Описание
ELSA-2012-0397: glibc security update (MODERATE)
[2.5-81.el5_8.1]
- Add dist tag [when building file lists (#784646).]
- Avoid nargs integer overflow which could be used to bypass FORTIFY_SOURCE (#794813)
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
glibc
2.5-81.el5_8.1
glibc-common
2.5-81.el5_8.1
glibc-devel
2.5-81.el5_8.1
glibc-headers
2.5-81.el5_8.1
glibc-utils
2.5-81.el5_8.1
nscd
2.5-81.el5_8.1
Oracle Linux x86_64
glibc
2.5-81.el5_8.1
glibc-common
2.5-81.el5_8.1
glibc-devel
2.5-81.el5_8.1
glibc-headers
2.5-81.el5_8.1
glibc-utils
2.5-81.el5_8.1
nscd
2.5-81.el5_8.1
Oracle Linux i386
glibc
2.5-81.el5_8.1
glibc-common
2.5-81.el5_8.1
glibc-devel
2.5-81.el5_8.1
glibc-headers
2.5-81.el5_8.1
glibc-utils
2.5-81.el5_8.1
nscd
2.5-81.el5_8.1
Связанные CVE
Связанные уязвимости
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
Integer overflow in the vfprintf function in stdio-common/vfprintf.c i ...
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.