copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2014.1147 - [UNIX/Linux][Debian] eglibc: Reduced security - Unknown/unspecified

Date: 11 July 2014
References: ESB-2014.1479  ESB-2014.1660  ESB-2014.1757  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1147
                          eglibc security update
                               11 July 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           eglibc
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-0475  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2976

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running eglibc check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2976-1                   security@debian.org
http://www.debian.org/security/                            Florian Weimer
July 10, 2014                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : eglibc
CVE ID         : CVE-2014-0475

Stephane Chazelas discovered that the GNU C library, glibc, processed
".." path segments in locale-related environment variables, possibly
allowing attackers to circumvent intended restrictions, such as
ForceCommand in OpenSSH, assuming that they can supply crafted locale
settings.

For the stable distribution (wheezy), this problem has been fixed in
version 2.13-38+deb7u3.

This update also includes changes previously scheduled for the next
wheezy point release as version 2.13-38+deb7u2.  See the Debian
changelog for details.

We recommend that you upgrade your eglibc packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJTvuPNAAoJEL97/wQC1SS+HI4H+wV4HS0n1cwGpgB6y/Q34Qo8
0Mh+lJRRDxCOwWFhPh2WQGZ7vZQpoN0EX19swHRLEvDyrJPpULITsp+WmxTLSAFJ
9MzLeD4kwCbZ8tESxV6C/SO8lDhV0oDKr6e7gdstCifG3KK2y6wa2jOtwa+Hv+vv
jUoE6a0NlZ3dU7SYCk2M+G8Tbl1jbO9ise8Js1ANUl1b4ccGo9YXONjL0NcAqo1i
SH5XZYLCjVJQl1ZytHmPzU7Yjwu2lspJFRmkeMJupWx0yZitW/5cHfuMfM8/1fnx
2AS0oMNXVOc42b7OqHAQ51uzgzWUP8U7Ng0IEmL1dIhedKl0BPQbx0rJvKwnK9c=
=32zc
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=n/re
-----END PGP SIGNATURE-----