SCIENTIFIC-LINUX-ERRATA Archives

December 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Tue, 3 Dec 2013 20:07:06 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (75 lines)
Synopsis:          Moderate: glibc security, bug fix, and enhancement update
Advisory ID:       SLSA-2013:1605-2
Issue Date:        2013-11-21
CVE Numbers:       CVE-2013-0242
                   CVE-2013-1914
                   CVE-2013-4332
--

Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in glibc's memory allocator functions (pvalloc, valloc, and
memalign). If an application used such a function, it could cause the
application to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2013-4332)

A flaw was found in the regular expression matching routines that process
multibyte character input. If an application utilized the glibc regular
expression matching mechanism, an attacker could provide specially-crafted
input that, when processed, would cause the application to crash.
(CVE-2013-0242)

It was found that getaddrinfo() did not limit the amount of stack memory
used during name resolution. An attacker able to make an application
resolve an attacker-controlled hostname or IP address could possibly cause
the application to exhaust all stack memory and crash. (CVE-2013-1914)

Among other changes, this update includes an important fix for the
following bug:

* Due to a defect in the initial release of the getaddrinfo() system call
in Scientific Linux 6.0, AF_INET and AF_INET6 queries resolved from the
/etc/hosts file returned queried names as canonical names. This incorrect
behavior is, however, still considered to be the expected behavior. As a
result of a recent change in getaddrinfo(), AF_INET6 queries started
resolving the canonical names correctly. However, this behavior was
unexpected by applications that relied on queries resolved from the
/etc/hosts file, and these applications could thus fail to operate
properly. This update applies a fix ensuring that AF_INET6 queries
resolved from /etc/hosts always return the queried name as canonical. Note
that DNS lookups are resolved properly and always return the correct
canonical names. A proper fix to AF_INET6 queries resolution from
/etc/hosts may be applied in future releases; for now, due to a lack of
standard, Red Hat suggests the first entry in the /etc/hosts file, that
applies for the IP address being resolved, to be considered the canonical
entry.
--

SL6
  x86_64
    glibc-2.12-1.132.el6.i686.rpm
    glibc-2.12-1.132.el6.x86_64.rpm
    glibc-common-2.12-1.132.el6.x86_64.rpm
    glibc-debuginfo-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-2.12-1.132.el6.x86_64.rpm
    glibc-debuginfo-common-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-common-2.12-1.132.el6.x86_64.rpm
    glibc-devel-2.12-1.132.el6.i686.rpm
    glibc-devel-2.12-1.132.el6.x86_64.rpm
    glibc-headers-2.12-1.132.el6.x86_64.rpm
    glibc-utils-2.12-1.132.el6.x86_64.rpm
    nscd-2.12-1.132.el6.x86_64.rpm
    glibc-static-2.12-1.132.el6.i686.rpm
    glibc-static-2.12-1.132.el6.x86_64.rpm
  i386
    glibc-2.12-1.132.el6.i686.rpm
    glibc-common-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-common-2.12-1.132.el6.i686.rpm
    glibc-devel-2.12-1.132.el6.i686.rpm
    glibc-headers-2.12-1.132.el6.i686.rpm
    glibc-utils-2.12-1.132.el6.i686.rpm
    nscd-2.12-1.132.el6.i686.rpm
    glibc-static-2.12-1.132.el6.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2