drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in glibc
Name: |
Pufferüberlauf in glibc |
|
ID: |
FEDORA-2021-e14e86e40e |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 34 |
|
Datum: |
Mi, 14. Juli 2021, 07:22 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 |
|
Applikationen: |
GNU C library |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2021-e14e86e40e 2021-07-14 01:19:40.001827 ------------------------------------------------------------------------------- -
Name : glibc Product : Fedora 34 Version : 2.33 Release : 20.fc34 URL : http://www.gnu.org/software/glibc/ Summary : The GNU libc libraries Description : The glibc package contains standard libraries which are used by multiple programs on the system. In order to save disk space and memory, as well as to make upgrading easier, common system code is kept in one place and shared between programs. This particular package contains the most important sets of shared libraries: the standard C library and the standard math library. Without these two libraries, a Linux system will not function.
------------------------------------------------------------------------------- - Update Information:
Auto-sync with upstream branch release/2.33/master Upstream commit: edfd11197ecf3629bbb4b66c5814da09a61a7f9f - wordexp: handle overflow in positional parameter number (swbz#28011, CVE-2021-35942) ------------------------------------------------------------------------------- - ChangeLog:
* Sun Jul 11 2021 Patsy Griffin <patsy@redhat.com> - 2.33-20 - Auto-sync with upstream branch release/2.33/master, commit edfd11197ecf3629bbb4b66c5814da09a61a7f9f. - wordexp: handle overflow in positional parameter number (swbz#28011) * Wed Jul 7 2021 Florian Weimer <fweimer@redhat.com> - 2.33-19 - Preserve .symtab in libc.so.6 and the main shared objects (#1975895) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1977976 - CVE-2021-35942 glibc: Arbitrary read in wordexp() [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1977976 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-e14e86e40e' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
|
|
|
|