Lucene search

K
mageiaGentoo FoundationMGASA-2015-0072
HistoryFeb 17, 2015 - 9:38 p.m.

Updated glibc packages fix security vulnerabilities

2015-02-1721:38:13
Gentoo Foundation
advisories.mageia.org
8

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

85.7%

Under certain conditions wscanf can allocate too little memory for the to-be-scanned arguments and overflow the allocated buffer (CVE-2015-1472). The incorrect use of “__libc_use_alloca (newsize)” caused a different (and weaker) policy to be enforced which could allow a denial of service attack (CVE-2015-1473).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchglibc< 2.18-9.9glibc-2.18-9.9.mga4

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

85.7%