CVE-2016-2090
Published: 13 January 2017
Off-by-one vulnerability in the fgetwln function in libbsd before 0.8.2 allows attackers to have unspecified impact via unknown vectors, which trigger a heap-based buffer overflow.
Priority
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
libbsd Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(0.8.2-1)
|
bionic |
Not vulnerable
(0.8.2-1)
|
|
cosmic |
Not vulnerable
(0.8.2-1)
|
|
disco |
Not vulnerable
(0.8.2-1)
|
|
eoan |
Not vulnerable
(0.8.2-1)
|
|
precise |
Not vulnerable
(code not present)
|
|
trusty |
Released
(0.6.0-2ubuntu1+esm1)
|
|
upstream |
Released
(0.8.2-1)
|
|
vivid |
Ignored
(reached end-of-life)
|
|
wily |
Ignored
(reached end-of-life)
|
|
xenial |
Not vulnerable
(0.8.2-1)
|
|
yakkety |
Not vulnerable
(0.8.2-1)
|
|
zesty |
Not vulnerable
(0.8.2-1)
|
Notes
Author | Note |
---|---|
mdeslaur | archive search doesn't seem to locate fgetwln usage |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2090
- https://blog.fuzzing-project.org/36-Heap-buffer-overflow-in-fgetwln-function-of-libbsd.html
- https://ubuntu.com/security/notices/USN-4243-1
- NVD
- Launchpad
- Debian