SUSE-SU-2015:0526-1: moderate: Security update for glibc
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Mar 18 11:05:34 MDT 2015
SUSE Security Update: Security update for glibc
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0526-1
Rating: moderate
References: #864081 #905313 #906371 #909053 #910599 #915526
#915985 #916222
Cross-References: CVE-2013-7423 CVE-2014-7817 CVE-2014-9402
CVE-2015-1472
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________
An update that solves four vulnerabilities and has four
fixes is now available.
Description:
glibc has been updated to fix four security issues.
These security issues were fixed:
- CVE-2014-7817: The wordexp function in GNU C Library (aka glibc) 2.21
did not enforce the WRDE_NOCMD flag, which allowed context-dependent
attackers to execute arbitrary commands, as demonstrated by input
containing "$((`...`))" (bnc#906371).
- CVE-2015-1472: Heap buffer overflow in glibc swscanf (bnc#916222).
- CVE-2014-9402: Denial of service in getnetbyname function (bnc#910599).
- CVE-2013-7423: Getaddrinfo() writes DNS queries to random file
descriptors under high load (bnc#915526).
These non-security issues were fixed:
- Fix infinite loop in check_pf (bsc#909053)
- Restore warning about execution permission, it is still needed for
noexec mounts (bsc#915985).
- Don't touch user-controlled stdio locks in forked child (bsc#864081)
- Don't use gcc extensions for non-gcc compilers (bsc#905313)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-129=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-129=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-129=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
glibc-debuginfo-2.19-20.3
glibc-debugsource-2.19-20.3
glibc-devel-static-2.19-20.3
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
glibc-2.19-20.3
glibc-debuginfo-2.19-20.3
glibc-debugsource-2.19-20.3
glibc-devel-2.19-20.3
glibc-devel-debuginfo-2.19-20.3
glibc-locale-2.19-20.3
glibc-locale-debuginfo-2.19-20.3
glibc-profile-2.19-20.3
nscd-2.19-20.3
nscd-debuginfo-2.19-20.3
- SUSE Linux Enterprise Server 12 (s390x x86_64):
glibc-32bit-2.19-20.3
glibc-debuginfo-32bit-2.19-20.3
glibc-devel-32bit-2.19-20.3
glibc-devel-debuginfo-32bit-2.19-20.3
glibc-locale-32bit-2.19-20.3
glibc-locale-debuginfo-32bit-2.19-20.3
glibc-profile-32bit-2.19-20.3
- SUSE Linux Enterprise Server 12 (noarch):
glibc-html-2.19-20.3
glibc-i18ndata-2.19-20.3
glibc-info-2.19-20.3
- SUSE Linux Enterprise Desktop 12 (x86_64):
glibc-2.19-20.3
glibc-32bit-2.19-20.3
glibc-debuginfo-2.19-20.3
glibc-debuginfo-32bit-2.19-20.3
glibc-debugsource-2.19-20.3
glibc-devel-2.19-20.3
glibc-devel-32bit-2.19-20.3
glibc-devel-debuginfo-2.19-20.3
glibc-devel-debuginfo-32bit-2.19-20.3
glibc-locale-2.19-20.3
glibc-locale-32bit-2.19-20.3
glibc-locale-debuginfo-2.19-20.3
glibc-locale-debuginfo-32bit-2.19-20.3
nscd-2.19-20.3
nscd-debuginfo-2.19-20.3
- SUSE Linux Enterprise Desktop 12 (noarch):
glibc-i18ndata-2.19-20.3
References:
http://support.novell.com/security/cve/CVE-2013-7423.html
http://support.novell.com/security/cve/CVE-2014-7817.html
http://support.novell.com/security/cve/CVE-2014-9402.html
http://support.novell.com/security/cve/CVE-2015-1472.html
https://bugzilla.suse.com/864081
https://bugzilla.suse.com/905313
https://bugzilla.suse.com/906371
https://bugzilla.suse.com/909053
https://bugzilla.suse.com/910599
https://bugzilla.suse.com/915526
https://bugzilla.suse.com/915985
https://bugzilla.suse.com/916222
More information about the sle-security-updates
mailing list