Debian Security Advisory

DLA-411-1 eglibc -- LTS security update

Date Reported:
05 Feb 2016
Affected Packages:
eglibc
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2014-9761, CVE-2015-8776, CVE-2015-8778, CVE-2015-8779.
More information:

Several vulnerabilities have been fixed in the Debian GNU C Library, eglibc:

  • CVE-2014-9761

    The math's nan* function wrongly handled payload strings, yielding to an unbounded stack allocation based on the length of the arguments. To solve this issue, payload parsing has been refactored out of strtod into a separate functions that nan* can call directly.

  • CVE-2015-8776

    The strftime() function made it possible to access invalid memory, allowing to segfault the calling application.

  • CVE-2015-8778

    hcreate() was susceptible to an integer overflow, that may results in out-of-bounds heap accesses.

  • CVE-2015-8779

    The catopen() function suffered from multiple unbounded stack allocations.

For Debian 6 Squeeze, these issues have been fixed in eglibc version eglibc_2.11.3-4+deb6u9. We recommend you to upgrade your eglibc packages.