Security update for glibc
Announcement ID: | SUSE-SU-2022:14923-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities can now be installed.
Description:
This update for glibc fixes the following issues:
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for "unix" (bsc#1194768, BZ #22542)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770, BZ #28768)
- CVE-2021-3999: Fixed in getcwd to set errno to ERANGE for size == 1 (bsc#1194640, BZ #28769)
- CVE-2015-8983: Fixed _IO_wstr_overflow integer overflow (bsc#1193615, BZ #17269)
- CVE-2015-8982: Fixed memory handling in strxfrm_l (bsc#1193616, BZ #16009)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-glibc-14923=1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
zypper in -t patch slessp4-glibc-14923=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-glibc-14923=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (nosrc i686 i586)
- glibc-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Point of Service 11 SP3 (i686 i586)
- glibc-devel-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- glibc-profile-2.11.3-17.110.40.1
- glibc-i18ndata-2.11.3-17.110.40.1
- glibc-html-2.11.3-17.110.40.1
- nscd-2.11.3-17.110.40.1
- glibc-locale-2.11.3-17.110.40.1
- glibc-info-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (s390x x86_64 i586 ppc64 i686 nosrc)
- glibc-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (s390x x86_64 i586 ppc64 i686)
- glibc-devel-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (ppc64 s390x x86_64 i586)
- glibc-profile-2.11.3-17.110.40.1
- glibc-i18ndata-2.11.3-17.110.40.1
- glibc-html-2.11.3-17.110.40.1
- nscd-2.11.3-17.110.40.1
- glibc-locale-2.11.3-17.110.40.1
- glibc-info-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (ppc64 s390x x86_64)
- glibc-32bit-2.11.3-17.110.40.1
- glibc-locale-32bit-2.11.3-17.110.40.1
- glibc-devel-32bit-2.11.3-17.110.40.1
- glibc-profile-32bit-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 i686 nosrc)
- glibc-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 i686)
- glibc-devel-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64 i586)
- glibc-profile-2.11.3-17.110.40.1
- glibc-i18ndata-2.11.3-17.110.40.1
- glibc-html-2.11.3-17.110.40.1
- nscd-2.11.3-17.110.40.1
- glibc-locale-2.11.3-17.110.40.1
- glibc-info-2.11.3-17.110.40.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64)
- glibc-32bit-2.11.3-17.110.40.1
- glibc-locale-32bit-2.11.3-17.110.40.1
- glibc-devel-32bit-2.11.3-17.110.40.1
- glibc-profile-32bit-2.11.3-17.110.40.1
References:
- https://www.suse.com/security/cve/CVE-2015-8982.html
- https://www.suse.com/security/cve/CVE-2015-8983.html
- https://www.suse.com/security/cve/CVE-2021-3999.html
- https://www.suse.com/security/cve/CVE-2022-23218.html
- https://www.suse.com/security/cve/CVE-2022-23219.html
- https://bugzilla.suse.com/show_bug.cgi?id=1193615
- https://bugzilla.suse.com/show_bug.cgi?id=1193616
- https://bugzilla.suse.com/show_bug.cgi?id=1194640
- https://bugzilla.suse.com/show_bug.cgi?id=1194768
- https://bugzilla.suse.com/show_bug.cgi?id=1194770