This update for glibc fixes the following issues:
CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357]
The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690]
A defect in glibc's regression test suite has been remedied to avoid false positives. [bsc#987216]
{
"binaries": [
{
"glibc": "2.19-22.21.1",
"glibc-devel": "2.19-22.21.1",
"glibc-locale-32bit": "2.19-22.21.1",
"glibc-html": "2.19-22.21.1",
"glibc-profile-32bit": "2.19-22.21.1",
"glibc-devel-32bit": "2.19-22.21.1",
"glibc-profile": "2.19-22.21.1",
"glibc-32bit": "2.19-22.21.1",
"glibc-i18ndata": "2.19-22.21.1",
"glibc-locale": "2.19-22.21.1",
"glibc-info": "2.19-22.21.1",
"nscd": "2.19-22.21.1"
}
]
}
{
"binaries": [
{
"glibc": "2.19-22.21.1",
"glibc-devel": "2.19-22.21.1",
"glibc-locale-32bit": "2.19-22.21.1",
"glibc-html": "2.19-22.21.1",
"glibc-profile-32bit": "2.19-22.21.1",
"glibc-devel-32bit": "2.19-22.21.1",
"glibc-profile": "2.19-22.21.1",
"glibc-32bit": "2.19-22.21.1",
"glibc-i18ndata": "2.19-22.21.1",
"glibc-locale": "2.19-22.21.1",
"glibc-info": "2.19-22.21.1",
"nscd": "2.19-22.21.1"
}
]
}