Release date:
2024-03-04 14:26:10 UTC
Description:
* SECURITY UPDATE: A flaw fixed when the getaddrinfo function may
access memory that has been freed, resulting in an application
crash
- debian/patches/any/CVE-2023-4806.patch: fix the flaw
- CVE-2023-4806
* SECURITY UPDATE: In an uncommon situation, the gaih_inet
function may use memory that has been freed, resulting in an
application crash
- debian/patches/any/CVE-2023-4813.patch: fix the flaw
- CVE-2023-4813
Updated packages:
-
glibc-doc_2.23-0ubuntu11.5+tuxcare.els6_all.deb
sha:3db2131f186ff5e19acab2e3ac12dd0b18460e3b
-
glibc-source_2.23-0ubuntu11.5+tuxcare.els6_all.deb
sha:ed163ffb5df8a05bcff21bb8a51e3dc00e3a506a
-
libc-bin_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:a643f4cf02d5184400ac8568731cd9f56ddb82bc
-
libc-dev-bin_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:273ced0bd971740f94b632d3e575ec2b924f6d21
-
libc6_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:7258f16d6d3ed94075c0a319d10fc5c8eed86074
-
libc6-dev_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:212cd6abe0e35db73ea28b53237a66c78977190f
-
libc6-dev-i386_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:3d3389dfde63155322bdd38ced80072245edfafe
-
libc6-dev-x32_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:7db9105a559659b1d4f28713687556aa538492bd
-
libc6-i386_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:3ee813bb0c50a32e6b7238f50e80396a40305bfb
-
libc6-pic_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:912d2d3c52d5caa19a139a05f70e6b9afd3f1187
-
libc6-x32_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:d2f8f5f610c98aa3f9f0508286e50c6aa159159e
-
locales_2.23-0ubuntu11.5+tuxcare.els6_all.deb
sha:3bdbc6124097adad1918834b2f793d5768cdbd90
-
locales-all_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:6c57f47f5aa9686c0716cf913b97db13c0fc6d73
-
multiarch-support_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:a068e375405a1d326283afdbd3b143cb574a200d
-
nscd_2.23-0ubuntu11.5+tuxcare.els6_amd64.deb
sha:ba874a30e4feaaf6401a61f0a63c05daf1eee111
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.