Package: src:glibc Version: 2.19-1 Severity: important Tags: upstream security patch Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=22625
The following vulnerability was published for glibc: | CVE-2017-16997: Incorrect handling of RPATH or RUNPATH containing $ORIGIN | for AT_SECURE or SUID binaries could be used to load libraries from the | current directory. See https://sourceware.org/bugzilla/show_bug.cgi?id=22625 for more details. -- System Information: Debian Release: buster/sid APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE= (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)