Bug 1522830 (CVE-2017-1000409)

Summary: CVE-2017-1000409 glibc: Buffer overflow triggerable via LD_LIBRARY_PATH
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aoliva, arjun.is, ashankar, codonell, dj, fweimer, glibc-bugzilla, law, mfabian, mnewsome, pfrankli, rth, security-response-team, siddhesh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: glibc 2.27 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-12-12 12:41:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1524867    
Bug Blocks: 1522835    

Description Andrej Nemec 2017-12-06 14:29:04 UTC
It was found that a buffer overflow can be triggered through the LD_LIBRARY_PATH environment variable.

Comment 1 Andrej Nemec 2017-12-06 14:29:09 UTC
Acknowledgments:

Name: Qualys Research Labs

Comment 2 Andrej Nemec 2017-12-12 09:23:16 UTC
Public via:

http://seclists.org/oss-sec/2017/q4/385

Comment 3 Andrej Nemec 2017-12-12 09:24:30 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 1524867]

Comment 4 Raphael Sanchez Prudencio 2017-12-12 13:10:19 UTC
Statement:

This issue did not affect the versions of glibc as shipped with Red Hat Enterprise Linux 5, 6 and 7 after CVE-2017-1000366 fix:

https://access.redhat.com/security/cve/cve-2017-1000366