VYPR

apk package

chainguard/glibc

pkg:apk/chainguard/glibc

Vulnerabilities (34)

  • CVE-2023-6780MedJan 31, 2024
    affected < 2.38-r11fixed 2.38-r11

    An integer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a very long message, leading to an incorrect calculation of the buffer size t

  • CVE-2023-6779HigJan 31, 2024
    affected < 2.38-r11fixed 2.38-r11

    An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incor

  • CVE-2023-6246HigJan 31, 2024
    affected < 2.38-r11fixed 2.38-r11

    A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program

  • CVE-2023-4911HigKEVOct 3, 2023
    affected < 2.38-r5fixed 2.38-r5

    A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permiss

  • CVE-2023-5156Sep 25, 2023
    affected < 2.38-r3fixed 2.38-r3

    A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

  • CVE-2023-4527MedSep 18, 2023
    affected < 2.38-r2fixed 2.38-r2

    A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function ret

  • CVE-2023-0687Feb 6, 2023
    affected < 0fixed 0

    A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix thi

  • CVE-2023-25139Feb 3, 2023
    affected < 2.37-r1fixed 2.37-r1

    sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated strin

  • CVE-2022-39046Aug 31, 2022
    affected < 2.36-r1fixed 2.36-r1

    An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the he

  • CVE-2019-1010025Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

  • CVE-2019-1010023Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute co

  • CVE-2019-1010024Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

  • CVE-2019-1010022Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comment

  • CVE-2010-4756Mar 2, 2011
    affected < 0fixed 0

    The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an F

Page 2 of 2