CVE-2019-12900

BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html Third Party Advisory VDB Entry
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc Patch Vendor Advisory
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/4 Mailing List Patch Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/22 Mailing List Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc Patch Third Party Advisory
https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
https://usn.ubuntu.com/4038-1/ Third Party Advisory
https://usn.ubuntu.com/4038-2/ Third Party Advisory
https://usn.ubuntu.com/4146-1/ Third Party Advisory
https://usn.ubuntu.com/4146-2/ Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:rc3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p8:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E', 'name': '[kafka-users] 20200413 CVEs for the dependency software guava and rocksdbjni of Kafka', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E', 'name': '[flink-user] 20210716 Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • {'url': 'https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS', 'tags': ['Third Party Advisory'], 'refsource': 'CONFIRM'}
  • {'url': 'https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E', 'name': '[flink-user] 20210717 Re: Flink 1.13.1 - Vulnerabilities CVE-2019-12900 for librocksdbjni', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS -
  • () https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E -
  • () https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E -
  • () https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E -

27 Jun 2022, 16:36

Type Values Removed Values Added
CPE cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
First Time Python
Python python
References (MLIST) https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E - Mailing List, Vendor Advisory (MLIST) https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E - Mailing List, Third Party Advisory

14 Sep 2021, 12:18

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E - Mailing List, Vendor Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E - Mailing List, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html - Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Jul/22 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Jul/22 - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4146-2/ - (UBUNTU) https://usn.ubuntu.com/4146-2/ - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html - (MISC) http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html - Third Party Advisory, VDB Entry
References (UBUNTU) https://usn.ubuntu.com/4038-2/ - (UBUNTU) https://usn.ubuntu.com/4038-2/ - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4146-1/ - (UBUNTU) https://usn.ubuntu.com/4146-1/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html - Mailing List, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuoct2020.html - (MISC) https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/4 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Aug/4 - Mailing List, Patch, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html - (MISC) http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html - Third Party Advisory, VDB Entry
References (FREEBSD) https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc - (FREEBSD) https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc - Patch, Third Party Advisory
References (CONFIRM) https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS - (CONFIRM) https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html - Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4038-1/ - (UBUNTU) https://usn.ubuntu.com/4038-1/ - Third Party Advisory
CPE cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:rc3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p10:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*

17 Jul 2021, 14:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E -

Information

Published : 2019-06-19 23:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-12900

Mitre link : CVE-2019-12900

CVE.ORG link : CVE-2019-12900


JSON object : View

Products Affected

debian

  • debian_linux

freebsd

  • freebsd

opensuse

  • leap

python

  • python

bzip

  • bzip2

canonical

  • ubuntu_linux
CWE
CWE-787

Out-of-bounds Write