This update for glibc fixes the following issues:
CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357]
The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690]
A defect in glibc's regression test suite has been remedied to avoid false positives. [bsc#987216]
{ "binaries": [ { "glibc-devel-32bit": "2.19-22.21.1", "glibc-html": "2.19-22.21.1", "glibc-locale-32bit": "2.19-22.21.1", "glibc-info": "2.19-22.21.1", "glibc-devel": "2.19-22.21.1", "glibc-i18ndata": "2.19-22.21.1", "glibc-profile": "2.19-22.21.1", "glibc-locale": "2.19-22.21.1", "nscd": "2.19-22.21.1", "glibc-32bit": "2.19-22.21.1", "glibc-profile-32bit": "2.19-22.21.1", "glibc": "2.19-22.21.1" } ] }
{ "binaries": [ { "glibc-devel-32bit": "2.19-22.21.1", "glibc-html": "2.19-22.21.1", "glibc-locale-32bit": "2.19-22.21.1", "glibc-info": "2.19-22.21.1", "glibc-devel": "2.19-22.21.1", "glibc-i18ndata": "2.19-22.21.1", "glibc-profile": "2.19-22.21.1", "glibc-locale": "2.19-22.21.1", "nscd": "2.19-22.21.1", "glibc-32bit": "2.19-22.21.1", "glibc-profile-32bit": "2.19-22.21.1", "glibc": "2.19-22.21.1" } ] }