6.5
CVSSv3

CVE-2016-3189

Published: 30/06/2016 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote malicious users to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bzip bzip2 1.0.6

python python

Vendor Advisories

Debian Bug report logs - #827744 bzip2: CVE-2016-3189: heap use after free in bzip2recover Package: src:bzip2; Maintainer for src:bzip2 is Anibal Monsalve Salazar <anibal@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 20 Jun 2016 12:21:09 UTC Severity: grave Tags: patch, security, upstr ...
Several security issues were fixed in bzip2 ...
Several security issues were fixed in bzip2 ...
A use-after-free flaw was found in bzip2recover, leading to a null pointer dereference, or a write to a closed file descriptor An attacker could use this flaw by sending a specially crafted bzip2 file to recover and force the program to crash ...
A use-after-free flaw was found in bzip2recover, leading to a null pointer dereference, or a write to a closed file descriptor An attacker could use this flaw by sending a specially crafted bzip2 file to recover and force the program to crash ...

Github Repositories

my linux from scratch setup

Linux from scratch This documentation is a derivative of "Linux From Scratch" by Gerard Beekmans, used under CC BY-NC-SA 20 This documentation is licensed under CC BY-NC-SA 40 by Kazutoshi Noguchi Computer instructions may be extracted from the book under the MIT License Linux® is a registered trademark of Linus Torvalds Preparing the host system $LFS変数

List packages changelog diff when updating with zypper

zypperdiff This small utility is inspired by apt-listchanges for listing changes when updating packages with zypper It first downloads with zypper all packages to be installed Then it shows in a pager (less, most, etc) the changelog difference (thus what's new) for each package Finally, when the user has reviewed the changes, it asks if the packages must be installed I

Phonito Security Docker Vulnerability Scanner This action automates scanning Docker images for OS & library vulnerabilities You will need a Phonito Secuirty account which you can get for free at phonitoio Example output: Phonito Scan Complete! ============================================== 4 CVEs present image ============================================== â

Free Docker Vulnerability Scanning for CI/CD integration

Phonito Security Docker Vulnerability Scanner This action automates scanning Docker images for OS & library vulnerabilities You will need a Phonito Secuirty account which you can get for free at phonitoio Example output: Phonito Scan Complete! ============================================== 4 CVEs present image ============================================== â

References

NVD-CWE-Otherhttp://www.securitytracker.com/id/1036132https://bugzilla.redhat.com/show_bug.cgi?id=1319648http://www.openwall.com/lists/oss-security/2016/06/20/1http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlhttp://www.securityfocus.com/bid/91297https://security.gentoo.org/glsa/201708-08https://lists.debian.org/debian-lts-announce/2019/06/msg00021.htmlhttps://usn.ubuntu.com/4038-2/https://usn.ubuntu.com/4038-1/https://seclists.org/bugtraq/2019/Jul/22http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.htmlhttps://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.aschttps://seclists.org/bugtraq/2019/Aug/4http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.htmlhttps://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3Ehttps://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3Ehttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827744https://nvd.nist.govhttps://usn.ubuntu.com/4038-2/https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10