|Category:||SuSE Local Security Checks|
|Title:||SuSE Update for glibc openSUSE-SU-2018:2159-1 (glibc)|
|Summary:||The remote host is missing an update for the 'glibc'; package(s) announced via the openSUSE-SU-2018:2159_1 advisory.|
The remote host is missing an update for the 'glibc'
package(s) announced via the openSUSE-SU-2018:2159_1 advisory.
This update for glibc fixes the following security issues:
- CVE-2017-18269: An SSE2-optimized memmove implementation for i386 did
not correctly perform the overlapping memory check if the source memory
range spaned the middle of the address space, resulting in corrupt data
being produced by the copy operation. This may have disclosed
information to context-dependent attackers, resulted in a denial of
service or code execution (bsc#1094150).
- CVE-2018-11236: Prevent integer overflow on 32-bit architectures when
processing very long pathname arguments to the realpath function,
leading to a stack-based buffer overflow (bsc#1094161).
- CVE-2018-11237: An AVX-512-optimized implementation of the mempcpy
function may have written data beyond the target buffer, leading to a
buffer overflow in __mempcpy_avx512_no_vzeroupper (bsc#1092877,
This update was imported from the SUSE:SLE-15:Update update project.
To install this openSUSE Security Update use the SUSE recommended
like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-788=1
glibc on openSUSE Leap 15.0.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2017-18269|
Common Vulnerability Exposure (CVE) ID: CVE-2018-11236
Common Vulnerability Exposure (CVE) ID: CVE-2018-11237
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.