|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0206 (glibc)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0206: Updated glibc packages fix security vulnerabilities
Date:  Tue, 24 May 2016 00:01:27 +0200
Message-ID:  <20160523220127.694EF9F751@duvel.mageia.org>

MGASA-2016-0206 - Updated glibc packages fix security vulnerabilities Publication date: 23 May 2016 URL: http://advisories.mageia.org/MGASA-2016-0206.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-1234, CVE-2016-3075, CVE-2016-3706 Description: Updated glibc packages fix security vulnerabilities: It was found that glob implementation in glibc does not correctly handle overlong names in struct dirent buffers when GLOB_ALTDIRFUNC is used, causing large stack-based buffer overflow with controlled length and content (CVE-2016-1234). A stack overflow vulnerability (unbounded allocation) in _nss_dns_getnetbyname_r function was found (CVE-2016-3075). stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458) (CVE-2016-3706). References: - https://bugs.mageia.org/show_bug.cgi?id=18440 - https://lists.fedoraproject.org/archives/list/package-ann... - https://lists.fedoraproject.org/archives/list/package-ann... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706 SRPMS: - 5/core/glibc-2.20-22.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds