Gentoo Archives: gentoo-commits

From: "Chris Reffett (creffett)" <creffett@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201312-01.xml
Date: Tue, 03 Dec 2013 03:50:28
Message-Id: 20131203035025.567C220035@flycatcher.gentoo.org
1 creffett 13/12/03 03:50:25
2
3 Added: glsa-201312-01.xml
4 Log:
5 GLSA 201312-01
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201312-01.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201312-01.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201312-01.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201312-01.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201312-01">
20 <title>GNU C Library: Multiple vulnerabilities</title>
21 <synopsis>Multiple vulnerabilities have been found in GNU C Library, the
22 worst of which allowing arbitrary code execution and privilege escalation.
23 </synopsis>
24 <product type="ebuild">glibc</product>
25 <announced>December 03, 2013</announced>
26 <revised>December 03, 2013: 1</revised>
27 <bug>350744</bug>
28 <bug>356567</bug>
29 <bug>386323</bug>
30 <bug>386327</bug>
31 <bug>386329</bug>
32 <bug>386333</bug>
33 <bug>386343</bug>
34 <bug>386349</bug>
35 <bug>393477</bug>
36 <bug>404993</bug>
37 <access>local, remote</access>
38 <affected>
39 <package name="sys-libs/glibc" auto="yes" arch="*">
40 <unaffected range="ge">2.15-r3</unaffected>
41 <vulnerable range="lt">2.15-r3</vulnerable>
42 </package>
43 </affected>
44 <background>
45 <p>The GNU C library is the standard C library used by Gentoo Linux
46 systems.
47 </p>
48 </background>
49 <description>
50 <p>Multiple vulnerabilities have been discovered in GNU C Library. Please
51 review the CVE identifiers referenced below for details.
52 </p>
53 </description>
54 <impact type="high">
55 <p>A local attacker could trigger vulnerabilities in dynamic library
56 loader, making it possible to load attacker-controlled shared objects
57 during execution of setuid/setgid programs to escalate privileges.
58 </p>
59
60 <p>A context-dependent attacker could trigger various vulnerabilities in
61 GNU C Library, including a buffer overflow, leading to execution of
62 arbitrary code or a Denial of Service.
63 </p>
64 </impact>
65 <workaround>
66 <p>There is no known workaround at this time.</p>
67 </workaround>
68 <resolution>
69 <p>All GNU C Library users should upgrade to the latest version:</p>
70
71 <code>
72 # emerge --sync
73 # emerge --ask --oneshot --verbose "&gt;=sys-libs/glibc-2.15-r3"
74 </code>
75 </resolution>
76 <references>
77 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5029">CVE-2009-5029</uri>
78 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3847">CVE-2010-3847</uri>
79 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0536">CVE-2011-0536</uri>
80 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1071">CVE-2011-1071</uri>
81 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1089">CVE-2011-1089</uri>
82 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1095">CVE-2011-1095</uri>
83 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1658">CVE-2011-1658</uri>
84 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1659">CVE-2011-1659</uri>
85 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0864">CVE-2012-0864</uri>
86 </references>
87 <metadata tag="requester" timestamp="Thu, 16 Aug 2012 04:55:03 +0000">
88 underling
89 </metadata>
90 <metadata tag="submitter" timestamp="Tue, 03 Dec 2013 03:49:15 +0000">
91 phajdan.jr
92 </metadata>
93 </glsa>