openSUSE Security Update: glibc ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:0162-1 Rating: critical References: #913646 Cross-References: 2015-0235 Affected Products: openSUSE Evergreen 11.4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: CVE-2015-0235: A vulnerability was found and fixed in the GNU C Library, specifically in the function gethostbyname(), that could lead to a local or remote buffer overflow. (bsc#913646) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Evergreen 11.4: zypper in -t patch 2015-6 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Evergreen 11.4 (i586 x86_64): glibc-2.11.3-12.62.1 glibc-debuginfo-2.11.3-12.62.1 glibc-debugsource-2.11.3-12.62.1 glibc-devel-2.11.3-12.62.1 glibc-devel-debuginfo-2.11.3-12.62.1 glibc-html-2.11.3-12.62.1 glibc-i18ndata-2.11.3-12.62.1 glibc-info-2.11.3-12.62.1 glibc-locale-2.11.3-12.62.1 glibc-locale-debuginfo-2.11.3-12.62.1 glibc-obsolete-2.11.3-12.62.1 glibc-profile-2.11.3-12.62.1 nscd-2.11.3-12.62.1 nscd-debuginfo-2.11.3-12.62.1 - openSUSE Evergreen 11.4 (i586): glibc-obsolete-debuginfo-2.11.3-12.62.1 References: http://support.novell.com/security/cve/2015-0235.html https://bugzilla.suse.com/show_bug.cgi?id=913646 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org