Updated glibc packages fix multiple security vulnerabilities
Publication date: 15 Sep 2014Modification date: 15 Sep 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-5119 , CVE-2014-6040
Description
Tavis Ormandy discovered a heap-based buffer overflow in the transliteration module loading code. As a result, an attacker who can supply a crafted destination character set argument to iconv-related character conversation functions could achieve arbitrary code execution. This update removes support of loadable gconv transliteration modules. Besides the security vulnerability, the module loading code had functionality defects which prevented it from working for the intended purpose. (CVE-2014-5119) Adhemerval Zanella Netto discovered out-of-bounds reads in additional code page decoding functions (IBM933, IBM935, IBM937, IBM939, IBM1364) that can be used to crash the systems, causing a denial of service conditions (CVE-2014-6040).
References
- https://bugs.mageia.org/show_bug.cgi?id=13995
- https://www.debian.org/security/2014/dsa-3012
- http://openwall.com/lists/oss-security/2014/08/26/2
- http://openwall.com/lists/oss-security/2014/09/02/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
SRPMS
3/core
- glibc-2.17-7.5.mga3
4/core
- glibc-2.18-9.4.mga4