UbuntuUpdates.org

Package "klibc"

Name: klibc

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • small utilities built with klibc for early boot
  • minimal libc subset for use with initramfs
  • kernel headers used during the build of klibc

Latest version: 2.0.13-1ubuntu0.1
Release: mantic (23.10)
Level: updates
Repository: main

Links



Other versions of "klibc" in Mantic

Repository Area Version
base main 2.0.13-1
security main 2.0.13-1ubuntu0.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.0.13-1ubuntu0.1 2024-04-16 15:07:01 UTC

  klibc (2.0.13-1ubuntu0.1) mantic-security; urgency=medium

  * SECURITY UPDATE: improper pointer arithmetic
    - debian/patches/CVE-2016-9840.patch: remove offset pointer optimization
      in usr/klibc/zlib/inftrees.c.
    - CVE-2016-9840
  * SECURITY UPDATE: improper pointer arithmetic
    - debian/patches/CVE-2016-9841.patch: remove offset pointer optimization
      in usr/klibc/zlib/inffast.c.
    - CVE-2016-9841
  * SECURITY UPDATE: memory corruption during compression
    - debian/patches/CVE-2018-25032.patch: addresses a bug that can crash
      deflate on rare inputs when using Z_FIXED.
    - CVE-2018-25032
  * SECURITY UPDATE: heap-based buffer over-read
    - debian/patches/CVE-2022-37434-1.patch: adds an extra condition to check
      if state->head->extra_max is greater than len before copying, and moves
      the len assignment to be placed before the check in
      usr/klibc/zlib/inflate.c.
    - debian/patches/CVE-2022-37434-2.patch: in the previous patch, the
      placement of the len assignment was causing issues so it was moved
      within the conditional check.
    - CVE-2022-37434

 -- Ian Constantin <email address hidden> Fri, 12 Apr 2024 15:52:21 +0300

CVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
CVE-2016-9841 inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
CVE-2018-25032 zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
CVE-2022-37434 zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only appl



About   -   Send Feedback to @ubuntu_updates