openSUSE-SU-2016:2443-1: moderate: Security update for glibc
openSUSE Security Update: Security update for glibc ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:2443-1 Rating: moderate References: #994359 #994576 Cross-References: CVE-2016-6323 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for glibc fixes the following issues: Security issues fixed: - arm: mark __startcontext as .cantunwind (CVE-2016-6323, boo#994359, BZ #20435) Bugs fixed: - aarch64: Merge __local_multiple_threads offset with memory reference - Fix memory leak in regexp compiler (BZ #17069) - Provide correct buffer length to netgroup queries in nscd (BZ #16695) - Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (BZ #16878) - aarch64: End frame record chain correctly (BZ #17555) - _IO_wstr_overflow integer overflow (BZ #17269) - Fix nscd lookup when netgroup has wildcards (BZ #16758, BZ #16759) - Avoid overlapping addresses to stpcpy calls in nscd (BZ #16760) - resolv: Always set *resplen2 out parameter in send_dg (boo#994576, BZ #19791) - Fix memory handling in strxfrm_l (BZ #16009) - Harden tls_dtor_list with pointer mangling (BZ #19018) - open and openat ignore 'mode' with O_TMPFILE in flags (BZ #17523) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2016-1149=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 i686 x86_64): glibc-2.19-16.28.1 glibc-debuginfo-2.19-16.28.1 glibc-debugsource-2.19-16.28.1 glibc-devel-2.19-16.28.1 glibc-devel-debuginfo-2.19-16.28.1 glibc-devel-static-2.19-16.28.1 glibc-locale-2.19-16.28.1 glibc-locale-debuginfo-2.19-16.28.1 glibc-profile-2.19-16.28.1 - openSUSE 13.2 (i586 x86_64): glibc-extra-2.19-16.28.1 glibc-extra-debuginfo-2.19-16.28.1 glibc-utils-2.19-16.28.1 glibc-utils-debuginfo-2.19-16.28.1 glibc-utils-debugsource-2.19-16.28.1 nscd-2.19-16.28.1 nscd-debuginfo-2.19-16.28.1 - openSUSE 13.2 (noarch): glibc-html-2.19-16.28.1 glibc-i18ndata-2.19-16.28.1 glibc-info-2.19-16.28.1 - openSUSE 13.2 (x86_64): glibc-32bit-2.19-16.28.1 glibc-debuginfo-32bit-2.19-16.28.1 glibc-devel-32bit-2.19-16.28.1 glibc-devel-debuginfo-32bit-2.19-16.28.1 glibc-devel-static-32bit-2.19-16.28.1 glibc-locale-32bit-2.19-16.28.1 glibc-locale-debuginfo-32bit-2.19-16.28.1 glibc-profile-32bit-2.19-16.28.1 glibc-utils-32bit-2.19-16.28.1 glibc-utils-debuginfo-32bit-2.19-16.28.1 - openSUSE 13.2 (i586): glibc-obsolete-2.19-16.28.1 glibc-obsolete-debuginfo-2.19-16.28.1 References: https://www.suse.com/security/cve/CVE-2016-6323.html https://bugzilla.suse.com/994359 https://bugzilla.suse.com/994576
participants (1)
-
opensuse-security@opensuse.org