Security update for glibc
Announcement ID: | SUSE-SU-2018:0565-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for glibc fixes the following issues:
Security issues:
- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area in realpath (bsc#1074293)
Also a non security issue was fixed:
- Do not fail if one of the two responses to AF_UNSPEC fails (bsc#978209)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-glibc-13494=1
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-glibc-13494=1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3
zypper in -t patch slessp3-glibc-13494=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-glibc-13494=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-glibc-13494=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (nosrc i686 i586)
- glibc-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Point of Service 11 SP3 (i686 i586)
- glibc-devel-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- glibc-locale-2.11.3-17.110.6.2
- glibc-info-2.11.3-17.110.6.2
- glibc-i18ndata-2.11.3-17.110.6.2
- nscd-2.11.3-17.110.6.2
- glibc-profile-2.11.3-17.110.6.2
- glibc-html-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (x86_64 i586)
- glibc-info-2.11.3-17.110.6.2
- glibc-html-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (s390x x86_64 i586 i686 nosrc)
- glibc-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (x86_64 s390x i686 i586)
- glibc-devel-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (s390x x86_64 i586)
- glibc-locale-2.11.3-17.110.6.2
- glibc-info-2.11.3-17.110.6.2
- glibc-i18ndata-2.11.3-17.110.6.2
- nscd-2.11.3-17.110.6.2
- glibc-profile-2.11.3-17.110.6.2
- glibc-html-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (s390x x86_64)
- glibc-32bit-2.11.3-17.110.6.2
- glibc-locale-32bit-2.11.3-17.110.6.2
- glibc-profile-32bit-2.11.3-17.110.6.2
- glibc-devel-32bit-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64 i686 nosrc)
- glibc-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64 i686)
- glibc-devel-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- glibc-locale-2.11.3-17.110.6.2
- glibc-info-2.11.3-17.110.6.2
- glibc-i18ndata-2.11.3-17.110.6.2
- nscd-2.11.3-17.110.6.2
- glibc-profile-2.11.3-17.110.6.2
- glibc-html-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP4 (ia64)
- glibc-profile-x86-2.11.3-17.110.6.2
- glibc-locale-x86-2.11.3-17.110.6.2
- glibc-x86-2.11.3-17.110.6.2
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64)
- glibc-32bit-2.11.3-17.110.6.2
- glibc-locale-32bit-2.11.3-17.110.6.2
- glibc-profile-32bit-2.11.3-17.110.6.2
- glibc-devel-32bit-2.11.3-17.110.6.2
-
SLES for SAP Applications 11-SP4 (ppc64 nosrc x86_64)
- glibc-2.11.3-17.110.6.2
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- glibc-32bit-2.11.3-17.110.6.2
- glibc-locale-2.11.3-17.110.6.2
- glibc-profile-32bit-2.11.3-17.110.6.2
- glibc-info-2.11.3-17.110.6.2
- glibc-i18ndata-2.11.3-17.110.6.2
- glibc-locale-32bit-2.11.3-17.110.6.2
- nscd-2.11.3-17.110.6.2
- glibc-profile-2.11.3-17.110.6.2
- glibc-devel-32bit-2.11.3-17.110.6.2
- glibc-html-2.11.3-17.110.6.2
- glibc-devel-2.11.3-17.110.6.2
References:
- https://www.suse.com/security/cve/CVE-2017-12132.html
- https://www.suse.com/security/cve/CVE-2017-8804.html
- https://www.suse.com/security/cve/CVE-2018-1000001.html
- https://www.suse.com/security/cve/CVE-2018-6485.html
- https://www.suse.com/security/cve/CVE-2018-6551.html
- https://bugzilla.suse.com/show_bug.cgi?id=1037930
- https://bugzilla.suse.com/show_bug.cgi?id=1051791
- https://bugzilla.suse.com/show_bug.cgi?id=1074293
- https://bugzilla.suse.com/show_bug.cgi?id=1079036
- https://bugzilla.suse.com/show_bug.cgi?id=978209