SCIENTIFIC-LINUX-ERRATA Archives

April 2018

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Scott Reid <[log in to unmask]>
Reply To:
Date:
Mon, 30 Apr 2018 18:44:49 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (51 lines)
Synopsis:          Moderate: glibc security, bug fix, and enhancement update
Advisory ID:       SLSA-2018:0805-1
Issue Date:        2018-04-10
CVE Numbers:       CVE-2014-9402
                   CVE-2015-5180
                   CVE-2017-12132
                   CVE-2017-15670
                   CVE-2017-15804
                   CVE-2018-1000001
--

Security Fix(es):

* glibc: realpath() buffer underflow when getcwd() returns relative path
allows privilege escalation (CVE-2018-1000001)

* glibc: Buffer overflow in glob with GLOB_TILDE (CVE-2017-15670)

* glibc: Buffer overflow during unescaping of user names with the ~
operator (CVE-2017-15804)

* glibc: denial of service in getnetbyname function (CVE-2014-9402)

* glibc: DNS resolver NULL pointer dereference with crafted record type
(CVE-2015-5180)

* glibc: Fragmentation attacks possible when EDNS0 is enabled
(CVE-2017-12132)

Additional Changes:
--

SL7
  x86_64
    glibc-2.17-222.el7.i686.rpm
    glibc-2.17-222.el7.x86_64.rpm
    glibc-common-2.17-222.el7.x86_64.rpm
    glibc-debuginfo-2.17-222.el7.i686.rpm
    glibc-debuginfo-2.17-222.el7.x86_64.rpm
    glibc-debuginfo-common-2.17-222.el7.i686.rpm
    glibc-debuginfo-common-2.17-222.el7.x86_64.rpm
    glibc-devel-2.17-222.el7.i686.rpm
    glibc-devel-2.17-222.el7.x86_64.rpm
    glibc-headers-2.17-222.el7.x86_64.rpm
    glibc-utils-2.17-222.el7.x86_64.rpm
    nscd-2.17-222.el7.x86_64.rpm
    glibc-static-2.17-222.el7.i686.rpm
    glibc-static-2.17-222.el7.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2