Mailinglist Archive: opensuse-updates (118 mails)

< Previous Next >
openSUSE-SU-2016:2443-1: moderate: Security update for glibc
openSUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:2443-1
Rating: moderate
References: #994359 #994576
Cross-References: CVE-2016-6323
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:


This update for glibc fixes the following issues:

Security issues fixed:
- arm: mark __startcontext as .cantunwind (CVE-2016-6323, boo#994359, BZ
#20435)

Bugs fixed:
- aarch64: Merge __local_multiple_threads offset with memory reference
- Fix memory leak in regexp compiler (BZ #17069)
- Provide correct buffer length to netgroup queries in nscd (BZ #16695)
- Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (BZ #16878)
- aarch64: End frame record chain correctly (BZ #17555)
- _IO_wstr_overflow integer overflow (BZ #17269)
- Fix nscd lookup when netgroup has wildcards (BZ #16758, BZ #16759)
- Avoid overlapping addresses to stpcpy calls in nscd (BZ #16760)
- resolv: Always set *resplen2 out parameter in send_dg (boo#994576, BZ
#19791)
- Fix memory handling in strxfrm_l (BZ #16009)
- Harden tls_dtor_list with pointer mangling (BZ #19018)
- open and openat ignore 'mode' with O_TMPFILE in flags (BZ #17523)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2016-1149=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 i686 x86_64):

glibc-2.19-16.28.1
glibc-debuginfo-2.19-16.28.1
glibc-debugsource-2.19-16.28.1
glibc-devel-2.19-16.28.1
glibc-devel-debuginfo-2.19-16.28.1
glibc-devel-static-2.19-16.28.1
glibc-locale-2.19-16.28.1
glibc-locale-debuginfo-2.19-16.28.1
glibc-profile-2.19-16.28.1

- openSUSE 13.2 (i586 x86_64):

glibc-extra-2.19-16.28.1
glibc-extra-debuginfo-2.19-16.28.1
glibc-utils-2.19-16.28.1
glibc-utils-debuginfo-2.19-16.28.1
glibc-utils-debugsource-2.19-16.28.1
nscd-2.19-16.28.1
nscd-debuginfo-2.19-16.28.1

- openSUSE 13.2 (noarch):

glibc-html-2.19-16.28.1
glibc-i18ndata-2.19-16.28.1
glibc-info-2.19-16.28.1

- openSUSE 13.2 (x86_64):

glibc-32bit-2.19-16.28.1
glibc-debuginfo-32bit-2.19-16.28.1
glibc-devel-32bit-2.19-16.28.1
glibc-devel-debuginfo-32bit-2.19-16.28.1
glibc-devel-static-32bit-2.19-16.28.1
glibc-locale-32bit-2.19-16.28.1
glibc-locale-debuginfo-32bit-2.19-16.28.1
glibc-profile-32bit-2.19-16.28.1
glibc-utils-32bit-2.19-16.28.1
glibc-utils-debuginfo-32bit-2.19-16.28.1

- openSUSE 13.2 (i586):

glibc-obsolete-2.19-16.28.1
glibc-obsolete-debuginfo-2.19-16.28.1


References:

https://www.suse.com/security/cve/CVE-2016-6323.html
https://bugzilla.suse.com/994359
https://bugzilla.suse.com/994576


< Previous Next >
This Thread
  • No further messages