Summary: | <net-dns/libidn-1.33-r2: Integer overflow results in denial of service (CVE-2017-14062) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Aleksandr Wagner (Kivak) <alwag> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | jer |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: |
=net-dns/libidn-1.33-r2
|
Runtime testing required: | --- |
Description
Aleksandr Wagner (Kivak)
2017-09-16 16:15:16 UTC
Needs another libidn commit, it seems. http://git.savannah.gnu.org/gitweb/?p=libidn.git;a=commit;h=6c8a9375641ca283b50f9680c90dcd57f9c44798 @arches, please stabilize. amd64 stable x86 stable Stable on alpha. arm stable ia64 stable arm64 stable ppc stable commit 498c8ad85ef008c556f801bd887af6270c105040 Author: Jeroen Roovers <jer@gentoo.org> Date: Sun Mar 4 14:22:16 2018 +0100 net-dns/libidn: Stable for HPPA too. ppc64 done. last arch done @Maintainer please proceed to clean tree from vulnerable versions. GLSA Vote: No @maintainer, please clean the vulnerable. |