[Debian-med-packaging] Bug#926014: bwa: CVE-2019-10269
Markus Koschany
apo at debian.org
Sat Mar 30 11:16:49 GMT 2019
Package: bwa
X-Debbugs-CC: team at security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for bwa.
CVE-2019-10269[0]:
| BWA (aka Burrow-Wheeler Aligner) before 2019-01-23 has a stack-based
| buffer overflow in the bns_restore function in bntseq.c via a long
| sequence name in a .alt file.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-10269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10269
Please adjust the affected versions in the BTS as needed. Only Stretch
and later versions are affected.
Regards,
Markus
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 963 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/debian-med-packaging/attachments/20190330/40e84c64/attachment.sig>
More information about the Debian-med-packaging
mailing list