CVE-2021-3326 - log back

CVE-2021-3326 edited at 03 Feb 2021 12:07:44
Description
- The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
+ The iconv function in glibc version 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. The issue is fixed in glibc version 2.33.
CVE-2021-3326 edited at 28 Jan 2021 20:49:12
Type
- Directory traversal
+ Denial of service
CVE-2021-3326 edited at 27 Jan 2021 21:29:53
Severity
- Unknown
+ Low
Remote
- Unknown
+ Local
Type
- Unknown
+ Directory traversal
Description
+ The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
References
+ https://www.openwall.com/lists/oss-security/2021/01/27/3
+ https://sourceware.org/bugzilla/show_bug.cgi?id=27256
+ https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
CVE-2021-3326 created at 27 Jan 2021 21:28:03
Severity
+ Unknown
Remote
+ Unknown
Type
+ Unknown
Description
References
Notes