Univention Bugzilla – Bug 40022
eglibc: Multiple issues (4.1)
Last modified: 2016-10-05 12:46:56 CEST
* buffer overflow in gethostbyname_r and related functions (CVE-2015-1781) +++ This bug was initially created as a clone of Bug #38407 +++
Upstream Debian package version 2.13-38+deb7u10 fixes these issues: * Denial of service in nss_files (CVE-2014-8121) * buffer overflow in gethostbyname_r and related functions (CVE-2015-1781) * getaddrinfo, when processing AF_UNSPEC queries (for dual A/AAAA lookups), could mismanage its internal buffers, leading to a stack-based buffer overflow and arbitrary code execution. This vulnerability affects most applications which perform host name resolution using getaddrinfo, including system services (CVE-2015-7547) * If an invalid separated time value is passed to strftime, the strftime function could crash or leak information. No affected applications are known (CVE-2015-8776) * LD_POINTER_GUARD not ignored for SUID programs, enabling an unintended bypass of a security feature (CVE-2015-8777) * The rarely-used hcreate and hcreate_r functions did not check the size argument properly, leading to a crash (denial of service) for certain arguments. No impacted applications are known at this time (CVE-2015-8778) * The catopen function contains several unbound stack allocations (stack overflows), causing it the crash the process (denial of service). No applications where this issue has a security impact are currently known (CVE-2015-8779)
Upstream package has been imported and built including the patch from Bug 40059. Advisory: eglibc.yaml
OK: advisory (white space modification in r67511) OK: manual test: # git clone https://github.com/fjserna/CVE-2015-7547.git # cd CVE-2015-7547 # make # aptitude install '?source-package(^eglibc$)~i'=2.13-38.17.201410221243 # invoke-rc.d bind9 stop # echo "nameserver 127.0.0.1" > /etc/resolv.conf # ./CVE-2015-7547-poc.py # ./CVE-2015-7547-client Speicherzugriffsfehler ---- upgrade ---- # ucr commit /etc/resolv.conf # invoke-rc.d bind9 start # univention-upgrade --ignoressh --ignoreterm # dpkg -l libc6 libc6:amd64 2.13-38.29.20160216 # echo "nameserver 127.0.0.1" > /etc/resolv.conf # invoke-rc.d bind9 stop # ./CVE-2015-7547-poc.py # ./CVE-2015-7547-client CVE-2015-7547-client: getaddrinfo: Name or service not known
<http://errata.software-univention.de/ucs/4.1/115.html>