The stringpreputf8to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.28-1ubuntu2.1", "binary_name": "idn" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "idn-dbgsym" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11-dbgsym" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11-dev" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11-java" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.32-3ubuntu1", "binary_name": "idn" }, { "binary_version": "1.32-3ubuntu1", "binary_name": "idn-dbgsym" }, { "binary_version": "1.32-3ubuntu1", "binary_name": "libidn11" }, { "binary_version": "1.32-3ubuntu1", "binary_name": "libidn11-dbgsym" }, { "binary_version": "1.32-3ubuntu1", "binary_name": "libidn11-dev" }, { "binary_version": "1.32-3ubuntu1", "binary_name": "libidn11-java" } ] }