glibc-2.17-196.el7
エラータID: AXSA:2017-2064:04
The glibc package contains standard libraries which are used by
multiple programs on the system. In order to save disk space and
memory, as well as to make upgrading easier, common system code is
kept in one place and shared between programs. This particular package
contains the most important sets of shared libraries: the standard C
library and the standard math library. Without these two libraries, a
Linux system will not function.
CVE-2014-9761
Multiple stack-based buffer overflows in the GNU C Library (aka glibc
or libc6) before 2.23 allow context-dependent attackers to cause a
denial of service (application crash) or possibly execute arbitrary
code via a long argument to the (1) nan, (2) nanf, or (3) nanl
function.
CVE-2015-8776
The strftime function in the GNU C Library (aka glibc or libc6) before
2.23 allows context-dependent attackers to cause a denial of service
(application crash) or possibly obtain sensitive information via an
out-of-range time value.
CVE-2015-8777
The process_envvars function in elf/rtld.c in the GNU C Library (aka
glibc or libc6) before 2.23 allows local users to bypass a
pointer-guarding protection mechanism via a zero value of the
LD_POINTER_GUARD environment variable.
CVE-2015-8778
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23
allows context-dependent attackers to cause a denial of service
(application crash) or possibly execute arbitrary code via the size
argument to the __hcreate_r function, which triggers out-of-bounds
heap-memory access.
CVE-2015-8779
Stack-based buffer overflow in the catopen function in the GNU C
Library (aka glibc or libc6) before 2.23 allows context-dependent
attackers to cause a denial of service (application crash) or possibly
execute arbitrary code via a long catalog name.
Update packages.
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
N/A
SRPMS
- glibc-2.17-196.el7.src.rpm
MD5: 6235797ca3210a79948d5e95185ae11d
SHA-256: fe9c9e608734f6c5cb542189f23ce97f83802d242d57d53fe24db40fda7c5109
Size: 24.20 MB
Asianux Server 7 for x86_64
- glibc-2.17-196.el7.x86_64.rpm
MD5: 1d9fd7ad35cc615a71293e2b02872af7
SHA-256: ed6b457cd43744f949ec2e08c403ab95bd94f1d9108aa67f54c98212231a1880
Size: 3.60 MB - glibc-common-2.17-196.el7.x86_64.rpm
MD5: a3ff29a3e0bed3211f873da8fc8314bd
SHA-256: 562a394914e76eae16a0d411183802474344bde17d9679cf950769ad8f03c8d2
Size: 11.48 MB - glibc-devel-2.17-196.el7.x86_64.rpm
MD5: 56e6f27de740e52e4ac477dcb1ddb865
SHA-256: 86b15053f1ddcc74190d9137743c1960ae9e8e81ec5c299cd47f2dd1e551b3ac
Size: 1.06 MB - glibc-headers-2.17-196.el7.x86_64.rpm
MD5: d03ad3c28c46f0784faa073b014f0f88
SHA-256: a3dc467c5680bcdb28d339025d3e0cf79e0bd71a91aa3fc7468209d62d244334
Size: 674.54 kB - glibc-utils-2.17-196.el7.x86_64.rpm
MD5: 8ae52e776b6077623ab527a8ca6f7fa9
SHA-256: c237527c1bafe387864db8f78a1e6fc793110c9fde608b2d38f9789206709a32
Size: 212.29 kB - nscd-2.17-196.el7.x86_64.rpm
MD5: 1d052f11697f6598d791946ea81402b4
SHA-256: ae8004233231eaf8922f65c395640177b572e6ce4425393d95b3ea30b1ec4b02
Size: 271.71 kB - glibc-2.17-196.el7.i686.rpm
MD5: ac298c1f9518bbf10192fad226b3c3e7
SHA-256: bc77bbd3f0fe0595689bae29a34f903ccaecb69c00881c3c958d7ba712c9f037
Size: 4.20 MB - glibc-devel-2.17-196.el7.i686.rpm
MD5: d991528eb6908f482c543d45763c3eed
SHA-256: 47856dbe3928a1ddf6a0f74fba63da62be63156507c9200fd5a52278cbef004b
Size: 1.06 MB