[Debian-med-packaging] Bug#926014: bwa: CVE-2019-10269

Markus Koschany apo at debian.org
Sat Mar 30 11:16:49 GMT 2019


Package: bwa
X-Debbugs-CC: team at security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for bwa.

CVE-2019-10269[0]:
| BWA (aka Burrow-Wheeler Aligner) before 2019-01-23 has a stack-based
| buffer overflow in the bns_restore function in bntseq.c via a long
| sequence name in a .alt file.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-10269
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10269

Please adjust the affected versions in the BTS as needed. Only Stretch
and later versions are affected.

Regards,

Markus

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 963 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/debian-med-packaging/attachments/20190330/40e84c64/attachment.sig>


More information about the Debian-med-packaging mailing list