Описание
Security update for glibc
This update for glibc fixes the following issues:
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
Список пакетов
Container suse/sles12sp3:latest
HPE Helion OpenStack 8
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud Crowbar 8
Ссылки
- Link for SUSE-SU-2022:0909-1
- E-Mail link for SUSE-SU-2022:0909-1
- SUSE Security Ratings
- SUSE Bug 1194640
- SUSE Bug 1194768
- SUSE Bug 1194770
- SUSE CVE CVE-2021-3999 page
- SUSE CVE CVE-2022-23218 page
- SUSE CVE CVE-2022-23219 page
Описание
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Затронутые продукты
Ссылки
- CVE-2021-3999
- SUSE Bug 1194640
- SUSE Bug 1196024
- SUSE Bug 1196389
- SUSE Bug 1199869
- SUSE Bug 1200203
Описание
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
Затронутые продукты
Ссылки
- CVE-2022-23218
- SUSE Bug 1194770
- SUSE Bug 1199869
- SUSE Bug 1200036
Описание
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
Затронутые продукты
Ссылки
- CVE-2022-23219
- SUSE Bug 1194768
- SUSE Bug 1199869
- SUSE Bug 1200036