Mageia 2021-0150: glibc security update
Summary
Updated glibc packages fix a security vulnerabilities:
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and
earlier, when processing invalid multi-byte input sequences in IBM1364,
IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the
input state, which could lead to an infinite loop in applications,
resulting in a denial of service (CVE-2020-27618).
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and
earlier, when processing invalid input sequences in the ISO-2022-JP-3
encoding, fails an assertion in the code path and aborts the program,
potentially resulting in a denial of service (CVE-2021-3326).
The nameserver caching daemon (nscd), when processing a request for netgroup
lookup, may crash due to a double-free, potentially resulting in degraded
service or Denial of Service on the local system (CVE-2021-27645).
References
- https://bugs.mageia.org/show_bug.cgi?id=28246
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
Resolution
MGASA-2021-0150 - Updated glibc packages fixes security vulnerabilities
SRPMS
- 7/core/glibc-2.29-22.mga7