This service will be undergoing maintenance at 00:00 UTC, 2016-08-01. It is expected to last about 1 hours
Bug 826943 - (CVE-2012-3406) CVE-2012-3406 glibc: printf() unbound alloca() usage in case of positional parameters + many format specs
CVE-2012-3406 glibc: printf() unbound alloca() usage in case of positional pa...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20120711,repor...
: Security
Depends On: 826947 833716 833717 833720 841318
Blocks: 822803
  Show dependency treegraph
 
Reported: 2012-05-31 05:38 EDT by Stefan Cornelius
Modified: 2015-07-31 02:51 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-07-18 12:41:44 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)
RHEL6 patch backports and test cases (963.40 KB, patch)
2012-06-27 05:12 EDT, Stefan Cornelius
no flags Details | Diff
RHEL5 patch backport and test case (962.96 KB, patch)
2012-06-27 05:13 EDT, Stefan Cornelius
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Sourceware 16617 None None None Never

  None (edit)
Description Stefan Cornelius 2012-05-31 05:38:09 EDT
It was discovered that the formatted printing functionality in glibc did not properly restrict the use of alloca(). A remote attacker could provide a specially crafted sequence of format specifiers, leading to a crash or, potentially, FORTIFY_SOURCE format string protection mechanism bypass, when processed.
Comment 4 Stefan Cornelius 2012-06-27 05:12:25 EDT
Created attachment 594722 [details]
RHEL6 patch backports and test cases
Comment 5 Stefan Cornelius 2012-06-27 05:13:46 EDT
Created attachment 594727 [details]
RHEL5 patch backport and test case
Comment 6 Stefan Cornelius 2012-07-11 06:35:09 EDT
Pulic now/CVEs requested via:
http://www.openwall.com/lists/oss-security/2012/07/11/5
Comment 7 Stefan Cornelius 2012-07-11 13:25:59 EDT
A CVE identifier of CVE-2012-3406 has been assigned to this issue.
Comment 9 errata-xmlrpc 2012-07-18 11:23:52 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1098 https://rhn.redhat.com/errata/RHSA-2012-1098.html
Comment 10 errata-xmlrpc 2012-07-18 11:24:43 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:1097 https://rhn.redhat.com/errata/RHSA-2012-1097.html
Comment 11 Vincent Danen 2012-07-18 12:40:16 EDT
Created glibc tracking bugs for this issue

Affects: fedora-all [bug 841318]
Comment 12 errata-xmlrpc 2012-08-21 15:13:14 EDT
This issue has been addressed in following products:

  RHEV-H, V2V and Agents for RHEL-5

Via RHSA-2012:1185 https://rhn.redhat.com/errata/RHSA-2012-1185.html
Comment 13 errata-xmlrpc 2012-08-23 10:25:33 EDT
This issue has been addressed in following products:

  RHEV-H and Agents for RHEL-6

Via RHSA-2012:1200 https://rhn.redhat.com/errata/RHSA-2012-1200.html

Note You need to log in before you can comment on or make changes to this bug.