Out-of-bounds Read Affecting glibc package, versions <2.28-10+deb10u2



    Attack Complexity High
    Availability High
Expand this section
5.9 medium
Expand this section
5.3 medium
Expand this section
Red Hat
4.8 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN10-GLIBC-1055403
  • published 5 Jan 2021
  • disclosed 4 Jan 2021

How to fix?

Upgrade Debian:10 glibc to version 2.28-10+deb10u2 or higher.

NVD Description

Note: Versions mentioned in the description apply to the upstream glibc package. See How to fix? for Debian:10 relevant versions.

The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.