You are here
Home > Preporuke > Sigurnosni nedostaci programske biblioteke libidn

Sigurnosni nedostaci programske biblioteke libidn

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3068-1
August 24, 2016

libidn vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Libidn.

Software Description:
– libidn: implementation of IETF IDN specifications

Details:

Thijs Alkemade, Gustavo Grieco, Daniel Stenberg, and Nikos
Mavrogiannopoulos discovered that Libidn incorrectly handled invalid UTF-8
characters. A remote attacker could use this issue to cause Libidn to
crash, resulting in a denial of service, or possibly disclose sensitive
memory. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2015-2059)

Hanno Böck discovered that Libidn incorrectly handled certain input. A
remote attacker could possibly use this issue to cause Libidn to crash,
resulting in a denial of service. (CVE-2015-8948, CVE-2016-6262,
CVE-2016-6261, CVE-2016-6263)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
libidn11 1.32-3ubuntu1.1

Ubuntu 14.04 LTS:
libidn11 1.28-1ubuntu2.1

Ubuntu 12.04 LTS:
libidn11 1.23-2ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3068-1
CVE-2015-2059, CVE-2015-8948, CVE-2016-6261, CVE-2016-6262,
CVE-2016-6263

Package Information:
https://launchpad.net/ubuntu/+source/libidn/1.32-3ubuntu1.1
https://launchpad.net/ubuntu/+source/libidn/1.28-1ubuntu2.1
https://launchpad.net/ubuntu/+source/libidn/1.23-2ubuntu0.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=KYFI
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-08-0150-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa eog

Otkrivena je ranjivost čitanja podataka izvan granica dodijeljenje memorije u programskom paketu eog prilikom obrade posebno oblikovane SVG datoteke. Ranjivost...

Close