First published: Thu Feb 06 2025(Updated: )
It was discovered that GNU C Library incorrectly handled memory when using the assert function. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libc6 | <2.40-1ubuntu3.1 | 2.40-1ubuntu3.1 |
Xfce Application Finder | =24.10 | |
All of | ||
ubuntu/libc6 | <2.39-0ubuntu8.4 | 2.39-0ubuntu8.4 |
Xfce Application Finder | =24.04 | |
All of | ||
ubuntu/libc6 | <2.35-0ubuntu3.9 | 2.35-0ubuntu3.9 |
Xfce Application Finder | =22.04 | |
All of | ||
ubuntu/libc6 | <2.31-0ubuntu9.17 | 2.31-0ubuntu9.17 |
Xfce Application Finder | =20.04 | |
All of | ||
ubuntu/libc6 | <2.27-3ubuntu1.6+esm4 | 2.27-3ubuntu1.6+esm4 |
Xfce Application Finder | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7259-1 is critical due to a memory handling flaw in the GNU C Library that can lead to denial of service or arbitrary code execution.
To fix USN-7259-1, upgrade the libc6 package to the recommended version according to your Ubuntu release.
USN-7259-1 affects Ubuntu versions 20.04, 22.04, 24.04, and 24.10 with specific libc6 versions.
The vulnerability in USN-7259-1 is caused by improper memory handling when using the assert function in the GNU C Library.
Yes, USN-7259-1 could potentially allow attackers to execute arbitrary code or cause denial of service, making it a serious risk.