Bug 29145 - eglibc: Multiple issues (3.1)
eglibc: Multiple issues (3.1)
Status: CLOSED WONTFIX
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 2.3
Other Linux
: P3 normal (vote)
: UCS 3.1-x-errata
Assigned To: Security maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2012-11-09 15:52 CET by Moritz Muehlenhoff
Modified: 2019-04-11 19:25 CEST (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2012-11-09 15:52:52 CET
+++ This bug was initially created as a clone of Bug #25842 +++

\item Unzureichende Fehlerbehandlung in addmntent-Helper (CVE-2011-1089)

\item Unzureichende Speicherallozierung bei der Verwaltung von Formatstrings
(CVE-2012-3404)

\item Fehlerhafte Speicherverwaltung mit alloca() (CVE-2012-3405,
CVE-2012-3406)

\item Integeroverflows in der Speicherallokation der strto-Funktionen
(CVE-2012-3480)

\item Stackoverflow in strcoll() (CVE-2012-4424)

\item Integeroverflow in strcoll() (CVE-2012-4412)
Comment 1 Moritz Muehlenhoff univentionstaff 2013-03-11 16:05:44 CET
Denial of service when processing regular expressions with multibyte characters (CVE-2013-0242)
Comment 2 Moritz Muehlenhoff univentionstaff 2013-05-10 16:41:06 CEST
stack overflow in getaddrinfo() (CVE-2013-1914)
Comment 3 Moritz Muehlenhoff univentionstaff 2013-07-17 16:32:55 CEST
PTR_MANGLE encrypts pointers as a countermeasure against buffer overflows. When linking statically, this mangling doesn't work correctly.

The impact on UCS is negligable, since the software shipped in UCS/Debian is dynamically linked (with very few exceptions).

CVE-2013-4788
Comment 4 Moritz Muehlenhoff univentionstaff 2013-07-22 08:37:35 CEST
Insecure pseudotty ownership changes in pt_chown (CVE-2013-2207)
Comment 5 Moritz Muehlenhoff univentionstaff 2013-08-13 07:13:45 CEST
Missing sanitising for path length in readdir_r()  (CVE-2013-4237)
Comment 6 Moritz Muehlenhoff univentionstaff 2013-09-12 07:24:51 CEST
Multiple integer overflows in pvalloc(), valloc() and posix_memalign/memalign/aligned_alloc()  (CVE-2013-4332)
Comment 7 Moritz Muehlenhoff univentionstaff 2013-09-27 14:00:08 CEST
Stack overflow in getaddrinfo() (CVE-2013-4357)
Comment 8 Moritz Muehlenhoff univentionstaff 2013-11-22 15:01:29 CET
Stack frame overflow in getaddrinfo() for Ipv6 sockets (CVE-2013-4458)
Comment 9 Moritz Muehlenhoff univentionstaff 2014-06-02 07:59:16 CEST
The maintenance with bug and security fixes for UCS 3.1-x has ended on 31st of May 2014.

The maintenance of the UCS 3.x major series is continued by UCS 3.2-x that is supplied with bug and security fixes.

Customers still on UCS 3.1-x are encouraged to update to UCS 3.2. Please contact your partner or Univention for any questions.