SUSE-CU-2020:103-1: Security update of suse/sles12sp4
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Apr 1 03:30:26 MDT 2020
SUSE Container Update Advisory: suse/sles12sp4
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2020:103-1
Container Tags : suse/sles12sp4:26.162 , suse/sles12sp4:latest
Container Release : 26.162
Severity : important
Type : security
References : 1149332 1157893 1158996 1165784 1165915 1165919 1166510 1167631
CVE-2020-10029 CVE-2020-1751 CVE-2020-1752
-----------------------------------------------------------------
The container suse/sles12sp4 was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:786-1
Released: Wed Mar 25 06:47:18 2020
Summary: Recommended update for p11-kit
Type: recommended
Severity: moderate
References: 1165915,1165919
This update for p11-kit fixes the following issues:
- tag this version with 'p11-kit-tools-supports-CKA_NSS_MOZILLA_CA_POLICY'
provides so we can pull it in. (bsc#1165915 bsc#1165919)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:822-1
Released: Tue Mar 31 13:06:24 2020
Summary: Recommended update for pam
Type: recommended
Severity: moderate
References: 1166510
This update for pam fixes the following issues:
- Moved pam_userdb to a separate package pam-extra (bsc#1166510)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2020:832-1
Released: Tue Mar 31 16:15:59 2020
Summary: Security update for glibc
Type: security
Severity: important
References: 1149332,1157893,1158996,1165784,1167631,CVE-2020-10029,CVE-2020-1751,CVE-2020-1752
This update for glibc fixes the following issues:
- CVE-2020-1752: Fixed a use after free in glob which could have allowed
a local attacker to create a specially crafted path that, when processed
by the glob function, could potentially have led to arbitrary code execution
(bsc#1167631).
- CVE-2020-1751: Fixed an array overflow in backtrace for PowerPC (bsc#1158996).
- CVE-2020-10029: Fixed a stack buffer overflow during range reduction (bsc#1165784).
- Use 'posix_spawn' on popen preventing crash caused by 'subprocess'. (bsc#1149332, BZ #22834)
- Fix handling of needles crossing a page, preventing incorrect results to return during the cross page boundary search. (bsc#1157893, BZ #25226)
More information about the sle-security-updates
mailing list