Lucene search

K
mageiaGentoo FoundationMGASA-2017-0470
HistoryDec 28, 2017 - 4:16 p.m.

Updated glibc packages fix security vulnerabilities

2017-12-2816:16:56
Gentoo Foundation
advisories.mageia.org
7

0.006 Low

EPSS

Percentile

79.1%

The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.(CVE-2017-12132, CVE-2017-12133). The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow (CVE-2017-15670). The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak) (CVE-2017-15671). The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator (CVE-2017-15804). As libtirpc is also affected by CVE-2017-12133, it’s part of this update.

OSVersionArchitecturePackageVersionFilename
Mageia5noarchglibc< 2.20-26glibc-2.20-26.mga5
Mageia5noarchlibtirpc< 0.2.5-3.3libtirpc-0.2.5-3.3.mga5