CVE-2026-4046

| EUVD-2026-17144 HIGH
2026-03-30 glibc GHSA-g7c4-wv7q-gcc6
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 30, 2026 - 17:36 vuln.today
EUVD ID Assigned
Mar 30, 2026 - 17:36 euvd
EUVD-2026-17144
CVE Published
Mar 30, 2026 - 17:16 nvd
HIGH 7.5

Description

The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.

Analysis

Remote denial of service in GNU C Library (glibc) 2.43 and earlier allows unauthenticated remote attackers to crash applications via malformed input during character set conversion from IBM1390 or IBM1399 encodings. The vulnerability triggers an assertion failure in the iconv() function with high attack reliability (CVSS 7.5, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Vendor Status

Debian

glibc
Release Status Fixed Version Urgency
bullseye vulnerable 2.31-13+deb11u11 -
bullseye (security) vulnerable 2.31-13+deb11u13 -
bookworm vulnerable 2.36-9+deb12u13 -
bookworm (security) vulnerable 2.36-9+deb12u7 -
trixie vulnerable 2.41-12+deb13u2 -
forky vulnerable 2.42-13 -
sid vulnerable 2.42-14 -
(unstable) fixed (unfixed) -

Share

CVE-2026-4046 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy