From ${URL} : Multiple vulnerabilities were reported in uClibc. CVE-2017-9728: In uClibc 0.9.33.2, there is an out-of-bounds read in the get_subexp function in misc/regex/regexec.c when processing a crafted regular expression. CVE-2017-9729: In uClibc 0.9.33.2, there is stack exhaustion (uncontrolled recursion) in the check_dst_limits_calc_pos_1 function in misc/regex/regexec.c when processing a crafted regular expression. References: http://seclists.org/oss-sec/2017/q2/486 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
http://seclists.org/oss-sec/2017/q2/530
(In reply to Agostino Sarubbo from comment #1) > http://seclists.org/oss-sec/2017/q2/530 this bug is invalid. you are confusing uclibc and uclibc-ng. can the @security team please close it.
(In reply to Anthony Basile from comment #2) > (In reply to Agostino Sarubbo from comment #1) > > http://seclists.org/oss-sec/2017/q2/530 > > this bug is invalid. you are confusing uclibc and uclibc-ng. can the > @security team please close it. Without having performed an audit, the original reported claims also uclibc-ng is affected in http://seclists.org/oss-sec/2017/q2/530 upon question in http://seclists.org/oss-sec/2017/q2/490 Given that the code-bases have same parents but time since divergence there is always the likelihood that the code is in separate location or logic maintained with similar, but not equal code, so likely makes sense to get a statement from upstream on their analysis.
Incidentally, seems we also have sys-libs/uclibc in stable for version 0.9.33.2-r15 currently. After discussion with maintainer we'll mask this implementation for removal Security: Remember to add the removal GLSA template to text
uclibc support in Gentoo has been removed.