Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:2079-1

Опубликовано: 16 авг. 2016
Источник: suse-cvrf

Описание

Security update for libidn

This update for libidn fixes the following issues:

  • CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)

  • CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190)

  • CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)

  • CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241)

Список пакетов

SUSE Linux Enterprise Desktop 12 SP1
libidn11-1.28-4.1
libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Server 12 SP1
libidn-tools-1.28-4.1
libidn11-1.28-4.1
libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
libidn-tools-1.28-4.1
libidn11-1.28-4.1
libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Software Development Kit 12 SP1
libidn-devel-1.28-4.1

Описание

The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libidn11-1.28-4.1
SUSE Linux Enterprise Desktop 12 SP1:libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn-tools-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn11-1.28-4.1

Ссылки

Описание

idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libidn11-1.28-4.1
SUSE Linux Enterprise Desktop 12 SP1:libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn-tools-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn11-1.28-4.1

Ссылки

Описание

The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libidn11-1.28-4.1
SUSE Linux Enterprise Desktop 12 SP1:libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn-tools-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn11-1.28-4.1

Ссылки

Описание

idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libidn11-1.28-4.1
SUSE Linux Enterprise Desktop 12 SP1:libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn-tools-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn11-1.28-4.1

Ссылки

Описание

The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libidn11-1.28-4.1
SUSE Linux Enterprise Desktop 12 SP1:libidn11-32bit-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn-tools-1.28-4.1
SUSE Linux Enterprise Server 12 SP1:libidn11-1.28-4.1

Ссылки