rpm package
opensuse/glibc&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweed
Vulnerabilities (95)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-4527 | Med | 6.5 | < 2.38-3.1 | 2.38-3.1 | Sep 18, 2023 | A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function ret | |
| CVE-2023-4813 | — | < 2.38-6.1 | 2.38-6.1 | Sep 12, 2023 | A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is conf | ||
| CVE-2023-25139 | — | < 2.38-1.1 | 2.38-1.1 | Feb 3, 2023 | sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated strin | ||
| CVE-2022-39046 | — | < 2.36-3.1 | 2.36-3.1 | Aug 31, 2022 | An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the he | ||
| CVE-2021-3999 | — | < 2.35-1.1 | 2.35-1.1 | Aug 24, 2022 | A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to pote | ||
| CVE-2021-3998 | — | < 2.35-1.1 | 2.35-1.1 | Aug 24, 2022 | A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data. | ||
| CVE-2022-23219 | — | < 2.35-1.1 | 2.35-1.1 | Jan 14, 2022 | The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if | ||
| CVE-2022-23218 | — | < 2.35-1.1 | 2.35-1.1 | Jan 14, 2022 | The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if | ||
| CVE-2021-35942 | — | < 2.38-6.1 | 2.38-6.1 | Jul 22, 2021 | The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because | ||
| CVE-2021-33574 | — | < 2.34-1.2 | 2.34-1.2 | May 25, 2021 | The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (applicat | ||
| CVE-2020-27618 | — | < 2.34-1.2 | 2.34-1.2 | Feb 26, 2021 | The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, | ||
| CVE-2021-27645 | — | < 2.34-1.2 | 2.34-1.2 | Feb 24, 2021 | The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to | ||
| CVE-2021-3326 | — | < 2.34-1.2 | 2.34-1.2 | Jan 27, 2021 | The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. | ||
| CVE-2019-25013 | — | < 2.34-1.2 | 2.34-1.2 | Jan 4, 2021 | The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read. | ||
| CVE-2020-29573 | — | < 2.34-1.2 | 2.34-1.2 | Dec 5, 2020 | sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\ | ||
| CVE-2020-29562 | — | < 2.34-1.2 | 2.34-1.2 | Dec 4, 2020 | The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. | ||
| CVE-2020-1752 | — | < 2.34-1.2 | 2.34-1.2 | Apr 30, 2020 | A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre | ||
| CVE-2020-1751 | — | < 2.38-6.1 | 2.38-6.1 | Apr 17, 2020 | An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code executi | ||
| CVE-2020-6096 | — | < 2.34-1.2 | 2.34-1.2 | Apr 1, 2020 | An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerabil | ||
| CVE-2020-10029 | — | < 2.34-1.2 | 2.34-1.2 | Mar 4, 2020 | The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat |
- affected < 2.38-3.1fixed 2.38-3.1
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function ret
- CVE-2023-4813Sep 12, 2023affected < 2.38-6.1fixed 2.38-6.1
A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is conf
- CVE-2023-25139Feb 3, 2023affected < 2.38-1.1fixed 2.38-1.1
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated strin
- CVE-2022-39046Aug 31, 2022affected < 2.36-3.1fixed 2.36-3.1
An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the he
- CVE-2021-3999Aug 24, 2022affected < 2.35-1.1fixed 2.35-1.1
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to pote
- CVE-2021-3998Aug 24, 2022affected < 2.35-1.1fixed 2.35-1.1
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
- CVE-2022-23219Jan 14, 2022affected < 2.35-1.1fixed 2.35-1.1
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if
- CVE-2022-23218Jan 14, 2022affected < 2.35-1.1fixed 2.35-1.1
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if
- CVE-2021-35942Jul 22, 2021affected < 2.38-6.1fixed 2.38-6.1
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because
- CVE-2021-33574May 25, 2021affected < 2.34-1.2fixed 2.34-1.2
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (applicat
- CVE-2020-27618Feb 26, 2021affected < 2.34-1.2fixed 2.34-1.2
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications,
- CVE-2021-27645Feb 24, 2021affected < 2.34-1.2fixed 2.34-1.2
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to
- CVE-2021-3326Jan 27, 2021affected < 2.34-1.2fixed 2.34-1.2
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
- CVE-2019-25013Jan 4, 2021affected < 2.34-1.2fixed 2.34-1.2
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.
- CVE-2020-29573Dec 5, 2020affected < 2.34-1.2fixed 2.34-1.2
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\
- CVE-2020-29562Dec 4, 2020affected < 2.34-1.2fixed 2.34-1.2
The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
- CVE-2020-1752Apr 30, 2020affected < 2.34-1.2fixed 2.34-1.2
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre
- CVE-2020-1751Apr 17, 2020affected < 2.38-6.1fixed 2.38-6.1
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code executi
- CVE-2020-6096Apr 1, 2020affected < 2.34-1.2fixed 2.34-1.2
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerabil
- CVE-2020-10029Mar 4, 2020affected < 2.34-1.2fixed 2.34-1.2
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat
Page 2 of 5