idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.28-1ubuntu2.1", "binary_name": "idn" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "idn-dbgsym" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11-dbgsym" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11-dev" }, { "binary_version": "1.28-1ubuntu2.1", "binary_name": "libidn11-java" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1.32-3ubuntu1.1", "binary_name": "idn" }, { "binary_version": "1.32-3ubuntu1.1", "binary_name": "idn-dbgsym" }, { "binary_version": "1.32-3ubuntu1.1", "binary_name": "libidn11" }, { "binary_version": "1.32-3ubuntu1.1", "binary_name": "libidn11-dbgsym" }, { "binary_version": "1.32-3ubuntu1.1", "binary_name": "libidn11-dev" }, { "binary_version": "1.32-3ubuntu1.1", "binary_name": "libidn11-java" } ] }