Security update for glibc

This update for glibc provides the following fixes:

- Increase DTV_SURPLUS limit. (bsc#968787)
- Do not copy d_name field of struct dirent. (CVE-2016-1234, bsc#969727)
- Fix memory leak in _nss_dns_gethostbyname4_r. (bsc#973010)
- Fix stack overflow in _nss_dns_getnetbyname_r. (CVE-2016-3075, bsc#973164)
- Fix malloc performance regression from SLE 11. (bsc#975930)
- Fix getaddrinfo stack overflow in hostent conversion. (CVE-2016-3706, bsc#980483)
- Do not use alloca in clntudp_call. (CVE-2016-4429, bsc#980854)
- Remove mtrace.1, now included in the man-pages package. (bsc#967190)


This update was imported from the SUSE:SLE-12-SP1:Update update project.

Fixed bugs
bnc#975930
L3: Bad performance in malloc/free after upgrading to SLES 12
bnc#980854
VUL-0: CVE-2016-4429: glibc: A stack frame overflow flaw was found in the glibc's clntudp_call
bnc#967190
File conflict between glibc-utils and man-pages
bnc#980483
VUL-0: CVE-2016-3706: glibc: stack overflow in hostent translation
bnc#973010
SLES 11 SP4 - Memory leak in glibc-2.11.3-17.95.2 when resolving a non-existing DNSBL entry using getaddrinfo().
bnc#968787
DTV_SURPLUS limits loading of Static TLS-requiring modules in multi-threaded programs (SAP HANA on Power)
bnc#973164
VUL-0: CVE-2016-3075: glibc: Stack overflow in nss_dns_getnetbyname_r
bnc#969727
VUL-1: CVE-2016-1234: glibc: buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory
Selected Binaries
openSUSE Build Service is sponsored by