Synopsis: Moderate: glibc security, bug fix, and enhancement update
Advisory ID: SLSA-2017:1916-1
Issue Date: 2017-08-01
CVE Numbers: CVE-2015-8776
CVE-2015-8778
CVE-2014-9761
CVE-2015-8779
CVE-2015-8777
—
Security Fix(es):
* A stack overflow vulnerability was found in nan* functions that could
cause applications, which process long strings with the nan function, to
crash or, potentially, execute arbitrary code. (CVE-2014-9761)
* It was found that out-of-range time values passed to the strftime()
function could result in an out-of-bounds memory access. This could lead
to application crash or, potentially, information disclosure.
(CVE-2015-8776)
* An integer overflow vulnerability was found in hcreate() and hcreate_r()
functions which could result in an out-of-bounds memory access. This could
lead to application crash or, potentially, arbitrary code execution.
(CVE-2015-8778)
* A stack based buffer overflow vulnerability was found in the catopen()
function. An excessively long string passed to the function could cause it
to crash or, potentially, execute arbitrary code. (CVE-2015-8779)
* It was found that the dynamic loader did not sanitize the
LD_POINTER_GUARD environment variable. An attacker could use this flaw to
bypass the pointer guarding protection on set-user-ID or set-group-ID
programs to execute arbitrary code with the permissions of the user
running the application. (CVE-2015-8777)
—
SL7
x86_64
glibc-2.17-196.el7.i686.rpm
glibc-2.17-196.el7.x86_64.rpm
glibc-common-2.17-196.el7.x86_64.rpm
glibc-debuginfo-2.17-196.el7.i686.rpm
glibc-debuginfo-2.17-196.el7.x86_64.rpm
glibc-debuginfo-common-2.17-196.el7.i686.rpm
glibc-debuginfo-common-2.17-196.el7.x86_64.rpm
glibc-devel-2.17-196.el7.i686.rpm
glibc-devel-2.17-196.el7.x86_64.rpm
glibc-headers-2.17-196.el7.x86_64.rpm
glibc-utils-2.17-196.el7.x86_64.rpm
nscd-2.17-196.el7.x86_64.rpm
glibc-static-2.17-196.el7.i686.rpm
glibc-static-2.17-196.el7.x86_64.rpm
– Scientific Linux Development Team