File _patchinfo of Package patchinfo.28088
<patchinfo incident="28088">
<issue tracker="cve" id="2023-0687"/>
<issue tracker="bnc" id="1207571">possible regression to bcs#1166106 on SLES15SP4 - ref:_00D1igLOd._5005qK8Bxu:ref</issue>
<issue tracker="bnc" id="1207975">VUL-1: CVE-2023-0687: glibc: gmon memory corruption due wrong calculation of required buffer size</issue>
<issue tracker="bnc" id="1208358">L3: glibc-2.31-150300.*: possible bug in __strncmp_avx2_rtm+0x1b3 when strncmp length parameter is over 128</issue>
<issue tracker="bnc" id="1207957">AMD Cache Computation</issue>
<packager>Andreas_Schwab</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for glibc</summary>
<description>This update for glibc fixes the following issues:
Security issue fixed:
- CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975)
Other issues fixed:
- Fix avx2 strncmp offset compare condition check (bsc#1208358)
- elf: Allow dlopen of filter object to work (bsc#1207571)
- powerpc: Fix unrecognized instruction errors with recent GCC
- x86: Cache computation for AMD architecture (bsc#1207957)
</description>
</patchinfo>