This bug was fixed in the package eglibc - 2.19-0ubuntu6.8 --------------- eglibc (2.19-0ubuntu6.8) trusty-security; urgency=medium
* SECURITY UPDATE: buffer overflow in gethostbyname_r and related functions - debian/patches/any/CVE-2015-1781.diff: take alignment padding into account when computing if buffer is too small. - CVE-2015-1781 * SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice - debian/patches/any/CVE-2014-8121-1.diff: do not close NSS files database during iteration. - debian/patches/any/CVE-2014-8121-2.diff: Separate internal state between getXXent and getXXbyYY NSS calls. - CVE-2014-8121 * SECURITY UPDATE: glibc unbounded stack usage in NaN strtod conversion - debian/patches/any/CVE-2014-9761-1.diff: Refactor strtod parsing of NaN payloads. - debian/patches/any/CVE-2014-9761-1.diff: Fix nan functions handling of payload strings - CVE-2014-9761 * SECURITY UPDATE: NSS files long line buffer overflow - debian/patches/any/CVE-2015-5277.diff: Don't ignore too long lines in nss_files - CVE-2015-5277 * SECURITY UPDATE: out of range data to strftime() causes segfault (denial of service) - debian/patches/any/CVE-2015-8776.diff: add range checks to strftime() processing - CVE-2015-8776 * SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid AT_SECURE programs (e.g. setuid), allowing disabling of pointer mangling - debian/patches/any/CVE-2015-8777.diff: Always enable pointer guard - CVE-2015-8777 * SECURITY UPDATE: integer overflow in hcreate and hcreate_r - debian/patches/any/CVE-2015-8778.diff: check for large inputs - CVE-2015-8778 * SECURITY UPDATE: unbounded stack allocation in catopen() - debian/patches/any/CVE-2015-8779.diff: stop using unbounded alloca() - CVE-2015-8779 * SECURITY UPDATE: Stack overflow in _nss_dns_getnetbyname_r - debian/patches/any/CVE-2016-3075.diff: do not make unneeded memory copy on the stack. - CVE-2016-3075 * SECURITY UPDATE: pt_chown privilege escalation - debian/patches/any/CVE-2016-2856.diff: grantpt: trust the kernel about pty group and permission mode - debian/sysdeps/linux.mk: don't build pt_chown - debian/rules.d/debhelper.mk: only install pt_chown when built. - CVE-2016-2856, CVE-2013-2207 * debian/debhelper.in/libc.postinst: add reboot notifications for security updates (LP: #1546457) * debian/patches/ubuntu/submitted-no-stack-backtrace.diff: update patch to eliminate compiler warning. -- Steve Beattie <sbeat...@ubuntu.com> Fri, 08 Apr 2016 23:26:02 -0700 ** Changed in: eglibc (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-5277 ** Changed in: eglibc (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1546457 Title: libc6 2.15-0ubuntu10.13 doesn't mark reboot-required To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1546457/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs