Source: libbson Version: 1.7.0-1 Severity: important Tags: security upstream
Hi, the following vulnerability was published for libbson. CVE-2017-14227[0]: | In MongoDB libbson 1.7.0, the bson_iter_codewscope function in | bson-iter.c miscalculates a bson_utf8_validate length argument, which | allows remote attackers to cause a denial of service (heap-based buffer | over-read in the bson_utf8_validate function in bson-utf8.c), as | demonstrated by bson-to-json.c. The following shows the problem using the example bson-metrics: 00000000 15 00 00 00 0f 00 0e 00 00 00 00 00 00 00 06 00 |................| 00000010 00 00 00 00 00 00 03 e8 88 88 00 00 |............| 0000001c cf. [1]. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-14227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14227 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1489355 Please adjust the affected versions in the BTS as needed. Regards, Salvatore