[CLSA-2021:1634922609] Fix of CVE: CVE-2021-33574, CVE-2021-35942, CVE-2021-38604
Type:
security
Severity:
moderate
Release date:
2021-10-22
Description:
- Adopt pthread_attr_copy functionality, test case is included - CVE-2021-33574: avoid use-after-free vulnerability - CVE-2021-35942: avoid out-of-bounds read via signed integer overflow in array index - CVE-2021-38604: considered. No NULL pointer dereference is possible
Updated packages:
  • glibc-2.12-2.213.el6.cloudlinux.els.i686.rpm
    sha:84d6a8c1a07bd178cb2cfd03064cda8f7275791d
  • glibc-devel-2.12-2.213.el6.cloudlinux.els.i686.rpm
    sha:a93dcd2fd490714619b3a72aae0d71b3404b2751
  • glibc-headers-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
    sha:1f59bfcff758071fc889f5a2981b06279dac816b
  • glibc-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
    sha:3e7dbe88ec84eca9cfce2b4666f49589a434d167
  • nscd-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
    sha:f18e3b718502a6db1fe6fec00644e7b325f0aa88
  • glibc-static-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
    sha:26208a207292b077fbfa5dd5dd7df2d530142437
  • glibc-devel-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
    sha:282210d965fad9fd535c706d0a34cb22daf41cb9
  • glibc-static-2.12-2.213.el6.cloudlinux.els.i686.rpm
    sha:ef333bcd4b17e548665e66e36c15ed21a522daf1
  • glibc-common-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
    sha:109486b33944d6305e5dc5e9c59d1ddd36b99770
  • glibc-utils-2.12-2.213.el6.cloudlinux.els.x86_64.rpm
    sha:c6efaa880828043d0840aeca8c29199e18c606a2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.