2024-04-17 20:03:32 +00:00
{
"id" : "CVE-2024-2961" ,
"sourceIdentifier" : "3ff69d7a-14f2-4f67-a097-88dee7810d18" ,
"published" : "2024-04-17T18:15:15.833" ,
2024-06-10 20:03:11 +00:00
"lastModified" : "2024-06-10T18:15:30.657" ,
2024-04-17 22:03:27 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-04-17 20:03:32 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.\n"
2024-04-19 23:58:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n iconv() en las versiones 2.39 y anteriores de la librer\u00eda GNU C puede desbordar el b\u00fafer de salida que se le pasa hasta en 4 bytes al convertir cadenas al juego de caracteres ISO-2022-CN-EXT, lo que puede usarse para bloquear una aplicaci\u00f3n. o sobrescribir una variable vecina."
2024-04-17 20:03:32 +00:00
}
] ,
"metrics" : { } ,
"weaknesses" : [
{
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"references" : [
2024-05-01 20:03:28 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/04/17/9" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/04/18/4" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-05-01 18:03:25 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/04/24/2" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-06-10 18:03:10 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/05/27/1" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/05/27/2" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-06-10 20:03:11 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/05/27/3" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/05/27/4" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/05/27/5" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-06-10 18:03:10 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/05/27/6" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-05-04 02:03:24 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-04-20 04:03:30 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-04-19 23:58:22 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-04-20 04:03:30 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-06-10 20:03:11 +00:00
{
"url" : "https://security.netapp.com/advisory/ntap-20240531-0002/" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
} ,
2024-04-17 20:03:32 +00:00
{
"url" : "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004" ,
"source" : "3ff69d7a-14f2-4f67-a097-88dee7810d18"
}
]
}