Lucene search

K
osvGoogleOSV:DLA-411-2
HistoryFeb 05, 2016 - 12:00 a.m.

eglibc - regression update

2016-02-0500:00:00
Google
osv.dev
15

0.055 Low

EPSS

Percentile

93.3%

Several vulnerabilities have been fixed in the Debian GNU C Library,
eglibc:

  • CVE-2014-9761
    The math’s nan* function wrongly handled payload strings, yielding
    to an unbounded stack allocation based on the length of the
    arguments. To solve this issue, payload parsing has been refactored
    out of strtod into a separate functions that nan* can call directly.
  • CVE-2015-8776
    The strftime() function made it possible to access invalid memory,
    allowing to segfault the calling application.
  • CVE-2015-8778
    hcreate() was susceptible to an integer overflow, that may results
    in out-of-bounds heap accesses.
  • CVE-2015-8779
    The catopen() function suffered from multiple unbounded stack
    allocations.

For Debian 6 Squeeze, these issues have been fixed in eglibc version
eglibc_2.11.3-4+deb6u9. We recommend you to upgrade your eglibc
packages.