CVE-2020-29562
Published: 4 December 2020
The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
Notes
Author | Note |
---|---|
mdeslaur | while bug reports indicate this was introduced in 2.30, there actually is a commit in 2.27 to fix the issue. |
Priority
Status
Package | Release | Status |
---|---|---|
eglibc Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
glibc Launchpad, Ubuntu, Debian |
bionic |
Released
(2.27-3ubuntu1.5)
|
focal |
Released
(2.31-0ubuntu9.7)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Not vulnerable
(2.33-0ubuntu1)
|
|
impish |
Not vulnerable
(2.33-0ubuntu1)
|
|
jammy |
Not vulnerable
(2.33-0ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://sourceware.org/git/?p=glibc.git;h=228edd356f03bf62dcf2b1335f25d43c602ee68d upstream: https://sourceware.org/git/?p=glibc.git;h=5fa7884e25c5d11718253244fd1bc570c60f4cc8 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.8 |
Attack vector | Network |
Attack complexity | High |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H |