Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20250123122412.GA9737@localhost.localdomain>
Date: Thu, 23 Jan 2025 12:24:21 +0000
From: Qualys Security Advisory <qsa@...lys.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: Re: CVE-2025-0395: Buffer overflow in the GNU C Library's assert()

Hi all,

On Wed, Jan 22, 2025 at 01:41:36PM +0000, Qualys Security Advisory wrote:
> Today (January 22, 2025) a Bugzilla entry and a patch proposal for this
> vulnerability have been published:

The final patch has already been committed and backported, all the links
are available in Bugzilla:

  https://sourceware.org/bugzilla/show_bug.cgi?id=32582

Thank you very much to the GNU C Library's security team for the quick
fix and their work on this!

With best regards,

-- 
the Qualys Security Advisory team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.