Mandriva: 2013:163: glibc
Posted by Benjamin D. Thomas   
Mandrake Multiple vulnerabilities has been discovered and corrected in glibc: Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:163
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : glibc
 Date    : May 7, 2013
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in glibc:
 
 Buffer overflow in the extend_buffers function in the regular
 expression matcher (posix/regexec.c) in glibc, possibly 2.17 and
 earlier, allows context-dependent attackers to cause a denial of
 service (memory corruption and crash) via crafted multibyte characters
 (CVE-2013-0242).
 
 Stack-based buffer overflow in the getaddrinfo function in
 sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6)
 2.17 and earlier allows remote attackers to cause a denial of service
 (crash) via a (1) hostname or (2) IP address that triggers a large
 number of domain conversion results (CVE-2013-1914).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 ec721ecac69f6bace0fec908ed45cf6d  mbs1/x86_64/glibc-2.14.1-12.1.mbs1.x86_64.rpm
 8d9c7b66f9b61da0c0e70141861529f8  mbs1/x86_64/glibc-devel-2.14.1-12.1.mbs1.x86_64.rpm
 5a442d51c573ea1cc3593bf5b68c7e07  mbs1/x86_64/glibc-doc-2.14.1-12.1.mbs1.noarch.rpm
 67ca31e66b41d88a169599fddcc628c3  mbs1/x86_64/glibc-doc-pdf-2.14.1-12.1.mbs1.noarch.rpm
 8e2b8f84441470a05b513420641b0505  mbs1/x86_64/glibc-i18ndata-2.14.1-12.1.mbs1.x86_64.rpm
 59226b1addf578c14a0c53e0731c37a3  mbs1/x86_64/glibc-profile-2.14.1-12.1.mbs1.x86_64.rpm
 291cc63f1cd9a45ddf89455b133d06b4  mbs1/x86_64/glibc-static-devel-2.14.1-12.1.mbs1.x86_64.rpm
 143e405ead8fa9a2f9184547ef6c75fc  mbs1/x86_64/glibc-utils-2.14.1-12.1.mbs1.x86_64.rpm
 fecc2dd312e4513a89360927c579bccd  mbs1/x86_64/nscd-2.14.1-12.1.mbs1.x86_64.rpm 
 180d09be78ca8fdfa5ca6ec1c514026a  mbs1/SRPMS/glibc-2.14.1-12.1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________