cracklib is vulnerable to denial of service. The vulnerability exists because of a stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib when parsing large GECOS field.
CPE | Name | Operator | Version |
---|---|---|---|
cracklib | le | 2.9.6__15.el8 | |
cracklib | le | 2.9.6__15.el8 |
lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
www.openwall.com/lists/oss-security/2016/08/16/2
www.openwall.com/lists/oss-security/2016/08/16/2
www.securityfocus.com/bid/92478
www.securityfocus.com/bid/92478
bugzilla.redhat.com/show_bug.cgi?id=1364944
lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
lists.debian.org/debian-lts-announce/2020/05/msg00023.html
lists.debian.org/debian-lts-announce/2020/05/msg00023.html
seclists.org/oss-sec/2016/q3/370
security.gentoo.org/glsa/201612-25
security.gentoo.org/glsa/201612-25