SUSE-SU-2019:1102-1: moderate: Security update for glibc
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Tue Apr 30 07:09:28 MDT 2019
SUSE Security Update: Security update for glibc
______________________________________________________________________________
Announcement ID: SUSE-SU-2019:1102-1
Rating: moderate
References: #1100396 #1110661 #1122729 #1127223 #1127308
#1128574 #1131994
Cross-References: CVE-2009-5155 CVE-2016-10739 CVE-2019-9169
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Desktop 12-SP4
______________________________________________________________________________
An update that solves three vulnerabilities and has four
fixes is now available.
Description:
This update for glibc fixes the following issues:
Security issues fixed:
- CVE-2019-9169: regex: fix read overrun (bsc#1127308, BZ #24114)
- CVE-2016-10739: Fully parse IPv4 address strings (bsc#1122729, BZ #20018)
- CVE-2009-5155: ERE '0|()0|\1|0' causes regexec undefined behavior
(bsc#1127223, BZ #18986)
Non-security issues fixed:
- Enable TLE only if GLIBC_ELISION_ENABLE=yes is defined (bsc#1131994,
fate#322271)
- Add more checks for valid ld.so.cache file (bsc#1110661, BZ #18093)
- Added cfi information for start routines in order to stop unwinding
(bsc#1128574)
- ja_JP locale: Add entry for the new Japanese era (bsc#1100396,
fate#325570, BZ #22964)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP4:
zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-1102=1
- SUSE Linux Enterprise Server 12-SP4:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-1102=1
- SUSE Linux Enterprise Desktop 12-SP4:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-1102=1
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):
glibc-debuginfo-2.22-100.8.1
glibc-debugsource-2.22-100.8.1
glibc-devel-static-2.22-100.8.1
- SUSE Linux Enterprise Software Development Kit 12-SP4 (noarch):
glibc-info-2.22-100.8.1
- SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):
glibc-2.22-100.8.1
glibc-debuginfo-2.22-100.8.1
glibc-debugsource-2.22-100.8.1
glibc-devel-2.22-100.8.1
glibc-devel-debuginfo-2.22-100.8.1
glibc-locale-2.22-100.8.1
glibc-locale-debuginfo-2.22-100.8.1
glibc-profile-2.22-100.8.1
nscd-2.22-100.8.1
nscd-debuginfo-2.22-100.8.1
- SUSE Linux Enterprise Server 12-SP4 (s390x x86_64):
glibc-32bit-2.22-100.8.1
glibc-debuginfo-32bit-2.22-100.8.1
glibc-devel-32bit-2.22-100.8.1
glibc-devel-debuginfo-32bit-2.22-100.8.1
glibc-locale-32bit-2.22-100.8.1
glibc-locale-debuginfo-32bit-2.22-100.8.1
glibc-profile-32bit-2.22-100.8.1
- SUSE Linux Enterprise Server 12-SP4 (noarch):
glibc-html-2.22-100.8.1
glibc-i18ndata-2.22-100.8.1
glibc-info-2.22-100.8.1
- SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
glibc-2.22-100.8.1
glibc-32bit-2.22-100.8.1
glibc-debuginfo-2.22-100.8.1
glibc-debuginfo-32bit-2.22-100.8.1
glibc-debugsource-2.22-100.8.1
glibc-devel-2.22-100.8.1
glibc-devel-32bit-2.22-100.8.1
glibc-devel-debuginfo-2.22-100.8.1
glibc-devel-debuginfo-32bit-2.22-100.8.1
glibc-locale-2.22-100.8.1
glibc-locale-32bit-2.22-100.8.1
glibc-locale-debuginfo-2.22-100.8.1
glibc-locale-debuginfo-32bit-2.22-100.8.1
nscd-2.22-100.8.1
nscd-debuginfo-2.22-100.8.1
- SUSE Linux Enterprise Desktop 12-SP4 (noarch):
glibc-i18ndata-2.22-100.8.1
References:
https://www.suse.com/security/cve/CVE-2009-5155.html
https://www.suse.com/security/cve/CVE-2016-10739.html
https://www.suse.com/security/cve/CVE-2019-9169.html
https://bugzilla.suse.com/1100396
https://bugzilla.suse.com/1110661
https://bugzilla.suse.com/1122729
https://bugzilla.suse.com/1127223
https://bugzilla.suse.com/1127308
https://bugzilla.suse.com/1128574
https://bugzilla.suse.com/1131994
More information about the sle-updates
mailing list