MGASA-2013-0340

Source
https://advisories.mageia.org/MGASA-2013-0340.html
Import Source
https://advisories.mageia.org/MGASA-2013-0340.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2013-0340
Related
Published
2013-11-22T18:44:49Z
Modified
2013-11-22T18:44:14Z
Summary
Updated glibc package fixes security vulnerabilities
Details

Updated glibc packages fixes the following security issues:

Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow. (CVE-2012-4412)

Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function. (CVE-2012-4424)

ptchown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system. (CVE-2013-2207) NOTE! This is fixed by removing ptchown wich may break chroots if their devpts was not mounted correctly. (make sure to mount the devpts correctly with gid=5)

sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image. (CVE-2013-4237)

Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posixmemalign, (4) memalign, or (5) alignedalloc functions. (CVE-2013-4332)

A stack (frame) overflow flaw, which led to a denial of service (application crash), was found in the way glibc's getaddrinfo() function processed certain requests when called with AFINET6. A similar flaw to CVE-2013-1914, this affects AFINET6 rather than AF_UNSPEC (CVE-2013-4458).

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context- dependent attackers to control execution flow by leveraging a buffer- overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. (CVE-2013-4788)

Other fixes in this update: - Correct the processing of '\x80' characters in crypt_freesec.c - drop minimal required kernel to 2.6.32 so it works in chroots on top of enterprise kernels and for OpenVZ users. - fix typo in nscd.service

References
Credits

Affected packages

Mageia:3 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.17-7.2.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:2 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.14.1-11.2.mga2

Ecosystem specific

{
    "section": "core"
}