SUSE-SU-2013:1852-1: Security update for glibc

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Dec 10 03:04:12 MST 2013


   SUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1852-1
Rating:             low
References:         #691365 #779320 #791928 #801246 #811979 #813121 
                    #819347 #822210 #827811 #828235 #828637 #830268 
                    #834594 #839870 
Cross-References:   CVE-2012-4412 CVE-2013-0242 CVE-2013-1914
                    CVE-2013-4237 CVE-2013-4332 CVE-2013-4788
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that solves 6 vulnerabilities and has 8 fixes is
   now available.

Description:


   This update for glibc contains the following fixes:

   * Fix integer overflows in malloc (CVE-2013-4332,
   bnc#839870)
   * Fix buffer overflow in glob (bnc#691365)
   * Fix buffer overflow in strcoll (CVE-2012-4412,
   bnc#779320)
   * Update mount flags in <sys/mount.h> (bnc#791928)
   * Fix buffer overrun in regexp matcher (CVE-2013-0242,
   bnc#801246)
   * Fix memory leaks in dlopen (bnc#811979)
   * Fix stack overflow in getaddrinfo with many results
   (CVE-2013-1914, bnc#813121)
   * Don't raise UNDERFLOW in tan/tanf for small but
   normal argument (bnc#819347)
   * Properly cross page boundary in SSE4.2 implementation
   of strcmp (bnc#822210)
   * Fix robust mutex handling after fork (bnc#827811)
   * Fix missing character in IBM-943 charset (bnc#828235)
   * Fix use of alloca in gaih_inet (bnc#828637)
   * Initialize pointer guard also in static executables
   (CVE-2013-4788, bnc#830268)
   * Fix readdir_r with long file names (CVE-2013-4237,
   bnc#834594).

   Security Issues:

   * CVE-2012-4412
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
   >
   * CVE-2013-0242
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
   >
   * CVE-2013-1914
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
   >
   * CVE-2013-4237
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
   >
   * CVE-2013-4332
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
   >
   * CVE-2013-4788
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-glibc-8337

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-glibc-8337

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-glibc-8337

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-glibc-8337

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      glibc-html-2.11.3-17.56.2
      glibc-info-2.11.3-17.56.2

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      glibc-2.11.3-17.56.2
      glibc-devel-2.11.3-17.56.2
      glibc-html-2.11.3-17.56.2
      glibc-i18ndata-2.11.3-17.56.2
      glibc-info-2.11.3-17.56.2
      glibc-locale-2.11.3-17.56.2
      glibc-profile-2.11.3-17.56.2
      nscd-2.11.3-17.56.2

   - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):

      glibc-32bit-2.11.3-17.56.2
      glibc-devel-32bit-2.11.3-17.56.2
      glibc-locale-32bit-2.11.3-17.56.2
      glibc-profile-32bit-2.11.3-17.56.2

   - SUSE Linux Enterprise Server 11 SP3 (i586 i686 ia64 ppc64 s390x x86_64):

      glibc-2.11.3-17.56.2
      glibc-devel-2.11.3-17.56.2

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      glibc-html-2.11.3-17.56.2
      glibc-i18ndata-2.11.3-17.56.2
      glibc-info-2.11.3-17.56.2
      glibc-locale-2.11.3-17.56.2
      glibc-profile-2.11.3-17.56.2
      nscd-2.11.3-17.56.2

   - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):

      glibc-32bit-2.11.3-17.56.2
      glibc-devel-32bit-2.11.3-17.56.2
      glibc-locale-32bit-2.11.3-17.56.2
      glibc-profile-32bit-2.11.3-17.56.2

   - SUSE Linux Enterprise Server 11 SP3 (ia64):

      glibc-locale-x86-2.11.3-17.56.2
      glibc-profile-x86-2.11.3-17.56.2
      glibc-x86-2.11.3-17.56.2

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 i686 x86_64):

      glibc-2.11.3-17.56.2
      glibc-devel-2.11.3-17.56.2

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      glibc-i18ndata-2.11.3-17.56.2
      glibc-locale-2.11.3-17.56.2
      nscd-2.11.3-17.56.2

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      glibc-32bit-2.11.3-17.56.2
      glibc-devel-32bit-2.11.3-17.56.2
      glibc-locale-32bit-2.11.3-17.56.2


References:

   http://support.novell.com/security/cve/CVE-2012-4412.html
   http://support.novell.com/security/cve/CVE-2013-0242.html
   http://support.novell.com/security/cve/CVE-2013-1914.html
   http://support.novell.com/security/cve/CVE-2013-4237.html
   http://support.novell.com/security/cve/CVE-2013-4332.html
   http://support.novell.com/security/cve/CVE-2013-4788.html
   https://bugzilla.novell.com/691365
   https://bugzilla.novell.com/779320
   https://bugzilla.novell.com/791928
   https://bugzilla.novell.com/801246
   https://bugzilla.novell.com/811979
   https://bugzilla.novell.com/813121
   https://bugzilla.novell.com/819347
   https://bugzilla.novell.com/822210
   https://bugzilla.novell.com/827811
   https://bugzilla.novell.com/828235
   https://bugzilla.novell.com/828637
   https://bugzilla.novell.com/830268
   https://bugzilla.novell.com/834594
   https://bugzilla.novell.com/839870
   http://download.novell.com/patch/finder/?keywords=662fdef831f525bc78959155f328aa67



More information about the sle-security-updates mailing list