uclibc-source: CVE-2016-2224, CVE-2016-2225, CVE-2016-6264

Related Vulnerabilities: CVE-2016-2224   CVE-2016-2225   CVE-2016-6264  

Debian Bug report logs - #990648
uclibc-source: CVE-2016-2224, CVE-2016-2225, CVE-2016-6264

version graph

Reported by: Andreas Beckmann <anbe@debian.org>

Date: Sat, 3 Jul 2021 19:39:02 UTC

Severity: normal

Tags: security

Found in version uclibc/0.9.32-1

Fixed in versions uclibc/1.0.20-1, 0.9.32-1+deb7u1

Done: Andreas Beckmann <anbe@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Simon Richter <sjr@debian.org>:
Bug#990648; Package uclibc-source. (Sat, 03 Jul 2021 19:39:04 GMT) (full text, mbox, link).


Acknowledgement sent to Andreas Beckmann <anbe@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Simon Richter <sjr@debian.org>. (Sat, 03 Jul 2021 19:39:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Andreas Beckmann <anbe@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: uclibc-source: CVE-2016-2224, CVE-2016-2225, CVE-2016-6264
Date: Sat, 03 Jul 2021 21:36:58 +0200
Package: uclibc-source
Version: 0.9.32-1
Severity: normal
Tags: security
User: debian-qa@lists.debian.org
Usertags: piuparts
Control: fixed -1 0.9.32-1+deb7u1
Control: close -1 1.0.20-1

   * CVE-2016-2224:
     Fix possible denial of service via a specially crafted DNS reply that could
     cause an infinite loop.
   * CVE-2016-2225:
     Fix possible denial of service via specially crafted packet that will make
     the parser terminate early.
   * CVE-2016-6264:
     It was found that 'BLT' instruction in libc/string/arm/memset.S checks for
     signed values. If parameter of memset is negative, then value added to the
     PC will be large. Attacker that controls the length parameter of memset can
     also control the value of PC register.

This was fixed in wheezy-lts, but not in jessie-security or jessie-lts,
causing version skew:

 uclibc | 0.9.30.2-1      | squeeze         | source
 uclibc | 0.9.32-1        | wheezy          | source
 uclibc | 0.9.32-1        | jessie          | source
 uclibc | 0.9.32-1+deb7u1 | wheezy-security | source
 uclibc | 1.0.20-2        | stretch         | source
 uclibc | 1.0.31-1        | buster          | source
 uclibc | 1.0.35-1        | bullseye        | source
 uclibc | 1.0.35-1        | sid             | source


Andreas



Marked as fixed in versions 0.9.32-1+deb7u1. Request was from Andreas Beckmann <anbe@debian.org> to submit@bugs.debian.org. (Sat, 03 Jul 2021 19:39:04 GMT) (full text, mbox, link).


Marked as fixed in versions uclibc/1.0.20-1. Request was from Andreas Beckmann <anbe@debian.org> to submit@bugs.debian.org. (Sat, 03 Jul 2021 19:39:05 GMT) (full text, mbox, link).


Marked Bug as done Request was from Andreas Beckmann <anbe@debian.org> to submit@bugs.debian.org. (Sat, 03 Jul 2021 19:39:05 GMT) (full text, mbox, link).


Notification sent to Andreas Beckmann <anbe@debian.org>:
Bug acknowledged by developer. (Sat, 03 Jul 2021 19:39:06 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Jul 4 16:16:01 2021; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.