Univention Bugzilla – Full Text Bug Listing |
Summary: | eglibc: Multiple issues (4.0) | ||
---|---|---|---|
Product: | UCS | Reporter: | Moritz Muehlenhoff <jmm> |
Component: | Security updates | Assignee: | Janek Walkenhorst <walkenhorst> |
Status: | CLOSED FIXED | QA Contact: | Philipp Hahn <hahn> |
Severity: | normal | ||
Priority: | P3 | CC: | walkenhorst |
Version: | UCS 4.0 | ||
Target Milestone: | UCS 4.0-0-errata | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | --- | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: |
Description
Moritz Muehlenhoff
2014-11-26 13:45:40 CET
Denial of service through infinite loop in getnetbyname() (CVE-2014-9402) Buffer overflow in gethostbyname and gethostbyname2 functions (CVE-2015-0235) Advisory: 2015-01-28-eglibc.yaml (In reply to Moritz Muehlenhoff from comment #0) > Incorrect memory management using alloca() (CVE-2012-3405, CVE-2012-3406) > Insecure pseudotty ownership changes in pt_chown (CVE-2013-2207) > posix_spawn_file_actions_addopen() fails to copy the path argument > (CVE-2014-4043) (In reply to Moritz Muehlenhoff from comment #1) > Denial of service through infinite loop in getnetbyname() (CVE-2014-9402) Moved to Bug #37643 (In reply to Moritz Muehlenhoff from comment #0) > Crashes in decoding invalid code pages (IBM930, IBM933, IBM935, IBM937, > IBM939, IBM1364) (CVE-2012-6656, CVE-2014-6040) > Command execution in wordexp() with WRDE_NOCMD specified (CVE-2014-7817) (In reply to Janek Walkenhorst from comment #2) > Buffer overflow in gethostbyname and gethostbyname2 functions (CVE-2015-0235) Fixed with import of Debian stable-sec Tests (i386): OK OK: amd64 i386
OK: aptitude install '?source-package(eglibc)?installed'
OK: dpkg-query -W libc6 # 2.13-38.19.201501281258
OK: zless /usr/share/doc/libc6/changelog.Debian.gz
OK: ./GHOST # vulnerable → not vulnerable
OK: 2015-01-28-eglibc.yaml
OK: CVE-201?-*
FAIL: errata-announce -V $PWD/2015-01-28-eglibc.yaml
> [FAIL] changes.valid: No changes file found: /var/univention/buildsystem2/apt/ucs_4.0-0-errata4.0-0/source/eglibc_2.11.3-4.18.201501281259_*.changes
> $ ls /var/univention/buildsystem2/apt/ucs_4.0-0-errata4.0-0/source/eglibc_*changes
> /var/univention/buildsystem2/apt/ucs_4.0-0-errata4.0-0/source/eglibc_2.13-38.19.201501281258_i386.change
FIXED: r57640 | Bug #33271, Bug #37047 eglibc: GHOST YAML |