[Git][security-tracker-team/security-tracker][master] 2 commits: CVE-2019-13225,libonig: Stretch is not affected
Markus Koschany
apo at debian.org
Tue Nov 3 22:49:23 GMT 2020
Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0e29830f by Markus Koschany at 2020-11-03T23:45:09+01:00
CVE-2019-13225,libonig: Stretch is not affected
Actually the issue was introduced in a later version
- - - - -
01c6a669 by Markus Koschany at 2020-11-03T23:48:32+01:00
libonig: remove no-dsa tags for stretch release
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -65839,7 +65839,6 @@ CVE-2019-19246 (Oniguruma through 6.9.3, as used in PHP 7.3.x and other products
{DLA-2020-1}
- libonig 6.9.4-1 (low; bug #946344)
[buster] - libonig <no-dsa> (Minor issue)
- [stretch] - libonig <no-dsa> (Minor issue)
NOTE: https://bugs.php.net/bug.php?id=78559
NOTE: https://github.com/kkos/oniguruma/commit/d3e402928b6eb3327f8f7d59a9edfa622fec557b
CVE-2019-19245 (NAPC Xinet Elegant 6 Asset Library 6.1.655 allows Pre-Authentication S ...)
@@ -65956,14 +65955,12 @@ CVE-2019-19204 (An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In th
{DLA-2020-1}
- libonig 6.9.4-1 (low; bug #945313)
[buster] - libonig <no-dsa> (Minor issue)
- [stretch] - libonig <no-dsa> (Minor issue)
NOTE: https://github.com/kkos/oniguruma/issues/162
NOTE: https://github.com/kkos/oniguruma/commit/6eb4aca6a7f2f60f473580576d86686ed6a6ebec (v6.9.4_rc2)
NOTE: Only exploitable with attacker-provided pattern
CVE-2019-19203 (An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the func ...)
- libonig 6.9.4-1 (low; bug #945312)
[buster] - libonig <no-dsa> (Minor issue)
- [stretch] - libonig <no-dsa> (Minor issue)
[jessie] - libonig <ignored> (Minor issue, not reproducible, non-trivial backport)
NOTE: https://github.com/kkos/oniguruma/issues/163
NOTE: https://github.com/kkos/oniguruma/commit/aa0188eaedc056dca8374ac03d0177429b495515 (v6.9.4_rc2)
@@ -66520,7 +66517,6 @@ CVE-2019-19012 (An integer overflow in the search_in_range function in regexec.c
{DLA-2020-1}
- libonig 6.9.4-1 (low; bug #944959)
[buster] - libonig <no-dsa> (Minor issue)
- [stretch] - libonig <no-dsa> (Minor issue)
NOTE: https://github.com/kkos/oniguruma/issues/164
NOTE: https://github.com/kkos/oniguruma/commit/0463e21432515631a9bc925ce5eb95b097c73719
NOTE: https://github.com/kkos/oniguruma/commit/778a43dd56925ed58bbe26e3a7bb8202d72c3f3f
@@ -77579,7 +77575,6 @@ CVE-2019-16163 (Oniguruma before 6.9.3 allows Stack Exhaustion in regcomp.c beca
{DLA-1918-1}
- libonig 6.9.4-1 (low; bug #939988)
[buster] - libonig <no-dsa> (Minor issue)
- [stretch] - libonig <no-dsa> (Minor issue)
NOTE: https://github.com/kkos/oniguruma/issues/147
NOTE: https://github.com/kkos/oniguruma/commit/4097828d7cc87589864fecf452f2cd46c5f37180
CVE-2019-16162 (Onigmo through 6.2.0 has an out-of-bounds read in parse_char_class bec ...)
@@ -88016,14 +88011,13 @@ CVE-2019-13233 (In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, th
CVE-2019-13225 (A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9 ...)
- libonig 6.9.2-1 (low; bug #931878)
[buster] - libonig <no-dsa> (Minor issue)
- [stretch] - libonig <no-dsa> (Minor issue)
+ [stretch] - libonig <no-affected> (vulnerable code was introduced later)
[jessie] - libonig <not-affected> (vulnerable code was introduced later)
NOTE: https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c
CVE-2019-13224 (A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 a ...)
{DLA-1854-1}
- libonig 6.9.2-1 (low; bug #931878)
[buster] - libonig <no-dsa> (Minor issue)
- [stretch] - libonig <no-dsa> (Minor issue)
NOTE: https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
CVE-2019-13223 (A reachable assertion in the lookup1_values function in stb_vorbis thr ...)
- libstb 0.0~git20190817.1.052dce1-1 (bug #934966)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/edc800fea9ca9fcb6cf963b9ca24c2fe2ee5d4b7...01c6a66937c85cb4cd8f0c76d22b7beb1a52cf16
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/edc800fea9ca9fcb6cf963b9ca24c2fe2ee5d4b7...01c6a66937c85cb4cd8f0c76d22b7beb1a52cf16
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201103/192839e1/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list