* SECURITY UPDATE: buffer overflow in gethostbyname_r and related
functions
- debian/patches/any/CVE-2015-1781.diff: take alignment padding
into account when computing if buffer is too small.
- CVE-2015-1781
* SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice
- debian/patches/any/CVE-2014-8121-1.diff: do not close NSS files
database during iteration.
- debian/patches/any/CVE-2014-8121-2.diff: Separate internal state
between getXXent and getXXbyYY NSS calls.
- CVE-2014-8121
* SECURITY UPDATE: glibc unbounded stack usage in NaN strtod
conversion
- debian/patches/any/CVE-2014-9761-1.diff: Refactor strtod parsing
of NaN payloads.
- debian/patches/any/CVE-2014-9761-1.diff: Fix nan functions
handling of payload strings
- CVE-2014-9761
* SECURITY UPDATE: NSS files long line buffer overflow
- debian/patches/any/CVE-2015-5277.diff: Don't ignore too long
lines in nss_files
- CVE-2015-5277
* SECURITY UPDATE: out of range data to strftime() causes segfault
(denial of service)
- debian/patches/any/CVE-2015-8776.diff: add range checks to
strftime() processing
- CVE-2015-8776
* SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid
AT_SECURE programs (e.g. setuid), allowing disabling of pointer
mangling
- debian/patches/any/CVE-2015-8777.diff: Always enable pointer
guard
- CVE-2015-8777
* SECURITY UPDATE: integer overflow in hcreate and hcreate_r
- debian/patches/any/CVE-2015-8778.diff: check for large inputs
- CVE-2015-8778
* SECURITY UPDATE: unbounded stack allocation in catopen()
- debian/patches/any/CVE-2015-8779.diff: stop using unbounded
alloca()
- CVE-2015-8779
* SECURITY UPDATE: Stack overflow in _nss_dns_getnetbyname_r
- debian/patches/any/CVE-2016-3075.diff: do not make unneeded
memory copy on the stack.
- CVE-2016-3075
* SECURITY UPDATE: pt_chown privilege escalation
- debian/patches/any/CVE-2016-2856.diff: grantpt: trust the kernel
about pty group and permission mode
- debian/sysdeps/linux.mk: don't build pt_chown
- debian/rules.d/debhelper.mk: only install pt_chown when built.
- CVE-2016-2856, CVE-2013-2207
* debian/debhelper.in/libc.postinst: add reboot notifications for
security updates (LP: #1546457)
* debian/patches/ubuntu/submitted-no-stack-backtrace.diff: update
patch to eliminate compiler warning.
This bug was fixed in the package eglibc - 2.19-0ubuntu6.8
---------------
eglibc (2.19-0ubuntu6.8) trusty-security; urgency=medium
* SECURITY UPDATE: buffer overflow in gethostbyname_r and related patches/ any/CVE- 2015-1781. diff: take alignment padding patches/ any/CVE- 2014-8121- 1.diff: do not close NSS files patches/ any/CVE- 2014-8121- 2.diff: Separate internal state patches/ any/CVE- 2014-9761- 1.diff: Refactor strtod parsing patches/ any/CVE- 2014-9761- 1.diff: Fix nan functions patches/ any/CVE- 2015-5277. diff: Don't ignore too long patches/ any/CVE- 2015-8776. diff: add range checks to patches/ any/CVE- 2015-8777. diff: Always enable pointer patches/ any/CVE- 2015-8778. diff: check for large inputs patches/ any/CVE- 2015-8779. diff: stop using unbounded getnetbyname_ r patches/ any/CVE- 2016-3075. diff: do not make unneeded patches/ any/CVE- 2016-2856. diff: grantpt: trust the kernel sysdeps/ linux.mk: don't build pt_chown rules.d/ debhelper. mk: only install pt_chown when built. debhelper. in/libc. postinst: add reboot notifications for patches/ ubuntu/ submitted- no-stack- backtrace. diff: update
functions
- debian/
into account when computing if buffer is too small.
- CVE-2015-1781
* SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice
- debian/
database during iteration.
- debian/
between getXXent and getXXbyYY NSS calls.
- CVE-2014-8121
* SECURITY UPDATE: glibc unbounded stack usage in NaN strtod
conversion
- debian/
of NaN payloads.
- debian/
handling of payload strings
- CVE-2014-9761
* SECURITY UPDATE: NSS files long line buffer overflow
- debian/
lines in nss_files
- CVE-2015-5277
* SECURITY UPDATE: out of range data to strftime() causes segfault
(denial of service)
- debian/
strftime() processing
- CVE-2015-8776
* SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid
AT_SECURE programs (e.g. setuid), allowing disabling of pointer
mangling
- debian/
guard
- CVE-2015-8777
* SECURITY UPDATE: integer overflow in hcreate and hcreate_r
- debian/
- CVE-2015-8778
* SECURITY UPDATE: unbounded stack allocation in catopen()
- debian/
alloca()
- CVE-2015-8779
* SECURITY UPDATE: Stack overflow in _nss_dns_
- debian/
memory copy on the stack.
- CVE-2016-3075
* SECURITY UPDATE: pt_chown privilege escalation
- debian/
about pty group and permission mode
- debian/
- debian/
- CVE-2016-2856, CVE-2013-2207
* debian/
security updates (LP: #1546457)
* debian/
patch to eliminate compiler warning.
-- Steve Beattie <email address hidden> Fri, 08 Apr 2016 23:26:02 -0700