Debian Bug report logs -
#990648
uclibc-source: CVE-2016-2224, CVE-2016-2225, CVE-2016-6264
Reported by: Andreas Beckmann <anbe@debian.org>
Date: Sat, 3 Jul 2021 19:39:02 UTC
Severity: normal
Tags: security
Found in version uclibc/0.9.32-1
Fixed in versions uclibc/1.0.20-1, 0.9.32-1+deb7u1
Done: Andreas Beckmann <anbe@debian.org>
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, team@security.debian.org, Simon Richter <sjr@debian.org>
:
Bug#990648
; Package uclibc-source
.
(Sat, 03 Jul 2021 19:39:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Andreas Beckmann <anbe@debian.org>
:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Simon Richter <sjr@debian.org>
.
(Sat, 03 Jul 2021 19:39:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: uclibc-source
Version: 0.9.32-1
Severity: normal
Tags: security
User: debian-qa@lists.debian.org
Usertags: piuparts
Control: fixed -1 0.9.32-1+deb7u1
Control: close -1 1.0.20-1
* CVE-2016-2224:
Fix possible denial of service via a specially crafted DNS reply that could
cause an infinite loop.
* CVE-2016-2225:
Fix possible denial of service via specially crafted packet that will make
the parser terminate early.
* CVE-2016-6264:
It was found that 'BLT' instruction in libc/string/arm/memset.S checks for
signed values. If parameter of memset is negative, then value added to the
PC will be large. Attacker that controls the length parameter of memset can
also control the value of PC register.
This was fixed in wheezy-lts, but not in jessie-security or jessie-lts,
causing version skew:
uclibc | 0.9.30.2-1 | squeeze | source
uclibc | 0.9.32-1 | wheezy | source
uclibc | 0.9.32-1 | jessie | source
uclibc | 0.9.32-1+deb7u1 | wheezy-security | source
uclibc | 1.0.20-2 | stretch | source
uclibc | 1.0.31-1 | buster | source
uclibc | 1.0.35-1 | bullseye | source
uclibc | 1.0.35-1 | sid | source
Andreas
Marked as fixed in versions 0.9.32-1+deb7u1.
Request was from Andreas Beckmann <anbe@debian.org>
to submit@bugs.debian.org
.
(Sat, 03 Jul 2021 19:39:04 GMT) (full text, mbox, link).
Marked as fixed in versions uclibc/1.0.20-1.
Request was from Andreas Beckmann <anbe@debian.org>
to submit@bugs.debian.org
.
(Sat, 03 Jul 2021 19:39:05 GMT) (full text, mbox, link).
Marked Bug as done
Request was from Andreas Beckmann <anbe@debian.org>
to submit@bugs.debian.org
.
(Sat, 03 Jul 2021 19:39:05 GMT) (full text, mbox, link).
Notification sent
to Andreas Beckmann <anbe@debian.org>
:
Bug acknowledged by developer.
(Sat, 03 Jul 2021 19:39:06 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jul 4 16:16:01 2021;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.