CVE-2024-30949

NameCVE-2024-30949
DescriptionAn issue in newlib v.4.3.0 allows an attacker to execute arbitrary code via the time unit scaling in the _gettimeofday function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
newlib (PTS)jessie2.1.0+git20140818.1a8323b-2vulnerable
stretch2.4.0.20160527-2vulnerable
buster3.1.0.20181231-1vulnerable
bullseye3.3.0-1vulnerable
bookworm3.3.0-1.3+deb12u1vulnerable
sid, trixie4.4.0.20231231-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
newlibsource(unstable)4.4.0.20231231-2unimportant

Notes

https://sourceware.org/git/?p=newlib-cygwin.git;a=commit;h=5f15d7c5817b07a6b18cbab17342c95cb7b42be4 (newlib-4.4.0)
Only affects riscv, which is still WIP

Search for package or bug name: Reporting problems