CVE-2024-2961

The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/04/17/9
http://www.openwall.com/lists/oss-security/2024/04/18/4
http://www.openwall.com/lists/oss-security/2024/04/24/2
http://www.openwall.com/lists/oss-security/2024/05/27/1
http://www.openwall.com/lists/oss-security/2024/05/27/2
http://www.openwall.com/lists/oss-security/2024/05/27/3
http://www.openwall.com/lists/oss-security/2024/05/27/4
http://www.openwall.com/lists/oss-security/2024/05/27/5
http://www.openwall.com/lists/oss-security/2024/05/27/6
http://www.openwall.com/lists/oss-security/2024/07/22/5
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
https://security.netapp.com/advisory/ntap-20240531-0002/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
http://www.openwall.com/lists/oss-security/2024/04/17/9
http://www.openwall.com/lists/oss-security/2024/04/18/4
http://www.openwall.com/lists/oss-security/2024/04/24/2
http://www.openwall.com/lists/oss-security/2024/05/27/1
http://www.openwall.com/lists/oss-security/2024/05/27/2
http://www.openwall.com/lists/oss-security/2024/05/27/3
http://www.openwall.com/lists/oss-security/2024/05/27/4
http://www.openwall.com/lists/oss-security/2024/05/27/5
http://www.openwall.com/lists/oss-security/2024/05/27/6
http://www.openwall.com/lists/oss-security/2024/07/22/5
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
https://security.netapp.com/advisory/ntap-20240531-0002/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
https://www.ambionics.io/blog/iconv-cve-2024-2961-p2
https://www.ambionics.io/blog/iconv-cve-2024-2961-p3
Configurations

No configuration.

History

13 Feb 2025, 18:17

Type Values Removed Values Added
Summary (en) The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable. (en) The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

21 Nov 2024, 09:10

Type Values Removed Values Added
References
  • () https://www.ambionics.io/blog/iconv-cve-2024-2961-p1 -
  • () https://www.ambionics.io/blog/iconv-cve-2024-2961-p2 -
  • () https://www.ambionics.io/blog/iconv-cve-2024-2961-p3 -
References () http://www.openwall.com/lists/oss-security/2024/04/17/9 - () http://www.openwall.com/lists/oss-security/2024/04/17/9 -
References () http://www.openwall.com/lists/oss-security/2024/04/18/4 - () http://www.openwall.com/lists/oss-security/2024/04/18/4 -
References () http://www.openwall.com/lists/oss-security/2024/04/24/2 - () http://www.openwall.com/lists/oss-security/2024/04/24/2 -
References () http://www.openwall.com/lists/oss-security/2024/05/27/1 - () http://www.openwall.com/lists/oss-security/2024/05/27/1 -
References () http://www.openwall.com/lists/oss-security/2024/05/27/2 - () http://www.openwall.com/lists/oss-security/2024/05/27/2 -
References () http://www.openwall.com/lists/oss-security/2024/05/27/3 - () http://www.openwall.com/lists/oss-security/2024/05/27/3 -
References () http://www.openwall.com/lists/oss-security/2024/05/27/4 - () http://www.openwall.com/lists/oss-security/2024/05/27/4 -
References () http://www.openwall.com/lists/oss-security/2024/05/27/5 - () http://www.openwall.com/lists/oss-security/2024/05/27/5 -
References () http://www.openwall.com/lists/oss-security/2024/05/27/6 - () http://www.openwall.com/lists/oss-security/2024/05/27/6 -
References () http://www.openwall.com/lists/oss-security/2024/07/22/5 - () http://www.openwall.com/lists/oss-security/2024/07/22/5 -
References () https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html - () https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/ -
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/ -
References () https://security.netapp.com/advisory/ntap-20240531-0002/ - () https://security.netapp.com/advisory/ntap-20240531-0002/ -
References () https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004 - () https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004 -

22 Jul 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/22/5 -

03 Jul 2024, 01:53

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/27/3 -
  • () http://www.openwall.com/lists/oss-security/2024/05/27/4 -
  • () http://www.openwall.com/lists/oss-security/2024/05/27/5 -
  • () https://security.netapp.com/advisory/ntap-20240531-0002/ -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/05/27/1 -
  • () http://www.openwall.com/lists/oss-security/2024/05/27/2 -
  • () http://www.openwall.com/lists/oss-security/2024/05/27/6 -

04 May 2024, 01:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html -

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/17/9 -
  • () http://www.openwall.com/lists/oss-security/2024/04/18/4 -

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/24/2 -

20 Apr 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/ -

20 Apr 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/ -

19 Apr 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/ -
Summary
  • (es) La función iconv() en las versiones 2.39 y anteriores de la librería GNU C puede desbordar el búfer de salida que se le pasa hasta en 4 bytes al convertir cadenas al juego de caracteres ISO-2022-CN-EXT, lo que puede usarse para bloquear una aplicación. o sobrescribir una variable vecina.

17 Apr 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 18:15

Updated : 2025-02-13 18:17


NVD link : CVE-2024-2961

Mitre link : CVE-2024-2961

CVE.ORG link : CVE-2024-2961


JSON object : View

Products Affected

No product.

CWE
CWE-787

Out-of-bounds Write