Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 610684 - <dev-libs/libutf8proc-1.3.1_p2-r1: Multiple vulnerabilities
Summary: <dev-libs/libutf8proc-1.3.1_p2-r1: Multiple vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-02-23 11:59 UTC by Agostino Sarubbo
Modified: 2017-02-24 12:16 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2017-02-23 11:59:20 UTC
From ${URL} :

Multiple vulnerabilities were found in utf8proc.

1. Buffer overrun in utf8proc.c utf8proc_iterate()

Upstream bug:

https://github.com/JuliaLang/utf8proc/pull/66

Upstream patch:

https://github.com/JuliaLang/utf8proc/commit/5a84e53b0cf676b53c9a8b80d42ef91311b124f9

2. Stack overflow (infinite recursion) that could occur due to incorrect definition of UINT16_MAX with some compilers

Upstream bug:

https://github.com/JuliaLang/utf8proc/issues/82

Upstream patch:

https://github.com/JuliaLang/utf8proc/commit/caef918abd0a9425b3942df3859c7bea7b8986e0


@maintainer(s): since the package or the affected version has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 Michael Weber (RETIRED) gentoo-dev 2017-02-23 12:26:11 UTC
(In reply to Agostino Sarubbo from comment #0)
> From ${URL} :
> 
> Multiple vulnerabilities were found in utf8proc.
> 
> 1. Buffer overrun in utf8proc.c utf8proc_iterate()
> 
> Upstream bug:
> 
> https://github.com/JuliaLang/utf8proc/pull/66
> 
> Upstream patch:
> 
> https://github.com/JuliaLang/utf8proc/commit/
> 5a84e53b0cf676b53c9a8b80d42ef91311b124f9
backported to -1.3.1_p2-r1.


> 2. Stack overflow (infinite recursion) that could occur due to incorrect
> definition of UINT16_MAX with some compilers
> 
> Upstream bug:
> 
> https://github.com/JuliaLang/utf8proc/issues/82
> 
> Upstream patch:
> 
> https://github.com/JuliaLang/utf8proc/commit/
> caef918abd0a9425b3942df3859c7bea7b8986e0
not introduced in 1.3.1-2, yet.

> @maintainer(s): since the package or the affected version has never been
> marked as stable, we don't need to stabilize it. After the bump, please
> remove the affected versions from the tree.
done
Comment 2 Michael Weber (RETIRED) gentoo-dev 2017-02-23 12:29:04 UTC
commit 24605313fed0a4e2ef4bdd1205e25af2d5624c8a
Author: Michael Weber <xmw@gentoo.org>
Date:   Thu Feb 23 13:28:14 2017 +0100

    dev-libs/libutf8proc: Revbump with security patch (bug 610684).
    
    Package-Manager: Portage-2.3.3, Repoman-2.3.1

dev-libs/libutf8proc/files/libutf8proc-1.3.1_p2-overrun.patch
dev-libs/libutf8proc/libutf8proc-1.3.1_p2-r1.ebuild
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2017-02-24 12:16:01 UTC
All done, repository is clean.