MGASA-2016-0157

Source
https://advisories.mageia.org/MGASA-2016-0157.html
Import Source
https://advisories.mageia.org/MGASA-2016-0157.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0157
Related
Published
2016-04-29T17:21:35Z
Modified
2016-04-29T17:15:00Z
Summary
Updated pgpdump packages fix security vulnerability
Details

When pgpdump is run on specially crafted input, a denial of service condition occurs. The program runs with 100% CPU usage for an indefinite amount of time. A remote attacker is able to create a specially crafted input that is leading to CPU resource consumption resulting in denial of service (CVE-2016-4021).

References
Credits

Affected packages

Mageia:5 / pgpdump

Package

Name
pgpdump
Purl
pkg:rpm/mageia/pgpdump?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.30-1.mga5

Ecosystem specific

{
    "section": "core"
}