ELA-292-1 libonig security update

Buffer overwrite

2020-10-02
Packagelibonig
Version5.9.5-3.2+deb8u5
Related CVEs CVE-2020-26159


In Oniguruma, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_info_str & concat_opt_exact_info in regcomp.c.

Besides, there were other other issues like resource leaks in bbuf_clone(), not_code_range_buf(), etc in regparse.c and some other issues that needed fixing as well.



For Debian 8 jessie, these problems have been fixed in version 5.9.5-3.2+deb8u5.

We recommend that you upgrade your libonig packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.