drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in glibc
Name: |
Mehrere Probleme in glibc |
|
ID: |
SUSE-SU-2019:1102-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Desktop 12-SP4, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP4 |
|
Datum: |
Di, 30. April 2019, 16:42 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 |
|
Applikationen: |
GNU C library |
|
Originalnachricht |
SUSE Security Update: Security update for glibc ______________________________________________________________________________
Announcement ID: SUSE-SU-2019:1102-1 Rating: moderate References: #1100396 #1110661 #1122729 #1127223 #1127308 #1128574 #1131994 Cross-References: CVE-2009-5155 CVE-2016-10739 CVE-2019-9169 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP4 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Desktop 12-SP4 ______________________________________________________________________________
An update that solves three vulnerabilities and has four fixes is now available.
Description:
This update for glibc fixes the following issues:
Security issues fixed:
- CVE-2019-9169: regex: fix read overrun (bsc#1127308, BZ #24114) - CVE-2016-10739: Fully parse IPv4 address strings (bsc#1122729, BZ #20018) - CVE-2009-5155: ERE '0|()0|\1|0' causes regexec undefined behavior (bsc#1127223, BZ #18986)
Non-security issues fixed:
- Enable TLE only if GLIBC_ELISION_ENABLE=yes is defined (bsc#1131994, fate#322271) - Add more checks for valid ld.so.cache file (bsc#1110661, BZ #18093) - Added cfi information for start routines in order to stop unwinding (bsc#1128574) - ja_JP locale: Add entry for the new Japanese era (bsc#1100396, fate#325570, BZ #22964)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP4:
zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1102=1
- SUSE Linux Enterprise Server 12-SP4:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1102=1
- SUSE Linux Enterprise Desktop 12-SP4:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1102=1
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):
glibc-debuginfo-2.22-100.8.1 glibc-debugsource-2.22-100.8.1 glibc-devel-static-2.22-100.8.1
- SUSE Linux Enterprise Software Development Kit 12-SP4 (noarch):
glibc-info-2.22-100.8.1
- SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
glibc-2.22-100.8.1 glibc-debuginfo-2.22-100.8.1 glibc-debugsource-2.22-100.8.1 glibc-devel-2.22-100.8.1 glibc-devel-debuginfo-2.22-100.8.1 glibc-locale-2.22-100.8.1 glibc-locale-debuginfo-2.22-100.8.1 glibc-profile-2.22-100.8.1 nscd-2.22-100.8.1 nscd-debuginfo-2.22-100.8.1
- SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):
glibc-32bit-2.22-100.8.1 glibc-debuginfo-32bit-2.22-100.8.1 glibc-devel-32bit-2.22-100.8.1 glibc-devel-debuginfo-32bit-2.22-100.8.1 glibc-locale-32bit-2.22-100.8.1 glibc-locale-debuginfo-32bit-2.22-100.8.1 glibc-profile-32bit-2.22-100.8.1
- SUSE Linux Enterprise Server 12-SP4 (noarch):
glibc-html-2.22-100.8.1 glibc-i18ndata-2.22-100.8.1 glibc-info-2.22-100.8.1
- SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
glibc-2.22-100.8.1 glibc-32bit-2.22-100.8.1 glibc-debuginfo-2.22-100.8.1 glibc-debuginfo-32bit-2.22-100.8.1 glibc-debugsource-2.22-100.8.1 glibc-devel-2.22-100.8.1 glibc-devel-32bit-2.22-100.8.1 glibc-devel-debuginfo-2.22-100.8.1 glibc-devel-debuginfo-32bit-2.22-100.8.1 glibc-locale-2.22-100.8.1 glibc-locale-32bit-2.22-100.8.1 glibc-locale-debuginfo-2.22-100.8.1 glibc-locale-debuginfo-32bit-2.22-100.8.1 nscd-2.22-100.8.1 nscd-debuginfo-2.22-100.8.1
- SUSE Linux Enterprise Desktop 12-SP4 (noarch):
glibc-i18ndata-2.22-100.8.1
References:
https://www.suse.com/security/cve/CVE-2009-5155.html https://www.suse.com/security/cve/CVE-2016-10739.html https://www.suse.com/security/cve/CVE-2019-9169.html https://bugzilla.suse.com/1100396 https://bugzilla.suse.com/1110661 https://bugzilla.suse.com/1122729 https://bugzilla.suse.com/1127223 https://bugzilla.suse.com/1127308 https://bugzilla.suse.com/1128574 https://bugzilla.suse.com/1131994
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|