Gentoo: GLSA-202405-17: glibc: Security Advisory Updates
Summary
Multiple vulnerabilities have been discovered in glibc. Please review
the CVE identifiers referenced below for details.
Resolution
All glibc users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.38-r13"
References
[ 1 ] CVE-2024-2961
https://nvd.nist.gov/vuln/detail/CVE-2024-2961
[ 2 ] CVE-2024-33599
https://nvd.nist.gov/vuln/detail/CVE-2024-33599
[ 3 ] CVE-2024-33600
https://nvd.nist.gov/vuln/detail/CVE-2024-33600
[ 4 ] CVE-2024-33601
https://nvd.nist.gov/vuln/detail/CVE-2024-33601
[ 5 ] CVE-2024-33602
https://nvd.nist.gov/vuln/detail/CVE-2024-33602
[ 6 ] GLIBC-SA-2024-0004
[ 7 ] GLIBC-SA-2024-0005
[ 8 ] GLIBC-SA-2024-0006
[ 9 ] GLIBC-SA-2024-0007
[ 10 ] GLIBC-SA-2024-0008
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202405-17
Concerns
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
Synopsis
Multiple vulnerabilities have been discovered in glibc, the worst of
which could lead to remote code execution.
Background
glibc is a package that contains the GNU C library.
Affected Packages
Package Vulnerable Unaffected
-------------- ------------ ------------
sys-libs/glibc < 2.38-r13 >= 2.38-r13
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.