SCIENTIFIC-LINUX-ERRATA Archives

December 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 21 Dec 2015 23:13:49 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (58 lines)
Synopsis:          Moderate: glibc security, bug fix, and enhancement update
Advisory ID: SLSA-2015:2199-7
Issue Date: 2015-11-19
CVE Numbers: CVE-2013-7423
                   CVE-2015-1781
                   CVE-2015-1472
                   CVE-2015-1473
--

It was discovered that, under certain circumstances, glibc's getaddrinfo()
function would send DNS queries to random file descriptors. An attacker
could potentially use this flaw to send DNS queries to unintended
recipients, resulting in information disclosure or data loss due to the
application encountering corrupted data. (CVE-2013-7423)

A buffer overflow flaw was found in the way glibc's gethostbyname_r() and
other related functions computed the size of a buffer when passed a
misaligned buffer as input. An attacker able to make an application call
any of these functions with a misaligned buffer could use this flaw to
crash the application or, potentially, execute arbitrary code with the
permissions of the user running the application. (CVE-2015-1781)

A heap-based buffer overflow flaw and a stack overflow flaw were found in
glibc's swscanf() function. An attacker able to make an application call
the swscanf() function could use these flaws to crash that application or,
potentially, execute arbitrary code with the permissions of the user
running the application. (CVE-2015-1472, CVE-2015-1473)

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in glibc's _IO_wstr_overflow() function. An attacker able to make an
application call this function could use this flaw to crash that
application or, potentially, execute arbitrary code with the permissions
of the user running the application.

A flaw was found in the way glibc's fnmatch() function processed certain
malformed patterns. An attacker able to make an application call this
function could use this flaw to crash that application.
--

SL7
  x86_64
    glibc-2.17-105.el7.i686.rpm
    glibc-2.17-105.el7.x86_64.rpm
    glibc-common-2.17-105.el7.x86_64.rpm
    glibc-debuginfo-2.17-105.el7.i686.rpm
    glibc-debuginfo-2.17-105.el7.x86_64.rpm
    glibc-debuginfo-common-2.17-105.el7.i686.rpm
    glibc-debuginfo-common-2.17-105.el7.x86_64.rpm
    glibc-devel-2.17-105.el7.i686.rpm
    glibc-devel-2.17-105.el7.x86_64.rpm
    glibc-headers-2.17-105.el7.x86_64.rpm
    glibc-utils-2.17-105.el7.x86_64.rpm
    nscd-2.17-105.el7.x86_64.rpm
    glibc-static-2.17-105.el7.i686.rpm
    glibc-static-2.17-105.el7.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2