Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2015.0164.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2015:0164-1)
Summary:The remote host is missing an update for the 'glibc' package(s) announced via the SUSE-SU-2015:0164-1 advisory.
Description:Summary:
The remote host is missing an update for the 'glibc' package(s) announced via the SUSE-SU-2015:0164-1 advisory.

Vulnerability Insight:
glibc has been updated to fix one security issue and several bugs:

Security issue fixed:

* Fix crashes on invalid input in IBM gconv modules (CVE-2014-6040,
CVE-2012-6656)
* Fixed a stack overflow during hosts parsing (CVE-2013-4357)

Bugs fixed:

* don't touch user-controlled stdio locks in forked child (bsc#864081,
GLIBC BZ #12847)
* Fix infinite loop in check_pf (bsc#909053, GLIBC BZ #12926)
* Add check for RTLD_DEEPBIND environment variable to disable
deepbinding of NSS modules (bsc#888860)
* Fix infinite loop in check_pf (bsc#909053, GLIBC BZ #12926)

Security Issues:

* CVE-2014-6040
* CVE-2012-6656
* CVE-2013-4357

Affected Software/OS:
'glibc' package(s) on SUSE Linux Enterprise Server 11-SP1.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-6656
BugTraq ID: 69472
http://www.securityfocus.com/bid/69472
Debian Security Information: DSA-3142 (Google Search)
http://www.debian.org/security/2015/dsa-3142
https://security.gentoo.org/glsa/201503-04
http://www.mandriva.com/security/advisories?name=MDVSA-2014:175
http://www.openwall.com/lists/oss-security/2014/08/29/3
http://www.openwall.com/lists/oss-security/2014/09/02/1
http://www.ubuntu.com/usn/USN-2432-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-4357
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html
http://www.openwall.com/lists/oss-security/2013/09/17/4
http://www.openwall.com/lists/oss-security/2013/09/17/8
http://www.openwall.com/lists/oss-security/2015/01/28/18
http://www.openwall.com/lists/oss-security/2015/01/29/21
http://www.openwall.com/lists/oss-security/2015/02/24/3
http://www.securityfocus.com/bid/67992
http://www.ubuntu.com/usn/USN-2306-1
http://www.ubuntu.com/usn/USN-2306-2
http://www.ubuntu.com/usn/USN-2306-3
https://access.redhat.com/security/cve/cve-2013-4357
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4357
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4357
https://exchange.xforce.ibmcloud.com/vulnerabilities/95103
https://security-tracker.debian.org/tracker/CVE-2013-4357
Common Vulnerability Exposure (CVE) ID: CVE-2014-6040
62100
http://secunia.com/advisories/62100
62146
http://secunia.com/advisories/62146
69472
DSA-3142
GLSA-201602-02
https://security.gentoo.org/glsa/201602-02
MDVSA-2014:175
USN-2432-1
http://ubuntu.com/usn/usn-2432-1
[oss-security] 20140829 CVE request: glibc character set conversion from IBM code pages
[oss-security] 20140902 Re: CVE request: glibc character set conversion from IBM code pages
http://linux.oracle.com/errata/ELSA-2015-0016.html
https://sourceware.org/bugzilla/show_bug.cgi?id=17325
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.