Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 714016 (CVE-2019-18936)

Summary: <dev-libs/univalue-1.0.5: Denial of service in UniValue::read() (CVE-2019-18936)
Product: Gentoo Security Reporter: Sam James <sam>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: luke-jr+gentoobugs, proxy-maint
Priority: Normal Flags: nattka: sanity-check+
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/jgarzik/univalue/pull/58
Whiteboard: B3 [noglsa cve]
Package list:
=dev-libs/univalue-1.0.5
Runtime testing required: ---

Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-22 17:13:05 UTC
Description:
"UniValue::read() in UniValue before 1.0.5 allow attackers to cause a denial of service (the class internal data reaches an inconsistent state) via input data that triggers an error."

Patch: https://github.com/jgarzik/univalue/pull/58

The fix is included in 1.0.5: https://github.com/jgarzik/univalue/compare/v1.0.4...v1.0.5
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-17 20:33:48 UTC
@maintainer(s): ping
Comment 2 Luke-Jr 2020-04-18 03:03:43 UTC
Oops, forgot to finish this

https://github.com/gentoo/gentoo/pull/15389
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-04 18:37:34 UTC
Bumped in https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=90a8f8422285d07017893315229fe0b64fe8807d.

We'll stable if no objections.
Comment 4 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2020-07-08 12:23:30 UTC
amd64 done
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-08 19:57:01 UTC
arm stable
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-17 00:04:47 UTC
x86: ping
Comment 7 Agostino Sarubbo gentoo-dev 2020-07-17 07:46:26 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 8 Larry the Git Cow gentoo-dev 2020-07-18 00:00:46 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6f977b3c14def1e03236dfa806841e3a259c2192

commit 6f977b3c14def1e03236dfa806841e3a259c2192
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2020-07-17 21:29:40 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-07-17 23:59:57 +0000

    dev-libs/univalue: security cleanup
    
    Bug: https://bugs.gentoo.org/714016
    Package-Manager: Portage-2.3.103, Repoman-2.3.23
    Signed-off-by: Sam James <sam@gentoo.org>

 dev-libs/univalue/Manifest              |  3 ---
 dev-libs/univalue/univalue-1.0.2.ebuild | 33 ----------------------------
 dev-libs/univalue/univalue-1.0.3.ebuild | 32 ---------------------------
 dev-libs/univalue/univalue-1.0.4.ebuild | 38 ---------------------------------
 4 files changed, 106 deletions(-)
Comment 9 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-18 00:09:42 UTC
GLSA vote: no!

Tree is clean, closing.