7.5
CVSSv2

CVE-2019-12900

Published: 19/06/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

BZ2_decompress in decompress.c in bzip2 up to and including 1.0.6 has an out-of-bounds write when there are many selectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bzip bzip2

debian debian linux 8.0

opensuse leap 15.0

opensuse leap 15.1

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

freebsd freebsd 11.2

freebsd freebsd 12.0

freebsd freebsd 11.3

python python

Vendor Advisories

Debian Bug report logs - #930886 CVE-2019-12900 Package: bzip2; Maintainer for bzip2 is Anibal Monsalve Salazar <anibal@debianorg>; Source for bzip2 is src:bzip2 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 21 Jun 2019 21:21:05 UTC Severity: important Tags: security, upstream F ...
Several security issues were fixed in ClamAV ...
Several security issues were fixed in ClamAV ...
Several security issues were fixed in bzip2 ...
Several security issues were fixed in bzip2 ...
BZ2_decompress in decompressc in bzip2 through 106 has an out-of-bounds write when there are many selectors (CVE-2019-12900) ...
Impact: Low Public Date: 2019-06-19 CWE: CWE-787 Bugzilla: 1724459: CVE-2019-12900 bzip2: out-of-bounds ...

Github Repositories

List packages changelog diff when updating with zypper

zypperdiff This small utility is inspired by apt-listchanges for listing changes when updating packages with zypper It first downloads with zypper all packages to be installed Then it shows in a pager (less, most, etc) the changelog difference (thus what's new) for each package Finally, when the user has reviewed the changes, it asks if the packages must be installed I

References

CWE-787https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbchttps://lists.debian.org/debian-lts-announce/2019/06/msg00021.htmlhttps://usn.ubuntu.com/4038-2/https://usn.ubuntu.com/4038-1/https://seclists.org/bugtraq/2019/Jul/22http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.htmlhttps://lists.debian.org/debian-lts-announce/2019/07/msg00014.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.htmlhttps://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.aschttps://seclists.org/bugtraq/2019/Aug/4http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.htmlhttps://usn.ubuntu.com/4146-1/https://usn.ubuntu.com/4146-2/https://lists.debian.org/debian-lts-announce/2019/10/msg00012.htmlhttps://lists.debian.org/debian-lts-announce/2019/10/msg00018.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.htmlhttps://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3Ehttps://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSShttps://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3Ehttps://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3Ehttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886https://nvd.nist.govhttps://github.com/bubbleguuum/zypperdiffhttps://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10https://usn.ubuntu.com/4146-1/