Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in glibc
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in glibc
ID: FEDORA-2021-e14e86e40e
Distribution: Fedora
Plattformen: Fedora 34
Datum: Mi, 14. Juli 2021, 07:22
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
Applikationen: GNU C library

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2021-e14e86e40e
2021-07-14 01:19:40.001827
-------------------------------------------------------------------------------
-

Name : glibc
Product : Fedora 34
Version : 2.33
Release : 20.fc34
URL : http://www.gnu.org/software/glibc/
Summary : The GNU libc libraries
Description :
The glibc package contains standard libraries which are used by
multiple programs on the system. In order to save disk space and
memory, as well as to make upgrading easier, common system code is
kept in one place and shared between programs. This particular package
contains the most important sets of shared libraries: the standard C
library and the standard math library. Without these two libraries, a
Linux system will not function.

-------------------------------------------------------------------------------
-
Update Information:

Auto-sync with upstream branch release/2.33/master Upstream
commit:
edfd11197ecf3629bbb4b66c5814da09a61a7f9f - wordexp: handle overflow in
positional parameter number (swbz#28011, CVE-2021-35942)
-------------------------------------------------------------------------------
-
ChangeLog:

* Sun Jul 11 2021 Patsy Griffin <patsy@redhat.com> - 2.33-20
- Auto-sync with upstream branch release/2.33/master,
commit edfd11197ecf3629bbb4b66c5814da09a61a7f9f.
- wordexp: handle overflow in positional parameter number (swbz#28011)
* Wed Jul 7 2021 Florian Weimer <fweimer@redhat.com> - 2.33-19
- Preserve .symtab in libc.so.6 and the main shared objects (#1975895)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1977976 - CVE-2021-35942 glibc: Arbitrary read in wordexp()
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1977976
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-e14e86e40e' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung