It was found that out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information. Upstream bug: https://sourceware.org/bugzilla/show_bug.cgi?id=18985 CVE assignment: http://seclists.org/oss-sec/2016/q1/153
Created glibc tracking bugs for this issue: Affects: fedora-all [bug 1300300]
Upstream commit at: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=d36c75fc0d44deec29635dd239b0fbd206ca49b7
Public reproducer available at: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blob_plain;f=time/tst-strftime.c;h=af3ff72faf9588126fb269b0e9080357c32b5fcb;hb=d36c75fc0d44deec29635dd239b0fbd206ca49b7
Mitigation: Check time values before they are passed to strftime, or call strftime only with struct tm values computed by gmtime or localtime.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0680 https://rhn.redhat.com/errata/RHSA-2017-0680.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1916 https://access.redhat.com/errata/RHSA-2017:1916