|
|
Subscribe / Log in / New account

Mageia alert MGASA-2025-0026 (glibc)

From:  Mageia Updates <updates-announce@ml.mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2025-0026: Updated glibc packages fix security vulnerability
Date:  Sun, 26 Jan 2025 04:20:59 +0100
Message-ID:  <20250126032059.BE5CBA0DAE@duvel.mageia.org>
Archive-link:  Article

MGASA-2025-0026 - Updated glibc packages fix security vulnerability Publication date: 26 Jan 2025 URL: https://advisories.mageia.org/MGASA-2025-0026.html Type: security Affected Mageia releases: 9 CVE: CVE-2025-0395 Description: When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size. (CVE-2025-0395) References: - https://bugs.mageia.org/show_bug.cgi?id=33953 - https://www.openwall.com/lists/oss-security/2025/01/22/4 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395 SRPMS: - 9/core/glibc-2.36-55.mga9


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds