{"affected":[{"ecosystem_specific":{"binaries":[{"glibc":"2.19-40.9.5","glibc-32bit":"2.19-40.9.5","glibc-devel":"2.19-40.9.5","glibc-devel-32bit":"2.19-40.9.5","glibc-html":"2.19-40.9.5","glibc-i18ndata":"2.19-40.9.5","glibc-info":"2.19-40.9.5","glibc-locale":"2.19-40.9.5","glibc-locale-32bit":"2.19-40.9.5","glibc-profile":"2.19-40.9.5","glibc-profile-32bit":"2.19-40.9.5","nscd":"2.19-40.9.5"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20OpenStack%20Cloud%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.19-40.9.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.19-40.9.5","glibc-32bit":"2.19-40.9.5","glibc-devel":"2.19-40.9.5","glibc-devel-32bit":"2.19-40.9.5","glibc-html":"2.19-40.9.5","glibc-i18ndata":"2.19-40.9.5","glibc-info":"2.19-40.9.5","glibc-locale":"2.19-40.9.5","glibc-locale-32bit":"2.19-40.9.5","glibc-profile":"2.19-40.9.5","glibc-profile-32bit":"2.19-40.9.5","nscd":"2.19-40.9.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.19-40.9.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.19-40.9.5","glibc-32bit":"2.19-40.9.5","glibc-devel":"2.19-40.9.5","glibc-devel-32bit":"2.19-40.9.5","glibc-html":"2.19-40.9.5","glibc-i18ndata":"2.19-40.9.5","glibc-info":"2.19-40.9.5","glibc-locale":"2.19-40.9.5","glibc-locale-32bit":"2.19-40.9.5","glibc-profile":"2.19-40.9.5","glibc-profile-32bit":"2.19-40.9.5","nscd":"2.19-40.9.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1-LTSS","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.19-40.9.5"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glibc fixes the following issues:\n\n- A privilege escalation bug in the realpath() function has been fixed.\n  [CVE-2018-1000001, bsc#1074293]\n","id":"SUSE-SU-2018:0071-1","modified":"2018-01-12T08:46:45Z","published":"2018-01-12T08:46:45Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20180071-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1074293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-1000001"}],"related":["CVE-2018-1000001"],"summary":"Security update for glibc","upstream":["CVE-2018-1000001"]}