idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
Fix available through Seal Security. No upgrade required, protect your application instantly.
Fix without upgrading