| Summary: | net-dns/libidn2: integer overflow in bidi.c/_isBidi() | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED DUPLICATE | ||
| Severity: | normal | CC: | jer |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1486881 | ||
| See Also: | https://bugs.gentoo.org/show_bug.cgi?id=629466 | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
*** This bug has been marked as a duplicate of bug 629466 *** |
From ${URL} : A integer overflow was found in libidn2 that could potentialy cause denial of service. Upstream patch: http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305 References: https://bugzilla.novell.com/show_bug.cgi?id=1056451 https://lists.gnu.org/archive/html/info-gnu/2017-08/msg00013.htmlA integer overflow was found in libidn2 that could potentialy cause denial of service. Upstream patch: http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305 References: https://bugzilla.novell.com/show_bug.cgi?id=1056451 https://lists.gnu.org/archive/html/info-gnu/2017-08/msg00013.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.