|
|
Subscribe / Log in / New account

Slackware alert SSA:2024-109-01 (aaa_glibc)

From:  Slackware Security Team <security@slackware.com>
To:  slackware-security@slackware.com
Subject:  [slackware-security] glibc (SSA:2024-109-01)
Date:  Thu, 18 Apr 2024 12:23:18 -0700
Message-ID:  <alpine.LNX.2.02.2404181222520.2672@connie.slackware.com>

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] glibc (SSA:2024-109-01) New glibc packages are available for Slackware 15.0 and -current to fix a security issue. Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/aaa_glibc-solibs-2.33-i586-6_slack15.0.txz: Rebuilt. patches/packages/glibc-2.33-i586-6_slack15.0.txz: Rebuilt. This update fixes a security issue: The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-2961 (* Security fix *) patches/packages/glibc-i18n-2.33-i586-6_slack15.0.txz: Rebuilt. patches/packages/glibc-profile-2.33-i586-6_slack15.0.txz: Rebuilt. +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 15.0: ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patc... ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patc... ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patc... ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patc... Updated package for Slackware x86_64 15.0: ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/pa... ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/pa... ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/pa... ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/pa... Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/s... ftp://ftp.slackware.com/pub/slackware/slackware-current/s... ftp://ftp.slackware.com/pub/slackware/slackware-current/s... ftp://ftp.slackware.com/pub/slackware/slackware-current/s... Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current... ftp://ftp.slackware.com/pub/slackware/slackware64-current... ftp://ftp.slackware.com/pub/slackware/slackware64-current... ftp://ftp.slackware.com/pub/slackware/slackware64-current... MD5 signatures: +-------------+ Slackware 15.0 package: db1fdb65d9e64639b11f35a0b6b150b7 aaa_glibc-solibs-2.33-i586-6_slack15.0.txz ac723131a3e18c7220bff020d4597bf8 glibc-2.33-i586-6_slack15.0.txz f3b70a54eb163e043c4c5f6a67e9d0e9 glibc-i18n-2.33-i586-6_slack15.0.txz 6b98c77321151022d17312825436be7f glibc-profile-2.33-i586-6_slack15.0.txz Slackware x86_64 15.0 package: b2476b8368bef6a3ef0eaca4eb8d3db6 aaa_glibc-solibs-2.33-x86_64-6_slack15.0.txz e36a2bd9e8c8ea38fd64df24baf61e36 glibc-2.33-x86_64-6_slack15.0.txz 9e7970f2775d7127ac618296c0884109 glibc-i18n-2.33-x86_64-6_slack15.0.txz eb39636b73e2fd695ab8cf8850050889 glibc-profile-2.33-x86_64-6_slack15.0.txz Slackware -current package: eac98c14f059ea434e655ec6c3e35afd a/aaa_glibc-solibs-2.39-i586-2.txz 7bd0e24e064cabdad278b1baf8c380e2 l/glibc-2.39-i586-2.txz 7e280ef1dfff11b34adf258c6e8301b3 l/glibc-i18n-2.39-i586-2.txz ca5fb64de16d846cd1ef6bf845c50cc3 l/glibc-profile-2.39-i586-2.txz Slackware x86_64 -current package: 86d02cbc3ce60f1ba2e31e334ad8f84f a/aaa_glibc-solibs-2.39-x86_64-2.txz 032540c006e8015368d71fb98f6a1bc0 l/glibc-2.39-x86_64-2.txz d5a77e36486fcf60c8fb89f45635d752 l/glibc-i18n-2.39-x86_64-2.txz caba19659a85eb38cc0e8692f4d89efa l/glibc-profile-2.39-x86_64-2.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg *glibc-*.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQTsVknaQB4iq/pnNu9qRGPAQBAiMwUCZiFxlgAKCRBqRGPAQBAi M2FWAJ4woj1+W3d5ROA6y1TEXgqxfnesjACeIb52zbojNYKHN6pF5VtoKWOumXw= =8C/O -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds