Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1411

Опубликовано: 08 окт. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2013-1411: glibc security and bug fix update (MODERATE)

[2.5-118.2]

  • Fix integer overflows in *valloc and memalign. (#1011804).

[2.5-118.1]

  • Add support for newer L3 caches on x86-64 and correctly count the number of hardware threads sharing a cacheline (#1011424).

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

glibc

2.5-118.el5_10.2

glibc-common

2.5-118.el5_10.2

glibc-devel

2.5-118.el5_10.2

glibc-headers

2.5-118.el5_10.2

glibc-utils

2.5-118.el5_10.2

nscd

2.5-118.el5_10.2

Oracle Linux x86_64

glibc

2.5-118.el5_10.2

glibc-common

2.5-118.el5_10.2

glibc-devel

2.5-118.el5_10.2

glibc-headers

2.5-118.el5_10.2

glibc-utils

2.5-118.el5_10.2

nscd

2.5-118.el5_10.2

Oracle Linux i386

glibc

2.5-118.el5_10.2

glibc-common

2.5-118.el5_10.2

glibc-devel

2.5-118.el5_10.2

glibc-headers

2.5-118.el5_10.2

glibc-utils

2.5-118.el5_10.2

nscd

2.5-118.el5_10.2

Связанные CVE

Связанные уязвимости

ubuntu
почти 12 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

redhat
около 12 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

nvd
почти 12 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.

debian
почти 12 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (ak ...

github
больше 3 лет назад

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.