SUSE-SU-2019:1102-1: moderate: Security update for glibc

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Apr 30 07:09:28 MDT 2019


   SUSE Security Update: Security update for glibc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:1102-1
Rating:             moderate
References:         #1100396 #1110661 #1122729 #1127223 #1127308 
                    #1128574 #1131994 
Cross-References:   CVE-2009-5155 CVE-2016-10739 CVE-2019-9169
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP4
                    SUSE Linux Enterprise Server 12-SP4
                    SUSE Linux Enterprise Desktop 12-SP4
______________________________________________________________________________

   An update that solves three vulnerabilities and has four
   fixes is now available.

Description:

   This update for glibc fixes the following issues:

   Security issues fixed:

   - CVE-2019-9169: regex: fix read overrun (bsc#1127308, BZ #24114)
   - CVE-2016-10739: Fully parse IPv4 address strings (bsc#1122729, BZ #20018)
   - CVE-2009-5155: ERE '0|()0|\1|0' causes regexec undefined behavior
     (bsc#1127223, BZ #18986)

   Non-security issues fixed:

   - Enable TLE only if GLIBC_ELISION_ENABLE=yes is defined (bsc#1131994,
     fate#322271)
   - Add more checks for valid ld.so.cache file (bsc#1110661, BZ #18093)
   - Added cfi information for start routines in order to stop unwinding
     (bsc#1128574)
   - ja_JP locale: Add entry for the new Japanese era (bsc#1100396,
     fate#325570, BZ #22964)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP4:

      zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1102=1

   - SUSE Linux Enterprise Server 12-SP4:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1102=1

   - SUSE Linux Enterprise Desktop 12-SP4:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1102=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):

      glibc-debuginfo-2.22-100.8.1
      glibc-debugsource-2.22-100.8.1
      glibc-devel-static-2.22-100.8.1

   - SUSE Linux Enterprise Software Development Kit 12-SP4 (noarch):

      glibc-info-2.22-100.8.1

   - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

      glibc-2.22-100.8.1
      glibc-debuginfo-2.22-100.8.1
      glibc-debugsource-2.22-100.8.1
      glibc-devel-2.22-100.8.1
      glibc-devel-debuginfo-2.22-100.8.1
      glibc-locale-2.22-100.8.1
      glibc-locale-debuginfo-2.22-100.8.1
      glibc-profile-2.22-100.8.1
      nscd-2.22-100.8.1
      nscd-debuginfo-2.22-100.8.1

   - SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):

      glibc-32bit-2.22-100.8.1
      glibc-debuginfo-32bit-2.22-100.8.1
      glibc-devel-32bit-2.22-100.8.1
      glibc-devel-debuginfo-32bit-2.22-100.8.1
      glibc-locale-32bit-2.22-100.8.1
      glibc-locale-debuginfo-32bit-2.22-100.8.1
      glibc-profile-32bit-2.22-100.8.1

   - SUSE Linux Enterprise Server 12-SP4 (noarch):

      glibc-html-2.22-100.8.1
      glibc-i18ndata-2.22-100.8.1
      glibc-info-2.22-100.8.1

   - SUSE Linux Enterprise Desktop 12-SP4 (x86_64):

      glibc-2.22-100.8.1
      glibc-32bit-2.22-100.8.1
      glibc-debuginfo-2.22-100.8.1
      glibc-debuginfo-32bit-2.22-100.8.1
      glibc-debugsource-2.22-100.8.1
      glibc-devel-2.22-100.8.1
      glibc-devel-32bit-2.22-100.8.1
      glibc-devel-debuginfo-2.22-100.8.1
      glibc-devel-debuginfo-32bit-2.22-100.8.1
      glibc-locale-2.22-100.8.1
      glibc-locale-32bit-2.22-100.8.1
      glibc-locale-debuginfo-2.22-100.8.1
      glibc-locale-debuginfo-32bit-2.22-100.8.1
      nscd-2.22-100.8.1
      nscd-debuginfo-2.22-100.8.1

   - SUSE Linux Enterprise Desktop 12-SP4 (noarch):

      glibc-i18ndata-2.22-100.8.1


References:

   https://www.suse.com/security/cve/CVE-2009-5155.html
   https://www.suse.com/security/cve/CVE-2016-10739.html
   https://www.suse.com/security/cve/CVE-2019-9169.html
   https://bugzilla.suse.com/1100396
   https://bugzilla.suse.com/1110661
   https://bugzilla.suse.com/1122729
   https://bugzilla.suse.com/1127223
   https://bugzilla.suse.com/1127308
   https://bugzilla.suse.com/1128574
   https://bugzilla.suse.com/1131994



More information about the sle-updates mailing list