SUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1611-1
Rating:             important
References:         #1038690 #1039357 #987216 
Cross-References:   CVE-2017-1000366
Affected Products:
                    SUSE Linux Enterprise Server for SAP 12
                    SUSE Linux Enterprise Server 12-LTSS
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for glibc fixes the following issues:

   - CVE-2017-1000366: Fix a potential privilege escalation vulnerability
     that allowed unprivileged system users to manipulate the stack of setuid
     binaries to gain special privileges. [bsc#1039357]

   - The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690]

   - A defect in glibc's regression test suite has been remedied to avoid
     false positives. [bsc#987216]


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for SAP 12:

      zypper in -t patch SUSE-SLE-SAP-12-2017-988=1

   - SUSE Linux Enterprise Server 12-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-2017-988=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server for SAP 12 (x86_64):

      glibc-2.19-22.21.1
      glibc-32bit-2.19-22.21.1
      glibc-debuginfo-2.19-22.21.1
      glibc-debuginfo-32bit-2.19-22.21.1
      glibc-debugsource-2.19-22.21.1
      glibc-devel-2.19-22.21.1
      glibc-devel-32bit-2.19-22.21.1
      glibc-devel-debuginfo-2.19-22.21.1
      glibc-devel-debuginfo-32bit-2.19-22.21.1
      glibc-locale-2.19-22.21.1
      glibc-locale-32bit-2.19-22.21.1
      glibc-locale-debuginfo-2.19-22.21.1
      glibc-locale-debuginfo-32bit-2.19-22.21.1
      glibc-profile-2.19-22.21.1
      glibc-profile-32bit-2.19-22.21.1
      nscd-2.19-22.21.1
      nscd-debuginfo-2.19-22.21.1

   - SUSE Linux Enterprise Server for SAP 12 (noarch):

      glibc-html-2.19-22.21.1
      glibc-i18ndata-2.19-22.21.1
      glibc-info-2.19-22.21.1

   - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64):

      glibc-2.19-22.21.1
      glibc-debuginfo-2.19-22.21.1
      glibc-debugsource-2.19-22.21.1
      glibc-devel-2.19-22.21.1
      glibc-devel-debuginfo-2.19-22.21.1
      glibc-locale-2.19-22.21.1
      glibc-locale-debuginfo-2.19-22.21.1
      glibc-profile-2.19-22.21.1
      nscd-2.19-22.21.1
      nscd-debuginfo-2.19-22.21.1

   - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64):

      glibc-32bit-2.19-22.21.1
      glibc-debuginfo-32bit-2.19-22.21.1
      glibc-devel-32bit-2.19-22.21.1
      glibc-devel-debuginfo-32bit-2.19-22.21.1
      glibc-locale-32bit-2.19-22.21.1
      glibc-locale-debuginfo-32bit-2.19-22.21.1
      glibc-profile-32bit-2.19-22.21.1

   - SUSE Linux Enterprise Server 12-LTSS (noarch):

      glibc-html-2.19-22.21.1
      glibc-i18ndata-2.19-22.21.1
      glibc-info-2.19-22.21.1


References:

   https://www.suse.com/security/cve/CVE-2017-1000366.html
   https://bugzilla.suse.com/1038690
   https://bugzilla.suse.com/1039357
   https://bugzilla.suse.com/987216

SuSE: 2017:1611-1: important: glibc

June 19, 2017
An update that solves one vulnerability and has two fixes An update that solves one vulnerability and has two fixes An update that solves one vulnerability and has two fixes is now...

Summary

This update for glibc fixes the following issues: - CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357] - The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690] - A defect in glibc's regression test suite has been remedied to avoid false positives. [bsc#987216] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-988=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-988=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): glibc-2.19-22.21.1 glibc-32bit-2.19-22.21.1 glibc-debuginfo-2.19-22.21.1 glibc-debuginfo-32bit-2.19-22.21.1 glibc-debugsource-2.19-22.21.1 glibc-devel-2.19-22.21.1 glibc-devel-32bit-2.19-22.21.1 glibc-devel-debuginfo-2.19-22.21.1 glibc-devel-debuginfo-32bit-2.19-22.21.1 glibc-locale-2.19-22.21.1 glibc-locale-32bit-2.19-22.21.1 glibc-locale-debuginfo-2.19-22.21.1 glibc-locale-debuginfo-32bit-2.19-22.21.1 glibc-profile-2.19-22.21.1 glibc-profile-32bit-2.19-22.21.1 nscd-2.19-22.21.1 nscd-debuginfo-2.19-22.21.1 - SUSE Linux Enterprise Server for SAP 12 (noarch): glibc-html-2.19-22.21.1 glibc-i18ndata-2.19-22.21.1 glibc-info-2.19-22.21.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): glibc-2.19-22.21.1 glibc-debuginfo-2.19-22.21.1 glibc-debugsource-2.19-22.21.1 glibc-devel-2.19-22.21.1 glibc-devel-debuginfo-2.19-22.21.1 glibc-locale-2.19-22.21.1 glibc-locale-debuginfo-2.19-22.21.1 glibc-profile-2.19-22.21.1 nscd-2.19-22.21.1 nscd-debuginfo-2.19-22.21.1 - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64): glibc-32bit-2.19-22.21.1 glibc-debuginfo-32bit-2.19-22.21.1 glibc-devel-32bit-2.19-22.21.1 glibc-devel-debuginfo-32bit-2.19-22.21.1 glibc-locale-32bit-2.19-22.21.1 glibc-locale-debuginfo-32bit-2.19-22.21.1 glibc-profile-32bit-2.19-22.21.1 - SUSE Linux Enterprise Server 12-LTSS (noarch): glibc-html-2.19-22.21.1 glibc-i18ndata-2.19-22.21.1 glibc-info-2.19-22.21.1

References

#1038690 #1039357 #987216

Cross- CVE-2017-1000366

Affected Products:

SUSE Linux Enterprise Server for SAP 12

SUSE Linux Enterprise Server 12-LTSS

https://www.suse.com/security/cve/CVE-2017-1000366.html

https://bugzilla.suse.com/1038690

https://bugzilla.suse.com/1039357

https://bugzilla.suse.com/987216

Severity
Announcement ID: SUSE-SU-2017:1611-1
Rating: important

Related News