Scientific Linux alert SLSA-2013:1605-2 (glibc)
From: | Pat Riehecky <riehecky@fnal.gov> | |
To: | <scientific-linux-errata@listserv.fnal.gov> | |
Subject: | Security ERRATA Moderate: glibc on SL6.x i386/x86_64 | |
Date: | Tue, 3 Dec 2013 20:07:06 +0000 | |
Message-ID: | <20131203200706.28628.14703@slpackages.fnal.gov> |
Synopsis: Moderate: glibc security, bug fix, and enhancement update Advisory ID: SLSA-2013:1605-2 Issue Date: 2013-11-21 CVE Numbers: CVE-2013-0242 CVE-2013-1914 CVE-2013-4332 -- Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions (pvalloc, valloc, and memalign). If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-4332) A flaw was found in the regular expression matching routines that process multibyte character input. If an application utilized the glibc regular expression matching mechanism, an attacker could provide specially-crafted input that, when processed, would cause the application to crash. (CVE-2013-0242) It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash. (CVE-2013-1914) Among other changes, this update includes an important fix for the following bug: * Due to a defect in the initial release of the getaddrinfo() system call in Scientific Linux 6.0, AF_INET and AF_INET6 queries resolved from the /etc/hosts file returned queried names as canonical names. This incorrect behavior is, however, still considered to be the expected behavior. As a result of a recent change in getaddrinfo(), AF_INET6 queries started resolving the canonical names correctly. However, this behavior was unexpected by applications that relied on queries resolved from the /etc/hosts file, and these applications could thus fail to operate properly. This update applies a fix ensuring that AF_INET6 queries resolved from /etc/hosts always return the queried name as canonical. Note that DNS lookups are resolved properly and always return the correct canonical names. A proper fix to AF_INET6 queries resolution from /etc/hosts may be applied in future releases; for now, due to a lack of standard, Red Hat suggests the first entry in the /etc/hosts file, that applies for the IP address being resolved, to be considered the canonical entry. -- SL6 x86_64 glibc-2.12-1.132.el6.i686.rpm glibc-2.12-1.132.el6.x86_64.rpm glibc-common-2.12-1.132.el6.x86_64.rpm glibc-debuginfo-2.12-1.132.el6.i686.rpm glibc-debuginfo-2.12-1.132.el6.x86_64.rpm glibc-debuginfo-common-2.12-1.132.el6.i686.rpm glibc-debuginfo-common-2.12-1.132.el6.x86_64.rpm glibc-devel-2.12-1.132.el6.i686.rpm glibc-devel-2.12-1.132.el6.x86_64.rpm glibc-headers-2.12-1.132.el6.x86_64.rpm glibc-utils-2.12-1.132.el6.x86_64.rpm nscd-2.12-1.132.el6.x86_64.rpm glibc-static-2.12-1.132.el6.i686.rpm glibc-static-2.12-1.132.el6.x86_64.rpm i386 glibc-2.12-1.132.el6.i686.rpm glibc-common-2.12-1.132.el6.i686.rpm glibc-debuginfo-2.12-1.132.el6.i686.rpm glibc-debuginfo-common-2.12-1.132.el6.i686.rpm glibc-devel-2.12-1.132.el6.i686.rpm glibc-headers-2.12-1.132.el6.i686.rpm glibc-utils-2.12-1.132.el6.i686.rpm nscd-2.12-1.132.el6.i686.rpm glibc-static-2.12-1.132.el6.i686.rpm - Scientific Linux Development Team