ELSA-2018-4078

ELSA-2018-4078 - glibc security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-04-18

Description


[2.17-222]
- Restore internal GLIBC_PRIVATE symbols for use during upgrades (#1523119)

[2.17-221]
- CVE-2018-1000001: Fix realpath() buffer underflow (#1534635)
- i386: Fix unwinding for 32-bit C++ application (#1529982)
- Reduce thread and dynamic loader stack usage (#1527904)
- x86-64: Use XSAVE/XSAVEC more often during lazy symbol binding (#1528418)

[2.17-220]
- Update HWCAP bits for IBM POWER9 DD2.1 (#1503854)

[2.17-219]
- Rebuild with newer gcc for aarch64 stack probing fixes (#1500475)

[2.17-218]
- Improve memcpy performance for POWER9 DD2.1 (#1498925)

[2.17-217]
- Update Linux system call list to kernel 4.13 (#1508895)

[2.17-216]
- x86-64: Use XSAVE/XSAVEC in the ld.so trampoline (#1504969)

[2.17-215]
- CVE-2017-15670: glob: Fix one-byte overflow with GLOB_TILDE (#1504809)
- CVE-2017-15804: glob: Fix buffer overflow in GLOB_TILDE unescaping (#1504809)

[2.17-214]
- Fix check-localplt test failure.
- Include ld.so in check-localplt test. (#1440250)

[2.17-213]
- Fix build warning in locarchive.c (#1349964)

[2.17-212]
- Hide reference to mktemp in libpthread (#1349962)

[2.17-211]
- Implement fopencookie hardening (#1372305)

[2.17-210]
- x86-64: Support __tls_get_addr with an unaligned stack (#1468807)

[2.17-209]
- Define CLOCK_TAI in (#1448822)

[2.17-208]
- Compile glibc with -fstack-clash-protection (#1500475)

[2.17-207]
- aarch64: Avoid invalid relocations in the startup code (#1500908)

[2.17-206]
- Fix timezone test failures on large parallel builds. (#1234449, #1378329)

[2.17-205]
- Handle DSOs with no PLT (#1445781)

[2.17-204]
- libio: Implement vtable verification (#1398413)

[2.17-203]
- Fix socket system call selection on s390x (#1498566).
- Use different construct for protected visibility in IFUNC tests (#1445644)

[2.17-202]
- Rebase the DNS stub resolver and getaddrinfo to the glibc 2.26 version
- Support an arbitrary number of search domains in the stub resolver (#677316)
- Detect and apply /etc/resolv.conf changes in libresolv (#1432085)
- CVE-2017-1213: Fragmentation attacks possible when ENDS0 is enabled
(#1487063)
- CVE-2016-3706: Stack (frame) overflow in getaddrinfo when called
with AF_INET, AF_INET6 (#1329674)
- CVE-2015-5180: resolv: Fix crash with internal QTYPE (#1497131)
- CVE-2014-9402: denial of service in getnetbyname function (#1497132)
- Fix getaddrinfo to handle certain long lines in /etc/hosts (#1452034)
- Make RES_ROTATE start with a random name server (#1257639)
- Stricter IPv6 address parser (#1484034)
- Remove noip6dotint support from the stub resolver (#1482988)
- Remove partial bitstring label support from the stub resolver
- Remove unsupported resolver hook functions from the API
- Remove outdated RR type classification macros from the API
- hesiod: Always use TLS resolver state
- hesiod: Avoid non-trust-boundary crossing heap overflow in get_txt_records

[2.17.201]
- Fix hang in nscd cache prune thread (#1435615)

[2.17-200]
- Add binary timezone test data files (#1234449, #1378329)

[2.17.198]
- Add support for new IBM z14 (s390x) instructions (#1375235)

[2.17-197]
- Fix compile warnings in malloc (#1347277)
- Fix occasional tst-malloc-usable failures (#1348000)
- Additional chunk hardening in malloc (#1447556)
- Pointer alignment fix in nss group merge (#1463692)
- Fix SIGSEGV when LD_LIBRARY_PATH only has non-existing paths (#1443236)


Related CVEs



Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) glibc-2.17-222.ksplice1.el7.src.rpm37c713547004cca053cc8409ac23a5d92f91425ddfe76a9a01a5ba0d759fdbb4ELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-2.17-222.ksplice1.el7.i686.rpm2823f85c740451c6ba528ba6db1cc639e72b665a5c3cb718125e5a0e2ba03aedELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-2.17-222.ksplice1.el7.x86_64.rpm2fbc12f8b79522949445c36c032a7fd2a7bba782844a31e68a7eec4d2f8cfc41ELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-common-2.17-222.ksplice1.el7.x86_64.rpm75fef3ed75609968cd66509cfbdb7e2b0e017cee64f016ba4aee4d4141f2dae9ELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-devel-2.17-222.ksplice1.el7.i686.rpm27582708fcd4accc3d680614da227b702e07899d94d263d15e62210eeed57914ELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-devel-2.17-222.ksplice1.el7.x86_64.rpmc8a768086ba1f44e0812f9a3a5d78b27887c32aa64b1c495aa3e8788da2951e7ELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-headers-2.17-222.ksplice1.el7.x86_64.rpm9ffb2ca809d63750ba97c7dca7a5fe463d54f5ad3e3ee171c8165e62269ed8a7ELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-static-2.17-222.ksplice1.el7.i686.rpm480ca5a597545c3ac7b2fc8cc3addadf032a962b06dd6579f30149bb8ae7a23eELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-static-2.17-222.ksplice1.el7.x86_64.rpmb68e4bb842f4fa129c3fa8dd06e6bf5ea0f02ac379b7dc31d885abdd4ed86455ELSA-2024-12444ol7_x86_64_userspace_ksplice
glibc-utils-2.17-222.ksplice1.el7.x86_64.rpm0c84898c5f05e2a4acc2e2db89a3a1b1fc37e0480b7fe60a4a9899b21849c97aELSA-2024-12444ol7_x86_64_userspace_ksplice
nscd-2.17-222.ksplice1.el7.x86_64.rpmf753c90f6f7d1500f7b442552ced15895cca0a6853d1ecfe25de2a9e753e05baELSA-2024-12444ol7_x86_64_userspace_ksplice



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete