Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1391

Опубликовано: 15 окт. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-1391: glibc security, bug fix, and enhancement update (MODERATE)

[2.12-1.149]

  • Remove gconv transliteration loadable modules support (CVE-2014-5119,
    • _nl_find_locale: Improve handling of crafted locale names (CVE-2014-0475,

[2.12-1.148]

  • Switch gettimeofday from INTUSE to libc_hidden_proto (#1099025).

[2.12-1.147]

  • Fix stack overflow due to large AF_INET6 requests (CVE-2013-4458, #1111460).
  • Fix buffer overflow in readdir_r (CVE-2013-4237, #1111460).

[2.12-1.146]

  • Fix memory order when reading libgcc handle (#905941).
  • Fix format specifier in malloc_info output (#1027261).
  • Fix nscd lookup for innetgr when netgroup has wildcards (#1054846).

[2.12-1.145]

  • Add mmap usage to malloc_info output (#1027261).

[2.12-1.144]

  • Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (#1087833).

[2.12-1.143]

  • [ppc] Add VDSO IFUNC for gettimeofday (#1028285).
  • [ppc] Fix ftime gettimeofday internal call returning bogus data (#1099025).

[2.12-1.142]

  • Also relocate in dependency order when doing symbol dependency testing (#1019916).

[2.12-1.141]

  • Fix infinite loop in nscd when netgroup is empty (#1085273).
  • Provide correct buffer length to netgroup queries in nscd (#1074342).
  • Return NULL for wildcard values in getnetgrent from nscd (#1085289).
  • Avoid overlapping addresses to stpcpy calls in nscd (#1082379).
  • Initialize all of datahead structure in nscd (#1074353).

[2.12-1.140]

  • Return EAI_AGAIN for AF_UNSPEC when herrno is TRY_AGAIN (#1044628).

[2.12-1.139]

  • Do not fail if one of the two responses to AF_UNSPEC fails (#845218).

[2.12-1.138]

  • nscd: Make SELinux checks dynamic (#1025933).

[2.12-1.137]

  • Fix race in free() of fastbin chunk (#1027101).

[2.12-1.136]

  • Fix copy relocations handling of unique objects (#1032628).

[2.12-1.135]

  • Fix encoding name for IDN in getaddrinfo (#981942).

[2.12-1.134]

  • Fix return code from getent netgroup when the netgroup is not found (#1039988).
  • Fix handling of static TLS in dlopen'ed objects (#995972).

[2.12-1.133]

  • Don't use alloca in addgetnetgrentX (#1043557).
  • Adjust pointers to triplets in netgroup query data (#1043557).

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

glibc

2.12-1.149.el6

glibc-common

2.12-1.149.el6

glibc-devel

2.12-1.149.el6

glibc-headers

2.12-1.149.el6

glibc-static

2.12-1.149.el6

glibc-utils

2.12-1.149.el6

nscd

2.12-1.149.el6

Oracle Linux i686

glibc

2.12-1.149.el6

glibc-common

2.12-1.149.el6

glibc-devel

2.12-1.149.el6

glibc-headers

2.12-1.149.el6

glibc-static

2.12-1.149.el6

glibc-utils

2.12-1.149.el6

nscd

2.12-1.149.el6

Связанные CVE

Связанные уязвимости

ubuntu
почти 12 лет назад

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.

redhat
около 12 лет назад

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.

nvd
почти 12 лет назад

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.

debian
почти 12 лет назад

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2. ...

ubuntu
больше 11 лет назад

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.