VYPR

apk package

chainguard/localedef

pkg:apk/chainguard/localedef

Vulnerabilities (30)

  • CVE-2023-5156Sep 25, 2023
    affected < 2.38-r3fixed 2.38-r3

    A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.

  • CVE-2023-4527MedSep 18, 2023
    affected < 2.38-r2fixed 2.38-r2

    A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function ret

  • CVE-2023-0687Feb 6, 2023
    affected < 0fixed 0

    A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix thi

  • CVE-2023-25139Feb 3, 2023
    affected < 2.37-r1fixed 2.37-r1

    sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated strin

  • CVE-2022-39046Aug 31, 2022
    affected < 2.36-r1fixed 2.36-r1

    An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the he

  • CVE-2019-1010025Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.

  • CVE-2019-1010023Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute co

  • CVE-2019-1010024Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.

  • CVE-2019-1010022Jul 15, 2019
    affected < 0fixed 0

    GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comment

  • CVE-2010-4756Mar 2, 2011
    affected < 0fixed 0

    The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an F

Page 2 of 2