SUSE-SU-2013:1287-1: moderate: Security update for glibc

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Aug 1 07:04:11 MDT 2013


   SUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1287-1
Rating:             moderate
References:         #661460 #676178 #691365 #732110 #735850 #743689 
                    #747768 #753756 #760216 #770891 #774467 #775690 
                    #783196 #796982 #805899 #813121 #818630 #828637 
                    
Cross-References:   CVE-2009-5029 CVE-2010-4756 CVE-2011-1089
                    CVE-2012-0864 CVE-2012-3480 CVE-2013-1914
                   
Affected Products:
                    SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________

   An update that solves 6 vulnerabilities and has 12 fixes is
   now available.

Description:


   This collective update for the GNU C library (glibc)
   provides the following  fixes and enhancements:

   Security issues fixed: - Fix stack overflow in getaddrinfo
   with many  results. (bnc#813121, CVE-2013-1914) - Fixed
   another stack overflow in  getaddrinfo with many results
   (bnc#828637) - Fix buffer overflow in glob.  (bnc#691365)
   (CVE-2010-4756) - Fix array overflow in floating point
   parser  [bnc#775690] (CVE-2012-3480) - Fix strtod
   integer/buffer overflows  [bnc#775690] (CVE-2012-3480) -
   Make addmntent return errors also for cached  streams. [bnc
   #676178, CVE-2011-1089] - Fix overflows in vfprintf. [bnc
   #770891, CVE 2012-3406] - Add vfprintf-nargs.diff for
   possible format  string overflow. [bnc #747768,
   CVE-2012-0864] - Check values from file  header in
   __tzfile_read. [bnc #735850, CVE-2009-5029]

   Also several bugs were fixed: - Fix locking in _IO_cleanup.
   (bnc#796982) -  Fix memory leak in execve. (bnc#805899) -
   Fix nscd timestamps in logging  (bnc#783196) - Fix perl
   script error message (bnc#774467) - Fall back to  localhost
   if no nameserver defined (bnc#818630) - Fix incomplete
   results  from nscd. [bnc #753756] - Fix a deadlock in dlsym
   in case the symbol isn't  found, for multithreaded
   programs. [bnc #760216] - Fix problem with TLS and  dlopen.
   [#732110] - Backported regex fix for skipping of valid
   EUC-JP  matches [bnc#743689] - Fixed false regex match on
   incomplete chars in  EUC-JP [bnc#743689] - Add
   glibc-pmap-timeout.diff in order to fix useless  connection
   attempts to NFS servers. [bnc #661460]

   Security Issues:

   * CVE-2009-5029
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029
   >
   * CVE-2010-4756
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4756
   >
   * CVE-2011-1089
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089
   >
   * CVE-2012-0864
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0864
   >
   * CVE-2012-3480
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480
   >
   * CVE-2013-1914
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
   >



Package List:

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 i686 s390x x86_64):

      glibc-2.4-31.77.102.1
      glibc-devel-2.4-31.77.102.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):

      glibc-html-2.4-31.77.102.1
      glibc-i18ndata-2.4-31.77.102.1
      glibc-info-2.4-31.77.102.1
      glibc-locale-2.4-31.77.102.1
      glibc-profile-2.4-31.77.102.1
      nscd-2.4-31.77.102.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):

      glibc-32bit-2.4-31.77.102.1
      glibc-devel-32bit-2.4-31.77.102.1
      glibc-locale-32bit-2.4-31.77.102.1
      glibc-profile-32bit-2.4-31.77.102.1


References:

   http://support.novell.com/security/cve/CVE-2009-5029.html
   http://support.novell.com/security/cve/CVE-2010-4756.html
   http://support.novell.com/security/cve/CVE-2011-1089.html
   http://support.novell.com/security/cve/CVE-2012-0864.html
   http://support.novell.com/security/cve/CVE-2012-3480.html
   http://support.novell.com/security/cve/CVE-2013-1914.html
   https://bugzilla.novell.com/661460
   https://bugzilla.novell.com/676178
   https://bugzilla.novell.com/691365
   https://bugzilla.novell.com/732110
   https://bugzilla.novell.com/735850
   https://bugzilla.novell.com/743689
   https://bugzilla.novell.com/747768
   https://bugzilla.novell.com/753756
   https://bugzilla.novell.com/760216
   https://bugzilla.novell.com/770891
   https://bugzilla.novell.com/774467
   https://bugzilla.novell.com/775690
   https://bugzilla.novell.com/783196
   https://bugzilla.novell.com/796982
   https://bugzilla.novell.com/805899
   https://bugzilla.novell.com/813121
   https://bugzilla.novell.com/818630
   https://bugzilla.novell.com/828637
   http://download.novell.com/patch/finder/?keywords=17c15337eaf4f28f28cdc9f9d3d731ec



More information about the sle-security-updates mailing list