<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="7f2cb38ab30086b2e83a460f9fab3881"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="3399">
  <id>dbg111-glibc</id>
  <title>glibc: Security update to fix various security problems and bugs</title>
  <release>openSUSE 11.1 DEBUGINFO</release>
  <issued date="1288111960"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=646960" id="646960" title="bug number 646960" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=445636" id="445636" title="bug number 445636" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=513961" id="513961" title="bug number 513961" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=534828" id="534828" title="bug number 534828" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=615556" id="615556" title="bug number 615556" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=572188" id="572188" title="bug number 572188" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=569091" id="569091" title="bug number 569091" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=585879" id="585879" title="bug number 585879" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=537315" id="537315" title="bug number 537315" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=594263" id="594263" title="bug number 594263" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=592941" id="592941" title="bug number 592941" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=375315" id="375315" title="bug number 375315" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=541773" id="541773" title="bug number 541773" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=646960" id="646960" title="bug number 646960" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=538067" id="538067" title="bug number 538067" type="bugzilla"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847" id="CVE-2010-3847" title="CVE-2010-3847" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856" id="CVE-2010-3856" title="CVE-2010-3856" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830" id="CVE-2010-0830" title="CVE-2010-0830" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296" id="CVE-2010-0296" title="CVE-2010-0296" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391" id="CVE-2008-1391" title="CVE-2008-1391" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015" id="CVE-2010-0015" title="CVE-2010-0015" type="cve"/>
  </references>
  <description>This update of glibc fixes various bugs and security issues:

CVE-2010-3847: Decoding of the $ORIGIN special value in
various LD_ environment variables allowed local attackers
to execute code in context of e.g. setuid root programs,
elevating privileges.  This issue does not affect SUSE as
an assertion triggers before the respective code is
executed.  The bug was fixed nevertheless.

CVE-2010-3856: The LD_AUDIT environment was not pruned
during setuid root execution and could load shared
libraries from standard system library paths. This could be
used by local attackers to inject code into setuid root
programs and so elevated privileges.

CVE-2010-0830: Integer overflow causing arbitrary code
execution in ld.so
--verify mode could be induced by a specially crafted
 binary.

CVE-2010-0296: The addmntent() function would not escape
the newline character properly, allowing the user to insert
arbitrary newlines to the /etc/mtab; if the addmntent() is
run by a setuid mount binary that does not do extra input
checking, this would allow custom entries to be inserted in
/etc/mtab.

CVE-2008-1391: The strfmon() function contains an integer
overflow vulnerability in width specifiers handling that
could be triggered by an attacker that can control the
format string passed to strfmon().

CVE-2010-0015: Some setups (mainly Solaris-based legacy
setups) include shadow information (password hashes) as
so-called &quot;adjunct passwd&quot; table, mangling it with the rest
of passwd columns instead of keeping it in the shadow
table. Normally, Solaris will disclose this information
only to clients bound to a priviledged port, but when nscd
is deployed on the client, getpwnam() would disclose the
password hashes to all users. New mode &quot;adjunct as shadow&quot;
can now be enabled in /etc/default/nss that will move the
password hashes from the world-readable passwd table to
emulated shadow table (that is not cached by nscd).

Some invalid behaviour, crashes and memory leaks were fixed:

- statfs64() would not function properly on IA64 in ia32el
  emulation mode.

- memcpy() and memset() on power6 would erroneously use a
  64-bit instruction within 32-bit code in certain corner
  cases.

- nscd would not load /etc/host.conf properly before
  performing host resolution - most importantly, `multi on`
  in /etc/host.conf would be ignored when nscd was used,
  breaking e.g. resolving records in /etc/hosts where
  single name would point at multiple addresses
- Removed mapping from lowercase sharp s to uppercase sharp
  S; uppercase S is not a standardly used letter and causes
  problems for ISO encodings.

Some other minor issues were fixed:
- glibc-locale now better coexists with sap-locale on
  upgrades by regenerating the locale/gconv indexes
  properly.

- Ports 623 and 664 may not be allocated by RPC code
  automatically anymore since that may clash with ports
  used on some IPMI network cards.

- On x86_64, backtrace of a static destructor would stop in
  the _fini() glibc pseudo-routine, making it difficult to
  find out what originally triggered the program
  termination. The routine now has unwind information
  attached.
</description>
  <pkglist>
    <collection>
        <package name="glibc-debuginfo" arch="i586" version="2.9" release="2.13.1">
          <filename>glibc-debuginfo-2.9-2.13.1.i586.rpm</filename>
        </package>
        <package name="glibc-debuginfo" arch="i686" version="2.9" release="2.13.1">
          <filename>glibc-debuginfo-2.9-2.13.1.i686.rpm</filename>
        </package>
        <package name="glibc-debuginfo" arch="ppc" version="2.9" release="2.13.1">
          <filename>glibc-debuginfo-2.9-2.13.1.ppc.rpm</filename>
        </package>
        <package name="glibc-debuginfo" arch="x86_64" version="2.9" release="2.13.1">
          <filename>glibc-debuginfo-2.9-2.13.1.x86_64.rpm</filename>
        </package>
        <package name="glibc-debuginfo-32bit" arch="x86_64" version="2.9" release="2.13.1">
          <filename>glibc-debuginfo-32bit-2.9-2.13.1.x86_64.rpm</filename>
        </package>
        <package name="glibc-debuginfo-64bit" arch="ppc" version="2.9" release="2.13.1">
          <filename>glibc-debuginfo-64bit-2.9-2.13.1.ppc.rpm</filename>
        </package>
        <package name="glibc-debugsource" arch="i586" version="2.9" release="2.13.1">
          <filename>glibc-debugsource-2.9-2.13.1.i586.rpm</filename>
        </package>
        <package name="glibc-debugsource" arch="i686" version="2.9" release="2.13.1">
          <filename>glibc-debugsource-2.9-2.13.1.i686.rpm</filename>
        </package>
        <package name="glibc-debugsource" arch="ppc" version="2.9" release="2.13.1">
          <filename>glibc-debugsource-2.9-2.13.1.ppc.rpm</filename>
        </package>
        <package name="glibc-debugsource" arch="x86_64" version="2.9" release="2.13.1">
          <filename>glibc-debugsource-2.9-2.13.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
