File _patchinfo of Package patchinfo.22558
<patchinfo incident="22558">
<category>security</category>
<rating>important</rating>
<packager>Andreas_Schwab</packager>
<summary>Security update for glibc</summary>
<description>
glibc was updated to fix the following issues:
Security issues fixed:
- CVE-2021-3999: Fixed incorrect errno in getcwd (bsc#1194640)
- CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for "unix" (bsc#1194768)
- CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)
Bugs fixed:
- Make endian-conversion macros always return correct types (bsc#1193478, BZ #16458)
- Allow dlopen of filter object to work (bsc#1192620, BZ #16272)
- x86: fix stack alignment in cancelable syscall stub (bsc#1191835)
</description>
<issue id="1194640" tracker="bnc">VUL-0: CVE-2021-3999: glibc: glibc: off-by-one buffer overflow/underflow in getcwd()</issue>
<issue id="1194768" tracker="bnc">VUL-0: CVE-2022-23219: glibc.i686,glibc: stack buffer overflow in the deprecated function clnt_create in the sunrpc module</issue>
<issue id="1194770" tracker="bnc">VUL-0: CVE-2022-23218: glibc.i686,glibc: stack buffer overflow in the deprecated function svcunix_create in the sunrpc module</issue>
<issue id="1191835" tracker="bnc">Customer application crashing after upgrading glibc-32bit from 2.22-114.12.1 to 2.22-114.15.1</issue>
<issue id="1192620" tracker="bnc">Backport request for glibc</issue>
<issue id="1193478" tracker="bnc">htonl() and ntohl() unexpected behavior on s390x</issue>
<issue id="2021-3999" tracker="cve"/>
<issue id="2022-23218" tracker="cve"/>
<issue id="2022-23219" tracker="cve"/>
</patchinfo>