Critical severity9.8NVD Advisory· Published Dec 12, 2016· Updated May 6, 2026
CVE-2016-9427
CVE-2016-9427
Description
Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
Affected products
5- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/ivmai/bdwgc/issues/135nvdIssue TrackingPatch
- lists.opensuse.org/opensuse-updates/2016-12/msg00089.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-12/msg00115.htmlnvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/11/18/3nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/94407nvdThird Party AdvisoryVDB Entry
- lists.debian.org/debian-lts-announce/2022/03/msg00039.htmlnvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.