Unrated severityNVD Advisory· Published Jan 4, 2021· Updated Jun 9, 2025
CVE-2019-25013
CVE-2019-25013
Description
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
Affected products
29- GNU C Library/GNU C Librarydescription
- osv-coords28 versionspkg:rpm/almalinux/glibc-benchtestspkg:rpm/almalinux/glibc-nss-develpkg:rpm/almalinux/glibc-staticpkg:rpm/almalinux/nss_hesiodpkg:rpm/opensuse/glibc&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/glibc-testsuite-src&distro=openSUSE%20Leap%2015.2pkg:rpm/suse/glibc&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP2pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20COREpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/glibc&distro=SUSE%20Manager%20Proxy%204.0pkg:rpm/suse/glibc&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0pkg:rpm/suse/glibc&distro=SUSE%20Manager%20Server%204.0
< 2.28-151.el8+ 27 more
- (no CPE)range: < 2.28-151.el8
- (no CPE)range: < 2.28-151.el8
- (no CPE)range: < 2.28-151.el8
- (no CPE)range: < 2.28-151.el8
- (no CPE)range: < 2.26-lp152.26.6.1
- (no CPE)range: < 2.34-1.2
- (no CPE)range: < 2.26-lp152.26.6.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.11.3-17.110.43.1
- (no CPE)range: < 2.22-126.1
- (no CPE)range: < 2.22-126.1
- (no CPE)range: < 2.22-114.5.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.22-114.5.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.22-114.5.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
- (no CPE)range: < 2.26-13.56.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/mitrevendor-advisory
- security.gentoo.org/glsa/202107-07mitrevendor-advisory
- lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3Emitremailing-list
- lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3Emitremailing-list
- lists.debian.org/debian-lts-announce/2022/10/msg00021.htmlmitremailing-list
- security.netapp.com/advisory/ntap-20210205-0004/mitre
- sourceware.org/bugzilla/show_bug.cgimitre
- sourceware.org/git/mitre
- www.oracle.com/security-alerts/cpuapr2022.htmlmitre
News mentions
0No linked articles in our index yet.