Bug 37047

Summary: eglibc: Multiple issues (4.0)
Product: UCS Reporter: Moritz Muehlenhoff <jmm>
Component: Security updatesAssignee: Janek Walkenhorst <walkenhorst>
Status: CLOSED FIXED QA Contact: Philipp Hahn <hahn>
Severity: normal    
Priority: P3 CC: walkenhorst
Version: UCS 4.0   
Target Milestone: UCS 4.0-0-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:

Description Moritz Muehlenhoff univentionstaff 2014-11-26 13:45:40 CET
Incorrect memory management using alloca() (CVE-2012-3405, CVE-2012-3406)
Crashes in decoding invalid code pages (IBM930, IBM933, IBM935, IBM937, IBM939, IBM1364) (CVE-2012-6656, CVE-2014-6040)
Insecure pseudotty ownership changes in pt_chown (CVE-2013-2207)
posix_spawn_file_actions_addopen() fails to copy the path argument (CVE-2014-4043)
Command execution in wordexp() with WRDE_NOCMD specified (CVE-2014-7817)
Comment 1 Moritz Muehlenhoff univentionstaff 2014-12-18 07:02:44 CET
Denial of service through infinite loop in getnetbyname() (CVE-2014-9402)
Comment 2 Janek Walkenhorst univentionstaff 2015-01-28 11:47:08 CET
Buffer overflow in gethostbyname and gethostbyname2 functions (CVE-2015-0235)
Comment 3 Janek Walkenhorst univentionstaff 2015-01-28 17:04:54 CET
Advisory: 2015-01-28-eglibc.yaml
Comment 4 Janek Walkenhorst univentionstaff 2015-01-28 17:10:22 CET
(In reply to Moritz Muehlenhoff from comment #0)
> Incorrect memory management using alloca() (CVE-2012-3405, CVE-2012-3406)
> Insecure pseudotty ownership changes in pt_chown (CVE-2013-2207)
> posix_spawn_file_actions_addopen() fails to copy the path argument
> (CVE-2014-4043)
(In reply to Moritz Muehlenhoff from comment #1)
> Denial of service through infinite loop in getnetbyname() (CVE-2014-9402)

Moved to Bug #37643
Comment 5 Janek Walkenhorst univentionstaff 2015-01-28 17:14:09 CET
(In reply to Moritz Muehlenhoff from comment #0)
> Crashes in decoding invalid code pages (IBM930, IBM933, IBM935, IBM937,
> IBM939, IBM1364) (CVE-2012-6656, CVE-2014-6040)
> Command execution in wordexp() with WRDE_NOCMD specified (CVE-2014-7817)
(In reply to Janek Walkenhorst from comment #2)
> Buffer overflow in gethostbyname and gethostbyname2 functions (CVE-2015-0235)
Fixed with import of Debian stable-sec

Tests (i386): OK
Comment 6 Philipp Hahn univentionstaff 2015-01-28 23:45:36 CET
OK: amd64 i386
OK: aptitude install '?source-package(eglibc)?installed'
OK: dpkg-query -W libc6 # 2.13-38.19.201501281258
OK: zless /usr/share/doc/libc6/changelog.Debian.gz
OK: ./GHOST # vulnerable → not vulnerable

OK: 2015-01-28-eglibc.yaml
OK: CVE-201?-*
FAIL: errata-announce -V $PWD/2015-01-28-eglibc.yaml
> [FAIL] changes.valid: No changes file found: /var/univention/buildsystem2/apt/ucs_4.0-0-errata4.0-0/source/eglibc_2.11.3-4.18.201501281259_*.changes
> $ ls /var/univention/buildsystem2/apt/ucs_4.0-0-errata4.0-0/source/eglibc_*changes
> /var/univention/buildsystem2/apt/ucs_4.0-0-errata4.0-0/source/eglibc_2.13-38.19.201501281258_i386.change
Comment 7 Philipp Hahn univentionstaff 2015-01-29 08:23:34 CET
FIXED: r57640 | Bug #33271, Bug #37047 eglibc: GHOST YAML
Comment 8 Janek Walkenhorst univentionstaff 2015-01-29 09:41:19 CET
<http://errata.univention.de/ucs/4.0/49.html>