Security update for glibc

SUSE Security Update: Security update for glibc
Announcement ID: SUSE-SU-2015:0526-1
Rating: moderate
References: #864081 #905313 #906371 #909053 #910599 #915526 #915985 #916222
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Desktop 12

  • An update that solves four vulnerabilities and has four fixes is now available.

    Description:

    glibc has been updated to fix four security issues.

    These security issues were fixed:
    - CVE-2014-7817: The wordexp function in GNU C Library (aka glibc) 2.21
    did not enforce the WRDE_NOCMD flag, which allowed context-dependent
    attackers to execute arbitrary commands, as demonstrated by input
    containing "$((`...`))" (bnc#906371).
    - CVE-2015-1472: Heap buffer overflow in glibc swscanf (bnc#916222).
    - CVE-2014-9402: Denial of service in getnetbyname function (bnc#910599).
    - CVE-2013-7423: Getaddrinfo() writes DNS queries to random file
    descriptors under high load (bnc#915526).

    These non-security issues were fixed:
    - Fix infinite loop in check_pf (bsc#909053)
    - Restore warning about execution permission, it is still needed for
    noexec mounts (bsc#915985).
    - Don't touch user-controlled stdio locks in forked child (bsc#864081)
    - Don't use gcc extensions for non-gcc compilers (bsc#905313)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 12:
      zypper in -t patch SUSE-SLE-SDK-12-2015-129=1
    • SUSE Linux Enterprise Server 12:
      zypper in -t patch SUSE-SLE-SERVER-12-2015-129=1
    • SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-129=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):
      • glibc-debuginfo-2.19-20.3
      • glibc-debugsource-2.19-20.3
      • glibc-devel-static-2.19-20.3
    • SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):
      • glibc-2.19-20.3
      • glibc-debuginfo-2.19-20.3
      • glibc-debugsource-2.19-20.3
      • glibc-devel-2.19-20.3
      • glibc-devel-debuginfo-2.19-20.3
      • glibc-locale-2.19-20.3
      • glibc-locale-debuginfo-2.19-20.3
      • glibc-profile-2.19-20.3
      • nscd-2.19-20.3
      • nscd-debuginfo-2.19-20.3
    • SUSE Linux Enterprise Server 12 (s390x x86_64):
      • glibc-32bit-2.19-20.3
      • glibc-debuginfo-32bit-2.19-20.3
      • glibc-devel-32bit-2.19-20.3
      • glibc-devel-debuginfo-32bit-2.19-20.3
      • glibc-locale-32bit-2.19-20.3
      • glibc-locale-debuginfo-32bit-2.19-20.3
      • glibc-profile-32bit-2.19-20.3
    • SUSE Linux Enterprise Server 12 (noarch):
      • glibc-html-2.19-20.3
      • glibc-i18ndata-2.19-20.3
      • glibc-info-2.19-20.3
    • SUSE Linux Enterprise Desktop 12 (x86_64):
      • glibc-2.19-20.3
      • glibc-32bit-2.19-20.3
      • glibc-debuginfo-2.19-20.3
      • glibc-debuginfo-32bit-2.19-20.3
      • glibc-debugsource-2.19-20.3
      • glibc-devel-2.19-20.3
      • glibc-devel-32bit-2.19-20.3
      • glibc-devel-debuginfo-2.19-20.3
      • glibc-devel-debuginfo-32bit-2.19-20.3
      • glibc-locale-2.19-20.3
      • glibc-locale-32bit-2.19-20.3
      • glibc-locale-debuginfo-2.19-20.3
      • glibc-locale-debuginfo-32bit-2.19-20.3
      • nscd-2.19-20.3
      • nscd-debuginfo-2.19-20.3
    • SUSE Linux Enterprise Desktop 12 (noarch):
      • glibc-i18ndata-2.19-20.3

    References:

    • http://support.novell.com/security/cve/CVE-2013-7423.html
    • http://support.novell.com/security/cve/CVE-2014-7817.html
    • http://support.novell.com/security/cve/CVE-2014-9402.html
    • http://support.novell.com/security/cve/CVE-2015-1472.html
    • https://bugzilla.suse.com/864081
    • https://bugzilla.suse.com/905313
    • https://bugzilla.suse.com/906371
    • https://bugzilla.suse.com/909053
    • https://bugzilla.suse.com/910599
    • https://bugzilla.suse.com/915526
    • https://bugzilla.suse.com/915985
    • https://bugzilla.suse.com/916222