{"affected":[{"ecosystem_specific":{"binaries":[{"glibc-devel-static":"2.22-100.21.5","glibc-info":"2.22-100.21.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP4","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-100.21.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc-devel-static":"2.22-100.21.5","glibc-info":"2.22-100.21.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-100.21.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-100.21.5","glibc-32bit":"2.22-100.21.5","glibc-devel":"2.22-100.21.5","glibc-devel-32bit":"2.22-100.21.5","glibc-html":"2.22-100.21.5","glibc-i18ndata":"2.22-100.21.5","glibc-info":"2.22-100.21.5","glibc-locale":"2.22-100.21.5","glibc-locale-32bit":"2.22-100.21.5","glibc-profile":"2.22-100.21.5","glibc-profile-32bit":"2.22-100.21.5","nscd":"2.22-100.21.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-100.21.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-100.21.5","glibc-32bit":"2.22-100.21.5","glibc-devel":"2.22-100.21.5","glibc-devel-32bit":"2.22-100.21.5","glibc-html":"2.22-100.21.5","glibc-i18ndata":"2.22-100.21.5","glibc-info":"2.22-100.21.5","glibc-locale":"2.22-100.21.5","glibc-locale-32bit":"2.22-100.21.5","glibc-profile":"2.22-100.21.5","glibc-profile-32bit":"2.22-100.21.5","nscd":"2.22-100.21.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-100.21.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-100.21.5","glibc-32bit":"2.22-100.21.5","glibc-devel":"2.22-100.21.5","glibc-devel-32bit":"2.22-100.21.5","glibc-html":"2.22-100.21.5","glibc-i18ndata":"2.22-100.21.5","glibc-info":"2.22-100.21.5","glibc-locale":"2.22-100.21.5","glibc-locale-32bit":"2.22-100.21.5","glibc-profile":"2.22-100.21.5","glibc-profile-32bit":"2.22-100.21.5","nscd":"2.22-100.21.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-100.21.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-100.21.5","glibc-32bit":"2.22-100.21.5","glibc-devel":"2.22-100.21.5","glibc-devel-32bit":"2.22-100.21.5","glibc-html":"2.22-100.21.5","glibc-i18ndata":"2.22-100.21.5","glibc-info":"2.22-100.21.5","glibc-locale":"2.22-100.21.5","glibc-locale-32bit":"2.22-100.21.5","glibc-profile":"2.22-100.21.5","glibc-profile-32bit":"2.22-100.21.5","nscd":"2.22-100.21.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-100.21.5"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glibc fixes the following issues:\n\n- CVE-2020-1752: Fixed a use after free in glob which could have allowed\n  a local attacker to create a specially crafted path that, when processed \n  by the glob function, could potentially have led to arbitrary code execution\n  (bsc#1167631).\n- CVE-2020-1751: Fixed an array overflow in backtrace for PowerPC (bsc#1158996).\n- CVE-2020-10029: Fixed a stack buffer overflow during range reduction (bsc#1165784).\n- Use 'posix_spawn' on popen preventing crash caused by 'subprocess'. (bsc#1149332, BZ #22834)\n- Fix handling of needles crossing a page, preventing incorrect results to return during the cross page boundary search. (bsc#1157893, BZ #25226)\n","id":"SUSE-SU-2020:0832-1","modified":"2020-03-31T14:16:11Z","published":"2020-03-31T14:16:11Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20200832-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1158996"},{"type":"REPORT","url":"https://bugzilla.suse.com/1165784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10029"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-1751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-1752"}],"related":["CVE-2020-10029","CVE-2020-1751","CVE-2020-1752"],"summary":"Security update for glibc","upstream":["CVE-2020-10029","CVE-2020-1751","CVE-2020-1752"]}