Bug 46775 - librelp: Multiple issues (4.3)
librelp: Multiple issues (4.3)
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All Linux
: P3 normal (vote)
: UCS 4.3-0-errata
Assigned To: Philipp Hahn
Arvid Requate
Depends on:
  Show dependency treegraph
Reported: 2018-04-04 17:13 CEST by Philipp Hahn
Modified: 2018-05-16 17:04 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


Note You need to log in before you can comment on or make changes to this bug.
Description Philipp Hahn univentionstaff 2018-04-04 17:13:39 CEST
New Debian librelp 1.2.12-1+deb9u1 fixes:
This update addresses the following issue:
* librelp contains a Buffer Overflow vulnerability in the checking of x509
  certificates from a peer that can result in Remote code execution. This
  attack appear to be exploitable a remote attacker that can connect to
  rsyslog and trigger a stack buffer overflow by sending a specially crafted
  x509 certificate. (CVE-2018-1000140)

CVE-2018-1000140 librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c
Comment 1 Philipp Hahn univentionstaff 2018-04-04 17:21:29 CEST
[4.3-0] 482f1c6191 Bug #46775: librelp_1.2.12-1+deb9u1
Comment 2 Quality Assurance univentionstaff 2018-05-04 16:43:10 CEST
--- mirror/ftp/4.3/unmaintained/4.3-0/source/librelp_1.2.12-1.dsc
+++ apt/ucs_4.3-0-errata4.3-0/source/librelp_1.2.12-1+deb9u1.dsc
@@ -1,3 +1,9 @@
+1.2.12-1+deb9u1 [Sat, 24 Mar 2018 22:40:55 +0100] Salvatore Bonaccorso <carnil@debian.org>:
+  * Non-maintainer upload by the Security Team.
+  * Stack-based buffer overflow in relpTcpChkPeerName function
+    (CVE-2018-1000140)
 1.2.12-1 [Thu, 07 Jul 2016 23:14:50 +0200] Michael Biebl <biebl@debian.org>:
   * New upstream release.
Comment 3 Arvid Requate univentionstaff 2018-05-14 19:33:03 CEST
* No UCS specific patches
* Comparison to previously shipped version ok
* Binary package update Ok
* Advisory Ok
Comment 4 Arvid Requate univentionstaff 2018-05-16 17:04:19 CEST