PT-2025-7175 · Musl Libc+3 · Musl Libc+3
Nick Wellnhofer
·
Published
2025-02-09
·
Updated
2025-12-10
·
CVE-2025-26519
CVSS v3.1
8.1
High
| Vector | AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L |
Name of the Vulnerable Software and Affected Versions
musl libc versions 0.9.13 through 1.2.5
Description
The issue is related to an out-of-bounds write vulnerability in musl libc when an attacker can trigger iconv conversion of untrusted EUC-KR text to UTF-8. This can be exploited when an application calls
iconv open with output encoding UTF-8 and input encoding EUC-KR and subsequently processes untrusted input. The vulnerability exposes applications using musl libc to remote code execution.Recommendations
For musl libc versions 0.9.13 through 1.2.5, update to version 1.2.6 or later to resolve the issue. As a temporary workaround, consider restricting the use of
iconv open with untrusted input to minimize the risk of exploitation. Avoid using iconv with output encoding UTF-8 and input encoding EUC-KR for untrusted input until the issue is resolved.Fix
RCE
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Astra Linux
Debian
Musl Libc