{"affected":[{"ecosystem_specific":{"binaries":[{"glibc":"2.26-lp150.11.17.1","glibc-32bit":"2.26-lp150.11.17.1","glibc-devel":"2.26-lp150.11.17.1","glibc-devel-32bit":"2.26-lp150.11.17.1","glibc-devel-static":"2.26-lp150.11.17.1","glibc-devel-static-32bit":"2.26-lp150.11.17.1","glibc-extra":"2.26-lp150.11.17.1","glibc-html":"2.26-lp150.11.17.1","glibc-i18ndata":"2.26-lp150.11.17.1","glibc-info":"2.26-lp150.11.17.1","glibc-locale":"2.26-lp150.11.17.1","glibc-locale-base":"2.26-lp150.11.17.1","glibc-locale-base-32bit":"2.26-lp150.11.17.1","glibc-profile":"2.26-lp150.11.17.1","glibc-profile-32bit":"2.26-lp150.11.17.1","glibc-utils":"2.26-lp150.11.17.1","glibc-utils-32bit":"2.26-lp150.11.17.1","nscd":"2.26-lp150.11.17.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.0","name":"glibc","purl":"pkg:rpm/opensuse/glibc&distro=openSUSE%20Leap%2015.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.26-lp150.11.17.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.26-lp150.11.17.1","glibc-32bit":"2.26-lp150.11.17.1","glibc-devel":"2.26-lp150.11.17.1","glibc-devel-32bit":"2.26-lp150.11.17.1","glibc-devel-static":"2.26-lp150.11.17.1","glibc-devel-static-32bit":"2.26-lp150.11.17.1","glibc-extra":"2.26-lp150.11.17.1","glibc-html":"2.26-lp150.11.17.1","glibc-i18ndata":"2.26-lp150.11.17.1","glibc-info":"2.26-lp150.11.17.1","glibc-locale":"2.26-lp150.11.17.1","glibc-locale-base":"2.26-lp150.11.17.1","glibc-locale-base-32bit":"2.26-lp150.11.17.1","glibc-profile":"2.26-lp150.11.17.1","glibc-profile-32bit":"2.26-lp150.11.17.1","glibc-utils":"2.26-lp150.11.17.1","glibc-utils-32bit":"2.26-lp150.11.17.1","nscd":"2.26-lp150.11.17.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.0","name":"glibc-testsuite-src","purl":"pkg:rpm/opensuse/glibc-testsuite-src&distro=openSUSE%20Leap%2015.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.26-lp150.11.17.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glibc fixes the following issues:\n\nSecurity issue fixed: \n\n- CVE-2016-10739: Fixed an improper implementation of getaddrinfo function which could allow\n  applications to incorrectly assume that had parsed a valid string, without the possibility of\n  embedded HTTP headers or other potentially dangerous substrings (bsc#1122729).\n\nOther issue fixed: \n\n- Fixed an issue where pthread_mutex_trylock did not use a correct order of instructions \n  while maintained the robust mutex list due to missing compiler barriers (bsc#1130045).\n- Added new Japanese Era name support (bsc#1100396).\n\nThis update was imported from the SUSE:SLE-15:Update update project.","id":"openSUSE-SU-2019:1250-1","modified":"2019-04-20T08:29:27Z","published":"2019-04-20T08:29:27Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEBZ42G23A4PRQRKKG425HHEGA3GK7EF/#SEBZ42G23A4PRQRKKG425HHEGA3GK7EF"},{"type":"REPORT","url":"https://bugzilla.suse.com/1100396"},{"type":"REPORT","url":"https://bugzilla.suse.com/1122729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1130045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10739"}],"related":["CVE-2016-10739"],"summary":"Security update for glibc","upstream":["CVE-2016-10739"]}