In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka...
High severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Mar 21, 2024
Description
Published by the National Vulnerability Database
Nov 4, 2021
Published to the GitHub Advisory Database
May 24, 2022
Last updated
Mar 21, 2024
In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases.
References