Security update for glibc
SUSE Security Update: Security update for glibc
These security issues were fixed:
- CVE-2014-7817: The wordexp function in GNU C Library (aka glibc) 2.21
did not enforce the WRDE_NOCMD flag, which allowed context-dependent
attackers to execute arbitrary commands, as demonstrated by input
containing "$((`...`))" (bnc#906371).
- CVE-2015-1472: Heap buffer overflow in glibc swscanf (bnc#916222).
- CVE-2014-9402: Denial of service in getnetbyname function (bnc#910599).
- CVE-2013-7423: Getaddrinfo() writes DNS queries to random file
descriptors under high load (bnc#915526).
These non-security issues were fixed:
- Fix infinite loop in check_pf (bsc#909053)
- Restore warning about execution permission, it is still needed for
noexec mounts (bsc#915985).
- Don't touch user-controlled stdio locks in forked child (bsc#864081)
- Don't use gcc extensions for non-gcc compilers (bsc#905313)
Announcement ID: | SUSE-SU-2015:0526-1 |
Rating: | moderate |
References: | #864081 #905313 #906371 #909053 #910599 #915526 #915985 #916222 |
Affected Products: |
An update that solves four vulnerabilities and has four fixes is now available.
Description:
glibc has been updated to fix four security issues.These security issues were fixed:
- CVE-2014-7817: The wordexp function in GNU C Library (aka glibc) 2.21
did not enforce the WRDE_NOCMD flag, which allowed context-dependent
attackers to execute arbitrary commands, as demonstrated by input
containing "$((`...`))" (bnc#906371).
- CVE-2015-1472: Heap buffer overflow in glibc swscanf (bnc#916222).
- CVE-2014-9402: Denial of service in getnetbyname function (bnc#910599).
- CVE-2013-7423: Getaddrinfo() writes DNS queries to random file
descriptors under high load (bnc#915526).
These non-security issues were fixed:
- Fix infinite loop in check_pf (bsc#909053)
- Restore warning about execution permission, it is still needed for
noexec mounts (bsc#915985).
- Don't touch user-controlled stdio locks in forked child (bsc#864081)
- Don't use gcc extensions for non-gcc compilers (bsc#905313)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-129=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-129=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-129=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
- glibc-debuginfo-2.19-20.3
- glibc-debugsource-2.19-20.3
- glibc-devel-static-2.19-20.3
- SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
- glibc-2.19-20.3
- glibc-debuginfo-2.19-20.3
- glibc-debugsource-2.19-20.3
- glibc-devel-2.19-20.3
- glibc-devel-debuginfo-2.19-20.3
- glibc-locale-2.19-20.3
- glibc-locale-debuginfo-2.19-20.3
- glibc-profile-2.19-20.3
- nscd-2.19-20.3
- nscd-debuginfo-2.19-20.3
- SUSE Linux Enterprise Server 12 (s390x x86_64):
- glibc-32bit-2.19-20.3
- glibc-debuginfo-32bit-2.19-20.3
- glibc-devel-32bit-2.19-20.3
- glibc-devel-debuginfo-32bit-2.19-20.3
- glibc-locale-32bit-2.19-20.3
- glibc-locale-debuginfo-32bit-2.19-20.3
- glibc-profile-32bit-2.19-20.3
- SUSE Linux Enterprise Server 12 (noarch):
- glibc-html-2.19-20.3
- glibc-i18ndata-2.19-20.3
- glibc-info-2.19-20.3
- SUSE Linux Enterprise Desktop 12 (x86_64):
- glibc-2.19-20.3
- glibc-32bit-2.19-20.3
- glibc-debuginfo-2.19-20.3
- glibc-debuginfo-32bit-2.19-20.3
- glibc-debugsource-2.19-20.3
- glibc-devel-2.19-20.3
- glibc-devel-32bit-2.19-20.3
- glibc-devel-debuginfo-2.19-20.3
- glibc-devel-debuginfo-32bit-2.19-20.3
- glibc-locale-2.19-20.3
- glibc-locale-32bit-2.19-20.3
- glibc-locale-debuginfo-2.19-20.3
- glibc-locale-debuginfo-32bit-2.19-20.3
- nscd-2.19-20.3
- nscd-debuginfo-2.19-20.3
- SUSE Linux Enterprise Desktop 12 (noarch):
- glibc-i18ndata-2.19-20.3
References:
- http://support.novell.com/security/cve/CVE-2013-7423.html
- http://support.novell.com/security/cve/CVE-2014-7817.html
- http://support.novell.com/security/cve/CVE-2014-9402.html
- http://support.novell.com/security/cve/CVE-2015-1472.html
- https://bugzilla.suse.com/864081
- https://bugzilla.suse.com/905313
- https://bugzilla.suse.com/906371
- https://bugzilla.suse.com/909053
- https://bugzilla.suse.com/910599
- https://bugzilla.suse.com/915526
- https://bugzilla.suse.com/915985
- https://bugzilla.suse.com/916222