UbuntuUpdates.org

Package "libidn"

Name: libidn

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Command line and Emacs interface to GNU Libidn
  • Java port of the GNU Libidn library, an IDN implementation

Latest version: 1.28-1ubuntu2.2
Release: trusty (14.04)
Level: security
Repository: universe

Links



Other versions of "libidn" in Trusty

Repository Area Version
base main 1.28-1ubuntu2
base universe 1.28-1ubuntu2
security main 1.28-1ubuntu2.2
updates universe 1.28-1ubuntu2.2
updates main 1.28-1ubuntu2.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.28-1ubuntu2.2 2017-10-02 18:07:03 UTC

  libidn (1.28-1ubuntu2.2) trusty-security; urgency=medium

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2017-14062.patch: fix integer overflow
      in punycode.c.
    - CVE-2017-14062

 -- Marc Deslauriers <email address hidden> Mon, 25 Sep 2017 11:19:19 -0400

Source diff to previous version
CVE-2017-1406 RESERVED

Version: 1.28-1ubuntu2.1 2016-08-24 15:06:54 UTC

  libidn (1.28-1ubuntu2.1) trusty-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds read when reading one zero byte
    - debian/patches/CVE-2015-8948.patch: use getline instead of fgets with
      fixed-size buffer in gl/Makefile.am, gl/getdelim.c, gl/getline.c,
      gl/m4/getdelim.m4, gl/m4/getline.m4, gl/m4/gnulib-cache.m4,
      gl/m4/gnulib-comp.m4, gl/m4/realloc.m4, gl/realloc.c, gl/stdint.in.h,
      gl/stdlib.in.h, gltests/Makefile.am, gltests/test-getdelim.c,
      gltests/test-getline.c, src/idn.c.
    - debian/patches/CVE-2016-6262.patch: add extra check in src/idn.c.
    - CVE-2015-8948
    - CVE-2016-6262
  * SECURITY UPDATE: out-of-bounds stack read in idna_to_ascii_4i
    - debian/patches/CVE-2016-6261-1.patch: fix out of bounds read in
      lib/idna.c.
    - debian/patches/CVE-2016-6261-2.patch: fix memory leak in lib/idna.c.
    - debian/patches/CVE-2016-6261-3.patch: add test to tests/Makefile.am,
      tests/tst_toascii64oob.c.
    - CVE-2016-6261
  * SECURITY UPDATE: invalid UTF-8 DoS in stringprep_utf8_nfkc_normalize
    - debian/patches/CVE-2016-6263.patch: reject invalid UTF-8 in
      lib/nfkc.c, tests/Makefile.am, tests/tst_badutf8nfkc.c.
    - CVE-2016-6263
  * Fix FTBFS caused by docs regeneration
    - debian/patches/fix_gdoc.patch: fix gdoc script.
    - debian/control: added help2man and texinfo to Build-Depends.
  * debian/patches/fix_broken_test.patch: fix broken encoding in test.

 -- Marc Deslauriers <email address hidden> Tue, 23 Aug 2016 13:36:58 -0400

CVE-2015-8948 Solve out-of-bounds-read when reading one zero byte as input
CVE-2016-6262 Solve out-of-bounds-read when reading one zero byte as input
CVE-2016-6261 out-of-bounds stack read in idna_to_ascii_4i
CVE-2016-6263 stringprep_utf8_nfkc_normalize reject invalid UTF-8



About   -   Send Feedback to @ubuntu_updates