BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html Third Party Advisory VDB Entry
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc Patch Vendor Advisory
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/4 Mailing List Patch Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/22 Mailing List Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc Patch Third Party Advisory
https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
https://usn.ubuntu.com/4038-1/ Third Party Advisory
https://usn.ubuntu.com/4038-2/ Third Party Advisory
https://usn.ubuntu.com/4146-1/ Third Party Advisory
https://usn.ubuntu.com/4146-2/ Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-06-19T22:07:57

Updated: 2021-07-17T13:06:11

Reserved: 2019-06-19T00:00:00


Link: CVE-2019-12900

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-06-19T23:15:09.910

Modified: 2023-11-07T03:03:43.190


Link: CVE-2019-12900

JSON object: View

cve-icon Redhat Information

No data.

CWE