File _patchinfo of Package patchinfo.28088

<patchinfo incident="28088">
  <issue tracker="cve" id="2023-0687"/>
  <issue tracker="bnc" id="1207571">possible regression to bcs#1166106 on SLES15SP4 - ref:_00D1igLOd._5005qK8Bxu:ref</issue>
  <issue tracker="bnc" id="1207975">VUL-1: CVE-2023-0687: glibc: gmon memory corruption due wrong calculation of required buffer size</issue>
  <issue tracker="bnc" id="1208358">L3: glibc-2.31-150300.*: possible bug in __strncmp_avx2_rtm+0x1b3 when strncmp length parameter is over 128</issue>
  <issue tracker="bnc" id="1207957">AMD Cache Computation</issue>
  <packager>Andreas_Schwab</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for glibc</summary>
  <description>This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975)

Other issues fixed:

- Fix avx2 strncmp offset compare condition check (bsc#1208358)
- elf: Allow dlopen of filter object to work (bsc#1207571)
- powerpc: Fix unrecognized instruction errors with recent GCC
- x86: Cache computation for AMD architecture (bsc#1207957)
</description>
</patchinfo>
openSUSE Build Service is sponsored by