{"affected":[{"ecosystem_specific":{"binaries":[{"hawk2":"2.3.0+git.1603969748.10468582-3.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15","name":"hawk2","purl":"pkg:rpm/suse/hawk2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.3.0+git.1603969748.10468582-3.18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"hawk2":"2.3.0+git.1603969748.10468582-3.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP1","name":"hawk2","purl":"pkg:rpm/suse/hawk2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.3.0+git.1603969748.10468582-3.18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"hawk2":"2.3.0+git.1603969748.10468582-3.18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP2","name":"hawk2","purl":"pkg:rpm/suse/hawk2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.3.0+git.1603969748.10468582-3.18.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for hawk2 fixes the following security issue:\n\n- CVE-2020-35458: Fixed an insufficient input handler that could have led to remote code execution (bsc#1179998).\n","id":"SUSE-SU-2021:0088-1","modified":"2021-01-12T13:33:48Z","published":"2021-01-12T13:33:48Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20210088-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-35458"}],"related":["CVE-2020-35458"],"summary":"Security update for hawk2","upstream":["CVE-2020-35458"]}