Name | CVE-2015-2059 |
Description | The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-277-1, DLA-476-1, DSA-3578-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libidn (PTS) | bullseye | 1.33-3 | fixed |
bookworm | 1.41-1 | fixed | |
sid, trixie | 1.42-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libidn | source | squeeze | 1.15-2+deb6u1 | DLA-277-1 | ||
libidn | source | wheezy | 1.25-2+deb7u1 | DLA-476-1 | ||
libidn | source | jessie | 1.29-1+deb8u1 | DSA-3578-1 | ||
libidn | source | (unstable) | 1.31-1 | medium |
https://www.openwall.com/lists/oss-security/2015/02/23/25
Patch: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c2796581c27213962c77f5a8571a598f9a2e
This could be attributed to a misuse of a (poorly documented) API
but since upstream provided a patch it makes more sense to fix
only libidn instead of every application using it