Amazon Linux 2 Security Advisory: ALAS-2019-1328
Advisory Release Date: 2019-10-21 18:01 Pacific
Advisory Updated Date: 2019-10-23 23:54 Pacific
An issue was discovered in AdvanceCOMP through 2.1. A NULL pointer dereference exists in the function be_uint32_read() located in endianrw.h. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact when a victim opens a specially crafted file.(CVE-2019-8379)
An issue was discovered in AdvanceCOMP through 2.1. An invalid memory address occurs in the function adv_png_unfilter_8 in lib/png.c. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact when a victim opens a specially crafted file.(CVE-2019-8383)
Affected Packages:
mercurial
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update mercurial to update your system.
aarch64:
mercurial-2.6.2-10.amzn2.aarch64
emacs-mercurial-2.6.2-10.amzn2.aarch64
emacs-mercurial-el-2.6.2-10.amzn2.aarch64
mercurial-hgk-2.6.2-10.amzn2.aarch64
mercurial-debuginfo-2.6.2-10.amzn2.aarch64
i686:
mercurial-2.6.2-10.amzn2.i686
emacs-mercurial-2.6.2-10.amzn2.i686
emacs-mercurial-el-2.6.2-10.amzn2.i686
mercurial-hgk-2.6.2-10.amzn2.i686
mercurial-debuginfo-2.6.2-10.amzn2.i686
src:
mercurial-2.6.2-10.amzn2.src
x86_64:
mercurial-2.6.2-10.amzn2.x86_64
emacs-mercurial-2.6.2-10.amzn2.x86_64
emacs-mercurial-el-2.6.2-10.amzn2.x86_64
mercurial-hgk-2.6.2-10.amzn2.x86_64
mercurial-debuginfo-2.6.2-10.amzn2.x86_64