openSUSE Security Update : glibc (openSUSE-2016-233)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for glibc fixes the following issues :

- errorcheck-mutex-no-elision.patch: Don't do lock elision
on an error checking mutex (boo#956716, BZ #17514)

- reinitialize-dl_load_write_lock.patch: Reinitialize
dl_load_write_lock on fork (boo#958315, BZ #19282)

- send-dg-buffer-overflow.patch: Fix getaddrinfo
stack-based buffer overflow (CVE-2015-7547, boo#961721,
BZ #18665)

- strftime-range-check.patch: Add range check on time
fields (CVE-2015-8776, boo#962736, BZ #18985)

- hcreate-overflow-check.patch: Handle overflow in hcreate
(CVE-2015-8778, boo#962737, BZ #18240)

- refactor-nan-parsing.patch: Refactor strtod parsing of
NaN payloads (CVE-2014-9761, boo#962738, BZ #16962)

- catopen-unbound-alloca.patch: Fix unbound alloca in
catopen (CVE-2015-8779, boo#962739, BZ #17905)

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=956716
https://bugzilla.opensuse.org/show_bug.cgi?id=958315
https://bugzilla.opensuse.org/show_bug.cgi?id=961721
https://bugzilla.opensuse.org/show_bug.cgi?id=962736
https://bugzilla.opensuse.org/show_bug.cgi?id=962737
https://bugzilla.opensuse.org/show_bug.cgi?id=962738
https://bugzilla.opensuse.org/show_bug.cgi?id=962739
https://www.tenable.com/security/research/tra-2017-08

Solution :

Update the affected glibc packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 88855 ()

Bugtraq ID:

CVE ID: CVE-2014-9761
CVE-2015-7547
CVE-2015-8776
CVE-2015-8778
CVE-2015-8779

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now