SUSE-SU-2015:0526-1: moderate: Security update for glibc

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Mar 18 11:05:34 MDT 2015


   SUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0526-1
Rating:             moderate
References:         #864081 #905313 #906371 #909053 #910599 #915526 
                    #915985 #916222 
Cross-References:   CVE-2013-7423 CVE-2014-7817 CVE-2014-9402
                    CVE-2015-1472
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that solves four vulnerabilities and has four
   fixes is now available.

Description:

   glibc has been updated to fix four security issues.

   These security issues were fixed:
   - CVE-2014-7817: The wordexp function in GNU C Library (aka glibc) 2.21
     did not enforce the WRDE_NOCMD flag, which allowed context-dependent
     attackers to execute arbitrary commands, as demonstrated by input
     containing "$((`...`))" (bnc#906371).
   - CVE-2015-1472: Heap buffer overflow in glibc swscanf (bnc#916222).
   - CVE-2014-9402: Denial of service in getnetbyname function (bnc#910599).
   - CVE-2013-7423: Getaddrinfo() writes DNS queries to random file
     descriptors under high load (bnc#915526).

   These non-security issues were fixed:
   - Fix infinite loop in check_pf (bsc#909053)
   - Restore warning about execution permission, it is still needed for
     noexec mounts (bsc#915985).
   - Don't touch user-controlled stdio locks in forked child (bsc#864081)
   - Don't use gcc extensions for non-gcc compilers (bsc#905313)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2015-129=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2015-129=1

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-129=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

      glibc-debuginfo-2.19-20.3
      glibc-debugsource-2.19-20.3
      glibc-devel-static-2.19-20.3

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      glibc-2.19-20.3
      glibc-debuginfo-2.19-20.3
      glibc-debugsource-2.19-20.3
      glibc-devel-2.19-20.3
      glibc-devel-debuginfo-2.19-20.3
      glibc-locale-2.19-20.3
      glibc-locale-debuginfo-2.19-20.3
      glibc-profile-2.19-20.3
      nscd-2.19-20.3
      nscd-debuginfo-2.19-20.3

   - SUSE Linux Enterprise Server 12 (s390x x86_64):

      glibc-32bit-2.19-20.3
      glibc-debuginfo-32bit-2.19-20.3
      glibc-devel-32bit-2.19-20.3
      glibc-devel-debuginfo-32bit-2.19-20.3
      glibc-locale-32bit-2.19-20.3
      glibc-locale-debuginfo-32bit-2.19-20.3
      glibc-profile-32bit-2.19-20.3

   - SUSE Linux Enterprise Server 12 (noarch):

      glibc-html-2.19-20.3
      glibc-i18ndata-2.19-20.3
      glibc-info-2.19-20.3

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      glibc-2.19-20.3
      glibc-32bit-2.19-20.3
      glibc-debuginfo-2.19-20.3
      glibc-debuginfo-32bit-2.19-20.3
      glibc-debugsource-2.19-20.3
      glibc-devel-2.19-20.3
      glibc-devel-32bit-2.19-20.3
      glibc-devel-debuginfo-2.19-20.3
      glibc-devel-debuginfo-32bit-2.19-20.3
      glibc-locale-2.19-20.3
      glibc-locale-32bit-2.19-20.3
      glibc-locale-debuginfo-2.19-20.3
      glibc-locale-debuginfo-32bit-2.19-20.3
      nscd-2.19-20.3
      nscd-debuginfo-2.19-20.3

   - SUSE Linux Enterprise Desktop 12 (noarch):

      glibc-i18ndata-2.19-20.3


References:

   http://support.novell.com/security/cve/CVE-2013-7423.html
   http://support.novell.com/security/cve/CVE-2014-7817.html
   http://support.novell.com/security/cve/CVE-2014-9402.html
   http://support.novell.com/security/cve/CVE-2015-1472.html
   https://bugzilla.suse.com/864081
   https://bugzilla.suse.com/905313
   https://bugzilla.suse.com/906371
   https://bugzilla.suse.com/909053
   https://bugzilla.suse.com/910599
   https://bugzilla.suse.com/915526
   https://bugzilla.suse.com/915985
   https://bugzilla.suse.com/916222



More information about the sle-security-updates mailing list