Bug 1194620 (CVE-2021-3998) - VUL-0: CVE-2021-3998: glibc: unexpected return value from realpath() could leak data based on the application
Summary: VUL-0: CVE-2021-3998: glibc: unexpected return value from realpath() could le...
Status: RESOLVED UPSTREAM
Alias: CVE-2021-3998
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/320032/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-01-13 08:18 UTC by Alexander Bergmann
Modified: 2024-05-13 14:36 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2022-01-13 08:18:20 UTC
rh#2024633

A flaw was found in glibc. The realpath function may sometimes return a unexpected value, potentially leading to disclosure of sensitive data.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2024633
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3998
Comment 1 Alexander Bergmann 2022-01-13 08:24:05 UTC
Commit c6e0b0b5b0b introduced the realpath_stk() function. Therefore none of our SLE code streams is affected.

SUSE:SLE-11-SP1:Update  glibc-2.11.1-11c19d374bd4
SUSE:SLE-11-SP3:Update  glibc-2.11.3-78856c5c73f74d
SUSE:SLE-12-SP2:Update  glibc-2.22
SUSE:SLE-12-SP4:Update  glibc-2.22
SUSE:SLE-15:Update      glibc-2.26
SUSE:SLE-15-SP3:Update  glibc-2.31

Only Factory needs to be handled. 

openSUSE:Factory        glibc-2.34

# git tag --contains c6e0b0b5b0b | cat -
glibc-2.33
glibc-2.33.9000
glibc-2.34
glibc-2.34.9000
Comment 2 Marcus Meissner 2024-05-13 14:36:31 UTC
done