{"affected":[{"ecosystem_specific":{"binaries":[{"libidn2-0":"2.2.0-lp150.2.3.1","libidn2-0-32bit":"2.2.0-lp150.2.3.1","libidn2-devel":"2.2.0-lp150.2.3.1","libidn2-lang":"2.2.0-lp150.2.3.1","libidn2-tools":"2.2.0-lp150.2.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.0","name":"libidn2","purl":"pkg:rpm/opensuse/libidn2&distro=openSUSE%20Leap%2015.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.0-lp150.2.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libidn2 to version 2.2.0 fixes the following issues:\n\n- CVE-2019-12290: Fixed an improper round-trip check when converting A-labels to U-labels (bsc#1154884).\n- CVE-2019-18224: Fixed a heap-based buffer overflow that was caused by long domain strings (bsc#1154887).\n\nThis update was imported from the SUSE:SLE-15:Update update project.","id":"openSUSE-SU-2019:2613-1","modified":"2019-12-03T13:17:47Z","published":"2019-12-03T13:17:47Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRSAKATJHG3HSIHWNI5KWAI67IUCJBGE/#KRSAKATJHG3HSIHWNI5KWAI67IUCJBGE"},{"type":"REPORT","url":"https://bugzilla.suse.com/1154884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1154887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-12290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-18224"}],"related":["CVE-2019-12290","CVE-2019-18224"],"summary":"Security update for libidn2","upstream":["CVE-2019-12290","CVE-2019-18224"]}