Security Advisory (CVE-2025-26519) for musl libc:
https://www.openwall.com/lists/musl/2025/02/13/1
All users running applications which use iconv with untrusted input (see link for details of what usage is affected) should patch ASAP.
Security Advisory (CVE-2025-26519) for musl libc:
https://www.openwall.com/lists/musl/2025/02/13/1
All users running applications which use iconv with untrusted input (see link for details of what usage is affected) should patch ASAP.
musl-cross-make has now also been updated to apply the CVE-2025-26519 patches to all supported musl versions when building: https://github.com/richfelker/musl-cross-make/commit/7b4c7b315226835bab03da73a45945acb1b3bedf
@musl patched in Alpine :)
Some clarification on impact: The most likely impacted programs are things which process data received in arbitrary text encodings.
For example, mutt (mail user agent) is definitely affected. Other mail clients, web browsers, etc. that use iconv rather than their own converters are probably affected too.
FWIW, libxml2 looks like it would be affected except that it refuses to convert *from* an encoding unless iconv also supports conversion *to* that encoding, and musl does not have encoders for most legacy DBCSs, only decoders.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.