MGASA-2015-0072

Source
https://advisories.mageia.org/MGASA-2015-0072.html
Import Source
https://advisories.mageia.org/MGASA-2015-0072.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0072
Related
Published
2015-02-17T18:38:13Z
Modified
2015-02-17T18:27:16Z
Summary
Updated glibc packages fix security vulnerabilities
Details

Under certain conditions wscanf can allocate too little memory for the to-be-scanned arguments and overflow the allocated buffer (CVE-2015-1472).

The incorrect use of "_libcuse_alloca (newsize)" caused a different (and weaker) policy to be enforced which could allow a denial of service attack (CVE-2015-1473).

References
Credits

Affected packages

Mageia:4 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.18-9.9.mga4

Ecosystem specific

{
    "section": "core"
}