VYPR

apk package

chainguard/glibc-locale-bo

pkg:apk/chainguard/glibc-locale-bo

Vulnerabilities (23)

  • CVE-2025-8058MedJul 23, 2025
    affected < 2.41-r56fixed 2.41-r56

    The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow b

  • CVE-2025-5745Jun 5, 2025
    affected < 0fixed 0

    The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in ov

  • CVE-2025-5702Jun 5, 2025
    affected < 0fixed 0

    The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in ove

  • CVE-2025-0395MedJan 22, 2025
    affected < 2.40-r6fixed 2.40-r6

    When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.

  • CVE-2024-33602HigMay 6, 2024
    affected < 2.39-r5fixed 2.39-r5

    nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to ns

  • CVE-2024-33601HigMay 6, 2024
    affected < 2.39-r5fixed 2.39-r5

    nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients.

  • CVE-2024-33600MedMay 6, 2024
    affected < 2.39-r5fixed 2.39-r5

    nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was add

  • CVE-2024-33599HigMay 6, 2024
    affected < 2.39-r5fixed 2.39-r5

    nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15

  • CVE-2024-2961HigApr 17, 2024
    affected < 2.39-r2fixed 2.39-r2

    The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

  • CVE-2023-6780MedJan 31, 2024
    affected < 2.38-r11fixed 2.38-r11

    An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size t

  • CVE-2023-6779HigJan 31, 2024
    affected < 2.38-r11fixed 2.38-r11

    An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incor

  • CVE-2023-6246HigJan 31, 2024
    affected < 2.38-r11fixed 2.38-r11

    A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program

  • CVE-2023-4911HigKEVOct 3, 2023
    affected < 2.38-r5fixed 2.38-r5

    A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permiss

  • CVE-2023-5156Sep 25, 2023
    affected < 2.38-r3fixed 2.38-r3

    A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

  • CVE-2023-4527MedSep 18, 2023
    affected < 2.38-r2fixed 2.38-r2

    A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function ret

  • CVE-2023-0687Feb 6, 2023
    affected < 0fixed 0

    A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix thi

  • CVE-2023-25139Feb 3, 2023
    affected < 2.37-r1fixed 2.37-r1

    sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated strin

  • CVE-2022-39046Aug 31, 2022
    affected < 2.36-r1fixed 2.36-r1

    An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the he

  • CVE-2019-1010025Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

  • CVE-2019-1010023Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute co

Page 1 of 2