Download
| Alert*
oval:org.secpod.oval:def:89045723
This update for glibc fixes the following issues: - CVE-2021-33574: Fixed a use-after-free possibility in mq_notify oval:org.secpod.oval:def:89045722 This update for glibc fixes the following issues: - CVE-2021-33574: Use __pthread_attr_copy in mq_notify - CVE-2021-35942: wordexp: handle overflow in positional parameter number oval:org.secpod.oval:def:89045707 This update for glibc fixes the following issues: Security issues fixed: - CVE-2021-35942: wordexp: handle overflow in positional parameter number - CVE-2021-33574: Use __pthread_attr_copy in mq_notify Also the following bug was fixed: - Avoid concurrency problem in ldconfig oval:org.secpod.oval:def:89045690 This update for glibc fixes the following issues: - CVE-2021-35942: wordexp: handle overflow in positional parameter number - CVE-2021-33574: Use __pthread_attr_copy in mq_notify oval:org.secpod.oval:def:506490 The glibc packages provide the standard C libraries , POSIX thread libraries , standard math libraries , and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix: * glibc: Arbitrary read in wordexp ... oval:org.secpod.oval:def:120431 The glibc package contains standard libraries which are used by multiple programs on the system. In order to save disk space and memory, as well as to make upgrading easier, common system code is kept in one place and shared between programs. This particular package contains the most important sets ... oval:org.secpod.oval:def:120341 The glibc package contains standard libraries which are used by multiple programs on the system. In order to save disk space and memory, as well as to make upgrading easier, common system code is kept in one place and shared between programs. This particular package contains the most important sets ... oval:org.secpod.oval:def:1700798 The mq_notify function in the GNU C Library has a use-after-free. It may use the notification thread attributes object after it has been freed by the caller, leading to a denial of service or possibly unspecified other impact oval:org.secpod.oval:def:2500371 The glibc packages provide the standard C libraries , POSIX thread libraries , standard math libraries , and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. oval:org.secpod.oval:def:1505311 [2.28-164.0.1] - Merge of RH patches for ol8-u5 beta release Review-exception: Routine merge - Provide glibc.pthread.mutex_spin_count tunable for pthread adaptive - spin mutex Orabug: 27982358. Reviewed-by: Qing Zhao - add Ampere emag to tunable cpu list - add optimized memset for emag - add an ASI ... oval:org.secpod.oval:def:76008 The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possib ... oval:org.secpod.oval:def:76227 The glibc packages provide the standard C libraries , POSIX thread libraries , standard math libraries , and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix: * glibc: Arbitrary read in wordexp ... oval:org.secpod.oval:def:1505260 [2.28-164.0.1] - Merge of RH patches for ol8-u5 beta release Review-exception: Routine merge - Provide glibc.pthread.mutex_spin_count tunable for pthread adaptive - spin mutex Orabug: 27982358. Reviewed-by: Qing Zhao - add Ampere emag to tunable cpu list - add optimized memset for emag - add an ASI ... oval:org.secpod.oval:def:89047097 This update for glibc fixes the following issues: - CVE-2021-33574: Fixed use __pthread_attr_copy in mq_notify . - CVE-2021-35942: Fixed wordexp handle overflow in positional parameter number . oval:org.secpod.oval:def:97541 [CLSA-2021:1629395067] Fixed CVEs in glibc: CVE-2021-35942, CVE-2021-33574, CVE-2021-38604 |