Sender: |
|
Date: |
Mon, 27 Aug 2012 13:04:15 -0500 |
Reply-To: |
|
Content-Transfer-Encoding: |
7bit |
Subject: |
|
From: |
|
Content-Type: |
text/plain; charset="UTF-8"; format=flowed |
In-Reply-To: |
|
Organization: |
Fermilab |
MIME-Version: |
1.0 |
Parts/Attachments: |
|
|
Synopsis: Moderate: glibc security update
Issue Date: 2012-08-27
CVE Numbers: CVE-2012-3480
The glibc packages provide the standard C and standard math libraries used
by multiple programs on the system. Without these libraries, the Linux
system cannot function properly.
Multiple integer overflow flaws, leading to stack-based buffer overflows,
were found in glibc's functions for converting a string to a numeric
representation (strtod(), strtof(), and strtold()). If an application used
such a function on attacker controlled input, it could cause the
application to crash or, potentially, execute arbitrary code.
(CVE-2012-3480)
All users of glibc are advised to upgrade to these updated packages, which
contain a backported patch to correct these issues.
SL6
x86_64
glibc-2.12-1.80.el6_3.5.i686.rpm
glibc-2.12-1.80.el6_3.5.x86_64.rpm
glibc-common-2.12-1.80.el6_3.5.x86_64.rpm
glibc-devel-2.12-1.80.el6_3.5.i686.rpm
glibc-devel-2.12-1.80.el6_3.5.x86_64.rpm
glibc-headers-2.12-1.80.el6_3.5.x86_64.rpm
glibc-utils-2.12-1.80.el6_3.5.x86_64.rpm
nscd-2.12-1.80.el6_3.5.x86_64.rpm
glibc-static-2.12-1.80.el6_3.5.i686.rpm
glibc-static-2.12-1.80.el6_3.5.x86_64.rpm
i386
glibc-2.12-1.80.el6_3.5.i686.rpm
glibc-common-2.12-1.80.el6_3.5.i686.rpm
glibc-devel-2.12-1.80.el6_3.5.i686.rpm
glibc-headers-2.12-1.80.el6_3.5.i686.rpm
glibc-utils-2.12-1.80.el6_3.5.i686.rpm
nscd-2.12-1.80.el6_3.5.i686.rpm
glibc-static-2.12-1.80.el6_3.5.i686.rpm
- Scientific Linux Development Team
|
|
|