Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0551-1

Опубликовано: 13 сент. 2013
Источник: suse-cvrf

Описание

Security update for glibc

This update for glibc contains the following fixes:

* Fix integer overflows in malloc (CVE-2013-4332, bnc#839870) * Fix buffer overflow in glob (bnc#691365) * Fix buffer overflow in strcoll (CVE-2012-4412, bnc#779320) * Update mount flags in <sys/mount.h> (bnc#791928) * Fix buffer overrun in regexp matcher (CVE-2013-0242, bnc#801246) * Fix memory leaks in dlopen (bnc#811979) * Fix stack overflow in getaddrinfo with many results (CVE-2013-1914, bnc#813121) * Fix check for XEN build in glibc_post_upgrade that causes missing init re-exec (bnc#818628) * Don't raise UNDERFLOW in tan/tanf for small but normal argument (bnc#819347) * Properly cross page boundary in SSE4.2 implementation of strcmp (bnc#822210) * Fix robust mutex handling after fork (bnc#827811) * Fix missing character in IBM-943 charset (bnc#828235) * Fix use of alloca in gaih_inet (bnc#828637) * Initialize pointer guard also in static executables (CVE-2013-4788, bnc#830268) * Fix readdir_r with long file names (CVE-2013-4237, bnc#834594).

Security Issues:

* CVE-2012-4412 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412> * CVE-2013-0242 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242> * CVE-2013-1914 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914> * CVE-2013-4237 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237> * CVE-2013-4332 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332> * CVE-2013-4788 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788>

Список пакетов

SUSE Linux Enterprise Server 11 SP1-LTSS
glibc-2.11.1-0.58.1
glibc-32bit-2.11.1-0.58.1
glibc-devel-2.11.1-0.58.1
glibc-devel-32bit-2.11.1-0.58.1
glibc-html-2.11.1-0.58.1
glibc-i18ndata-2.11.1-0.58.1
glibc-info-2.11.1-0.58.1
glibc-locale-2.11.1-0.58.1
glibc-locale-32bit-2.11.1-0.58.1
glibc-profile-2.11.1-0.58.1
glibc-profile-32bit-2.11.1-0.58.1
libxcrypt-3.0.3-0.4.1
libxcrypt-32bit-3.0.3-0.4.1
nscd-2.11.1-0.58.1
pam-modules-11-1.18.1
pam-modules-32bit-11-1.18.1
pwdutils-3.2.8-0.4.1
pwdutils-plugin-audit-3.2.8-0.4.1
SUSE Linux Enterprise Server 11 SP1-TERADATA
glibc-2.11.1-0.58.1
glibc-32bit-2.11.1-0.58.1
glibc-devel-2.11.1-0.58.1
glibc-devel-32bit-2.11.1-0.58.1
glibc-html-2.11.1-0.58.1
glibc-i18ndata-2.11.1-0.58.1
glibc-info-2.11.1-0.58.1
glibc-locale-2.11.1-0.58.1
glibc-locale-32bit-2.11.1-0.58.1
glibc-profile-2.11.1-0.58.1
glibc-profile-32bit-2.11.1-0.58.1
libxcrypt-3.0.3-0.4.1
libxcrypt-32bit-3.0.3-0.4.1
nscd-2.11.1-0.58.1
pam-modules-11-1.18.1
pam-modules-32bit-11-1.18.1
pwdutils-3.2.8-0.4.1
pwdutils-plugin-audit-3.2.8-0.4.1
SUSE Linux Enterprise Server 11 SP2
glibc-2.11.3-17.45.49.1
glibc-32bit-2.11.3-17.45.49.1
glibc-devel-2.11.3-17.45.49.1
glibc-devel-32bit-2.11.3-17.45.49.1
glibc-html-2.11.3-17.45.49.1
glibc-i18ndata-2.11.3-17.45.49.1
glibc-info-2.11.3-17.45.49.1
glibc-locale-2.11.3-17.45.49.1
glibc-locale-32bit-2.11.3-17.45.49.1
glibc-locale-x86-2.11.3-17.45.49.1
glibc-profile-2.11.3-17.45.49.1
glibc-profile-32bit-2.11.3-17.45.49.1
glibc-profile-x86-2.11.3-17.45.49.1
glibc-x86-2.11.3-17.45.49.1
nscd-2.11.3-17.45.49.1
SUSE Linux Enterprise Server 11 SP2-LTSS
glibc-2.11.3-17.45.49.1
glibc-32bit-2.11.3-17.45.49.1
glibc-devel-2.11.3-17.45.49.1
glibc-devel-32bit-2.11.3-17.45.49.1
glibc-html-2.11.3-17.45.49.1
glibc-i18ndata-2.11.3-17.45.49.1
glibc-info-2.11.3-17.45.49.1
glibc-locale-2.11.3-17.45.49.1
glibc-locale-32bit-2.11.3-17.45.49.1
glibc-locale-x86-2.11.3-17.45.49.1
glibc-profile-2.11.3-17.45.49.1
glibc-profile-32bit-2.11.3-17.45.49.1
glibc-profile-x86-2.11.3-17.45.49.1
glibc-x86-2.11.3-17.45.49.1
nscd-2.11.3-17.45.49.1
SUSE Linux Enterprise Server for SAP Applications 11 SP2
glibc-2.11.3-17.45.49.1
glibc-32bit-2.11.3-17.45.49.1
glibc-devel-2.11.3-17.45.49.1
glibc-devel-32bit-2.11.3-17.45.49.1
glibc-html-2.11.3-17.45.49.1
glibc-i18ndata-2.11.3-17.45.49.1
glibc-info-2.11.3-17.45.49.1
glibc-locale-2.11.3-17.45.49.1
glibc-locale-32bit-2.11.3-17.45.49.1
glibc-locale-x86-2.11.3-17.45.49.1
glibc-profile-2.11.3-17.45.49.1
glibc-profile-32bit-2.11.3-17.45.49.1
glibc-profile-x86-2.11.3-17.45.49.1
glibc-x86-2.11.3-17.45.49.1
nscd-2.11.3-17.45.49.1

Описание

Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки

Описание

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-32bit-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-2.11.1-0.58.1
SUSE Linux Enterprise Server 11 SP1-LTSS:glibc-devel-32bit-2.11.1-0.58.1

Ссылки
Уязвимость SUSE-SU-2015:0551-1