[CLSA-2022:1648149396] Fix CVE(s): CVE-2021-3999
Type:
security
Severity:
moderate
Release date:
2022-03-24 19:16:36 UTC
Description:
* SECURITY UPDATE: single byte buffer underflow and overflow - debian/patches/any/CVE-2021-3999.patch: reject buffer of size 1 and return NULL with errno set to ERANGE - CVE-2021-3999
Updated packages:
  • glibc-doc_2.23-0ubuntu11.5+tuxcare.els4_all.deb
    sha:12a48f89f28b4c47410992fc1565c05e169a1957
  • glibc-source_2.23-0ubuntu11.5+tuxcare.els4_all.deb
    sha:b1bdfe266c3661913ca12c0899ad4dc232bd143a
  • libc-bin_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:5af21364dc458e986f27381e2059b34b4b427b1b
  • libc-dev-bin_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:c3823ac1580c11becded7597e37c6b5d55dba75e
  • libc6_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:1d629afc50a8b35d899121ed30208fb0a527937b
  • libc6-dev_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:c51346e48fb3b49630d29da07f2248866885e5f5
  • libc6-dev-i386_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:0962248cf2fff82c77691b71859222ac4d4b3c8a
  • libc6-dev-x32_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:4fda9736d5ca5e07588a36ee788e487107c353fd
  • libc6-i386_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:3ef9088ede8b54840d06837594282e3a38c1342d
  • libc6-pic_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:60690790089eccc4466e02a82f43a6caa720c12d
  • libc6-x32_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:86f2ddae6a317ba79fd7b480371b2273993987e7
  • locales_2.23-0ubuntu11.5+tuxcare.els4_all.deb
    sha:4d25aefa32536781487e59fb498d49694949f7ca
  • locales-all_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:f81aca126c52d7778270022629bc79becda7de42
  • multiarch-support_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:7b4140ba565adfda9b5eb1aaacb8dbefda91eb86
  • nscd_2.23-0ubuntu11.5+tuxcare.els4_amd64.deb
    sha:6671fe1468514d3ab8c53a81adfce7da865da9b2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.