UBUNTU-CVE-2023-52389

Source
https://ubuntu.com/security/CVE-2023-52389
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-52389
Upstream
Published
2024-01-27T03:15:00Z
Modified
2025-10-24T05:02:25Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.

References

Affected packages

Ubuntu:14.04:LTS

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.3.6p1-4+deb7u1build1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.6p1-4
1.3.6p1-4+deb7u1build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpococrypto9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocodata9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocofoundation9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocomysql9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpoconet9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpoconetssl9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocoodbc9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocosqlite9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocoutil9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocoxml9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        },
        {
            "binary_name": "libpocozip9",
            "binary_version": "1.3.6p1-4+deb7u1build1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"

Ubuntu:16.04:LTS

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.3.6p1-5.1ubuntu0.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.6p1-5.1
1.3.6p1-5.1build1
1.3.6p1-5.1ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpococrypto9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocodata9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocofoundation9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocomysql9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpoconet9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpoconetssl9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocoodbc9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocosqlite9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocoutil9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocoxml9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        },
        {
            "binary_name": "libpocozip9v5",
            "binary_version": "1.3.6p1-5.1ubuntu0.1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"

Ubuntu:18.04:LTS

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.8.0.1-1ubuntu4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.8+dfsg1-2
1.7.8+dfsg1-3
1.8.0.1-1ubuntu4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpococrypto50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocodata50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocodatamysql50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocodataodbc50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocodatasqlite50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocofoundation50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocojson50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocomongodb50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpoconet50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpoconetssl50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocoredis50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocoutil50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocoxml50",
            "binary_version": "1.8.0.1-1ubuntu4"
        },
        {
            "binary_name": "libpocozip50",
            "binary_version": "1.8.0.1-1ubuntu4"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"

Ubuntu:20.04:LTS

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.9.2-3ubuntu3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.9.2-3ubuntu2
1.9.2-3ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpococrypto62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocodata62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocodatamysql62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocodataodbc62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocodatasqlite62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocoencodings62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocofoundation62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocojson62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocomongodb62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpoconet62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpoconetssl62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocoredis62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocoutil62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocoxml62",
            "binary_version": "1.9.2-3ubuntu3"
        },
        {
            "binary_name": "libpocozip62",
            "binary_version": "1.9.2-3ubuntu3"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"

Ubuntu:22.04:LTS

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.11.0-3?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.10.0-6
1.11.0-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocoactiverecord80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpococrypto80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocodata80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocodatamysql80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocodataodbc80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocodatapostgresql80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocodatasqlite80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocoencodings80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocofoundation80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocojson80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocojwt80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocomongodb80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpoconet80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpoconetssl80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocoredis80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocoutil80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocoxml80",
            "binary_version": "1.11.0-3"
        },
        {
            "binary_name": "libpocozip80",
            "binary_version": "1.11.0-3"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"

Ubuntu:24.04:LTS

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.11.0-4.1build2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.11.0-3
1.11.0-4
1.11.0-4.1
1.11.0-4.1build1
1.11.0-4.1build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocoactiverecord80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpococrypto80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocodata80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocodatamysql80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocodataodbc80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocodatapostgresql80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocodatasqlite80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocoencodings80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocofoundation80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocojson80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocojwt80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocomongodb80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpoconet80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpoconetssl80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocoredis80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocoutil80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocoxml80t64",
            "binary_version": "1.11.0-4.1build2"
        },
        {
            "binary_name": "libpocozip80t64",
            "binary_version": "1.11.0-4.1build2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"

Ubuntu:25.04

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.13.0-6build2?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.0-6build1
1.13.0-6build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoactiverecord100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpococrypto100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodata100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodatamysql100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodataodbc100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodatapostgresql100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodatasqlite100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoencodings100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocofoundation100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocojson100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocojwt100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocomongodb100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpoconet100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpoconetssl100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoprometheus100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoredis100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoutil100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoxml100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocozip100",
            "binary_version": "1.13.0-6build2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"

Ubuntu:25.10

poco

Package

Name
poco
Purl
pkg:deb/ubuntu/poco@1.13.0-6build2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.0-6build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libpoco-dev",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoactiverecord100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpococrypto100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodata100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodatamysql100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodataodbc100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodatapostgresql100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocodatasqlite100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoencodings100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocofoundation100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocojson100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocojwt100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocomongodb100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpoconet100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpoconetssl100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoprometheus100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoredis100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoutil100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocoxml100",
            "binary_version": "1.13.0-6build2"
        },
        {
            "binary_name": "libpocozip100",
            "binary_version": "1.13.0-6build2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-52389.json"