CVE-2016-2090

Priority
Description
Off-by-one vulnerability in the fgetwln function in libbsd before 0.8.2
allows attackers to have unspecified impact via unknown vectors, which
trigger a heap-based buffer overflow.
Assigned-to
leosilva
Notes
mdeslaurarchive search doesn't seem to locate fgetwln usage
Package
Upstream:released (0.8.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):released (0.6.0-2ubuntu1+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (0.8.2-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (0.8.2-1)
Ubuntu 19.04 (Disco Dingo):not-affected (0.8.2-1)
Ubuntu 19.10 (Eoan Ermine):not-affected (0.8.2-1)
Ubuntu 20.04 (Focal Fossa):not-affected (0.8.2-1)
Patches:
Upstream:http://cgit.freedesktop.org/libbsd/commit/?id=c8f0723d2b4520bdd6b9eb7c3e7976de726d7ff7
More Information

Updated: 2020-01-20 17:14:56 UTC (commit 3f16e419d75b8efd96fd121897a8eb32c2721ba0)