Accepted libonig 6.1.3-2+deb9u1 (source) into oldstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 04 Nov 2020 22:45:44 +0100
Source: libonig
Binary: libonig4 libonig4-dbg libonig-dev
Architecture: source
Version: 6.1.3-2+deb9u1
Distribution: stretch-security
Urgency: high
Maintainer: Jörg Frings-Fürst <debian@jff-webhosting.net>
Changed-By: Markus Koschany <apo@debian.org>
Description:
libonig-dev - regular expressions library — development files
libonig4 - regular expressions library
libonig4-dbg - regular expressions library — debugging symbols
Changes:
libonig (6.1.3-2+deb9u1) stretch-security; urgency=high
.
* Non-maintainer upload by the LTS team.
* Fix CVE-2019-13224:
A use-after-free in onig_new_deluxe() in regext.c allows
attackers to potentially cause information disclosure, denial of service,
or possibly code execution by providing a crafted regular expression. The
attacker provides a pair of a regex pattern and a string, with a multi-byte
encoding that gets handled by onig_new_deluxe().
* Fix CVE-2019-16163:
Oniguruma allows Stack Exhaustion in regcomp.c because of recursion in regparse.c.
* Fix CVE-2019-19012:
An integer overflow in the search_in_range function in regexec.c in
Onigurama leads to an out-of-bounds read, in which the offset of this read
is under the control of an attacker. (This only affects the 32-bit compiled
version). Remote attackers can cause a denial-of-service or information
disclosure, or possibly have unspecified other impact, via a crafted
regular expression.
* Fix CVE-2019-19203:
An issue was discovered in Oniguruma. In the function gb18030_mbc_enc_len
in file gb18030.c, a UChar pointer is dereferenced without checking if it
passed the end of the matched string. This leads to a heap-based buffer
over-read.
* Fix CVE-2019-19204:
An issue was discovered in Oniguruma. In the function
fetch_interval_quantifier (formerly known as fetch_range_quantifier) in
regparse.c, PFETCH is called without checking PEND. This leads to a
heap-based buffer over-read.
* Fix CVE-2019-19246:
Oniguruma has a heap-based buffer over-read in str_lower_case_match in
regexec.c.
* Fix CVE-2020-26159:
In Oniguruma an attacker able to supply a regular expression for
compilation may be able to overflow a buffer by one byte in
concat_opt_exact_str in src/regcomp.c
Checksums-Sha1:
a018ca40d8b0877ed8298cae10943c1c70714c0b 2156 libonig_6.1.3-2+deb9u1.dsc
b78481387254f50958eff0051f23e3ab8d605822 567006 libonig_6.1.3.orig.tar.gz
441b57e5b47a9f31434553d95e53d21dce25775d 13384 libonig_6.1.3-2+deb9u1.debian.tar.xz
d3121336aa13cc43a974b9afcdff1fab4aac111b 6548 libonig_6.1.3-2+deb9u1_amd64.buildinfo
Checksums-Sha256:
e568e649b661e923b205a3ff5d97dc32454765a16713958a171db21b5c437938 2156 libonig_6.1.3-2+deb9u1.dsc
27fec91c6ba8333c1cd508a4b26ed29c232415724c68a9268207b6c7a5e8c20b 567006 libonig_6.1.3.orig.tar.gz
dce586039a3565450618861f953db92968354df96f651943d00077ae85ab94b3 13384 libonig_6.1.3-2+deb9u1.debian.tar.xz
9bc2af026d4c765785cd39916a3ecf1f357793a83fefad77385ebd37d8fec950 6548 libonig_6.1.3-2+deb9u1_amd64.buildinfo
Files:
eb03b5d2b1bffa7bf9672b025bb27c98 2156 libs extra libonig_6.1.3-2+deb9u1.dsc
212ddd2be5a2455c206f8d72420f2c58 567006 libs extra libonig_6.1.3.orig.tar.gz
f568b65c8b6f7b84f1af79c6ca615abb 13384 libs extra libonig_6.1.3-2+deb9u1.debian.tar.xz
784ce3351a819accd91556ff7fcfc03a 6548 libs extra libonig_6.1.3-2+deb9u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=An6H
-----END PGP SIGNATURE-----