Description
In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Subscriptions
Gnu
Subscribe
Glibc
Subscribe
Oracle
Subscribe
Communications Cloud Native Core Binding Support Function
Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment
Subscribe
Communications Cloud Native Core Network Repository Function
Subscribe
Communications Cloud Native Core Security Edge Protection Proxy
Subscribe
Communications Cloud Native Core Unified Data Repository
Subscribe
Enterprise Operations Monitor
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:55:28.498Z
Reserved: 2021-11-04T00:00:00.000Z
Link: CVE-2021-43396
No data.
Status : Modified
Published: 2021-11-04T20:15:09.223
Modified: 2024-11-21T06:29:09.553
Link: CVE-2021-43396
OpenCVE Enrichment
No data.
Weaknesses