Description:
- Adopt pthread_attr_copy functionality, test case is included
- CVE-2021-33574: avoid use-after-free vulnerability
- CVE-2021-35942: avoid out-of-bounds read via
signed integer overflow in array index
- CVE-2021-38604: considered. No NULL pointer dereference is possible
Updated packages:
-
glibc-2.12-2.213.el6.cloudlinux.els.i686.rpm
sha:84d6a8c1a07bd178cb2cfd03064cda8f7275791d
-
glibc-devel-2.12-2.213.el6.cloudlinux.els.i686.rpm
sha:a93dcd2fd490714619b3a72aae0d71b3404b2751
-
glibc-headers-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
sha:1f59bfcff758071fc889f5a2981b06279dac816b
-
glibc-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
sha:3e7dbe88ec84eca9cfce2b4666f49589a434d167
-
nscd-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
sha:f18e3b718502a6db1fe6fec00644e7b325f0aa88
-
glibc-static-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
sha:26208a207292b077fbfa5dd5dd7df2d530142437
-
glibc-devel-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
sha:282210d965fad9fd535c706d0a34cb22daf41cb9
-
glibc-static-2.12-2.213.el6.cloudlinux.els.i686.rpm
sha:ef333bcd4b17e548665e66e36c15ed21a522daf1
-
glibc-common-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
sha:109486b33944d6305e5dc5e9c59d1ddd36b99770
-
glibc-utils-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
sha:c6efaa880828043d0840aeca8c29199e18c606a2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.