Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 689390 (CVE-2019-13067) - <www-servers/nginx-{1.16.1,1.17.3}: buffer over-read in nxt/nxt_utf8.c (CVE-2019-13067)
Summary: <www-servers/nginx-{1.16.1,1.17.3}: buffer over-read in nxt/nxt_utf8.c (CVE-2...
Status: RESOLVED FIXED
Alias: CVE-2019-13067
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://github.com/nginx/njs/issues/183
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-07-07 06:08 UTC by D'juan McDonald (domhnall)
Modified: 2021-06-12 14:34 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2019-07-07 06:08:07 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2019-13067):

njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place.


Gentoo Security Padawan
(domhnall)
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2019-07-07 06:16:22 UTC
Very low severity given that njs never executes js code from the network, only from a conf file which is a safe source.
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2021-06-12 14:34:35 UTC
Repository is clean, all done.