Mageia 2021-0308: glibc security update
Summary
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and
2.33 has a use-after-free. It may use the notification thread attributes
object (passed through its struct sigevent parameter) after it has been
freed by the caller, leading to a denial of service (application crash)
or possibly unspecified other impact (CVE-2021-33574).
Other fixes in this update:
- fix triggers so ldconfig is always run on both installing and
uninstalling libs (mga#28797)
- Fix SXID_ERASE behavior in setuid programs [BZ#27471]
References
- https://bugs.mageia.org/show_bug.cgi?id=29142
- https://bugs.mageia.org/show_bug.cgi?id=28797
- https://sourceware.org/bugzilla/show_bug.cgi?id=27471
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
Resolution
MGASA-2021-0308 - Updated glibc packages fix security vulnerability
SRPMS
- 8/core/glibc-2.32-16.mga8