| Summary: | libtirpc new security issue CVE-2021-46828 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, herman.viaene, mhrambo3501, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | libtirpc-1.3.1-1.mga8.src.rpm | CVE: | CVE-2021-46828 |
| Status comment: | |||
|
Description
David Walser
2022-07-29 17:37:06 CEST
David Walser
2022-07-29 17:37:30 CEST
Status comment:
(none) =>
Fixed upstream in 1.3.3rc1 Assigning this globally in the absence of a visible maintainer. (This bug is noted against v1.3.1, although Cauldron already has v1.3.2. Irrelevant seeing that the cure is in v1.3.3rc1). Assignee:
bugsquad =>
pkg-bugs Debian has issued an advisory for this on August 7: https://www.debian.org/security/2022/dsa-5200 Updated package built for cauldron and Mageia 8 Advisory: ======================== Patched libtirpc package fixes security vulnerability: It was discovered that libtirpc incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service (CVE-2021-46828). References: https://ubuntu.com/security/notices/USN-5538-1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46828 ======================== Updated packages in core/updates_testing: ======================== lib64tirpc3-1.3.3-1.mga8 lib64tirpc-devel-1.3.3-1.mga8 libtirpc-1.3.3-1.mga8 from libtirpc-1.3.3-1.mga8.src.rpm Whiteboard:
MGA8TOO =>
(none) MGA8-64 Plasma on Acer Aspire 5253 No installation issues. Ref bug 20788 for testing # systemctl start rpcbind # strace -o /home/tester8/Documents/libtirpc.txt rpcinfo program version netid address service owner 100000 4 tcp6 ::.0.111 portmapper superuser 100000 3 tcp6 ::.0.111 portmapper superuser 100000 4 udp6 ::.0.111 portmapper superuser 100000 3 udp6 ::.0.111 portmapper superuser 100000 4 tcp 0.0.0.0.0.111 portmapper superuser 100000 3 tcp 0.0.0.0.0.111 portmapper superuser 100000 2 tcp 0.0.0.0.0.111 portmapper superuser 100000 4 udp 0.0.0.0.0.111 portmapper superuser 100000 3 udp 0.0.0.0.0.111 portmapper superuser 100000 2 udp 0.0.0.0.0.111 portmapper superuser 100000 4 local /run/rpcbind.sock portmapper superuser 100000 3 local /run/rpcbind.sock portmapper superuser Found ref. to libtirpc in trace file, so OK for me. CC:
(none) =>
herman.viaene Validating. Advisory in Comment 3. Keywords:
(none) =>
validated_update
Dave Hodgins
2022-08-20 02:49:57 CEST
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0288.html Status:
NEW =>
RESOLVED |