Security update for glibc

SUSE Security Update: Security update for glibc
Announcement ID: SUSE-SU-2015:0167-1
Rating: moderate
References: #864081 #882600 #909053
Affected Products:
  • SUSE Linux Enterprise Server 11 SP2 LTSS

  • An update that solves two vulnerabilities and has one errata is now available.

    Description:


    glibc has been updated to fix a security issue and two bugs:

    Security issue fixed:

    * Copy filename argument in posix_spawn_file_actions_addopen
    (CVE-2014-4043)

    Bugs fixed:

    * don't touch user-controlled stdio locks in forked child (bsc#864081,
    GLIBC BZ #12847)
    * Fix infinite loop in check_pf (bsc#909053, GLIBC BZ #12926)

    Security Issues:

    * CVE-2014-6040

    * CVE-2012-6656

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP2 LTSS:
      zypper in -t patch slessp2-glibc-10220

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP2 LTSS (i586 i686 s390x x86_64):
      • glibc-2.11.3-17.45.57.6
      • glibc-devel-2.11.3-17.45.57.6
    • SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64):
      • glibc-html-2.11.3-17.45.57.6
      • glibc-i18ndata-2.11.3-17.45.57.6
      • glibc-info-2.11.3-17.45.57.6
      • glibc-locale-2.11.3-17.45.57.6
      • glibc-profile-2.11.3-17.45.57.6
      • nscd-2.11.3-17.45.57.6
    • SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64):
      • glibc-32bit-2.11.3-17.45.57.6
      • glibc-devel-32bit-2.11.3-17.45.57.6
      • glibc-locale-32bit-2.11.3-17.45.57.6
      • glibc-profile-32bit-2.11.3-17.45.57.6

    References:

    • http://support.novell.com/security/cve/CVE-2012-6656.html
    • http://support.novell.com/security/cve/CVE-2014-6040.html
    • https://bugzilla.suse.com/show_bug.cgi?id=864081
    • https://bugzilla.suse.com/show_bug.cgi?id=882600
    • https://bugzilla.suse.com/show_bug.cgi?id=909053
    • http://download.suse.com/patch/finder/?keywords=880eb49b49e66cc28d6f1daf5ce1ccae