From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from ni.com (skprod2.natinst.com [130.164.80.23]) by mail.openembedded.org (Postfix) with ESMTP id B975560034 for ; Fri, 8 May 2015 15:47:36 +0000 (UTC) Received: from us-aus-mgwout1.amer.corp.natinst.com (nb-chan1-1338.natinst.com [130.164.19.134]) by us-aus-skprod2.natinst.com (8.15.0.59/8.15.0.59) with ESMTP id t48FlcbU002026 for ; Fri, 8 May 2015 10:47:38 -0500 Received: from harisdt.amer.corp.natinst.com ([130.164.14.198]) by us-aus-mgwout1.amer.corp.natinst.com (Lotus Domino Release 8.5.3FP6) with ESMTP id 2015050810473836-1101734 ; Fri, 8 May 2015 10:47:38 -0500 Message-ID: <554CDA9A.9050204@ni.com> Date: Fri, 08 May 2015 10:47:38 -0500 From: Haris Okanovic User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0 MIME-Version: 1.0 To: openembedded-core@lists.openembedded.org References: <1431040791-6559-1-git-send-email-haris.okanovic@ni.com> In-Reply-To: <1431040791-6559-1-git-send-email-haris.okanovic@ni.com> X-MIMETrack: Itemize by SMTP Server on US-AUS-MGWOut1/AUS/H/NIC(Release 8.5.3FP6|November 21, 2013) at 05/08/2015 10:47:38 AM, Serialize by Router on US-AUS-MGWOut1/AUS/H/NIC(Release 8.5.3FP6|November 21, 2013) at 05/08/2015 10:47:38 AM, Serialize complete at 05/08/2015 10:47:38 AM X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2015-05-08_06:, , signatures=0 Subject: Re: [PATCH 1/2] glibc: CVE-2015-1472: wscanf allocates too little memory X-BeenThere: openembedded-core@lists.openembedded.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Patches and discussions about the oe-core layer List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 May 2015 15:47:38 -0000 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=windows-1252; format=flowed On 05/07/2015 06:19 PM, Haris Okanovic wrote: > Backport Paul Pluzhnikov's glibc patch for CVE-2015-1472: > > Under certain conditions wscanf can allocate too little memory for the > to-be-scanned arguments and overflow the allocated buffer. The > implementation now correctly computes the required buffer size when > using malloc. > > https://sourceware.org/bugzilla/show_bug.cgi?id=16618 > > Signed-off-by: Haris Okanovic > Signed-off-by: Ken Sharp > Reviewed-by: Rich Tollerton > --- Note that this patch is to apply to the Dizzy branch of openembedded-core (glibc 2.20). It might cleanly apply to other branches also using glibc 2.20, but I've only tested with Dizzy. CVE-2015-1472 is fixed in glibc 2.21 and later. Thanks, Haris