CVE-2008-1391

NameCVE-2008-1391
DescriptionMultiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, ...
SourceCVE (at NVD; oss-sec, OSVDB, EDB, Red Hat, Ubuntu, Gentoo, SuSE, more)
ReferencesDSA-2058-1
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
eglibc (PTS)squeeze2.11.3-4fixed
wheezy2.13-38+deb7u1fixed
jessie, sid2.18-4fixed

The information above is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
eglibcsource(unstable)2.11-1low
glibcsource(unstable)(unfixed)low
glibcsourcelenny2.7-18lenny4DSA-2058-1
kfreebsd-6source(unstable)(not affected)
kfreebsd-7source(unstable)(not affected)

Notes

- kfreebsd-6 <not-affected> (see bug #483152)
- kfreebsd-7 <not-affected> (see bug #483152)
[lenny] - glibc <no-dsa> (minor issue)
not sure if it is a security bug, an attacker should not be able to change the format string
http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=199eb0de8d
http://sourceware.org/bugzilla/show_bug.cgi?id=10600
PoC php -r 'money_format("%.1073741821i",1);' I can reproduce on 32bit, not 64bit

Search for package or bug name: Reporting problems

Home - Testing Security Team - Debian Security - Source (SVN)