idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
{
"binaries": [
{
"binary_name": "idn",
"binary_version": "1.28-1ubuntu2.1"
},
{
"binary_name": "libidn11",
"binary_version": "1.28-1ubuntu2.1"
},
{
"binary_name": "libidn11-dev",
"binary_version": "1.28-1ubuntu2.1"
},
{
"binary_name": "libidn11-java",
"binary_version": "1.28-1ubuntu2.1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "idn",
"binary_version": "1.32-3ubuntu1.1"
},
{
"binary_name": "libidn11",
"binary_version": "1.32-3ubuntu1.1"
},
{
"binary_name": "libidn11-dev",
"binary_version": "1.32-3ubuntu1.1"
},
{
"binary_name": "libidn11-java",
"binary_version": "1.32-3ubuntu1.1"
}
],
"availability": "No subscription required"
}