Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 629458 - net-dns/libidn2: integer overflow in bidi.c/_isBidi()
Summary: net-dns/libidn2: integer overflow in bidi.c/_isBidi()
Status: RESOLVED DUPLICATE of bug 629466
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-08-31 14:22 UTC by Agostino Sarubbo
Modified: 2018-12-02 23:31 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2017-08-31 14:22:04 UTC
From ${URL} :

A integer overflow was found in libidn2 that could potentialy cause denial of service.

Upstream patch:

http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305

References:

https://bugzilla.novell.com/show_bug.cgi?id=1056451
https://lists.gnu.org/archive/html/info-gnu/2017-08/msg00013.htmlA integer overflow was found in libidn2 that could potentialy cause denial of service.

Upstream patch:

http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305

References:

https://bugzilla.novell.com/show_bug.cgi?id=1056451
https://lists.gnu.org/archive/html/info-gnu/2017-08/msg00013.html



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-12-02 23:31:52 UTC

*** This bug has been marked as a duplicate of bug 629466 ***