File _patchinfo of Package patchinfo.21322
<patchinfo incident="21322">
<issue tracker="cve" id="2021-33574"/>
<issue tracker="cve" id="2021-35942"/>
<issue tracker="bnc" id="1186489">VUL-0: CVE-2021-33574: glibc: mq_notify() has a use-after-free</issue>
<issue tracker="bnc" id="1187911">VUL-0: CVE-2021-35942: glibc: Arbitrary read in wordexp()</issue>
<packager>Andreas_Schwab</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for glibc</summary>
<description>This update for glibc fixes the following issues:
- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
</description>
</patchinfo>