csaf2cusa/cvrfs/2024/cvrf-openEuler-SA-2024-1691.xml
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

297 lines
15 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for glibc is now available for openEuler-22.03-LTS-SP3</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2024-1691</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2024-06-07</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2024-06-07</InitialReleaseDate>
<CurrentReleaseDate>2024-06-07</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2024-06-07</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">glibc security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for glibc is now available for openEuler-22.03-LTS-SP3.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The GNU C Library project provides the core libraries for the GNU system and GNU/Linux systems, as well as many other systems that use Linux as the kernel. These libraries provide critical APIs including ISO C11, POSIX.1-2008, BSD, OS-specific APIs and more. These APIs include such foundational facilities as open, read, write, malloc, printf, getaddrinfo, dlopen, pthread_create, crypt, login, exit and more.
Security Fix(es):
nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon&apos;s (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
(CVE-2024-33599)
nscd: Null pointer crashes after notfound response
If the Name Service Cache Daemon&apos;s (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference. This flaw was introduced in glibc 2.15 when the
cache was added to nscd.
This vulnerability is only present in the nscd binary.
(CVE-2024-33600)
nscd: netgroup cache may terminate daemon on memory allocation failure
The Name Service Cache Daemon&apos;s (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients. The
flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
(CVE-2024-33601)
nscd: netgroup cache assumes NSS callback uses in-buffer strings
The Name Service Cache Daemon&apos;s (nscd) netgroup cache can corrupt memory
when the NSS callback does not store all strings in the provided buffer.
The flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
(CVE-2024-33602)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for glibc is now available for openEuler-22.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">glibc</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1691</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-33599</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-33600</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-33601</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-33602</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-33599</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-33600</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-33601</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-33602</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="glibc-debugutils-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-debugutils-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-locale-archive-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-locale-archive-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-debuginfo-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-debuginfo-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-locale-source-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-locale-source-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-devel-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-devel-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-compat-2.17-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-compat-2.17-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-all-langpacks-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-all-langpacks-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="libnsl-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libnsl-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="nss_modules-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">nss_modules-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-common-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-common-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-debugsource-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-debugsource-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="nscd-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">nscd-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
<FullProductName ProductID="glibc-nss-devel-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-nss-devel-2.34-150.oe2203sp3.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="glibc-help-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-help-2.34-150.oe2203sp3.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="glibc-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-2.34-150.oe2203sp3.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libnsl-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">libnsl-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-compat-2.17-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-compat-2.17-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-common-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-common-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-all-langpacks-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-all-langpacks-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="nss_modules-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">nss_modules-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-devel-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-devel-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-locale-archive-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-locale-archive-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-locale-source-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-locale-source-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-debugutils-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-debugutils-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-debuginfo-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-debuginfo-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="nscd-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">nscd-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-nss-devel-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-nss-devel-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
<FullProductName ProductID="glibc-debugsource-2.34-150" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">glibc-debugsource-2.34-150.oe2203sp3.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nscd: Stack-based buffer overflow in netgroup cache
If the Name Service Cache Daemon&apos;s (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
</Note>
</Notes>
<ReleaseDate>2024-06-07</ReleaseDate>
<CVE>CVE-2024-33599</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.6</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>glibc security update</Description>
<DATE>2024-06-07</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1691</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">nscd: Null pointer crashes after notfound response
If the Name Service Cache Daemon&apos;s (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference. This flaw was introduced in glibc 2.15 when the
cache was added to nscd.
This vulnerability is only present in the nscd binary.
</Note>
</Notes>
<ReleaseDate>2024-06-07</ReleaseDate>
<CVE>CVE-2024-33600</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>glibc security update</Description>
<DATE>2024-06-07</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1691</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">nscd: netgroup cache may terminate daemon on memory allocation failure
The Name Service Cache Daemon&apos;s (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients. The
flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
</Note>
</Notes>
<ReleaseDate>2024-06-07</ReleaseDate>
<CVE>CVE-2024-33601</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>6.2</BaseScore>
<Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>glibc security update</Description>
<DATE>2024-06-07</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1691</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="4" xml:lang="en">nscd: netgroup cache assumes NSS callback uses in-buffer strings
The Name Service Cache Daemon&apos;s (nscd) netgroup cache can corrupt memory
when the NSS callback does not store all strings in the provided buffer.
The flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
</Note>
</Notes>
<ReleaseDate>2024-06-07</ReleaseDate>
<CVE>CVE-2024-33602</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS-SP3</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>4.0</BaseScore>
<Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>glibc security update</Description>
<DATE>2024-06-07</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1691</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>