openSUSE Security Update : glibc (openSUSE-SU-2013:1510-1)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update fixes the following issues in glibc :

- CVE-2012-4412: glibc: buffer overflow in strcoll

- CVE-2013-0242: glibc: DoS due to a buffer overrun in
regexp matcher by processing multibyte characters

- CVE-2013-1914: glibc: stack overflow in getaddrinfo()

- CVE-2013-2207: glibc: pt_chown tricked into granting
access to another users pseudo-terminal

- CVE-2013-4237: glibc: Buffer overwrite - NAME_MAX not
enforced by readdir_r()

- bnc#805054: man 1 locale mentions non-existent file

- bnc#813306: glibc 2.17 fprintf(stderr, ...) triggers
write of undefined values if stderr is closed

- bnc#819383: pldd a process multiple times can freeze the

- bnc#819524: nscd segfault

- bnc#824046: glibc: blacklist code in bindresvport
doesn't release lock, results in double-lock

- bnc#839870: glibc: three integer overflows in memory

- ARM: Support loading unmarked objects from cache

See also :

Solution :

Update the affected glibc packages.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false

Family: SuSE Local Security Checks

Nessus Plugin ID: 75154 ()

Bugtraq ID:

CVE ID: CVE-2012-4412

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now