Описание
Security update for glibc
This update for glibc fixes the following issues:
Security issues fixed:
- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area (bsc#1074293)
Non security bugs fixed:
- Release read lock after resetting timeout (bsc#1073990)
Список пакетов
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP3
Ссылки
- Link for SUSE-SU-2018:0451-1
- E-Mail link for SUSE-SU-2018:0451-1
- SUSE Security Ratings
- SUSE Bug 1037930
- SUSE Bug 1051791
- SUSE Bug 1073990
- SUSE Bug 1074293
- SUSE Bug 1079036
- SUSE CVE CVE-2017-12132 page
- SUSE CVE CVE-2017-8804 page
- SUSE CVE CVE-2018-1000001 page
- SUSE CVE CVE-2018-6485 page
- SUSE CVE CVE-2018-6551 page
Описание
The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
Затронутые продукты
Ссылки
- CVE-2017-12132
- SUSE Bug 1051791
- SUSE Bug 1123874
Описание
The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references
Затронутые продукты
Ссылки
- CVE-2017-8804
- SUSE Bug 1037559
- SUSE Bug 1037930
Описание
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
Затронутые продукты
Ссылки
- CVE-2018-1000001
- SUSE Bug 1074293
- SUSE Bug 1099047
- SUSE Bug 1123874
Описание
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
Затронутые продукты
Ссылки
- CVE-2018-6485
- SUSE Bug 1079036
- SUSE Bug 1123874
Описание
The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
Затронутые продукты
Ссылки
- CVE-2018-6551
- SUSE Bug 1079036