Bugtraq mailing list archives
[SECURITY] [DSA 3012-1] eglibc security update
From: Florian Weimer <fw () deneb enyo de>
Date: Wed, 27 Aug 2014 07:51:23 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3012-1 security () debian org http://www.debian.org/security/ Florian Weimer August 27, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : eglibc CVE ID : CVE-2014-5119 Tavis Ormandy discovered a heap-based buffer overflow in the transliteration module loading code in eglibc, Debian's version of the GNU C Library. As a result, an attacker who can supply a crafted destination character set argument to iconv-related character conversation functions could achieve arbitrary code execution. This update removes support of loadable gconv transliteration modules. Besides the security vulnerability, the module loading code had functionality defects which prevented it from working for the intended purpose. For the stable distribution (wheezy), this problem has been fixed in version 2.13-38+deb7u4. We recommend that you upgrade your eglibc packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce () lists debian org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJT/XeKAAoJEL97/wQC1SS+j6UH/iXVje1YYlf+O4SXDgGTT662 xnZg0itqS7wtV4uC4QgLziPMXUVvBHZKmekpYz3BT0ogTPBq/YOrdFwKRZimUH6k fpBQBc2FxN3yOabxxopwa3ooLo+P2/Cg620S7lU1HuFyK5x9MmTzA+iHBz5zXB/o 60xndeG6aouLwFEJZCdFc7Zlit4s4FNI6RYcP/iWQF96nIO5EcfC2bT36Y+byC0a E12oBWZH+wkGzEIwfwgWTPTqFPYGO/gy15f04dJZMVg8Mg9GUEe3/jbF+UVp7Piv KxEeFhgKP1QTTFmikLj6FYOQ9eeC1N4We2WTupWfHs82y3a+SspeiohyKEjRWk4= =eGnl -----END PGP SIGNATURE-----
Current thread:
- [SECURITY] [DSA 3012-1] eglibc security update Florian Weimer (Aug 27)