Package        : libtirpc
Version        : 0.2.5-1+deb8u3
CVE ID         : CVE-2016-4429


It was discovered that libtiprc, a transport-independent RPC library, 
could be used for a denial of service or possibly unspecified other impact 
by a stack-based buffer overflow due to a flood of crafted ICMP and UDP 
packets.


For Debian 8 "Jessie", this problem has been fixed in version
0.2.5-1+deb8u3.

We recommend that you upgrade your libtirpc packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2256-1: libtirpc security update

June 28, 2020
It was discovered that libtiprc, a transport-independent RPC library, could be used for a denial of service or possibly unspecified other impact by a stack-based buffer overflow du...

Summary


For Debian 8 "Jessie", this problem has been fixed in version
0.2.5-1+deb8u3.

We recommend that you upgrade your libtirpc packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : libtirpc
Version : 0.2.5-1+deb8u3
CVE ID : CVE-2016-4429

Related News