Bug 1486882 (CVE-2017-14062)

Summary: CVE-2017-14062 libidn2: Integer overflow in puny_decode.c/decode_digit
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: fweimer, mlichvar, nmavrogi, redhat-bugzilla
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libidn2 2.0.4.1, libidn 1.34-1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:23:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1452750, 1486883, 1486884, 1486885, 1488128    
Bug Blocks:    

Comment 1 Pedro Sampaio 2017-08-30 17:27:11 UTC
Created libidn2 tracking bugs for this issue:

Affects: epel-all [bug 1486884]
Affects: fedora-all [bug 1486885]


Created mingw-libidn2 tracking bugs for this issue:

Affects: fedora-all [bug 1486883]

Comment 2 Pedro Sampaio 2017-09-04 12:01:11 UTC
Created mingw-libidn2 tracking bugs for this issue:

Affects: epel-7 [bug 1488128]

Comment 3 Fedora Update System 2018-04-06 11:09:39 UTC
libidn-1.34-1.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report.

Comment 5 Fedora Update System 2018-04-06 15:02:27 UTC
libidn-1.34-1.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.