Security update for glibc

SUSE Security Update: Security update for glibc
Announcement ID: SUSE-SU-2013:1854-1
Rating: low
References: #691365 #779320 #791928 #801246 #811979 #813121 #818628 #819347 #822210 #827811 #828235 #828637 #830268 #834594 #839870
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP2
  • SUSE Linux Enterprise Server 11 SP2 for VMware
  • SUSE Linux Enterprise Server 11 SP2
  • SUSE Linux Enterprise Desktop 11 SP2

  • An update that solves 6 vulnerabilities and has 9 fixes is now available.

    Description:


    This update for glibc contains the following fixes:

    * Fix integer overflows in malloc (CVE-2013-4332,
    bnc#839870)
    * Fix buffer overflow in glob (bnc#691365)
    * Fix buffer overflow in strcoll (CVE-2012-4412,
    bnc#779320)
    * Update mount flags in (bnc#791928)
    * Fix buffer overrun in regexp matcher (CVE-2013-0242,
    bnc#801246)
    * Fix memory leaks in dlopen (bnc#811979)
    * Fix stack overflow in getaddrinfo with many results
    (CVE-2013-1914, bnc#813121)
    * Fix check for XEN build in glibc_post_upgrade that
    causes missing init re-exec (bnc#818628)
    * Don't raise UNDERFLOW in tan/tanf for small but
    normal argument (bnc#819347)
    * Properly cross page boundary in SSE4.2 implementation
    of strcmp (bnc#822210)
    * Fix robust mutex handling after fork (bnc#827811)
    * Fix missing character in IBM-943 charset (bnc#828235)
    * Fix use of alloca in gaih_inet (bnc#828637)
    * Initialize pointer guard also in static executables
    (CVE-2013-4788, bnc#830268)
    * Fix readdir_r with long file names (CVE-2013-4237,
    bnc#834594).

    Security Issues:

    * CVE-2012-4412
    >
    * CVE-2013-0242
    >
    * CVE-2013-1914
    >
    * CVE-2013-4237
    >
    * CVE-2013-4332
    >
    * CVE-2013-4788
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp2-glibc-8335
    • SUSE Linux Enterprise Server 11 SP2 for VMware:
      zypper in -t patch slessp2-glibc-8335
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp2-glibc-8335
    • SUSE Linux Enterprise Desktop 11 SP2:
      zypper in -t patch sledsp2-glibc-8335

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
    • glibc-html-2.11.3-17.45.49.1
    • glibc-info-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Server 11 SP2 for VMware (i586 i686 x86_64):
    • glibc-2.11.3-17.45.49.1
    • glibc-devel-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
    • glibc-html-2.11.3-17.45.49.1
    • glibc-i18ndata-2.11.3-17.45.49.1
    • glibc-info-2.11.3-17.45.49.1
    • glibc-locale-2.11.3-17.45.49.1
    • glibc-profile-2.11.3-17.45.49.1
    • nscd-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):
    • glibc-32bit-2.11.3-17.45.49.1
    • glibc-devel-32bit-2.11.3-17.45.49.1
    • glibc-locale-32bit-2.11.3-17.45.49.1
    • glibc-profile-32bit-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 i686 ia64 ppc64 s390x x86_64):
    • glibc-2.11.3-17.45.49.1
    • glibc-devel-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • glibc-html-2.11.3-17.45.49.1
    • glibc-i18ndata-2.11.3-17.45.49.1
    • glibc-info-2.11.3-17.45.49.1
    • glibc-locale-2.11.3-17.45.49.1
    • glibc-profile-2.11.3-17.45.49.1
    • nscd-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):
    • glibc-32bit-2.11.3-17.45.49.1
    • glibc-devel-32bit-2.11.3-17.45.49.1
    • glibc-locale-32bit-2.11.3-17.45.49.1
    • glibc-profile-32bit-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Server 11 SP2 (ia64):
    • glibc-locale-x86-2.11.3-17.45.49.1
    • glibc-profile-x86-2.11.3-17.45.49.1
    • glibc-x86-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Desktop 11 SP2 (i586 i686 x86_64):
    • glibc-2.11.3-17.45.49.1
    • glibc-devel-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
    • glibc-i18ndata-2.11.3-17.45.49.1
    • glibc-locale-2.11.3-17.45.49.1
    • nscd-2.11.3-17.45.49.1
    • SUSE Linux Enterprise Desktop 11 SP2 (x86_64):
    • glibc-32bit-2.11.3-17.45.49.1
    • glibc-devel-32bit-2.11.3-17.45.49.1
    • glibc-locale-32bit-2.11.3-17.45.49.1

    References:

    • http://support.novell.com/security/cve/CVE-2012-4412.html
    • http://support.novell.com/security/cve/CVE-2013-0242.html
    • http://support.novell.com/security/cve/CVE-2013-1914.html
    • http://support.novell.com/security/cve/CVE-2013-4237.html
    • http://support.novell.com/security/cve/CVE-2013-4332.html
    • http://support.novell.com/security/cve/CVE-2013-4788.html
    • https://bugzilla.novell.com/691365
    • https://bugzilla.novell.com/779320
    • https://bugzilla.novell.com/791928
    • https://bugzilla.novell.com/801246
    • https://bugzilla.novell.com/811979
    • https://bugzilla.novell.com/813121
    • https://bugzilla.novell.com/818628
    • https://bugzilla.novell.com/819347
    • https://bugzilla.novell.com/822210
    • https://bugzilla.novell.com/827811
    • https://bugzilla.novell.com/828235
    • https://bugzilla.novell.com/828637
    • https://bugzilla.novell.com/830268
    • https://bugzilla.novell.com/834594
    • https://bugzilla.novell.com/839870
    • http://download.suse.com/patch/finder/?keywords=b8fd7817886a68f6a48cbaa69b2fcb17