Mageia alert MGASA-2021-0308 (glibc)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2021-0308: Updated glibc packages fix security vulnerability | |
| Date: | Thu, 01 Jul 2021 01:59:56 +0200 | |
| Message-ID: | <20210630235956.85305A00B5@duvel.mageia.org> | |
| Archive-link: | Article |
MGASA-2021-0308 - Updated glibc packages fix security vulnerability Publication date: 30 Jun 2021 URL: https://advisories.mageia.org/MGASA-2021-0308.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-33574 Description: The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact (CVE-2021-33574). Other fixes in this update: - fix triggers so ldconfig is always run on both installing and uninstalling libs (mga#28797) - Fix SXID_ERASE behavior in setuid programs [BZ#27471] References: - https://bugs.mageia.org/show_bug.cgi?id=29142 - https://bugs.mageia.org/show_bug.cgi?id=28797 - https://sourceware.org/bugzilla/show_bug.cgi?id=27471 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3... SRPMS: - 8/core/glibc-2.32-16.mga8
