Security update for glibc
SUSE Security Update: Security update for glibc
This collective update for the GNU C library (glibc)
provides the following fixes and enhancements:
Security issues fixed:
* Fix stack overflow in getaddrinfo with many results.
(bnc#813121, CVE-2013-1914)
* Fix a different stack overflow in getaddrinfo with
many results. (bnc#828637)
* Fix array overflow in floating point parser
[bnc#775690] (CVE-2012-3480)
* Fix strtod integer/buffer overflows [bnc#775690]
(CVE-2012-3480)
* Add patches for fix overflows in vfprintf. [bnc
#770891, CVE-2012-3405, CVE-2012-3406]
* Fix buffer overflow in glob. (bnc#691365)
(CVE-2010-4756)
* Flush stream in addmntent, to catch errors like
reached file size limits. [bnc #676178, CVE-2011-1089]
Bugs fixed:
* Fix locking in _IO_cleanup. (bnc#796982)
* Fix resolver when first query fails, but seconds
succeeds. [bnc #767266]
Security Issue references:
* CVE-2013-1914
>
* CVE-2010-4756
>
* CVE-2012-3480
>
* CVE-2012-3405
>
* CVE-2012-3406
>
* CVE-2011-1089
>
Announcement ID: | SUSE-SU-2013:1251-1 |
Rating: | moderate |
References: | #676178 #691365 #767266 #770891 #775690 #796982 #813121 #828637 |
Affected Products: |
An update that solves 6 vulnerabilities and has two fixes is now available.
Description:
This collective update for the GNU C library (glibc)
provides the following fixes and enhancements:
Security issues fixed:
* Fix stack overflow in getaddrinfo with many results.
(bnc#813121, CVE-2013-1914)
* Fix a different stack overflow in getaddrinfo with
many results. (bnc#828637)
* Fix array overflow in floating point parser
[bnc#775690] (CVE-2012-3480)
* Fix strtod integer/buffer overflows [bnc#775690]
(CVE-2012-3480)
* Add patches for fix overflows in vfprintf. [bnc
#770891, CVE-2012-3405, CVE-2012-3406]
* Fix buffer overflow in glob. (bnc#691365)
(CVE-2010-4756)
* Flush stream in addmntent, to catch errors like
reached file size limits. [bnc #676178, CVE-2011-1089]
Bugs fixed:
* Fix locking in _IO_cleanup. (bnc#796982)
* Fix resolver when first query fails, but seconds
succeeds. [bnc #767266]
Security Issue references:
* CVE-2013-1914
* CVE-2010-4756
* CVE-2012-3480
* CVE-2012-3405
* CVE-2012-3406
* CVE-2011-1089
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP1 for VMware LTSS:
zypper in -t patch slessp1-glibc-8082
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-glibc-8082
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 i686 x86_64):
- glibc-2.11.1-0.50.1
- glibc-devel-2.11.1-0.50.1
- SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 x86_64):
- glibc-html-2.11.1-0.50.1
- glibc-i18ndata-2.11.1-0.50.1
- glibc-info-2.11.1-0.50.1
- glibc-locale-2.11.1-0.50.1
- glibc-profile-2.11.1-0.50.1
- nscd-2.11.1-0.50.1
- SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (x86_64):
- glibc-32bit-2.11.1-0.50.1
- glibc-devel-32bit-2.11.1-0.50.1
- glibc-locale-32bit-2.11.1-0.50.1
- glibc-profile-32bit-2.11.1-0.50.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 i686 s390x x86_64):
- glibc-2.11.1-0.50.1
- glibc-devel-2.11.1-0.50.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):
- glibc-html-2.11.1-0.50.1
- glibc-i18ndata-2.11.1-0.50.1
- glibc-info-2.11.1-0.50.1
- glibc-locale-2.11.1-0.50.1
- glibc-profile-2.11.1-0.50.1
- nscd-2.11.1-0.50.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64):
- glibc-32bit-2.11.1-0.50.1
- glibc-devel-32bit-2.11.1-0.50.1
- glibc-locale-32bit-2.11.1-0.50.1
- glibc-profile-32bit-2.11.1-0.50.1
References:
- http://support.novell.com/security/cve/CVE-2010-4756.html
- http://support.novell.com/security/cve/CVE-2011-1089.html
- http://support.novell.com/security/cve/CVE-2012-3405.html
- http://support.novell.com/security/cve/CVE-2012-3406.html
- http://support.novell.com/security/cve/CVE-2012-3480.html
- http://support.novell.com/security/cve/CVE-2013-1914.html
- https://bugzilla.novell.com/676178
- https://bugzilla.novell.com/691365
- https://bugzilla.novell.com/767266
- https://bugzilla.novell.com/770891
- https://bugzilla.novell.com/775690
- https://bugzilla.novell.com/796982
- https://bugzilla.novell.com/813121
- https://bugzilla.novell.com/828637
- http://download.suse.com/patch/finder/?keywords=0ed824f4616a590edd9c21331469673e