SUSE-SU-2015:0439-1: moderate: Security update for glibc
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Mar 5 19:04:57 MST 2015
SUSE Security Update: Security update for glibc
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0439-1
Rating: moderate
References: #904461 #906371 #915526 #916222 #917072
Cross-References: CVE-2013-7423 CVE-2014-7817 CVE-2014-9402
CVE-2015-1472
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
glibc has ben updated to fix three security issues:
* CVE-2014-7817: wordexp failed to honour WRDE_NOCMD (bsc#906371)
* CVE-2013-7423: Fixed invalid file descriptor reuse while sending DNS
query (bsc#915526)
* CVE-2015-1472: Fixed buffer overflow in wscanf (bsc#916222)
These non-security issues have been fixed:
* Remove inaccurate assembler implementations of ceill, floorl,
nearbyintl, roundl, truncl for PowerPC64 (bsc#917072)
* Don't return IPv4 addresses when looking for IPv6 addresses only
(bsc#904461)
Security Issues:
* CVE-2015-1472
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472>
* CVE-2013-7423
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423>
* CVE-2014-7817
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817>
* CVE-2014-9402
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-glibc=10357
- SUSE Linux Enterprise Server 11 SP3 for VMware:
zypper in -t patch slessp3-glibc=10357
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-glibc=10357
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-glibc=10357
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
glibc-html-2.11.3-17.82.11
glibc-info-2.11.3-17.82.11
- SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
glibc-2.11.3-17.82.11
glibc-devel-2.11.3-17.82.11
glibc-html-2.11.3-17.82.11
glibc-i18ndata-2.11.3-17.82.11
glibc-info-2.11.3-17.82.11
glibc-locale-2.11.3-17.82.11
glibc-profile-2.11.3-17.82.11
nscd-2.11.3-17.82.11
- SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64):
glibc-32bit-2.11.3-17.82.11
glibc-devel-32bit-2.11.3-17.82.11
glibc-locale-32bit-2.11.3-17.82.11
glibc-profile-32bit-2.11.3-17.82.11
- SUSE Linux Enterprise Server 11 SP3 (i586 i686 ia64 ppc64 s390x x86_64):
glibc-2.11.3-17.82.11
glibc-devel-2.11.3-17.82.11
- SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
glibc-html-2.11.3-17.82.11
glibc-i18ndata-2.11.3-17.82.11
glibc-info-2.11.3-17.82.11
glibc-locale-2.11.3-17.82.11
glibc-profile-2.11.3-17.82.11
nscd-2.11.3-17.82.11
- SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64):
glibc-32bit-2.11.3-17.82.11
glibc-devel-32bit-2.11.3-17.82.11
glibc-locale-32bit-2.11.3-17.82.11
glibc-profile-32bit-2.11.3-17.82.11
- SUSE Linux Enterprise Server 11 SP3 (ia64):
glibc-locale-x86-2.11.3-17.82.11
glibc-profile-x86-2.11.3-17.82.11
glibc-x86-2.11.3-17.82.11
- SUSE Linux Enterprise Desktop 11 SP3 (i586 i686 x86_64):
glibc-2.11.3-17.82.11
glibc-devel-2.11.3-17.82.11
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
glibc-i18ndata-2.11.3-17.82.11
glibc-locale-2.11.3-17.82.11
nscd-2.11.3-17.82.11
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
glibc-32bit-2.11.3-17.82.11
glibc-devel-32bit-2.11.3-17.82.11
glibc-locale-32bit-2.11.3-17.82.11
References:
http://support.novell.com/security/cve/CVE-2013-7423.html
http://support.novell.com/security/cve/CVE-2014-7817.html
http://support.novell.com/security/cve/CVE-2014-9402.html
http://support.novell.com/security/cve/CVE-2015-1472.html
https://bugzilla.suse.com/904461
https://bugzilla.suse.com/906371
https://bugzilla.suse.com/915526
https://bugzilla.suse.com/916222
https://bugzilla.suse.com/917072
http://download.suse.com/patch/finder/?keywords=9feb5a0e37ae9da1e66b11c4b95ba3da
More information about the sle-security-updates
mailing list