about summary refs log tree commit diff
path: root/advisories/GLIBC-SA-2023-0001
diff options
context:
space:
mode:
authorAndreas K. Hüttel <dilfridge@gentoo.org>2024-01-31 02:12:43 +0100
committerAndreas K. Hüttel <dilfridge@gentoo.org>2024-01-31 02:12:43 +0100
commit6d1e3fb07b45e2e31e469b16cf21b24bccf8914c (patch)
tree1d89ca5498120b24a48ac7c78e2bccfcc9268a15 /advisories/GLIBC-SA-2023-0001
parentef321e23c20eebc6d6fb4044425c00e6df27b05f (diff)
downloadglibc-6d1e3fb07b45e2e31e469b16cf21b24bccf8914c.tar.gz
glibc-6d1e3fb07b45e2e31e469b16cf21b24bccf8914c.tar.xz
glibc-6d1e3fb07b45e2e31e469b16cf21b24bccf8914c.zip
Replace advisories directory
Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org>
Diffstat (limited to 'advisories/GLIBC-SA-2023-0001')
-rw-r--r--advisories/GLIBC-SA-2023-000114
1 files changed, 0 insertions, 14 deletions
diff --git a/advisories/GLIBC-SA-2023-0001 b/advisories/GLIBC-SA-2023-0001
deleted file mode 100644
index 3d19c91b6a..0000000000
--- a/advisories/GLIBC-SA-2023-0001
+++ /dev/null
@@ -1,14 +0,0 @@
-printf: incorrect output for integers with thousands separator and width field
-
-When the printf family of functions is called with a format specifier
-that uses an <apostrophe> (enable grouping) and a minimum width
-specifier, the resulting output could be larger than reasonably expected
-by a caller that computed a tight bound on the buffer size.  The
-resulting larger than expected output could result in a buffer overflow
-in the printf family of functions.
-
-CVE-Id: CVE-2023-25139
-Public-Date: 2023-02-02
-Vulnerable-Commit: e88b9f0e5cc50cab57a299dc7efe1a4eb385161d (2.37)
-Fix-Commit: c980549cc6a1c03c23cc2fe3e7b0fe626a0364b0 (2.38)
-Fix-Commit: 07b9521fc6369d000216b96562ff7c0ed32a16c4 (2.37-4)