CVE-2019-18224

NameCVE-2019-18224
Descriptionidn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4613-1
Debian Bugs942895

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libidn2 (PTS)buster (security), buster, buster (lts)2.0.5-1+deb10u1fixed
bullseye2.3.0-5fixed
bookworm2.3.3-1fixed
sid, trixie2.3.7-2fixed
libidn2-0 (PTS)jessie, jessie (lts)0.10-2+deb8u1fixed
stretch (security), stretch (lts), stretch0.16-1+deb9u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libidn2sourcebuster2.0.5-1+deb10u1DSA-4613-1
libidn2source(unstable)2.2.0-1942895
libidn2-0source(unstable)(not affected)

Notes

- libidn2-0 <not-affected> (Vulnerable code not present)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12420
https://github.com/libidn/libidn2/commit/e4d1558aa2c1c04a05066ee8600f37603890ba8c

Search for package or bug name: Reporting problems