Univention Bugzilla – Bug 44862
libffi: Multiple issues (4.2)
Last modified: 2018-05-08 14:56:26 CEST
Upstream Debian package version 3.1-2+deb8u1 fixes: * libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. This affects libffi version 3.2.1. (CVE-2017-1000376)
Mass-import from Debian-Security: python -m univention.repong.^Cbmirror -s jessie -r 4.2-3 --override=$HOME/REPOS/repo-ng/mirror/update_ucs42_mirror_from_debian.yml --errata=doc/errata --sql --process=ALL -vvvv --now=201801211553 YAML: git:bd6159834a..449aa5a7cf
--- mirror/ftp/4.2/unmaintained/4.2-0/source/libffi_3.1-2.dsc +++ apt/ucs_4.2-0-errata4.2-3/source/libffi_3.1-2+deb8u1.dsc @@ -1,3 +1,12 @@ +3.1-2+deb8u1 [Thu, 15 Jun 2017 11:42:36 +0200] Yves-Alexis Perez <corsac@debian.org>: + + * Non-maintainer upload by the Security Team. + * debian/patches: + - 01_add_missing_GNU_STACK_markings, fix requirement on an executable + stack on x86_32 (CVE-2017-1000376) closes: #751907 + * debian/rules: + - enable pax_emutramp + 3.1-2 [Wed, 04 Jun 2014 15:23:33 +0200] Matthias Klose <doko@debian.org>: * Fix HAVE_LONG_DOUBLE_VARIANT conditional in the ffi.h header.
* No UCS specific patches * Comparison to previously shipped version ok * Binary package update Ok * Advisory Ok
<http://errata.software-univention.de/ucs/4.2/345.html>