Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 719248 (CVE-2019-11411, CVE-2019-11412, CVE-2019-11413) - <dev-lang/mujs-1.0.6: Multiple vulnerabilities (CVE-2019-{11411,11412,11413})
Summary: <dev-lang/mujs-1.0.6: Multiple vulnerabilities (CVE-2019-{11411,11412,11413})
Status: RESOLVED FIXED
Alias: CVE-2019-11411, CVE-2019-11412, CVE-2019-11413
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa+ cve]
Keywords: CC-ARCHES
Depends on:
Blocks: 737034
  Show dependency tree
 
Reported: 2020-04-24 14:20 UTC by GLSAMaker/CVETool Bot
Modified: 2020-08-14 04:06 UTC (History)
1 user (show)

See Also:
Package list:
=dev-lang/mujs-1.0.6 amd64 arm arm64 hppa ppc ppc64 s390 sparc x86
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2020-04-24 14:20:41 UTC
CVE-2019-11413 (https://nvd.nist.gov/vuln/detail/CVE-2019-11413):
  An issue was discovered in Artifex MuJS 1.0.5. It has unlimited recursion
  because the match function in regexp.c lacks a depth check.

CVE-2019-11412 (https://nvd.nist.gov/vuln/detail/CVE-2019-11412):
  An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a
  denial of service (invalid stack-frame jump) because it lacks an ENDTRY
  opcode call.

CVE-2019-11411 (https://nvd.nist.gov/vuln/detail/CVE-2019-11411):
  An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and
  numtostr implementations in jsnumber.c have a stack-based buffer overflow.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-24 14:24:02 UTC
Let's just stabilise this now given it's been in tree a while and no bugs reported.
Comment 2 Agostino Sarubbo gentoo-dev 2020-04-26 14:18:12 UTC
x86 stable
Comment 3 Agostino Sarubbo gentoo-dev 2020-04-26 14:19:46 UTC
arm stable
Comment 4 Agostino Sarubbo gentoo-dev 2020-04-26 15:30:07 UTC
amd64 stable
Comment 5 Agostino Sarubbo gentoo-dev 2020-04-26 15:31:04 UTC
ppc stable
Comment 6 Agostino Sarubbo gentoo-dev 2020-04-26 15:32:12 UTC
ppc64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2020-04-26 15:32:49 UTC
s390 stable
Comment 8 Agostino Sarubbo gentoo-dev 2020-04-26 15:33:15 UTC
sparc stable
Comment 9 Rolf Eike Beer archtester 2020-04-27 17:48:56 UTC
hppa stable
Comment 10 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-28 19:24:44 UTC
arm64 stable
Comment 11 Larry the Git Cow gentoo-dev 2020-06-26 20:45:10 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9366bf8bbecf7e0245ffd8e6fb35967b9ebf7963

commit 9366bf8bbecf7e0245ffd8e6fb35967b9ebf7963
Author:     Sam James (sam_c) <sam@cmpct.info>
AuthorDate: 2020-06-19 17:48:34 +0000
Commit:     Thomas Deutschmann <whissi@gentoo.org>
CommitDate: 2020-06-26 20:42:03 +0000

    dev-lang/mujs: security cleanup
    
    Bug: https://bugs.gentoo.org/719248
    Package-Manager: Portage-2.3.99, Repoman-2.3.22
    Signed-off-by: Sam James (sam_c) <sam@cmpct.info>
    Closes: https://github.com/gentoo/gentoo/pull/16327
    Signed-off-by: Thomas Deutschmann <whissi@gentoo.org>

 dev-lang/mujs/Manifest          |  1 -
 dev-lang/mujs/mujs-1.0.5.ebuild | 55 -----------------------------------------
 2 files changed, 56 deletions(-)
Comment 12 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-07-27 23:02:24 UTC
GLSA vote: yes
Comment 13 GLSAMaker/CVETool Bot gentoo-dev 2020-07-28 19:34:44 UTC
This issue was resolved and addressed in
 GLSA 202007-52 at https://security.gentoo.org/glsa/202007-52
by GLSA coordinator Sam James (sam_c).