Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0397

Опубликовано: 19 мар. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-0397: glibc security update (MODERATE)

[2.5-81.el5_8.1]

  • Add dist tag [when building file lists (#784646).]
  • Avoid nargs integer overflow which could be used to bypass FORTIFY_SOURCE (#794813)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

glibc

2.5-81.el5_8.1

glibc-common

2.5-81.el5_8.1

glibc-devel

2.5-81.el5_8.1

glibc-headers

2.5-81.el5_8.1

glibc-utils

2.5-81.el5_8.1

nscd

2.5-81.el5_8.1

Oracle Linux x86_64

glibc

2.5-81.el5_8.1

glibc-common

2.5-81.el5_8.1

glibc-devel

2.5-81.el5_8.1

glibc-headers

2.5-81.el5_8.1

glibc-utils

2.5-81.el5_8.1

nscd

2.5-81.el5_8.1

Oracle Linux i386

glibc

2.5-81.el5_8.1

glibc-common

2.5-81.el5_8.1

glibc-devel

2.5-81.el5_8.1

glibc-headers

2.5-81.el5_8.1

glibc-utils

2.5-81.el5_8.1

nscd

2.5-81.el5_8.1

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

redhat
почти 15 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

nvd
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.

debian
больше 12 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ...

github
больше 3 лет назад

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.