BugTraq
[ MDVSA-2013:163 ] glibc May 07 2013 04:54PM
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:163
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : glibc
Date : May 7, 2013
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in glibc:

Buffer overflow in the extend_buffers function in the regular
expression matcher (posix/regexec.c) in glibc, possibly 2.17 and
earlier, allows context-dependent attackers to cause a denial of
service (memory corruption and crash) via crafted multibyte characters
(CVE-2013-0242).

Stack-based buffer overflow in the getaddrinfo function in
sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6)
2.17 and earlier allows remote attackers to cause a denial of service
(crash) via a (1) hostname or (2) IP address that triggers a large
number of domain conversion results (CVE-2013-1914).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
ec721ecac69f6bace0fec908ed45cf6d mbs1/x86_64/glibc-2.14.1-12.1.mbs1.x86_64.rpm
8d9c7b66f9b61da0c0e70141861529f8 mbs1/x86_64/glibc-devel-2.14.1-12.1.mbs1.x86_64.rpm
5a442d51c573ea1cc3593bf5b68c7e07 mbs1/x86_64/glibc-doc-2.14.1-12.1.mbs1.noarch.rpm
67ca31e66b41d88a169599fddcc628c3 mbs1/x86_64/glibc-doc-pdf-2.14.1-12.1.mbs1.noarch.rpm
8e2b8f84441470a05b513420641b0505 mbs1/x86_64/glibc-i18ndata-2.14.1-12.1.mbs1.x86_64.rpm
59226b1addf578c14a0c53e0731c37a3 mbs1/x86_64/glibc-profile-2.14.1-12.1.mbs1.x86_64.rpm
291cc63f1cd9a45ddf89455b133d06b4 mbs1/x86_64/glibc-static-devel-2.14.1-12.1.mbs1.x86_64.rpm
143e405ead8fa9a2f9184547ef6c75fc mbs1/x86_64/glibc-utils-2.14.1-12.1.mbs1.x86_64.rpm
fecc2dd312e4513a89360927c579bccd mbs1/x86_64/nscd-2.14.1-12.1.mbs1.x86_64.rpm
180d09be78ca8fdfa5ca6ec1c514026a mbs1/SRPMS/glibc-2.14.1-12.1.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRiQeOmqjQ0CJFipgRAgI5AKCdFyI/q4cEL7h8jQyu7m/6KMmzQQCfRt/X
yvN2sdb9PK31dXX/cWwckNA=
=hmEZ
-----END PGP SIGNATURE-----

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus