{"affected":[{"ecosystem_specific":{"binaries":[{"glibc":"2.26-lp152.26.12.1","glibc-32bit":"2.26-lp152.26.12.1","glibc-devel":"2.26-lp152.26.12.1","glibc-devel-32bit":"2.26-lp152.26.12.1","glibc-devel-static":"2.26-lp152.26.12.1","glibc-devel-static-32bit":"2.26-lp152.26.12.1","glibc-extra":"2.26-lp152.26.12.1","glibc-html":"2.26-lp152.26.12.1","glibc-i18ndata":"2.26-lp152.26.12.1","glibc-info":"2.26-lp152.26.12.1","glibc-locale":"2.26-lp152.26.12.1","glibc-locale-base":"2.26-lp152.26.12.1","glibc-locale-base-32bit":"2.26-lp152.26.12.1","glibc-profile":"2.26-lp152.26.12.1","glibc-profile-32bit":"2.26-lp152.26.12.1","glibc-utils":"2.26-lp152.26.12.1","glibc-utils-32bit":"2.26-lp152.26.12.1","nscd":"2.26-lp152.26.12.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"glibc","purl":"pkg:rpm/opensuse/glibc&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.26-lp152.26.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.26-lp152.26.12.1","glibc-32bit":"2.26-lp152.26.12.1","glibc-devel":"2.26-lp152.26.12.1","glibc-devel-32bit":"2.26-lp152.26.12.1","glibc-devel-static":"2.26-lp152.26.12.1","glibc-devel-static-32bit":"2.26-lp152.26.12.1","glibc-extra":"2.26-lp152.26.12.1","glibc-html":"2.26-lp152.26.12.1","glibc-i18ndata":"2.26-lp152.26.12.1","glibc-info":"2.26-lp152.26.12.1","glibc-locale":"2.26-lp152.26.12.1","glibc-locale-base":"2.26-lp152.26.12.1","glibc-locale-base-32bit":"2.26-lp152.26.12.1","glibc-profile":"2.26-lp152.26.12.1","glibc-profile-32bit":"2.26-lp152.26.12.1","glibc-utils":"2.26-lp152.26.12.1","glibc-utils-32bit":"2.26-lp152.26.12.1","nscd":"2.26-lp152.26.12.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"glibc-testsuite-src","purl":"pkg:rpm/opensuse/glibc-testsuite-src&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.26-lp152.26.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for glibc fixes the following issues:\n\n\n- libio: do not attempt to free wide buffers of legacy streams (bsc#1183085) \n- CVE-2016-10228: Rewrite iconv option parsing to fix security issue (bsc#1027496)\n\nThis update was imported from the SUSE:SLE-15:Update update project.","id":"openSUSE-SU-2021:1560-1","modified":"2021-12-10T11:06:35Z","published":"2021-12-10T11:06:35Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LDTHO3OJZ2XD7I3ONIRIUSKEMP42OY2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1183085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10228"}],"related":["CVE-2016-10228"],"summary":"Security update for glibc","upstream":["CVE-2016-10228"]}