Login


 
Newsletter
Werbung
Sicherheit: Zwei Probleme in glibc
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in glibc
ID: MDVSA-2013:163
Distribution: Mandriva
Plattformen: Mandriva Business Server 1.0
Datum: Di, 7. Mai 2013, 22:41
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914

Originalnachricht

This is a multi-part message in MIME format...

------------=_1367945850-24900-9

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:163
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : glibc
Date : May 7, 2013
Affected: Business Server 1.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in glibc:

Buffer overflow in the extend_buffers function in the regular
expression matcher (posix/regexec.c) in glibc, possibly 2.17 and
earlier, allows context-dependent attackers to cause a denial of
service (memory corruption and crash) via crafted multibyte characters
(CVE-2013-0242).

Stack-based buffer overflow in the getaddrinfo function in
sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6)
2.17 and earlier allows remote attackers to cause a denial of service
(crash) via a (1) hostname or (2) IP address that triggers a large
number of domain conversion results (CVE-2013-1914).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
ec721ecac69f6bace0fec908ed45cf6d
mbs1/x86_64/glibc-2.14.1-12.1.mbs1.x86_64.rpm
8d9c7b66f9b61da0c0e70141861529f8
mbs1/x86_64/glibc-devel-2.14.1-12.1.mbs1.x86_64.rpm
5a442d51c573ea1cc3593bf5b68c7e07
mbs1/x86_64/glibc-doc-2.14.1-12.1.mbs1.noarch.rpm
67ca31e66b41d88a169599fddcc628c3
mbs1/x86_64/glibc-doc-pdf-2.14.1-12.1.mbs1.noarch.rpm
8e2b8f84441470a05b513420641b0505
mbs1/x86_64/glibc-i18ndata-2.14.1-12.1.mbs1.x86_64.rpm
59226b1addf578c14a0c53e0731c37a3
mbs1/x86_64/glibc-profile-2.14.1-12.1.mbs1.x86_64.rpm
291cc63f1cd9a45ddf89455b133d06b4
mbs1/x86_64/glibc-static-devel-2.14.1-12.1.mbs1.x86_64.rpm
143e405ead8fa9a2f9184547ef6c75fc
mbs1/x86_64/glibc-utils-2.14.1-12.1.mbs1.x86_64.rpm
fecc2dd312e4513a89360927c579bccd mbs1/x86_64/nscd-2.14.1-12.1.mbs1.x86_64.rpm

180d09be78ca8fdfa5ca6ec1c514026a mbs1/SRPMS/glibc-2.14.1-12.1.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRiQeOmqjQ0CJFipgRAgI5AKCdFyI/q4cEL7h8jQyu7m/6KMmzQQCfRt/X
yvN2sdb9PK31dXX/cWwckNA=
=hmEZ
-----END PGP SIGNATURE-----


------------=_1367945850-24900-9
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1367945850-24900-9--
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung