Synopsis: Moderate: glibc security, bug fix, and enhancement update Advisory ID: SLSA-2017:1916-1 Issue Date: 2017-08-01 CVE Numbers: CVE-2015-8776 CVE-2015-8778 CVE-2014-9761 CVE-2015-8779 CVE-2015-8777 -- Security Fix(es): * A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code. (CVE-2014-9761) * It was found that out-of-range time values passed to the strftime() function could result in an out-of-bounds memory access. This could lead to application crash or, potentially, information disclosure. (CVE-2015-8776) * An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution. (CVE-2015-8778) * A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code. (CVE-2015-8779) * It was found that the dynamic loader did not sanitize the LD_POINTER_GUARD environment variable. An attacker could use this flaw to bypass the pointer guarding protection on set-user-ID or set-group-ID programs to execute arbitrary code with the permissions of the user running the application. (CVE-2015-8777) -- SL7 x86_64 glibc-2.17-196.el7.i686.rpm glibc-2.17-196.el7.x86_64.rpm glibc-common-2.17-196.el7.x86_64.rpm glibc-debuginfo-2.17-196.el7.i686.rpm glibc-debuginfo-2.17-196.el7.x86_64.rpm glibc-debuginfo-common-2.17-196.el7.i686.rpm glibc-debuginfo-common-2.17-196.el7.x86_64.rpm glibc-devel-2.17-196.el7.i686.rpm glibc-devel-2.17-196.el7.x86_64.rpm glibc-headers-2.17-196.el7.x86_64.rpm glibc-utils-2.17-196.el7.x86_64.rpm nscd-2.17-196.el7.x86_64.rpm glibc-static-2.17-196.el7.i686.rpm glibc-static-2.17-196.el7.x86_64.rpm - Scientific Linux Development Team