Bug 2273404 (CVE-2024-2961) - CVE-2024-2961 glibc: Out of bounds write in iconv may lead to remote code execution [NEEDINFO]
Summary: CVE-2024-2961 glibc: Out of bounds write in iconv may lead to remote code exe...
Keywords:
Status: NEW
Alias: CVE-2024-2961
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2275855 2275933
Blocks: 2273407
TreeView+ depends on / blocked
 
Reported: 2024-04-04 15:43 UTC by Marco Benatto
Modified: 2024-05-29 08:14 UTC (History)
49 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds write flaw was found in the ISO-2022-CN-EXT plugin for glibc's iconv library. When converting from UCS4 charset, adding certain escape charterers is required to indicate where the charset was changed to the library. During this process, iconv improperly checks the boundaries of internal buffers, leading to a buffer overflow, which allows writing up to 3 bytes outside the desired memory location. This issue may allow an attacker to craft a malicious characters sequence that will trigger the out-of-bounds write and perform remote code execution, presenting a high impact to the Integrity, Confidentiality, and Availability triad.
Clone Of:
Environment:
Last Closed:
Embargoed:
mbenatto: needinfo? (kyoshida)


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:2748 0 None None None 2024-05-07 15:51:23 UTC
Red Hat Product Errata RHBA-2024:2749 0 None None None 2024-05-07 16:13:47 UTC
Red Hat Product Errata RHBA-2024:2750 0 None None None 2024-05-07 16:20:32 UTC
Red Hat Product Errata RHBA-2024:2751 0 None None None 2024-05-07 16:25:30 UTC
Red Hat Product Errata RHBA-2024:2752 0 None None None 2024-05-07 16:30:43 UTC
Red Hat Product Errata RHBA-2024:2753 0 None None None 2024-05-07 16:37:10 UTC
Red Hat Product Errata RHBA-2024:2754 0 None None None 2024-05-07 16:32:59 UTC
Red Hat Product Errata RHBA-2024:2765 0 None None None 2024-05-08 17:28:12 UTC
Red Hat Product Errata RHBA-2024:2771 0 None None None 2024-05-08 22:19:18 UTC
Red Hat Product Errata RHBA-2024:2787 0 None None None 2024-05-09 09:13:55 UTC
Red Hat Product Errata RHBA-2024:2796 0 None None None 2024-05-09 10:45:32 UTC
Red Hat Product Errata RHBA-2024:2797 0 None None None 2024-05-09 11:28:46 UTC
Red Hat Product Errata RHBA-2024:2798 0 None None None 2024-05-09 11:28:52 UTC
Red Hat Product Errata RHBA-2024:2802 0 None None None 2024-05-09 18:01:29 UTC
Red Hat Product Errata RHBA-2024:2803 0 None None None 2024-05-09 18:10:48 UTC
Red Hat Product Errata RHBA-2024:2804 0 None None None 2024-05-09 18:11:44 UTC
Red Hat Product Errata RHBA-2024:2805 0 None None None 2024-05-09 18:11:18 UTC
Red Hat Product Errata RHBA-2024:2806 0 None None None 2024-05-09 18:20:57 UTC
Red Hat Product Errata RHBA-2024:2807 0 None None None 2024-05-09 19:27:16 UTC
Red Hat Product Errata RHBA-2024:2808 0 None None None 2024-05-09 19:38:07 UTC
Red Hat Product Errata RHBA-2024:2809 0 None None None 2024-05-09 19:38:42 UTC
Red Hat Product Errata RHBA-2024:2811 0 None None None 2024-05-09 19:38:23 UTC
Red Hat Product Errata RHBA-2024:2812 0 None None None 2024-05-09 19:44:31 UTC
Red Hat Product Errata RHBA-2024:2813 0 None None None 2024-05-09 19:44:53 UTC
Red Hat Product Errata RHBA-2024:2827 0 None None None 2024-05-13 11:50:28 UTC
Red Hat Product Errata RHBA-2024:2851 0 None None None 2024-05-15 02:09:11 UTC
Red Hat Product Errata RHBA-2024:3355 0 None None None 2024-05-23 23:57:29 UTC
Red Hat Product Errata RHBA-2024:3360 0 None None None 2024-05-28 08:18:24 UTC
Red Hat Product Errata RHBA-2024:3361 0 None None None 2024-05-28 08:25:07 UTC
Red Hat Product Errata RHBA-2024:3362 0 None None None 2024-05-28 08:29:55 UTC
Red Hat Product Errata RHBA-2024:3363 0 None None None 2024-05-28 08:32:55 UTC
Red Hat Product Errata RHBA-2024:3364 0 None None None 2024-05-28 08:25:02 UTC
Red Hat Product Errata RHBA-2024:3365 0 None None None 2024-05-28 08:31:57 UTC
Red Hat Product Errata RHBA-2024:3366 0 None None None 2024-05-28 08:29:45 UTC
Red Hat Product Errata RHBA-2024:3367 0 None None None 2024-05-28 08:23:51 UTC
Red Hat Product Errata RHBA-2024:3371 0 None None None 2024-05-28 08:50:07 UTC
Red Hat Product Errata RHBA-2024:3380 0 None None None 2024-05-28 09:00:14 UTC
Red Hat Product Errata RHBA-2024:3382 0 None None None 2024-05-28 08:59:27 UTC
Red Hat Product Errata RHBA-2024:3383 0 None None None 2024-05-28 09:19:24 UTC
Red Hat Product Errata RHBA-2024:3398 0 None None None 2024-05-28 13:00:45 UTC
Red Hat Product Errata RHBA-2024:3430 0 None None None 2024-05-28 13:13:59 UTC
Red Hat Product Errata RHBA-2024:3445 0 None None None 2024-05-28 17:23:04 UTC
Red Hat Product Errata RHBA-2024:3456 0 None None None 2024-05-29 07:52:18 UTC
Red Hat Product Errata RHBA-2024:3457 0 None None None 2024-05-29 07:52:28 UTC
Red Hat Product Errata RHBA-2024:3458 0 None None None 2024-05-29 07:52:43 UTC
Red Hat Product Errata RHBA-2024:3459 0 None None None 2024-05-29 07:52:55 UTC
Red Hat Product Errata RHBA-2024:3463 0 None None None 2024-05-29 08:14:59 UTC
Red Hat Product Errata RHSA-2024:2722 0 None None None 2024-05-07 07:37:20 UTC
Red Hat Product Errata RHSA-2024:2799 0 None None None 2024-05-09 14:48:08 UTC
Red Hat Product Errata RHSA-2024:3269 0 None None None 2024-05-22 11:41:47 UTC
Red Hat Product Errata RHSA-2024:3309 0 None None None 2024-05-23 06:25:10 UTC
Red Hat Product Errata RHSA-2024:3312 0 None None None 2024-05-23 07:18:45 UTC
Red Hat Product Errata RHSA-2024:3339 0 None None None 2024-05-23 13:20:44 UTC
Red Hat Product Errata RHSA-2024:3411 0 None None None 2024-05-28 14:27:41 UTC
Red Hat Product Errata RHSA-2024:3423 0 None None None 2024-05-28 14:06:20 UTC

Description Marco Benatto 2024-04-04 15:43:00 UTC
The iconv plugin ISO-2022-CN-EXT, when converting from UCS4, might trigger a OOB write. The encoding requires to add escape sequence to indicate where
it changes the character set (as described by RFC 1922) and while the bounds check is done by the SOdesignation designation, it is missing for SS2designation and SS3designation. This leads to an overflow of 1, 2, or 3 bytes with  fixed values: `$+I`, `$+J`, `$+K`, `$+L`, `$+M`, or , `$*H`.

Comment 4 Sandipan Roy 2024-04-18 04:26:52 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 2275855]

Comment 5 Sandipan Roy 2024-04-18 14:13:15 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-rawhide [bug 2275933]

Comment 8 errata-xmlrpc 2024-05-07 07:37:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:2722 https://access.redhat.com/errata/RHSA-2024:2722

Comment 9 errata-xmlrpc 2024-05-09 14:48:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:2799 https://access.redhat.com/errata/RHSA-2024:2799

Comment 10 errata-xmlrpc 2024-05-22 11:41:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:3269 https://access.redhat.com/errata/RHSA-2024:3269

Comment 11 errata-xmlrpc 2024-05-23 06:25:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:3309 https://access.redhat.com/errata/RHSA-2024:3309

Comment 12 errata-xmlrpc 2024-05-23 07:18:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:3312 https://access.redhat.com/errata/RHSA-2024:3312

Comment 13 errata-xmlrpc 2024-05-23 13:20:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:3339 https://access.redhat.com/errata/RHSA-2024:3339

Comment 14 errata-xmlrpc 2024-05-28 14:06:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:3423 https://access.redhat.com/errata/RHSA-2024:3423

Comment 15 errata-xmlrpc 2024-05-28 14:27:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:3411 https://access.redhat.com/errata/RHSA-2024:3411


Note You need to log in before you can comment on or make changes to this bug.