Security update for glibc
SUSE Security Update: Security update for glibc
This update for glibc contains the following fixes:
* Fix integer overflows in malloc (CVE-2013-4332,
bnc#839870)
* Fix buffer overflow in glob (bnc#691365)
* Fix buffer overflow in strcoll (CVE-2012-4412,
bnc#779320)
* Update mount flags in (bnc#791928)
* Fix buffer overrun in regexp matcher (CVE-2013-0242,
bnc#801246)
* Fix memory leaks in dlopen (bnc#811979)
* Fix stack overflow in getaddrinfo with many results
(CVE-2013-1914, bnc#813121)
* Fix check for XEN build in glibc_post_upgrade that
causes missing init re-exec (bnc#818628)
* Don't raise UNDERFLOW in tan/tanf for small but
normal argument (bnc#819347)
* Properly cross page boundary in SSE4.2 implementation
of strcmp (bnc#822210)
* Fix robust mutex handling after fork (bnc#827811)
* Fix missing character in IBM-943 charset (bnc#828235)
* Fix use of alloca in gaih_inet (bnc#828637)
* Initialize pointer guard also in static executables
(CVE-2013-4788, bnc#830268)
* Fix readdir_r with long file names (CVE-2013-4237,
bnc#834594).
Security Issues:
* CVE-2012-4412
>
* CVE-2013-0242
>
* CVE-2013-1914
>
* CVE-2013-4237
>
* CVE-2013-4332
>
* CVE-2013-4788
>
Announcement ID: | SUSE-SU-2013:1854-1 |
Rating: | low |
References: | #691365 #779320 #791928 #801246 #811979 #813121 #818628 #819347 #822210 #827811 #828235 #828637 #830268 #834594 #839870 |
Affected Products: |
An update that solves 6 vulnerabilities and has 9 fixes is now available.
Description:
This update for glibc contains the following fixes:
* Fix integer overflows in malloc (CVE-2013-4332,
bnc#839870)
* Fix buffer overflow in glob (bnc#691365)
* Fix buffer overflow in strcoll (CVE-2012-4412,
bnc#779320)
* Update mount flags in
* Fix buffer overrun in regexp matcher (CVE-2013-0242,
bnc#801246)
* Fix memory leaks in dlopen (bnc#811979)
* Fix stack overflow in getaddrinfo with many results
(CVE-2013-1914, bnc#813121)
* Fix check for XEN build in glibc_post_upgrade that
causes missing init re-exec (bnc#818628)
* Don't raise UNDERFLOW in tan/tanf for small but
normal argument (bnc#819347)
* Properly cross page boundary in SSE4.2 implementation
of strcmp (bnc#822210)
* Fix robust mutex handling after fork (bnc#827811)
* Fix missing character in IBM-943 charset (bnc#828235)
* Fix use of alloca in gaih_inet (bnc#828637)
* Initialize pointer guard also in static executables
(CVE-2013-4788, bnc#830268)
* Fix readdir_r with long file names (CVE-2013-4237,
bnc#834594).
Security Issues:
* CVE-2012-4412
* CVE-2013-0242
* CVE-2013-1914
* CVE-2013-4237
* CVE-2013-4332
* CVE-2013-4788
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-glibc-8335
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-glibc-8335
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-glibc-8335
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-glibc-8335
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
- glibc-html-2.11.3-17.45.49.1
- glibc-info-2.11.3-17.45.49.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 i686 x86_64):
- glibc-2.11.3-17.45.49.1
- glibc-devel-2.11.3-17.45.49.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
- glibc-html-2.11.3-17.45.49.1
- glibc-i18ndata-2.11.3-17.45.49.1
- glibc-info-2.11.3-17.45.49.1
- glibc-locale-2.11.3-17.45.49.1
- glibc-profile-2.11.3-17.45.49.1
- nscd-2.11.3-17.45.49.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):
- glibc-32bit-2.11.3-17.45.49.1
- glibc-devel-32bit-2.11.3-17.45.49.1
- glibc-locale-32bit-2.11.3-17.45.49.1
- glibc-profile-32bit-2.11.3-17.45.49.1
- SUSE Linux Enterprise Server 11 SP2 (i586 i686 ia64 ppc64 s390x x86_64):
- glibc-2.11.3-17.45.49.1
- glibc-devel-2.11.3-17.45.49.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
- glibc-html-2.11.3-17.45.49.1
- glibc-i18ndata-2.11.3-17.45.49.1
- glibc-info-2.11.3-17.45.49.1
- glibc-locale-2.11.3-17.45.49.1
- glibc-profile-2.11.3-17.45.49.1
- nscd-2.11.3-17.45.49.1
- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):
- glibc-32bit-2.11.3-17.45.49.1
- glibc-devel-32bit-2.11.3-17.45.49.1
- glibc-locale-32bit-2.11.3-17.45.49.1
- glibc-profile-32bit-2.11.3-17.45.49.1
- SUSE Linux Enterprise Server 11 SP2 (ia64):
- glibc-locale-x86-2.11.3-17.45.49.1
- glibc-profile-x86-2.11.3-17.45.49.1
- glibc-x86-2.11.3-17.45.49.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 i686 x86_64):
- glibc-2.11.3-17.45.49.1
- glibc-devel-2.11.3-17.45.49.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
- glibc-i18ndata-2.11.3-17.45.49.1
- glibc-locale-2.11.3-17.45.49.1
- nscd-2.11.3-17.45.49.1
- SUSE Linux Enterprise Desktop 11 SP2 (x86_64):
- glibc-32bit-2.11.3-17.45.49.1
- glibc-devel-32bit-2.11.3-17.45.49.1
- glibc-locale-32bit-2.11.3-17.45.49.1
References:
- http://support.novell.com/security/cve/CVE-2012-4412.html
- http://support.novell.com/security/cve/CVE-2013-0242.html
- http://support.novell.com/security/cve/CVE-2013-1914.html
- http://support.novell.com/security/cve/CVE-2013-4237.html
- http://support.novell.com/security/cve/CVE-2013-4332.html
- http://support.novell.com/security/cve/CVE-2013-4788.html
- https://bugzilla.novell.com/691365
- https://bugzilla.novell.com/779320
- https://bugzilla.novell.com/791928
- https://bugzilla.novell.com/801246
- https://bugzilla.novell.com/811979
- https://bugzilla.novell.com/813121
- https://bugzilla.novell.com/818628
- https://bugzilla.novell.com/819347
- https://bugzilla.novell.com/822210
- https://bugzilla.novell.com/827811
- https://bugzilla.novell.com/828235
- https://bugzilla.novell.com/828637
- https://bugzilla.novell.com/830268
- https://bugzilla.novell.com/834594
- https://bugzilla.novell.com/839870
- http://download.suse.com/patch/finder/?keywords=b8fd7817886a68f6a48cbaa69b2fcb17