The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process.
Solution:
Workaround:
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://kb.isc.org/docs/cve-2022-2881 | vendor advisory patch |
http://www.openwall.com/lists/oss-security/2022/09/21/3 | third party advisory mailing list patch |
https://security.gentoo.org/glsa/202210-25 | vendor advisory third party advisory |