Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in GNU C library
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in GNU C library
ID: SSA:2016-054-02
Distribution: Slackware
Plattformen: Slackware -current, Slackware x86_64 -current, Slackware 14.1, Slackware x86_64 14.1
Datum: Mi, 24. Februar 2016, 07:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
Applikationen: GNU C library

Originalnachricht


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] glibc (SSA:2016-054-02)

New glibc packages are available for Slackware 14.1 and -current to
fix security issues.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/glibc-2.17-i486-11_slack14.1.txz: Rebuilt.
This update provides a patch to fix the stack-based buffer overflow in
libresolv that could allow specially crafted DNS responses to seize
control of execution flow in the DNS client (CVE-2015-7547). However,
due to a patch applied to Slackware's glibc back in 2009 (don't use
the
gethostbyname4() lookup method as it was causing some cheap routers to
misbehave), we were not vulnerable to that issue. Nevertheless it seems
prudent to patch the overflows anyway even if we're not currently using
the code in question. Thanks to mancha for the backported patch.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
(* Security fix *)
patches/packages/glibc-i18n-2.17-i486-11_slack14.1.txz: Rebuilt.
patches/packages/glibc-profile-2.17-i486-11_slack14.1.txz: Rebuilt.
patches/packages/glibc-solibs-2.17-i486-11_slack14.1.txz: Rebuilt.
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 14.1:
glibc-2.17-i486-11_slack14.1.txz
glibc-i18n-2.17-i486-11_slack14.1.txz
glibc-profile-2.17-i486-11_slack14.1.txz
glibc-solibs-2.17-i486-11_slack14.1.txz

Updated packages for Slackware x86_64 14.1:
glibc-2.17-x86_64-11_slack14.1.txz
glibc-i18n-2.17-x86_64-11_slack14.1.txz
glibc-profile-2.17-x86_64-11_slack14.1.txz
glibc-solibs-2.17-x86_64-11_slack14.1.txz

Updated packages for Slackware -current:
glibc-solibs-2.23-i586-1.txz
glibc-2.23-i586-1.txz
glibc-i18n-2.23-i586-1.txz
glibc-profile-2.23-i586-1.txz

Updated packages for Slackware x86_64 -current:
glibc-solibs-2.23-x86_64-1.txz
glibc-2.23-x86_64-1.txz
glibc-i18n-2.23-x86_64-1.txz
glibc-profile-2.23-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.1 packages:
4c56432d638adc8098661cfa818b5bc9 glibc-2.17-i486-11_slack14.1.txz
5c316d6b0a8970fe15fbdf2adff8de19 glibc-i18n-2.17-i486-11_slack14.1.txz
a937d842e5ca3d0b125230c23285f8f4 glibc-profile-2.17-i486-11_slack14.1.txz
442f01d094d350612c1fb1fcb5e7fbe7 glibc-solibs-2.17-i486-11_slack14.1.txz

Slackware x86_64 14.1 packages:
eec88d584a79909ec79aae1c43c330d3 glibc-2.17-x86_64-11_slack14.1.txz
d8b396eb6ada65d1555e3cf0fb8246c2 glibc-i18n-2.17-x86_64-11_slack14.1.txz
e7deaabfe3e467cbde10ba5b7748bbbb glibc-profile-2.17-x86_64-11_slack14.1.txz
629c93f0e510d354ff66e61f1ebe8b67 glibc-solibs-2.17-x86_64-11_slack14.1.txz

Slackware -current packages:
b11873e4f851a600b57a2e7a2ac8f472 a/glibc-solibs-2.23-i586-1.txz
5116eec63fab5e7dbc58d27fecd48684 l/glibc-2.23-i586-1.txz
ae9b8a8e4ead59aa398212d6893d7ddc l/glibc-i18n-2.23-i586-1.txz
61154e43ee4c0739dd5d3c4ce3b60ae6 l/glibc-profile-2.23-i586-1.txz

Slackware x86_64 -current packages:
c48a55c8a39dc8e17e04796e4f160bd0 a/glibc-solibs-2.23-x86_64-1.txz
36104e1a004b0e97d193c2132f18222d l/glibc-2.23-x86_64-1.txz
e0415f66d17323c8f6df339cfd49051b l/glibc-i18n-2.23-x86_64-1.txz
f5433793e9da696a60f2445559f1d33f l/glibc-profile-2.23-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg glibc-*.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlbMtakACgkQakRjwEAQIjMPuQCfQZyDyAmg4BGJnDoMsm3/2hlx
VpwAn0WWZjSCd6/g0GxPadTl2P5FR6hW
=G0sh
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung