{"id":"AZL-6443","summary":"CVE-2021-43396 affecting package glibc for versions less than 2.35-1","details":"In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states \"the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.","modified":"2026-04-21T04:32:24.148535Z","published":"2021-11-04T20:15:09Z","upstream":["CVE-2021-43396"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43396"}],"affected":[{"package":{"name":"glibc","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/glibc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.35-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-6443.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}