FS#54857 - [libffi] [Security] arbitrary code execution (CVE-2017-1000376)
Attached to Project:
Arch Linux
Opened by Pablo Lezaeta (Jristz) - Tuesday, 18 July 2017, 05:33 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 November 2019, 11:18 GMT
Opened by Pablo Lezaeta (Jristz) - Tuesday, 18 July 2017, 05:33 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 November 2019, 11:18 GMT
|
Details
Summary
======= The package libffi is vulnerable to arbitrary code execution via CVE-2017-1000376. Guidance ======== There is a patch on debian 3.2.1-4 with the fix so we only need take the patch I think. References ========== https://security.archlinux.org/AVG-310 https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt |
This task depends upon
Yet the other option is the well know -fstack-check=specific flag for all linked and this package... so I will go to debian and take the 2 patches (there is a three for aarm64 so is unnedded here).
libffi-race-condition.patch (1 KiB)
The 3th option is just wait until the fstack-check get fixed and rebuild the linked packaged plus this one.