MGASA-2017-0091

Source
https://advisories.mageia.org/MGASA-2017-0091.html
Import Source
https://advisories.mageia.org/MGASA-2017-0091.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0091
Related
Published
2017-03-27T13:55:27Z
Modified
2017-03-27T09:01:22Z
Summary
Updated glibc packages fix security vulnerability
Details

Florian Weimer discovered a NULL pointer dereference in the DNS resolver of the GNU C Library. An attacker could use this to cause a denial of service (CVE-2015-5180).

Tim Ruehsen discovered that the getaddrinfo() implementation in the GNU C Library did not properly track memory allocations. An attacker could use this to cause a denial of service (CVE-2016-5417).

References
Credits

Affected packages

Mageia:5 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.20-24.mga5

Ecosystem specific

{
    "section": "core"
}