| From: |
| Pat Riehecky <riehecky@fnal.gov> |
| To: |
| <scientific-linux-errata@listserv.fnal.gov> |
| Subject: |
| Security ERRATA Moderate: libtirpc on SL6.x i386/srpm/x86_64 |
| Date: |
| Thu, 30 May 2013 19:45:42 +0000 |
| Message-ID: |
| <20130530194542.15500.40148@slpackages.fnal.gov> |
| Archive-link: |
| Article, Thread
|
Synopsis: Moderate: libtirpc security update
Advisory ID: SLSA-2013:0884-1
Issue Date: 2013-05-30
CVE Numbers: CVE-2013-1950
--
A flaw was found in the way libtirpc decoded RPC requests. A specially-
crafted RPC request could cause libtirpc to attempt to free a buffer
provided by an application using the library, even when the buffer was not
dynamically allocated. This could cause an application using libtirpc,
such as rpcbind, to crash. (CVE-2013-1950)
All running applications using libtirpc must be restarted for the update
to take effect.
--
SL6
x86_64
libtirpc-0.2.1-6.el6_4.x86_64.rpm
libtirpc-devel-0.2.1-6.el6_4.x86_64.rpm
libtirpc-devel-0.2.1-6.el6_4.i686.rpm
libtirpc-0.2.1-6.el6_4.i686.rpm
libtirpc-debuginfo-0.2.1-6.el6_4.i686.rpm
libtirpc-debuginfo-0.2.1-6.el6_4.x86_64.rpm
i386
libtirpc-devel-0.2.1-6.el6_4.i686.rpm
libtirpc-0.2.1-6.el6_4.i686.rpm
libtirpc-debuginfo-0.2.1-6.el6_4.i686.rpm
srpm
libtirpc-0.2.1-6.el6_4.src.rpm
noarch
libtirpc-debuginfo-0.2.1-6.el6_4.i686.rpm
libtirpc-debuginfo-0.2.1-6.el6_4.x86_64.rpm
- Scientific Linux Development Team
(
Log in to post comments)