![]() CVE-2023-4911: If a tunable of the form NAME=NAME=VAL is passed in the environment of a setuid program and NAME is valid, it may result in a buffer overflow, which could be exploited to achieve escalated privileges. This flaw was introduced in glibc 2.34. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> |
||
---|---|---|
.. | ||
0001-HACK-only-build-and-install-localedef.patch | ||
0002-relax-dependency-on-GCC-to-4.8-and-binutils-to-2.24.patch | ||
localedef.hash | ||
localedef.mk |