Your submission was sent successfully! Close

CVE-2015-8948

Published: 31 December 2015

idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
libidn
Launchpad, Ubuntu, Debian
Upstream
Released (1.33-1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1.32-3ubuntu1.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.28-1ubuntu2.1)
Patches:
Upstream: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041