openSUSE Security Update: glibc
______________________________________________________________________________
Announcement ID:    openSUSE-SU-2015:0162-1
Rating:             critical
References:         #913646 
Cross-References:   2015-0235
Affected Products:
                    openSUSE Evergreen 11.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
   CVE-2015-0235: A vulnerability was found and fixed in the GNU C Library,
   specifically in the function gethostbyname(), that could lead to a local
   or remote buffer overflow. (bsc#913646)
Patch Instructions:
   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:
– openSUSE Evergreen 11.4:
zypper in -t patch 2015-6
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE Evergreen 11.4 (i586 x86_64):
      glibc-2.11.3-12.62.1
      glibc-debuginfo-2.11.3-12.62.1
      glibc-debugsource-2.11.3-12.62.1
      glibc-devel-2.11.3-12.62.1
      glibc-devel-debuginfo-2.11.3-12.62.1
      glibc-html-2.11.3-12.62.1
      glibc-i18ndata-2.11.3-12.62.1
      glibc-info-2.11.3-12.62.1
      glibc-locale-2.11.3-12.62.1
      glibc-locale-debuginfo-2.11.3-12.62.1
      glibc-obsolete-2.11.3-12.62.1
      glibc-profile-2.11.3-12.62.1
      nscd-2.11.3-12.62.1
      nscd-debuginfo-2.11.3-12.62.1
– openSUSE Evergreen 11.4 (i586):
glibc-obsolete-debuginfo-2.11.3-12.62.1
References:
   http://support.novell.com/security/cve/2015-0235.html
   https://bugzilla.suse.com/show_bug.cgi?id=913646
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org



