Updated glibc packages fix multiple security vulnerabilities
Publication date: 15 Sep 2014Modification date: 15 Sep 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-5119 , CVE-2014-6040
Description
Tavis Ormandy discovered a heap-based buffer overflow in the transliteration
module loading code. As a result, an attacker who can supply a crafted
destination character set argument to iconv-related character conversation
functions could achieve arbitrary code execution.
This update removes support of loadable gconv transliteration modules.
Besides the security vulnerability, the module loading code had functionality
defects which prevented it from working for the intended purpose.
(CVE-2014-5119)
Adhemerval Zanella Netto discovered out-of-bounds reads in additional code page
decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) that can be used
to crash the systems, causing a denial of service conditions (CVE-2014-6040).
References
- https://bugs.mageia.org/show_bug.cgi?id=13995
- https://www.debian.org/security/2014/dsa-3012
- http://openwall.com/lists/oss-security/2014/08/26/2
- http://openwall.com/lists/oss-security/2014/09/02/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
SRPMS
3/core
- glibc-2.17-7.5.mga3
4/core
- glibc-2.18-9.4.mga4