| Issue 364511: | Buffer overflow vulnerability in glibc | |
| 6 people starred this issue and may be notified of changes. | Back to list |
Sign in to add a comment
|
From Kostya:: we've got ASan detecting what looks like a vulnerability in glibc, 8-byte heap buffer overflow with user-controlled data. It was fixed a year ago, but still present in goobuntu. What should we do about that? Announcing it in a google-wide readable buganizer issue sounds wrong... ASan report: http://b.corp.google.com/issue?id=14129807 Upstream fix: https://sourceware.org/git/?p=glibc.git;a=commit;h=d5dd6189d506068ed11c8bfa1e1e9bffde04decd
Apr 17, 2014
#1
infe...@chromium.org
Apr 17, 2014
Assigning to our toolchain team. Luis, can you route this one? I'll still double-check that our glibc is affected (but it probably is).
Owner:
lloz...@chromium.org
Cc: jorg...@chromium.org vapier@chromium.org
Apr 17, 2014
sure. Han Shen will verify ASAP.
Owner:
shen...@chromium.org
Cc: lloz...@chromium.org bjanakir...@chromium.org
Apr 17, 2014
(No comment was entered for this change.)
Labels:
Build-Toolchain
Apr 17, 2014
Yup, just checked, we don't have the patch in ChromeOs. Am working on patching glibc.
Apr 17, 2014
(No comment was entered for this change.)
Owner:
yunl...@chromium.org
Apr 17, 2014
Thanks for jumping in on this!
Apr 18, 2014
Project: chromiumos/overlays/chromiumos-overlay Branch : master Author : Yunlian Jiang <yunlian@google.com> Commit : 7738d06627941a2119ba15f3472320c5cecc7be6 Code-Review 0 : Yunlian Jiang, chrome-internal-fetch Code-Review +2: Mike Frysinger Commit-Queue 0 : Mike Frysinger, chrome-internal-fetch Commit-Queue +1: Yunlian Jiang Verified 0 : Mike Frysinger, chrome-internal-fetch Verified +1: Yunlian Jiang Change-Id : I995d5b47b1d52bf4325a3a83bc24bbd2049f2dbe Reviewed-at : https://chromium-review.googlesource.com/195452 glibc: backport an nss overflow patch. This beckports a patch to fix a nss vulnerability inside glibc. BUG=chromium:364511 TEST=cbuildbot chromium_sdk, lumpy-release x86-generic-full. sys-libs/glibc/files/local/glibc-2.15-nss-buffer-overflow.patch sys-libs/glibc/glibc-2.15-r13.ebuild
May 19, 2014
(No comment was entered for this change.)
Status:
Fixed
May 27, 2014
keescook@ / jorgelo@ - Does ChromeOS use Milestone or Security Impact labels? I have a query that catches bugs that are missing these labels and wish to know whether I should dismiss any "OS-Chrome" bugs or harass you to add milestones and security impact labels where they are missing. Long sentence is long.
May 28, 2014
We should, but we haven't been exhaustive nor systematic when adding labels in the past. Harassing is better than dismissal.
May 28, 2014
Good to know. yunlian@ - What milestones / versions are affected by this bug?
May 28, 2014
I think all the versions before this fix are affected.
May 30, 2014
Speculatively adding labels based on c#13 - feel free to change the severity as you see fit.
Labels:
M-35 M-36 Security_Impact-Stable Security_Severity-High
Jun 6, 2014
Removing M-35 label - this won't make that release.
Labels:
-M-35
Jul 8, 2014
(No comment was entered for this change.)
Labels:
Release-0-M36
Aug 25, 2014
Bulk update: removing view restriction from closed bugs.
Labels:
-Restrict-View-SecurityTeam
Sep 17, 2014
(No comment was entered for this change.)
Status:
Verified
|
||||||||||
| ► Sign in to add a comment | |||||||||||