SuSE: 2014:1122-1: important: glibc
Summary
This glibc update fixes a critical privilege escalation vulnerability and the following security and non-security issues: * bnc#892073: An off-by-one error leading to a heap-based buffer overflow was found in __gconv_translit_find(). An exploit that targets the problem is publicly available. (CVE-2014-5119) * bnc#886416: Avoid redundant shift character in iconv output at block boundary. * bnc#883022: Initialize errcode in sysdeps/unix/opendir.c. * bnc#882600: Copy filename argument in posix_spawn_file_actions_addopen. (CVE-2014-4043) * bnc#864081: Take lock in pthread_cond_wait cleanup handler only when needed. * bnc#843735: Don't crash on unresolved weak symbol reference. * bnc#839870: Fix integer overflows in malloc. (CVE-2013-4332) * bnc#836746: Avoid race between {,__de}allocate_stack and __reclaim_stacks during fork. * bnc#834594: Fix readdir_r with long file...
Read the Full AdvisoryReferences
#750741 #779320 #801246 #830268 #834594 #836746
#839870 #843735 #864081 #882600 #883022 #886416
#892073
Cross- CVE-2012-4412 CVE-2013-0242 CVE-2013-4237
CVE-2013-4332 CVE-2013-4788 CVE-2014-4043
CVE-2014-5119
Affected Products:
SUSE Linux Enterprise Server 11 SP1 LTSS
https://www.suse.com/security/cve/CVE-2012-4412.html
https://www.suse.com/security/cve/CVE-2013-0242.html
https://www.suse.com/security/cve/CVE-2013-4237.html
https://www.suse.com/security/cve/CVE-2013-4332.html
https://www.suse.com/security/cve/CVE-2013-4788.html
https://www.suse.com/security/cve/CVE-2014-4043.html
https://www.suse.com/security/cve/CVE-2014-5119.html
https://bugzilla.novell.com/750741
https://bugzilla.novell.com/779320
https://bugzilla.novell.com/801246
https://bugzilla.novell.com/830268
https://bugzilla.novell.com/834594
https://bugzilla.novell.com/836746
https://bugz...
Read the Full Advisory