This update for glibc fixes the following issues:
CVE-2017-1000366: Fix a potential privilege escalation vulnerability that allowed unprivileged system users to manipulate the stack of setuid binaries to gain special privileges. [bsc#1039357]
The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690]
An incorrectly specified buffer length in nscd netgroup queries has been fixed. [bsc#986858]
{
"binaries": [
{
"nscd": "2.19-40.6.1",
"glibc-i18ndata": "2.19-40.6.1",
"glibc-devel": "2.19-40.6.1",
"glibc-32bit": "2.19-40.6.1",
"glibc-info": "2.19-40.6.1",
"glibc-profile-32bit": "2.19-40.6.1",
"glibc": "2.19-40.6.1",
"glibc-html": "2.19-40.6.1",
"glibc-devel-32bit": "2.19-40.6.1",
"glibc-locale-32bit": "2.19-40.6.1",
"glibc-locale": "2.19-40.6.1",
"glibc-profile": "2.19-40.6.1"
}
]
}{
"binaries": [
{
"nscd": "2.19-40.6.1",
"glibc-i18ndata": "2.19-40.6.1",
"glibc-devel": "2.19-40.6.1",
"glibc-32bit": "2.19-40.6.1",
"glibc-info": "2.19-40.6.1",
"glibc-profile-32bit": "2.19-40.6.1",
"glibc": "2.19-40.6.1",
"glibc-html": "2.19-40.6.1",
"glibc-devel-32bit": "2.19-40.6.1",
"glibc-locale-32bit": "2.19-40.6.1",
"glibc-locale": "2.19-40.6.1",
"glibc-profile": "2.19-40.6.1"
}
]
}{
"binaries": [
{
"nscd": "2.19-40.6.1",
"glibc-i18ndata": "2.19-40.6.1",
"glibc-devel": "2.19-40.6.1",
"glibc-32bit": "2.19-40.6.1",
"glibc-info": "2.19-40.6.1",
"glibc-profile-32bit": "2.19-40.6.1",
"glibc": "2.19-40.6.1",
"glibc-html": "2.19-40.6.1",
"glibc-devel-32bit": "2.19-40.6.1",
"glibc-locale-32bit": "2.19-40.6.1",
"glibc-locale": "2.19-40.6.1",
"glibc-profile": "2.19-40.6.1"
}
]
}