Release date:
2022-12-19 20:20:09 UTC
Description:
* SECURITY UPDATE: buffer overrun in EUC-KR conversion module
- debian/patches/any/CVE-2019-25013: skip two bytes when told to
skip over the unknown designation, potentially running over
the buffer end
- CVE-2019-25013
* SECURITY UPDATE: hang in the iconv program
- debian/patches/any/CVE-2020-27618: adjust the converter to
accept redundant shift sequences in IBM1364, IBM1371, IBM1388,
IBM1390 and IBM1399 character sets
- CVE-2020-27618
Updated packages:
-
glibc-doc_2.23-0ubuntu11.5+tuxcare.els5_all.deb
sha:092163f8309f2255244dbad20dcb43b815aabfda
-
glibc-source_2.23-0ubuntu11.5+tuxcare.els5_all.deb
sha:b0c452d52d40fbd7d5f3b5b7857704b4b84318d1
-
libc-bin_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:0fec32c872ff8928a1a2cbc0b7ae9f9aafd292b8
-
libc-dev-bin_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:a6e74646f7c836f64653bfba91c2a8629bcc88ae
-
libc6_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:aa9fab47a33e659dbdb7c609b21c7c1acc054353
-
libc6-dev_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:f5f0ffea6291c3b908f2e8511c09295c2c46f07b
-
libc6-dev-i386_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:004a3e1113932e5ecf19b1943b099e1c9deaa82a
-
libc6-dev-x32_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:88f7c9e309103e77002717d0de83b847fea04d6f
-
libc6-i386_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:e60711a081d545a2a164d2fe7d4752beaa4c87a0
-
libc6-pic_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:d1b72b624deef4d7b6e118f79251e9b4f6ba40e6
-
libc6-x32_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:2f4346be2d367aad9fa87c13ab584aa06fe962e9
-
locales_2.23-0ubuntu11.5+tuxcare.els5_all.deb
sha:e522511474e96984a90d418ccf14d211c69a686e
-
locales-all_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:a17ff2ba71508844499ecbcee092ba33c0c96f3a
-
multiarch-support_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:0daa3d745a6560b7fac5357c59e557c5eda3bc36
-
nscd_2.23-0ubuntu11.5+tuxcare.els5_amd64.deb
sha:f549a1b05b47cde09c8a307b8ed1428ea0de20ba
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.