Nome do pacote
glibc
Data
2013-05-07
ID Alerta
MDVSA-2013:163
Versões afetadas
MBS1 x86_64

Descrição do problema

Multiple vulnerabilities has been discovered and corrected in glibc:

Buffer overflow in the extend_buffers function in the regular
expression matcher (posix/regexec.c) in glibc, possibly 2.17 and
earlier, allows context-dependent attackers to cause a denial of
service (memory corruption and crash) via crafted multibyte characters
(CVE-2013-0242).

Stack-based buffer overflow in the getaddrinfo function in
sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6)
2.17 and earlier allows remote attackers to cause a denial of service
(crash) via a (1) hostname or (2) IP address that triggers a large
number of domain conversion results (CVE-2013-1914).

The updated packages have been patched to correct these issues.

Pacotes atualizados

MBS1 x86_64

 ec721ecac69f6bace0fec908ed45cf6d  mbs1/x86_64/glibc-2.14.1-12.1.mbs1.x86_64.rpm
 8d9c7b66f9b61da0c0e70141861529f8  mbs1/x86_64/glibc-devel-2.14.1-12.1.mbs1.x86_64.rpm
 5a442d51c573ea1cc3593bf5b68c7e07  mbs1/x86_64/glibc-doc-2.14.1-12.1.mbs1.noarch.rpm
 67ca31e66b41d88a169599fddcc628c3  mbs1/x86_64/glibc-doc-pdf-2.14.1-12.1.mbs1.noarch.rpm
 8e2b8f84441470a05b513420641b0505  mbs1/x86_64/glibc-i18ndata-2.14.1-12.1.mbs1.x86_64.rpm
 59226b1addf578c14a0c53e0731c37a3  mbs1/x86_64/glibc-profile-2.14.1-12.1.mbs1.x86_64.rpm
 291cc63f1cd9a45ddf89455b133d06b4  mbs1/x86_64/glibc-static-devel-2.14.1-12.1.mbs1.x86_64.rpm
 143e405ead8fa9a2f9184547ef6c75fc  mbs1/x86_64/glibc-utils-2.14.1-12.1.mbs1.x86_64.rpm
 fecc2dd312e4513a89360927c579bccd  mbs1/x86_64/nscd-2.14.1-12.1.mbs1.x86_64.rpm 
 180d09be78ca8fdfa5ca6ec1c514026a  mbs1/SRPMS/glibc-2.14.1-12.1.mbs1.src.rpm

Referências