CVE-2023-52389

NameCVE-2023-52389
DescriptionUTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
poco (PTS)jessie, jessie (lts)1.3.6p1-5+deb8u1vulnerable
stretch (security), stretch (lts), stretch1.7.6+dfsg1-5+deb9u1vulnerable
buster1.9.0-5vulnerable
bullseye1.10.0-6+deb11u1vulnerable
bookworm1.11.0-3vulnerable
sid, trixie1.13.0-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pocosourceexperimental1.13.0-1
pocosourcejessie(unfixed)end-of-life
pocosourcestretch(unfixed)end-of-life
pocosource(unstable)1.13.0-6

Notes

[bookworm] - poco <no-dsa> (Minor issue)
[bullseye] - poco <no-dsa> (Minor issue)
[buster] - poco <no-dsa> (Minor issue)
https://pocoproject.org/blog/?p=1226
https://github.com/pocoproject/poco/issues/4320
https://github.com/pocoproject/poco/commit/62f875dfe1298041289f926a6a1a39cb765b13ee

Search for package or bug name: Reporting problems