SUSE-SU-2013:1852-1: Security update for glibc
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Dec 10 03:04:12 MST 2013
SUSE Security Update: Security update for glibc
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1852-1
Rating: low
References: #691365 #779320 #791928 #801246 #811979 #813121
#819347 #822210 #827811 #828235 #828637 #830268
#834594 #839870
Cross-References: CVE-2012-4412 CVE-2013-0242 CVE-2013-1914
CVE-2013-4237 CVE-2013-4332 CVE-2013-4788
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that solves 6 vulnerabilities and has 8 fixes is
now available.
Description:
This update for glibc contains the following fixes:
* Fix integer overflows in malloc (CVE-2013-4332,
bnc#839870)
* Fix buffer overflow in glob (bnc#691365)
* Fix buffer overflow in strcoll (CVE-2012-4412,
bnc#779320)
* Update mount flags in <sys/mount.h> (bnc#791928)
* Fix buffer overrun in regexp matcher (CVE-2013-0242,
bnc#801246)
* Fix memory leaks in dlopen (bnc#811979)
* Fix stack overflow in getaddrinfo with many results
(CVE-2013-1914, bnc#813121)
* Don't raise UNDERFLOW in tan/tanf for small but
normal argument (bnc#819347)
* Properly cross page boundary in SSE4.2 implementation
of strcmp (bnc#822210)
* Fix robust mutex handling after fork (bnc#827811)
* Fix missing character in IBM-943 charset (bnc#828235)
* Fix use of alloca in gaih_inet (bnc#828637)
* Initialize pointer guard also in static executables
(CVE-2013-4788, bnc#830268)
* Fix readdir_r with long file names (CVE-2013-4237,
bnc#834594).
Security Issues:
* CVE-2012-4412
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
>
* CVE-2013-0242
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
>
* CVE-2013-1914
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
>
* CVE-2013-4237
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
>
* CVE-2013-4332
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
>
* CVE-2013-4788
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-glibc-8337
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-glibc-8337
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-glibc-8337
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-glibc-8337
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
glibc-html-2.11.3-17.56.2
glibc-info-2.11.3-17.56.2
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
glibc-2.11.3-17.56.2
glibc-devel-2.11.3-17.56.2
glibc-html-2.11.3-17.56.2
glibc-i18ndata-2.11.3-17.56.2
glibc-info-2.11.3-17.56.2
glibc-locale-2.11.3-17.56.2
glibc-profile-2.11.3-17.56.2
nscd-2.11.3-17.56.2
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
glibc-32bit-2.11.3-17.56.2
glibc-devel-32bit-2.11.3-17.56.2
glibc-locale-32bit-2.11.3-17.56.2
glibc-profile-32bit-2.11.3-17.56.2
- SUSE Linux Enterprise Server 11 SP3 (i586 i686 ia64 ppc64 s390x x86_64):
glibc-2.11.3-17.56.2
glibc-devel-2.11.3-17.56.2
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
glibc-html-2.11.3-17.56.2
glibc-i18ndata-2.11.3-17.56.2
glibc-info-2.11.3-17.56.2
glibc-locale-2.11.3-17.56.2
glibc-profile-2.11.3-17.56.2
nscd-2.11.3-17.56.2
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
glibc-32bit-2.11.3-17.56.2
glibc-devel-32bit-2.11.3-17.56.2
glibc-locale-32bit-2.11.3-17.56.2
glibc-profile-32bit-2.11.3-17.56.2
- SUSE Linux Enterprise Server 11 SP3 (ia64):
glibc-locale-x86-2.11.3-17.56.2
glibc-profile-x86-2.11.3-17.56.2
glibc-x86-2.11.3-17.56.2
- SUSE Linux Enterprise Desktop 11 SP3 (i586 i686 x86_64):
glibc-2.11.3-17.56.2
glibc-devel-2.11.3-17.56.2
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
glibc-i18ndata-2.11.3-17.56.2
glibc-locale-2.11.3-17.56.2
nscd-2.11.3-17.56.2
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
glibc-32bit-2.11.3-17.56.2
glibc-devel-32bit-2.11.3-17.56.2
glibc-locale-32bit-2.11.3-17.56.2
References:
http://support.novell.com/security/cve/CVE-2012-4412.html
http://support.novell.com/security/cve/CVE-2013-0242.html
http://support.novell.com/security/cve/CVE-2013-1914.html
http://support.novell.com/security/cve/CVE-2013-4237.html
http://support.novell.com/security/cve/CVE-2013-4332.html
http://support.novell.com/security/cve/CVE-2013-4788.html
https://bugzilla.novell.com/691365
https://bugzilla.novell.com/779320
https://bugzilla.novell.com/791928
https://bugzilla.novell.com/801246
https://bugzilla.novell.com/811979
https://bugzilla.novell.com/813121
https://bugzilla.novell.com/819347
https://bugzilla.novell.com/822210
https://bugzilla.novell.com/827811
https://bugzilla.novell.com/828235
https://bugzilla.novell.com/828637
https://bugzilla.novell.com/830268
https://bugzilla.novell.com/834594
https://bugzilla.novell.com/839870
http://download.novell.com/patch/finder/?keywords=662fdef831f525bc78959155f328aa67
More information about the sle-security-updates
mailing list