Описание
Security update for glibc
This update for glibc fixes the following issues:
- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)
- CVE-2013-2207: pt_chown tricked into granting access to another users pseudo-terminal (bsc#830257)
- CVE-2013-4458: Stack (frame) overflow in getaddrinfo() when called with AF_INET6 (bsc#847227)
- CVE-2014-8121: denial of service issue in the NSS backends (bsc#918187)
- bsc#920338: Read past end of pattern in fnmatch
- CVE-2015-1781: buffer overflow in nss_dns (bsc#927080)
The following non-security bugs were fixed:
- bnc#892065: SIGSEV tst-setlocale3 in glibc-2.11.3-17.68.1
- bnc#863499: Memory leak in getaddrinfo when many RRs are returned
- bsc#892065: Avoid unbound alloca in setenv
- bsc#945779: Properly reread entry after failure in nss_files getent function
Список пакетов
SUSE Linux Enterprise Server 11 SP2-LTSS
Ссылки
- Link for SUSE-SU-2016:0470-1
- E-Mail link for SUSE-SU-2016:0470-1
- SUSE Security Ratings
- SUSE Bug 830257
- SUSE Bug 847227
- SUSE Bug 863499
- SUSE Bug 892065
- SUSE Bug 918187
- SUSE Bug 920338
- SUSE Bug 927080
- SUSE Bug 945779
- SUSE Bug 950944
- SUSE Bug 961721
- SUSE Bug 962736
- SUSE Bug 962737
- SUSE Bug 962738
- SUSE Bug 962739
- SUSE CVE CVE-2013-2207 page
- SUSE CVE CVE-2013-4458 page
- SUSE CVE CVE-2014-8121 page
Описание
pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
Затронутые продукты
Ссылки
- CVE-2013-2207
- SUSE Bug 1123874
- SUSE Bug 830257
- SUSE Bug 979109
Описание
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
Затронутые продукты
Ссылки
- CVE-2013-4458
- SUSE Bug 1123874
- SUSE Bug 847227
- SUSE Bug 883217
- SUSE Bug 941444
- SUSE Bug 955181
- SUSE Bug 967023
- SUSE Bug 980483
Описание
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
Затронутые продукты
Ссылки
- CVE-2014-8121
- SUSE Bug 1123874
- SUSE Bug 918187
- SUSE Bug 945779
Описание
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
Затронутые продукты
Ссылки
- CVE-2014-9761
- SUSE Bug 1123874
- SUSE Bug 962738
- SUSE Bug 986086
Описание
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
Затронутые продукты
Ссылки
- CVE-2015-1781
- SUSE Bug 1123874
- SUSE Bug 927080
- SUSE Bug 979109
Описание
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Затронутые продукты
Ссылки
- CVE-2015-7547
- SUSE Bug 1077097
- SUSE Bug 847227
- SUSE Bug 961721
- SUSE Bug 967023
- SUSE Bug 967061
- SUSE Bug 967072
- SUSE Bug 967496
- SUSE Bug 969216
- SUSE Bug 969241
- SUSE Bug 969591
- SUSE Bug 986086
Описание
The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
Затронутые продукты
Ссылки
- CVE-2015-8776
- SUSE Bug 1123874
- SUSE Bug 962736
- SUSE Bug 986086
Описание
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
Затронутые продукты
Ссылки
- CVE-2015-8777
- SUSE Bug 1123874
- SUSE Bug 950944
- SUSE Bug 962735
Описание
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
Затронутые продукты
Ссылки
- CVE-2015-8778
- SUSE Bug 1123874
- SUSE Bug 962737
- SUSE Bug 986086
Описание
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Затронутые продукты
Ссылки
- CVE-2015-8779
- SUSE Bug 1123874
- SUSE Bug 962739
- SUSE Bug 965453
- SUSE Bug 986086