Description:
- CVE-2021-3326: avoid denial of service due to a failed assertion
- CVE-2021-43396: check actual stored character in state reset code
Updated packages:
-
glibc-2.12-2.215.el6.cloudlinux.els.x86_64.rpm
sha:e963f999dd4103bd9cbbc256ba7f1af9732a8172
-
nscd-2.12-2.215.el6.cloudlinux.els.x86_64.rpm
sha:6b13af119bd392109c0eeb0cb34372fb6494cb10
-
glibc-devel-2.12-2.215.el6.cloudlinux.els.i686.rpm
sha:80acd3fc1cddcbf948450588dcb0feddf1896b98
-
glibc-devel-2.12-2.215.el6.cloudlinux.els.x86_64.rpm
sha:395c913dd5eb1550308b3473f8d53233cc0bdc36
-
glibc-static-2.12-2.215.el6.cloudlinux.els.i686.rpm
sha:0c122bb4645d5a4d0ee6ad28f6f97d189729f967
-
glibc-static-2.12-2.215.el6.cloudlinux.els.x86_64.rpm
sha:ac48c4f8fdd77954b880aaa27f88f40a592c2f74
-
glibc-utils-2.12-2.215.el6.cloudlinux.els.x86_64.rpm
sha:44de0fc893d63628888b3d3e184fa9a5542a9b00
-
glibc-2.12-2.215.el6.cloudlinux.els.i686.rpm
sha:fefeb00a06402872fee042e03651930653edbb61
-
glibc-common-2.12-2.215.el6.cloudlinux.els.x86_64.rpm
sha:793e1fc9fb30c730c39d9ee96ff5ab18df28e25f
-
glibc-headers-2.12-2.215.el6.cloudlinux.els.x86_64.rpm
sha:b2003d5de6c24f363ef7962976b3fafa045d6634
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.