File _patchinfo of Package patchinfo.3533
<patchinfo incident="3533"> <issue id="916222" tracker="bnc">VUL-0: CVE-2015-1472: glibc,glibc.i686: heap buffer overflow in glibc swscanf</issue> <issue id="915526" tracker="bnc">VUL-0: CVE-2013-7423: glibc,glibc.i686: getaddrinfo() writes DNS queries to random file descriptors under high load</issue> <issue id="906371" tracker="bnc">VUL-0: CVE-2014-7817: glibc,glibc.i686: Command execution in wordexp() with WRDE_NOCMD specified</issue> <issue id="910599" tracker="bnc">VUL-0: CVE-2014-9402: glibc: denial of service in getnetbyname function</issue> <issue id="CVE-2013-7423" tracker="cve" /> <issue id="CVE-2014-7817" tracker="cve" /> <issue id="CVE-2014-9402" tracker="cve" /> <issue id="CVE-2015-1472" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>Andreas_Schwab</packager> <description> Glibc was updated to fix several security issues. - Avoid infinite loop in nss_dns getnetbyname (CVE-2014-9402, bsc#910599, BZ #17630) - wordexp fails to honour WRDE_NOCMD (CVE-2014-7817, bsc#906371, BZ #17625) - Fix invalid file descriptor reuse while sending DNS query (CVE-2013-7423, bsc#915526, BZ #15946) - Fix buffer overflow in wscanf (CVE-2015-1472, bsc#916222, BZ #16618) </description> <summary>Security update for glibc</summary> </patchinfo>