-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:163 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : glibc Date : May 7, 2013 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been discovered and corrected in glibc: Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters (CVE-2013-0242). Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results (CVE-2013-1914). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914 _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: ec721ecac69f6bace0fec908ed45cf6d mbs1/x86_64/glibc-2.14.1-12.1.mbs1.x86_64.rpm 8d9c7b66f9b61da0c0e70141861529f8 mbs1/x86_64/glibc-devel-2.14.1-12.1.mbs1.x86_64.rpm 5a442d51c573ea1cc3593bf5b68c7e07 mbs1/x86_64/glibc-doc-2.14.1-12.1.mbs1.noarch.rpm 67ca31e66b41d88a169599fddcc628c3 mbs1/x86_64/glibc-doc-pdf-2.14.1-12.1.mbs1.noarch.rpm 8e2b8f84441470a05b513420641b0505 mbs1/x86_64/glibc-i18ndata-2.14.1-12.1.mbs1.x86_64.rpm 59226b1addf578c14a0c53e0731c37a3 mbs1/x86_64/glibc-profile-2.14.1-12.1.mbs1.x86_64.rpm 291cc63f1cd9a45ddf89455b133d06b4 mbs1/x86_64/glibc-static-devel-2.14.1-12.1.mbs1.x86_64.rpm 143e405ead8fa9a2f9184547ef6c75fc mbs1/x86_64/glibc-utils-2.14.1-12.1.mbs1.x86_64.rpm fecc2dd312e4513a89360927c579bccd mbs1/x86_64/nscd-2.14.1-12.1.mbs1.x86_64.rpm 180d09be78ca8fdfa5ca6ec1c514026a mbs1/SRPMS/glibc-2.14.1-12.1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRiQeOmqjQ0CJFipgRAgI5AKCdFyI/q4cEL7h8jQyu7m/6KMmzQQCfRt/X yvN2sdb9PK31dXX/cWwckNA= =hmEZ -----END PGP SIGNATURE-----