CVE-2016-2148

NameCVE-2016-2148
DescriptionHeap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1445-1, DLA-2559-1, ELA-20-1
Debian Bugs818497

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
busybox (PTS)jessie, jessie (lts)1:1.22.0-9+deb8u5fixed
stretch (security), stretch (lts), stretch1:1.22.0-19+deb9u2fixed
buster1:1.30.1-4fixed
bullseye1:1.30.1-6fixed
bookworm1:1.35.0-4fixed
sid, trixie1:1.37.0-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
busyboxsourcewheezy1:1.20.0-7+deb7u1ELA-20-1
busyboxsourcejessie1:1.22.0-9+deb8u2DLA-1445-1
busyboxsourcestretch1:1.22.0-19+deb9u1DLA-2559-1
busyboxsource(unstable)1:1.27.2-1818497

Notes

[wheezy] - busybox <no-dsa> (Minor issue)
https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2

Search for package or bug name: Reporting problems