drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in libeconf
Name: |
Mehrere Probleme in libeconf |
|
ID: |
SUSE-SU-2023:3639-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Micro 5.1, SUSE Manager Server 4.2, SUSE Manager Proxy 4.2, SUSE Manager Retail Branch Server 4.2, SUSE Linux Enterprise Micro 5.2, SUSE Linux Enterprise Micro for Rancher 5.2 |
|
Datum: |
Mo, 18. September 2023, 15:33 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30079 |
|
Applikationen: |
libeconf |
|
Originalnachricht |
--===============1971096322872800435== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for libeconf
Announcement ID: SUSE-SU-2023:3639-1 Rating: moderate References:
* #1198165 * #1211078
Cross-References:
* CVE-2023-22652 * CVE-2023-30078 * CVE-2023-30079 * CVE-2023-32181
CVSS scores:
* CVE-2023-22652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-22652 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-30078 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-30078 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-30079 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-30079 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-32181 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2
An update that solves four vulnerabilities can now be installed.
## Description:
This update for libeconf fixes the following issues:
Update to version 0.5.2.
* CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in "econf_writeFile" function (bsc#1211078). * CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in "read_file" function. (bsc#1211078)
The following non-security bug was fixed:
* Fixed parsing files correctly which have space characters AND none space characters as delimiters (bsc#1198165).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3639=1
* SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3639=1
* SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3639=1
* SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3639=1
* SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1
* SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1
## Package List:
* SUSE Manager Proxy 4.2 (x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libeconf-debugsource-0.5.2-150300.3.11.1 * libeconf0-debuginfo-0.5.2-150300.3.11.1 * libeconf0-0.5.2-150300.3.11.1
## References:
* https://www.suse.com/security/cve/CVE-2023-22652.html * https://www.suse.com/security/cve/CVE-2023-30078.html * https://www.suse.com/security/cve/CVE-2023-30079.html * https://www.suse.com/security/cve/CVE-2023-32181.html * https://bugzilla.suse.com/show_bug.cgi?id=1198165 * https://bugzilla.suse.com/show_bug.cgi?id=1211078
--===============1971096322872800435== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for libeconf</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2023:3639-1</td> </tr> <tr> <th>Rating:</th> <td>moderate</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1198165">#1198165</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211078">#1211078</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-22652.html">CVE-2023-22652</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-30078.html">CVE-2023-30078</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-30079.html">CVE-2023-30079</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-32181.html">CVE-2023-32181</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-22652</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-22652</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-30078</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-30078</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">8.8</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-30079</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-30079</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">8.8</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-32181</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-32181</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li> <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.2</li> <li class="list-group-item">SUSE Manager Proxy 4.2</li> <li class="list-group-item">SUSE Manager Retail Branch Server 4.2</li> <li class="list-group-item">SUSE Manager Server 4.2</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves four vulnerabilities can now be installed.</p>
<h2>Description:</h2> <p>This update for libeconf fixes the following issues:</p> <p>Update to version 0.5.2.</p> <ul> <li>CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in "econf_writeFile" function (bsc#1211078).</li> <li>CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in "read_file" function. (bsc#1211078)</li> </ul> <p>The following non-security bug was fixed:</p> <ul> <li>Fixed parsing files correctly which have space characters AND none space characters as delimiters (bsc#1198165).</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Manager Proxy 4.2 <br/> <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3639=1</code> </li> <li class="list-group-item"> SUSE Manager Retail Branch Server 4.2 <br/> <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-3639=1</code> </li> <li class="list-group-item"> SUSE Manager Server 4.2 <br/> <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3639=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.1 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3639=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.2 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro for Rancher 5.2 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Manager Proxy 4.2 (x86_64) <ul> <li>libeconf-debugsource-0.5.2-150300.3.11.1</li> <li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li> <li>libeconf0-0.5.2-150300.3.11.1</li> </ul> </li> <li> SUSE Manager Retail Branch Server 4.2 (x86_64) <ul> <li>libeconf-debugsource-0.5.2-150300.3.11.1</li> <li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li> <li>libeconf0-0.5.2-150300.3.11.1</li> </ul> </li> <li> SUSE Manager Server 4.2 (ppc64le s390x x86_64) <ul> <li>libeconf-debugsource-0.5.2-150300.3.11.1</li> <li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li> <li>libeconf0-0.5.2-150300.3.11.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) <ul> <li>libeconf-debugsource-0.5.2-150300.3.11.1</li> <li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li> <li>libeconf0-0.5.2-150300.3.11.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) <ul> <li>libeconf-debugsource-0.5.2-150300.3.11.1</li> <li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li> <li>libeconf0-0.5.2-150300.3.11.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) <ul> <li>libeconf-debugsource-0.5.2-150300.3.11.1</li> <li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li> <li>libeconf0-0.5.2-150300.3.11.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2023-22652.html">https://www.suse.com/security/cve/CVE-2023-22652.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-30078.html">https://www.suse.com/security/cve/CVE-2023-30078.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-30079.html">https://www.suse.com/security/cve/CVE-2023-30079.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-32181.html">https://www.suse.com/security/cve/CVE-2023-32181.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1198165">https://bugzilla.suse.com/show_bug.cgi?id=1198165</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211078">https://bugzilla.suse.com/show_bug.cgi?id=1211078</a> </li> </ul> </div>
--===============1971096322872800435==--
|
|
|
|