CVE-2021-43396
Publication date 4 November 2021
Last updated 4 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states "the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there's no security impact to the bug.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| glibc | 22.04 LTS jammy | 
                                Not affected 
                                
                               | 
| 20.04 LTS focal | 
                                Not affected 
                                
                               | |
| 18.04 LTS bionic | 
                                Not affected 
                                
                               | |
| 16.04 LTS xenial | 
                                Not affected 
                                
                               | |
| 14.04 LTS trusty | Not in release | |
| eglibc | 22.04 LTS jammy | Not in release | 
| 20.04 LTS focal | Not in release | |
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | 
                                Not affected 
                                
                               | 
Notes
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score |  | 
| Attack vector | Network | 
| Attack complexity | Low | 
| Privileges required | None | 
| User interaction | None | 
| Scope | Unchanged | 
| Confidentiality | None | 
| Integrity impact | High | 
| Availability impact | None | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |