Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2015-8948

Published: 31 December 2015

idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
libidn
Launchpad, Ubuntu, Debian
precise
Released (1.23-2ubuntu0.1)
trusty
Released (1.28-1ubuntu2.1)
upstream
Released (1.33-1)
wily Ignored
(reached end-of-life)
xenial
Released (1.32-3ubuntu1.1)
yakkety Not vulnerable
(1.33-1)
zesty Not vulnerable
(1.33-1)
Patches:
upstream: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041