<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for glibc</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0358-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-02-27T21:33:28Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-02-27T21:33:28Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-02-27T21:33:28Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for glibc</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for glibc fixes the following issues:

- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)
- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)
- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)
- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)
- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)
- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-358</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0358-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178386</URL>
      <Description>SUSE Bug 1178386</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179694</URL>
      <Description>SUSE Bug 1179694</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179721</URL>
      <Description>SUSE Bug 1179721</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180038</URL>
      <Description>SUSE Bug 1180038</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181505</URL>
      <Description>SUSE Bug 1181505</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182117</URL>
      <Description>SUSE Bug 1182117</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-25013/</URL>
      <Description>SUSE CVE CVE-2019-25013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27618/</URL>
      <Description>SUSE CVE CVE-2020-27618 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29562/</URL>
      <Description>SUSE CVE CVE-2020-29562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29573/</URL>
      <Description>SUSE CVE CVE-2020-29573 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3326/</URL>
      <Description>SUSE CVE CVE-2021-3326 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="glibc-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-2.26-lp152.26.6.1">glibc-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-32bit-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-32bit-2.26-lp152.26.6.1">glibc-32bit-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-devel-2.26-lp152.26.6.1">glibc-devel-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-32bit-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-devel-32bit-2.26-lp152.26.6.1">glibc-devel-32bit-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-static-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-devel-static-2.26-lp152.26.6.1">glibc-devel-static-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-static-32bit-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-devel-static-32bit-2.26-lp152.26.6.1">glibc-devel-static-32bit-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-extra-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-extra-2.26-lp152.26.6.1">glibc-extra-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-html-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-html-2.26-lp152.26.6.1">glibc-html-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-i18ndata-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-i18ndata-2.26-lp152.26.6.1">glibc-i18ndata-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-info-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-info-2.26-lp152.26.6.1">glibc-info-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-locale-2.26-lp152.26.6.1">glibc-locale-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-base-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-locale-base-2.26-lp152.26.6.1">glibc-locale-base-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-base-32bit-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-locale-base-32bit-2.26-lp152.26.6.1">glibc-locale-base-32bit-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-profile-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-profile-2.26-lp152.26.6.1">glibc-profile-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-profile-32bit-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-profile-32bit-2.26-lp152.26.6.1">glibc-profile-32bit-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-utils-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-utils-2.26-lp152.26.6.1">glibc-utils-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-utils-32bit-2.26-lp152.26.6.1">
      <FullProductName ProductID="glibc-utils-32bit-2.26-lp152.26.6.1">glibc-utils-32bit-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nscd-2.26-lp152.26.6.1">
      <FullProductName ProductID="nscd-2.26-lp152.26.6.1">nscd-2.26-lp152.26.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="glibc-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-2.26-lp152.26.6.1">glibc-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-32bit-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-32bit-2.26-lp152.26.6.1">glibc-32bit-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-devel-2.26-lp152.26.6.1">glibc-devel-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-32bit-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-devel-32bit-2.26-lp152.26.6.1">glibc-devel-32bit-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-static-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-devel-static-2.26-lp152.26.6.1">glibc-devel-static-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-static-32bit-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-devel-static-32bit-2.26-lp152.26.6.1">glibc-devel-static-32bit-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-extra-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-extra-2.26-lp152.26.6.1">glibc-extra-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-html-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-html-2.26-lp152.26.6.1">glibc-html-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-i18ndata-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-i18ndata-2.26-lp152.26.6.1">glibc-i18ndata-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-info-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-info-2.26-lp152.26.6.1">glibc-info-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-locale-2.26-lp152.26.6.1">glibc-locale-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-base-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-locale-base-2.26-lp152.26.6.1">glibc-locale-base-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-base-32bit-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-locale-base-32bit-2.26-lp152.26.6.1">glibc-locale-base-32bit-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-profile-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-profile-2.26-lp152.26.6.1">glibc-profile-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-profile-32bit-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-profile-32bit-2.26-lp152.26.6.1">glibc-profile-32bit-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-utils-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-utils-2.26-lp152.26.6.1">glibc-utils-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-utils-32bit-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:glibc-utils-32bit-2.26-lp152.26.6.1">glibc-utils-32bit-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="nscd-2.26-lp152.26.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:nscd-2.26-lp152.26.6.1">nscd-2.26-lp152.26.6.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2019-25013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:glibc-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-extra-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-html-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-i18ndata-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-info-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nscd-2.26-lp152.26.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-25013.html</URL>
        <Description>CVE-2019-25013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1182117</URL>
        <Description>SUSE Bug 1182117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.</Note>
    </Notes>
    <CVE>CVE-2020-27618</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:glibc-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-extra-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-html-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-i18ndata-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-info-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nscd-2.26-lp152.26.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27618.html</URL>
        <Description>CVE-2020-27618</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178386</URL>
        <Description>SUSE Bug 1178386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-29562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:glibc-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-extra-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-html-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-i18ndata-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-info-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nscd-2.26-lp152.26.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29562.html</URL>
        <Description>CVE-2020-29562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179694</URL>
        <Description>SUSE Bug 1179694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.</Note>
    </Notes>
    <CVE>CVE-2020-29573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:glibc-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-extra-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-html-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-i18ndata-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-info-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nscd-2.26-lp152.26.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29573.html</URL>
        <Description>CVE-2020-29573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179721</URL>
        <Description>SUSE Bug 1179721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2021-3326</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:glibc-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-devel-static-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-extra-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-html-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-i18ndata-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-info-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-locale-base-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-profile-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:glibc-utils-32bit-2.26-lp152.26.6.1</ProductID>
        <ProductID>openSUSE Leap 15.2:nscd-2.26-lp152.26.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMNRZB427QFJOPYP4EA4KBZOTT622NY3/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3326.html</URL>
        <Description>CVE-2021-3326</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1181505</URL>
        <Description>SUSE Bug 1181505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212283</URL>
        <Description>SUSE Bug 1212283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1220988</URL>
        <Description>SUSE Bug 1220988</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
