Mageia 2020-0452: oniguruma security update
Summary
In Oniguruma, an attacker able to supply a regular expression for compilation
may be able to overflow a buffer by one byte in concat_opt_exact_str in
src/regcomp.c (CVE-2020-26159).
References
- https://bugs.mageia.org/show_bug.cgi?id=27387
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ZFUJY7BUIFBTZ3IUHVHCID4JYCRDGKPS/
- https://www.debian.org/lts/security/2020/dla-2431
- https://www.openwall.com/lists/oss-security/2020/09/30/7
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26159
Resolution
MGASA-2020-0452 - Updated oniguruma packages fix security vulnerability
SRPMS
- 7/core/oniguruma-6.9.4-1.1.mga7