SUSE-CU-2020:103-1: Security update of suse/sles12sp4

sle-security-updates at sle-security-updates at
Wed Apr 1 03:30:26 MDT 2020

SUSE Container Update Advisory: suse/sles12sp4
Container Advisory ID : SUSE-CU-2020:103-1
Container Tags        : suse/sles12sp4:26.162 , suse/sles12sp4:latest
Container Release     : 26.162
Severity              : important
Type                  : security
References            : 1149332 1157893 1158996 1165784 1165915 1165919 1166510 1167631
                        CVE-2020-10029 CVE-2020-1751 CVE-2020-1752 

The container suse/sles12sp4 was updated. The following patches have been included in this update:

Advisory ID: SUSE-RU-2020:786-1
Released:    Wed Mar 25 06:47:18 2020
Summary:     Recommended update for p11-kit
Type:        recommended
Severity:    moderate
References:  1165915,1165919
This update for p11-kit fixes the following issues:

- tag this version with 'p11-kit-tools-supports-CKA_NSS_MOZILLA_CA_POLICY'
  provides so we can pull it in. (bsc#1165915 bsc#1165919)

Advisory ID: SUSE-RU-2020:822-1
Released:    Tue Mar 31 13:06:24 2020
Summary:     Recommended update for pam
Type:        recommended
Severity:    moderate
References:  1166510
This update for pam fixes the following issues:

- Moved pam_userdb to a separate package pam-extra  (bsc#1166510)

Advisory ID: SUSE-SU-2020:832-1
Released:    Tue Mar 31 16:15:59 2020
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1149332,1157893,1158996,1165784,1167631,CVE-2020-10029,CVE-2020-1751,CVE-2020-1752
This update for glibc fixes the following issues:

- CVE-2020-1752: Fixed a use after free in glob which could have allowed
  a local attacker to create a specially crafted path that, when processed 
  by the glob function, could potentially have led to arbitrary code execution
- CVE-2020-1751: Fixed an array overflow in backtrace for PowerPC (bsc#1158996).
- CVE-2020-10029: Fixed a stack buffer overflow during range reduction (bsc#1165784).
- Use 'posix_spawn' on popen preventing crash caused by 'subprocess'. (bsc#1149332, BZ #22834)
- Fix handling of needles crossing a page, preventing incorrect results to return during the cross page boundary search. (bsc#1157893, BZ #25226)

More information about the sle-security-updates mailing list