Lucene search

K
mageiaGentoo FoundationMGASA-2016-0270
HistoryJul 31, 2016 - 11:39 p.m.

Updated glibc and libtirpc packages fixes security vulnerability

2016-07-3123:39:13
Gentoo Foundation
advisories.mageia.org
20

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.005 Low

EPSS

Percentile

77.5%

A stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets (CVE-2016-4429). A similar issue was fixed in lnt_dg_call in src/clnt_dg.c in libtirpc package as part of this update. Other fixes in this update: - Fix static dlopen default library search path [Glibc BZ #17250] - grantpt: trust the kernel about pty group and permission mode [Glibc BZ #19347]

OSVersionArchitecturePackageVersionFilename
Mageia5noarchglibc< 2.20-23glibc-2.20-23.mga5
Mageia5noarchlibtirpc< 0.2.5-3.1libtirpc-0.2.5-3.1.mga5

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

0.005 Low

EPSS

Percentile

77.5%