ELSA-2014-2023

ELSA-2014-2023 - glibc security and bug fix update

Type:SECURITY
Impact:MODERATE
Release Date:2014-12-18

Description


[2.17-55.0.4.el7_0.3]
- Remove strstr and strcasestr implementations using sse4.2 instructions.
- Upstream commits 584b18eb4df61ccd447db2dfe8c8a7901f8c8598 and
1818483b15d22016b0eae41d37ee91cc87b37510 backported. (Jose E. Marchesi)

[2.17-55.3]
- Fix wordexp() to honour WRDE_NOCMD (CVE-2014-7817, #1170118)

[2.17-55.2]
- ftell: seek to end only when there are unflushed bytes (#1170187).

[2.17-55.1]
- Remove gconv transliteration loadable modules support (CVE-2014-5119,
- _nl_find_locale: Improve handling of crafted locale names (CVE-2014-0475,


Related CVEs


CVE-2014-7817

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) glibc-2.17-55.0.4.el7_0.3.src.rpm5fa8f4ec06d64bbfd5199387386a31f939211cac125487b5a6cfcbbb1b5f3ef3ELSA-2024-12444ol7_x86_64_latest_archive
glibc-2.17-55.0.4.el7_0.3.src.rpm5fa8f4ec06d64bbfd5199387386a31f939211cac125487b5a6cfcbbb1b5f3ef3ELSA-2024-12444ol7_x86_64_optional_archive
glibc-2.17-55.0.4.el7_0.3.src.rpm5fa8f4ec06d64bbfd5199387386a31f939211cac125487b5a6cfcbbb1b5f3ef3ELSA-2024-12444ol7_x86_64_u0_patch
glibc-2.17-55.0.4.el7_0.3.i686.rpm16a72a5f11061461dc557f481f599fb2ed2bdd8ecdd86739b8f202fa89ab9fe3ELSA-2024-12444ol7_x86_64_latest_archive
glibc-2.17-55.0.4.el7_0.3.i686.rpm16a72a5f11061461dc557f481f599fb2ed2bdd8ecdd86739b8f202fa89ab9fe3ELSA-2024-12444ol7_x86_64_u0_patch
glibc-2.17-55.0.4.el7_0.3.x86_64.rpm58f83aabd35f5c996e259470284e3b93aa8ad0c1c4b1470c8398aef78cfd9031ELSA-2024-12444ol7_x86_64_latest_archive
glibc-2.17-55.0.4.el7_0.3.x86_64.rpm58f83aabd35f5c996e259470284e3b93aa8ad0c1c4b1470c8398aef78cfd9031ELSA-2024-12444ol7_x86_64_u0_patch
glibc-common-2.17-55.0.4.el7_0.3.x86_64.rpm98c222eda97905a56a8b447702b357c23b7c6f49241816988f93c09d3c243426ELSA-2024-12444ol7_x86_64_latest_archive
glibc-common-2.17-55.0.4.el7_0.3.x86_64.rpm98c222eda97905a56a8b447702b357c23b7c6f49241816988f93c09d3c243426ELSA-2024-12444ol7_x86_64_u0_patch
glibc-devel-2.17-55.0.4.el7_0.3.i686.rpm94f442c54ea57b69b498094a8e55ffea9965866f75b9213a1f3742937d0165dbELSA-2024-12444ol7_x86_64_latest_archive
glibc-devel-2.17-55.0.4.el7_0.3.i686.rpm94f442c54ea57b69b498094a8e55ffea9965866f75b9213a1f3742937d0165dbELSA-2024-12444ol7_x86_64_u0_patch
glibc-devel-2.17-55.0.4.el7_0.3.x86_64.rpmb0ef5ffd8aca12ea7e5c086b3a39719d13cae72cfe2876dd29bfff3c7da5a0a8ELSA-2024-12444ol7_x86_64_latest_archive
glibc-devel-2.17-55.0.4.el7_0.3.x86_64.rpmb0ef5ffd8aca12ea7e5c086b3a39719d13cae72cfe2876dd29bfff3c7da5a0a8ELSA-2024-12444ol7_x86_64_u0_patch
glibc-headers-2.17-55.0.4.el7_0.3.x86_64.rpm336c2fd465a19aa7c9899ce9468226b6ff738db60a5cd4b9d1f0dc79b5790cf2ELSA-2024-12444ol7_x86_64_latest_archive
glibc-headers-2.17-55.0.4.el7_0.3.x86_64.rpm336c2fd465a19aa7c9899ce9468226b6ff738db60a5cd4b9d1f0dc79b5790cf2ELSA-2024-12444ol7_x86_64_u0_patch
glibc-static-2.17-55.0.4.el7_0.3.i686.rpm6a8a49ef34177118cc7c99e384549903c270ae78b00251c7c2c40a0a1d5d4f15ELSA-2024-12444ol7_x86_64_optional_archive
glibc-static-2.17-55.0.4.el7_0.3.x86_64.rpm7ee4cf2ea48ee3f50954f3d2fa948339bcbe2a0123bb42544ade5eb059952880ELSA-2024-12444ol7_x86_64_optional_archive
glibc-utils-2.17-55.0.4.el7_0.3.x86_64.rpm0b4daf038c480cac12574b14f5a1c867805f69b695af446cfbf0d86887ca784fELSA-2024-12444ol7_x86_64_latest_archive
glibc-utils-2.17-55.0.4.el7_0.3.x86_64.rpm0b4daf038c480cac12574b14f5a1c867805f69b695af446cfbf0d86887ca784fELSA-2024-12444ol7_x86_64_u0_patch
nscd-2.17-55.0.4.el7_0.3.x86_64.rpm224d8bc5454dd1bef29d223602e6b675488d65b562f154d447b3ed438b6d088aELSA-2024-12444ol7_x86_64_latest_archive
nscd-2.17-55.0.4.el7_0.3.x86_64.rpm224d8bc5454dd1bef29d223602e6b675488d65b562f154d447b3ed438b6d088aELSA-2024-12444ol7_x86_64_u0_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete