|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2019:0571-1 (file)

From:  <sle-security-updates@lists.suse.com>
To:  <sle-security-updates@lists.suse.com>
Subject:  SUSE-SU-2019:0571-1: moderate: Security update for file
Date:  Fri, 8 Mar 2019 00:09:49 +0100
Message-ID:  <20190307230949.0C52EFD4A@maintenance.suse.de>

SUSE Security Update: Security update for file ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:0571-1 Rating: moderate References: #1096974 #1096984 #1126117 #1126118 #1126119 Cross-References: CVE-2018-10360 CVE-2019-8905 CVE-2019-8906 CVE-2019-8907 Affected Products: SUSE Linux Enterprise Module for Development Tools 15 SUSE Linux Enterprise Module for Basesystem 15 ______________________________________________________________________________ An update that solves four vulnerabilities and has one errata is now available. Description: This update for file fixes the following issues: The following security vulnerabilities were addressed: - CVE-2018-10360: Fixed an out-of-bounds read in the function do_core_note in readelf.c, which allowed remote attackers to cause a denial of service (application crash) via a crafted ELF file (bsc#1096974) - CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c (bsc#1126118) - CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c (bsc#1126119) - CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c (bsc#1126117) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-2019-571=1 - SUSE Linux Enterprise Module for Basesystem 15: zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-571=1 Package List: - SUSE Linux Enterprise Module for Development Tools 15 (aarch64 ppc64le s390x x86_64): python3-magic-5.32-7.5.1 - SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64): file-5.32-7.5.1 file-debuginfo-5.32-7.5.1 file-debugsource-5.32-7.5.1 file-devel-5.32-7.5.1 libmagic1-5.32-7.5.1 libmagic1-debuginfo-5.32-7.5.1 python2-magic-5.32-7.5.1 - SUSE Linux Enterprise Module for Basesystem 15 (noarch): file-magic-5.32-7.5.1 - SUSE Linux Enterprise Module for Basesystem 15 (x86_64): libmagic1-32bit-5.32-7.5.1 libmagic1-32bit-debuginfo-5.32-7.5.1 References: https://www.suse.com/security/cve/CVE-2018-10360.html https://www.suse.com/security/cve/CVE-2019-8905.html https://www.suse.com/security/cve/CVE-2019-8906.html https://www.suse.com/security/cve/CVE-2019-8907.html https://bugzilla.suse.com/1096974 https://bugzilla.suse.com/1096984 https://bugzilla.suse.com/1126117 https://bugzilla.suse.com/1126118 https://bugzilla.suse.com/1126119 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds