Bug#920047: glibc: CVE-2016-10739: getaddrinfo should reject IP addresses with trailing characters

2019-01-21 Thread Florian Weimer
* Salvatore Bonaccorso:

> CVE-2016-10739[0]:
> | In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo
> | function would successfully parse a string that contained an IPv4
> | address followed by whitespace and arbitrary characters, which could
> | lead applications to incorrectly assume that it had parsed a valid
> | string, without the possibility of embedded HTTP headers or other
> | potentially dangerous substrings.
>
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>
> For further information see:
>
> [0] https://security-tracker.debian.org/tracker/CVE-2016-10739
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
> [1] https://sourceware.org/bugzilla/show_bug.cgi?id=20018
>
> Please adjust the affected versions in the BTS as needed.

Would it help if I put a backport on the 2.24 upstream branch?



Processed: glibc: CVE-2016-10739: getaddrinfo should reject IP addresses with trailing characters

2019-01-21 Thread Debian Bug Tracking System
Processing control commands:

> found -1 2.24-11+deb9u3
Bug #920047 [glibc] glibc: CVE-2016-10739: getaddrinfo should reject IP 
addresses with trailing characters
There is no source info for the package 'glibc' at version '2.24-11+deb9u3' 
with architecture ''
Unable to make a source version for version '2.24-11+deb9u3'
Marked as found in versions 2.24-11+deb9u3.
> found -1 2.24-11
Bug #920047 [glibc] glibc: CVE-2016-10739: getaddrinfo should reject IP 
addresses with trailing characters
There is no source info for the package 'glibc' at version '2.24-11' with 
architecture ''
Unable to make a source version for version '2.24-11'
Marked as found in versions 2.24-11.

-- 
920047: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#920047: glibc: CVE-2016-10739: getaddrinfo should reject IP addresses with trailing characters

2019-01-21 Thread Salvatore Bonaccorso
Package: glibc
Version: 2.28-5--src
Severity: normal
Tags: patch security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=20018
Control: found -1 2.24-11+deb9u3
Control: found -1 2.24-11

Hi,

The following vulnerability was published for glibc.

CVE-2016-10739[0]:
| In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo
| function would successfully parse a string that contained an IPv4
| address followed by whitespace and arbitrary characters, which could
| lead applications to incorrectly assume that it had parsed a valid
| string, without the possibility of embedded HTTP headers or other
| potentially dangerous substrings.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-10739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
[1] https://sourceware.org/bugzilla/show_bug.cgi?id=20018

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore