DSA-3988-1 libidn2-0 -- security update

Related Vulnerabilities: CVE-2017-14062  

An integer overflow vulnerability was discovered in decode_digit() in libidn2-0, the GNU library for Internationalized Domain Names (IDNs), allowing a remote attacker to cause a denial of service against an application using the library (application crash). For the oldstable distribution (jessie), this problem has been fixed in version 0.10-2+deb8u1. For the stable distribution (stretch), this problem has been fixed in version 0.16-1+deb9u1. For the testing distribution (buster), this problem has been fixed in version 2.0.2-4. For the unstable distribution (sid), this problem has been fixed in version 2.0.2-4. We recommend that you upgrade your libidn2-0 packages.

Debian Security Advisory

DSA-3988-1 libidn2-0 -- security update

Date Reported:
30 Sep 2017
Affected Packages:
libidn2-0
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 873902.
In Mitre's CVE dictionary: CVE-2017-14062.
More information:

An integer overflow vulnerability was discovered in decode_digit() in libidn2-0, the GNU library for Internationalized Domain Names (IDNs), allowing a remote attacker to cause a denial of service against an application using the library (application crash).

For the oldstable distribution (jessie), this problem has been fixed in version 0.10-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in version 0.16-1+deb9u1.

For the testing distribution (buster), this problem has been fixed in version 2.0.2-4.

For the unstable distribution (sid), this problem has been fixed in version 2.0.2-4.

We recommend that you upgrade your libidn2-0 packages.