7.1 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.02 Low
EPSS
Percentile
89.1%
CentOS Errata and Security Advisory CESA-2021:0348
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013)
glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029)
glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers (BZ#1883162)
glibc: Performance regression in ebizzy benchmark (BZ#1889977)
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2021-February/086048.html
Affected packages:
glibc
glibc-common
glibc-devel
glibc-headers
glibc-static
glibc-utils
nscd
Upstream details at:
https://access.redhat.com/errata/RHSA-2021:0348
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | i686 | glibc | < 2.17-322.el7_9 | glibc-2.17-322.el7_9.i686.rpm |
CentOS | 7 | x86_64 | glibc | < 2.17-322.el7_9 | glibc-2.17-322.el7_9.x86_64.rpm |
CentOS | 7 | x86_64 | glibc-common | < 2.17-322.el7_9 | glibc-common-2.17-322.el7_9.x86_64.rpm |
CentOS | 7 | i686 | glibc-devel | < 2.17-322.el7_9 | glibc-devel-2.17-322.el7_9.i686.rpm |
CentOS | 7 | x86_64 | glibc-devel | < 2.17-322.el7_9 | glibc-devel-2.17-322.el7_9.x86_64.rpm |
CentOS | 7 | x86_64 | glibc-headers | < 2.17-322.el7_9 | glibc-headers-2.17-322.el7_9.x86_64.rpm |
CentOS | 7 | i686 | glibc-static | < 2.17-322.el7_9 | glibc-static-2.17-322.el7_9.i686.rpm |
CentOS | 7 | x86_64 | glibc-static | < 2.17-322.el7_9 | glibc-static-2.17-322.el7_9.x86_64.rpm |
CentOS | 7 | x86_64 | glibc-utils | < 2.17-322.el7_9 | glibc-utils-2.17-322.el7_9.x86_64.rpm |
CentOS | 7 | x86_64 | nscd | < 2.17-322.el7_9 | nscd-2.17-322.el7_9.x86_64.rpm |
7.1 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.02 Low
EPSS
Percentile
89.1%