Lucene search

K
mageiaGentoo FoundationMGASA-2016-0270
HistoryJul 31, 2016 - 11:39 p.m.

Updated glibc and libtirpc packages fixes security vulnerability

2016-07-3123:39:13
Gentoo Foundation
advisories.mageia.org
16

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

77.1%

A stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets (CVE-2016-4429). A similar issue was fixed in lnt_dg_call in src/clnt_dg.c in libtirpc package as part of this update. Other fixes in this update: - Fix static dlopen default library search path [Glibc BZ #17250] - grantpt: trust the kernel about pty group and permission mode [Glibc BZ #19347]

OSVersionArchitecturePackageVersionFilename
Mageia5noarchglibc< 2.20-23glibc-2.20-23.mga5
Mageia5noarchlibtirpc< 0.2.5-3.1libtirpc-0.2.5-3.1.mga5

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.005 Low

EPSS

Percentile

77.1%