In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Gnu
Subscribe
|
Glibc
Subscribe
|
|
Oracle
Subscribe
|
Communications Cloud Native Core Binding Support Function
Subscribe
Communications Cloud Native Core Network Function Cloud Native Environment
Subscribe
Communications Cloud Native Core Network Repository Function
Subscribe
Communications Cloud Native Core Security Edge Protection Proxy
Subscribe
Communications Cloud Native Core Unified Data Repository
Subscribe
Enterprise Operations Monitor
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:55:28.498Z
Reserved: 2021-11-04T00:00:00
Link: CVE-2021-43396
No data.
Status : Modified
Published: 2021-11-04T20:15:09.223
Modified: 2024-11-21T06:29:09.553
Link: CVE-2021-43396
OpenCVE Enrichment
No data.
Weaknesses