Bug 828878 - (CVE-2012-2673) CVE-2012-2673 gc: malloc() and calloc() overflows
CVE-2012-2673 gc: malloc() and calloc() overflows
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
Miloš Prchlík
impact=moderate,public=20120605,repor...
: Security
Depends On: 828881 828882 1012436 1012437 1022688 1053200
Blocks: 828887 1011743
  Show dependency treegraph
 
Reported: 2012-06-05 10:17 EDT by Jan Lieskovsky
Modified: 2015-11-24 10:35 EST (History)
15 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-03-04 01:25:04 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2012-06-05 10:17:00 EDT
A security flaw was found in the way malloc() and calloc() routines implementation of gc, a Boehm-Demers-Weiser conservative garbage collector, performed parameters sanitization, when allocating memory. If an application using the gc collector was missing application-level malloc() and calloc() routines parameters validity checks, a remote attacker could provide a specially-crafted application-specific input file that, when opened in that application would lead to application crash or, potentially, arbitrary code execution with the privileges of the user running the application.

CVE request:
[1] www.openwall.com/lists/oss-security/2012/06/05/1

Upstream patches:
A) malloc() size overflow check
   [2] https://github.com/ivmai/bdwgc/commit/be9df82919960214ee4b9d3313523bff44fd99e1

B) calloc() size overflow check
   [3] https://github.com/ivmai/bdwgc/commit/e10c1eb9908c2774c16b3148b30d2f3823d66a9a
   [4] https://github.com/ivmai/bdwgc/commit/6a93f8e5bcad22137f41b6c60a1c7384baaec2b3
   [5] https://github.com/ivmai/bdwgc/commit/83231d0ab5ed60015797c3d1ad9056295ac3b2bb

References:
[6] http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/
Comment 1 Jan Lieskovsky 2012-06-05 10:19:55 EDT
This issue affects the version of the gc package, as shipped with
Red Hat Enterprise Linux 6.

--

This issue affects the versions of the gc package, as shipped with Fedora release of 15, 16, and 17. Please schedule an update.

--

This issue affects the version of the gc package, as shipped with Fedora EPEL 5. Please schedule an update.
Comment 2 Jan Lieskovsky 2012-06-05 10:21:53 EDT
Created gc tracking bugs for this issue

Affects: fedora-all [bug 828881]
Affects: epel-5 [bug 828882]
Comment 4 Stefan Cornelius 2012-06-07 16:30:45 EDT
The CVE identifier of CVE-2012-2673 has been assigned to this issue:
http://www.openwall.com/lists/oss-security/2012/06/07/13
Comment 5 Fedora Update System 2012-06-27 23:22:22 EDT
gc-7.2b-2.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 6 Fedora Update System 2012-06-27 23:44:17 EDT
gc-7.2b-2.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 13 errata-xmlrpc 2013-11-04 13:20:46 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1500 https://rhn.redhat.com/errata/RHSA-2013-1500.html
Comment 16 errata-xmlrpc 2014-02-10 12:31:26 EST
This issue has been addressed in following products:

  Red Hat Satellite Proxy v 5.6

Via RHSA-2014:0150 https://rhn.redhat.com/errata/RHSA-2014-0150.html
Comment 17 errata-xmlrpc 2014-02-10 12:32:15 EST
This issue has been addressed in following products:

  Red Hat Satellite Server v 5.6

Via RHSA-2014:0149 https://rhn.redhat.com/errata/RHSA-2014-0149.html

Note You need to log in before you can comment on or make changes to this bug.