CVE-2019-12900

BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
References
Link Resource
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4038-2/ Third Party Advisory
https://usn.ubuntu.com/4038-1/ Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/22 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html Mailing List Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc Patch Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/4 Mailing List Patch
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4146-1/ Third Party Advisory
https://usn.ubuntu.com/4146-2/ Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html Mailing List Third Party Advisory
https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html Mailing List Third Party Advisory
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Third Party Advisory
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E Mailing List Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:rc3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p7:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

Information

Published : 2019-06-19 11:15

Updated : 2022-06-27 04:36


NVD link : CVE-2019-12900

Mitre link : CVE-2019-12900

Products Affected
No products.
CWE