diff options
author | Arjun Shankar <arjun@redhat.com> | 2024-01-30 19:29:45 +0100 |
---|---|---|
committer | Arjun Shankar <arjun@redhat.com> | 2024-01-30 19:32:59 +0100 |
commit | 6cdc44214253a74e7140d75a7ebfc900820a5fa8 (patch) | |
tree | 5b9cf90eaed0208c949ef05b821427632905c822 | |
parent | ddf542da94caf97ff43cc2875c88749880b7259b (diff) | |
download | glibc-6cdc44214253a74e7140d75a7ebfc900820a5fa8.zip glibc-6cdc44214253a74e7140d75a7ebfc900820a5fa8.tar.gz glibc-6cdc44214253a74e7140d75a7ebfc900820a5fa8.tar.bz2 |
Document CVE-2023-6246, CVE-2023-6779, and CVE-2023-6780
This commit adds "advisories" entries for the above three CVEs.
-rw-r--r-- | advisories/GLIBC-SA-2024-0001 | 15 | ||||
-rw-r--r-- | advisories/GLIBC-SA-2024-0002 | 15 | ||||
-rw-r--r-- | advisories/GLIBC-SA-2024-0003 | 13 |
3 files changed, 43 insertions, 0 deletions
diff --git a/advisories/GLIBC-SA-2024-0001 b/advisories/GLIBC-SA-2024-0001 new file mode 100644 index 0000000..28931c7 --- /dev/null +++ b/advisories/GLIBC-SA-2024-0001 @@ -0,0 +1,15 @@ +syslog: Heap buffer overflow in __vsyslog_internal + +__vsyslog_internal did not handle a case where printing a SYSLOG_HEADER +containing a long program name failed to update the required buffer +size, leading to the allocation and overflow of a too-small buffer on +the heap. + +CVE-Id: CVE-2023-6246 +Public-Date: 2024-01-30 +Vulnerable-Commit: 52a5be0df411ef3ff45c10c7c308cb92993d15b1 (2.37) +Fix-Commit: 6bd0e4efcc78f3c0115e5ea9739a1642807450da (2.39) +Fix-Commit: 23514c72b780f3da097ecf33a793b7ba9c2070d2 (2.38-42) +Fix-Commit: 97a4292aa4a2642e251472b878d0ec4c46a0e59a (2.37-57) +Vulnerable-Commit: b0e7888d1fa2dbd2d9e1645ec8c796abf78880b9 (2.36-16) +Fix-Commit: d1a83b6767f68b3cb5b4b4ea2617254acd040c82 (2.36-126) diff --git a/advisories/GLIBC-SA-2024-0002 b/advisories/GLIBC-SA-2024-0002 new file mode 100644 index 0000000..940bfcf --- /dev/null +++ b/advisories/GLIBC-SA-2024-0002 @@ -0,0 +1,15 @@ +syslog: Heap buffer overflow in __vsyslog_internal + +__vsyslog_internal used the return value of snprintf/vsnprintf to +calculate buffer sizes for memory allocation. If these functions (for +any reason) failed and returned -1, the resulting buffer would be too +small to hold output. + +CVE-Id: CVE-2023-6779 +Public-Date: 2024-01-30 +Vulnerable-Commit: 52a5be0df411ef3ff45c10c7c308cb92993d15b1 (2.37) +Fix-Commit: 7e5a0c286da33159d47d0122007aac016f3e02cd (2.39) +Fix-Commit: d0338312aace5bbfef85e03055e1212dd0e49578 (2.38-43) +Fix-Commit: 67062eccd9a65d7fda9976a56aeaaf6c25a80214 (2.37-58) +Vulnerable-Commit: b0e7888d1fa2dbd2d9e1645ec8c796abf78880b9 (2.36-16) +Fix-Commit: 2bc9d7c002bdac38b5c2a3f11b78e309d7765b83 (2.36-127) diff --git a/advisories/GLIBC-SA-2024-0003 b/advisories/GLIBC-SA-2024-0003 new file mode 100644 index 0000000..b43a515 --- /dev/null +++ b/advisories/GLIBC-SA-2024-0003 @@ -0,0 +1,13 @@ +syslog: Integer overflow in __vsyslog_internal + +__vsyslog_internal calculated a buffer size by adding two integers, but +did not first check if the addition would overflow. + +CVE-Id: CVE-2023-6780 +Public-Date: 2024-01-30 +Vulnerable-Commit: 52a5be0df411ef3ff45c10c7c308cb92993d15b1 (2.37) +Fix-Commit: ddf542da94caf97ff43cc2875c88749880b7259b (2.39) +Fix-Commit: d37c2b20a4787463d192b32041c3406c2bd91de0 (2.38-44) +Fix-Commit: 2b58cba076e912961ceaa5fa58588e4b10f791c0 (2.37-59) +Vulnerable-Commit: b0e7888d1fa2dbd2d9e1645ec8c796abf78880b9 (2.36-16) +Fix-Commit: b9b7d6a27aa0632f334352fa400771115b3c69b7 (2.36-128) |