Bugzilla – Bug 882600
VUL-0: CVE-2014-4043: glibc,glibc.i686: posix_spawn_file_actions_addopen fails to copy the path argument
Last modified: 2018-10-19 18:24:04 UTC
OSS:2014/Q2/519 David Reid, Glyph Lefkowitz, and Alex Gaynor] discovered a bug which can lead to a use after free, or other vulnerabilities. Per the specification (http://pubs.opengroup.org/onlinepubs/000095399/functions/posix_spawn_file_actions_addclose.html) posix_spawn_file_actions_addopen should copy the path argument. The result of not copying is that programs can easily trigger use-after-free bugs, or other situations where the path is mutated References: https://sourceware.org/bugzilla/show_bug.cgi?id=17048 http://seclists.org/oss-sec/2014/q2/519
Created attachment 594558 [details] reproducer
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2014-06-27. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/57820
bugbot adjusting priority
This is an autogenerated message for OBS integration: This bug (882600) was mentioned in https://build.opensuse.org/request/show/237681 Factory / glibc
SUSE-SU-2014:0920-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 882600,883217 CVE References: CVE-2014-4043 Sources used: SUSE Linux Enterprise Software Development Kit 11 SP3 (src): glibc-2.11.3-17.66.1 SUSE Linux Enterprise Server 11 SP3 for VMware (src): glibc-2.11.3-17.66.1 SUSE Linux Enterprise Server 11 SP3 (src): glibc-2.11.3-17.66.1 SUSE Linux Enterprise Desktop 11 SP3 (src): glibc-2.11.3-17.66.1
fixed and released
SUSE-SU-2014:1122-1: An update that solves 7 vulnerabilities and has 6 fixes is now available. Category: security (important) Bug References: 750741,779320,801246,830268,834594,836746,839870,843735,864081,882600,883022,886416,892073 CVE References: CVE-2012-4412,CVE-2013-0242,CVE-2013-4237,CVE-2013-4332,CVE-2013-4788,CVE-2014-4043,CVE-2014-5119 Sources used: SUSE Linux Enterprise Server 11 SP1 LTSS (src): glibc-2.11.1-0.58.1
SUSE-SU-2014:1128-1: An update that solves 6 vulnerabilities and has 5 fixes is now available. Category: security (important) Bug References: 779320,801246,824639,834594,839870,842291,860501,882600,892073,894553,894556 CVE References: CVE-2012-4412,CVE-2013-0242,CVE-2013-4237,CVE-2013-4332,CVE-2014-4043,CVE-2014-5119 Sources used: SUSE Linux Enterprise Server 10 SP3 LTSS (src): glibc-2.4-31.77.112.1
SUSE-SU-2015:0167-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 864081,882600,909053 CVE References: CVE-2012-6656,CVE-2014-6040 Sources used: SUSE Linux Enterprise Server 11 SP2 LTSS (src): glibc-2.11.3-17.45.57.6
SUSE-SU-2015:0170-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 844309,882600,894553,894556 CVE References: CVE-2012-6656,CVE-2013-4357,CVE-2014-6040 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): glibc-2.4-31.115.2
Reopen for bug 939797 for openSUSE 13.1 update.
*** Bug 939797 has been marked as a duplicate of this bug. ***
We have received indication that this affects openSUSE 13.1. Please verify and submit.
This is an autogenerated message for OBS integration: This bug (882600) was mentioned in https://build.opensuse.org/request/show/319594 13.1 / glibc
openSUSE-SU-2015:1387-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 882600 CVE References: CVE-2014-4043 Sources used: openSUSE 13.1 (src): glibc-2.18-4.38.1, glibc-2.18-4.38.2, glibc-testsuite-2.18-4.38.3, glibc-utils-2.18-4.38.2
All updates released.