diff options
author | Florian Weimer <fweimer@redhat.com> | 2021-01-29 18:20:54 +0100 |
---|---|---|
committer | Raphael Moreira Zinsly <rzinsly@linux.ibm.com> | 2021-03-18 18:08:42 -0300 |
commit | 889122cbfacedab8fdb62a9d3fd6244d528ea99c (patch) | |
tree | d9d4f834b14302ce4bce0e3ed261153ef7ff4358 | |
parent | fa4162af6fc91fde8ed1c31e38a67736b7ef1ece (diff) | |
download | glibc-889122cbfacedab8fdb62a9d3fd6244d528ea99c.zip glibc-889122cbfacedab8fdb62a9d3fd6244d528ea99c.tar.gz glibc-889122cbfacedab8fdb62a9d3fd6244d528ea99c.tar.bz2 |
NEWS: Fix typo in CVE-2021-3326 entry
-rw-r--r-- | NEWS | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -33,7 +33,7 @@ CVE-2020-29562: An assertion failure has been fixed in the iconv function when invoked with UCS4 input containing an invalid character. CVE-2021-3326: An assertion failure during conversion from the - qISO-20220-JP-3 character set using the iconv function has been fixed. + ISO-20220-JP-3 character set using the iconv function has been fixed. This assertion was triggered by certain valid inputs in which the converted output contains a combined sequence of two wide characters crossing a buffer boundary. Reported by Tavis Ormandy. |