VYPR

rpm package

opensuse/glibc&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweed

Vulnerabilities (95)

  • CVE-2019-19126Nov 19, 2019
    affected < 2.34-1.2fixed 2.34-1.2

    On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries a

  • CVE-2019-9169Feb 26, 2019
    affected < 2.34-1.2fixed 2.34-1.2

    In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.

  • CVE-2009-5155Feb 26, 2019
    affected < 2.34-1.2fixed 2.34-1.2

    In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

  • CVE-2019-7309Feb 3, 2019
    affected < 2.34-1.2fixed 2.34-1.2

    In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.

  • CVE-2016-10739Jan 21, 2019
    affected < 2.34-1.2fixed 2.34-1.2

    In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string

  • CVE-2018-19591Dec 4, 2018
    affected < 2.34-1.2fixed 2.34-1.2

    In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.

  • CVE-2018-11237May 18, 2018
    affected < 2.34-1.2fixed 2.34-1.2

    An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

  • CVE-2018-11236May 18, 2018
    affected < 2.34-1.2fixed 2.34-1.2

    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitra

  • CVE-2017-18269May 18, 2018
    affected < 2.34-1.2fixed 2.34-1.2

    An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address

  • CVE-2018-6485Feb 1, 2018
    affected < 2.34-1.2fixed 2.34-1.2

    An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.

  • CVE-2017-1000408Feb 1, 2018
    affected < 2.34-1.2fixed 2.34-1.2

    A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.

  • CVE-2018-1000001Jan 31, 2018
    affected < 2.34-1.2fixed 2.34-1.2

    In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

  • CVE-2017-16997HigDec 18, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, relat

  • CVE-2017-17426HigDec 5, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cach

  • CVE-2017-15670CriOct 20, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.

  • CVE-2017-12133MedSep 7, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.

  • CVE-2017-12132MedAug 1, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.

  • CVE-2015-5180HigJun 27, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).

  • CVE-2017-1000366HigJun 19, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulatio

  • CVE-2016-10228MedMar 2, 2017
    affected < 2.34-1.2fixed 2.34-1.2

    The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a d