[Git][security-tracker-team/security-tracker][master] 3 commits: Add CVE-2023-4911/glibc
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Oct 3 18:20:11 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3c4ad9da by Salvatore Bonaccorso at 2023-10-03T19:02:28+02:00
Add CVE-2023-4911/glibc
- - - - -
2ef48767 by Salvatore Bonaccorso at 2023-10-03T19:03:11+02:00
Track fixes glibc fixes previously pending for bookworm-pu
- - - - -
f7104b66 by Salvatore Bonaccorso at 2023-10-03T19:06:34+02:00
Add upstream commit reference for CVE-2023-4911
- - - - -
2 changed files:
- data/CVE/list
- data/next-point-update.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,8 @@
+CVE-2023-4911 [buffer overflow in dynamic loader's processing of the GLIBC_TUNABLES environment variable]
+ - glibc <unfixed>
+ [buster] - glibc <not-affected> (Vulnerable code introduced later)
+ NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=1056e5b4c3f2d90ed2b4a55f96add28da2f4c8fa
+ NOTE: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
CVE-2023-43789 [libXpm: out of bounds read on XPM with corrupted colormap]
- libxpm <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2023/10/03/1
@@ -2724,13 +2729,14 @@ CVE-2023-4813 (A flaw was found in glibc. In an uncommon situation, the gaih_ine
NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1c37b8022e8763fedbb3f79c02e05c6acfe5a215 (glibc-2.36)
CVE-2023-4806 (A flaw was found in glibc. In an extremely rare situation, the getaddr ...)
- glibc 2.37-10
- [bookworm] - glibc <no-dsa> (Minor issue)
+ [bookworm] - glibc 2.36-9+deb12u3
[bullseye] - glibc <no-dsa> (Minor issue)
[buster] - glibc <no-dsa> (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30843
NOTE: When fixing this issue in older releases make sure to not open CVE-2023-5156.
CVE-2023-4527 (A flaw was found in glibc. When the getaddrinfo function is called wit ...)
- glibc 2.37-9 (bug #1051958)
+ [bookworm] - glibc 2.36-9+deb12u3
[bullseye] - glibc <not-affected> (Vulnerable code not present)
[buster] - glibc <not-affected> (Vulnerable code not present)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30842
=====================================
data/next-point-update.txt
=====================================
@@ -57,10 +57,6 @@ CVE-2023-38039
[bookworm] - curl 7.88.1-10+deb12u3
CVE-2023-43770
[bookworm] - roundcube 1.6.3+dfsg-1~deb12u1
-CVE-2023-4527
- [bookworm] - glibc 2.36-9+deb12u2
-CVE-2023-4806
- [bookworm] - glibc 2.36-9+deb12u2
CVE-2023-38559
[bookworm] - ghostscript 10.0.0~dfsg-11+deb12u2
CVE-2023-43115
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/170cf61c22811f68a6ccea95598950302780ebab...f7104b6649fb096a878bc147c12bd2972c275066
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/170cf61c22811f68a6ccea95598950302780ebab...f7104b6649fb096a878bc147c12bd2972c275066
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231003/6248c00c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list