SUSE: 2020:0832-1 important: glibc
Summary
This update for glibc fixes the following issues: - CVE-2020-1752: Fixed a use after free in glob which could have allowed a local attacker to create a specially crafted path that, when processed by the glob function, could potentially have led to arbitrary code execution (bsc#1167631). - CVE-2020-1751: Fixed an array overflow in backtrace for PowerPC (bsc#1158996). - CVE-2020-10029: Fixed a stack buffer overflow during range reduction (bsc#1165784). - Use 'posix_spawn' on popen preventing crash caused by 'subprocess'. (bsc#1149332, BZ #22834) - Fix handling of needles crossing a page, preventing incorrect results to return during the cross page boundary search. (bsc#1157893, BZ #25226) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterp...
Read the Full AdvisoryReferences
#1149332 #1157893 #1158996 #1165784 #1167631
Cross- CVE-2020-10029 CVE-2020-1751 CVE-2020-1752
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Software Development Kit 12-SP4
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server 12-SP4
https://www.suse.com/security/cve/CVE-2020-10029.html
https://www.suse.com/security/cve/CVE-2020-1751.html
https://www.suse.com/security/cve/CVE-2020-1752.html
https://bugzilla.suse.com/1149332
https://bugzilla.suse.com/1157893
https://bugzilla.suse.com/1158996
https://bugzilla.suse.com/1165784
https://bugzilla.suse.com/1167631