CVE-2024-2961

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-2961
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-2961.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-2961
Downstream
Related
Published
2024-04-17T18:15:15Z
Modified
2025-07-29T11:09:32.902364Z
Summary
[none]
Details

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

References

Affected packages

Debian:11 / glibc

Package

Name
glibc
Purl
pkg:deb/debian/glibc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.31-13+deb11u9

Affected versions

2.*

2.31-13
2.31-13+deb11u1
2.31-13+deb11u2
2.31-13+deb11u3
2.31-13+deb11u4
2.31-13+deb11u5
2.31-13+deb11u6
2.31-13+deb11u7
2.31-13+deb11u8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / glibc

Package

Name
glibc
Purl
pkg:deb/debian/glibc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.36-9+deb12u6

Affected versions

2.*

2.36-9
2.36-9+deb12u1
2.36-9+deb12u2
2.36-9+deb12u3
2.36-9+deb12u4
2.36-9+deb12u5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / glibc

Package

Name
glibc
Purl
pkg:deb/debian/glibc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.37-18

Ecosystem specific

{
    "urgency": "not yet assigned"
}