Mageia alert MGASA-2016-0206 (glibc)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2016-0206: Updated glibc packages fix security vulnerabilities | |
Date: | Tue, 24 May 2016 00:01:27 +0200 | |
Message-ID: | <20160523220127.694EF9F751@duvel.mageia.org> |
MGASA-2016-0206 - Updated glibc packages fix security vulnerabilities Publication date: 23 May 2016 URL: http://advisories.mageia.org/MGASA-2016-0206.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-1234, CVE-2016-3075, CVE-2016-3706 Description: Updated glibc packages fix security vulnerabilities: It was found that glob implementation in glibc does not correctly handle overlong names in struct dirent buffers when GLOB_ALTDIRFUNC is used, causing large stack-based buffer overflow with controlled length and content (CVE-2016-1234). A stack overflow vulnerability (unbounded allocation) in _nss_dns_getnetbyname_r function was found (CVE-2016-3075). stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458) (CVE-2016-3706). References: - https://bugs.mageia.org/show_bug.cgi?id=18440 - https://lists.fedoraproject.org/archives/list/package-ann... - https://lists.fedoraproject.org/archives/list/package-ann... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706 SRPMS: - 5/core/glibc-2.20-22.mga5