Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201706-19 ] GNU C Library: Multiple vulnerabilities
Date: Tue, 20 Jun 2017 17:55:36
Message-Id: 3b69a757-a9ec-7e4f-d5ec-2acbaf44de7e@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201706-19
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: GNU C Library: Multiple vulnerabilities
9 Date: June 20, 2017
10 Bugs: #608698, #608706, #622220
11 ID: 201706-19
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in the GNU C Library, the
19 worst of which may allow execution of arbitrary code.
20
21 Background
22 ==========
23
24 The GNU C library is the standard C library used by Gentoo Linux
25 systems.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 sys-libs/glibc < 2.23-r4 >= 2.23-r4
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been discovered in the GNU C Library.
39 Please review the CVE identifiers and Qualys' security advisory
40 referenced below for details.
41
42 Impact
43 ======
44
45 An attacker could possibly execute arbitrary code with the privileges
46 of the process, escalate privileges or cause a Denial of Service
47 condition.
48
49 Workaround
50 ==========
51
52 There is no known workaround at this time.
53
54 Resolution
55 ==========
56
57 All GNU C Library users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.23-r4"
61
62 References
63 ==========
64
65 [ 1 ] CVE-2015-5180
66 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5180
67 [ 2 ] CVE-2016-6323
68 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6323
69 [ 3 ] CVE-2017-1000366
70 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-1000366
71 [ 4 ] Qualys Security Advisory - The Stack Clash
72 https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 https://security.gentoo.org/glsa/201706-19
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users' machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 https://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2017 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature