glibc/advisories
Carlos O'Donell d4d9a805a5 Document CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602
This commit adds advisory data for the above CVE(s).

Reviewed-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
2024-05-06 15:12:31 -04:00
..
GLIBC-SA-2023-0001 Update advisory format and introduce some automation 2024-01-30 13:58:57 -05:00
GLIBC-SA-2023-0002 Update advisory format and introduce some automation 2024-01-30 13:58:57 -05:00
GLIBC-SA-2023-0003 Update advisory format and introduce some automation 2024-01-30 13:58:57 -05:00
GLIBC-SA-2023-0004 Update advisory format and introduce some automation 2024-01-30 13:58:57 -05:00
GLIBC-SA-2023-0005 Update advisory format and introduce some automation 2024-01-30 13:58:57 -05:00
GLIBC-SA-2024-0001
GLIBC-SA-2024-0002
GLIBC-SA-2024-0003
GLIBC-SA-2024-0004 GLIBC-SA-2024-0004: add commit for 2.31 branch 2024-04-25 00:22:23 +02:00
GLIBC-SA-2024-0005 Document CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 2024-05-06 15:12:31 -04:00
GLIBC-SA-2024-0006 Document CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 2024-05-06 15:12:31 -04:00
GLIBC-SA-2024-0007 Document CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 2024-05-06 15:12:31 -04:00
GLIBC-SA-2024-0008 Document CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 2024-05-06 15:12:31 -04:00
README advisories: Add Reported-By 2024-04-18 08:52:46 -04:00

GNU C Library Security Advisory Format
======================================

Security advisories in this directory follow a simple git commit log
format, with a heading and free-format description augmented with tags
to allow parsing key information.  References to code changes are
specific to the glibc repository and follow a specific format:

  Tag-name: <commit-ref> (release-version)

The <commit-ref> indicates a specific commit in the repository.  The
release-version indicates the publicly consumable release in which this
commit is known to exist.  The release-version is derived from the
git-describe format, (i.e. stripped out from glibc-2.34.NNN-gxxxx) and
is of the form 2.34-NNN.  If the -NNN suffix is absent, it means that
the change is in that release tarball, otherwise the change is on the
release/2.YY/master branch and not in any released tarball.

The following tags are currently being used:

CVE-Id:
This is the CVE-Id assigned under the CVE Program
(https://www.cve.org/).

Public-Date:
The date this issue became publicly known.

Vulnerable-Commit:
The commit that introduced this vulnerability.  There could be multiple
entries, one for each release branch in the glibc repository; the
release-version portion of this tag should tell you which branch this is
on.

Fix-Commit:
The commit that fixed this vulnerability.  There could be multiple
entries for each release branch in the glibc repository, indicating that
all of those commits contributed to fixing that issue in each of those
branches.

Reported-By:
The entity that reported this issue. There could be multiple entries, one for
each reporter.

Adding an Advisory
------------------

An advisory for a CVE needs to be added on the master branch in two steps:

1. Add the text of the advisory without any Fix-Commit tags along with
   the fix for the CVE.  Add the Vulnerable-Commit tag, if applicable.
   The advisories directory does not exist in release branches, so keep
   the advisory text commit distinct from the code changes, to ease
   backports.  Ask for the GLIBC-SA advisory number from the security
   team.

2. Finish all backports on release branches and then back on the msater
   branch, add all commit refs to the advisory using the Fix-Commit
   tags.  Don't bother adding the release-version subscript since the
   next step will overwrite it.

3. Run the process-advisories.sh script in the scripts directory on the
   advisory:

     scripts/process-advisories.sh update GLIBC-SA-YYYY-NNNN

   (replace YYYY-NNNN with the actual advisory number).

4. Verify the updated advisory and push the result.

Getting a NEWS snippet from advisories
--------------------------------------

Run:

  scripts/process-advisories.sh news

and copy the content into the NEWS file.