CVE-2015-8948 (retired)

Priority
Description
idn in GNU libidn before 1.33 might allow remote attackers to obtain
sensitive memory information by reading a zero byte as input, which
triggers an out-of-bounds read.
Assigned-to
mdeslaur
Package
Upstream:released (1.33-1)
Ubuntu 12.04 ESM (Precise Pangolin):released (1.23-2ubuntu0.1)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.32-3ubuntu1.1)
Patches:
Upstream:http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
More Information

Updated: 2019-08-23 09:08:34 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)