10 @@ Security related changes:
>  * The DNS stub resolver limits the advertised UDP buffer size to 1200 bytes,
>    to avoid fragmentation-based spoofing attacks.
>  
> +  CVE-2017-15670: The glob function, when invoked with GLOB_TILDE, suffered
> +  from a one-byte overflow during ~ operator processing (either on the stack
> +  or the heap, depending on the length of the user name).
> +
>    CVE-2017-15671: The glob function, when invoked with GLOB_TILDE,
>    would sometimes fail to free memory allocated during ~ operator
>    processing, leading to a memory leak and, potentially, to a denial
> @@ -38,13 +42,6 @@ The following bugs are resolved with this release:
>    [21778] Robust mutex may deadlock
>    [21972] assert macro requires operator== (int) for its argument type
>    [22322] libc: [mips64] wrong bits/long-double.h installed
> -
> -Security related changes:
> -
> -  CVE-2017-15670: The glob function, when invoked with GLOB_TILDE, suffered
> -  from a one-byte overflow during ~ operator processing (either on the stack
> -  or the heap, depending on the length of the user name).
> -
>  \f
>  Version 2.25

Oops, I clearly failed to merge NEWS correctly, sorry about the mess.
The patch looks all good to me, thanks for noticing and fixing that.

-- 
Aurelien Jarno                          GPG: 4096R/1DDD8C9B
aurelien@aurel32.net                 http://www.aurel32.net

  reply	other threads:[~2017-12-15 11:30 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-01-01  0:00 [COMMITTED 2.25 1/8] i386: Hide __old_glob64 [BZ #18822] Aurelien Jarno
2017-01-01  0:00 ` [COMMITTED 2.25 8/8] Update NEWS to add CVE-2017-15804 entry Aurelien Jarno
2017-01-01  0:00 ` [COMMITTED 2.25 5/8] Update NEWS and ChangeLog for CVE-2017-15671 Aurelien Jarno
2017-01-01  0:00 ` [COMMITTED 2.25 4/8] glob: Add new test tst-glob-tilde Aurelien Jarno
2017-01-01  0:00 ` [COMMITTED 2.25 7/8] posix/tst-glob-tilde.c: Add test for bug 22332 Aurelien Jarno
2017-01-01  0:00 ` [COMMITTED 2.25 3/8] CVE-2017-15670: glob: Fix one-byte overflow [BZ #22320] Aurelien Jarno
2017-01-01  0:00   ` Dmitry V. Levin
2017-01-01  0:00     ` Aurelien Jarno [this message]
2017-01-01  0:00 ` [COMMITTED 2.25 6/8] glob: Fix buffer overflow during GLOB_TILDE unescaping [BZ #22332] Aurelien Jarno
2017-01-01  0:00 ` [COMMITTED 2.25 2/8] posix: Sync glob with gnulib [BZ #1062] Aurelien Jarno

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20171215113001.GA9955@aurel32.net \
    --to=aurelien@aurel32.net \
    --cc=ldv@altlinux.org \
    --cc=libc-stable@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).