Description
The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.



This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.
Published: 2026-03-30
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Application Crash (Denial of Service)
Action: Mitigate
AI Analysis

Impact

The iconv() routine in GNU C Library versions 2.43 and earlier may crash with an assertion failure when an attacker supplies data encoded in the IBM1390 or IBM1399 character sets. Exploiting this flaw allows a remote attacker to cause the target application to terminate abruptly, resulting in a denial of service. The weakness is a type of assertion fault (CWE‑617).

Affected Systems

This issue impacts systems that ship glibc 2.43 or earlier. Any Linux distribution or other OS that uses an affected libc version is subject to the vulnerability. The flaw does not appear in newer releases such as 2.44 and later.

Risk and Exploitability

The CVSS base score of 7.5 indicates a high severity level, while the EPSS score of less than 1 % shows that current exploitation likelihood is low. The vulnerability is not presently listed in the CISA KEV catalog, suggesting no widespread active exploitation yet. The attack can be carried out remotely by feeding malicious input into iconv, thereby triggering the crash.

Generated by OpenCVE AI on April 7, 2026 at 22:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Remove the IBM1390 and IBM1399 character sets from the system if they are not required
  • Update glibc to version 2.44 or later once a patch is available
  • Monitor the system for crashes and apply vendor updates as soon as they are released

Generated by OpenCVE AI on April 7, 2026 at 22:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu glibc
CPEs cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
Vendors & Products Gnu
Gnu glibc

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared The Gnu C Library
The Gnu C Library glibc
Vendors & Products The Gnu C Library
The Gnu C Library glibc

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Mon, 30 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 17:45:00 +0000


Mon, 30 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.
Title iconv crash due to assertion failure with untrusted input
Weaknesses CWE-617
References

Subscriptions

Gnu Glibc
The Gnu C Library Glibc
cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published:

Updated: 2026-03-30T17:37:52.633Z

Reserved: 2026-03-12T10:12:32.994Z

Link: CVE-2026-4046

cve-icon Vulnrichment

Updated: 2026-03-30T17:35:44.684Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T18:16:19.573

Modified: 2026-04-07T18:34:45.623

Link: CVE-2026-4046

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-30T17:16:11Z

Links: CVE-2026-4046 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:00:32Z

Weaknesses