{"affected":[],"aliases":[],"details":"\nThis update for glibc contains the following fixes:\n\n    * Fix integer overflows in malloc (CVE-2013-4332, bnc#839870)\n    * Fix buffer overflow in glob (bnc#691365)\n    * Fix buffer overflow in strcoll (CVE-2012-4412, bnc#779320)\n    * Update mount flags in <sys/mount.h> (bnc#791928)\n    * Fix buffer overrun in regexp matcher (CVE-2013-0242, bnc#801246)\n    * Fix memory leaks in dlopen (bnc#811979)\n    * Fix stack overflow in getaddrinfo with many results (CVE-2013-1914,\n      bnc#813121)\n    * Fix check for XEN build in glibc_post_upgrade that causes missing\n      init re-exec (bnc#818628)\n    * Don't raise UNDERFLOW in tan/tanf for small but normal argument\n      (bnc#819347)\n    * Properly cross page boundary in SSE4.2 implementation of strcmp\n      (bnc#822210)\n    * Fix robust mutex handling after fork (bnc#827811)\n    * Fix missing character in IBM-943 charset (bnc#828235)\n    * Fix use of alloca in gaih_inet (bnc#828637)\n    * Initialize pointer guard also in static executables (CVE-2013-4788,\n      bnc#830268)\n    * Fix readdir_r with long file names (CVE-2013-4237, bnc#834594).\n\nSecurity Issues:\n\n    * CVE-2012-4412\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412>\n    * CVE-2013-0242\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242>\n    * CVE-2013-1914\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914>\n    * CVE-2013-4237\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237>\n    * CVE-2013-4332\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332>\n    * CVE-2013-4788\n      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788>\n\n","id":"SUSE-SU-2015:0551-1","modified":"2013-09-13T15:23:14Z","published":"2013-09-13T15:23:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20150551-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/684534"},{"type":"REPORT","url":"https://bugzilla.suse.com/691365"},{"type":"REPORT","url":"https://bugzilla.suse.com/741345"},{"type":"REPORT","url":"https://bugzilla.suse.com/743689"},{"type":"REPORT","url":"https://bugzilla.suse.com/744996"},{"type":"REPORT","url":"https://bugzilla.suse.com/745658"},{"type":"REPORT","url":"https://bugzilla.suse.com/746824"},{"type":"REPORT","url":"https://bugzilla.suse.com/747768"},{"type":"REPORT","url":"https://bugzilla.suse.com/750741"},{"type":"REPORT","url":"https://bugzilla.suse.com/760795"},{"type":"REPORT","url":"https://bugzilla.suse.com/763512"},{"type":"REPORT","url":"https://bugzilla.suse.com/767266"},{"type":"REPORT","url":"https://bugzilla.suse.com/770891"},{"type":"REPORT","url":"https://bugzilla.suse.com/775690"},{"type":"REPORT","url":"https://bugzilla.suse.com/777233"},{"type":"REPORT","url":"https://bugzilla.suse.com/779320"},{"type":"REPORT","url":"https://bugzilla.suse.com/783060"},{"type":"REPORT","url":"https://bugzilla.suse.com/785041"},{"type":"REPORT","url":"https://bugzilla.suse.com/791928"},{"type":"REPORT","url":"https://bugzilla.suse.com/793146"},{"type":"REPORT","url":"https://bugzilla.suse.com/795129"},{"type":"REPORT","url":"https://bugzilla.suse.com/801246"},{"type":"REPORT","url":"https://bugzilla.suse.com/811979"},{"type":"REPORT","url":"https://bugzilla.suse.com/813121"},{"type":"REPORT","url":"https://bugzilla.suse.com/818628"},{"type":"REPORT","url":"https://bugzilla.suse.com/819347"},{"type":"REPORT","url":"https://bugzilla.suse.com/822210"},{"type":"REPORT","url":"https://bugzilla.suse.com/827811"},{"type":"REPORT","url":"https://bugzilla.suse.com/828235"},{"type":"REPORT","url":"https://bugzilla.suse.com/828637"},{"type":"REPORT","url":"https://bugzilla.suse.com/830268"},{"type":"REPORT","url":"https://bugzilla.suse.com/834594"},{"type":"REPORT","url":"https://bugzilla.suse.com/836746"},{"type":"REPORT","url":"https://bugzilla.suse.com/839870"},{"type":"REPORT","url":"https://bugzilla.suse.com/844309"},{"type":"REPORT","url":"https://bugzilla.suse.com/864081"},{"type":"REPORT","url":"https://bugzilla.suse.com/882600"},{"type":"REPORT","url":"https://bugzilla.suse.com/887022"},{"type":"REPORT","url":"https://bugzilla.suse.com/892073"},{"type":"REPORT","url":"https://bugzilla.suse.com/894553"},{"type":"REPORT","url":"https://bugzilla.suse.com/894556"},{"type":"REPORT","url":"https://bugzilla.suse.com/906371"},{"type":"REPORT","url":"https://bugzilla.suse.com/909053"},{"type":"REPORT","url":"https://bugzilla.suse.com/910599"},{"type":"REPORT","url":"https://bugzilla.suse.com/913646"},{"type":"REPORT","url":"https://bugzilla.suse.com/915526"},{"type":"REPORT","url":"https://bugzilla.suse.com/916222"},{"type":"REPORT","url":"https://bugzilla.suse.com/918233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-0864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-3404"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-3405"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-3406"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-3480"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-4412"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2012-6656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-0242"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-1914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4332"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4357"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-4788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2013-7423"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-5119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-6040"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-7817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-9402"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-0235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-1472"}],"related":["CVE-2012-0864","CVE-2012-3404","CVE-2012-3405","CVE-2012-3406","CVE-2012-3480","CVE-2012-4412","CVE-2012-6656","CVE-2013-0242","CVE-2013-1914","CVE-2013-4237","CVE-2013-4332","CVE-2013-4357","CVE-2013-4788","CVE-2013-7423","CVE-2014-5119","CVE-2014-6040","CVE-2014-7817","CVE-2014-9402","CVE-2015-0235","CVE-2015-1472"],"summary":"Security update for glibc","upstream":["CVE-2012-0864","CVE-2012-3404","CVE-2012-3405","CVE-2012-3406","CVE-2012-3480","CVE-2012-4412","CVE-2012-6656","CVE-2013-0242","CVE-2013-1914","CVE-2013-4237","CVE-2013-4332","CVE-2013-4357","CVE-2013-4788","CVE-2013-7423","CVE-2014-5119","CVE-2014-6040","CVE-2014-7817","CVE-2014-9402","CVE-2015-0235","CVE-2015-1472"]}