-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2474-1 [email protected] https://www.debian.org/lts/security/ Utkarsh Gupta December 01, 2020 https://wiki.debian.org/LTS - -----------------------------------------------------------------------
Package : musl Version : 1.1.16-3+deb9u1 CVE ID : CVE-2020-28928 Debian Bug : 975365 The wcsnrtombs function in all musl libc versions up through 1.2.1 has been found to have multiple bugs in handling of destination buffer size when limiting the input character count, which can lead to infinite loop with no forward progress (no overflow) or writing past the end of the destination buffers. For Debian 9 stretch, this problem has been fixed in version 1.1.16-3+deb9u1. We recommend that you upgrade your musl packages. For the detailed security status of musl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/musl Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAl/FcigACgkQgj6WdgbD S5Y5pw/9HNJQh3r2CO/JII5Bm6uh+c1GO7BIgy5max11SZaZBBDhM0l40ga+XhNx MgEMbAZ5as3IibtilKfls83I0SGc9vDO7NbGLWPprYCo51qy5r0z4atkCMNgLTu5 LF/YkHo+uRt3wPR3m5SimbiECkGIoaUlWyU21JQ4ciKwQyYs7iAiAq/X/9SueeYf xDrjbYFP4K+D1l9R+dr1eZ9owms62HI2SyGR9LXTwzCZQcAWvLC3Oa5MGMJ+VfCM uXGVw+sUJmGjuG1tVOByHIf9xQEx18G+eimHYUdYrBTCZ9bOaDeLD+fqTH872y9i MtmxYtixRdmDcevmE5/0BHZHT2AqzYyanzZWo911l+cifhNgH7me4TnjkOyUiSN9 i6eahpkYAVPw4vtsFYq1v+mEgjDk8vmu+E01I1Xt4iwPnz4kadxc1V8yQ4kWtauE /GMryviWRDhNTqo8UWvg5h7Ew5HRJOcsCppOJc3IPQYjmbGr4khmADZC7rFapzj0 mHx0DxTJsSW/Ox6JLAGfz3uS/Jc3TTkdfkYlxzBBEfPuWiWcAp+bcBZFp/ZN2CQe lwFlULH3/3JHdyrCKoilf5ptvL6Xsk8GpWX7mwcoknKE3FbjWuZD1+qUHoqwna9J a/p/Bo/A74c1QqnJ/Au+RN8KDIJ0zKfLsyISZ8I1Deg4cnjWl7s= =68kY -----END PGP SIGNATURE-----
