[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2015:1424-1 -- SLES glibc, nscd

ID: oval:org.secpod.oval:def:89045400Date: (C)2021-08-04   (M)2023-02-20
Class: PATCHFamily: unix




This update for glibc provides fixes for security and non-security issues. These security issues have been fixed: - CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. - CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system. - CVE-2014-8121: DB_LOOKUP in the Name Service Switch did not properly check if a file is open, which allowed remote attackers to cause a denial of service by performing a look-up while the database is iterated over the database, which triggers the file pointer to be reset. - Fix read past end of pattern in fnmatch. These non-security issues have been fixed: - Fix locking in _IO_flush_all_lockp to prevent deadlocks in applications. - Record TTL also for DNS PTR queries. - Fix invalid free in ld.so. - Make PowerPC64 default to non-executable stack. - Fix floating point exceptions in some circumstances with exp and friends. - Fix bad TEXTREL in glibc.i686

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
glibc
nscd
Reference:
SUSE-SU-2015:1424-1
CVE-2013-2207
CVE-2014-8121
CVE-2015-1781
CVE    3
CVE-2013-2207
CVE-2015-1781
CVE-2014-8121

© SecPod Technologies