SUSE-SU-2015:0439-1: moderate: Security update for glibc

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Mar 5 19:04:57 MST 2015


   SUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0439-1
Rating:             moderate
References:         #904461 #906371 #915526 #916222 #917072 
Cross-References:   CVE-2013-7423 CVE-2014-7817 CVE-2014-9402
                    CVE-2015-1472
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that solves four vulnerabilities and has one
   errata is now available.

Description:


   glibc has ben updated to fix three security issues:

       * CVE-2014-7817: wordexp failed to honour WRDE_NOCMD (bsc#906371)
       * CVE-2013-7423: Fixed invalid file descriptor reuse while sending DNS
         query (bsc#915526)
       * CVE-2015-1472: Fixed buffer overflow in wscanf (bsc#916222)

   These non-security issues have been fixed:

       * Remove inaccurate assembler implementations of ceill, floorl,
         nearbyintl, roundl, truncl for PowerPC64 (bsc#917072)
       * Don't return IPv4 addresses when looking for IPv6 addresses only
         (bsc#904461)

   Security Issues:

       * CVE-2015-1472
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472>
       * CVE-2013-7423
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423>
       * CVE-2014-7817
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817>
       * CVE-2014-9402
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-glibc=10357

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-glibc=10357

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-glibc=10357

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-glibc=10357

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      glibc-html-2.11.3-17.82.11
      glibc-info-2.11.3-17.82.11

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      glibc-2.11.3-17.82.11
      glibc-devel-2.11.3-17.82.11
      glibc-html-2.11.3-17.82.11
      glibc-i18ndata-2.11.3-17.82.11
      glibc-info-2.11.3-17.82.11
      glibc-locale-2.11.3-17.82.11
      glibc-profile-2.11.3-17.82.11
      nscd-2.11.3-17.82.11

   - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

      glibc-32bit-2.11.3-17.82.11
      glibc-devel-32bit-2.11.3-17.82.11
      glibc-locale-32bit-2.11.3-17.82.11
      glibc-profile-32bit-2.11.3-17.82.11

   - SUSE Linux Enterprise Server 11 SP3 (i586 i686 ia64 ppc64 s390x x86_64):

      glibc-2.11.3-17.82.11
      glibc-devel-2.11.3-17.82.11

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      glibc-html-2.11.3-17.82.11
      glibc-i18ndata-2.11.3-17.82.11
      glibc-info-2.11.3-17.82.11
      glibc-locale-2.11.3-17.82.11
      glibc-profile-2.11.3-17.82.11
      nscd-2.11.3-17.82.11

   - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

      glibc-32bit-2.11.3-17.82.11
      glibc-devel-32bit-2.11.3-17.82.11
      glibc-locale-32bit-2.11.3-17.82.11
      glibc-profile-32bit-2.11.3-17.82.11

   - SUSE Linux Enterprise Server 11 SP3 (ia64):

      glibc-locale-x86-2.11.3-17.82.11
      glibc-profile-x86-2.11.3-17.82.11
      glibc-x86-2.11.3-17.82.11

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 i686 x86_64):

      glibc-2.11.3-17.82.11
      glibc-devel-2.11.3-17.82.11

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      glibc-i18ndata-2.11.3-17.82.11
      glibc-locale-2.11.3-17.82.11
      nscd-2.11.3-17.82.11

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      glibc-32bit-2.11.3-17.82.11
      glibc-devel-32bit-2.11.3-17.82.11
      glibc-locale-32bit-2.11.3-17.82.11


References:

   http://support.novell.com/security/cve/CVE-2013-7423.html
   http://support.novell.com/security/cve/CVE-2014-7817.html
   http://support.novell.com/security/cve/CVE-2014-9402.html
   http://support.novell.com/security/cve/CVE-2015-1472.html
   https://bugzilla.suse.com/904461
   https://bugzilla.suse.com/906371
   https://bugzilla.suse.com/915526
   https://bugzilla.suse.com/916222
   https://bugzilla.suse.com/917072
   http://download.suse.com/patch/finder/?keywords=9feb5a0e37ae9da1e66b11c4b95ba3da



More information about the sle-security-updates mailing list