Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: glibc on SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Tuesday 3rd December 2013 20:07:06 UTC (over 3 years ago)
Synopsis:          Moderate: glibc security, bug fix, and enhancement
update
Advisory ID:       SLSA-2013:1605-2
Issue Date:        2013-11-21
CVE Numbers:       CVE-2013-0242
                   CVE-2013-1914
                   CVE-2013-4332
--

Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in glibc's memory allocator functions (pvalloc, valloc, and
memalign). If an application used such a function, it could cause the
application to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2013-4332)

A flaw was found in the regular expression matching routines that process
multibyte character input. If an application utilized the glibc regular
expression matching mechanism, an attacker could provide specially-crafted
input that, when processed, would cause the application to crash.
(CVE-2013-0242)

It was found that getaddrinfo() did not limit the amount of stack memory
used during name resolution. An attacker able to make an application
resolve an attacker-controlled hostname or IP address could possibly cause
the application to exhaust all stack memory and crash. (CVE-2013-1914)

Among other changes, this update includes an important fix for the
following bug:

* Due to a defect in the initial release of the getaddrinfo() system call
in Scientific Linux 6.0, AF_INET and AF_INET6 queries resolved from the
/etc/hosts file returned queried names as canonical names. This incorrect
behavior is, however, still considered to be the expected behavior. As a
result of a recent change in getaddrinfo(), AF_INET6 queries started
resolving the canonical names correctly. However, this behavior was
unexpected by applications that relied on queries resolved from the
/etc/hosts file, and these applications could thus fail to operate
properly. This update applies a fix ensuring that AF_INET6 queries
resolved from /etc/hosts always return the queried name as canonical. Note
that DNS lookups are resolved properly and always return the correct
canonical names. A proper fix to AF_INET6 queries resolution from
/etc/hosts may be applied in future releases; for now, due to a lack of
standard, Red Hat suggests the first entry in the /etc/hosts file, that
applies for the IP address being resolved, to be considered the canonical
entry.
--

SL6
  x86_64
    glibc-2.12-1.132.el6.i686.rpm
    glibc-2.12-1.132.el6.x86_64.rpm
    glibc-common-2.12-1.132.el6.x86_64.rpm
    glibc-debuginfo-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-2.12-1.132.el6.x86_64.rpm
    glibc-debuginfo-common-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-common-2.12-1.132.el6.x86_64.rpm
    glibc-devel-2.12-1.132.el6.i686.rpm
    glibc-devel-2.12-1.132.el6.x86_64.rpm
    glibc-headers-2.12-1.132.el6.x86_64.rpm
    glibc-utils-2.12-1.132.el6.x86_64.rpm
    nscd-2.12-1.132.el6.x86_64.rpm
    glibc-static-2.12-1.132.el6.i686.rpm
    glibc-static-2.12-1.132.el6.x86_64.rpm
  i386
    glibc-2.12-1.132.el6.i686.rpm
    glibc-common-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-2.12-1.132.el6.i686.rpm
    glibc-debuginfo-common-2.12-1.132.el6.i686.rpm
    glibc-devel-2.12-1.132.el6.i686.rpm
    glibc-headers-2.12-1.132.el6.i686.rpm
    glibc-utils-2.12-1.132.el6.i686.rpm
    nscd-2.12-1.132.el6.i686.rpm
    glibc-static-2.12-1.132.el6.i686.rpm

- Scientific Linux Development Team
 
CD: 3ms