CVE-2020-29562

NameCVE-2020-29562
DescriptionThe iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow
Debian Bugs976391

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glibc (PTS)stretch2.24-11+deb9u4fixed
stretch (security)2.24-11+deb9u1fixed
buster2.28-10fixed
bullseye, sid2.31-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glibcsourcestretch(not affected)
glibcsourcebuster(not affected)
glibcsource(unstable)2.31-7976391

Notes

[buster] - glibc <not-affected> (Vulnerability introduced later in 2.30)
[stretch] - glibc <not-affected> (Vulnerability introduced later in 2.30)
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://sourceware.org/git/?p=glibc.git;a=commit;h=228edd356f03bf62dcf2b1335f25d43c602ee68d

Search for package or bug name: Reporting problems