[CLSA-2025:1740230107] Fix CVE(s): CVE-2025-0395
Type:
security
Severity:
Moderate
Release date:
2025-02-22 13:15:12 UTC
Description:
* SECURITY UPDATE: insufficient space allocation in assert() function leading to buffer overflow - debian/patches/any/CVE-2025-0395.patch: Fix underallocation of abort_msg_s struct to store the length of the message string - CVE-2025-0395
Updated packages:
  • glibc-doc_2.27-3ubuntu1.6+tuxcare.els5_all.deb
    sha:a438529b7e6dfa80e0731acf69af43d4e9f53706
  • glibc-source_2.27-3ubuntu1.6+tuxcare.els5_all.deb
    sha:d9f4a4f92a7df4c82820a21bd959507f3b3c7129
  • libc-bin_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:f2f87e9ebd903584b611e0f76a0bda9e839c7cfa
  • libc-dev-bin_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:9029ed4cbc36052ed0e4f1b369dee481d285c32d
  • libc6_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:7854f819a803c9a4199a3b1bcf97fc3da2f2f1ad
  • libc6-dev_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:fb8291095407891f5942b6d63e5b372450199afc
  • libc6-dev-i386_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:3db76f64a4620a859dda42388c6be9177e1fc9b7
  • libc6-dev-x32_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:4dff48229009999f722c066361c66c6ad9f25620
  • libc6-i386_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:6e2ae5cebff54043d9b762d2a60082e1b5e8c80e
  • libc6-pic_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:0fcc994108570754a01321839ab0a8a3ac63ab14
  • libc6-x32_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:f0bdc6f5d8c91a6ca22624b9ef8df67d2faeb134
  • locales_2.27-3ubuntu1.6+tuxcare.els5_all.deb
    sha:1f1c0ff05c37e0402b9e7929ab234b8e8d9a986f
  • locales-all_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:ceff8da6ce890705714e42006d683a8d87a07e03
  • multiarch-support_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:16ef67eeeb2258d280e809c9fb5f6c3ca5001af7
  • nscd_2.27-3ubuntu1.6+tuxcare.els5_amd64.deb
    sha:f59ca08ae482afc5a0378299304d3cbbe00d82eb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.