[Debian] High CVE: CVE-2021-3999: glibc: An off-by-one buffer overflow and underflow

Bug #2021544 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Zhixiong Chi

Bug Description

CVE-2021-3999: https://nvd.nist.gov/vuln/detail/CVE-2021-3999

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.

Base Score: High

References:

https://security-tracker.debian.org/tracker/CVE-2021-3999

['libc6_2.31-13+deb11u3_amd64.deb===>libc6_2.31-13+deb11u4_amd64.deb', 'libc6-dev_2.31-13+deb11u3_amd64.deb===>libc6-dev_2.31-13+deb11u4_amd64.deb', 'libc-bin_2.31-13+deb11u3_amd64.deb===>libc-bin_2.31-13+deb11u4_amd64.deb', 'libc-dev-bin_2.31-13+deb11u3_amd64.deb===>libc-dev-bin_2.31-13+deb11u4_amd64.deb', 'libc-l10n_2.31-13+deb11u3_all.deb===>libc-l10n_2.31-13+deb11u4_all.deb', 'locales_2.31-13+deb11u3_all.deb===>locales_2.31-13+deb11u4_all.deb', 'locales-all_2.31-13+deb11u3_amd64.deb===>locales-all_2.31-13+deb11u4_amd64.deb']

CVE References

Yue Tao (wrytao)
tags: added: stx.9.0 stx.security
Changed in starlingx:
importance: Undecided → High
status: New → Triaged
Changed in starlingx:
assignee: nobody → Zhixiong Chi (zhixiongchi)
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/886182

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/886182
Committed: https://opendev.org/starlingx/tools/commit/204f2ae10dcfc3e7b56b7ff1390481cca8cbadb7
Submitter: "Zuul (22348)"
Branch: master

commit 204f2ae10dcfc3e7b56b7ff1390481cca8cbadb7
Author: Zhixiong Chi <email address hidden>
Date: Tue Jun 13 11:08:25 2023 +0800

    glibc: Upgrade to 2.31-13+deb11u6

    Fix CVE issue CVE-2021-3999

    Refer to:
    https://security-tracker.debian.org/tracker/CVE-2021-3999

    TestPlan:
    PASS: build-pkgs -a
    PASS: build-image
    PASS: Jenkins installation
    PASS: Check the package version with 'dpkg -l'

    Closes-Bug: 2021544

    Signed-off-by: Zhixiong Chi <email address hidden>
    Change-Id: I6d211b89440d527d96c3b4ce51b7108eedfb7cb6

Changed in starlingx:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.