Security update for glibc

SUSE Security Update: Security update for glibc
Announcement ID: SUSE-SU-2013:1251-1
Rating: moderate
References: #676178 #691365 #767266 #770891 #775690 #796982 #813121 #828637
Affected Products:
  • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS
  • SUSE Linux Enterprise Server 11 SP1 LTSS

  • An update that solves 6 vulnerabilities and has two fixes is now available.

    Description:


    This collective update for the GNU C library (glibc)
    provides the following fixes and enhancements:

    Security issues fixed:

    * Fix stack overflow in getaddrinfo with many results.
    (bnc#813121, CVE-2013-1914)
    * Fix a different stack overflow in getaddrinfo with
    many results. (bnc#828637)
    * Fix array overflow in floating point parser
    [bnc#775690] (CVE-2012-3480)
    * Fix strtod integer/buffer overflows [bnc#775690]
    (CVE-2012-3480)
    * Add patches for fix overflows in vfprintf. [bnc
    #770891, CVE-2012-3405, CVE-2012-3406]
    * Fix buffer overflow in glob. (bnc#691365)
    (CVE-2010-4756)
    * Flush stream in addmntent, to catch errors like
    reached file size limits. [bnc #676178, CVE-2011-1089]

    Bugs fixed:

    * Fix locking in _IO_cleanup. (bnc#796982)
    * Fix resolver when first query fails, but seconds
    succeeds. [bnc #767266]

    Security Issue references:

    * CVE-2013-1914
    >
    * CVE-2010-4756
    >
    * CVE-2012-3480
    >
    * CVE-2012-3405
    >
    * CVE-2012-3406
    >
    * CVE-2011-1089
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS:
      zypper in -t patch slessp1-glibc-8082
    • SUSE Linux Enterprise Server 11 SP1 LTSS:
      zypper in -t patch slessp1-glibc-8082

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 i686 x86_64):
    • glibc-2.11.1-0.50.1
    • glibc-devel-2.11.1-0.50.1
    • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 x86_64):
    • glibc-html-2.11.1-0.50.1
    • glibc-i18ndata-2.11.1-0.50.1
    • glibc-info-2.11.1-0.50.1
    • glibc-locale-2.11.1-0.50.1
    • glibc-profile-2.11.1-0.50.1
    • nscd-2.11.1-0.50.1
    • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (x86_64):
    • glibc-32bit-2.11.1-0.50.1
    • glibc-devel-32bit-2.11.1-0.50.1
    • glibc-locale-32bit-2.11.1-0.50.1
    • glibc-profile-32bit-2.11.1-0.50.1
    • SUSE Linux Enterprise Server 11 SP1 LTSS (i586 i686 s390x x86_64):
    • glibc-2.11.1-0.50.1
    • glibc-devel-2.11.1-0.50.1
    • SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):
    • glibc-html-2.11.1-0.50.1
    • glibc-i18ndata-2.11.1-0.50.1
    • glibc-info-2.11.1-0.50.1
    • glibc-locale-2.11.1-0.50.1
    • glibc-profile-2.11.1-0.50.1
    • nscd-2.11.1-0.50.1
    • SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64):
    • glibc-32bit-2.11.1-0.50.1
    • glibc-devel-32bit-2.11.1-0.50.1
    • glibc-locale-32bit-2.11.1-0.50.1
    • glibc-profile-32bit-2.11.1-0.50.1

    References:

    • http://support.novell.com/security/cve/CVE-2010-4756.html
    • http://support.novell.com/security/cve/CVE-2011-1089.html
    • http://support.novell.com/security/cve/CVE-2012-3405.html
    • http://support.novell.com/security/cve/CVE-2012-3406.html
    • http://support.novell.com/security/cve/CVE-2012-3480.html
    • http://support.novell.com/security/cve/CVE-2013-1914.html
    • https://bugzilla.novell.com/676178
    • https://bugzilla.novell.com/691365
    • https://bugzilla.novell.com/767266
    • https://bugzilla.novell.com/770891
    • https://bugzilla.novell.com/775690
    • https://bugzilla.novell.com/796982
    • https://bugzilla.novell.com/813121
    • https://bugzilla.novell.com/828637
    • http://download.suse.com/patch/finder/?keywords=0ed824f4616a590edd9c21331469673e