SUSE: 2020:0832-1 important: glibc

    Date 31 Mar 2020
    234
    Posted By LinuxSecurity Advisories
    An update that solves three vulnerabilities and has two fixes is now available.
    
       SUSE Security Update: Security update for glibc
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2020:0832-1
    Rating:             important
    References:         #1149332 #1157893 #1158996 #1165784 #1167631 
                        
    Cross-References:   CVE-2020-10029 CVE-2020-1751 CVE-2020-1752
                       
    Affected Products:
                        SUSE Linux Enterprise Software Development Kit 12-SP5
                        SUSE Linux Enterprise Software Development Kit 12-SP4
                        SUSE Linux Enterprise Server 12-SP5
                        SUSE Linux Enterprise Server 12-SP4
    ______________________________________________________________________________
    
       An update that solves three vulnerabilities and has two
       fixes is now available.
    
    Description:
    
       This update for glibc fixes the following issues:
    
       - CVE-2020-1752: Fixed a use after free in glob which could have allowed a
         local attacker to create a specially crafted path that, when processed
         by the glob function, could potentially have led to arbitrary code
         execution (bsc#1167631).
       - CVE-2020-1751: Fixed an array overflow in backtrace for PowerPC
         (bsc#1158996).
       - CVE-2020-10029: Fixed a stack buffer overflow during range reduction
         (bsc#1165784).
       - Use 'posix_spawn' on popen preventing crash caused by 'subprocess'.
         (bsc#1149332, BZ #22834)
       - Fix handling of needles crossing a page, preventing incorrect results to
         return during the cross page boundary search. (bsc#1157893, BZ #25226)
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Software Development Kit 12-SP5:
    
          zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-832=1
    
       - SUSE Linux Enterprise Software Development Kit 12-SP4:
    
          zypper in -t patch SUSE-SLE-SDK-12-SP4-2020-832=1
    
       - SUSE Linux Enterprise Server 12-SP5:
    
          zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-832=1
    
       - SUSE Linux Enterprise Server 12-SP4:
    
          zypper in -t patch SUSE-SLE-SERVER-12-SP4-2020-832=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
    
          glibc-debuginfo-2.22-100.21.5
          glibc-debugsource-2.22-100.21.5
          glibc-devel-static-2.22-100.21.5
    
       - SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch):
    
          glibc-info-2.22-100.21.5
    
       - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):
    
          glibc-debuginfo-2.22-100.21.5
          glibc-debugsource-2.22-100.21.5
          glibc-devel-static-2.22-100.21.5
    
       - SUSE Linux Enterprise Software Development Kit 12-SP4 (noarch):
    
          glibc-info-2.22-100.21.5
    
       - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    
          glibc-2.22-100.21.5
          glibc-debuginfo-2.22-100.21.5
          glibc-debugsource-2.22-100.21.5
          glibc-devel-2.22-100.21.5
          glibc-devel-debuginfo-2.22-100.21.5
          glibc-locale-2.22-100.21.5
          glibc-locale-debuginfo-2.22-100.21.5
          glibc-profile-2.22-100.21.5
          nscd-2.22-100.21.5
          nscd-debuginfo-2.22-100.21.5
    
       - SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):
    
          glibc-32bit-2.22-100.21.5
          glibc-debuginfo-32bit-2.22-100.21.5
          glibc-devel-32bit-2.22-100.21.5
          glibc-devel-debuginfo-32bit-2.22-100.21.5
          glibc-locale-32bit-2.22-100.21.5
          glibc-locale-debuginfo-32bit-2.22-100.21.5
          glibc-profile-32bit-2.22-100.21.5
    
       - SUSE Linux Enterprise Server 12-SP5 (noarch):
    
          glibc-html-2.22-100.21.5
          glibc-i18ndata-2.22-100.21.5
          glibc-info-2.22-100.21.5
    
       - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
    
          glibc-2.22-100.21.5
          glibc-debuginfo-2.22-100.21.5
          glibc-debugsource-2.22-100.21.5
          glibc-devel-2.22-100.21.5
          glibc-devel-debuginfo-2.22-100.21.5
          glibc-locale-2.22-100.21.5
          glibc-locale-debuginfo-2.22-100.21.5
          glibc-profile-2.22-100.21.5
          nscd-2.22-100.21.5
          nscd-debuginfo-2.22-100.21.5
    
       - SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):
    
          glibc-32bit-2.22-100.21.5
          glibc-debuginfo-32bit-2.22-100.21.5
          glibc-devel-32bit-2.22-100.21.5
          glibc-devel-debuginfo-32bit-2.22-100.21.5
          glibc-locale-32bit-2.22-100.21.5
          glibc-locale-debuginfo-32bit-2.22-100.21.5
          glibc-profile-32bit-2.22-100.21.5
    
       - SUSE Linux Enterprise Server 12-SP4 (noarch):
    
          glibc-html-2.22-100.21.5
          glibc-i18ndata-2.22-100.21.5
          glibc-info-2.22-100.21.5
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2020-10029.html
       https://www.suse.com/security/cve/CVE-2020-1751.html
       https://www.suse.com/security/cve/CVE-2020-1752.html
       https://bugzilla.suse.com/1149332
       https://bugzilla.suse.com/1157893
       https://bugzilla.suse.com/1158996
       https://bugzilla.suse.com/1165784
       https://bugzilla.suse.com/1167631
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://lists.suse.com/mailman/listinfo/sle-security-updates
    

    LinuxSecurity Poll

    Do you agree with Linus Torvalds' decision to reject the controversial patch mitigating the Snoop attack on Intel CPUs?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/28-do-you-agree-with-linus-torvalds-decision-to-reject-the-controversial-patch-mitigating-the-snoop-attack-on-intel-cpus?task=poll.vote&format=json
    28
    radio
    [{"id":"100","title":"Yes - this was undoubtedly the right decision.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"101","title":"Not sure...","votes":"1","type":"x","order":"2","pct":100,"resources":[]},{"id":"102","title":"No - he made a big mistake here.","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.