[CLSA-2025:1740470259] Fix CVE(s): CVE-2025-0395
Type:
security
Severity:
Moderate
Release date:
2025-02-25 07:57:44 UTC
Description:
* SECURITY UPDATE: insufficient space allocation in assert() function leading to buffer overflow - debian/patches/any/CVE-2025-0395.patch: Fix underallocation of abort_msg_s struct to store the length of the message string - CVE-2025-0395
Updated packages:
  • glibc-doc_2.23-0ubuntu11.5+tuxcare.els9_all.deb
    sha:5ee7e68a9ae06450ce62bedd14453cff637cdf24
  • glibc-source_2.23-0ubuntu11.5+tuxcare.els9_all.deb
    sha:5472e73143ee89827eb6d4f3759eb04af56220ca
  • libc-bin_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:03b9ab62a9983bb8b3fb69f935f44317b03cfba5
  • libc-dev-bin_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:5d2e53c93a29faf34d4c5021bd85c88f6c46cca5
  • libc6_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:824135be15b580c921820b021d335e1b77c59d36
  • libc6-dev_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:96b5a37037d1fbd8ad3b59d0b484ff093755e109
  • libc6-dev-i386_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:bf22a48cdd43cb7f600cddf194644b7155f211ab
  • libc6-dev-x32_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:f9909d479919804d7b40c16a0b82d192c565761c
  • libc6-i386_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:6ccecf04f48ec8d5047262ce201b2c11093196ad
  • libc6-pic_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:87dffdc9e833adc8cd489b6f673ce6e30155c550
  • libc6-x32_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:cd69f19243d926669f084c4d4b41adfcc479a9ba
  • locales_2.23-0ubuntu11.5+tuxcare.els9_all.deb
    sha:e8533ead41a88ad3a8f0d2a1e0bef44dee51d55c
  • locales-all_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:168f61b9f91912ff071024ddfd012a65e927b39c
  • multiarch-support_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:e8e3c86a02a06b992da7e8c0f77121691503c692
  • nscd_2.23-0ubuntu11.5+tuxcare.els9_amd64.deb
    sha:ad0f6117fbb0bc119e70b1f77103c868671480eb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.