File _patchinfo of Package patchinfo.18276
<patchinfo incident="18276">
<issue tracker="cve" id="2021-3326"/>
<issue tracker="cve" id="2020-27618"/>
<issue tracker="cve" id="2019-25013"/>
<issue tracker="cve" id="2020-29562"/>
<issue tracker="cve" id="2020-29573"/>
<issue tracker="bnc" id="1181505">VUL-0: CVE-2021-3326: glibc: iconv crash with ISO-2022-JP-3 which affects e.g. mutt</issue>
<issue tracker="bnc" id="1178386">VUL-1: CVE-2020-27618: glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop</issue>
<issue tracker="bnc" id="1180038">SLES 12 SP5 - glibc __get_nprocs parses "/sys/devices/system/cpu/online" incorrectly. (L3:)</issue>
<issue tracker="bnc" id="1182117">VUL-0: CVE-2019-25013: glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding</issue>
<issue tracker="bnc" id="1179694">VUL-1: CVE-2020-29562: glibc: iconv fails an assertion in the code path and aborts the program when converting UCS4 text containing an irreversible character</issue>
<issue tracker="bnc" id="1179721">VUL-0: CVE-2020-29573: glibc: stack-based buffer overflow in printf on i386 targets via non-canonical 80-bit floating point values</issue>
<packager>Andreas_Schwab</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for glibc</summary>
<description>This update for glibc fixes the following issues:
- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)
- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)
- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)
- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)
- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)
- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)
</description>
</patchinfo>