[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2022-03-07 Thread Michael Hudson-Doyle
This got fixed in https://ubuntu.com/security/notices/USN-5310-1 ** Changed in: glibc (Ubuntu Bionic) Status: New => Fix Released ** Changed in: glibc (Ubuntu Focal) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-11-15 Thread Michael Hudson-Doyle
I always feel more comfortable for SRUs with a test case that can be run by hand outside the package build, not sure if that's completely justified. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-11-14 Thread Alex Murray
@mwhudson - there is a test case already in the upstream patch: https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1929105 Title:

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-11-14 Thread Michael Hudson-Doyle
Does anyone have a test case for this? It seems like it would be good to fix it for focal (and eventually bionic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1929105 Title: CVE-2021-3326: The

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-09-18 Thread Bug Watch Updater
Launchpad has imported 3 comments from the remote bug at https://sourceware.org/bugzilla/show_bug.cgi?id=27256. If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-09-17 Thread Steve Beattie
** Bug watch added: Sourceware.org Bugzilla #27256 https://sourceware.org/bugzilla/show_bug.cgi?id=27256 ** Also affects: glibc via https://sourceware.org/bugzilla/show_bug.cgi?id=27256 Importance: Unknown Status: Unknown -- You received this bug notification because you are a

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-08-25 Thread Steve Beattie
Groovy has reached end of supported status, and as such will not be fixed. ** Changed in: glibc (Ubuntu Groovy) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1929105

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-06-08 Thread Steve Beattie
This is fixed in hirsute and newer via glibc 2.33. ** Changed in: glibc (Ubuntu) Importance: Undecided => Low ** Also affects: glibc (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: glibc (Ubuntu Focal) Importance: Undecided Status: New ** Also affects:

[Bug 1929105] Re: CVE-2021-3326: The iconv app in glibc when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion & aborts

2021-05-20 Thread bhs
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3326 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1929105