From patchwork Mon May 6 19:13:42 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Carlos O'Donell X-Patchwork-Id: 1932141 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=LKD4wxYj; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=sourceware.org (client-ip=8.43.85.97; helo=server2.sourceware.org; envelope-from=libc-alpha-bounces+incoming=patchwork.ozlabs.org@sourceware.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VYB0n02JHz1xnT for ; Tue, 7 May 2024 05:14:16 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 667B73858424 for ; Mon, 6 May 2024 19:14:14 +0000 (GMT) X-Original-To: libc-alpha@sourceware.org Delivered-To: libc-alpha@sourceware.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id 8BD343858D35 for ; Mon, 6 May 2024 19:13:54 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 8BD343858D35 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 8BD343858D35 Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1715022836; cv=none; b=IAsfvF+xPOQhL8xaMbW/BZNxxJsTarUxxeFjUTXNJ49ygc8wAebw79i3Tjt6u43dI5LptA5/+XBEIdTOTbyteXwexlx+2hJzRldtkSHQAlHssyIyKSzKNYEhqF2n1B+5wxx9hS1L4hOfIwNiSuZhEUl4fT/q95WEjfaEGWnXHfQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1715022836; c=relaxed/simple; bh=tVzwbv6KXl4u6CRJ4D3MZdDBaEIMCJ/ZsAt5HFGmwS0=; h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version; b=Ugm/TKg7+QyEM64XFyckKuOGI1BkEIKP9zzBcmRiRj5Tta9AHsqhuwPVsYMo6mT1Yg5YuUHH4qpnvQCaDk3rRfksofA2fSbuTgydVSVW5TtuRl+zj6q0hMuFmTDGb+SN+w98JS9dK6OQu12F22WiA1a7wunhtDi+djYoJgyRHco= ARC-Authentication-Results: i=1; server2.sourceware.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1715022834; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Ev0t+CPcHikE1eoz2RBcwDkVsjnSvphSPL4g45fuTAA=; b=LKD4wxYjQFIIoAosiXACnSxWhqodazhL3dgSEhx/Mg24O+MqK0G2Gyx2UKWS5GnMSGQz1x i2J5kARLVo8pGt7RyllZfKWMfwzjAq7LCGd41KYz0S5/TN+YCtJVFgwV4hN1ukyCvEH4Zv hOClkstjfIMpsiXfk20lLzNrnTn2/1Q= Received: from mail-qt1-f197.google.com (mail-qt1-f197.google.com [209.85.160.197]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-604-bheLEREcN52kZE1BLz-BHQ-1; Mon, 06 May 2024 15:13:53 -0400 X-MC-Unique: bheLEREcN52kZE1BLz-BHQ-1 Received: by mail-qt1-f197.google.com with SMTP id d75a77b69052e-43d39213aa3so24009761cf.0 for ; Mon, 06 May 2024 12:13:53 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715022832; x=1715627632; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Ev0t+CPcHikE1eoz2RBcwDkVsjnSvphSPL4g45fuTAA=; b=BPHQ5UAMbeHGWVrtZ9RytsYyKT8CFtuijK68Y9QxC9sqCCA6mcJDrfXx8P5PWznkzf SExkp3vFg72bl2zkmuLuuEsjaweE3Z8kECL7dfOqv4LUFxRETtI1jhV5TnuXFeJ/ulPP G9SIBRy+gnwkBSuMp0yTDRjr/RY2vf0BuYvBHNvPz30B07Qjw2WsADC2elL3BeX8ifPJ 0X/czAJErsIkF6FtvXun1S4oEqObD2c5P9ZGdUDRSjWVyq6o545dEyakZUXgjXYyshH4 PkVg3Az0QmTEbIJ66zDtZdu+AVN3cva4NA0X/k1CeO8J/rFpXjBpqBOexRYsQnewnUWm 6Oyw== X-Gm-Message-State: AOJu0YxIvniIji4lyqLh8I0uHs7kqdElvB0LNehBsPY6123EsSGPtc54 VS+I1/gX5DQQH0drP+lOBndJ+70cuVLkAeEmpHlLUgiOgpULOQ6FMKVn77RojeKiMFTURbywcr8 8VESL6cnleiPyizhsAr63PI7CjJNoz4qyk9wN1uEwVMhxGkrPVuZzzLbnuo82waZTtqSkXcxGzK W6rXHVHo1r9EdRe+za6VEqWjCLz23Esyzzj1cVp8k= X-Received: by 2002:ac8:5f83:0:b0:43a:bda4:dd62 with SMTP id j3-20020ac85f83000000b0043abda4dd62mr12431239qta.8.1715022832056; Mon, 06 May 2024 12:13:52 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGPtFmenC8A0zo1HGpzDpyS0t8rFnpZSUANAKguITMRNXOIPhUdfavmq8zPk/tLp7aML5KZqg== X-Received: by 2002:ac8:5f83:0:b0:43a:bda4:dd62 with SMTP id j3-20020ac85f83000000b0043abda4dd62mr12431198qta.8.1715022831317; Mon, 06 May 2024 12:13:51 -0700 (PDT) Received: from athas.redhat.com ([198.48.244.52]) by smtp.gmail.com with ESMTPSA id bs18-20020ac86f12000000b00434ee466ea6sm5423308qtb.22.2024.05.06.12.13.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 May 2024 12:13:50 -0700 (PDT) From: Carlos O'Donell To: libc-alpha@sourceware.org Cc: Carlos O'Donell , Siddhesh Poyarekar Subject: [COMMITTED 1/2] Document CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 Date: Mon, 6 May 2024 15:13:42 -0400 Message-ID: <20240506191349.125994-1-carlos@redhat.com> X-Mailer: git-send-email 2.44.0 MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-type: text/plain; charset=UTF-8 X-Spam-Status: No, score=-12.2 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, KAM_LOTSOFHASH, KAM_NUMSUBJECT, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H4, RCVD_IN_MSPIKE_WL, SPF_HELO_NONE, SPF_NONE, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: libc-alpha-bounces+incoming=patchwork.ozlabs.org@sourceware.org This commit adds advisory data for the above CVE(s). Reviewed-by: Siddhesh Poyarekar --- advisories/GLIBC-SA-2024-0005 | 22 ++++++++++++++++++++++ advisories/GLIBC-SA-2024-0006 | 32 ++++++++++++++++++++++++++++++++ advisories/GLIBC-SA-2024-0007 | 28 ++++++++++++++++++++++++++++ advisories/GLIBC-SA-2024-0008 | 26 ++++++++++++++++++++++++++ 4 files changed, 108 insertions(+) create mode 100644 advisories/GLIBC-SA-2024-0005 create mode 100644 advisories/GLIBC-SA-2024-0006 create mode 100644 advisories/GLIBC-SA-2024-0007 create mode 100644 advisories/GLIBC-SA-2024-0008 diff --git a/advisories/GLIBC-SA-2024-0005 b/advisories/GLIBC-SA-2024-0005 new file mode 100644 index 0000000000..a59596610a --- /dev/null +++ b/advisories/GLIBC-SA-2024-0005 @@ -0,0 +1,22 @@ +nscd: Stack-based buffer overflow in netgroup cache + +If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted +by client requests then a subsequent client request for netgroup data +may result in a stack-based buffer overflow. This flaw was introduced +in glibc 2.15 when the cache was added to nscd. + +This vulnerability is only present in the nscd binary. + +CVE-Id: CVE-2024-33599 +Public-Date: 2024-04-23 +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) +Fix-Commit: 69c58d5ef9f584ea198bd00f7964d364d0e6b921 (2.31-155) +Fix-Commit: a77064893bfe8a701770e2f53a4d33805bc47a5a (2.32-141) +Fix-Commit: 5c75001a96abcd50cbdb74df24c3f013188d076e (2.33-264) +Fix-Commit: 52f73e5c4e29b14e79167272297977f360ae1e97 (2.34-460) +Fix-Commit: 7a95873543ce225376faf13bb71c43dea6d24f86 (2.35-316) +Fix-Commit: caa3151ca460bdd9330adeedd68c3112d97bffe4 (2.36-165) +Fix-Commit: f75c298e747b2b8b41b1c2f551c011a52c41bfd1 (2.37-91) +Fix-Commit: 5968aebb86164034b8f8421b4abab2f837a5bdaf (2.38-72) +Fix-Commit: 1263d583d2e28afb8be53f8d6922f0842036f35d (2.39-35) +Fix-Commit: 87801a8fd06db1d654eea3e4f7626ff476a9bdaa (2.40) diff --git a/advisories/GLIBC-SA-2024-0006 b/advisories/GLIBC-SA-2024-0006 new file mode 100644 index 0000000000..d44148d3d9 --- /dev/null +++ b/advisories/GLIBC-SA-2024-0006 @@ -0,0 +1,32 @@ +nscd: Null pointer crash after notfound response + +If the Name Service Cache Daemon's (nscd) cache fails to add a not-found +netgroup response to the cache, the client request can result in a null +pointer dereference. This flaw was introduced in glibc 2.15 when the +cache was added to nscd. + +This vulnerability is only present in the nscd binary. + +CVE-Id: CVE-2024-33600 +Public-Date: 2024-04-24 +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) +Fix-Commit: b048a482f088e53144d26a61c390bed0210f49f2 (2.40) +Fix-Commit: 7835b00dbce53c3c87bbbb1754a95fb5e58187aa (2.40) +Fix-Commit: c99f886de54446cd4447db6b44be93dabbdc2f8b (2.39-37) +Fix-Commit: 5a508e0b508c8ad53bd0d2fb48fd71b242626341 (2.39-36) +Fix-Commit: 2ae9446c1b7a3064743b4a51c0bbae668ee43e4c (2.38-74) +Fix-Commit: 541ea5172aa658c4bd5c6c6d6fd13903c3d5bb0a (2.38-73) +Fix-Commit: a8070b31043c7585c36ba68a74298c4f7af075c3 (2.37-93) +Fix-Commit: 5eea50c4402e39588de98aa1d4469a79774703d4 (2.37-92) +Fix-Commit: f205b3af56740e3b014915b1bd3b162afe3407ef (2.36-167) +Fix-Commit: c34f470a615b136170abd16142da5dd0c024f7d1 (2.36-166) +Fix-Commit: bafadc589fbe21ae330e8c2af74db9da44a17660 (2.35-318) +Fix-Commit: 4370bef52b0f3f3652c6aa13d7a9bb3ac079746d (2.35-317) +Fix-Commit: 1f94122289a9bf7dba573f5d60327aaa2b85cf2e (2.34-462) +Fix-Commit: 966d6ac9e40222b84bb21674cc4f83c8d72a5a26 (2.34-461) +Fix-Commit: e3eef1b8fbdd3a7917af466ca9c4b7477251ca79 (2.33-266) +Fix-Commit: f20a8d696b13c6261b52a6434899121f8b19d5a7 (2.33-265) +Fix-Commit: be602180146de37582a3da3a0caa4b719645de9c (2.32-143) +Fix-Commit: 394eae338199078b7961b051c191539870742d7b (2.32-142) +Fix-Commit: 8d7949183760170c61e55def723c1d8050187874 (2.31-157) +Fix-Commit: 304ce5fe466c4762b21b36c26926a4657b59b53e (2.31-156) diff --git a/advisories/GLIBC-SA-2024-0007 b/advisories/GLIBC-SA-2024-0007 new file mode 100644 index 0000000000..b6928fa27a --- /dev/null +++ b/advisories/GLIBC-SA-2024-0007 @@ -0,0 +1,28 @@ +nscd: netgroup cache may terminate daemon on memory allocation failure + +The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or +xrealloc and these functions may terminate the process due to a memory +allocation failure resulting in a denial of service to the clients. The +flaw was introduced in glibc 2.15 when the cache was added to nscd. + +This vulnerability is only present in the nscd binary. + +Subsequent refactoring of the netgroup cache only added more uses of +xmalloc and xrealloc. Uses of xmalloc and xrealloc in other parts of +nscd only occur during startup of the daemon and so are not affected by +client requests that could trigger an out of memory followed by +termination. + +CVE-Id: CVE-2024-33601 +Public-Date: 2024-04-24 +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) +Fix-Commit: c04a21e050d64a1193a6daab872bca2528bda44b (2.40) +Fix-Commit: a9a8d3eebb145779a18d90e3966009a1daa63cd8 (2.39-38) +Fix-Commit: 71af8ca864345d39b746d5cee84b94b430fad5db (2.38-75) +Fix-Commit: 6e106dc214d6a033a4e945d1c6cf58061f1c5f1f (2.37-94) +Fix-Commit: b6742463694b1dfdd5120b91ee21cf05d15ec2e2 (2.36-168) +Fix-Commit: 7a5864cac60e06000394128a5a2817b03542f5a3 (2.35-319) +Fix-Commit: 86f1d5f4129c373ac6fb6df5bcf38273838843cb (2.34-463) +Fix-Commit: 4d27d4b9a188786fc6a56745506cec2acfc51f83 (2.33-267) +Fix-Commit: 3ed195a8ec89da281e3c4bf887a13d281b72d8f4 (2.32-144) +Fix-Commit: bbf5a58ccb55679217f94de706164d15372fbbc0 (2.31-158) diff --git a/advisories/GLIBC-SA-2024-0008 b/advisories/GLIBC-SA-2024-0008 new file mode 100644 index 0000000000..d93e2a6f0b --- /dev/null +++ b/advisories/GLIBC-SA-2024-0008 @@ -0,0 +1,26 @@ +nscd: netgroup cache assumes NSS callback uses in-buffer strings + +The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory +when the NSS callback does not store all strings in the provided buffer. +The flaw was introduced in glibc 2.15 when the cache was added to nscd. + +This vulnerability is only present in the nscd binary. + +There is no guarantee from the NSS callback API that the returned +strings are all within the buffer. However, the netgroup cache code +assumes that the NSS callback uses in-buffer strings and if it doesn't +the buffer resizing logic could lead to potential memory corruption. + +CVE-Id: CVE-2024-33602 +Public-Date: 2024-04-24 +Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15) +Fix-Commit: c04a21e050d64a1193a6daab872bca2528bda44b (2.40) +Fix-Commit: a9a8d3eebb145779a18d90e3966009a1daa63cd8 (2.39-38) +Fix-Commit: 71af8ca864345d39b746d5cee84b94b430fad5db (2.38-75) +Fix-Commit: 6e106dc214d6a033a4e945d1c6cf58061f1c5f1f (2.37-94) +Fix-Commit: b6742463694b1dfdd5120b91ee21cf05d15ec2e2 (2.36-168) +Fix-Commit: 7a5864cac60e06000394128a5a2817b03542f5a3 (2.35-319) +Fix-Commit: 86f1d5f4129c373ac6fb6df5bcf38273838843cb (2.34-463) +Fix-Commit: 4d27d4b9a188786fc6a56745506cec2acfc51f83 (2.33-267) +Fix-Commit: 3ed195a8ec89da281e3c4bf887a13d281b72d8f4 (2.32-144) +Fix-Commit: bbf5a58ccb55679217f94de706164d15372fbbc0 (2.31-158) From patchwork Mon May 6 19:13:43 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Carlos O'Donell X-Patchwork-Id: 1932142 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=SQxVRi6E; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=sourceware.org (client-ip=2620:52:3:1:0:246e:9693:128c; helo=server2.sourceware.org; envelope-from=libc-alpha-bounces+incoming=patchwork.ozlabs.org@sourceware.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VYB1V6CbXz1xnT for ; Tue, 7 May 2024 05:14:54 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id ECFA63858D1E for ; Mon, 6 May 2024 19:14:52 +0000 (GMT) X-Original-To: libc-alpha@sourceware.org Delivered-To: libc-alpha@sourceware.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by sourceware.org (Postfix) with ESMTPS id D98733858D39 for ; Mon, 6 May 2024 19:13:57 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org D98733858D39 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org D98733858D39 Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=170.10.129.124 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1715022839; cv=none; b=h90kZUlOETsPRwY6vOQ6/N+iR8YYGBkMF9xTt/zIhms1pXU7ZI2riRa0i6QKg2cI2mR8spwoL9dZf8RiEeOvxhOzSkZgCC3DDvmtZhbcsjobZl2Cvtp0xHJbdlS92E+muQ3pw94ftAormqIWE3VEQkP7kEnmeEF5QWyyZ6rb5EI= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1715022839; c=relaxed/simple; bh=v3jfXTvfmmfgyWyXXEjKKJfZN4YyuD4wQv5M6KUWT6s=; h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version; b=vo4I8T5OBUWb2UlMk8EvmGjuBeIF3vzj8phsrCINF3dGtplqbllCrY0t05HZ2uN5zKLHMt6t22ebcDZKO2GjJiMlTbHa/ggYeoRUB/fbi2N0diaO1NbXZCgjU1OVXhSlCvjsvJTgjbikxy0rBwXRG5x578hnG4XT5mpr2W7HfJQ= ARC-Authentication-Results: i=1; server2.sourceware.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1715022837; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=1h2ZaskKc7ZDgcl7UC9qGt68F5Qr6Bu2mRemtdYu3DI=; b=SQxVRi6E79TnhvnRXoJEmHGbczB6KJj7Kkv7/bcBDmUUFactwi1FuaC8nLoOMMDx2VKoZ3 hRS+uCRZgl+yX4L203z7I08smC64iGU1W7RQeF8WlUg7z6hG5IIFItMiXjJMwzPiCTuD+I zc4FW3Zh//3Wl1SDZKsYAnOndYf6H4s= Received: from mail-yw1-f200.google.com (mail-yw1-f200.google.com [209.85.128.200]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-219-fTCXGN-zPoauzbsxCngTOA-1; Mon, 06 May 2024 15:13:55 -0400 X-MC-Unique: fTCXGN-zPoauzbsxCngTOA-1 Received: by mail-yw1-f200.google.com with SMTP id 00721157ae682-61c9675ae5aso44330487b3.0 for ; Mon, 06 May 2024 12:13:54 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715022834; x=1715627634; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=1h2ZaskKc7ZDgcl7UC9qGt68F5Qr6Bu2mRemtdYu3DI=; b=Uf3YHSB+kuLVOEpc+eYnsseNAuZxN8yrOJbTSoJmzlRpSHOOYIDzVroE6iCOVIiMO1 dbPfG6HJGltnAk4PIlrf1TgZP01A6RUcGQFtbR/tIAGlv7V3HVgbiHhz8F+KaO3/UA79 aW3jjHSoGIxS67DQ7C3c1fo9HsvuuIuh8sOX/iKKamEtka6RSjSBgLwngPsm8EJG8fHj SvFcS4d46qyryvTPr1H7V71vWPY6hWtx8/a33blcxbnZJ2YZbnhUt1OTPFTsVwNAXr56 5hrbEEK9TaE+IhEWGYjYEQHq4Sxag0SlUndjDs3VpeYP+7+hSE3hYFbiTYDm3dgo5xTR Rz+g== X-Gm-Message-State: AOJu0YwhQRth6eyMelx3SJywhkT5d2Dgv1xuAWLMuG+TmZVHeTREyvXL w3o3ICDDCcLGMRTg3JKH4TzLLrelUtuudmhdAzIAFOF1yWDnKZueLH54fjJ/gnrj4+QADbjB9vK JaojeQ0irt4RTrDloWQHQAku0uHtY5b008uw5utMia2eq7S4qxXbdoRkmHytuHlAGLUm6dZ4VTv UHBU7bSoEGwTWWwbrKGymhUBs4tWBF/HrmOEn5cFY= X-Received: by 2002:a25:b291:0:b0:dcf:3580:8bc3 with SMTP id k17-20020a25b291000000b00dcf35808bc3mr10616793ybj.23.1715022834014; Mon, 06 May 2024 12:13:54 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFWCS8mJdG3B13oApMOvrDRkg1hS/Swb8n2TnRzJKSmuTPZsIvwcJ67YFt2GLlanZjB1NXbPg== X-Received: by 2002:a25:b291:0:b0:dcf:3580:8bc3 with SMTP id k17-20020a25b291000000b00dcf35808bc3mr10616771ybj.23.1715022833483; Mon, 06 May 2024 12:13:53 -0700 (PDT) Received: from athas.redhat.com ([198.48.244.52]) by smtp.gmail.com with ESMTPSA id bs18-20020ac86f12000000b00434ee466ea6sm5423308qtb.22.2024.05.06.12.13.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 May 2024 12:13:52 -0700 (PDT) From: Carlos O'Donell To: libc-alpha@sourceware.org Cc: Carlos O'Donell , Siddhesh Poyarekar Subject: [COMMITTED 2/2] NEWS: Add advisories. Date: Mon, 6 May 2024 15:13:43 -0400 Message-ID: <20240506191349.125994-2-carlos@redhat.com> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20240506191349.125994-1-carlos@redhat.com> References: <20240506191349.125994-1-carlos@redhat.com> MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-type: text/plain; charset=UTF-8 X-Spam-Status: No, score=-12.6 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H4, RCVD_IN_MSPIKE_WL, SPF_HELO_NONE, SPF_NONE, TXREP autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: libc-alpha-bounces+incoming=patchwork.ozlabs.org@sourceware.org GLIBC-SA-2024-0004: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (CVE-2024-2961) GLIBC-SA-2024-0005: nscd: Stack-based buffer overflow in netgroup cache (CVE-2024-33599) GLIBC-SA-2024-0006: nscd: Null pointer crashes after notfound response (CVE-2024-33600) GLIBC-SA-2024-0007: nscd: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) GLIBC-SA-2024-0008: nscd: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) Reviewed-by: Siddhesh Poyarekar --- NEWS | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/NEWS b/NEWS index cf6078cf20..2234021a95 100644 --- a/NEWS +++ b/NEWS @@ -177,6 +177,25 @@ found in the advisories directory of the release tarball: GLIBC-SA-2024-0003: syslog: Integer overflow in __vsyslog_internal (CVE-2023-6780) + GLIBC-SA-2024-0004: + ISO-2022-CN-EXT: fix out-of-bound writes when writing escape + sequence (CVE-2024-2961) + + GLIBC-SA-2024-0005: + nscd: Stack-based buffer overflow in netgroup cache (CVE-2024-33599) + + GLIBC-SA-2024-0006: + nscd: Null pointer crashes after notfound response + (CVE-2024-33600) + + GLIBC-SA-2024-0007: + nscd: netgroup cache may terminate daemon on memory allocation + failure (CVE-2024-33601) + + GLIBC-SA-2024-0008: + nscd: netgroup cache assumes NSS callback uses in-buffer strings + (CVE-2024-33602) + The following bugs are resolved with this release: [14522] localedata: fy_DE: LC_IDENTIFICATION data looks weird