The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://sourceware.org/bugzilla/show_bug.cgi?id=27256 | issue tracking third party advisory |
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888 | |
http://www.openwall.com/lists/oss-security/2021/01/28/2 | third party advisory mailing list |
https://security.gentoo.org/glsa/202107-07 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20210304-0007/ | third party advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | not applicable |
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html | third party advisory mailing list |