|Description||The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)|
|References||DLA-277-1, DLA-476-1, DSA-3578-1|
Vulnerable and fixed packages
The table below lists information on source packages.
|sid, trixie, bookworm||1.41-1||fixed|
The information below is based on the following data on fixed versions.
This could be attributed to a misuse of a (poorly documented) API
but since upstream provided a patch it makes more sense to fix
only libidn instead of every application using it