FEDORA-2016-42514bee97

security update in Fedora 24 for libidn

Status: stable 2 years ago

Security fix for CVE-2016-6263, CVE-2015-8948, CVE-2016-6262, CVE-2016-6261

How to install

sudo dnf upgrade --advisory=FEDORA-2016-42514bee97

Comments 7

This update has been submitted for testing by mlichvar.

This update has been pushed to testing.

works for me

karma: +1

This update has been submitted for stable by bodhi.

works for me

karma: +1

This update has been pushed to stable.


Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown. Comments are governed under this privacy policy.

-1 0 +1 Feedback Guidelines

Is the update generally functional? (karma)

You need to be logged in to add karma!

Does the system's basic functionality continue to work after this update?
#1359134 CVE-2016-6261 libidn: Out of bounds stack read in idna_to_ascii_4i
#1359138 CVE-2016-6262 libidn: Out-of-bounds read when reading zero byte as input
#1359141 CVE-2015-8948 libidn: Out-of-bounds read due to use of fgets with fixed-size buffer
#1359145 CVE-2016-6263 libidn: Crash when given invalid UTF-8 data on input
#1359146 CVE-2015-8948 CVE-2016-6261 CVE-2016-6262 CVE-2016-6263 libidn: various flaws [fedora-all]
Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
unspecified
Karma
+3
stable threshold: 3
unstable threshold: -3
Autopush
Enabled
Dates
submitted 2 years ago
in testing 2 years ago
in stable 2 years ago

Related Bugs 5

00 #1359134 CVE-2016-6261 libidn: Out of bounds stack read in idna_to_ascii_4i
00 #1359138 CVE-2016-6262 libidn: Out-of-bounds read when reading zero byte as input
00 #1359141 CVE-2015-8948 libidn: Out-of-bounds read due to use of fgets with fixed-size buffer
00 #1359145 CVE-2016-6263 libidn: Crash when given invalid UTF-8 data on input
00 #1359146 CVE-2015-8948 CVE-2016-6261 CVE-2016-6262 CVE-2016-6263 libidn: various flaws [fedora-all]

Automated Test Results