libbsd is vulnerable to denial of service. An out-of-bounds read in nlist.c
during a comparison for a symbol name from the string table (strtab) allows an attacker to crash the application.
CPE | Name | Operator | Version |
---|---|---|---|
libbsd:3.10 | eq | 0.9.1-r0 |
lists.opensuse.org/opensuse-security-announce/2020-05/msg00043.html
gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b
lists.apache.org/thread.html/r0e913668380f59bcbd14fdd8ae8d24f95f99995e290cd18a7822c6e5@%3Cdev.tomee.apache.org%3E
lists.apache.org/thread.html/ra781e51cf1ec40381c98cddc073b3576fb56c3978f4564d2fa431550@%3Cdev.tomee.apache.org%3E
lists.debian.org/debian-lts-announce/2021/02/msg00027.html
lists.freedesktop.org/archives/libbsd/2019-August/000229.html
secdb.alpinelinux.org/v3.10/main.yaml
secdb.alpinelinux.org/v3.11/main.yaml
secdb.alpinelinux.org/v3.12/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
usn.ubuntu.com/4243-1/