{"affected":[{"ecosystem_specific":{"binaries":[{"hawk2":"2.4.0+git.1607523195.05cd3222-3.21.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP4","name":"hawk2","purl":"pkg:rpm/suse/hawk2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.0+git.1607523195.05cd3222-3.21.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"hawk2":"2.4.0+git.1607523195.05cd3222-3.21.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 12 SP5","name":"hawk2","purl":"pkg:rpm/suse/hawk2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.0+git.1607523195.05cd3222-3.21.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for hawk2 fixes the following security issue:\n\n- CVE-2020-35458: Fixed an insufficient input handler that could have led to remote code execution (bsc#1179998).\n","id":"SUSE-SU-2021:0089-1","modified":"2021-01-12T13:34:06Z","published":"2021-01-12T13:34:06Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20210089-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-35458"}],"related":["CVE-2020-35458"],"summary":"Security update for hawk2","upstream":["CVE-2020-35458"]}