The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
https://www.ambionics.io/blog/iconv-cve-2024-2961-p3
https://www.ambionics.io/blog/iconv-cve-2024-2961-p2
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
https://security.netapp.com/advisory/ntap-20240531-0002/
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
http://www.openwall.com/lists/oss-security/2024/07/22/5
http://www.openwall.com/lists/oss-security/2024/05/27/6
http://www.openwall.com/lists/oss-security/2024/05/27/5
http://www.openwall.com/lists/oss-security/2024/05/27/4
http://www.openwall.com/lists/oss-security/2024/05/27/3
http://www.openwall.com/lists/oss-security/2024/05/27/2
http://www.openwall.com/lists/oss-security/2024/05/27/1
http://www.openwall.com/lists/oss-security/2024/04/24/2
Published: 2024-04-17
Updated: 2025-02-13
Named Vulnerability: lightyearNamed Vulnerability: glibc buffer overflowNamed Vulnerability: TuDoorNamed Vulnerability: CosmicStingNamed Vulnerability: CNEXT
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 7.3
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Severity: High
EPSS: 0.93471