[CLSA-2024:1717691587] Fix CVE(s): CVE-2024-2961
Type:
security
Severity:
Important
Release date:
2024-06-06 16:33:10 UTC
Description:
* SECURITY UPDATE: buffer overflow in iconv() function when converting to ISO-2022-CN-EXT character set - debian/patches/any/CVE-2024-2961.patch: fix out-of-bound writes in ISO-2022-CN-EXT escape sequences - CVE-2024-2961
Updated packages:
  • glibc-doc_2.23-0ubuntu11.5+tuxcare.els7_all.deb
    sha:c1aa96eb41c6771ab3128536a29adb0577af9d6e
  • glibc-source_2.23-0ubuntu11.5+tuxcare.els7_all.deb
    sha:a2869fb373d1b1e62b6ad7d071b8d9e5c1ae0840
  • libc-bin_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:24b744acf446a6d3e18761875e7edf1121aac250
  • libc-dev-bin_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:d5b59caefaa17dc4c52076c441683987ed756c41
  • libc6_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:bb6b8f76a189b75d8bc074187702e1473dec0159
  • libc6-dev_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:15e3582e3f45a3891ef1970d9c58d0aff3baedc5
  • libc6-dev-i386_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:59c0a78f6d49285e046b0cdca5c3fe4fc72dd79f
  • libc6-dev-x32_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:58a174f7d0c3e785d363e3fdcb284ce4c3c2da45
  • libc6-i386_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:dcc854bd9707141271c100dcf00ea8b3b7faa86a
  • libc6-pic_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:555150f142645b0216157e5495bed61bf319b0d4
  • libc6-x32_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:2e3a7ee4e370393ee14a1d9c995fecd0d3245a09
  • locales_2.23-0ubuntu11.5+tuxcare.els7_all.deb
    sha:fed07b549661a6ff3b3d9e3233522f12bbc01393
  • locales-all_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:b5a16edd671a5af2e0f84e765456160a395e8355
  • multiarch-support_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:dbea14caa53c356ae53de9f4fb0e4547ecb17da1
  • nscd_2.23-0ubuntu11.5+tuxcare.els7_amd64.deb
    sha:ae2646ea7a948aa1d25c57a4d1303924a0f7a85a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.