idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "idn", "binary_version": "1.28-1ubuntu2.1" }, { "binary_name": "idn-dbgsym", "binary_version": "1.28-1ubuntu2.1" }, { "binary_name": "libidn11", "binary_version": "1.28-1ubuntu2.1" }, { "binary_name": "libidn11-dbgsym", "binary_version": "1.28-1ubuntu2.1" }, { "binary_name": "libidn11-dev", "binary_version": "1.28-1ubuntu2.1" }, { "binary_name": "libidn11-java", "binary_version": "1.28-1ubuntu2.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "idn", "binary_version": "1.32-3ubuntu1.1" }, { "binary_name": "idn-dbgsym", "binary_version": "1.32-3ubuntu1.1" }, { "binary_name": "libidn11", "binary_version": "1.32-3ubuntu1.1" }, { "binary_name": "libidn11-dbgsym", "binary_version": "1.32-3ubuntu1.1" }, { "binary_name": "libidn11-dev", "binary_version": "1.32-3ubuntu1.1" }, { "binary_name": "libidn11-java", "binary_version": "1.32-3ubuntu1.1" } ] }