Debian: DSA-5611-1: glibc security update
Summary
Details can be found in the Qualys advisory at
https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
Additionally a memory corruption was discovered in the glibc's qsort()
function, due to missing bounds check and when called by a program
with a non-transitive comparison function and a large number of
attacker-controlled elements. As the use of qsort() with a
non-transitive comparison function is undefined according to POSIX and
ISO C standards, this is not considered a vulnerability in the glibc
itself. However the qsort() implementation was hardened against
misbehaving callers.
Details can be found in the Qualys advisory at
https://www.qualys.com/2024/01/30/qsort.txt
For the stable distribution (bookworm), these problems have been fixed in
version 2.36-9+deb12u4.
We recommend that you upgrade your glibc packages.
For the detailed security status of glibc please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/source-package/glibc
Further information about Debi...