<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for glibc</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:0076-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-01-12T08:44:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-01-12T08:44:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-01-12T08:44:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for glibc</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for glibc fixes the following issues:

- A privilege escalation bug in the realpath() function has been fixed.
  [CVE-2018-1000001, bsc#1074293]

- A buffer manipulation vulnerability in nscd has been fixed that could
  possibly have lead to an nscd daemon crash or code execution as the user
  running nscd. [CVE-2014-9984, bsc#1043984]
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SERVER-12-2018-54</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180076-1/</URL>
      <Description>Link for SUSE-SU-2018:0076-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-January/003594.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:0076-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1043984</URL>
      <Description>SUSE Bug 1043984</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1074293</URL>
      <Description>SUSE Bug 1074293</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9984/</URL>
      <Description>SUSE CVE CVE-2014-9984 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000001/</URL>
      <Description>SUSE CVE CVE-2018-1000001 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="glibc-2.19-22.24.5">
      <FullProductName ProductID="glibc-2.19-22.24.5">glibc-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-32bit-2.19-22.24.5">
      <FullProductName ProductID="glibc-32bit-2.19-22.24.5">glibc-32bit-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-2.19-22.24.5">
      <FullProductName ProductID="glibc-devel-2.19-22.24.5">glibc-devel-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-32bit-2.19-22.24.5">
      <FullProductName ProductID="glibc-devel-32bit-2.19-22.24.5">glibc-devel-32bit-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-html-2.19-22.24.5">
      <FullProductName ProductID="glibc-html-2.19-22.24.5">glibc-html-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-i18ndata-2.19-22.24.5">
      <FullProductName ProductID="glibc-i18ndata-2.19-22.24.5">glibc-i18ndata-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-info-2.19-22.24.5">
      <FullProductName ProductID="glibc-info-2.19-22.24.5">glibc-info-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-2.19-22.24.5">
      <FullProductName ProductID="glibc-locale-2.19-22.24.5">glibc-locale-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-32bit-2.19-22.24.5">
      <FullProductName ProductID="glibc-locale-32bit-2.19-22.24.5">glibc-locale-32bit-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-profile-2.19-22.24.5">
      <FullProductName ProductID="glibc-profile-2.19-22.24.5">glibc-profile-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-profile-32bit-2.19-22.24.5">
      <FullProductName ProductID="glibc-profile-32bit-2.19-22.24.5">glibc-profile-32bit-2.19-22.24.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nscd-2.19-22.24.5">
      <FullProductName ProductID="nscd-2.19-22.24.5">nscd-2.19-22.24.5</FullProductName>
    </Branch>
    <Relationship ProductReference="glibc-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.24.5">glibc-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-32bit-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.24.5">glibc-32bit-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.24.5">glibc-devel-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-32bit-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.24.5">glibc-devel-32bit-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-html-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-html-2.19-22.24.5">glibc-html-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-i18ndata-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-i18ndata-2.19-22.24.5">glibc-i18ndata-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-info-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-info-2.19-22.24.5">glibc-info-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.24.5">glibc-locale-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-32bit-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.24.5">glibc-locale-32bit-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-profile-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.24.5">glibc-profile-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-profile-32bit-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.24.5">glibc-profile-32bit-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="nscd-2.19-22.24.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.24.5">nscd-2.19-22.24.5 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.</Note>
    </Notes>
    <CVE>CVE-2014-9984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-html-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-i18ndata-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-info-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.24.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180076-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9984.html</URL>
        <Description>CVE-2014-9984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043984</URL>
        <Description>SUSE Bug 1043984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.</Note>
    </Notes>
    <CVE>CVE-2018-1000001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-html-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-i18ndata-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-info-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.24.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.24.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20180076-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000001.html</URL>
        <Description>CVE-2018-1000001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074293</URL>
        <Description>SUSE Bug 1074293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099047</URL>
        <Description>SUSE Bug 1099047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
