SuSE 11.3 Security Update : glibc (SAT Patch Number 9262)

Medium Nessus Plugin ID 74351


The remote SuSE 11 host is missing one or more security updates.


This update for the GNU Lib C fixes security issues, some bugs and introduces one new feature.

The following security issues have been fixed :

- Various potential stack overflows in getaddrinfo() and others were fixed. (bnc#844309). (CVE-2013-4357)

- A stack (frame) overflow in getaddrinfo() when called with AF_INET6. The following new feature has been implemented:. (CVE-2013-4458)

- On PowerLinux, a vDSO entry for getcpu() was added for possible performance enhancements. (FATE#316816, bnc#854445) The following issues have been fixed :

- Performance problems with threads in
__lll_lock_wait_private and __lll_unlock_wake_private.

- IPv6: Memory leak in getaddrinfo() when many RRs are returned. (bnc#863499)

- Using profiling C library (-lc_p) can trigger a segmentation fault. (bnc#872832)


Apply SAT patch number 9262.

See Also

Plugin Details

Severity: Medium

ID: 74351

File Name: suse_11_glibc-140515.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2014/06/06

Modified: 2014/06/06

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:glibc, p-cpe:/a:novell:suse_linux:11:glibc-32bit, p-cpe:/a:novell:suse_linux:11:glibc-devel, p-cpe:/a:novell:suse_linux:11:glibc-devel-32bit, p-cpe:/a:novell:suse_linux:11:glibc-html, p-cpe:/a:novell:suse_linux:11:glibc-i18ndata, p-cpe:/a:novell:suse_linux:11:glibc-info, p-cpe:/a:novell:suse_linux:11:glibc-locale, p-cpe:/a:novell:suse_linux:11:glibc-locale-32bit, p-cpe:/a:novell:suse_linux:11:glibc-profile, p-cpe:/a:novell:suse_linux:11:glibc-profile-32bit, p-cpe:/a:novell:suse_linux:11:nscd, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2014/05/15

Reference Information

CVE: CVE-2013-4357, CVE-2013-4458