{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/crash/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["glibc","iconv","denial-of-service","crash","cve-2026-4046"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eThe GNU C Library (glibc) is a fundamental component of many Linux systems, providing core functionalities for applications. A vulnerability, CVE-2026-4046, exists within the \u003ccode\u003eiconv()\u003c/code\u003e function in glibc versions 2.43 and earlier. This flaw can be triggered when the library attempts to convert character sets from IBM1390 or IBM1399. If an application utilizes \u003ccode\u003eiconv()\u003c/code\u003e to process potentially malicious input from these character sets, it could lead to an assertion failure and subsequent crash…\u003c/p\u003e\n","date_modified":"2026-03-30T18:16:19Z","date_published":"2026-03-30T18:16:19Z","id":"/briefs/2026-03-glibc-iconv-crash/","summary":"A vulnerability in the iconv() function of the GNU C Library (versions 2.43 and earlier) can cause a crash due to an assertion failure when handling IBM1390 or IBM1399 character sets, potentially leading to remote application denial-of-service.","title":"GNU C Library iconv() Function Assertion Failure (CVE-2026-4046)","url":"https://feed.craftedsignal.io/briefs/2026-03-glibc-iconv-crash/"}],"language":"en","title":"CraftedSignal Threat Feed — Crash","version":"https://jsonfeed.org/version/1.1"}