Lucene search

K
osvGoogleOSV:DSA-3012-1
HistoryAug 27, 2014 - 12:00 a.m.

eglibc - security update

2014-08-2700:00:00
Google
osv.dev
10

0.012 Low

EPSS

Percentile

85.0%

Tavis Ormandy discovered a heap-based buffer overflow in the
transliteration module loading code in eglibc, Debian’s version of the
GNU C Library. As a result, an attacker who can supply a crafted
destination character set argument to iconv-related character
conversation functions could achieve arbitrary code execution.

This update removes support of loadable gconv transliteration modules.
Besides the security vulnerability, the module loading code had
functionality defects which prevented it from working for the intended
purpose.

For the stable distribution (wheezy), this problem has been fixed in
version 2.13-38+deb7u4.

We recommend that you upgrade your eglibc packages.