glibc, nscd security update

2012-08-27T12:45:54
ID CESA-2012:1207
Type centos
Reporter CentOS Project
Modified 2012-08-27T12:45:54

Description

CentOS Errata and Security Advisory CESA-2012:1207

The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function properly.

Multiple integer overflow flaws, leading to stack-based buffer overflows, were found in glibc's functions for converting a string to a numeric representation (strtod(), strtof(), and strtold()). If an application used such a function on attacker controlled input, it could cause the application to crash or, potentially, execute arbitrary code. (CVE-2012-3480)

This update also fixes the following bug:

  • Previously, logic errors in various mathematical functions, including exp, exp2, expf, exp2f, pow, sin, tan, and rint, caused inconsistent results when the functions were used with the non-default rounding mode. This could also cause applications to crash in some cases. With this update, the functions now give correct results across the four different rounding modes. (BZ#839411)

All users of glibc are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2012-August/018826.html

Affected packages: glibc glibc-common glibc-devel glibc-headers glibc-utils nscd

Upstream details at: https://rhn.redhat.com/errata/RHSA-2012-1207.html