First published: Tue Nov 24 2020(Updated: )
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Verify Bridge | <=All | |
Musl-libc Musl | <=1.2.1 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Oracle GraalVM | =20.3.2 | |
Oracle GraalVM | =21.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28928 is a vulnerability in musl libc that allows a local attacker to cause a denial of service.
CVE-2020-28928 has a severity rating of 6.2 (Medium).
musl libc 1.2.1, Debian Linux 9.0, Fedora 33, Fedora 34, Oracle GraalVM 20.3.2, Oracle GraalVM 21.1.0, and IBM Security Verify Bridge (all versions) are affected by CVE-2020-28928.
A local attacker can exploit CVE-2020-28928 by sending specially-crafted input to the wcsnrtombs function, causing the application to enter into an infinite loop.
Yes, you can find more information about CVE-2020-28928 at the following references: [link1], [link2], [link3].