|
|
Message-ID: <c67530db-c586-4921-bc3f-67a12e389eb1@pipping.org> Date: Tue, 12 May 2026 15:19:39 +0200 From: Sebastian Pipping <sebastian@...ping.org> To: oss-security@...ts.openwall.com Cc: solar@...nwall.com Subject: Re: uriparser 1.0.2 fixes CVE-2026-44927 and CVE-2026-44928 Hi Alexander, On 5/10/26 09:47, Solar Designer wrote: > On Sat, May 09, 2026 at 08:18:49PM +0200, Sebastian Pipping wrote: >> just a quick note that uriparser 1.0.2 released today is fixing >> vulnerabilities CVE-2026-44927 and CVE-2026-44928. > > Thanks, but let's please be including vulnerability descriptions right > in the postings. Also, when it's one vulnerability, its title should be > in the Subject line. When it's more than one, then if there's a way to > group them e.g. by category or severity, that could go into the Subject. > >> Some key links are: >> >> - The change log of release 1.0.2 >> https://github.com/uriparser/uriparser/blob/uriparser-1.0.2/ChangeLog > > This says: > >>>>>>>>>>>>>> SECURITY >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> > * Fixed: [CVE-2026-44927] > Stop truncating `ptrdiff_t` to `int` > Thanks for the report to Ilia Alshanetsky and Joshua W. Windle! > (GitHub #304) > * Fixed: [CVE-2026-44928] > Fix `EqualsUri` with regard to `.absolutePath` > Thanks for the report to Ilia Alshanetsky! (GitHub #305) >>>>>>>>>>>>>> SECURITY >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> > * Fixed: Fix OOM related memory leak in `CopyUriMm` > Thanks for the report to Ilia Alshanetsky! (GitHub #306) > >> - The fixing pull requests >> - https://github.com/uriparser/uriparser/pull/304 >> - https://github.com/uriparser/uriparser/pull/305 >> >> - The official CVE metadata >> - https://nvd.nist.gov/vuln/detail/CVE-2026-44927 >> - https://nvd.nist.gov/vuln/detail/CVE-2026-44928 > > These only say a little: > > CVE-2026-44927: In uriparser before 1.0.2, there is pointer difference > truncation to int in various places. > > CVE-2026-44928: In uriparser before 1.0.2, the function family EqualsUri > can misclassify two unequal URIs as equal. > > For CVE-2026-44927, it could help to clarify actual security exposure > and impact. I understand. My understanding of the impact of the ptrdiff_t truncation (CVE-2026-44927) was "DoS or more", and I focussed on fixing this in the about 15 places rather than analyzing the impact in more detail. Ilia and Joshua considered impact more than me, and I'm BCC'ing them so they can reply to this mail directly if they like, please do not feel pushed. Let me add that the public CVSS score input for CVE-2026-44927 is (again) mistaken; none of these are correct: - Attack vector: Local - Attack complexity: High - Availability: None (Seen at https://github.com/advisories/ghsa-gmxg-5w57-j63q just now.) Best Sebastian
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.