CVE-2015-8948

Priority
Description
idn in GNU libidn before 1.33 might allow remote attackers to obtain
sensitive memory information by reading a zero byte as input, which
triggers an out-of-bounds read.
Assigned-to
mdeslaur
Notes
Package
Upstream:released (1.33-1)
Ubuntu 12.04 ESM (Precise Pangolin):released (1.23-2ubuntu0.1)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.28-1ubuntu2.1)
Ubuntu 16.04 LTS (Xenial Xerus):released (1.32-3ubuntu1.1)
Patches:
Upstream:http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
More Information

Updated: 2020-09-10 04:57:21 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)