Описание
Security update for glibc
This update for glibc fixes the following security issues:
- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)
The following non-security bugs were fixed:
- bsc#955647: Resource leak in resolver
- bsc#956716: Don't do lock elision on an error checking mutex
- bsc#958315: Reinitialize dl_load_write_lock on fork
Список пакетов
SUSE Linux Enterprise Desktop 12 SP1
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP1
Ссылки
- Link for SUSE-SU-2016:0471-1
- E-Mail link for SUSE-SU-2016:0471-1
- SUSE Security Ratings
- SUSE Bug 950944
- SUSE Bug 955647
- SUSE Bug 956716
- SUSE Bug 958315
- SUSE Bug 961721
- SUSE Bug 962736
- SUSE Bug 962737
- SUSE Bug 962738
- SUSE Bug 962739
- SUSE CVE CVE-2014-9761 page
- SUSE CVE CVE-2015-7547 page
- SUSE CVE CVE-2015-8776 page
- SUSE CVE CVE-2015-8777 page
- SUSE CVE CVE-2015-8778 page
- SUSE CVE CVE-2015-8779 page
Описание
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
Затронутые продукты
Ссылки
- CVE-2014-9761
- SUSE Bug 1123874
- SUSE Bug 962738
- SUSE Bug 986086
Описание
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Затронутые продукты
Ссылки
- CVE-2015-7547
- SUSE Bug 1077097
- SUSE Bug 847227
- SUSE Bug 961721
- SUSE Bug 967023
- SUSE Bug 967061
- SUSE Bug 967072
- SUSE Bug 967496
- SUSE Bug 969216
- SUSE Bug 969241
- SUSE Bug 969591
- SUSE Bug 986086
Описание
The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
Затронутые продукты
Ссылки
- CVE-2015-8776
- SUSE Bug 1123874
- SUSE Bug 962736
- SUSE Bug 986086
Описание
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
Затронутые продукты
Ссылки
- CVE-2015-8777
- SUSE Bug 1123874
- SUSE Bug 950944
- SUSE Bug 962735
Описание
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
Затронутые продукты
Ссылки
- CVE-2015-8778
- SUSE Bug 1123874
- SUSE Bug 962737
- SUSE Bug 986086
Описание
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
Затронутые продукты
Ссылки
- CVE-2015-8779
- SUSE Bug 1123874
- SUSE Bug 962739
- SUSE Bug 965453
- SUSE Bug 986086