First published: Mon Jan 20 2020(Updated: )
It was discovered that libbsd incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 ESM. (CVE-2016-2090) It was discovered that libbsd incorrectly handled certain strings. An attacker could possibly use this issue to access sensitive information. (CVE-2019-20367)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libbsd0 | <0.9.1-2ubuntu0.1 | 0.9.1-2ubuntu0.1 |
=19.04 | ||
All of | ||
ubuntu/libbsd0 | <0.8.7-1ubuntu0.1 | 0.8.7-1ubuntu0.1 |
=18.04 | ||
All of | ||
ubuntu/libbsd0 | <0.8.2-1ubuntu0.1 | 0.8.2-1ubuntu0.1 |
=16.04 | ||
All of | ||
ubuntu/libbsd0 | <0.6.0-2ubuntu1+esm1 | 0.6.0-2ubuntu1+esm1 |
=14.04 | ||
All of | ||
ubuntu/libbsd0 | <0.3.0-2ubuntu0.1 | 0.3.0-2ubuntu0.1 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4243-1 is high.
The libbsd vulnerability (USN-4243-1) affects Ubuntu 14.04 ESM.
Yes, the libbsd vulnerability (USN-4243-1) can be exploited to execute arbitrary code.
The recommended remedy for the libbsd vulnerability (USN-4243-1) in Ubuntu 14.04 ESM is to upgrade to version 0.6.0-2ubuntu1+esm1 of libbsd0.
Yes, you can find additional references for the libbsd vulnerability (USN-4243-1) at the following links: [link1](https://ubuntu.com/security/CVE-2016-2090), [link2](https://ubuntu.com/security/CVE-2019-20367), [link3](https://launchpad.net/ubuntu/+source/libbsd/0.9.1-2ubuntu0.1).