-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 04 Nov 2020 22:45:44 +0100 Source: libonig Binary: libonig4 libonig4-dbg libonig-dev Architecture: source Version: 6.1.3-2+deb9u1 Distribution: stretch-security Urgency: high Maintainer: Jörg Frings-Fürst <debian@jff-webhosting.net> Changed-By: Markus Koschany <apo@debian.org> Description: libonig-dev - regular expressions library — development files libonig4 - regular expressions library libonig4-dbg - regular expressions library — debugging symbols Changes: libonig (6.1.3-2+deb9u1) stretch-security; urgency=high . * Non-maintainer upload by the LTS team. * Fix CVE-2019-13224: A use-after-free in onig_new_deluxe() in regext.c allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). * Fix CVE-2019-16163: Oniguruma allows Stack Exhaustion in regcomp.c because of recursion in regparse.c. * Fix CVE-2019-19012: An integer overflow in the search_in_range function in regexec.c in Onigurama leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression. * Fix CVE-2019-19203: An issue was discovered in Oniguruma. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read. * Fix CVE-2019-19204: An issue was discovered in Oniguruma. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read. * Fix CVE-2019-19246: Oniguruma has a heap-based buffer over-read in str_lower_case_match in regexec.c. * Fix CVE-2020-26159: In Oniguruma an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c Checksums-Sha1: a018ca40d8b0877ed8298cae10943c1c70714c0b 2156 libonig_6.1.3-2+deb9u1.dsc b78481387254f50958eff0051f23e3ab8d605822 567006 libonig_6.1.3.orig.tar.gz 441b57e5b47a9f31434553d95e53d21dce25775d 13384 libonig_6.1.3-2+deb9u1.debian.tar.xz d3121336aa13cc43a974b9afcdff1fab4aac111b 6548 libonig_6.1.3-2+deb9u1_amd64.buildinfo Checksums-Sha256: e568e649b661e923b205a3ff5d97dc32454765a16713958a171db21b5c437938 2156 libonig_6.1.3-2+deb9u1.dsc 27fec91c6ba8333c1cd508a4b26ed29c232415724c68a9268207b6c7a5e8c20b 567006 libonig_6.1.3.orig.tar.gz dce586039a3565450618861f953db92968354df96f651943d00077ae85ab94b3 13384 libonig_6.1.3-2+deb9u1.debian.tar.xz 9bc2af026d4c765785cd39916a3ecf1f357793a83fefad77385ebd37d8fec950 6548 libonig_6.1.3-2+deb9u1_amd64.buildinfo Files: eb03b5d2b1bffa7bf9672b025bb27c98 2156 libs extra libonig_6.1.3-2+deb9u1.dsc 212ddd2be5a2455c206f8d72420f2c58 567006 libs extra libonig_6.1.3.orig.tar.gz f568b65c8b6f7b84f1af79c6ca615abb 13384 libs extra libonig_6.1.3-2+deb9u1.debian.tar.xz 784ce3351a819accd91556ff7fcfc03a 6548 libs extra libonig_6.1.3-2+deb9u1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAl+jPlxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp YW4ub3JnAAoJENmtFLlRO1HkTDIP+gOSNwe4NNZlJWtqkHa51kA6qPyEIlPJAWRo Jd4L6Pzcgt4ZZRuiKWUx55vV1v957D/r7N504/+5rYXhut5TsWUcJbQNAgwlLizI 1vIga/NRtvEiz8nXMh1bweuBqx2i2YzX3EF+KTMnocf06j7BqL3fvE4+gUbscz8J HsFbMPkoNvaSj2Tz2T8vR9hAsDdzTKgh47mhbhtvBFeLYG31i3agqxG5bP9VtPlh sfY20nm78H7yLAeSwICnsrz295wcCre7KWrM0v65ti4zLNyPSk6NVvnjn6/mvBcR zySdQ1ZhMHy0MJZoMVoVZMm+ifVd+ow4JeQCR9bBBRxnHokMoZCXa1UiTOx9lIe9 AEDyfIiYlurnCgBsdULky/KjXbwcisCx15W7/6nRJPU9LOqkSFP57dUA9dMK4rcB Ax5QhJgPBGfKsIsph/5wtpaysbZeOwH8l6DJ9dzDbgXq/b4T+ahDsm6l9X2zn/hb niAXgBeWyTj6pBz5/ginVyDbwjXQLrGz1j1iwcBHpaMOrynPbIKvK4hW0ifU7Shy z4QKX+Bz5LznX2468c3zOoFpwv07r4tQDqZsVDHezI7MHM7u12BED7xCjphpAFf2 MI1c7nlGIubpY4OE0P46Kl2CsKt8fRxlWqxRHOkpsKZY2klBBQknU5KAhTQJ+PDN HmCTGFf/ =An6H -----END PGP SIGNATURE-----