SUSE: 2019:1102-1 moderate: glibc
Summary
This update for glibc fixes the following issues: Security issues fixed: - CVE-2019-9169: regex: fix read overrun (bsc#1127308, BZ #24114) - CVE-2016-10739: Fully parse IPv4 address strings (bsc#1122729, BZ #20018) - CVE-2009-5155: ERE '0|()0|\1|0' causes regexec undefined behavior (bsc#1127223, BZ #18986) Non-security issues fixed: - Enable TLE only if GLIBC_ELISION_ENABLE=yes is defined (bsc#1131994, fate#322271) - Add more checks for valid ld.so.cache file (bsc#1110661, BZ #18093) - Added cfi information for start routines in order to stop unwinding (bsc#1128574) - ja_JP locale: Add entry for the new Japanese era (bsc#1100396, fate#325570, BZ #22964) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP4: zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1102=1 - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1102=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1102=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64): glibc-debuginfo-2.22-100.8.1 glibc-debugsource-2.22-100.8.1 glibc-devel-static-2.22-100.8.1 - SUSE Linux Enterprise Software Development Kit 12-SP4 (noarch): glibc-info-2.22-100.8.1 - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64): glibc-2.22-100.8.1 glibc-debuginfo-2.22-100.8.1 glibc-debugsource-2.22-100.8.1 glibc-devel-2.22-100.8.1 glibc-devel-debuginfo-2.22-100.8.1 glibc-locale-2.22-100.8.1 glibc-locale-debuginfo-2.22-100.8.1 glibc-profile-2.22-100.8.1 nscd-2.22-100.8.1 nscd-debuginfo-2.22-100.8.1 - SUSE Linux Enterprise Server 12-SP4 (s390x x86_64): glibc-32bit-2.22-100.8.1 glibc-debuginfo-32bit-2.22-100.8.1 glibc-devel-32bit-2.22-100.8.1 glibc-devel-debuginfo-32bit-2.22-100.8.1 glibc-locale-32bit-2.22-100.8.1 glibc-locale-debuginfo-32bit-2.22-100.8.1 glibc-profile-32bit-2.22-100.8.1 - SUSE Linux Enterprise Server 12-SP4 (noarch): glibc-html-2.22-100.8.1 glibc-i18ndata-2.22-100.8.1 glibc-info-2.22-100.8.1 - SUSE Linux Enterprise Desktop 12-SP4 (x86_64): glibc-2.22-100.8.1 glibc-32bit-2.22-100.8.1 glibc-debuginfo-2.22-100.8.1 glibc-debuginfo-32bit-2.22-100.8.1 glibc-debugsource-2.22-100.8.1 glibc-devel-2.22-100.8.1 glibc-devel-32bit-2.22-100.8.1 glibc-devel-debuginfo-2.22-100.8.1 glibc-devel-debuginfo-32bit-2.22-100.8.1 glibc-locale-2.22-100.8.1 glibc-locale-32bit-2.22-100.8.1 glibc-locale-debuginfo-2.22-100.8.1 glibc-locale-debuginfo-32bit-2.22-100.8.1 nscd-2.22-100.8.1 nscd-debuginfo-2.22-100.8.1 - SUSE Linux Enterprise Desktop 12-SP4 (noarch): glibc-i18ndata-2.22-100.8.1
References
#1100396 #1110661 #1122729 #1127223 #1127308
#1128574 #1131994
Cross- CVE-2009-5155 CVE-2016-10739 CVE-2019-9169
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Desktop 12-SP4
https://www.suse.com/security/cve/CVE-2009-5155.html
https://www.suse.com/security/cve/CVE-2016-10739.html
https://www.suse.com/security/cve/CVE-2019-9169.html
https://bugzilla.suse.com/1100396
https://bugzilla.suse.com/1110661
https://bugzilla.suse.com/1122729
https://bugzilla.suse.com/1127223
https://bugzilla.suse.com/1127308
https://bugzilla.suse.com/1128574
https://bugzilla.suse.com/1131994