Package | libonig |
---|---|
Version | 5.9.5-3.2+deb8u5 |
Related CVEs | CVE-2020-26159 |
In Oniguruma, an attacker able to supply a regular expression
for compilation may be able to overflow a buffer by one byte
in concat_opt_exact_info_str
& concat_opt_exact_info
in
regcomp.c
.
Besides, there were other other issues like resource leaks in
bbuf_clone()
, not_code_range_buf()
, etc in regparse.c
and
some other issues that needed fixing as well.
For Debian 8 jessie, these problems have been fixed in version 5.9.5-3.2+deb8u5.
We recommend that you upgrade your libonig packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.