CVE-2019-12290

NameCVE-2019-12290
DescriptionGNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libidn2 (PTS)buster, buster (security)2.0.5-1+deb10u1vulnerable
bullseye2.3.0-5fixed
bookworm2.3.3-1fixed
trixie, sid2.3.7-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libidn2source(unstable)2.2.0-1

Notes

[buster] - libidn2 <no-dsa> (Minor issue; intrusive to backport)
https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5 (2.2.0)
https://gitlab.com/libidn/libidn2/merge_requests/71
Backport available: https://git.launchpad.net/ubuntu/+source/libidn2/commit/?id=0aa447342fbf0fc37d7887982e0daf817db08b1d

Search for package or bug name: Reporting problems