Summary: | <dev-libs/libbsd-0.8.2: Buffer overflow in fgetwln (CVE-2016-2090) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hanno Böck <hanno> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | freedesktop-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://cgit.freedesktop.org/libbsd/commit/?id=c8f0723d2b4520bdd6b9eb7c3e7976de726d7ff7 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Hanno Böck
![]() Added 0.8.2 which includes a fix for this. Arches please test and stablize. Stable on alpha. Stable for HPPA. amd64 stable Stable for PPC64. arm stable x86 stable ppc stable sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. CVE-2016-2090 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2090): libbsd 0.8.1 and earlier contains a buffer overflow in the function fgetwln(). An if checks if it is necessary to reallocate memory in the target buffer. However this check is off by one, therefore an out of bounds write happens. GLSA opened. @maintainers, still pending cleanup of vulnerable ebuilds. Please let us know when complete or if you are unable to at this time. Thanks. Cleanup done. This issue was resolved and addressed in GLSA 201607-13 at https://security.gentoo.org/glsa/201607-13 by GLSA coordinator Aaron Bauman (b-man). |