Package: release.debian.org
Severity: normal
Tags: trixie security
X-Debbugs-Cc: t...@security.debian.org
User: release.debian....@packages.debian.org
Usertags: binnmu

Dear release team,

An untrusted LD_LIBRARY_PATH environment variable vulnerability has been
found in the GNU libc, affecting *static* binaries (CVE-2025-4802). It
allows attacker controlled loading of dynamically shared library in
*statically* compiled setuid  binaries that call dlopen.

The issue has been fixed in glibc 2.39, which migrated to testing on
2024-07-23. I haven't found any static binary with setuid or setgid bit
set in the archive, but I think we should rebuild all static binaries in
cases some users have changed the permission of some of them. Most of
the static binaries in trixie have been rebuilt since them, thanks to
the regular binNMU to get rid of outdated Built-Using. That said a few
packages shipping glibc based static binaries do not set Built-Using,
and hasn't been rebuild for other reasons since then, so they need a
binNMU:

  nmu 10 tini_0.19.0-1 . ANY. -m 'Rebuild against libc6-dev (>= 2.39)'
  nmu tsocks_1.8beta5+ds1-2 . ANY . -m 'Rebuild against libc6-dev (>= 2.39)'

Using +b10 for tini is done on purpose, in order to keep some values
available for bookworm and possibly bullseye, as the source version is
the same from bullseye to sid.

Thanks
Aurelien

Reply via email to