clone 681473 -1
retitle 681473 CVE-2012-3404 CVE-2012-3405
retitle -1 CVE-2012-3406
thanks

On Fri, Jul 13, 2012 at 03:41:23PM +0200, Moritz Muehlenhoff wrote:
> Package: eglibc
> Severity: important
> Tags: security
> 
> Hi,
> please see http://www.openwall.com/lists/oss-security/2012/07/11/17 for 
> details
> and references to upstream patches.
> 
> The security impact is rather low IMO; if the format strings are under control
> of a attacker, this opens a whole can of worms anyway.
> 
> Still, it would be nice to get these fixed for Wheezy and for Squeeze in a 
> point
> update.
> 

I'll add the patches for CVE-2012-3404 and CVE-2012-3405 as they come
from upstream and look correct. For CVE-2012-3406 RedHat, as usual, 
hasn't submitted the patch upstream and thus it hasn't been reviewed. I
have looked at it quickly and I have to say I don't really like it. 
Replacing a call to alloca() by a call to malloc() without checking the
return value is only a small improvement when the attacker can control
the allocation size. Also it means the attacker can DoS the system or 
crash the program. To finish malloc() + memmove() + free() is not the 
best way to reallocate big chunks of memory when realloc() exists.

I am therefore not planning to apply this patch in the current state,
and thus I am cloning this bug to keep this CVE entry separated from the
others.

-- 
Aurelien Jarno                          GPG: 1024D/F1BCDB73
aurel...@aurel32.net                 http://www.aurel32.net


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to