Описание
Security update for glibc
This update for glibc fixes the following issues:
Security issues fixed:
-
CVE-2020-29573: x86: printf was hardened against non-normal long double values (bsc#1179721, BZ #26649)
-
CVE-2021-3326: Fix assertion failure in gconv ISO-2022-JP-3 module (bsc#1181505, BZ #27256)
-
CVE-2019-25013: Fix buffer overrun in EUC-KR conversion module (bsc#1182117, BZ #24973)
-
CVE-2020-27618: Accept redundant shift sequences in IBM1364 iconv (bsc#1178386, BZ #26224)
-
CVE-2020-29562: Fix incorrect UCS4 inner loop bounds in iconv (bsc#1179694, BZ #26923)
-
Schedule nscd cache pruning more accurately from re-added values (bsc#1018158)
Список пакетов
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
Ссылки
- Link for SUSE-SU-2024:0759-1
- E-Mail link for SUSE-SU-2024:0759-1
- SUSE Security Ratings
- SUSE Bug 1018158
- SUSE Bug 1178386
- SUSE Bug 1179694
- SUSE Bug 1179721
- SUSE Bug 1181505
- SUSE Bug 1182117
- SUSE CVE CVE-2019-25013 page
- SUSE CVE CVE-2020-27618 page
- SUSE CVE CVE-2020-29562 page
- SUSE CVE CVE-2020-29573 page
- SUSE CVE CVE-2021-3326 page
Описание
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
Затронутые продукты
Ссылки
- CVE-2019-25013
- SUSE Bug 1182117
- SUSE Bug 1220988
Описание
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.
Затронутые продукты
Ссылки
- CVE-2020-27618
- SUSE Bug 1178386
- SUSE Bug 1220988
Описание
The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
Затронутые продукты
Ссылки
- CVE-2020-29562
- SUSE Bug 1179694
- SUSE Bug 1220988
Описание
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
Затронутые продукты
Ссылки
- CVE-2020-29573
- SUSE Bug 1179721
- SUSE Bug 1220988
Описание
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
Затронутые продукты
Ссылки
- CVE-2021-3326
- SUSE Bug 1181505
- SUSE Bug 1212283
- SUSE Bug 1220988