Описание
ELSA-2014-1391: glibc security, bug fix, and enhancement update (MODERATE)
[2.12-1.149]
- Remove gconv transliteration loadable modules support (CVE-2014-5119,
- _nl_find_locale: Improve handling of crafted locale names (CVE-2014-0475,
[2.12-1.148]
- Switch gettimeofday from INTUSE to libc_hidden_proto (#1099025).
[2.12-1.147]
- Fix stack overflow due to large AF_INET6 requests (CVE-2013-4458, #1111460).
- Fix buffer overflow in readdir_r (CVE-2013-4237, #1111460).
[2.12-1.146]
- Fix memory order when reading libgcc handle (#905941).
- Fix format specifier in malloc_info output (#1027261).
- Fix nscd lookup for innetgr when netgroup has wildcards (#1054846).
[2.12-1.145]
- Add mmap usage to malloc_info output (#1027261).
[2.12-1.144]
- Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (#1087833).
[2.12-1.143]
- [ppc] Add VDSO IFUNC for gettimeofday (#1028285).
- [ppc] Fix ftime gettimeofday internal call returning bogus data (#1099025).
[2.12-1.142]
- Also relocate in dependency order when doing symbol dependency testing (#1019916).
[2.12-1.141]
- Fix infinite loop in nscd when netgroup is empty (#1085273).
- Provide correct buffer length to netgroup queries in nscd (#1074342).
- Return NULL for wildcard values in getnetgrent from nscd (#1085289).
- Avoid overlapping addresses to stpcpy calls in nscd (#1082379).
- Initialize all of datahead structure in nscd (#1074353).
[2.12-1.140]
- Return EAI_AGAIN for AF_UNSPEC when herrno is TRY_AGAIN (#1044628).
[2.12-1.139]
- Do not fail if one of the two responses to AF_UNSPEC fails (#845218).
[2.12-1.138]
- nscd: Make SELinux checks dynamic (#1025933).
[2.12-1.137]
- Fix race in free() of fastbin chunk (#1027101).
[2.12-1.136]
- Fix copy relocations handling of unique objects (#1032628).
[2.12-1.135]
- Fix encoding name for IDN in getaddrinfo (#981942).
[2.12-1.134]
- Fix return code from getent netgroup when the netgroup is not found (#1039988).
- Fix handling of static TLS in dlopen'ed objects (#995972).
[2.12-1.133]
- Don't use alloca in addgetnetgrentX (#1043557).
- Adjust pointers to triplets in netgroup query data (#1043557).
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
glibc
2.12-1.149.el6
glibc-common
2.12-1.149.el6
glibc-devel
2.12-1.149.el6
glibc-headers
2.12-1.149.el6
glibc-static
2.12-1.149.el6
glibc-utils
2.12-1.149.el6
nscd
2.12-1.149.el6
Oracle Linux i686
glibc
2.12-1.149.el6
glibc-common
2.12-1.149.el6
glibc-devel
2.12-1.149.el6
glibc-headers
2.12-1.149.el6
glibc-static
2.12-1.149.el6
glibc-utils
2.12-1.149.el6
nscd
2.12-1.149.el6
Связанные CVE
Связанные уязвимости
sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2. ...
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.