The glibc packages provide the standard C and standard math libraries used
by multiple programs on the system. Without these libraries, the Linux
system cannot function properly.
Multiple errors in glibc’s formatted printing functionality could allow an
attacker to bypass FORTIFY_SOURCE protections and execute arbitrary code
using a format string flaw in an application, even though these protections
are expected to limit the impact of such flaws to an application abort.
(CVE-2012-3404, CVE-2012-3405, CVE-2012-3406)
This update also fixes the following bug:
All users of glibc are advised to upgrade to these updated packages, which
contain backported patches to fix these issues.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | src | glibc | < 2.12-1.80.el6_3.3 | glibc-2.12-1.80.el6_3.3.src.rpm |
RedHat | 6 | ppc | glibc-debuginfo-common | < 2.12-1.80.el6_3.3 | glibc-debuginfo-common-2.12-1.80.el6_3.3.ppc.rpm |
RedHat | 6 | ppc64 | glibc-static | < 2.12-1.80.el6_3.3 | glibc-static-2.12-1.80.el6_3.3.ppc64.rpm |
RedHat | 6 | s390 | glibc-devel | < 2.12-1.80.el6_3.3 | glibc-devel-2.12-1.80.el6_3.3.s390.rpm |
RedHat | 6 | x86_64 | nscd | < 2.12-1.80.el6_3.3 | nscd-2.12-1.80.el6_3.3.x86_64.rpm |
RedHat | 6 | s390x | nscd | < 2.12-1.80.el6_3.3 | nscd-2.12-1.80.el6_3.3.s390x.rpm |
RedHat | 6 | s390x | glibc-debuginfo-common | < 2.12-1.80.el6_3.3 | glibc-debuginfo-common-2.12-1.80.el6_3.3.s390x.rpm |
RedHat | 6 | ppc | glibc-static | < 2.12-1.80.el6_3.3 | glibc-static-2.12-1.80.el6_3.3.ppc.rpm |
RedHat | 6 | i686 | glibc-common | < 2.12-1.80.el6_3.3 | glibc-common-2.12-1.80.el6_3.3.i686.rpm |
RedHat | 6 | ppc | glibc-debuginfo | < 2.12-1.80.el6_3.3 | glibc-debuginfo-2.12-1.80.el6_3.3.ppc.rpm |