Bug 47525 - libidn: Multiple issues (4.2)
libidn: Multiple issues (4.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
All Linux
: P3 normal (vote)
: UCS 4.2-4-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-08-09 10:17 CEST by Quality Assurance
Modified: 2018-08-15 16:19 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-08-09 10:17:42 CEST
New Debian libidn 1.29-1+deb8u3 fixes:
This update addresses the following issue(s):
* 
* Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact. (CVE-2017-14062)

1.29-1+deb8u3 (Thu, 26 Jul 2018 20:36:12 +0200) * Fix CVE-2017-14062: An integer overflow vulnerability in libidn's Punycode handling (an encoding used to convert Unicode characters to ASCII) which would have allowed remote attackers to cause a denial of service. Patch taken from wheezy, backported by Chris Lamb.
* CVE-2017-14062 libidn2: Integer overflow in puny_decode.c/decode_digit (CVE-2017-14062)
Comment 1 Quality Assurance univentionstaff 2018-08-09 18:46:24 CEST
--- mirror/ftp/4.2/unmaintained/4.2-0/source/libidn_1.29-1+deb8u2.dsc
+++ apt/ucs_4.2-0-errata4.2-4/source/libidn_1.29-1+deb8u3.dsc
@@ -1,3 +1,10 @@
+1.29-1+deb8u3 [Thu, 26 Jul 2018 20:36:12 +0200] Santiago R.R. <santiagorr@riseup.net>:
+
+  * Fix CVE-2017-14062: An integer overflow vulnerability in libidn's Punycode
+    handling (an encoding used to convert Unicode characters to ASCII) which
+    would have allowed remote attackers to cause a denial of service.
+    Patch taken from wheezy, backported by Chris Lamb (Closes: #873903).
+
 1.29-1+deb8u2 [Mon, 29 Aug 2016 20:48:49 +0200] Salvatore Bonaccorso <carnil@debian.org>:
 
   * Non-maintainer upload by the Security Team.

<http://10.200.17.11/4.2-4/#2367478163731895478>
Comment 2 Philipp Hahn univentionstaff 2018-08-10 11:41:21 CEST
OK: yaml
OK: errata-announce
OK: patch
OK: piuparts

[4.2-4] 0d5bc2b77a Bug #47525: libidn 1.29-1+deb8u3
 doc/errata/staging/libidn.yaml | 8 ++------
 1 file changed, 2 insertions(+), 6 deletions(-)

[4.2-4] d714749112 Bug #47525: libidn 1.29-1+deb8u3
 doc/errata/staging/libidn.yaml | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)
Comment 3 Arvid Requate univentionstaff 2018-08-15 16:19:57 CEST
<http://errata.software-univention.de/ucs/4.2/461.html>