Last commit made on 2016-04-26
Get this branch:
git clone -b applied/ubuntu/trusty-proposed https://git.launchpad.net/ubuntu/+source/eglibc
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information


Recent commits

e22ceb4... by Steve Beattie on 2016-04-09

Import patches-applied version 2.19-0ubuntu6.8 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 23e1a4b2ab44d6a84e80cc2f6765af9cf70c5e7d
Unapplied parent: 9ecdb04567e9ab3b12311dc309fb9acbc38cb705

New changelog entries:
  * SECURITY UPDATE: buffer overflow in gethostbyname_r and related
    - debian/patches/any/CVE-2015-1781.diff: take alignment padding
      into account when computing if buffer is too small.
    - CVE-2015-1781
  * SECURITY UPDATE: glibc Name Service Switch (NSS) denial of sevice
    - debian/patches/any/CVE-2014-8121-1.diff: do not close NSS files
      database during iteration.
    - debian/patches/any/CVE-2014-8121-2.diff: Separate internal state
      between getXXent and getXXbyYY NSS calls.
    - CVE-2014-8121
  * SECURITY UPDATE: glibc unbounded stack usage in NaN strtod
    - debian/patches/any/CVE-2014-9761-1.diff: Refactor strtod parsing
      of NaN payloads.
    - debian/patches/any/CVE-2014-9761-1.diff: Fix nan functions
      handling of payload strings
    - CVE-2014-9761
  * SECURITY UPDATE: NSS files long line buffer overflow
    - debian/patches/any/CVE-2015-5277.diff: Don't ignore too long
      lines in nss_files
    - CVE-2015-5277
  * SECURITY UPDATE: out of range data to strftime() causes segfault
    (denial of service)
    - debian/patches/any/CVE-2015-8776.diff: add range checks to
      strftime() processing
    - CVE-2015-8776
  * SECURITY UPDATE: glibc honors LD_POINTER_GUARD env for setuid
    AT_SECURE programs (e.g. setuid), allowing disabling of pointer
    - debian/patches/any/CVE-2015-8777.diff: Always enable pointer
    - CVE-2015-8777
  * SECURITY UPDATE: integer overflow in hcreate and hcreate_r
    - debian/patches/any/CVE-2015-8778.diff: check for large inputs
    - CVE-2015-8778
  * SECURITY UPDATE: unbounded stack allocation in catopen()
    - debian/patches/any/CVE-2015-8779.diff: stop using unbounded
    - CVE-2015-8779
  * SECURITY UPDATE: Stack overflow in _nss_dns_getnetbyname_r
    - debian/patches/any/CVE-2016-3075.diff: do not make unneeded
      memory copy on the stack.
    - CVE-2016-3075
  * SECURITY UPDATE: pt_chown privilege escalation
    - debian/patches/any/CVE-2016-2856.diff: grantpt: trust the kernel
      about pty group and permission mode
    - debian/sysdeps/linux.mk: don't build pt_chown
    - debian/rules.d/debhelper.mk: only install pt_chown when built.
    - CVE-2016-2856, CVE-2013-2207
  * debian/debhelper.in/libc.postinst: add reboot notifications for
    security updates (LP: #1546457)
  * debian/patches/ubuntu/submitted-no-stack-backtrace.diff: update
    patch to eliminate compiler warning.

9ecdb04... by Steve Beattie on 2016-04-09

[PATCH] grantpt: trust the kernel about pty group and permission mode

Gbp-Pq: any/CVE-2016-2856.diff.

4151a8d... by Steve Beattie on 2016-04-09

[PATCH] CVE-2016-3075: Stack overflow in _nss_dns_getnetbyname_r [BZ #19879]

Gbp-Pq: any/CVE-2016-3075.diff.

2bea668... by Steve Beattie on 2016-04-09

[PATCH] Fix BZ #17905

Gbp-Pq: any/CVE-2015-8779.diff.

259c6b3... by Steve Beattie on 2016-04-09

[PATCH] Handle overflow in __hcreate_r

Gbp-Pq: any/CVE-2015-8778.diff.

b5908d7... by Steve Beattie on 2016-04-09

[PATCH] Always enable pointer guard [BZ #18928]

Gbp-Pq: any/CVE-2015-8777.diff.

cb3853c... by Steve Beattie on 2016-04-09

[PATCH] Fix BZ #18985 -- out of range data to strftime() causes a segfault

Gbp-Pq: any/CVE-2015-8776.diff.

50e7a23... by Steve Beattie on 2016-04-09

[PATCH] Don't ignore too long lines in nss_files (BZ #17079)

Gbp-Pq: any/CVE-2015-5277.diff.

6456512... by Steve Beattie on 2016-04-09

[PATCH] CVE-2015-1781: resolv/nss_dns/dns-host.c buffer overflow [BZ#18287]

Gbp-Pq: any/CVE-2015-1781.diff.

31ff92e... by Steve Beattie on 2016-04-09

[PATCH] Fix nan functions handling of payload strings (bug 16961, bug 16962).

Gbp-Pq: any/CVE-2014-9761-2.diff.