File _patchinfo of Package patchinfo.21322

<patchinfo incident="21322">
  <issue tracker="cve" id="2021-33574"/>
  <issue tracker="cve" id="2021-35942"/>
  <issue tracker="bnc" id="1186489">VUL-0: CVE-2021-33574: glibc: mq_notify() has a use-after-free</issue>
  <issue tracker="bnc" id="1187911">VUL-0: CVE-2021-35942: glibc: Arbitrary read in wordexp()</issue>
  <packager>Andreas_Schwab</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for glibc</summary>
  <description>This update for glibc fixes the following issues:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
</description>
</patchinfo>
openSUSE Build Service is sponsored by