[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 411-1] eglibc security update

Package        : eglibc
Version        : eglibc_2.11.3-4+deb6u9
CVE ID         : CVE-2014-9761 CVE-2015-8776 CVE-2015-8778 CVE-2015-8779

Several vulnerabilities have been fixed in the Debian GNU C Library,


    The math's nan* function wrongly handled payload strings, yielding
    to an unbounded stack allocation based on the length of the
    arguments. To solve this issue, payload parsing has been refactored
    out of strtod into a separate functions that nan* can call directly.


    The strftime() function made it possible to access invalid memory,
    allowing to segfault the calling application.


    hcreate() was susceptible to an integer overflow, that may results
    in out-of-bounds heap accesses.


    The catopen() function suffered from multiple unbounded stack

For Debian 6 "Squeeze", these issues have been fixed in eglibc version
eglibc_2.11.3-4+deb6u9. We recommend you to upgrade your eglibc

Learn more about the Debian Long Term Support (LTS) Project and how to
apply these updates at: https://wiki.debian.org/LTS/

Attachment: signature.asc
Description: PGP signature

Reply to: