CVE-2016-6264Project Uclibc-ng vulnerability

6 documents5 sources
Severity
7.5HIGHNVD
EPSS
2.3%
top 15.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27
Latest updateMay 13

Description

Integer signedness error in libc/string/arm/memset.S in uClibc and uClibc-ng before 1.0.16 allows context-dependent attackers to cause a denial of service (crash) via a negative length value to the memset function.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/uclibc< uclibc 1.0.20-1 (bookworm)
Debianuclibc/uclibc< 1.0.20-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5f7g-9m8m-qhpv: Integer signedness error in libc/string/arm/memset2022-05-13
OSV
CVE-2016-6264: Integer signedness error in libc/string/arm/memset2017-01-27

📋Vendor Advisories

1
Debian
CVE-2016-6264: uclibc - Integer signedness error in libc/string/arm/memset.S in uClibc and uClibc-ng bef...2016

💬Community

2
Bugzilla
CVE-2016-6264 uClibc: Integer overflow vulnerability leads to code execution on ARM architecture2016-07-04
Bugzilla
CVE-2016-6264 uClibc: Integer overflow vulnerability leads to code execution on ARM architecture [fedora-all]2016-07-04