Bugzilla – Bug 1186229
VUL-0: CVE-2021-3200: libsolv: buffer overflow via the Solver * testcase_read()
Last modified: 2021-06-28 19:20:07 UTC
CVE-2021-3200 Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3200 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3200 https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-2334 https://github.com/openSUSE/libsolv/issues/416
Seems to be only still relevant for: - SUSE:SLE-12-SP2:Update/libsolv - SUSE:SLE-12-SP3:Update/libsolv Fixed in all other codestreams.
Michael?
@Robert: "all other codestreams" means Code-15, right? According to our sheets, we submitted libsolv-0.6.36 to SLE-12-SP2/../SP5 on Jun 27 2019. So either all SLE12 should be affected or something's still in maintenance.
Sorry for the late response. (In reply to Michael Andres from comment #3) > @Robert: "all other codestreams" means Code-15, right? yes > According to our sheets, we submitted libsolv-0.6.36 to SLE-12-SP2/../SP5 on > Jun 27 2019. So either all SLE12 should be affected or something's still in > maintenance. SLE-12-SP2 and SLE-12-SP3 were missing when I looked at this, SLE-12-SP1 is EOL
Submission of libsolv-0.6.37 on 2021-06-02 should fix the issue.
SUSE-SU-2021:2145-1: An update that fixes two vulnerabilities, contains one feature is now available. Category: security (moderate) Bug References: 1161510,1186229 CVE References: CVE-2019-20387,CVE-2021-3200 JIRA References: SLE-17973 Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): libsolv-0.6.37-2.27.24.1, libzypp-16.21.4-27.75.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:2180-1: An update that fixes two vulnerabilities, contains one feature is now available. Category: security (important) Bug References: 1161510,1186229 CVE References: CVE-2019-20387,CVE-2021-3200 JIRA References: SLE-17973 Sources used: SUSE OpenStack Cloud Crowbar 9 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE OpenStack Cloud Crowbar 8 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE OpenStack Cloud 9 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE OpenStack Cloud 8 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE Linux Enterprise Server 12-SP5 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 HPE Helion Openstack 8 (src): libsolv-0.6.37-2.33.1, libzypp-16.21.4-2.51.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.