{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4046","assignerOrgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","state":"PUBLISHED","assignerShortName":"glibc","dateReserved":"2026-03-12T10:12:32.994Z","datePublished":"2026-03-30T17:16:11.021Z","dateUpdated":"2026-04-20T21:02:31.443Z"},"containers":{"cna":{"providerMetadata":{"orgId":"3ff69d7a-14f2-4f67-a097-88dee7810d18","shortName":"glibc","dateUpdated":"2026-04-20T21:02:31.443Z"},"title":"iconv crash due to assertion failure with untrusted input","datePublic":"2026-03-12T09:02:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-617","description":"CWE-617 Reachable assertion","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"affected":[{"vendor":"The GNU C Library","product":"glibc","versions":[{"status":"affected","version":"2.3.3","lessThanOrEqual":"2.43","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n\n\n\nThis vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.","supportingMedia":[{"type":"text/html","base64":false,"value":"The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.\n<br>\n<br>This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.\n<br>"}]}],"references":[{"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33980","tags":["issue-tracking"]},{"url":"https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD","tags":["vendor-advisory"]},{"url":"https://inbox.sourceware.org/libc-announce/76814edf-cf7f-47ec-979d-2dce0a2c76bf@gotplt.org/T/#u","tags":["mailing-list"]}],"credits":[{"lang":"en","value":"Rocket Ma","type":"finder"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-03-30T17:33:59.227677Z","id":"CVE-2026-4046","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-30T17:35:48.736Z"}}]}}