Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 714016 (CVE-2019-18936) - <dev-libs/univalue-1.0.5: Denial of service in UniValue::read() (CVE-2019-18936)
Summary: <dev-libs/univalue-1.0.5: Denial of service in UniValue::read() (CVE-2019-18936)
Status: RESOLVED FIXED
Alias: CVE-2019-18936
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: https://github.com/jgarzik/univalue/p...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-03-22 17:13 UTC by Sam James
Modified: 2020-07-18 00:09 UTC (History)
2 users (show)

See Also:
Package list:
=dev-libs/univalue-1.0.5
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-22 17:13:05 UTC
Description:
"UniValue::read() in UniValue before 1.0.5 allow attackers to cause a denial of service (the class internal data reaches an inconsistent state) via input data that triggers an error."

Patch: https://github.com/jgarzik/univalue/pull/58

The fix is included in 1.0.5: https://github.com/jgarzik/univalue/compare/v1.0.4...v1.0.5
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-17 20:33:48 UTC
@maintainer(s): ping
Comment 2 Luke-Jr 2020-04-18 03:03:43 UTC
Oops, forgot to finish this

https://github.com/gentoo/gentoo/pull/15389
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-04 18:37:34 UTC
Bumped in https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=90a8f8422285d07017893315229fe0b64fe8807d.

We'll stable if no objections.
Comment 4 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2020-07-08 12:23:30 UTC
amd64 done
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-08 19:57:01 UTC
arm stable
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-17 00:04:47 UTC
x86: ping
Comment 7 Agostino Sarubbo gentoo-dev 2020-07-17 07:46:26 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 8 Larry the Git Cow gentoo-dev 2020-07-18 00:00:46 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6f977b3c14def1e03236dfa806841e3a259c2192

commit 6f977b3c14def1e03236dfa806841e3a259c2192
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2020-07-17 21:29:40 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-07-17 23:59:57 +0000

    dev-libs/univalue: security cleanup
    
    Bug: https://bugs.gentoo.org/714016
    Package-Manager: Portage-2.3.103, Repoman-2.3.23
    Signed-off-by: Sam James <sam@gentoo.org>

 dev-libs/univalue/Manifest              |  3 ---
 dev-libs/univalue/univalue-1.0.2.ebuild | 33 ----------------------------
 dev-libs/univalue/univalue-1.0.3.ebuild | 32 ---------------------------
 dev-libs/univalue/univalue-1.0.4.ebuild | 38 ---------------------------------
 4 files changed, 106 deletions(-)
Comment 9 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-18 00:09:42 UTC
GLSA vote: no!

Tree is clean, closing.