Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in libeconf
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in libeconf
ID: SUSE-SU-2023:3639-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Micro 5.1, SUSE Manager Server 4.2, SUSE Manager Proxy 4.2, SUSE Manager Retail Branch Server 4.2, SUSE Linux Enterprise Micro 5.2, SUSE Linux Enterprise Micro for Rancher 5.2
Datum: Mo, 18. September 2023, 15:33
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30079
Applikationen: libeconf

Originalnachricht

--===============1971096322872800435==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for libeconf

Announcement ID: SUSE-SU-2023:3639-1
Rating: moderate
References:

* #1198165
* #1211078


Cross-References:

* CVE-2023-22652
* CVE-2023-30078
* CVE-2023-30079
* CVE-2023-32181


CVSS scores:

* CVE-2023-22652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-22652 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-30078 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-30078 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-30079 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-30079 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-32181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-32181 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L


Affected Products:

* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2



An update that solves four vulnerabilities can now be installed.

## Description:

This update for libeconf fixes the following issues:

Update to version 0.5.2.

* CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability
in "econf_writeFile" function (bsc#1211078).
* CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability
in "read_file" function. (bsc#1211078)

The following non-security bug was fixed:

* Fixed parsing files correctly which have space characters AND none space
characters as delimiters (bsc#1198165).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Manager Proxy 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3639=1

* SUSE Manager Retail Branch Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-3639=1

* SUSE Manager Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3639=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3639=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3639=1

## Package List:

* SUSE Manager Proxy 4.2 (x86_64)
* libeconf-debugsource-0.5.2-150300.3.11.1
* libeconf0-debuginfo-0.5.2-150300.3.11.1
* libeconf0-0.5.2-150300.3.11.1
* SUSE Manager Retail Branch Server 4.2 (x86_64)
* libeconf-debugsource-0.5.2-150300.3.11.1
* libeconf0-debuginfo-0.5.2-150300.3.11.1
* libeconf0-0.5.2-150300.3.11.1
* SUSE Manager Server 4.2 (ppc64le s390x x86_64)
* libeconf-debugsource-0.5.2-150300.3.11.1
* libeconf0-debuginfo-0.5.2-150300.3.11.1
* libeconf0-0.5.2-150300.3.11.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libeconf-debugsource-0.5.2-150300.3.11.1
* libeconf0-debuginfo-0.5.2-150300.3.11.1
* libeconf0-0.5.2-150300.3.11.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libeconf-debugsource-0.5.2-150300.3.11.1
* libeconf0-debuginfo-0.5.2-150300.3.11.1
* libeconf0-0.5.2-150300.3.11.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libeconf-debugsource-0.5.2-150300.3.11.1
* libeconf0-debuginfo-0.5.2-150300.3.11.1
* libeconf0-0.5.2-150300.3.11.1

## References:

* https://www.suse.com/security/cve/CVE-2023-22652.html
* https://www.suse.com/security/cve/CVE-2023-30078.html
* https://www.suse.com/security/cve/CVE-2023-30079.html
* https://www.suse.com/security/cve/CVE-2023-32181.html
* https://bugzilla.suse.com/show_bug.cgi?id=1198165
* https://bugzilla.suse.com/show_bug.cgi?id=1211078


--===============1971096322872800435==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for libeconf</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:3639-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1198165">#1198165</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211078">#1211078</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-22652.html">CVE-2023-22652</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-30078.html">CVE-2023-30078</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-30079.html">CVE-2023-30079</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-32181.html">CVE-2023-32181</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-22652</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-22652</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-30078</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-30078</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-30079</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-30079</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-32181</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-32181</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.1</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.2</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro for Rancher 5.2</li>

<li class="list-group-item">SUSE Manager
Proxy 4.2</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.2</li>

<li class="list-group-item">SUSE Manager
Server 4.2</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves four vulnerabilities can now be
installed.</p>





<h2>Description:</h2>

<p>This update for libeconf fixes the following issues:</p>
<p>Update to version 0.5.2.</p>
<ul>
<li>CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow
vulnerability in &quot;econf_writeFile&quot; function (bsc#1211078).</li>
<li>CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow
vulnerability in &quot;read_file&quot; function. (bsc#1211078)</li>
</ul>
<p>The following non-security bug was fixed:</p>
<ul>
<li>Fixed parsing files correctly which have space characters AND none
space characters as delimiters (bsc#1198165).</li>
</ul>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Manager Proxy 4.2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3639=1</code>



</li>

<li class="list-group-item">
SUSE Manager Retail Branch Server 4.2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-3639=1</code>



</li>

<li class="list-group-item">
SUSE Manager Server 4.2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3639=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.1


<br/>
<code>zypper in -t patch
SUSE-SUSE-MicroOS-5.1-2023-3639=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.2


<br/>
<code>zypper in -t patch
SUSE-SUSE-MicroOS-5.2-2023-3639=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.2


<br/>
<code>zypper in -t patch
SUSE-SUSE-MicroOS-5.2-2023-3639=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Manager Proxy 4.2 (x86_64)
<ul>


<li>libeconf-debugsource-0.5.2-150300.3.11.1</li>


<li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li>

<li>libeconf0-0.5.2-150300.3.11.1</li>

</ul>
</li>



<li>
SUSE Manager Retail Branch Server 4.2 (x86_64)
<ul>


<li>libeconf-debugsource-0.5.2-150300.3.11.1</li>


<li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li>

<li>libeconf0-0.5.2-150300.3.11.1</li>

</ul>
</li>



<li>
SUSE Manager Server 4.2 (ppc64le s390x x86_64)
<ul>


<li>libeconf-debugsource-0.5.2-150300.3.11.1</li>


<li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li>

<li>libeconf0-0.5.2-150300.3.11.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
<ul>


<li>libeconf-debugsource-0.5.2-150300.3.11.1</li>


<li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li>

<li>libeconf0-0.5.2-150300.3.11.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
<ul>


<li>libeconf-debugsource-0.5.2-150300.3.11.1</li>


<li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li>

<li>libeconf0-0.5.2-150300.3.11.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x
x86_64)
<ul>


<li>libeconf-debugsource-0.5.2-150300.3.11.1</li>


<li>libeconf0-debuginfo-0.5.2-150300.3.11.1</li>

<li>libeconf0-0.5.2-150300.3.11.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2023-22652.html">https://www.suse.com/security/cve/CVE-2023-22652.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-30078.html">https://www.suse.com/security/cve/CVE-2023-30078.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-30079.html">https://www.suse.com/security/cve/CVE-2023-30079.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-32181.html">https://www.suse.com/security/cve/CVE-2023-32181.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1198165">https://bugzilla.suse.com/show_bug.cgi?id=1198165</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211078">https://bugzilla.suse.com/show_bug.cgi?id=1211078</a>
</li>


</ul>

</div>

--===============1971096322872800435==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung