Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 745780 (CVE-2020-26159) - dev-libs/oniguruma: Buffer overflow in concat_opt_exact_str (CVE-2020-26159)
Summary: dev-libs/oniguruma: Buffer overflow in concat_opt_exact_str (CVE-2020-26159)
Status: RESOLVED INVALID
Alias: CVE-2020-26159
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://github.com/kkos/oniguruma/iss...
Whiteboard: B3 [ebuild cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-09-30 19:23 UTC by Sam James
Modified: 2020-11-07 00:40 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-09-30 19:23:48 UTC
Description:
"In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c."
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-11-07 00:40:46 UTC
Turned out to not be an issue: https://github.com/kkos/oniguruma/issues/221#issuecomment-712814784