Amazon Linux 1 Security Advisory: ALAS-2013-270
Advisory Release Date: 2013-12-17 21:39 Pacific
Advisory Updated Date: 2014-09-16 22:16 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in glibc's memory allocator functions (pvalloc, valloc, and memalign). If an application used such a function, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2013-4332)
A flaw was found in the regular expression matching routines that process multibyte character input. If an application utilized the glibc regular expression matching mechanism, an attacker could provide specially-crafted input that, when processed, would cause the application to crash. (CVE-2013-0242)
It was found that getaddrinfo() did not limit the amount of stack memory used during name resolution. An attacker able to make an application resolve an attacker-controlled hostname or IP address could possibly cause the application to exhaust all stack memory and crash. (CVE-2013-1914)
Affected Packages:
glibc
Issue Correction:
Run yum update glibc to update your system.
i686:
glibc-2.12-1.132.45.amzn1.i686
glibc-utils-2.12-1.132.45.amzn1.i686
glibc-debuginfo-common-2.12-1.132.45.amzn1.i686
glibc-common-2.12-1.132.45.amzn1.i686
glibc-headers-2.12-1.132.45.amzn1.i686
glibc-static-2.12-1.132.45.amzn1.i686
glibc-debuginfo-2.12-1.132.45.amzn1.i686
nscd-2.12-1.132.45.amzn1.i686
glibc-devel-2.12-1.132.45.amzn1.i686
src:
glibc-2.12-1.132.45.amzn1.src
x86_64:
glibc-2.12-1.132.45.amzn1.x86_64
nscd-2.12-1.132.45.amzn1.x86_64
glibc-devel-2.12-1.132.45.amzn1.x86_64
glibc-common-2.12-1.132.45.amzn1.x86_64
glibc-debuginfo-2.12-1.132.45.amzn1.x86_64
glibc-headers-2.12-1.132.45.amzn1.x86_64
glibc-static-2.12-1.132.45.amzn1.x86_64
glibc-debuginfo-common-2.12-1.132.45.amzn1.x86_64
glibc-utils-2.12-1.132.45.amzn1.x86_64