Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in glibc
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in glibc
ID: SUSE-SU-2019:1102-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4
Datum: Di, 30. April 2019, 16:42
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
Applikationen: GNU C library

Originalnachricht


SUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID: SUSE-SU-2019:1102-1
Rating: moderate
References: #1100396 #1110661 #1122729 #1127223 #1127308
#1128574 #1131994
Cross-References: CVE-2009-5155 CVE-2016-10739 CVE-2019-9169

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Desktop 12-SP4
______________________________________________________________________________

An update that solves three vulnerabilities and has four
fixes is now available.

Description:

This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2019-9169: regex: fix read overrun (bsc#1127308, BZ #24114)
- CVE-2016-10739: Fully parse IPv4 address strings (bsc#1122729, BZ #20018)
- CVE-2009-5155: ERE '0|()0|\1|0' causes regexec undefined behavior
(bsc#1127223, BZ #18986)

Non-security issues fixed:

- Enable TLE only if GLIBC_ELISION_ENABLE=yes is defined (bsc#1131994,
fate#322271)
- Add more checks for valid ld.so.cache file (bsc#1110661, BZ #18093)
- Added cfi information for start routines in order to stop unwinding
(bsc#1128574)
- ja_JP locale: Add entry for the new Japanese era (bsc#1100396,
fate#325570, BZ #22964)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12-SP4:

zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1102=1

- SUSE Linux Enterprise Server 12-SP4:

zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1102=1

- SUSE Linux Enterprise Desktop 12-SP4:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1102=1



Package List:

- SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le
s390x x86_64):

glibc-debuginfo-2.22-100.8.1
glibc-debugsource-2.22-100.8.1
glibc-devel-static-2.22-100.8.1

- SUSE Linux Enterprise Software Development Kit 12-SP4 (noarch):

glibc-info-2.22-100.8.1

- SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

glibc-2.22-100.8.1
glibc-debuginfo-2.22-100.8.1
glibc-debugsource-2.22-100.8.1
glibc-devel-2.22-100.8.1
glibc-devel-debuginfo-2.22-100.8.1
glibc-locale-2.22-100.8.1
glibc-locale-debuginfo-2.22-100.8.1
glibc-profile-2.22-100.8.1
nscd-2.22-100.8.1
nscd-debuginfo-2.22-100.8.1

- SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):

glibc-32bit-2.22-100.8.1
glibc-debuginfo-32bit-2.22-100.8.1
glibc-devel-32bit-2.22-100.8.1
glibc-devel-debuginfo-32bit-2.22-100.8.1
glibc-locale-32bit-2.22-100.8.1
glibc-locale-debuginfo-32bit-2.22-100.8.1
glibc-profile-32bit-2.22-100.8.1

- SUSE Linux Enterprise Server 12-SP4 (noarch):

glibc-html-2.22-100.8.1
glibc-i18ndata-2.22-100.8.1
glibc-info-2.22-100.8.1

- SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

glibc-2.22-100.8.1
glibc-32bit-2.22-100.8.1
glibc-debuginfo-2.22-100.8.1
glibc-debuginfo-32bit-2.22-100.8.1
glibc-debugsource-2.22-100.8.1
glibc-devel-2.22-100.8.1
glibc-devel-32bit-2.22-100.8.1
glibc-devel-debuginfo-2.22-100.8.1
glibc-devel-debuginfo-32bit-2.22-100.8.1
glibc-locale-2.22-100.8.1
glibc-locale-32bit-2.22-100.8.1
glibc-locale-debuginfo-2.22-100.8.1
glibc-locale-debuginfo-32bit-2.22-100.8.1
nscd-2.22-100.8.1
nscd-debuginfo-2.22-100.8.1

- SUSE Linux Enterprise Desktop 12-SP4 (noarch):

glibc-i18ndata-2.22-100.8.1


References:

https://www.suse.com/security/cve/CVE-2009-5155.html
https://www.suse.com/security/cve/CVE-2016-10739.html
https://www.suse.com/security/cve/CVE-2019-9169.html
https://bugzilla.suse.com/1100396
https://bugzilla.suse.com/1110661
https://bugzilla.suse.com/1122729
https://bugzilla.suse.com/1127223
https://bugzilla.suse.com/1127308
https://bugzilla.suse.com/1128574
https://bugzilla.suse.com/1131994

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung