[CLSA-2021:1640790752] Fix of CVE: CVE-2018-17794, CVE-2018-18483, CVE-2018-12699, CVE-2018-18700, CVE-2021-45078, CVE-2018-18484, CVE-2018-18701, CVE-2018-12697, CVE-2018-9138, CVE-2018-12641, CVE-2018-12934, CVE-2018-12698, CVE-2018-17985, CVE-2018-12700
Type:
security
Severity:
moderate
Release date:
2021-12-29
Description:
- CVE-2018-9138: Fix stack exhaustion - CVE-2018-12641: Fix stack exhaustion - CVE-2018-12697: Fix NULL pointer dereference - CVE-2018-12698: Fix memory consumption - CVE-2018-12699: Fix heap-based buffer overflow - CVE-2018-12700: Fix infinite recursion - CVE-2018-17794: Fix NULL pointer dereference - CVE-2018-17985: Fix recursive calls - CVE-2018-18484: Fix stack exhaustion - CVE-2018-18700: Fix stack consumption vulnerability - CVE-2018-18701: Fix infinite recursion - CVE-2018-18483: Fix malloc call with the result of an integer-overflowing - CVE-2018-12934: Fix excessive memory consumption - CVE-2021-45078: Fix heap-based buffer overflow
Updated packages:
  • binutils-2.20.51.0.2-5.48.1.el6.tuxcare.els4.x86_64.rpm
    sha:30abd9bf9b5deb745576f02df204263a241579ec
  • binutils-devel-2.20.51.0.2-5.48.1.el6.tuxcare.els4.i686.rpm
    sha:7dfd748e77a2d23bbe1d265a6d6d774266e08587
  • binutils-devel-2.20.51.0.2-5.48.1.el6.tuxcare.els4.x86_64.rpm
    sha:392c1ec4e4ae0b00abaec566e7b24635f896529f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.