CVE-2016-10228
glibc: iconv program can hang when invoked with the -c option
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
El programa iconv de la Biblioteca C de GNU (tambíen conocido como glibc o libc6) versión 2.31 y anteriores, cuando es invocado con múltiples sufijos en la codificación de destino (TRANSLATE o IGNORE) junto con la opción -c, entra en un bucle infinito al procesar secuencias de entrada multibyte inválidas, lo que lleva a una denegación de servicio.
Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues. Issues addressed include code execution, cross site scripting, denial of service, integer overflow, and null pointer vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-01 CVE Reserved
- 2017-03-02 CVE Published
- 2024-08-06 CVE Updated
- 2025-04-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (11)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202101-20 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2016-10228 | 2021-05-18 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1428290 | 2021-05-18 |