CVE-2024-2961

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-2961
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-2961.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-2961
Related
Published
2024-04-17T18:15:15Z
Modified
2024-09-18T03:26:11.270729Z
Summary
[none]
Details

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

References

Affected packages

Debian:11 / glibc

Package

Name
glibc
Purl
pkg:deb/debian/glibc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.31-13+deb11u9

Affected versions

2.*

2.31-13
2.31-13+deb11u1
2.31-13+deb11u2
2.31-13+deb11u3
2.31-13+deb11u4
2.31-13+deb11u5
2.31-13+deb11u6
2.31-13+deb11u7
2.31-13+deb11u8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / glibc

Package

Name
glibc
Purl
pkg:deb/debian/glibc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.36-9+deb12u6

Affected versions

2.*

2.36-9
2.36-9+deb12u1
2.36-9+deb12u2
2.36-9+deb12u3
2.36-9+deb12u4
2.36-9+deb12u5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / glibc

Package

Name
glibc
Purl
pkg:deb/debian/glibc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.37-18

Affected versions

2.*

2.36-9
2.36-9+loong64
2.36-10~0
2.37-1
2.37-2
2.37-3
2.37-4
2.37-5
2.37-6
2.37-7
2.37-8
2.37-9
2.37-10
2.37-11
2.37-12
2.37-13
2.37-14
2.37-15~deb13u1
2.37-15
2.37-15.1
2.37-15.1+sh4
2.37-16
2.37-17

Ecosystem specific

{
    "urgency": "not yet assigned"
}