{"affected":[{"ecosystem_specific":{"binaries":[{"glibc-devel-static":"2.22-114.12.1","glibc-info":"2.22-114.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-114.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-114.12.1","glibc-32bit":"2.22-114.12.1","glibc-devel":"2.22-114.12.1","glibc-devel-32bit":"2.22-114.12.1","glibc-html":"2.22-114.12.1","glibc-i18ndata":"2.22-114.12.1","glibc-info":"2.22-114.12.1","glibc-locale":"2.22-114.12.1","glibc-locale-32bit":"2.22-114.12.1","glibc-profile":"2.22-114.12.1","glibc-profile-32bit":"2.22-114.12.1","nscd":"2.22-114.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-114.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"glibc":"2.22-114.12.1","glibc-32bit":"2.22-114.12.1","glibc-devel":"2.22-114.12.1","glibc-devel-32bit":"2.22-114.12.1","glibc-html":"2.22-114.12.1","glibc-i18ndata":"2.22-114.12.1","glibc-info":"2.22-114.12.1","glibc-locale":"2.22-114.12.1","glibc-locale-32bit":"2.22-114.12.1","glibc-profile":"2.22-114.12.1","glibc-profile-32bit":"2.22-114.12.1","nscd":"2.22-114.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"glibc","purl":"pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.22-114.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for glibc fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2021-35942: wordexp: Fixed handle overflow in positional parameter number (bsc#1187911)\n- CVE-2016-10228: Rewrite iconv option parsing (bsc#1027496)\n\nOther fixes:\n\n- Fixed race in pthread_mutex_lock while promoting to PTHREAD_MUTEX_ELISION_NP (bsc#1131330)\n","id":"SUSE-SU-2021:2480-1","modified":"2021-07-27T11:47:31Z","published":"2021-07-27T11:47:31Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20212480-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1131330"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-10228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-35942"}],"related":["CVE-2016-10228","CVE-2021-35942"],"summary":"Security update for glibc","upstream":["CVE-2016-10228","CVE-2021-35942"]}