SuSE 11.3 Security Update : glibc (SAT Patch Number 8337)

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This update for glibc contains the following fixes :

- Fix integer overflows in malloc. (CVE-2013-4332,

- Fix buffer overflow in glob. (bnc#691365)

- Fix buffer overflow in strcoll. (CVE-2012-4412,

- Update mount flags in <sys/mount.h>. (bnc#791928)

- Fix buffer overrun in regexp matcher. (CVE-2013-0242,

- Fix memory leaks in dlopen. (bnc#811979)

- Fix stack overflow in getaddrinfo with many results.
(CVE-2013-1914, bnc#813121)

- Don't raise UNDERFLOW in tan/tanf for small but normal
argument. (bnc#819347)

- Properly cross page boundary in SSE4.2 implementation of
strcmp. (bnc#822210)

- Fix robust mutex handling after fork. (bnc#827811)

- Fix missing character in IBM-943 charset. (bnc#828235)

- Fix use of alloca in gaih_inet. (bnc#828637)

- Initialize pointer guard also in static executables.
(CVE-2013-4788, bnc#830268)

- Fix readdir_r with long file names. (CVE-2013-4237,

See also :

Solution :

Apply SAT patch number 8337.

Risk factor :

High / CVSS Base Score : 7.5

Family: SuSE Local Security Checks

Nessus Plugin ID: 71308 ()

Bugtraq ID:

CVE ID: CVE-2012-4412

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now