Bug 1387961
| Summary: | CVE-2016-5180 c-ares: Single byte out of buffer write [RHEL-6] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Japheth Cleaver <cleaver-redhat> |
| Component: | c-ares | Assignee: | Jakub Hrozek <jhrozek> |
| Status: | CLOSED WONTFIX | QA Contact: | qe-baseos-daemons |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 6.9 | CC: | extras-qa, jhrozek, tcallawa |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1380466 | Environment: | |
| Last Closed: | 2017-11-14 21:16:43 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1380463 | ||
|
Description
Japheth Cleaver
2016-10-24 04:37:12 UTC
Product Security rated this as having Moderate security impact and currently does not plan to address this issue in RHEL products. Note that impact of this issue on RHEL is less severe than impact on ChromeOS. (In reply to Adam Mariš from comment #2) > Product Security rated this as having Moderate security impact and currently > does not plan to address this issue in RHEL products. Note that impact of > this issue on RHEL is less severe than impact on ChromeOS. While noted, this does lead to the strange result that it's fixed for EL5 and EL7 users, but not those on EL6. Furthermore, mingw-c-ares was updated in EL6, but the main c-ares package wasn't. This could easily lead to confusion. I understand the specific chain of reasoning for the EL6 package... But this is one of those cases where I'd ask that the team reconsider this, and either backport the patch or also perform the rebase here too. I'm sorry, but given that RHEL-6 in in Production Phase 3 and given the reasoning in comment #2, I'm closing this bug as WONTFIX. I understand the reasoning in comment #3, but I'm afraid we cannot fix bugs with this severity at this point of RHEL-6 lifecycle. |