Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-1207

Опубликовано: 27 авг. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-1207: glibc security and bug fix update (MODERATE)

[2.5-81.el5_8.7]

  • Fix out of bounds array access in strto* exposed by 847929 patch.

[2.5-81.el5_8.6]

  • Fix integer overflow leading to buffer overflow in strto* (#847929)

[2.5-81.el5_8.5]

  • Do not use PT_IEEE_IP ptrace calls (#839411)
  • Update ULPs (#839411)
  • Fix various transcendentals in non-default rounding modes (#839411)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

glibc

2.5-81.el5_8.7

glibc-common

2.5-81.el5_8.7

glibc-devel

2.5-81.el5_8.7

glibc-headers

2.5-81.el5_8.7

glibc-utils

2.5-81.el5_8.7

nscd

2.5-81.el5_8.7

Oracle Linux x86_64

glibc

2.5-81.el5_8.7

glibc-common

2.5-81.el5_8.7

glibc-devel

2.5-81.el5_8.7

glibc-headers

2.5-81.el5_8.7

glibc-utils

2.5-81.el5_8.7

nscd

2.5-81.el5_8.7

Oracle Linux i386

glibc

2.5-81.el5_8.7

glibc-common

2.5-81.el5_8.7

glibc-devel

2.5-81.el5_8.7

glibc-headers

2.5-81.el5_8.7

glibc-utils

2.5-81.el5_8.7

nscd

2.5-81.el5_8.7

Связанные CVE

Связанные уязвимости

ubuntu
почти 13 лет назад

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

redhat
около 13 лет назад

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

nvd
почти 13 лет назад

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.

debian
почти 13 лет назад

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, ...

github
больше 3 лет назад

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.