<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">glibc-2.34-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10792</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">glibc-2.34-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the glibc-2.34-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10792</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10792</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-5064/</URL>
      <Description>SUSE CVE CVE-2009-5064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-5155/</URL>
      <Description>SUSE CVE CVE-2009-5155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3192/</URL>
      <Description>SUSE CVE CVE-2010-3192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5180/</URL>
      <Description>SUSE CVE CVE-2015-5180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10228/</URL>
      <Description>SUSE CVE CVE-2016-10228 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10739/</URL>
      <Description>SUSE CVE CVE-2016-10739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6261/</URL>
      <Description>SUSE CVE CVE-2016-6261 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6323/</URL>
      <Description>SUSE CVE CVE-2016-6323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000366/</URL>
      <Description>SUSE CVE CVE-2017-1000366 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-1000408/</URL>
      <Description>SUSE CVE CVE-2017-1000408 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12132/</URL>
      <Description>SUSE CVE CVE-2017-12132 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12133/</URL>
      <Description>SUSE CVE CVE-2017-12133 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15670/</URL>
      <Description>SUSE CVE CVE-2017-15670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16997/</URL>
      <Description>SUSE CVE CVE-2017-16997 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17426/</URL>
      <Description>SUSE CVE CVE-2017-17426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-18269/</URL>
      <Description>SUSE CVE CVE-2017-18269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1000001/</URL>
      <Description>SUSE CVE CVE-2018-1000001 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11236/</URL>
      <Description>SUSE CVE CVE-2018-11236 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11237/</URL>
      <Description>SUSE CVE CVE-2018-11237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-19591/</URL>
      <Description>SUSE CVE CVE-2018-19591 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6485/</URL>
      <Description>SUSE CVE CVE-2018-6485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-19126/</URL>
      <Description>SUSE CVE CVE-2019-19126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-25013/</URL>
      <Description>SUSE CVE CVE-2019-25013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7309/</URL>
      <Description>SUSE CVE CVE-2019-7309 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9169/</URL>
      <Description>SUSE CVE CVE-2019-9169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-10029/</URL>
      <Description>SUSE CVE CVE-2020-10029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-1752/</URL>
      <Description>SUSE CVE CVE-2020-1752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27618/</URL>
      <Description>SUSE CVE CVE-2020-27618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29562/</URL>
      <Description>SUSE CVE CVE-2020-29562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29573/</URL>
      <Description>SUSE CVE CVE-2020-29573 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6096/</URL>
      <Description>SUSE CVE CVE-2020-6096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-27645/</URL>
      <Description>SUSE CVE CVE-2021-27645 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3326/</URL>
      <Description>SUSE CVE CVE-2021-3326 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33574/</URL>
      <Description>SUSE CVE CVE-2021-33574 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="glibc-2.34-1.2">
      <FullProductName ProductID="glibc-2.34-1.2">glibc-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-2.34-1.2">
      <FullProductName ProductID="glibc-devel-2.34-1.2">glibc-devel-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-static-2.34-1.2">
      <FullProductName ProductID="glibc-devel-static-2.34-1.2">glibc-devel-static-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-extra-2.34-1.2">
      <FullProductName ProductID="glibc-extra-2.34-1.2">glibc-extra-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-html-2.34-1.2">
      <FullProductName ProductID="glibc-html-2.34-1.2">glibc-html-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-i18ndata-2.34-1.2">
      <FullProductName ProductID="glibc-i18ndata-2.34-1.2">glibc-i18ndata-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-info-2.34-1.2">
      <FullProductName ProductID="glibc-info-2.34-1.2">glibc-info-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-lang-2.34-1.2">
      <FullProductName ProductID="glibc-lang-2.34-1.2">glibc-lang-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-2.34-1.2">
      <FullProductName ProductID="glibc-locale-2.34-1.2">glibc-locale-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-base-2.34-1.2">
      <FullProductName ProductID="glibc-locale-base-2.34-1.2">glibc-locale-base-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-profile-2.34-1.2">
      <FullProductName ProductID="glibc-profile-2.34-1.2">glibc-profile-2.34-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nscd-2.34-1.2">
      <FullProductName ProductID="nscd-2.34-1.2">nscd-2.34-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="glibc-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-2.34-1.2">glibc-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-devel-2.34-1.2">glibc-devel-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-static-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-devel-static-2.34-1.2">glibc-devel-static-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-extra-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-extra-2.34-1.2">glibc-extra-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-html-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-html-2.34-1.2">glibc-html-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-i18ndata-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2">glibc-i18ndata-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-info-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-info-2.34-1.2">glibc-info-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-lang-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-lang-2.34-1.2">glibc-lang-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-locale-2.34-1.2">glibc-locale-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-base-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-locale-base-2.34-1.2">glibc-locale-base-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-profile-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glibc-profile-2.34-1.2">glibc-profile-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nscd-2.34-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nscd-2.34-1.2">nscd-2.34-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks.  NOTE: the GNU C Library vendor states "This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc."</Note>
    </Notes>
    <CVE>CVE-2009-5064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-5064.html</URL>
        <Description>CVE-2009-5064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/677787</URL>
        <Description>SUSE Bug 677787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/684385</URL>
        <Description>SUSE Bug 684385</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.</Note>
    </Notes>
    <CVE>CVE-2009-5155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-5155.html</URL>
        <Description>CVE-2009-5155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127223</URL>
        <Description>SUSE Bug 1127223</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.</Note>
    </Notes>
    <CVE>CVE-2010-3192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3192.html</URL>
        <Description>CVE-2010-3192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/636113</URL>
        <Description>SUSE Bug 636113</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).</Note>
    </Notes>
    <CVE>CVE-2015-5180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5180.html</URL>
        <Description>CVE-2015-5180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215582</URL>
        <Description>SUSE Bug 1215582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941234</URL>
        <Description>SUSE Bug 941234</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.</Note>
    </Notes>
    <CVE>CVE-2016-10228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10228.html</URL>
        <Description>CVE-2016-10228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027496</URL>
        <Description>SUSE Bug 1027496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.</Note>
    </Notes>
    <CVE>CVE-2016-10739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10739.html</URL>
        <Description>CVE-2016-10739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122729</URL>
        <Description>SUSE Bug 1122729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155094</URL>
        <Description>SUSE Bug 1155094</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.</Note>
    </Notes>
    <CVE>CVE-2016-6261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6261.html</URL>
        <Description>CVE-2016-6261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118435</URL>
        <Description>SUSE Bug 1118435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173590</URL>
        <Description>SUSE Bug 1173590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990190</URL>
        <Description>SUSE Bug 990190</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.</Note>
    </Notes>
    <CVE>CVE-2016-6323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6323.html</URL>
        <Description>CVE-2016-6323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994359</URL>
        <Description>SUSE Bug 994359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.</Note>
    </Notes>
    <CVE>CVE-2017-1000366</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000366.html</URL>
        <Description>CVE-2017-1000366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037551</URL>
        <Description>SUSE Bug 1037551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039357</URL>
        <Description>SUSE Bug 1039357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063847</URL>
        <Description>SUSE Bug 1063847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071319</URL>
        <Description>SUSE Bug 1071319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.</Note>
    </Notes>
    <CVE>CVE-2017-1000408</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-1000408.html</URL>
        <Description>CVE-2017-1000408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1039357</URL>
        <Description>SUSE Bug 1039357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071319</URL>
        <Description>SUSE Bug 1071319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.</Note>
    </Notes>
    <CVE>CVE-2017-12132</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12132.html</URL>
        <Description>CVE-2017-12132</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051791</URL>
        <Description>SUSE Bug 1051791</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.</Note>
    </Notes>
    <CVE>CVE-2017-12133</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12133.html</URL>
        <Description>CVE-2017-12133</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1081556</URL>
        <Description>SUSE Bug 1081556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980854</URL>
        <Description>SUSE Bug 980854</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.</Note>
    </Notes>
    <CVE>CVE-2017-15670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15670.html</URL>
        <Description>CVE-2017-15670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064583</URL>
        <Description>SUSE Bug 1064583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110160</URL>
        <Description>SUSE Bug 1110160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.</Note>
    </Notes>
    <CVE>CVE-2017-16997</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16997.html</URL>
        <Description>CVE-2017-16997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1073231</URL>
        <Description>SUSE Bug 1073231</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.</Note>
    </Notes>
    <CVE>CVE-2017-17426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17426.html</URL>
        <Description>CVE-2017-17426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1071479</URL>
        <Description>SUSE Bug 1071479</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.</Note>
    </Notes>
    <CVE>CVE-2017-18269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-18269.html</URL>
        <Description>CVE-2017-18269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094150</URL>
        <Description>SUSE Bug 1094150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118435</URL>
        <Description>SUSE Bug 1118435</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.</Note>
    </Notes>
    <CVE>CVE-2018-1000001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000001.html</URL>
        <Description>CVE-2018-1000001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074293</URL>
        <Description>SUSE Bug 1074293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1099047</URL>
        <Description>SUSE Bug 1099047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2018-11236</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11236.html</URL>
        <Description>CVE-2018-11236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094161</URL>
        <Description>SUSE Bug 1094161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110160</URL>
        <Description>SUSE Bug 1110160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118435</URL>
        <Description>SUSE Bug 1118435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.</Note>
    </Notes>
    <CVE>CVE-2018-11237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11237.html</URL>
        <Description>CVE-2018-11237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092877</URL>
        <Description>SUSE Bug 1092877</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1094154</URL>
        <Description>SUSE Bug 1094154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118435</URL>
        <Description>SUSE Bug 1118435</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.</Note>
    </Notes>
    <CVE>CVE-2018-19591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-19591.html</URL>
        <Description>CVE-2018-19591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117603</URL>
        <Description>SUSE Bug 1117603</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.</Note>
    </Notes>
    <CVE>CVE-2018-6485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6485.html</URL>
        <Description>CVE-2018-6485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079036</URL>
        <Description>SUSE Bug 1079036</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123874</URL>
        <Description>SUSE Bug 1123874</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.</Note>
    </Notes>
    <CVE>CVE-2019-19126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-19126.html</URL>
        <Description>CVE-2019-19126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1157292</URL>
        <Description>SUSE Bug 1157292</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2019-25013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-25013.html</URL>
        <Description>CVE-2019-25013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182117</URL>
        <Description>SUSE Bug 1182117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.</Note>
    </Notes>
    <CVE>CVE-2019-7309</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7309.html</URL>
        <Description>CVE-2019-7309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124100</URL>
        <Description>SUSE Bug 1124100</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.</Note>
    </Notes>
    <CVE>CVE-2019-9169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9169.html</URL>
        <Description>CVE-2019-9169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1127308</URL>
        <Description>SUSE Bug 1127308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146392</URL>
        <Description>SUSE Bug 1146392</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.</Note>
    </Notes>
    <CVE>CVE-2020-10029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-10029.html</URL>
        <Description>CVE-2020-10029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1165784</URL>
        <Description>SUSE Bug 1165784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.</Note>
    </Notes>
    <CVE>CVE-2020-1752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-1752.html</URL>
        <Description>CVE-2020-1752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1167631</URL>
        <Description>SUSE Bug 1167631</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.</Note>
    </Notes>
    <CVE>CVE-2020-27618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27618.html</URL>
        <Description>CVE-2020-27618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178386</URL>
        <Description>SUSE Bug 1178386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-29562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29562.html</URL>
        <Description>CVE-2020-29562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179694</URL>
        <Description>SUSE Bug 1179694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.</Note>
    </Notes>
    <CVE>CVE-2020-29573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29573.html</URL>
        <Description>CVE-2020-29573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179721</URL>
        <Description>SUSE Bug 1179721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.</Note>
    </Notes>
    <CVE>CVE-2020-6096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6096.html</URL>
        <Description>CVE-2020-6096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1168425</URL>
        <Description>SUSE Bug 1168425</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.</Note>
    </Notes>
    <CVE>CVE-2021-27645</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-27645.html</URL>
        <Description>CVE-2021-27645</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182733</URL>
        <Description>SUSE Bug 1182733</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2021-3326</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3326.html</URL>
        <Description>CVE-2021-3326</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181505</URL>
        <Description>SUSE Bug 1181505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212283</URL>
        <Description>SUSE Bug 1212283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.</Note>
    </Notes>
    <CVE>CVE-2021-33574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glibc-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-devel-static-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-extra-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-html-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-info-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-lang-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-locale-base-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:glibc-profile-2.34-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nscd-2.34-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33574.html</URL>
        <Description>CVE-2021-33574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186489</URL>
        <Description>SUSE Bug 1186489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189426</URL>
        <Description>SUSE Bug 1189426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192788</URL>
        <Description>SUSE Bug 1192788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196766</URL>
        <Description>SUSE Bug 1196766</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
