Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in GNU C Library (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in GNU C Library (Aktualisierung)
ID: USN-7259-3
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS
Datum: Mo, 10. Februar 2025, 19:16
Referenzen: https://www.cve.org/CVERecord?id=CVE-2025-0395
Applikationen: GNU C library
Update von: Ausführen beliebiger Kommandos in GNU C Library

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8889491070199759139==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------0Y0QuCWVjp3GhOKA2KRAVRMR"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------0Y0QuCWVjp3GhOKA2KRAVRMR
Content-Type: multipart/mixed;
boundary="------------1El2j5P076qn1pg9Ip6KD6BM";
protected-headers="v1"
From: Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <026e3eb4-1a34-4f38-a2f8-952664a8394d@canonical.com>
Subject: [USN-7259-3] GNU C Library vulnerability

--------------1El2j5P076qn1pg9Ip6KD6BM
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7259-3
February 10, 2025

eglibc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

GNU C Library could be made to crash or run programs if it received
specially crafted input.

Software Description:
- eglibc: GNU C Library

Details:

USN-7259-1 fixed a vulnerability in GNU C Library. This update provides the
corresponding update for Ubuntu 14.04 LTS.

Original advisory details:

 It was discovered that GNU C Library incorrectly handled memory when using
 the assert function. An attacker could possibly use this issue to cause a
 denial of service or execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS
  libc6                           2.19-0ubuntu6.15+esm4
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7259-3
  https://ubuntu.com/security/notices/USN-7259-2
  https://ubuntu.com/security/notices/USN-7259-1
  CVE-2025-0395

--------------1El2j5P076qn1pg9Ip6KD6BM--

--------------0Y0QuCWVjp3GhOKA2KRAVRMR
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=eNz9
-----END PGP SIGNATURE-----

--------------0Y0QuCWVjp3GhOKA2KRAVRMR--


--===============8889491070199759139==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============8889491070199759139==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung