From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 9BB4CE77374 for ; Sat, 30 Sep 2023 14:19:58 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id 42E9581099; Sat, 30 Sep 2023 14:19:58 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 42E9581099 X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lt1ABbVGFf0M; Sat, 30 Sep 2023 14:19:57 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by smtp1.osuosl.org (Postfix) with ESMTP id 743B68109A; Sat, 30 Sep 2023 14:19:56 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 743B68109A Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by ash.osuosl.org (Postfix) with ESMTP id 9F07A1BF2A3 for ; Sat, 30 Sep 2023 14:19:54 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 878A960F10 for ; Sat, 30 Sep 2023 14:19:54 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 878A960F10 X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3zABH5UI_nY5 for ; Sat, 30 Sep 2023 14:19:53 +0000 (UTC) Received: from relay6-d.mail.gandi.net (relay6-d.mail.gandi.net [IPv6:2001:4b98:dc4:8::226]) by smtp3.osuosl.org (Postfix) with ESMTPS id 1F85760F0F for ; Sat, 30 Sep 2023 14:19:52 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 1F85760F0F Received: by mail.gandi.net (Postfix) with ESMTPSA id 2DFC9C0004; Sat, 30 Sep 2023 14:19:50 +0000 (UTC) Received: from peko by dell.home with local (Exim 4.94.2) (envelope-from ) id 1qmaow-00Ezqr-ER; Sat, 30 Sep 2023 16:19:50 +0200 From: Peter Korsgaard To: buildroot@buildroot.org References: <20230929214441.2090519-1-peter@korsgaard.com> Date: Sat, 30 Sep 2023 16:19:50 +0200 In-Reply-To: <20230929214441.2090519-1-peter@korsgaard.com> (Peter Korsgaard's message of "Fri, 29 Sep 2023 23:44:41 +0200") Message-ID: <87il7ragl5.fsf@48ers.dk> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 X-GND-Sasl: peter@korsgaard.com Subject: Re: [Buildroot] [PATCH-2023.08.x] package/{glibc, localedef}: security bump to 2.37-43 X-BeenThere: buildroot@buildroot.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Romain Naour , Thomas Petazzoni Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: buildroot-bounces@buildroot.org Sender: "buildroot" >>>>> "Peter" == Peter Korsgaard writes: > Fixes the following security issues: > CVE-2023-25139: When the printf family of functions is called with a > format specifier that uses an (enable grouping) and a > minimum width specifier, the resulting output could be larger than > reasonably expected by a caller that computed a tight bound on the > buffer size. The resulting larger than expected output could result > in a buffer overflow in the printf family of functions. > CVE-2023-4527: If the system is configured in no-aaaa mode via > /etc/resolv.conf, getaddrinfo is called for the AF_UNSPEC address > family, and a DNS response is received over TCP that is larger than > 2048 bytes, getaddrinfo may potentially disclose stack contents via > the returned address data, or crash. > CVE-2023-4806: When an NSS plugin only implements the > _gethostbyname2_r and _getcanonname_r callbacks, getaddrinfo could use > memory that was freed during buffer resizing, potentially causing a > crash or read or write to arbitrary memory. > CVE-2023-5156: The fix for CVE-2023-4806 introduced a memory leak when > an application calls getaddrinfo for AF_INET6 with AI_CANONNAME, > AI_ALL and AI_V4MAPPED flags set. > Signed-off-by: Peter Korsgaard Committed to 2023.08.x, thanks. -- Bye, Peter Korsgaard _______________________________________________ buildroot mailing list buildroot@buildroot.org https://lists.buildroot.org/mailman/listinfo/buildroot