Security update for glibc
This update for glibc fixes the following issues:
- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)
- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)
- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)
- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)
- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)
- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)
This update was imported from the SUSE:SLE-15:Update update project.
-
Submitted by
Andreas Schwab (Andreas_Schwab)
Fixed bugs
bnc#1181505
VUL-0: CVE-2021-3326: glibc: iconv crash with ISO-2022-JP-3 which affects e.g. mutt
bnc#1178386
VUL-1: CVE-2020-27618: glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop
bnc#1180038
SLES 12 SP5 - glibc __get_nprocs parses "/sys/devices/system/cpu/online" incorrectly. (L3:)
bnc#1182117
VUL-0: CVE-2019-25013: glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding
bnc#1179694
VUL-1: CVE-2020-29562: glibc: iconv fails an assertion in the code path and aborts the program when converting UCS4 text containing an irreversible character
bnc#1179721
VUL-0: CVE-2020-29573: glibc: stack-based buffer overflow in printf on i386 targets via non-canonical 80-bit floating point values