Security update for glibc
SUSE Security Update: Security update for glibc
glibc has been updated to fix four security issues:
* CVE-2014-0475: Directory traversal in locale environment handling
(bnc#887022)
* CVE-2014-7817: wordexp failed to honour WRDE_NOCMD (bsc#906371)
* CVE-2014-9402: Avoid infinite loop in nss_dns getnetbyname
(bsc#910599)
* CVE-2015-1472: Fixed buffer overflow in wscanf (bsc#916222)
This non-security issue has been fixed:
* Fix missing zero termination (bnc#918233)
Security Issues:
* CVE-2015-1472
* CVE-2013-7423
* CVE-2014-7817
* CVE-2014-9402
Announcement ID: | SUSE-SU-2015:0550-1 |
Rating: | moderate |
References: | #887022 #906371 #910599 #916222 #918233 |
Affected Products: |
An update that solves four vulnerabilities and has one errata is now available.
Description:
glibc has been updated to fix four security issues:
* CVE-2014-0475: Directory traversal in locale environment handling
(bnc#887022)
* CVE-2014-7817: wordexp failed to honour WRDE_NOCMD (bsc#906371)
* CVE-2014-9402: Avoid infinite loop in nss_dns getnetbyname
(bsc#910599)
* CVE-2015-1472: Fixed buffer overflow in wscanf (bsc#916222)
This non-security issue has been fixed:
* Fix missing zero termination (bnc#918233)
Security Issues:
* CVE-2015-1472
* CVE-2013-7423
* CVE-2014-7817
* CVE-2014-9402
Package List:
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 i686 s390x x86_64):
- glibc-2.4-31.117.1
- glibc-devel-2.4-31.117.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):
- glibc-html-2.4-31.117.1
- glibc-i18ndata-2.4-31.117.1
- glibc-info-2.4-31.117.1
- glibc-locale-2.4-31.117.1
- glibc-profile-2.4-31.117.1
- nscd-2.4-31.117.1
- SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):
- glibc-32bit-2.4-31.117.1
- glibc-devel-32bit-2.4-31.117.1
- glibc-locale-32bit-2.4-31.117.1
- glibc-profile-32bit-2.4-31.117.1
References:
- http://support.novell.com/security/cve/CVE-2013-7423.html
- http://support.novell.com/security/cve/CVE-2014-7817.html
- http://support.novell.com/security/cve/CVE-2014-9402.html
- http://support.novell.com/security/cve/CVE-2015-1472.html
- https://bugzilla.suse.com/887022
- https://bugzilla.suse.com/906371
- https://bugzilla.suse.com/910599
- https://bugzilla.suse.com/916222
- https://bugzilla.suse.com/918233
- http://download.suse.com/patch/finder/?keywords=ddad3e23b15c5919bf5e29a0fcedc637