| Package | libonig |
|---|---|
| Version | 5.9.5-3.2+deb8u5 |
| Related CVEs | CVE-2020-26159 |
In Oniguruma, an attacker able to supply a regular expression
for compilation may be able to overflow a buffer by one byte
in concat_opt_exact_info_str & concat_opt_exact_info in
regcomp.c.
Besides, there were other other issues like resource leaks in
bbuf_clone(), not_code_range_buf(), etc in regparse.c and
some other issues that needed fixing as well.
For Debian 8 jessie, these problems have been fixed in version 5.9.5-3.2+deb8u5.
We recommend that you upgrade your libonig packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.