SUSE-RU-2012:0570-1: Recommended update for glibc

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon Apr 30 13:08:17 MDT 2012


   SUSE Recommended Update: Recommended update for glibc
______________________________________________________________________________

Announcement ID:    SUSE-RU-2012:0570-1
Rating:             low
References:         #741345 #743689 #746824 #747768 #747932 #748032 
                    
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP1
                    SUSE Linux Enterprise Server 11 SP1 for VMware
                    SUSE Linux Enterprise Server 11 SP1
                    SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________

   An update that solves one vulnerability and has 5 fixes is
   now available.

Description:


   This update for glibc includes the following changes:

   * Fix sed not parsing correctly double-byte Japanese
   characters.
   * Fix format string protection bypass via "nargs"
   integer overflow.
   * Fix an assertion error in DNS query.
   * Fix a vi_VN.tcvn locale problem.
   * Fix crash in libpthread on heavy thread usage.
   * Fix IPv6-localhost cannot be resolved as an IPv4
   address.

   In addition, the following minor security fix is also
   included:

   * Fix an integer overflow flaw in the format string
   protection mechanism offered by FORTIFY_SOURCE.
   (CVE-2012-0864
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0864
   > )


Patch Instructions:

   To install this SUSE Recommended Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP1:

      zypper in -t patch sdksp1-glibc-6134

   - SUSE Linux Enterprise Server 11 SP1 for VMware:

      zypper in -t patch slessp1-glibc-6134

   - SUSE Linux Enterprise Server 11 SP1:

      zypper in -t patch slessp1-glibc-6134

   - SUSE Linux Enterprise Desktop 11 SP1:

      zypper in -t patch sledsp1-glibc-6134

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64):

      glibc-html-2.11.1-0.38.1
      glibc-info-2.11.1-0.38.1

   - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 i686 x86_64):

      glibc-2.11.1-0.38.1
      glibc-devel-2.11.1-0.38.1

   - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):

      glibc-html-2.11.1-0.38.1
      glibc-i18ndata-2.11.1-0.38.1
      glibc-info-2.11.1-0.38.1
      glibc-locale-2.11.1-0.38.1
      glibc-profile-2.11.1-0.38.1
      nscd-2.11.1-0.38.1

   - SUSE Linux Enterprise Server 11 SP1 for VMware (x86_64):

      glibc-32bit-2.11.1-0.38.1
      glibc-devel-32bit-2.11.1-0.38.1
      glibc-locale-32bit-2.11.1-0.38.1
      glibc-profile-32bit-2.11.1-0.38.1

   - SUSE Linux Enterprise Server 11 SP1 (i586 i686 ia64 ppc64 s390x x86_64):

      glibc-2.11.1-0.38.1
      glibc-devel-2.11.1-0.38.1

   - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64):

      glibc-html-2.11.1-0.38.1
      glibc-i18ndata-2.11.1-0.38.1
      glibc-info-2.11.1-0.38.1
      glibc-locale-2.11.1-0.38.1
      glibc-profile-2.11.1-0.38.1
      nscd-2.11.1-0.38.1

   - SUSE Linux Enterprise Server 11 SP1 (ppc64 s390x x86_64):

      glibc-32bit-2.11.1-0.38.1
      glibc-devel-32bit-2.11.1-0.38.1
      glibc-locale-32bit-2.11.1-0.38.1
      glibc-profile-32bit-2.11.1-0.38.1

   - SUSE Linux Enterprise Server 11 SP1 (ia64):

      glibc-locale-x86-2.11.1-0.38.1
      glibc-profile-x86-2.11.1-0.38.1
      glibc-x86-2.11.1-0.38.1

   - SUSE Linux Enterprise Desktop 11 SP1 (i586 i686 x86_64):

      glibc-2.11.1-0.38.1
      glibc-devel-2.11.1-0.38.1

   - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64):

      glibc-i18ndata-2.11.1-0.38.1
      glibc-locale-2.11.1-0.38.1
      nscd-2.11.1-0.38.1

   - SUSE Linux Enterprise Desktop 11 SP1 (x86_64):

      glibc-32bit-2.11.1-0.38.1
      glibc-devel-32bit-2.11.1-0.38.1
      glibc-locale-32bit-2.11.1-0.38.1


References:

   http://support.novell.com/security/cve/CVE-2012-0864.html
   https://bugzilla.novell.com/741345
   https://bugzilla.novell.com/743689
   https://bugzilla.novell.com/746824
   https://bugzilla.novell.com/747768
   https://bugzilla.novell.com/747932
   https://bugzilla.novell.com/748032
   http://download.novell.com/patch/finder/?keywords=3fba78b3257d11130ddb00b6e276d0e0



More information about the sle-updates mailing list