Lucene search

K
gentooGentoo FoundationGLSA-200311-06
HistoryNov 22, 2003 - 12:00 a.m.

glibc: getgrouplist buffer overflow vulnerability

2003-11-2200:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

70.5%

Background

glibc is the GNU C library.

Description

A bug in the getgrouplist function can cause a buffer overflow if the size of the group list is too small to hold all the user’s groups. This overflow can cause segmentation faults in user applications. This vulnerability exists only when an administrator has placed a user in a number of groups larger than that expected by an application.

Impact

Applications that use getgrouplist can crash.

Workaround

There is no known workaround at this time.

Resolution

It is recommended that all Gentoo Linux users update their systems as follows:

 # emerge sync
 # emerge -pv '>=sys-libs/glibc-2.2.5'
 # emerge '>=sys-libs/glibc-2.2.5'
 # emerge clean
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-libs/glibc<= 2.2.4UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

70.5%