UbuntuUpdates.org

Package "libklibc-dev"

Name: libklibc-dev

Description:

kernel headers used during the build of klibc

Latest version: 2.0.10-4ubuntu0.1
Release: jammy (22.04)
Level: security
Repository: main
Head package: klibc
Homepage: https://git.kernel.org/cgit/libs/klibc/klibc.git

Links


Download "libklibc-dev"


Other versions of "libklibc-dev" in Jammy

Repository Area Version
base main 2.0.10-4
updates main 2.0.10-4ubuntu0.1

Changelog

Version: 2.0.10-4ubuntu0.1 2024-04-16 14:07:24 UTC

  klibc (2.0.10-4ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: improper pointer arithmetic
    - debian/patches/CVE-2016-9840.patch: remove offset pointer optimization
      in usr/klibc/zlib/inftrees.c.
    - CVE-2016-9840
  * SECURITY UPDATE: improper pointer arithmetic
    - debian/patches/CVE-2016-9841.patch: remove offset pointer optimization
      in usr/klibc/zlib/inffast.c.
    - CVE-2016-9841
  * SECURITY UPDATE: memory corruption during compression
    - debian/patches/CVE-2018-25032.patch: addresses a bug that can crash
      deflate on rare inputs when using Z_FIXED.
    - CVE-2018-25032
  * SECURITY UPDATE: heap-based buffer over-read
    - debian/patches/CVE-2022-37434-1.patch: adds an extra condition to check
      if state->head->extra_max is greater than len before copying, and moves
      the len assignment to be placed before the check in
      usr/klibc/zlib/inflate.c.
    - debian/patches/CVE-2022-37434-2.patch: in the previous patch, the
      placement of the len assignment was causing issues so it was moved
      within the conditional check.
    - CVE-2022-37434

 -- Ian Constantin <email address hidden> Sat, 13 Apr 2024 12:34:04 +0300

CVE-2016-9840 inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
CVE-2016-9841 inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
CVE-2018-25032 zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
CVE-2022-37434 zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only appl



About   -   Send Feedback to @ubuntu_updates