==========================================================================
Ubuntu Security Notice USN-3068-1
August 24, 2016
libidn vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Libidn.
Software Description:
– libidn: implementation of IETF IDN specifications
Details:
Thijs Alkemade, Gustavo Grieco, Daniel Stenberg, and Nikos
Mavrogiannopoulos discovered that Libidn incorrectly handled invalid UTF-8
characters. A remote attacker could use this issue to cause Libidn to
crash, resulting in a denial of service, or possibly disclose sensitive
memory. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2015-2059)
Hanno Böck discovered that Libidn incorrectly handled certain input. A
remote attacker could possibly use this issue to cause Libidn to crash,
resulting in a denial of service. (CVE-2015-8948, CVE-2016-6262,
CVE-2016-6261, CVE-2016-6263)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
libidn11 1.32-3ubuntu1.1
Ubuntu 14.04 LTS:
libidn11 1.28-1ubuntu2.1
Ubuntu 12.04 LTS:
libidn11 1.23-2ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3068-1
CVE-2015-2059, CVE-2015-8948, CVE-2016-6261, CVE-2016-6262,
CVE-2016-6263
Package Information:
https://launchpad.net/ubuntu/+source/libidn/1.32-3ubuntu1.1
https://launchpad.net/ubuntu/+source/libidn/1.28-1ubuntu2.1
https://launchpad.net/ubuntu/+source/libidn/1.23-2ubuntu0.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQIcBAEBCgAGBQJXvbD/AAoJEGVp2FWnRL6Tv00QAJXNgX1ZZi6Msy5CmAWSQVHa
nk3QXP863h8LSo4zbR2gBT02P9xWr73FK+o/HaLGDW2z9LtcQFiS/IJR6Idhs5Wi
ko9pyzO8L+SCxQTXRQ5NkM0PVH2lUb+qLCsnCOifQWsoo8vBfedPBidRYTtwpHEo
BSURNqwf9vQMbeO2PG29dajbT8n4vSa+jjlOkOsBCJkWQ7WyiPiyN+Lg3N29YGvh
o8dBKrqcmDpG1Yscdbw5bSXOlolUipXqyga065gehw/1O+yk4BAMsqIPmYZMA+F2
e0KqoW/Na/fz7X9r11W9nUmk8FasCenZYeLRtxp0cein9lfzmCUFZSSXZlK462pZ
SMcBFvg3OmxoiA7A6r9H/ZHLR03X8idVrkTrEVMcp4d4sxGf4/+IXGd4mSX+rmI/
5wpsQMdyyDOMczKn0iaWQoLqJiFURvHNva97fTc7feobUqoDDhCVw0BdPEOm9duK
gJPCjYWNuKzo9NxTdZ+TA//nyzI47ASm1902fzRdOisBrJhFGbotyASgS2OZq0P2
3Zh6XHIlDau81FZphuQm7LHPisEaaXT4UPQKMSKD/Nk2BpJtv9ekpVC7SW3lq40e
avC5jAsgsUFdWpEDLtEKmpZWl3avWB0ErAKUvFmQMqLnYMWiPmI0z+MypHbcWzkF
y7uoYPUa5w0iwBL9bAxA
=KYFI
—–END PGP SIGNATURE—–
—