Bug 44862 - libffi: Multiple issues (4.2)
libffi: Multiple issues (4.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
Other Linux
: P5 normal (vote)
: UCS 4.2-3-errata
Assigned To: Philipp Hahn
Arvid Requate
:
Depends on:
Blocks: 44863
  Show dependency treegraph
 
Reported: 2017-06-26 15:45 CEST by Arvid Requate
Modified: 2018-05-08 14:56 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score: 7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2017-06-26 15:45:10 CEST
Upstream Debian package version 3.1-2+deb8u1 fixes:

* libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. This affects libffi version 3.2.1. (CVE-2017-1000376)
Comment 1 Philipp Hahn univentionstaff 2018-01-25 10:59:52 CET
Mass-import from Debian-Security:
  python -m univention.repong.^Cbmirror -s jessie -r 4.2-3 --override=$HOME/REPOS/repo-ng/mirror/update_ucs42_mirror_from_debian.yml --errata=doc/errata --sql --process=ALL -vvvv --now=201801211553

YAML: git:bd6159834a..449aa5a7cf
Comment 2 Quality Assurance univentionstaff 2018-05-04 16:58:05 CEST
--- mirror/ftp/4.2/unmaintained/4.2-0/source/libffi_3.1-2.dsc
+++ apt/ucs_4.2-0-errata4.2-3/source/libffi_3.1-2+deb8u1.dsc
@@ -1,3 +1,12 @@
+3.1-2+deb8u1 [Thu, 15 Jun 2017 11:42:36 +0200] Yves-Alexis Perez <corsac@debian.org>:
+
+  * Non-maintainer upload by the Security Team.
+  * debian/patches:
+    - 01_add_missing_GNU_STACK_markings, fix requirement on an executable
+      stack on x86_32 (CVE-2017-1000376)                        closes: #751907
+  * debian/rules:
+    - enable pax_emutramp
+
 3.1-2 [Wed, 04 Jun 2014 15:23:33 +0200] Matthias Klose <doko@debian.org>:
 
   * Fix HAVE_LONG_DOUBLE_VARIANT conditional in the ffi.h header.
Comment 3 Arvid Requate univentionstaff 2018-05-07 21:39:59 CEST
* No UCS specific patches
* Comparison to previously shipped version ok
* Binary package update Ok
* Advisory Ok
Comment 4 Arvid Requate univentionstaff 2018-05-08 14:56:26 CEST
<http://errata.software-univention.de/ucs/4.2/345.html>